WO2019061219A1 - 一种屏幕解锁的方法及终端 - Google Patents

一种屏幕解锁的方法及终端 Download PDF

Info

Publication number
WO2019061219A1
WO2019061219A1 PCT/CN2017/104197 CN2017104197W WO2019061219A1 WO 2019061219 A1 WO2019061219 A1 WO 2019061219A1 CN 2017104197 W CN2017104197 W CN 2017104197W WO 2019061219 A1 WO2019061219 A1 WO 2019061219A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
unlocking
information
lock screen
user
Prior art date
Application number
PCT/CN2017/104197
Other languages
English (en)
French (fr)
Inventor
柴良玉
靳杨清
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2017/104197 priority Critical patent/WO2019061219A1/zh
Priority to CN202111188784.1A priority patent/CN114168916A/zh
Priority to CN201780087948.7A priority patent/CN110419042B/zh
Publication of WO2019061219A1 publication Critical patent/WO2019061219A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels

Definitions

  • the present application relates to the field of terminal applications, and in particular, to a method and a terminal for unlocking a screen.
  • the embodiment of the present application provides a method for unlocking a screen and a terminal, which is used for unlocking the unlocking information sent by the second terminal in the state of the first terminal.
  • a first aspect of the present application provides a method for unlocking a screen, which may include: the first terminal sends an unlock request to the second terminal in a lock screen state, where the unlock request includes the unique identifier of the first terminal and the a unique identifier of the second terminal, the unique identifier of the first terminal is used to uniquely identify the first terminal, and the unique identifier of the second terminal is used to uniquely identify the second terminal; wherein the unique identification of the first terminal The code can be used for verification by the second terminal, and the unique identifier of the second terminal is used to find the terminal that sends the unlock request.
  • the first terminal receives the unlocking information sent by the second terminal, where the unlocking information is a response of the second terminal to the unlocking request, and the unlocking information may include a unique identifier of the second terminal; the first terminal responds to the unlocking Information, the related operation of releasing the lock screen state is performed.
  • the first terminal may send an unlock request to the second terminal in response to the user's operation in the lock screen state, for requesting the unlock information of the first terminal.
  • the first terminal may perform a related operation of releasing the lock screen state, thereby releasing the lock screen state of the first terminal, and providing the user with a method for unlocking without clearing the terminal data; Verifying the unique identifier of the trusted unlocking device ensures the security of the unlock.
  • the unlocking information may further include a first unlocking password of the first terminal; the first terminal, in response to the unlocking information, performing a related operation of releasing the lock screen state, which may include The first terminal responds to the first unlock password in the unlocking information, and releases the lock screen state.
  • the unlocking information sent by the second terminal that is received by the first terminal includes the first unlocking password of the first terminal, and then the first terminal may directly respond to the first unlocking password and cancel the lock screen state.
  • the first unlocking password may be automatically filled by the first terminal, or may be manually input by the user, thereby releasing the lock screen state of the first terminal. Provides an implementation to unlock the lock screen state, increasing the variety of solutions.
  • the first terminal in response to the unlocking information, performing a related operation of releasing the lock screen state, may include: the first terminal clearing the first terminal by responding to the unlocking information Unlocking the password, so that the first terminal releases the lock screen state; the first unlock password is a secret for releasing the lock screen state of the first terminal code.
  • the unlocking information may be used to clear the first unlocking password of the first terminal. Then, after receiving the unlocking information sent by the second terminal, the first terminal may directly clear the first unlocking password in response to the unlocking information, thereby The first terminal releases the lock screen state.
  • the method may further include: the first terminal displays a reset unlock password interface; and the first terminal responds to the user input setting. To unlock the password, reset the unlock password of the first terminal.
  • the first terminal may display a reset unlock password interface, and the user may Set the second unlock password.
  • This second unlock password can be an unlock password that is easier for the user to remember.
  • the first terminal sends an unlock request to the second terminal in a lock screen state, which may include, but is not limited to, the following implementation manners:
  • the first terminal responds to the unlock password of the user in the lock screen state. If the number of times the unlocking fails is greater than or equal to the preset threshold, the first terminal automatically sends an unlock request to the second terminal.
  • the first terminal sends an unlock request to the first terminal in response to the unlocking operation input by the user in the lock screen state; it can be understood that the user may select the second terminal to unlock the lock in the initial situation.
  • the screen state or the user has entered the wrong password, but has not reached the upper limit of the unlock failure, the user can also select the second terminal to unlock the lock screen state.
  • the first terminal displays the first prompt information, where the first prompt is used to prompt the user to the second if the number of times the unlocking fails is greater than or equal to the preset threshold.
  • the terminal sends the unlocking request, and the first terminal acquires an operation of the user based on the first prompt information, that is, if the user selects the identifier for sending the unlocking request to the second terminal, the first terminal sends an unlocking request to the second terminal; If the identifier of the unlock request is not sent to the second terminal, the first terminal does not send the unlock request to the second terminal.
