WO2016188230A1 - 一种解锁方法及装置 - Google Patents

一种解锁方法及装置 Download PDF

Info

Publication number
WO2016188230A1
WO2016188230A1 PCT/CN2016/078485 CN2016078485W WO2016188230A1 WO 2016188230 A1 WO2016188230 A1 WO 2016188230A1 CN 2016078485 W CN2016078485 W CN 2016078485W WO 2016188230 A1 WO2016188230 A1 WO 2016188230A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
instruction
user
application
standard data
Prior art date
Application number
PCT/CN2016/078485
Other languages
English (en)
French (fr)
Inventor
钱艳
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016188230A1 publication Critical patent/WO2016188230A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present application relates to, but is not limited to, the field of communications, and in particular, to an unlocking method and apparatus.
  • the unlocking method in the related art can ensure the security of the mobile phone to a certain extent, but when someone knows the unlocking pattern, the personal information in the mobile phone may leak, and an effective solution has not been proposed for this problem.
  • the embodiment of the invention provides an unlocking method and device, which can ensure that the user's private information is not leaked when the user uses the terminal, thereby improving the security of the terminal.
  • an unlocking method including:
  • unlocking instruction and the preset instruction match, determining whether the user biometric instruction matches the pre-stored standard data
  • the method further includes: if the user biometric instruction and the pre-stored standard data do not match, performing partial unlocking, wherein the preset related application is closed.
  • the pre-stored standard data is set to a multi-level mode
  • the highest authority is given, and the application that can be opened with the second highest authority can be set and unlocked comprehensively;
  • the second highest authority is given, and the partial unlocking is performed, wherein the application that the second highest authority of the highest authority setting can be opened may be opened.
  • the method further includes: if the unlocking instruction and the preset instruction do not match, the unlocking cannot be performed.
  • the user biometric instruction comprises at least one of the following:
  • the related application is an application that includes user privacy information, including at least one of the following: a payment application, a chat application, and an image application.
  • an unlocking apparatus including:
  • the acquisition module is configured to: receive an unlock instruction, and simultaneously collect a user biometric instruction;
  • the first determining module is configured to: determine whether the unlocking instruction matches the preset instruction
  • the second determining module is configured to: if the unlocking instruction and the preset instruction match, determine whether the user biometric instruction matches the pre-stored standard data;
  • the full unlocking module is configured to: if the user biometric instruction matches the pre-stored standard data, perform full unlocking.
  • the device further includes a partial unlocking module, configured to: if the user biometric instruction and the pre-stored standard data do not match, perform partial unlocking, wherein the preset related application is closed.
  • a partial unlocking module configured to: if the user biometric instruction and the pre-stored standard data do not match, perform partial unlocking, wherein the preset related application is closed.
  • the device further includes a level setting module, configured to:
  • the highest authority is given, wherein the highest authority may set an application that the second highest authority can open;
  • the second highest authority is given, wherein the application of the next highest authority that can be opened by the highest authority setting can be opened.
  • the device further includes an unlocking failure module, configured to: if the unlocking instruction and the preset instruction do not match, the unlocking cannot be performed.
  • an unlocking failure module configured to: if the unlocking instruction and the preset instruction do not match, the unlocking cannot be performed.
  • the user biometric instruction comprises at least one of the following:
  • the related application is an application that includes user privacy information, including at least one of the following: a payment application, a chat application, and an image application.
  • an embodiment of the present invention further provides a computer readable storage medium storing computer executable instructions that are implemented when executed by a processor.
  • the unlocking method and device can ensure that the user's private information is not leaked when the user uses the terminal, thereby improving the security of the terminal.
  • Embodiment 1 is a flowchart of Embodiment 1 of an unlocking method according to an embodiment of the present invention
  • FIG. 3 is a flowchart of Embodiment 2 of an unlocking method according to an embodiment of the present invention.
  • Embodiment 4 is a flowchart of Embodiment 3 of an unlocking method according to an embodiment of the present invention.
  • FIG. 5 is a block diagram of an unlocking device in accordance with an embodiment of the present invention.
