WO2015043193A1 - 一种终端的解锁处理方法、装置及设备 - Google Patents
一种终端的解锁处理方法、装置及设备 Download PDFInfo
- Publication number
- WO2015043193A1 WO2015043193A1 PCT/CN2014/077106 CN2014077106W WO2015043193A1 WO 2015043193 A1 WO2015043193 A1 WO 2015043193A1 CN 2014077106 W CN2014077106 W CN 2014077106W WO 2015043193 A1 WO2015043193 A1 WO 2015043193A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- unlocker
- information
- current
- unlocking
- preset
- Prior art date
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 24
- 238000012545 processing Methods 0.000 claims abstract description 84
- 238000000034 method Methods 0.000 claims abstract description 34
- 230000008569 process Effects 0.000 claims description 15
- 238000012217 deletion Methods 0.000 claims description 5
- 230000037430 deletion Effects 0.000 claims description 5
- 238000012790 confirmation Methods 0.000 claims description 4
- 230000006870 function Effects 0.000 description 20
- 238000004891 communication Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 18
- 238000012986 modification Methods 0.000 description 8
- 230000004048 modification Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 241000699666 Mus <mouse, genus> Species 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011982 device technology Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the invention relates to a method, device and device for unlocking a terminal.
- the application is based on a Chinese patent application with the application number of CN 201310446823.2 and the application date being September 26, 2013, and claims the priority of the Chinese patent application.
- the entire disclosure is hereby incorporated by reference.
- the present disclosure relates to the field of electronic device technologies, and in particular, to a method, device, and device for unlocking a terminal. Background technique
- An embodiment of the present disclosure provides a method, an apparatus, and a device for unlocking a terminal, which are used to record information of an illegal user to remind the owner.
- the present disclosure provides a method for unlocking a terminal, including: receiving an input unlocking instruction;
- the information of the current unlocker is obtained and stored.
- the technical solution provided by the embodiment of the present disclosure may include the following advantages: attempting to unlock the terminal device by using the foregoing solution, and when the unlocker is an illegal user that does not belong to the first preset crowd, the unlocker's information can be obtained for The owner can view the machine, so that the owner can master the unlock history of the machine and improve the security of use.
- the information collecting device When the current unlocker does not belong to the first preset crowd, the information collecting device is started; the information collecting device collects the information of the current unlocker, wherein the current unlocker information includes the face image information, the voice information or the fingerprint information of the current unlocker. .
- the information collection device such as the camera, microphone, and fingerprint collection device of the terminal, obtains the face image information, voice information, and fingerprint information of the illegal user, which can help the owner to conveniently confirm the identity of the illegal user.
- the system and/or application of the terminal device only provides feedback for the preset operation, including the initiation, query, modification, addition and/or deletion of the system and/or application of the terminal device.
- the secondary screening judgment is performed based on the information of the unlocker, and when the unlocker is a specific user, the limited use mode is entered, that is, the limited use permission is granted to the specific user, and the specific user is recorded in the limited use mode.
- the operation performed on this terminal is for the owner to view. Therefore, the owner can not only grasp the unlock history of the machine, but also protect personal privacy, and grasp what operations the unlocker has performed on the machine, thereby further improving the security of use. Emergency assistance can also be provided for people who are restricted.
- the related information of the unlocker who has tried to unlock the local device is displayed, and the prompting function is played.
- a prompt message is output to prompt whether to cancel the operation; after the confirmation is obtained, the operation is cancelled.
- the owner can be provided with a revocation option to cancel these operations, so that the terminal can be restored to the state before the illegal user operation, which is convenient for the owner to use.
- the lock screen state is entered.
- the secondary screening judgment is performed.
- the unlocker is neither the owner nor the preset specific user group, only the information is stored and the information is returned to the lock screen state, Unlocked, does not enter the restricted use mode.
- the screen unlock interface is displayed.
- the screen locking screen interface can be activated by tilting the terminal by a certain angle, and the operation is convenient.
- the unlock command is based on character cipher information, pattern information, face image information, voice information, or fingerprint information.
- the present disclosure provides an unlock processing apparatus for a terminal, including: a receiving module, configured to receive an input unlocking instruction;
- a determining module configured to determine, according to the unlocking instruction, whether the current unlocker belongs to the first preset crowd
- the information acquisition processing module is configured to acquire information of the current unlocker and store the current unlocker when the current unlocker does not belong to the first preset crowd.
- the unlock processing device further includes an information collection device and a device startup module;
- the device startup module is configured to start the information collection device when the current unlocker does not belong to the first preset group; the information collection device is configured to collect information about the current unlocker, where the information of the current unlocker includes the current unlocker. Face image information, voice information, or fingerprint information.
- the unlocking processing device further includes: a second determining module, configured to determine, according to information of the current unlocker, whether the current unlocker belongs to the second preset crowd;
- a second unlocking processing module configured to: when the current unlocker belongs to the second preset crowd, unlock the screen and enter the limited use mode
- a recording processing module configured to record an operation of the current unlocker in the limited use mode
- the system and/or application of the terminal device only provides feedback for the preset operation, including the initiation, query, modification, addition and/or deletion of the system and/or application of the terminal device.
- the unlocking processing device further includes: a first unlocking processing module, configured to: when the current unlocker belongs to the first preset crowd, unlocking;
- the display processing module is configured to display information and/or operations of the stored unlocker that does not belong to the first preset crowd.
- the unlock processing device further includes: an information output module, configured to output prompt information, prompting whether to cancel the operation; and canceling the processing module, for canceling the operation.
- the unlock processing device further includes a lock screen processing module, configured to enter a lock screen state when the current unlocker does not belong to the second preset crowd.
- the unlocking processing device further includes: a third determining module, configured to determine whether to display a screen unlocking interface according to an inclination angle of a plane of the axis of the terminal device with respect to a horizontal plane;
- the interface processing module is configured to display a screen unlocking interface when the tilt angle is greater than or equal to a preset threshold.