  • the controllability of the user is realized, and the user can select whether to cancel the lock screen state of the first terminal through the second terminal according to actual needs.
  • the first terminal acquires the identity authentication information input by the user in the lock screen state; if the identity authentication information input by the user matches the preset identity authentication information, the first terminal sends an unlock to the second terminal.
  • the request it can be understood that the identity authentication information can be a secret question set by the user, such as the name of the parent, the favorite movie, the most impressive thing, the ID number, and the like.
  • the first terminal presents the second prompt information in the lock screen state, and the second prompt information includes a contact manner of at least two contacts, where the second prompt information is used to prompt the user to select a contact to be sent the unlock request.
  • a user may select at least two contacts, and the first terminal acquires a selection operation input by the user; if the contact targeted by the selection operation is a preset contact, the first terminal sends an unlock request to the second terminal,
  • the second terminal is a terminal corresponding to the preset contact; if the contact for the selection operation is not a preset contact, the first terminal triggers an alarm prompt.
  • This alarm prompt can be: "Unable to unlock by contact" or "Unlock abnormally, please pay attention to security".
  • a specific implementation manner is provided for the first terminal to send an unlock request to the second terminal, where the first terminal may automatically send an unlock request to the second terminal, or may respond to the user's operation to the second
  • the terminal sends an unlock request, providing a variety of implementation solutions, increasing the feasibility of the solution.
  • the The method may further include: the first terminal acquiring the unique identifier of the first terminal and the unique identifier of the second terminal; the first terminal sending an authentication request to the second terminal, the authentication request for requesting the second The terminal agrees to perform a related operation for releasing the lock screen state of the first terminal for the first terminal; the authentication request includes a unique identifier of the first terminal and a unique identifier of the second terminal; the first terminal receives the An authentication response sent by the second terminal, where the authentication response is a response of the second terminal to the authentication request.
  • the first terminal is configured to trust the unlocking device of the second terminal.
  • the second terminal After the trust mechanism is successfully established, the second terminal has the right to release the lock screen state of the first terminal. After the first terminal sends the authentication request to the second terminal, if the second terminal successfully verifies the information in the authentication request, the second terminal may return a response indicating that the trust mechanism is successfully established. If the second terminal fails to verify the information in the authentication request, Then, a response indicating that the information mechanism establishment failure can be returned.
  • the authentication request further includes a first unlock password of the first terminal.
  • the authentication request may further include a first unlocking password of the first terminal, after the first terminal initiates an unlocking request to the second terminal.
  • the second terminal may directly send the first unlocking password to the first terminal, and cancel the lock screen state of the first terminal.
  • a second aspect of the present application provides a method for unlocking a screen, which may include: receiving, by the second terminal, an unlock request sent by the first terminal, where the unlock request includes a unique identifier of the first terminal, where the first terminal is unique The identifier is used to uniquely identify the first terminal; the unique identifier of the first terminal can be used for verification by the second terminal. If the unique identifier of the first terminal is the same as the unique identifier that is saved in advance by the second terminal, the second terminal sends the unlocking information to the first terminal, where the unlocking information is used to perform the unlocking of the first terminal. Status related operations.
  • the second terminal receives the unlocking request sent by the first terminal, and the second terminal may match the unique identifier of the first terminal included in the unlocking request with the pre-stored unique identifier. Then, the second terminal sends the unlocking information to the first terminal. After receiving the unlocking information sent by the second terminal, the first terminal may perform a related operation of releasing the lock screen state, thereby releasing the lock screen state of the first terminal, and providing the user with a method for unlocking without clearing the terminal data; Verifying the unique identifier ensures the security of the unlock.
  • the method may further include: acquiring identity authentication information input by the user; and sending, by the second terminal, the unlocking information to the first terminal, where The method may include: if the identity authentication information input by the user matches the preset identity authentication information, the second terminal sends the unlocking information to the first terminal.
  • identity authentication information may be a secret question set by the user, such as the name of the parent, the favorite movie, the most impressive thing, the ID number, and the like.
  • the unlocking information further includes a first unlocking password of the first terminal, where the first unlocking password is used by the first terminal to cancel the lock screen state; or the unlocking information And the instructing the first terminal to clear the first unlocking password, so that the first terminal releases the lock screen state.
  • the unlocking information sent by the second terminal to the first terminal includes the first unlocking password of the first terminal, and then the first terminal may directly respond to the first unlocking password and cancel the lock screen state.
  • the unlocking information sent by the second terminal to the first terminal may be used to clear the first unlocking password of the first terminal. Then, after receiving the unlocking information sent by the second terminal, the first terminal may directly clear the first unlocking password by responding to the unlocking information. So that the first terminal releases the lock screen state.
  • the method may further include: the second terminal presents the prompt information, where the prompt information is used to prompt the user to send the unlocking information to the first terminal; and the second terminal sends the unlocking information to the first terminal, where the second terminal obtains the operation of the user based on the prompt information.
  • Sending unlock information to the first terminal the unlocking information sent by the second terminal to the first terminal may first display prompt information according to the unlocking request, and the user selects whether to send the unlocking information to the first terminal.