  • FIG. 1 is a flow chart of an unlocking method in accordance with an embodiment of the present invention. As shown in Figure 1, the method includes the following steps:
  • Step S102 receiving an unlocking instruction, and simultaneously acquiring a user biometric instruction
  • the unlocking instruction is a pattern unlocking instruction
  • the user lights up the screen, and is unlocked by a pattern
  • the terminal simultaneously collects a biometric instruction of the user, where the instruction includes the user's fingerprint information, avatar information, or iris information.
  • Step S104 determining whether the unlocking instruction matches the preset instruction
  • the step is to determine whether the unlocking instruction matches the preset pattern unlocking instruction.
  • Step S106 If the unlocking instruction and the preset instruction match, it is determined whether the user biometric instruction matches the pre-stored standard data.
  • the pre-stored standard data is set to a multi-level mode
  • the highest authority is given, and the application that can be opened with the second highest authority can be set and unlocked comprehensively;
  • the second highest authority is given, and the partial unlocking is performed, wherein the application that the second highest authority of the highest authority setting can be opened may be opened.
  • Step S108 If the user biometric instruction matches the pre-stored standard data, the full unlocking is performed.
  • full unlocking means that the terminal is completely open to the user, and the user can use any application.
  • FIG. 2 is a flow chart of an unlocking method according to a first embodiment of the present invention. As shown in FIG. 2, the method of this embodiment includes the following steps:
  • Step S20 The mobile phone in the lock screen state has been set to unlock the pattern
  • Step S21 the screen of the mobile phone is illuminated, ready to start the unlocking operation
  • Step S22 When the screen sensor senses the fingerprint contact, it is determined that the user starts unlocking. At this point, the fingerprint collector starts to collect fingerprints, and the fingerprint is fully scanned during the whole process of sliding the finger on the touch screen, and the current fingerprint information is recorded.
  • Step S23 comparing the current fingerprint information collected in step S22 with the pre-stored standard fingerprint information, and the comparison result has two types of matching and non-matching.
  • Step S24 detecting whether the pattern password is unlocked correctly. Step S24 is performed in synchronization with steps S22 and S23 above, and the detection result of step S24 is correct and incorrect.
  • step S24 is not normally unlocked regardless of whether the result of step S23 is a match or a mismatch;
  • step S24 is unlocked correctly.
  • the result of step S23 is that the fingerprint information is matched, and the unlocking is successful, the mobile phone can be used normally, and the state of each application is also normal;
  • step S24 The pattern of step S24 is unlocked correctly.
  • the result of step S23 is that the fingerprint information does not match, and the mobile phone will close all preset privacy-related applications at the moment of unlocking. If the user opens these applications, the user needs to log in again. For example, QQ, WeChat, Alipay, etc., users can set which applications involve privacy and need to be closed.
  • the standard fingerprint information in step S23 is set to two levels, and when the user fingerprint matches the first level fingerprint, the user is given the highest authority, all applications in the mobile phone are normal, and the time can be set. Use rights for high-privileged users.
  • the user fingerprint matches the second-level fingerprint the user is given the second highest permission, and at which time, the application is normally restricted by the setting of the highest-privileged user.
  • the lowest level of authority is given.
  • FIG. 3 is a flow chart of an unlocking method according to a second embodiment of the present invention. As shown in FIG. 3, the method of this embodiment includes the following steps:
  • Step S30 The mobile phone in the lock screen state has been set to unlock the pattern
  • Step S31 the screen of the mobile phone is illuminated, and the unlocking operation is ready to start;
  • Step S32 When the screen sensor senses the fingerprint contact, it is determined that the user starts unlocking. At this point, the mobile phone starts the front camera in the background, takes photos of the user's face and transmits the data to the face recognition system.
  • Step S33 The face recognition system analyzes and processes the user face data obtained in step S31, acquires facial feature information, and compares with the standard face module pre-stored in the system, and the comparison result has two types of matching and non-matching.
  • Step S34 It is detected whether the pattern password is unlocked correctly. Step S34 is performed in synchronization with S32 and S33 above, and the result of step S34 is correct and incorrect.
  • step S34 is not normally unlocked regardless of whether the result of step S33 is a match or a mismatch;
  • step S34 is unlocked correctly.