- the present disclosure provides a terminal device including a memory, and one or more programs, wherein one or more programs are stored in a memory and configured to be one or Executing one or more programs by one or more processors includes instructions for: receiving an unlocked command of the input;
- the information of the current unlocker is obtained and stored.
- the disclosure can record the information of the illegal user for the owner to view, and the owner can conveniently grasp the unlocking history of the terminal and improve the safety factor of the terminal.
- the present disclosure can conveniently implement multi-person use of one device, and grant different use rights to different people, which is beneficial to the privacy protection of the owner.
- FIG. 1 is an exemplary flowchart of a terminal unlock processing method according to an exemplary embodiment.
- FIG. 2 is an exemplary flowchart of a terminal unlock processing method according to an exemplary embodiment.
- FIG. 4 is an exemplary flowchart of a terminal unlock processing method according to an exemplary embodiment;
- FIG. 5 is an exemplary implementation according to an exemplary implementation.
- An exemplary flowchart of a terminal unlock processing method illustrated in FIG. 6 is an exemplary flowchart of a terminal unlock processing method according to an exemplary embodiment.
- FIG. 7 is a diagram according to an exemplary embodiment.
- FIG. 8 is an exemplary flowchart of a screen unlocking process for a mobile phone having a face recognition function, according to an exemplary embodiment;
- FIG. 9 is a schematic structural diagram of a terminal unlock processing apparatus according to an exemplary embodiment.
- FIG. 10 is a schematic structural diagram of a terminal unlock processing apparatus according to an exemplary embodiment.
- FIG. 12 is a schematic structural diagram of a terminal unlock processing apparatus according to an exemplary embodiment;
- FIG. 13 is an exemplary implementation according to an exemplary embodiment.
- FIG. 14 is a schematic structural diagram of a terminal unlock processing apparatus according to an exemplary embodiment.
- FIG. 15 is a schematic diagram of a terminal unlock processing apparatus according to an exemplary embodiment.
- FIG. An exemplary structural diagram of a terminal device is a schematic structural diagram of a terminal unlock processing apparatus according to an exemplary embodiment.
- An embodiment of the present disclosure provides a method for unlocking a terminal.
- an illegal user unlocks the local device, not only does not unlock the device, but also starts the information collecting device to obtain the unlocker information.
- the owner unlocks, the information can be viewed to learn which information. Illegal users have tried to unlock the unit and act as a reminder.
- FIG. 1 is a flowchart of a method for processing an unlocking process of a terminal according to an embodiment of the present disclosure, including the following steps:
- step S101 the input unlocking instruction is received, and the method in this embodiment is used in the terminal;
- step S102 determining, according to the unlocking instruction, whether the current unlocker belongs to the first preset crowd
- step S103 when the current unlocker does not belong to the first preset crowd, the information of the current unlocker is obtained and coexisted. Storage.
- the process ends, and the main page can be unlocked and displayed normally.
- the user inputs an unlocking instruction based on the character password information, the pattern information, and the biometric information, including a preset digital password, a specific pattern, a face image, a voice information, or a fingerprint information. Wait.
- the terminal determines that the unlocker is not the owner, and obtains the unlocker's information and stores it, so that the owner can unlock the password. See who has tried to unlock this unit.
- FIG. 2 is a flowchart of an unlock processing method according to another embodiment of the present disclosure, including the following steps:
- step S201 the input unlocking instruction is received, and the method in this embodiment is used in the terminal;
- step S202 it is determined whether the current unlocker belongs to the first preset crowd according to the unlocking instruction; if it does not belong to the first preset crowd, proceed to step 203, otherwise, the current process is ended, and the main page can be normally unlocked and displayed.
- step S203 when the current unlocker does not belong to the first preset crowd, the information collecting device is started to collect information of the current unlocker.
- the information of the unlocker includes his face image information, voice information or fingerprint information.
- the foregoing information collection device includes a camera, a microphone, a fingerprint input device, and the like on the terminal.
- the terminal activates the built-in camera to take a picture of the unlocker located in front of the screen, and save the photo locally or in the cloud.
- the owner can judge the identity of the unlocker based on the photo.
- the microphone or the fingerprint input device can conveniently use the voice information or the fingerprint information of the unlocker, and can also be compared with the existing voice information or fingerprint information. Unlocker identity.
- FIG. 3 is a flowchart of an unlock processing method according to another embodiment of the present disclosure, including the following steps:
- step S301 the input unlocking instruction is received, and the method in this embodiment is used in the terminal;
- step S302 it is determined according to the unlocking instruction whether the current unlocker belongs to the first preset crowd; if it does not belong to the first preset crowd, proceed to step 303, otherwise, the process ends, and the main page can be normally unlocked and displayed.
- step S303 when the current unlocker does not belong to the first preset crowd, the current unlocker information is obtained and stored;
- step S304 according to the information of the current unlocker, it is determined whether the current unlocker belongs to the second preset crowd; if it belongs to the second preset crowd, proceed to step 305, otherwise the flow is ended.
- step S305 when the current unlocker belongs to the second preset crowd, the screen is unlocked and enters the limited use mode; in step S306, the operation of the current unlocker in the limited use mode is recorded.
- the system and/or application of the terminal device only feeds back the preset operation, and the operation includes starting, querying, modifying, adding, and/or deleting the system and/or application of the terminal device.
- the owner wants his family or friends to use the machine, and pre-records their students.
- Object identification information which can wake up the unit when they are unlocked. Take the child of the owner as an example. The owner saves the child's photo locally. When the child tries to unlock but enters the wrong password, the camera takes the child's photo. The terminal system will take the photo taken and the pre-stored photos. The photos are compared, and the face recognition technology judges that the current unlocker is one of the preset people, instead of a stranger, unlocks the screen and enters the awake state.
- the embodiment of the present disclosure may further set a corresponding usage mode separately for a specific user such as a family member or a friend.
- a specific user can unlock the screen, it can only be used for the operating system of the local machine or installed.
- the application performs limited operations. Still taking the child as an example, it is preset in the child's corresponding usage mode. After the terminal is unlocked, the game application can be used, but the consumer application cannot be used, and no modification, addition or deletion instructions can be executed to prevent the child from incurring the consumption cost or Other changes.