  • the second terminal sends the unlocking information to the first terminal; if the user chooses not to send the identifier of the unlocking information to the first terminal, the second terminal does not send the unlocking to the first terminal. information. Users can achieve the desired effect according to their actual needs and achieve user controllability.
  • the method may further include: the second terminal receiving the authentication request sent by the first terminal, the authentication request The unique identifier of the first terminal and the unique identifier of the second terminal are included; the second terminal verifies the unique identifier of the second terminal, and saves the unique identifier of the first terminal; if the verification succeeds, the The second terminal sends an authentication response to the first terminal, where the authentication response is used to indicate that the first terminal establishes a trust mechanism with the second terminal.
  • the first terminal sets a second terminal as a trusted unlocking device, the second terminal receives the authentication request sent by the first terminal, and the second terminal performs information verification.
  • the second terminal may send an authentication response to the first terminal, and the authentication response may indicate that the trust mechanism is successfully established. After the trust mechanism is successfully established, the second terminal has the right to release the lock screen state of the first terminal. If the information in the authentication request is not successfully verified by the second terminal, the response indicating that the information mechanism establishment failure may be returned.
  • the authentication request further includes a first unlock password of the first terminal.
  • the authentication request may further include a first unlocking password of the first terminal, after the first terminal initiates an unlocking request to the second terminal.
  • the second terminal may directly send the first unlocking password to the first terminal, and cancel the lock screen state of the first terminal.
  • the method may further include: receiving, by the second terminal, the second unlocking password sent by the first terminal
  • the second unlocking password is an unlocking password after the first terminal is reset.
  • a third aspect of the embodiments of the present disclosure provides a method for unlocking a screen, which may include: in a lock screen state, the first terminal opens a scan code application in response to a user input operation; and the first terminal responds to the scan of the scan code application.
  • the code operation cancels the lock screen state.
  • the first terminal can be in the lock screen state.
  • the scanning operation of the scanning application can be performed to release the lock screen state, and an unlocking implementation scheme is provided.
  • the object of the scan operation is a scan code; it should be understood that the scan code may be a one-dimensional barcode, a two-dimensional code, a three-dimensional code, or a four-dimensional code.
  • the first terminal may include: the first terminal responding to the scan code operation of the scan code application, if the scan code carries information and a preset If the information is matched, the lock screen state is released; the method may further include: if the information carried by the scan code does not match the preset information, the lock screen state cannot be released.
  • the prompt information may be presented to the user, and the prompt information may be a scan code error or an alarm prompt.
  • a specific description is made on the state in which the scan scan code is unlocked.
  • the first terminal may cancel the lock screen state.
  • the object of the scan code operation is a scan code; the letter carried by the scan code
  • the information includes the unique identifier of the first terminal and the unlocking password of the first terminal, where the unique identifier of the first terminal is used to uniquely identify the first terminal; or the information carried by the scan code includes the user identifier and the first An unlocking password of the terminal, the user identifier is used to uniquely identify the user of the first terminal; or the information carried by the scan code includes the unique identification code of the first terminal, the user identifier, and the unlocking password of the first terminal.
  • the user identifier may be other identifiers such as an ID card number and a mobile phone number; and the unlock password of the first terminal may cancel the lock screen state of the first terminal.
  • the unlock password of the first terminal may cancel the lock screen state of the first terminal.
  • the method may further include: the first terminal acquiring identity authentication information input by the user; and if the user input the identity authentication information and If the preset identity authentication information does not match, the first terminal presents an alarm prompt; the first terminal cancels the lock screen state, and the method includes: if the identity authentication information input by the user matches the preset identity authentication information, the first terminal Release the lock screen status.
  • the identity authentication information may be input first, and the identity authentication information may be used to ensure the security of the unlocking.
  • the method may further include: the first terminal displays a reset unlock password interface; the first terminal responds to the user input weight Set the password to operate and set the second unlock password.
  • the first terminal may display a reset unlock password interface, and the user may Set the second unlock password.
  • This second unlock password can be an unlock password that is easier for the user to remember.
  • the first terminal is configured to open the scan code application in a lock screen state, and may include:
  • the first terminal responds to the unlock password input by the user. If the number of times the unlocking fails is greater than or equal to a preset threshold, the first terminal may automatically open the scan code application.
  • the first terminal opens the scan code application in response to a user input opening operation in a lock screen state. It can be understood that the user may open the scan code application to release the lock screen state in the initial situation, or the user has entered the wrong password, but has not reached the upper limit of the unlock failure, and the user may also choose to open the scan code application. To unlock the lock screen.
  • the first terminal is in a lock screen state, if the number of times of the unsuccessful failure is greater than or equal to the preset threshold, the first terminal presents the user prompt information, where the user prompt information is used to prompt the user whether to open the scan code application;
  • the first terminal acquires an operation of the user based on the prompt information of the user. If the user selects to open the identifier of the scan code application, the first terminal opens the scan code application. If the user does not choose to open the identifier of the scan code application, the first terminal does not open the scan code application.