  • the result of step S33 is that the user's facial data is matched, and the user is successfully unlocked, the mobile phone can be used normally, and the status of each application is also normal;
  • step S34 The pattern of step S34 is unlocked correctly, and the result of step S33 is that the user's face data does not match.
  • the phone will close all preset privacy-related apps at the moment of unlocking, and users will need to log in again if they open these apps. For example, QQ, WeChat, Alipay, etc., users can set which applications involve privacy and need to be closed.
  • FIG. 4 is a flow chart of an unlocking method according to a third embodiment of the present invention. As shown in FIG. 4, the method of this embodiment includes the following steps:
  • Step S40 The mobile phone in the lock screen state has been set to unlock the pattern
  • Step S41 the screen of the mobile phone is illuminated, ready to start the unlocking operation
  • Step S42 When the screen sensor senses the fingerprint contact, it is determined that the user starts unlocking. At this point, the mobile phone starts the front camera in the background, focusing on the entire eye of the user, and transmits the captured image to the iris recognition system.
  • Step S43 The iris recognition system analyzes the user's eye data obtained in step S42, extracts the feature, and compares it with the standard iris data pre-stored in the system, and the comparison result has two types of matching and non-matching.
  • Step S44 detecting whether the pattern password is unlocked correctly. Step S44 is performed in synchronization with steps S42 and S43 above, and the result of step S44 is correct and incorrect.
  • step S44 is not normally unlocked regardless of whether the result of step S43 is a match or a mismatch;
  • step S44 is unlocked correctly.
  • the result of step S43 is that the user iris data is matched, the unlocking is successful, the mobile phone can be used normally, and the state of each application is also normal;
  • step S44 is unlocked correctly.
  • the result of step S43 is that the user's iris data does not match, and the mobile phone will close all preset privacy-related applications at the moment of unlocking. If the user opens these applications, the user needs to log in again. For example, QQ, WeChat, Alipay, etc., users can set which applications involve privacy and need to be closed.
  • a structure diagram of the unlocking device is also provided, which is used to implement the above-mentioned embodiment.
  • the descriptions of the modules involved in the system will be described below.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the embodiments is preferably implemented in software, but hardware, or a combination of software and hardware, is also possible and contemplated.
  • Fig. 5 is a structural diagram of an unlocking device according to an embodiment of the present invention. As shown in Figure 5, the device includes:
  • the acquiring module 50 is configured to: receive an unlocking instruction, and collect a user biometric instruction, wherein the user biometric instruction comprises at least one of the following: user fingerprint information, user avatar information, and user iris information;
  • the first determining module 51 is configured to: determine whether the unlocking instruction matches the preset instruction;
  • the second determining module 52 is configured to: if the unlocking instruction and the preset instruction match, determine whether the user biometric instruction matches the pre-stored standard data;
  • the full unlocking module 53 is configured to perform full unlocking if the user biometric instruction matches the pre-stored standard data.
  • the device may further include a partial unlocking module, configured to: if the user biometric instruction and the pre-stored standard data do not match, perform partial unlocking, wherein the preset related application is closed, and the application is to include user privacy information.
  • Applications include, for example, payment applications, chat applications, image applications, and the like.
  • the device may also include a level setting module configured to:
  • the highest authority is given, wherein the highest authority may set an application that the second highest authority can open;
  • the second highest authority is given. Partially unlocking for the next highest privilege, and the application of the highest privilege setting of the highest privilege setting can be opened.
  • the device may further include an unlocking failure module, configured to: if the unlocking command and the preset command do not match, the unlocking cannot be performed.
  • an embodiment of the present invention further provides a computer readable storage medium storing computer executable instructions that are implemented when executed by a processor.
  • modules or steps of the present application can be implemented by a general computing device, which can be concentrated on a single computing device or distributed in a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the application is not limited to any particular combination of hardware and software.
  • the embodiment of the invention provides an unlocking method and device, which can ensure that the user's private information is not leaked when the user uses the terminal, thereby improving the security of the terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