- the owner sets different usage modes for different specific users, and the personal privacy information can be set to prohibit access in any usage mode, thereby protecting personal privacy. In the disclosed embodiment, a complete user can also be granted full usage rights.
- the embodiments of the present disclosure also record the operation of the specific user to the local machine, including the actions of starting, querying, modifying, adding, and deleting the system and application of the terminal device.
- FIG. 4 is a flowchart of an unlock processing method according to another embodiment of the present disclosure, including the following steps:
- step S401 the input unlocking instruction is received, and the method in this embodiment is used in the terminal;
- step S402 it is determined whether the current unlocker belongs to the first preset crowd according to the unlocking instruction; if it belongs to the first preset crowd, the process proceeds to step 403, otherwise the process ends. For details, refer to step 203 and step 303.
- step S403 when the current unlocker belongs to the first preset crowd, the lock is released;
- step S404 the stored information and/or operation of the unlocker that does not belong to the first preset crowd is displayed.
- the information of the unlocker that does not belong to the first preset group includes face image information, voice information, or fingerprint information of the unlocker that does not belong to the first preset group.
- the operation of the unlocker that does not belong to the first preset group includes the startup, query, modification, addition, and/or application of the system and/or application of the terminal device that does not belong to the first preset group in the limited usage mode. / or delete.
- the screen is unlocked, and the normal use mode is displayed, and the information of the unlocker other than the owner obtained before is displayed, that is, the photograph taken, the recorded sound or the fingerprint received, etc. ; If the unlocker has a specific user preset by the organic master, the operation record of the specific user to the machine will also be displayed.
- FIG. 5 is a flowchart of a method for unlocking a lock according to another embodiment of the present disclosure, including the following steps:
- step S501 the input unlocking instruction is received, and the method in this embodiment is used in the terminal;
- step S502 it is determined according to the unlocking instruction whether the current unlocker belongs to the first preset crowd; if it belongs to the first preset crowd, the process proceeds to step 503, otherwise the process ends.
- step S503 it is determined according to the unlocking instruction whether the current unlocker belongs to the first preset crowd; if it belongs to the first preset crowd, the process proceeds to step 503, otherwise the process ends.
- step S502 it is determined according to the unlocking instruction whether the current unlocker belongs to the first preset crowd; if it belongs to the first preset crowd, the process proceeds to step 503, otherwise the process ends.
- step S502 it is determined according to the unlocking instruction whether the current unlocker belongs to the first preset crowd; if it belongs to the first preset crowd, the process proceeds to step 503, otherwise the process ends.
- step S503 when the current unlocker belongs to the first preset crowd, the lock is released;
- step S504 the stored information and operation of the unlocker that does not belong to the first preset crowd are displayed; in step S505, the prompt information is output, prompting whether to cancel the operation; In step S506, the confirmation operation is cancelled.
- the embodiment of the present disclosure further provides an undo function, which can cancel the operation of the specific user to the local machine, and restore the system and the application to the previous state.
- an undo function can cancel the operation of the specific user to the local machine, and restore the system and the application to the previous state.
- the user is prompted to revoke the selection, and the owner agrees to execute the revocation, and restores the system and the application to the state before the operation.
- the owner's girlfriend is one of the specific users, and after unlocking the machine, it enters the corresponding limited usage mode.
- the owner installs a map application for the machine, deletes a weather forecast application, Changed the avatar setting of an instant messaging application; when the owner uses the machine again, he checks the girlfriend to perform the above operation, and selects "OK Undo" in the pop-up dialog box for revocation, the map application is deleted.
- the weather forecast application is restored, the avatar settings of the instant messaging application are restored, and the local settings are restored to the state before the girlfriend's operation.
- the original settings can be retracted with one key, or can be selectively undone one by one, and the operational traces of interest are retained.
- FIG. 6 is a flowchart of an unlock processing method according to another embodiment of the present disclosure, including the following steps:
- step S601 the input unlocking instruction is received, and the method in this embodiment is used in the terminal;
- step S602 it is determined whether the current unlocker belongs to the first preset crowd according to the unlocking instruction; if it does not belong to the first preset crowd, proceed to step 603, otherwise, the current process is ended, and the main page can be normally unlocked and displayed.
- step S603 when the current unlocker does not belong to the first preset crowd, the current unlocker information is obtained and stored;
- step S604 it is determined whether the current unlocker belongs to the second preset crowd according to the information of the current unlocker. If the second unlocker does not belong to the second preset crowd, the process proceeds to step 605. Otherwise, the process is terminated.
- step S605 when the current unlocker does not belong to the second preset crowd, the lock screen state is entered.
- embodiments of the present disclosure make a determination using the device tilt angle. Before receiving the input unlocking instruction, determining whether to display the screen unlocking interface according to the tilting angle of the plane of the terminal device with respect to the horizontal plane; when the tilting angle is greater than or equal to the preset threshold, the screen unlocking interface is displayed.
- FIG. 7 is a schematic diagram of a spatial placement angle relationship of a terminal device according to an embodiment of the present disclosure.
- Figure 7 is a side view.
- the terminal device 100 is a mobile phone, and the plane 200 of the axis is at an angle ⁇ to the horizontal plane 300, and the ⁇ is between 0° and 180°.
- the unlocker picks up the phone, the phone automatically detects the threshold.
- the threshold reaches the preset threshold (for example, 30°, 60 °, 90°, etc.)
- the unlock interface of the startup screen can receive the user input unlock command.
- the advantage of this setting is that the user only needs to change the orientation of the mobile phone to start the screen, does not require mechanical operation, is more convenient to use, and improves the user experience.
- the terminal device 100 can also be a tablet computer, an e-book or a wearable device, etc., and the threshold value is greater than or After the preset threshold is reached and the interval is maintained for a certain period of time, for example, the ⁇ is 90° for more than 5 seconds, the unlocking interface is started, so that the random placement of the mobile phone when the mobile phone is carried in daily causes the unlocking interface to be frequently activated.