  • the controllability of the user is realized, and the user can select whether to cancel the lock screen state by scanning the code operation of the scan code application according to actual needs.
  • the first terminal acquires the identity authentication information input by the user in the lock screen state; if the identity authentication information input by the user matches the preset identity authentication information, the first terminal opens the scan code application.
  • the identity authentication information may be a secret question set by the user, such as the name of the parent, the favorite movie, the most impressive thing, the ID number, and the like.
  • a specific implementation manner of opening a scan code application by the first terminal is provided.
  • the first terminal may automatically open the scan code application, or may open the scan code application in response to the user operation, providing diversification.
  • the implementation of the program increases the feasibility of the program.
  • the method may further include: the first terminal generates a first scan code, where the first terminal is in a lock screen state, before the scan code application is opened;
  • the second terminal sends the first scan code, for example, sending the first scan code to the second terminal by using a short message, a WeChat message, a QQ message, or the like.
  • the first terminal sends the first scan code to the server.
  • the first terminal sends the first scan code to the email address, the network disk address, and the like. That is, the first scan code can be saved in another device.
  • the first scan code displayed on the other device can be scanned to release the lock screen state.
  • the method may further include: if the first unlock password of the first terminal changes, the first terminal according to the changed first unlock password and the first terminal The unique identification code generates a second scan code; or the first terminal periodically updates the first scan code to generate a third scan code.
  • the method is mainly to update the first scan code generated by the first terminal, for example, the first terminal may generate the second scan according to the modified unlock password and the unique identifier of the first terminal. Or the first terminal may periodically generate a third scan code according to the current unlock password and the unique identifier of the first terminal.
  • the fourth aspect of the present application further provides a method for unlocking a screen, which may include: receiving, by a first terminal, unlocking information sent by the second terminal, where the second terminal is established with the first terminal. And the first terminal unlocking the first unlocking password of the first terminal according to the unlocking information, or canceling the lock screen state of the first terminal according to the first unlocking password included in the unlocking information.
  • the first terminal may clear the first unlocking password of the first terminal according to the unlocking information, or may be included according to the unlocking information.
  • the first unlocking password cancels the lock screen state of the first terminal.
  • the establishment of the communication connection may be established by a Bluetooth connection, or may be a USB connection established.
  • the method may further include: the first terminal displays a reset unlock password interface; and the first terminal resets the first in response to the user inputting an operation of resetting the unlock password.
  • the second unlock password of the terminal may be an unlock password that is easier for the user to remember.
  • the first terminal before the first terminal is in the lock screen state, before receiving the unlocking information sent by the second terminal, the first terminal may include, but is not limited to, the following implementation manners:
  • the first terminal responds to the unlock password of the user in the lock screen state. If the number of times the unlocking fails is greater than or equal to the first preset threshold, the first terminal automatically sends an unlock request to the second terminal.
  • the first terminal sends an unlock request to the first terminal in response to the unlocking operation input by the user in the lock screen state. It can be understood that the user may select the second terminal to cancel the lock screen state in the initial situation, or the user has entered the wrong password, but has not reached the upper limit of the unlock failure, and the user may also select the second terminal. Release the lock screen status.
  • the first terminal is in the lock screen state, if the number of times of the unsuccessful failure is greater than or equal to the first preset threshold, the first terminal presents the first prompt information, where the first prompt information is used to prompt the user whether to
  • the second terminal sends the unlocking request, and the first terminal acquires the user's operation based on the first prompt information, that is, if the user selects to send the identifier of the unlocking request to the second terminal, the first terminal sends an unlocking request to the second terminal; If the user does not choose to send to the second terminal Sending an identifier of the unlock request, the first terminal does not send an unlock request to the second terminal.
  • the controllability of the user is realized, and the user can select whether to cancel the lock screen state of the first terminal through the second terminal according to actual needs.
  • the first terminal acquires the identity authentication information input by the user in the lock screen state; if the identity authentication information input by the user matches the preset identity authentication information, the first terminal sends an unlock to the second terminal.
  • the request it can be understood that the identity authentication information can be a secret question set by the user, such as the name of the parent, the favorite movie, the most impressive thing, the ID number, and the like.
  • the first terminal detects the second terminal within a preset range in the lock screen state, and the first terminal sends the unlock request to the second terminal.
  • the first terminal sends the unlock request to the second terminal if the duration of the second terminal is greater than or equal to the second preset threshold in the preset range. .
  • the first terminal presents a second prompt information in a lock screen state, the second prompt information includes a contact manner of at least two contacts, and the second prompt information is used to prompt the user to select a contact to be sent the unlock request.
  • the first terminal obtains a selection operation input by the user; if the contact for the selection operation is a preset contact, the first terminal sends an unlock request to the second terminal, and the second terminal is the preset contact Corresponding terminal; if the contact for the selection operation is not a preset contact, the first terminal triggers an alarm prompt.
  • This alarm prompt can be: "Unable to unlock by contact" or "Unlock abnormally, please pay attention to security".