一种解锁方法,包括:接收解锁指令,同时采集用户生物特征指令;判断所述解锁指令是否和预置指令相匹配;若所述解锁指令和预置指令相匹配,则判断所述用户生物特征指令是否和预存标准数据相匹配;若所述用户生物特征指令和预存标准数据相匹配,则进行全面解锁。上述方法能够确保用户使用终端时,用户的隐私信息不被泄露,从而提高终端使用的安全性。

Description

一种解锁方法及装置 技术领域
本申请涉及但不限于通信领域,具体而言,涉及一种解锁方法及装置。
背景技术
使用智能终端时,即使大多数用户都会以图案或数字密码的方式设置锁屏密码以保证安全,但是我们仍不能排除一些情况,比如:1、必要时会临时把手机借给他人使用,或是知道密码的人随时拿起手机使用,这时手机中的所有个人隐私都会处于不安全状态,而不给他人密码有时又不符合人之常情;2、极端情况下,比如手机丢失,又被破译了锁屏密码,这时手机中不但私密信息,甚至一些支付、交易软件都会有被盗用的危险,会给机主造成大量的经济损失。
因而,我们需要一种既能照顾到人情,能在必要时把手机给有密码的外人使用,又能保证手机在非机主本人使用时私密信息不会泄漏、支付终端不被盗用的技术。
相关技术中的解锁方法可在一定程度上保证手机的安全性,但是当有他人知道解锁图案时,手机中的个人信息就有可能会泄漏,针对此问题,目前尚未提出有效的解决方案。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提出一种解锁方法及装置,能够确保用户使用终端时,用户的隐私信息不被泄露,提高了终端使用的安全性。
根据本发明实施例的一个方面,提供了一种解锁方法,包括:
接收解锁指令,同时采集用户生物特征指令;
判断所述解锁指令是否和预置指令相匹配;
若所述解锁指令和预置指令相匹配,则判断所述用户生物特征指令是否和预存标准数据相匹配;
若所述用户生物特征指令和预存标准数据相匹配,则进行全面解锁。
可选地,所述方法还包括:若所述用户生物特征指令和预存标准数据不匹配,则进行部分解锁,其中,预设的相关应用会被关闭。
可选地,
所述预存标准数据设置为多等级模式;
若所述用户生物特征指令与第一等级预存标准数据相匹配,则给予最高权限,可以设置次高权限可以打开的应用,并全面解锁;
若所述用户生物特征指令与第二等级预存标准数据相匹配,则给予次高权限,进行部分解锁,其中,所述最高权限设置的所述次高权限可以打开的应用可以打开。
可选地,所述方法还包括:若所述解锁指令和预置指令不匹配,则不能进行解锁。
可选地,所述用户生物特征指令包括以下至少之一:
用户指纹信息;
用户头像信息;
用户虹膜信息。
可选地,所述相关应用为包含用户隐私信息的应用,包括以下至少之一:支付应用、聊天应用、图像应用。
根据本发明实施例的另一方面,还提供了一种解锁装置,包括:
采集模块,设置为:接收解锁指令,同时采集用户生物特征指令;
第一判断模块,设置为:判断所述解锁指令是否和预置指令相匹配;
第二判断模块,设置为:若所述解锁指令和预置指令相匹配,则判断所述用户生物特征指令是否和预存标准数据相匹配;
全面解锁模块,设置为:若所述用户生物特征指令和预存标准数据相匹配,则进行全面解锁。
可选地,该装置还包括部分解锁模块,设置为:若所述用户生物特征指令和预存标准数据不匹配,则进行部分解锁,其中,预设的相关应用会被关闭。
可选地,该装置还包括等级设置模块,设置为:
把所述预存标准数据设置为多等级模式;
若所述用户生物特征指令与第一等级预存标准数据相匹配,则给予最高权限,其中,所述最高权限可以设置次高权限可以打开的应用;
若所述用户生物特征指令与第二等级预存标准数据相匹配,则给予次高权限,其中,所述最高权限设置的所述次高权限可以打开的应用可以打开。
可选地,该装置还包括解锁失效模块,设置为:若所述解锁指令和预置指令不匹配,则不能进行解锁。
可选地,所述用户生物特征指令包括以下至少之一:
用户指纹信息;
用户头像信息;
用户虹膜信息。
可选地,所述相关应用为包含用户隐私信息的应用,包括以下至少之一:支付应用、聊天应用、图像应用。
此外,本发明实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述解锁方法。
通过本发明实施例,采用该解锁方法及装置,可以确保用户使用终端时,用户的隐私信息不被泄露,提高了终端使用的安全性。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1为根据本发明实施例的解锁方法的流程图;