- FIG. 8 is a flowchart of a screen unlocking process for a mobile phone having a face recognition function according to an embodiment of the present disclosure.
- the user picks up the phone and keeps it tilted for 5 seconds after reaching the threshold.
- the mobile phone detects whether its own tilt angle reaches a preset threshold (step 801). If the threshold is not reached, the mobile phone remains black (step 802). If the threshold is reached, the screen is illuminated to display an interface for entering a password.
- the input unlock command is received, and it is determined whether the received unlock command is correct (step 803). If the unlocking command is correct, the screen is unlocked, and the mobile phone can be used normally.
- step 804 If someone else has unlocked the mobile phone before, the previous unlocker photo information and operation information for the mobile phone are displayed (step 804), and the mobile phone will also display the operation record information. , Provide one-click undo options, etc. If the unlock command is incorrect, indicating that the user is an illegal user, the camera is activated to capture the unlocker face image (step 805). And using the face recognition technology to compare with the preset specific crowd photo (step 806), if the current unlocker is one of the specific users, unlock the screen and enter the limited use mode corresponding to the specific user (steps 807, 808 or 809), and record its operation information (steps 811, 812 or 813).
- three types of specific users are preset, which are a specific user 1, a specific user 2, and a specific user 3. After it is identified that it is a specific user one, steps 807 and 811 are continued. After being identified and determined to be a specific user two, steps 808 and 812 are continued. After it is identified that it is a specific user three, steps 809 and 813 are continued. If the current unlocker is not a specific user, indicating that it is a non-specific user, it is not authorized to use the phone and the phone returns to a black screen (step 810).
- FIG. 9 is a schematic structural diagram, including: a receiving module 1001, configured to receive an input unlocking instruction;
- the first judging module 1002 is configured to determine, according to the unlocking instruction, whether the current unlocker belongs to the first preset crowd.
- the information acquiring processing module 1003 is configured to obtain information about the current unlocker when the current unlocker does not belong to the first preset crowd. And store it.
- FIG. 10 is a schematic structural diagram, which is different from the embodiment of FIG. 9 in that the unlocking processing apparatus further includes a device startup module 1004 for When the unlocker does not belong to the first preset group, the information collecting device is started.
- the information collection device includes a camera, a microphone, a fingerprint input device, and the like, and can acquire face image information, voice information, fingerprint information, and the like of the current unlocker after startup.
- FIG. 11 is a schematic structural diagram, which is different from the embodiment of FIG. 9 in that the unlocking processing device further includes a second determining module 1005 and a second The processing module 1006 and the recording processing module 1007 are unlocked.
- the second determining module 1005 is configured to determine, according to information about the current unlocker, whether the current unlocker belongs to the second preset crowd;
- the second unlock processing module 1006 is configured to unlock the screen and enter the limited use mode when the current unlocker belongs to the second preset crowd;
- the record processing module 1007 is used to record the current unlocker's operation in the limited usage mode.
- the system and/or application of the terminal device only provides feedback for the preset operation in the limited usage mode, and the operations include operations such as starting, querying, modifying, adding, and deleting the system and/or application of the terminal device.
- FIG. 12 is a schematic structural diagram, which is different from the embodiment of FIG. 9 in that the unlock processing device further includes a first unlock processing module 1008 and a display. Processing module 1009.
- the first unlock processing module 1008 is configured to release the lock when the current unlocker belongs to the first preset crowd; the display processing module 1009 is configured to display information of the unlocker that does not belong to the first preset crowd.
- FIG. 13 is a schematic structural view, which is different from the embodiment of FIG. 11 in that the unlock processing device further includes a first unlock processing module 1008 and a display. Processing module 1009.
- the first unlock processing module 1008 is configured to release the lock when the current unlocker belongs to the first preset crowd; the display processing module 1009 is configured to display an unlocker that does not belong to the first preset crowd.
- FIG. 14 is a schematic structural diagram, which is different from the embodiment of FIG. 13 in that the unlock processing device further includes an information output module 1010 and an undo processing module. 1011.
- the information output module 1010 is configured to output prompt information, and prompt whether to cancel the operation
- the undo processing module 1011 is for revoking the operation when the acknowledgment feedback is obtained.
- Another embodiment of the present disclosure further provides an unlock processing device for a terminal, which is different from the embodiment of FIG. 9 in that the unlock processing device further includes a tilt angle determining module and an interface processing module.
- the tilt angle judging module is configured to determine whether to display a screen unlocking interface according to an inclination angle of a plane of the terminal device with respect to a horizontal plane, and display the screen unlocking interface when the tilting angle reaches a preset threshold; the interface starting module is configured to when the tilting angle is greater than or equal to the preset When the threshold is displayed, the screen unlock interface is displayed.
- the embodiment of the present disclosure can record the information of the illegal user for the owner to view, and the owner can know which person has used the machine when unlocking again, so that the owner can grasp the terminal unlocking history and remind the owner to eliminate the security risk.
- the present disclosure can conveniently realize multi-person use of one device, and grant different use rights to different people, the owner can know what operations the user has performed, and can pass one button. Restore the impact of user operations and simplify the maintenance of the terminal.
- another embodiment of the present disclosure further provides a terminal device.
- the terminal device may be used to implement the method for unlocking the terminal in the foregoing embodiment.
- the terminal can be a mobile phone, a tablet pad, a wearable mobile device (such as a smart watch), and the like.
- the terminal device 700 can include a communication unit 110, a memory 120 including one or more computer readable storage media, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a wireless communication unit 170, including one or more
- the core processor 180, and the power supply 190 and the like are processed. It will be understood by those skilled in the art that the terminal device structure shown in FIG. 5 does not constitute a limitation of the terminal device, and may include more or less components than those illustrated, or may be combined with some components, or different component arrangements. among them:
- the communication unit 110 can be used for transmitting and receiving information and receiving and transmitting signals during a call.
- the communication unit 110 can be a network communication device such as an RF (Radio Frequency) circuit, a router, a modem, or the like. Specifically, when the communication unit 110 is an RF circuit, the downlink information of the base station is received, and then processed by one or more processors 180; in addition, data related to the uplink is transmitted to the base station.