  • a specific implementation manner is provided for the first terminal to send an unlock request to the second terminal, where the first terminal may automatically send an unlock request to the second terminal, or may respond to the user's operation to the second
  • the terminal sends an unlock request, providing a variety of implementation solutions, increasing the feasibility of the solution.
  • the fifth aspect of the embodiment of the present application further provides a method for unlocking a screen, which may include: receiving, by a first terminal, the unlocking information sent by the second terminal, where the unlocking information includes a unique identifier of the first terminal, and unlocking a password, the unlocking password is used to cancel the lock screen state of the first terminal; in response to receiving the unlocking information sent by the second terminal, the first terminal lights up the screen, enters a lock screen state, and presents a lock screen interface, in the lock The unlocking password is automatically filled in the screen interface; the first terminal releases the lock screen state.
  • the black screen state is a state in which the screen is not lit or is not powered.
  • the first terminal After receiving the unlocking information sent by the second terminal, the first terminal, in response to receiving the unlocking information sent by the second terminal, lights up the screen, enters a lock screen state, and presents a lock screen interface, and automatically displays the lock screen interface on the lock screen interface. Fill the unlock password to release the lock screen status.
  • the first terminal may also receive the unlocking information sent by the second terminal, light the screen, enter the lock screen state, and present a lock screen interface, and the user manually inputs the unlocking password according to the prompt in the unlocking information to release the first terminal. Lock screen status.
  • the sixth aspect of the present application further provides a method for unlocking a screen, which may include: if the first terminal detects that the second terminal is within a preset distance, the first terminal sends an unlock request to the second terminal, where The unlocking request is used to request the second terminal to cancel the lock screen state of the first terminal, where the first request includes a unique identifier of the first terminal and a unique identifier of the second terminal; the first terminal receives the second The unlocking information sent by the terminal, the unlocking information is a response of the second terminal to the unlocking request, and the unlocking information includes a unique identifier of the second terminal and an unlocking password, where the unlocking password is used to cancel the lock screen of the first terminal.
  • the first terminal presents a lock screen interface, and automatically fills the unlock password on the lock screen interface to release the lock screen state.
  • the first terminal if the first terminal detects the second terminal within the preset distance range, the first terminal sends an unlock request to the second terminal, and receives the unlock information sent by the second terminal, in response to receiving To the unlocking information, the first terminal presents a lock screen interface, and the unlock password is automatically filled on the lock screen interface to release the lock screen state.
  • the first terminal may also display a lock screen interface in response to receiving the unlock information sent by the second terminal, and the user manually inputs the unlock password according to the prompt in the unlock information to cancel the lock screen state of the first terminal.
  • the first terminal if the first terminal detects that the second terminal is within a preset distance, the first terminal automatically sends an unlock request to the second terminal, where The first terminal is configured to: when the first terminal detects that the second terminal is within a preset distance range, and the duration of the second terminal in the preset distance range is greater than a preset time threshold.
  • the second terminal sends an unlock request. That is, the first terminal detects the second terminal within the preset distance range, and sends the unlock request to the second terminal when the duration reaches the preset time threshold.
  • a seventh aspect of the present application provides a terminal, which has a function of sending an unlock request to a second terminal in a lock screen state, and receiving a unlocked information sent by the second terminal to cancel a lock screen state.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • An eighth aspect of the present application provides a terminal, which has the function of sending unlock information to a first terminal according to an unlock request sent by the first terminal, so that the first terminal uses the unlock information to cancel the lock screen state.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a ninth aspect of the embodiment of the present application provides a terminal, which has a function of releasing the lock screen state in response to a scan code operation of the scan code application in a lock screen state.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a tenth aspect of the present application provides a terminal, which has the function of receiving the unlocked information of the second terminal and releasing the lock screen state in the lock screen state.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • An eleventh embodiment of the present application provides a terminal, which has the function of receiving the unlocked information of the second terminal and releasing the lock screen state in the lock screen state.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a twelfth aspect of the present application provides a terminal, which has the function of sending an unlock request to a second terminal in a lock screen state, and receiving the unlocked information sent by the second terminal to cancel the lock screen state.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a thirteenth aspect of the embodiments of the present application provides a computer readable storage medium having instructions stored therein that, when executed on a computer, cause the computer to perform the methods described in the above aspects.
  • the technical solution of the present application or the part that contributes to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a computer software instruction for storing the above device, comprising a program designed to execute the above first aspect, the second aspect is a data node or a management node.
  • the storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • a fourteenth aspect of the present application provides a computer program product comprising instructions, which when executed on a computer, cause the computer to perform any of the optional implementations of the first aspect or the first aspect of the present application, or the present application
  • the second aspect or any optional implementation of the second aspect, the optional implementation of the third aspect or the third aspect of the present application, the optional implementation of the fourth aspect or the fourth aspect of the present application The method of claim 5, wherein the method of any one of the optional implementations of the fifth aspect or the fifth aspect, or the optional implementation of any of the sixth aspect or the sixth aspect.