图2为根据本发明实施例的解锁方法的实施例一的流程图;
图3为根据本发明实施例的解锁方法的实施例二的流程图;
图4为根据本发明实施例的解锁方法的实施例三的流程图;
图5为根据本发明实施的解锁装置的结构图。
本发明的实施方式
需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本申请。
图1为根据本发明实施例的解锁方法的流程图。如图1所示,该方法包括以下步骤:
步骤S102:接收解锁指令,同时采集用户生物特征指令;
在本发明实施例中,该解锁指令为图案解锁指令,用户点亮屏幕,用图案方式解锁,终端同时采集用户的生物特征指令,该指令包括用户的指纹信息、头像信息或者虹膜信息等。
步骤S104:判断所述解锁指令是否和预置指令相匹配;
在本发明实施例中,该步骤是判断解锁指令是否和预置的图案解锁指令相匹配。
步骤S106:若所述解锁指令和预置指令相匹配,则判断所述用户生物特征指令是否和预存标准数据相匹配。
在本发明实施中,预存标准数据设置为多等级模式;
若所述用户生物特征指令与第一等级预存标准数据相匹配,则给予最高权限,可以设置次高权限可以打开的应用,并全面解锁;
若所述用户生物特征指令与第二等级预存标准数据相匹配,则给予次高权限,进行部分解锁,其中,所述最高权限设置的所述次高权限可以打开的应用可以打开。
如果所述用户生物特征指令与以上两个等级的预存标准数据都不匹配的 话,则给予最低等级的权限。
步骤S108:若所述用户生物特征指令和预存标准数据相匹配,则进行全面解锁。
在本发明实施例中,全面解锁是指终端完全对用户开放,用户可以使用任何应用。
若所述用户生物特征指令和预存标准数据不匹配,则在解锁的瞬间,终端中所有预设的含有个人私密信息的应用都会被关闭,比如微信、支付宝等,用户再打开这些应用,都需要重新登录。
下面通过具体实施例对本发明实施例进行详细说明。在下面的具体实施例中以手机为例的终端进行说明。
实施例一
图2是根据本发明实施例一的解锁方法的流程图。如图2所示,本实施例的方法包括以下步骤:
步骤S20:处于锁屏状态的手机,已经设置好图案解锁;
步骤S21:手机屏幕被点亮,准备开始解锁操作;
步骤S22:屏幕传感器感应到指纹接触时,判断用户开始解锁。此时,指纹采集器开始采集指纹,手指在触摸屏上滑动的全过程中,对指纹进行全面扫描,并记录当前指纹信息。
步骤S23:将步骤S22中采集到的当前指纹信息与预存的标准指纹信息进行对比,对比结果有匹配和不匹配两种。
步骤S24:检测图案密码解锁是否正确。步骤S24与以上步骤S22、步骤S23同步进行,步骤S24的检测结果有正确和不正确两种。
解锁的结果有以下几种情况:
A、步骤S24的图案解锁错误,则不管步骤S23的结果是匹配还是不匹配,都不能正常解锁;
B、步骤S24的图案解锁正确,步骤S23的结果是指纹信息匹配,则成功解锁,手机可正常使用,各应用的状态也都正常;
C、步骤S24的图案解锁正确,步骤S23的结果是指纹信息不匹配,手机会在解锁的瞬间关闭所有预设的涉及隐私的应用,用户如果打开这些应用,则需要重新登录。比如QQ、微信、支付宝等,用户可自行设置哪些应用涉及隐私需要关闭。
可选地,在本发明实施例中,步骤S23中的标准指纹信息设置为两个等级,用户指纹与第一等级指纹匹配时,给予用户最高权限,手机中所有应用都正常,并且可以设置次高权限用户的使用权限。用户指纹与第二等级指纹匹配时,给予用户次高权限,此时哪些应用正常受最高权限用户的设置限制。用户指纹与以上两个等级指纹都不匹配时,则给予最低等级的权限。
实施例二
图3是根据本发明实施例二的解锁方法的流程图。如图3所示,本实施例的方法包括以下步骤:
步骤S30、处于锁屏状态的手机,已经设置好图案解锁;
步骤S31、手机屏幕被点亮,准备开始解锁操作;
步骤S32、屏幕传感器感应到指纹接触时,判断用户开始解锁。此时,手机在后台启动前置摄像头,对用户的脸部进行拍照并将数据传给人脸识别系统。
步骤S33、人脸识别系统将步骤S31中取得的用户面部数据进行分析处理,获取面部特征信息,并与系统中预存的标准人脸模块进行对比,对比结果有匹配和不匹配两种。
步骤S34:检测图案密码解锁是否正确。步骤S34与以上S32、S33同步进行,步骤S34的结果有正确和不正确两种。
解锁的结果有以下几种情况:
A、步骤S34的图案解锁错误,则不管步骤S33的结果是匹配还是不匹配,都不能正常解锁;
B、步骤S34的图案解锁正确,步骤S33的结果是用户面部数据匹配,则成功解锁,手机可正常使用,各应用的状态也都正常;
C、步骤S34的图案解锁正确,步骤S33的结果是用户面部数据不匹配, 手机会在解锁的瞬间关闭所有预设的涉及隐私的应用,用户如果打开这些应用,则需要重新登录。比如QQ、微信、支付宝等,用户可自行设置哪些应用涉及隐私需要关闭。
实施例三
图4是根据本发明实施例三的解锁方法的流程图。如图4所示,本实施例的方法包括以下步骤:
步骤S40:处于锁屏状态的手机,已经设置好图案解锁;
步骤S41:手机屏幕被点亮,准备开始解锁操作;
步骤S42:屏幕传感器感应到指纹接触时,判断用户开始解锁。此时,手机在后台启动前置摄像头,重点对用户的整个眼部进行拍摄,并将拍摄到的图像传给虹膜识别系统。
步骤S43:虹膜识别系统将步骤S42中取得的用户眼部数据进行分析,提取其特征,并与系统中预存的标准虹膜数据进行对比,对比结果有匹配和不匹配两种。
步骤S44:检测图案密码解锁是否正确。步骤S44与以上步骤S42、步骤S43同步进行,步骤S44的结果有正确和不正确两种。
解锁的结果有以下几种情况:
A、步骤S44的图案解锁错误,则不管步骤S43的结果是匹配还是不匹配,都不能正常解锁;
B、步骤S44的图案解锁正确,步骤S43的结果是用户虹膜数据匹配,则成功解锁,手机可正常使用,各应用的状态也都正常;
C、步骤S44的图案解锁正确,步骤S43的结果用户虹膜数据不匹配,手机会在解锁的瞬间关闭所有预设的涉及隐私的应用,用户如果打开这些应用,则需要重新登录。比如QQ、微信、支付宝等,用户可自行设置哪些应用涉及隐私需要关闭。
在本实施例中还提供了解锁装置的结构图,用于实现上述实施例,已经进行过说明的不再赘述,下面对该系统中涉及到的模块进行说明。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下 实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图5为根据本发明实施例的解锁装置的结构图。如图5所示,该装置包括:
采集模块50,设置为:接收解锁指令,同时采集用户生物特征指令,其中,用户生物特征指令包括以下至少之一:用户指纹信息、用户头像信息、用户虹膜信息;
第一判断模块51,设置为:判断所述解锁指令是否和预置指令相匹配;
第二判断模块52,设置为:若所述解锁指令和预置指令相匹配,则判断所述用户生物特征指令是否和预存标准数据相匹配;
全面解锁模块53,设置为:若所述用户生物特征指令和预存标准数据相匹配,则进行全面解锁。
该装置还可以包括部分解锁模块,设置为:若所述用户生物特征指令和预存标准数据不匹配,则进行部分解锁,其中,预设的相关应用会被关闭,该应用为包含用户隐私信息的应用,例如包括支付应用、聊天应用、图像应用等。
该装置还可以包括等级设置模块,设置为:
把所述预存标准数据设置为多等级模式;
若所述用户生物特征指令与第一等级预存标准数据相匹配,则给予最高权限,其中,所述最高权限可以设置次高权限可以打开的应用;
若所述用户生物特征指令与第二等级预存标准数据相匹配,则给予次高权限。针对次高权限进行部分解锁,且所述最高权限设置的所述次高权限可以打开的应用可以打开。
该装置还可以包括解锁失效模块,设置为:若所述解锁指令和预置指令不匹配,则不能进行解锁。
此外,本发明实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述解锁方法。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件(例如处理器)完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。
显然,本领域的技术人员应该明白,上述的本申请的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本申请不限制于任何特定的硬件和软件结合。
以上仅为本申请的可选实施例而已,并不用于限制本申请,对于本领域的技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。
工业实用性
本发明实施例提供一种解锁方法及装置,可以确保用户使用终端时,用户的隐私信息不被泄露,提高了终端使用的安全性。