- RF circuits as communication units include, but are not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, and a LNA (Low Noise Amplifier, low) Noise amplifier), duplexer, etc.
- SIM Subscriber Identity Module
- the communication unit 110 can also communicate with the network and other devices through wireless communication.
- the wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access). , Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (Short Messaging Service), and the like.
- the memory 120 can be used to store software programs and modules, and the processor 180 executes various functional applications and data processing by running software programs and modules stored in the memory 120.
- the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the terminal device 700 (such as audio data, phone book, etc.) and the like.
- memory 120 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 120 may also include a memory controller to provide access to memory 120 by processor 180 and input unit 130.
- Input unit 130 can be used to receive input numeric or character information, as well as to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
- Input unit 130 can include touch-sensitive surface 131 as well as other input devices 132.
- Touch-sensitive surface 131 also referred to as a touch display or trackpad, can collect touch operations on or near the user (eg, the user uses a finger, stylus, etc., on any suitable object or accessory on touch-sensitive surface 131 or The operation near the touch-sensitive surface 131) and driving the corresponding connecting device according to a preset program.
- the touch-sensitive surface 131 may include two portions of a touch detection device and a touch controller.
- the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information
- the processor 180 is provided and can receive commands from the processor 180 and execute them.
- the touch-sensitive surface 131 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
- the input unit 130 can also include other input devices 132.
- Other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
- the display unit 140 can be used to display information input by the user or information provided to the user and various graphical user interfaces of the terminal device 700, which can be composed of graphics, text, icons, video, and any combination thereof.
- the display unit 140 may include a display panel 141.
- the display panel may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
- the touch-sensitive surface 131 may cover the display panel 141, and when the touch-sensitive surface 131 detects a touch operation thereon or nearby, it is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 according to the touch event The type provides a corresponding visual output on display panel 141.
- touch-sensitive surface 131 and display panel 141 are implemented as two separate components to implement input and input functions, in some embodiments, touch-sensitive surface 131 can be integrated with display panel 141 for input. And output function.
- Terminal device 700 can also include at least one type of sensor 150, such as a light sensor, motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 141 according to the brightness of the ambient light, and the proximity sensor may close the display panel 141 and/or when the terminal device 700 moves to the ear.
- Backlighting As a kind of motion sensor, the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- the terminal device 700 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, here No longer.
- the audio circuit 160, the speaker 161, and the microphone 162 provide an audio interface between the user and the terminal device 700.
- the audio circuit 160 can transmit the converted electrical data of the received audio data to the speaker 161 for conversion to the sound signal output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electrical signal by the audio circuit 160. After receiving, it is converted into audio data, and then processed by the audio data output processor 180, transmitted to the terminal device, for example, by the RF circuit 110, or outputted to the memory 120 for further processing.
- the audio circuit 160 may also include an earbud jack to provide communication of the peripheral earphones with the terminal device 700.
- the terminal device may be configured with a wireless communication unit 170, which may be a WiFi (Wireless Fidelity) module.
- WiFi is a short-range wireless transmission technology, and the terminal device 700 can help users to send and receive emails, browse web pages, and access streaming media through the wireless communication unit 170, which provides users with wireless broadband Internet access.
- FIG. 5 shows the wireless communication unit 170, it can be understood that it does not belong to the essential configuration of the terminal device 700, and may be omitted as needed within the scope of not changing the essence of the disclosure.
- the processor 180 is the control center of the terminal device 700, which connects various portions of the entire handset using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 120, and recalling data stored in the memory 120.
- the various functions and processing data of the terminal device 700 are executed to perform overall monitoring of the mobile phone.
- the processor 180 may include one or more processing cores; the processor 180 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, etc., and a modulation solution
- the processor mainly handles wireless communication. It will be appreciated that the above described modem processor may also not be integrated into the processor 180.
- the terminal device 700 also includes a power source 190 (such as a battery) that supplies power to the various components.
- the power source can be logically coupled to the processor 180 through the power management system to manage functions such as charging, discharging, and power management through the power management system.
- Power supply 190 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
- the terminal is set
- the standby device 700 can also include a camera, a Bluetooth module, and the like, and details are not described herein again.
- the terminal device includes a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to execute one or more programs by one or more processors Instructions for doing the following:
- the information of the current unlocker is obtained and stored.
- the memory further includes an instruction to: when the current unlocker does not belong to the first preset crowd, start the information collecting device; the information collecting device collects information of the current unlocker, wherein the current unlocker information includes the current unlocker Face image information, voice information or fingerprint information.
- the memory further includes an instruction to: when the current unlocker does not belong to the first preset crowd, obtain the information of the current unlocker and store the information, and determine, according to the information of the current unlocker, whether the current unlocker belongs to the second pre- Set up a crowd;
- the system and/or application of the terminal device only provides feedback for the preset operation, including the initiation, query, modification, addition and/or deletion of the system and/or application of the terminal device.
- the memory further includes instructions to: unlock when the current unlocker belongs to the first preset crowd; display information and/or operations of the stored unlocker that does not belong to the first preset crowd.
- the memory further includes an instruction to: after displaying the stored operation of the unlocker not belonging to the first preset crowd, outputting a prompt message prompting whether to cancel the operation; and canceling the operation after obtaining the confirmation.
- the memory further includes an instruction to: when the current unlocker does not belong to the first preset crowd, obtain the information of the current unlocker and store the information, and determine, according to the information of the current unlocker, whether the current unlocker belongs to the second pre- Set up a crowd;
- the memory further includes an instruction to: determine whether to display a screen unlocking interface according to an inclination angle of a plane of the axis of the terminal device with respect to a horizontal plane before receiving the input unlocking instruction; when the tilting angle is greater than or equal to a preset threshold , the screen unlock interface is displayed.
- the embodiment of the present disclosure can record the information of the illegal user for the owner to view, and the owner can know which person has used the machine when unlocking again, so that the owner can grasp the terminal unlocking history and remind the owner to eliminate the security risk.