  • the method for unlocking the first terminal in the lock screen state by sending the unlock information through the second terminal is provided.
  • the user forgets the lock screen password of the terminal the user can unlock the device without flashing or restoring the factory.
  • FIG. 1 is a schematic diagram of a scenario applied to an embodiment of the present application
  • FIG. 2 is a schematic diagram of an embodiment of a method for unlocking a screen in an embodiment of the present application
  • 3A is a schematic diagram of an unlock password set by a first terminal as a digital password
  • 3B is a schematic diagram of an unlock password set by the first terminal as a sliding track
  • 3C is a schematic diagram of an unlock password set by the first terminal as a fingerprint
  • 3D is a schematic diagram of setting, by the first terminal, a second terminal as a trusted unlocking device
  • 3E is a schematic diagram of setting, by the first terminal, a second terminal as a trusted unlocking device
  • 3F is a schematic diagram of establishing a trust mechanism between a second terminal and a first terminal
  • 3G is a schematic diagram of establishing a trust mechanism between a second terminal and a first terminal
  • 3H is a schematic diagram of establishing a trust mechanism between a second terminal and a first terminal
  • FIG. 3I is a schematic diagram of establishing a trust mechanism between a second terminal and a first terminal
  • 4A is a schematic diagram of a first terminal sending an unlock request to a second terminal
  • 4B is a schematic diagram of a first terminal sending an unlock request to a second terminal
  • 4C is a schematic diagram of a first terminal sending an unlock request to a second terminal
  • 4D is a schematic diagram of sending, by the second terminal, unlock information
  • 4E is a schematic diagram of unlocking the first terminal
  • 4F is a schematic diagram of unlocking the first terminal
  • 4G is a schematic diagram of unlocking the first terminal
  • 4H is a schematic diagram of unlocking the first terminal
  • FIG. 5 is a schematic diagram of an embodiment of a method for unlocking a screen according to an embodiment of the present application.
  • 6A is a schematic diagram of generating a two-dimensional code by a first terminal
  • 6B is a schematic diagram of a second terminal transmitting a two-dimensional code
  • 6C is a schematic diagram of transmitting a two-dimensional code by a first terminal
  • 6D is a schematic diagram of the first terminal opening a scan code application
  • 6E is a schematic diagram of the first terminal opening a scan code application
  • 6F is a schematic diagram of the first terminal opening a scan code application
  • 6G is a schematic diagram of the first terminal opening a scan code application
  • 6H is a schematic diagram showing a second terminal displaying a two-dimensional code
  • 6I is a schematic diagram of scanning a two-dimensional code by a first terminal
  • 6J is a schematic diagram of the first terminal scanning the two-dimensional code unlocking
  • 6K is a schematic diagram of the first terminal scanning the two-dimensional code unlocking
  • FIG. 7 is a schematic diagram of an embodiment of a method for unlocking a screen according to an embodiment of the present application.
  • FIG. 8A is a schematic diagram of a mobile phone setting a connected smart watch as a trusted unlocking device
  • 8B is a schematic diagram of a mobile phone setting a connected smart watch as a trusted unlocking device
  • 8C is a schematic diagram of a smart watch sending unlock information to a mobile phone
  • 8D is a schematic diagram of the distance between the mobile phone and the smart watch within a preset range
  • 8E is a schematic diagram showing whether the smart terminal is unlocked on the first terminal
  • FIG. 9 is a schematic diagram of an embodiment of a terminal in an embodiment of the present application.
  • FIG. 10 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 11 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 13 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 14 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • FIG. 15 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the terminals involved in the present application may be: a mobile phone, a tablet personal computer, a laptop computer, a digital camera, a personal digital assistant (PDA), a navigation device, and a mobile internet device ( Mobile Internet Device (MID) or Wearable Device, such as a wristband, watch, etc.
  • a mobile phone a tablet personal computer, a laptop computer, a digital camera, a personal digital assistant (PDA), a navigation device, and a mobile internet device ( Mobile Internet Device (MID) or Wearable Device, such as a wristband, watch, etc.
  • PDA personal digital assistant
  • MID Mobile Internet Device
  • Wearable Device such as a wristband, watch, etc.
  • FIG. 1 is a schematic diagram of a scenario applied to an embodiment of the present application.
  • the terminal unlock failed.
  • This application can solve the problem that the user cannot unlock the scene when the terminal screen unlocks the password.
  • the specific implementation may include the following methods: First, when the terminal sets or modifies the unlocking password, an unlocking terminal (also referred to as a trusted unlocking device) is set, and the unlocking terminal is used to unlock the terminal, so that the terminal enters the operation interface. . Second, when the terminal sets or modifies the unlock password, a unique scan code is generated, and the scan code includes the unlock password and the unique identifier of the terminal.
  • the unique identification code may be an international mobile equipment identity (IMEI) of the terminal, or may be a sequence number (SN), or may be another identification code to uniquely indicate different terminals.