Claims (12)

  1. 一种解锁方法,包括:
    接收解锁指令,同时采集用户生物特征指令;
    判断所述解锁指令是否和预置指令相匹配;
    若所述解锁指令和预置指令相匹配,则判断所述用户生物特征指令是否和预存标准数据相匹配;
    若所述用户生物特征指令和预存标准数据相匹配,则进行全面解锁。
  2. 根据权利要求1所述的解锁方法,所述解锁方法还包括:若所述用户生物特征指令和预存标准数据不匹配,则进行部分解锁,其中,预设的相关应用会被关闭。
  3. 根据权利要求2所述的解锁方法,其中,
    所述预存标准数据设置为多等级模式;
    若所述用户生物特征指令与第一等级预存标准数据相匹配,则给予最高权限,可以设置次高权限可以打开的应用,并全面解锁;
    若所述用户生物特征指令与第二等级预存标准数据相匹配,则给予次高权限,进行部分解锁,其中,所述最高权限设置的所述次高权限可以打开的应用可以打开。
  4. 根据权利要求1所述的解锁方法,所述解锁方法还包括:若所述解锁指令和预置指令不匹配,则不能进行解锁。
  5. 根据权利要求1至4任一项所述的解锁方法,其中,所述用户生物特征指令包括以下至少之一:
    用户指纹信息;
    用户头像信息;
    用户虹膜信息。
  6. 根据权利要求2所述的解锁方法,其中,所述相关应用为包含用户隐私信息的应用,包括以下至少之一:支付应用、聊天应用、图像应用。
  7. 一种解锁装置,包括:
    采集模块,设置为:接收解锁指令,同时采集用户生物特征指令;
    第一判断模块,设置为:判断所述解锁指令是否和预置指令相匹配;
    第二判断模块,设置为:若所述解锁指令和预置指令相匹配,则判断所述用户生物特征指令是否和预存标准数据相匹配;
    全面解锁模块,设置为:若所述用户生物特征指令和预存标准数据相匹配,则进行全面解锁。
  8. 根据权利要求7所述的解锁装置,所述解锁装置还包括部分解锁模块,设置为:若所述用户生物特征指令和预存标准数据不匹配,则进行部分解锁,其中,预设的相关应用会被关闭。
  9. 根据权利要求8所述的解锁装置,所述解锁装置还包括等级设置模块,设置为:
    把所述预存标准数据设置为多等级模式;
    若所述用户生物特征指令与第一等级预存标准数据相匹配,则给予最高权限,其中,所述最高权限可以设置次高权限可以打开的应用;
    若所述用户生物特征指令与第二等级预存标准数据相匹配,则给予次高权限,其中,所述最高权限设置的所述次高权限可以打开的应用可以打开。
  10. 根据权利要求7所述的解锁装置,所述解锁装置还包括解锁失效模块,设置为:若所述解锁指令和预置指令不匹配,则不能进行解锁。
  11. 根据权利要求7至10任一项所述的解锁装置,其中,所述用户生物特征指令包括以下至少之一:
    用户指纹信息;
    用户头像信息;
    用户虹膜信息。
  12. 根据权利要求8所述的解锁装置,其中,所述相关应用为包含用户隐私信息的应用,包括以下至少之一:支付应用、聊天应用、图像应用。
PCT/CN2016/078485 2015-10-30 2016-04-05 一种解锁方法及装置 WO2016188230A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510731657.XA CN106650361A (zh) 2015-10-30 2015-10-30 一种解锁方法及装置
CN201510731657.X 2015-10-30

Publications (1)

Publication Number Publication Date
WO2016188230A1 true WO2016188230A1 (zh) 2016-12-01

Family

ID=57392478

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/078485 WO2016188230A1 (zh) 2015-10-30 2016-04-05 一种解锁方法及装置

Country Status (2)

Country Link
CN (1) CN106650361A (zh)
WO (1) WO2016188230A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107835286A (zh) * 2017-10-27 2018-03-23 维沃移动通信有限公司 一种防止误解锁的方法及移动终端