- the present disclosure can conveniently realize multi-person use of one device, and grant different use rights to different people, the owner can know what operations the user has performed, and can pass one button. Restore the impact of user operations and simplify the maintenance of the terminal.
- embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may employ an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. The form of the case. Moreover, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MX2014008738A MX348966B (es) | 2013-09-26 | 2014-05-09 | Metodo, aparato y dispositivo de proceso de desbloqueo para terminal. |
JP2015538285A JP6060267B2 (ja) | 2013-09-26 | 2014-05-09 | 端末のロック解除処理方法、装置、端末装置、プログラム、及び記録媒体 |
RU2015125464A RU2618932C2 (ru) | 2013-09-26 | 2014-05-09 | Способ, установка и устройство процесса разблокировки для терминала |
KR20147021458A KR20150046766A (ko) | 2013-09-26 | 2014-05-09 | 단말기의 잠금 해제 처리방법, 장치, 단말기 장치, 프로그램 및 기록매체 |
BR112014017739-2A BR112014017739B1 (pt) | 2013-09-26 | 2014-05-09 | Método, aparelho e dispositivo de processo de destravamento para um terminal |
US14/457,394 US9940448B2 (en) | 2013-09-26 | 2014-08-12 | Unlock processing method and device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310446823.2A CN103488924B (zh) | 2013-09-26 | 2013-09-26 | 一种终端的解锁处理方法、装置及设备 |
CN201310446823.2 | 2013-09-26 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/457,394 Continuation US9940448B2 (en) | 2013-09-26 | 2014-08-12 | Unlock processing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015043193A1 true WO2015043193A1 (zh) | 2015-04-02 |
Family
ID=49829139
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/077106 WO2015043193A1 (zh) | 2013-09-26 | 2014-05-09 | 一种终端的解锁处理方法、装置及设备 |
Country Status (8)
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105045083A (zh) * | 2015-08-26 | 2015-11-11 | 广东欧珀移动通信有限公司 | 一种智能手表的控制方法及智能手表 |
CN105353657A (zh) * | 2015-11-09 | 2016-02-24 | 珠海格力电器股份有限公司 | 配送柜及其控制方法 |
CN106506812A (zh) * | 2016-10-13 | 2017-03-15 | 深圳缪斯智能珠宝有限公司 | 一种解锁移动终端的方法及移动终端 |
CN111125663A (zh) * | 2019-11-27 | 2020-05-08 | 宇龙计算机通信科技(深圳)有限公司 | 儿童模式的控制方法、装置、存储介质及终端 |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9940448B2 (en) | 2013-09-26 | 2018-04-10 | Xiaomi Inc. | Unlock processing method and device |
CN103488924B (zh) * | 2013-09-26 | 2017-03-08 | 小米科技有限责任公司 | 一种终端的解锁处理方法、装置及设备 |
CN104809372B (zh) * | 2014-01-24 | 2018-10-16 | 北京奇虎科技有限公司 | 判断头戴式智能设备鉴权信息有效性的装置和方法 |
CN104395907A (zh) * | 2014-03-05 | 2015-03-04 | 华为终端有限公司 | 电子设备的启动方法和电子设备 |
CN103823632B (zh) * | 2014-03-18 | 2018-02-13 | 福州瑞芯微电子股份有限公司 | 一种屏幕解锁方法及其终端 |
CN104980532A (zh) * | 2014-04-10 | 2015-10-14 | 金刚刚 | 学生手表手机 |
CN104023133B (zh) * | 2014-05-23 | 2017-05-24 | 北京金山安全软件有限公司 | 移动终端的防盗方法及装置 |
CN104063248B (zh) * | 2014-06-27 | 2018-01-16 | 上海摩软通讯技术有限公司 | 智能手表及其应用程序的启动方法 |
CN105450841A (zh) * | 2014-09-25 | 2016-03-30 | 小米科技有限责任公司 | 终端防盗的方法及装置 |
CN104331651A (zh) * | 2014-10-08 | 2015-02-04 | 无锡指网生物识别科技有限公司 | 基于指纹和语音识别的控制系统及设备 |
CN104573479B (zh) * | 2014-12-18 | 2018-07-06 | 百度在线网络技术(北京)有限公司 | 一种用户设备的使用控制方法及装置 |
CN105808115A (zh) * | 2014-12-31 | 2016-07-27 | 中兴通讯股份有限公司 | 一种终端的屏幕控制方法和系统及终端 |
CN113792278A (zh) | 2015-02-15 | 2021-12-14 | 华为技术有限公司 | 一种显示应用、图片的方法、装置及电子设备 |
CN104751218B (zh) * | 2015-04-13 | 2018-01-23 | 京东方科技集团股份有限公司 | 一种电子证件及其显示方法 |
CN106156559A (zh) * | 2015-04-22 | 2016-11-23 | 中兴通讯股份有限公司 | 一种终端解锁方法及装置 |
CN104765552B (zh) | 2015-04-28 | 2019-04-19 | 小米科技有限责任公司 | 权限管理方法和装置 |
WO2017000251A1 (zh) * | 2015-06-30 | 2017-01-05 | 华为技术有限公司 | 一种指纹解锁屏幕的方法和终端 |
CN105095716A (zh) * | 2015-07-01 | 2015-11-25 | 小米科技有限责任公司 | 一种终端检测方法及装置 |
CN105138880B (zh) * | 2015-07-31 | 2018-08-14 | 努比亚技术有限公司 | 终端操作数据的处理装置及方法 |
CN106469260A (zh) * | 2015-08-20 | 2017-03-01 | 中兴通讯股份有限公司 | 一种访问移动终端的方法及装置 |
CN105205383A (zh) * | 2015-08-25 | 2015-12-30 | 努比亚技术有限公司 | 屏幕解锁装置及方法 |
CN105279402B (zh) * | 2015-09-25 | 2019-03-15 | Oppo广东移动通信有限公司 | 一种基于放置角度的解锁方法及移动终端 |
CN105404803B (zh) * | 2015-10-30 | 2018-12-11 | 北京视觉世界科技有限公司 | 用于终端设备的操作响应装置及操作响应方法 |