  • IMEI international mobile equipment identity
  • SN sequence number
  • the unlock terminal or the scan code can be used to force the password to be cleared or the password is reset. Operation, or obtaining an unlocking password from the unlocking terminal to unlock the current terminal, or scanning a one-dimensional barcode, a two-dimensional code, a three-dimensional code, a four-dimensional code, etc. to unlock the current terminal.
  • FIG. 2 is a schematic diagram of an embodiment of a method for unlocking a screen in an embodiment of the present application.
  • the solution is an example of unlocking a terminal screen by unlocking a terminal, and specifically includes:
  • the first terminal sets an unlock password.
  • the lock screen means that the screen of the terminal is locked.
  • the first terminal supports unlocking the current screen by unlocking the password in the lock screen state.
  • the unlocking password type applied by the first terminal may include a password unlocking of a type such as a digital password, a sliding track, and a fingerprint.
  • the first terminal can set or modify the unlock password.
  • FIG. 3A is a schematic diagram of an unlock password set by the first terminal as a digital password.
  • FIG. 3B is a schematic diagram of the unlocking password set by the first terminal as a sliding track.
  • FIG. 3C is a schematic diagram of the unlock password set by the first terminal as a fingerprint.
  • terminal lock screens There are two main types of terminal lock screens: one is a lock screen with landscaping as the main function; the other is a lock screen with safety as the main function.
  • the lock screen When the lock screen is unlocked, it is necessary to input a password or draw a correct nine-square grid pattern.
  • the technical solution of the present application is applicable to a lock screen which is mainly used for security, and a lock screen which is mainly used for beautification, as long as it is a lock screen which requires a password input or a correct nine-square grid pattern to be unlocked.
  • the lock screen status is the lock status before unlocking, such as entering a password or drawing a correct nine-square grid pattern.
  • the lock screen is related to the black screen and the interest screen, and there are also differences.
  • the black screen state is a state in which the screen is not lit or not powered.
  • the status of the screen is in the off state. If the terminal is not locked (ie, the screen of the terminal is not locked), the user can press the power button to brighten the screen and directly enter the desktop; if the terminal is locked (ie, the screen of the terminal is locked), the user presses the power button.
  • Bright screen the terminal can display the lock screen interface in bright screen state.
  • the mobile phone defaults to the bright screen, it will not operate after the first preset time (such as 15s).
  • the second preset time such as 5s
  • the first terminal sets the second terminal to trust the unlocking device, and sends the authentication information to the second terminal.
  • the user sets the trust unlocking device for the first terminal
  • the first terminal may set the second terminal to trust the unlocking device while initially setting the unlocking password; After the password is used for a certain period of time, the user sets the second terminal to trust the unlocking device in consideration of the actual requirement; or when the user modifies the unlocking password of the first terminal, the trusted unlocking device is set for the first terminal.
  • the scenario in which the user sets the trusted unlocking device for the first terminal is not limited.
  • the unlocking password set by the first terminal is taken as an example of a sliding track.
  • the user can click “Done” or the next step, and a prompt box will pop up on the first terminal, prompting “Do you want to set the trust unlock device to prevent the password from being forgotten” and the like.
  • the first terminal may display an interface prompting the user to fill in the authentication information in response to the user's operation.
  • the authentication information may include, for example, a unique identifier of the first terminal and a unique identifier of the second terminal; or a unique identifier of the first terminal, a unique identifier of the second terminal, and an agreed password; or, the first terminal
  • the unique identifier of the first terminal is used to uniquely identify the first terminal
  • the unique identifier of the second terminal is used to uniquely identify the second terminal.
  • setting the appointment password is a way for security verification.
  • the unlocking password of the first terminal may be used when the first terminal fails to be unlocked, and the second terminal sends the unlocking password to the first terminal to unlock the first terminal.
  • the unique identification code the first terminal can automatically identify the acquisition, and the unique identification code of the second terminal can be manually input by the user.
  • FIG. 3D is a schematic diagram of the first terminal setting the second terminal as a trusted unlocking device.
  • the first terminal may use the hiShare, Bluetooth, Wireless Fidelity (WIFI), third-party application software account (such as micro-signal, QQ number, etc.), short message, etc. to the second terminal.
  • Send authentication information Further, the first terminal may prompt that the authentication information has been sent successfully, or may not be prompted, and is not limited.
  • the interaction between the terminals may include: a method of short-range wireless communication, for example, through Bluetooth, WIFI direct connection, etc.; one is to interact through a third-party server, such as WeChat, QQ, SMS These are all information relays through the server.
  • a method of short-range wireless communication for example, through Bluetooth, WIFI direct connection, etc.
  • a third-party server such as WeChat, QQ, SMS
  • the manner in which the second terminal is a trusted unlocking device is set.
  • the first terminal sends the authentication information to the second terminal, and after the user fills in the authentication information, the long-press operation is performed, and the first terminal responds to the long-press operation of the user, and displays “contact list, WeChat friend, QQ friend. Then, the user selects again. For example, if the address book is selected, the first terminal can display the contact in the address book, and the selected contact A can send the authentication information to the contact A by means of the short message; if the friend is selected, the WeChat friend is selected. The first terminal displays the WeChat friend, selects the friend B, and sends the authentication information to the friend B. It should be understood that the manner in which the first terminal determines the authentication information and the manner in which the authentication information is sent to the second terminal are not specifically limited.