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108133129A (zh) * 2017-06-22 2018-06-08 广东网金云计算有限公司 一种应用程序的解锁方法、装置及移动终端
KR102406099B1 (ko) 2017-07-13 2022-06-10 삼성전자주식회사 전자 장치 및 이의 정보 표시
CN107403082A (zh) * 2017-07-13 2017-11-28 广东欧珀移动通信有限公司 解锁处理方法及相关产品
CN107526958A (zh) * 2017-08-30 2017-12-29 努比亚技术有限公司 一种工作模式控制方法、终端及计算机可读存储介质
CN107609363B (zh) * 2017-10-20 2020-09-11 维沃移动通信有限公司 一种解锁方法及移动终端
CN111098702B (zh) * 2018-10-09 2022-04-08 宇通客车股份有限公司 一种客车油箱防盗方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110103598A (ko) * 2010-03-15 2011-09-21 주식회사 엘지유플러스 단말기의 잠금 해제 시스템 및 방법
CN103092503A (zh) * 2012-10-11 2013-05-08 百度在线网络技术(北京)有限公司 移动终端的解锁及验证方法与解锁及验证装置
CN103440446A (zh) * 2013-08-23 2013-12-11 广东欧珀移动通信有限公司 智能终端私密内容保护解锁操作方法和装置
CN103745147A (zh) * 2013-12-30 2014-04-23 华为技术有限公司 系统模式启动方法、应用程序启动方法及设备
CN104537291A (zh) * 2015-01-09 2015-04-22 宇龙计算机通信科技(深圳)有限公司 屏幕界面的解锁方式和屏幕界面的解锁装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573456A (zh) * 2014-12-29 2015-04-29 深圳市金立通信设备有限公司 一种终端界面控制方法
CN104933341A (zh) * 2015-06-18 2015-09-23 广东欧珀移动通信有限公司 一种权限管理的方法及终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110103598A (ko) * 2010-03-15 2011-09-21 주식회사 엘지유플러스 단말기의 잠금 해제 시스템 및 방법
CN103092503A (zh) * 2012-10-11 2013-05-08 百度在线网络技术(北京)有限公司 移动终端的解锁及验证方法与解锁及验证装置
CN103440446A (zh) * 2013-08-23 2013-12-11 广东欧珀移动通信有限公司 智能终端私密内容保护解锁操作方法和装置
CN103745147A (zh) * 2013-12-30 2014-04-23 华为技术有限公司 系统模式启动方法、应用程序启动方法及设备
CN104537291A (zh) * 2015-01-09 2015-04-22 宇龙计算机通信科技(深圳)有限公司 屏幕界面的解锁方式和屏幕界面的解锁装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107835286A (zh) * 2017-10-27 2018-03-23 维沃移动通信有限公司 一种防止误解锁的方法及移动终端
CN107835286B (zh) * 2017-10-27 2020-05-19 维沃移动通信有限公司 一种防止误解锁的方法及移动终端

Also Published As

Publication number Publication date
CN106650361A (zh) 2017-05-10

Similar Documents

Publication Publication Date Title
WO2016188230A1 (zh) 一种解锁方法及装置
US20210286870A1 (en) Step-Up Authentication
US9122913B2 (en) Method for logging a user in to a mobile device
US9411946B2 (en) Fingerprint password
Lee et al. Secure pick up: Implicit authentication when you start using the smartphone
US11997087B2 (en) Mobile enrollment using a known biometric
CN108171137B (zh) 一种人脸识别方法及系统
US20130326613A1 (en) Dynamic control of device unlocking security level
US9792421B1 (en) Secure storage of fingerprint related elements
WO2017173640A1 (zh) 一种基于多模式生物识别信息的个人识别方法和装置
US20130198836A1 (en) Facial Recognition Streamlined Login
Bodepudi et al. Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review
EP3811254A1 (en) Method and electronic device for authenticating a user
KR102060563B1 (ko) 음성 및 안면 데이터를 이용한 인증 제공 방법 및 장치
US20150100493A1 (en) EyeWatch credit card fraud prevention system
WO2018006325A1 (zh) 一种验证用户进入的方法及系统
JP2007011710A (ja) 認証装置及び認証方法
US11997085B2 (en) Complex user authentication factor integrating a sequence of fingerprints and a personal identification number
JP2013167946A (ja) 個人認証方法およびそれを用いた情報機器
JP7435632B2 (ja) 認証装置、認証方法及び認証装置用プログラム
Furnell Biometric Technology and User Identity
WO2018006350A1 (zh) 一种基于图片密码开启智能门禁的方法及系统
KR100597753B1 (ko) 컴퓨터 및 컴퓨터의 사용자인증방법
CN112149085A (zh) 一种基于用户生物特征的游戏账户登录方法和装置
WO2018006327A1 (zh) 一种智能门禁的开启方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16799119

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16799119

Country of ref document: EP

Kind code of ref document: A1