CN105574378A (zh) * | 2015-12-09 | 2016-05-11 | 小米科技有限责任公司 | 终端控制方法及终端控制装置 |
CN105631250A (zh) * | 2015-12-18 | 2016-06-01 | 北京奇虎科技有限公司 | 获取非法访问应用程序的用户的图像信息的方法及装置 |
CN106909295B (zh) * | 2015-12-23 | 2020-05-15 | 北京奇虎科技有限公司 | 应用程序的处理方法和终端 |
CN106127077B (zh) * | 2016-06-30 | 2019-04-23 | 成都中科创达软件有限公司 | 一种保护用户隐私信息的方法及终端 |
CN106303017A (zh) * | 2016-08-11 | 2017-01-04 | 北京小米移动软件有限公司 | 报警处理方法及装置 |
CN106407779A (zh) * | 2016-09-05 | 2017-02-15 | 广东欧珀移动通信有限公司 | 一种信息获取方法、装置和终端 |
CN106682524A (zh) * | 2016-11-23 | 2017-05-17 | 张伟彬 | 移动终端的数据隐私保护方法 |
CN106940620A (zh) * | 2017-03-22 | 2017-07-11 | 广东小天才科技有限公司 | 控制移动终端的方法及移动终端 |
CN107483723A (zh) * | 2017-07-31 | 2017-12-15 | 广东欧珀移动通信有限公司 | 移动终端及其操作过程记录方法、计算机可读存储介质 |
CN109501718B (zh) * | 2017-09-15 | 2020-12-25 | 比亚迪股份有限公司 | 车辆解锁控制方法、装置、系统和智能终端 |
CN109841140B (zh) * | 2017-11-28 | 2021-04-27 | 合肥欣奕华智能机器有限公司 | 示教器及其操作方法、计算装置和计算机可读介质 |
TWI652597B (zh) * | 2017-12-05 | 2019-03-01 | 緯創資通股份有限公司 | 電子裝置及其解鎖方法 |
CN108154014B (zh) * | 2017-12-22 | 2020-06-02 | Oppo广东移动通信有限公司 | 电子设备解锁方法、装置、存储介质及电子设备 |
CN108052818B (zh) * | 2017-12-28 | 2020-11-13 | Oppo广东移动通信有限公司 | 应用启动方法、装置、存储介质及电子设备 |
CN108540654A (zh) * | 2018-03-22 | 2018-09-14 | 维沃移动通信有限公司 | 一种移动终端的操作方法及移动终端 |
CN110164012A (zh) * | 2019-05-31 | 2019-08-23 | 广州软盈科技有限公司 | 一种社区门禁管理系统及其工作方法 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075627A (zh) * | 2011-01-12 | 2011-05-25 | 宇龙计算机通信科技(深圳)有限公司 | 一种信息提示方法及移动终端 |
CN102457619A (zh) * | 2011-12-30 | 2012-05-16 | 广东欧珀移动通信有限公司 | 一种手机权限密码的设置方法 |
CN102932540A (zh) * | 2012-10-24 | 2013-02-13 | 广东欧珀移动通信有限公司 | 一种移动终端及其防盗方法 |
CN103051799A (zh) * | 2012-12-24 | 2013-04-17 | 联信摩贝软件(北京)有限公司 | 一种基于解锁密码错误触发的拍照方法和装置 |
CN103108082A (zh) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | 智能手机多用户模式权限管理方法及权限管理系统 |
CN103488924A (zh) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | 一种终端的解锁处理方法、装置及设备 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3654240B2 (ja) * | 2001-11-30 | 2005-06-02 | 日本電気株式会社 | 無線携帯端末装置及び無線携帯端末装置におけるセキュリティのチェック方法 |
US7774742B2 (en) * | 2003-11-04 | 2010-08-10 | Realization Technologies, Inc. | Facilitation of multi-project management using task hierarchy |
JP2005229151A (ja) * | 2004-02-10 | 2005-08-25 | Murata Mach Ltd | 通信端末装置 |
US20050272410A1 (en) * | 2004-06-03 | 2005-12-08 | Inventec Corporation | Monitoring system for use status of computer apparatus |
JP2006060685A (ja) * | 2004-08-23 | 2006-03-02 | Yasutomo Karasawa | 携帯情報端末、携帯情報端末の制御方法、携帯情報端末の制御プログラム、及び記録媒体 |
US7724926B2 (en) * | 2004-09-15 | 2010-05-25 | Iannone Mary A | Foster care monitoring and verification device, method and system |
ES2304152T3 (es) * | 2004-10-06 | 2008-09-16 | Nokia Corporation | Control de acceso a un terminal de datos. |
JP4284309B2 (ja) * | 2005-08-31 | 2009-06-24 | ソフトバンクモバイル株式会社 | 緊急動作実行方法及び電子機器 |
JP2007195063A (ja) * | 2006-01-20 | 2007-08-02 | Sharp Corp | 携帯端末装置 |
JP2007299236A (ja) * | 2006-04-28 | 2007-11-15 | Toshiba Corp | 情報処理装置および認証方法 |
US8063889B2 (en) * | 2007-04-25 | 2011-11-22 | Honeywell International Inc. | Biometric data collection system |
JP2009129419A (ja) * | 2007-11-28 | 2009-06-11 | Kyocera Corp | 電子機器及び認証方法 |
JP2010086281A (ja) * | 2008-09-30 | 2010-04-15 | Toshiba Corp | 携帯端末 |
US8406736B2 (en) * | 2008-12-30 | 2013-03-26 | Symbol Technologies, Inc. | System and method for identifying and locating wireless devices that are being operated by unauthorized users |
JP5606705B2 (ja) * | 2009-08-27 | 2014-10-15 | 京セラ株式会社 | 携帯端末装置 |
CN101794188A (zh) * | 2009-12-17 | 2010-08-04 | 宇龙计算机通信科技(深圳)有限公司 | 一种屏幕加解锁控制方法、系统及移动终端 |
US9703365B2 (en) * | 2012-03-02 | 2017-07-11 | Nec Corporation | Device capable of presenting startup UI, method of presenting the same, and non-transitory computer readable medium storing presentation program |
US20140007223A1 (en) * | 2012-06-29 | 2014-01-02 | Apple Inc. | Biometric Capture for Unauthorized User Identification |
-
2013
- 2013-09-26 CN CN201310446823.2A patent/CN103488924B/zh active Active
-
2014
- 2014-05-09 MX MX2014008738A patent/MX348966B/es active IP Right Grant
- 2014-05-09 KR KR20147021458A patent/KR20150046766A/ko active Search and Examination
- 2014-05-09 JP JP2015538285A patent/JP6060267B2/ja active Active
- 2014-05-09 BR BR112014017739-2A patent/BR112014017739B1/pt active IP Right Grant
- 2014-05-09 WO PCT/CN2014/077106 patent/WO2015043193A1/zh active Application Filing
- 2014-05-09 RU RU2015125464A patent/RU2618932C2/ru active
- 2014-09-15 EP EP14184841.6A patent/EP2854071B1/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102075627A (zh) * | 2011-01-12 | 2011-05-25 | 宇龙计算机通信科技(深圳)有限公司 | 一种信息提示方法及移动终端 |
CN102457619A (zh) * | 2011-12-30 | 2012-05-16 | 广东欧珀移动通信有限公司 | 一种手机权限密码的设置方法 |
CN102932540A (zh) * | 2012-10-24 | 2013-02-13 | 广东欧珀移动通信有限公司 | 一种移动终端及其防盗方法 |
CN103051799A (zh) * | 2012-12-24 | 2013-04-17 | 联信摩贝软件(北京)有限公司 | 一种基于解锁密码错误触发的拍照方法和装置 |
CN103108082A (zh) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | 智能手机多用户模式权限管理方法及权限管理系统 |
CN103488924A (zh) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | 一种终端的解锁处理方法、装置及设备 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105045083A (zh) * | 2015-08-26 | 2015-11-11 | 广东欧珀移动通信有限公司 | 一种智能手表的控制方法及智能手表 |
CN105353657A (zh) * | 2015-11-09 | 2016-02-24 | 珠海格力电器股份有限公司 | 配送柜及其控制方法 |
CN105353657B (zh) * | 2015-11-09 | 2018-01-23 | 珠海格力电器股份有限公司 | 配送柜及其控制方法 |
CN106506812A (zh) * | 2016-10-13 | 2017-03-15 | 深圳缪斯智能珠宝有限公司 | 一种解锁移动终端的方法及移动终端 |
CN111125663A (zh) * | 2019-11-27 | 2020-05-08 | 宇龙计算机通信科技(深圳)有限公司 | 儿童模式的控制方法、装置、存储介质及终端 |
Also Published As
Publication number | Publication date |
---|---|
MX348966B (es) | 2017-07-04 |
JP6060267B2 (ja) | 2017-01-11 |
CN103488924A (zh) | 2014-01-01 |
RU2618932C2 (ru) | 2017-05-11 |
MX2014008738A (es) | 2015-05-28 |
EP2854071B1 (en) | 2018-02-28 |
EP2854071A2 (en) | 2015-04-01 |
BR112014017739B1 (pt) | 2020-12-15 |
BR112014017739A8 (pt) | 2017-07-11 |
EP2854071A3 (en) | 2015-07-01 |
BR112014017739A2 (US06229276-20010508-P00077.png) | 2017-06-20 |
JP2015534405A (ja) | 2015-11-26 |
CN103488924B (zh) | 2017-03-08 |
RU2015125464A (ru) | 2017-01-10 |
KR20150046766A (ko) | 2015-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015043193A1 (zh) | 一种终端的解锁处理方法、装置及设备 | |
US11269981B2 (en) | Information displaying method for terminal device and terminal device | |
CN112600977B (zh) | 快速打开应用或应用功能的方法及终端 | |
US10545660B2 (en) | Multi touch combination for viewing sensitive information | |
CN103389863B (zh) | 一种显示控制方法和装置 | |
WO2019157804A1 (zh) | 指纹解锁方法及装置 | |
CN106778175B (zh) | 一种界面锁定方法、装置和终端设备 | |
WO2019105227A1 (zh) | 应用图标的显示方法、终端及计算机可读存储介质 | |
CN107707461A (zh) | 一种会话消息的显示方法及移动终端 | |
WO2020011074A1 (zh) | 锁屏方法及电子设备 | |
US9940448B2 (en) | Unlock processing method and device | |
WO2015043194A1 (zh) | 虚拟键盘显示方法、装置及终端 | |
CN109284150A (zh) | 一种启动应用程序的方法及终端 | |
CN108108111B (zh) | 一种锁屏图片信息的查看方法、装置及移动终端 | |
CN108710806B (zh) | 一种终端解锁方法、移动终端 | |
WO2020011071A1 (zh) | 应用程序加锁方法、解锁方法及终端设备 | |
CN108573141B (zh) | 信息访问方法及装置 | |
CN109284160A (zh) | 一种应用界面显示方法、移动终端 | |
CN108959963A (zh) | 一种应用程序的管理方法及终端设备 | |
WO2020207322A1 (zh) | 屏幕解锁方法及终端 | |
WO2018232652A1 (zh) | 具有高隐私等级的移动终端和相关产品 | |
CN107818247B (zh) | 一种移动终端解锁方法和移动终端 | |
WO2019061248A1 (zh) | 虚拟按键操作方法、终端、存储介质及计算机程序 | |
CN109711138B (zh) | 一种图片处理方法及移动终端 | |
EP2799969B1 (en) | Multi touch combination for viewing sensitive information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2014/008738 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 20147021458 Country of ref document: KR Kind code of ref document: A Ref document number: 2015538285 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14847634 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112014017739 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2015125464 Country of ref document: RU Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14847634 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 112014017739 Country of ref document: BR Kind code of ref document: A2 Effective date: 20140718 |