  • the second terminal establishes a trust mechanism with the first terminal.
  • the second terminal receives the authentication information sent by the first terminal, where the authentication information includes the unique identifier of the first terminal and the unique identifier of the second terminal.
  • the unique identifier of the first terminal is used to indicate that the second terminal is determined to be the trust unlocking device of the first terminal; the unique identifier of the second terminal is used to match the identifier of the second terminal, and if the matching is successful, the second The terminal may default to the trust unlocking device of the first terminal, establish a trust mechanism with the first terminal, and save the unique identifier of the first terminal, that is, have the right to unlock the first terminal.
  • FIG. 3F is a schematic diagram of establishing a trust mechanism between the second terminal and the first terminal.
  • the second terminal may display a prompt message that the matching succeeds. If the match is unsuccessful, the trust mechanism fails to be established, and the second terminal has no right to unlock the first terminal.
  • FIG. 3G is a schematic diagram of establishing a trust mechanism between the second terminal and the first terminal.
  • the user can re-confirm the verification information, that is, the second terminal may prompt “Do you agree to unlock the device for the trust of the first terminal?” information. If the user clicks "Agree", the second terminal establishes a trust mechanism with the first terminal in response to the user's operation, and saves the unique identifier of the first terminal, and becomes the trust unlocking device of the first terminal, and the first terminal can be unlocked. If the second terminal responds to the user's operation, the first terminal fails to establish a trust mechanism with the first terminal, and the second terminal cannot unlock the first terminal.
  • FIG. 3H is a schematic diagram of establishing a trust mechanism between the second terminal and the first terminal.
  • the authentication information further includes an appointment password, and the appointment password is used to secure the authentication information. Therefore, the second terminal not only needs to match the unique identifier of the second terminal, but also needs to verify the agreement password. When both indicate success, the second terminal can default to the trust unlocking device of the first terminal, and establish trust with the first terminal. mechanism. If the verification of the agreed password by the second terminal fails or the unique identifier of the second terminal fails to match, the trust mechanism fails to be established.
  • FIG. 3I is a schematic diagram of establishing a trust mechanism between a second terminal and a first terminal.
  • the second terminal not only needs to match the unique identifier of the second terminal, but also needs to verify the agreed password. After the second terminal verifies the agreed password, the user can re-confirm the verification information, and the second terminal establishes a trust mechanism with the first terminal in response to the operation of the user.
  • the authentication information may further include an unlocking password of the first terminal.
  • the second terminal may send the unlock password of the first terminal to the first terminal after receiving the unlock request of the first terminal, where the unlock password is used for unlocking the first terminal.
  • the second terminal may also send an authentication response to the first terminal, where the authentication response is a response of the second terminal to the authentication request, and the first terminal is notified that the trust mechanism is successfully established.
  • the second terminal may perform a remote authorization operation on the first terminal, such as clearing a password, forcibly locking, and shutting down.
  • the forced locking can be understood as the first terminal is lost or not found, and the user information is leaked.
  • the second terminal can be remotely operated to lock the first terminal.
  • the forced lock can also be understood as the first terminal does not set the unlock password, but the user loses the first terminal, and the second terminal can set the unlock password for the first terminal to lock the first terminal. It can be understood that the authentication information received by the second terminal may or may not be displayed on the display screen.
  • the first terminal sends an unlock request to the second terminal in response to the operation of the user.
  • the first terminal sends an unlock request to the second terminal in response to the operation of the user, where the unlock request includes the unique identifier of the first terminal and the unique identifier of the second terminal.
  • the unique identifier of the first terminal is used to perform a verification action on the second terminal, and the unique identifier of the second terminal is used to find the second terminal that sends the unlock request, that is, the object that sends the unlock request.
  • the sending, by the first terminal, the unlocking request to the second terminal may include, but is not limited to, the following implementation manners:
  • FIG. 4A is a schematic diagram of a first terminal sending an unlock request to a second terminal. It should be understood that, as shown in FIG. 4A, the number of unlockings of the first terminal within the preset duration is used up, and the prompt message “Is the unlocking device unlocked by the trusted device?” or “whether the password is cleared by the trusted device” is displayed. The user can select “Yes” or “No” according to the requirement. If “Yes” is selected, the first terminal sends an unlock request to the second terminal in response to the operation of the user.
  • the first terminal may be automatically triggered to send an unlock request to the second terminal, and the user is not required to select whether to unlock the device by trusting the unlocking device.
  • FIG. 4B is a schematic diagram of a first terminal sending an unlock request to a second terminal.
  • the unlocking password input by the user for the first time fails to be unlocked, or the unlocking password input for the second time fails to be unlocked, the user may choose to trust the unlocking device to unlock, and the first terminal responds to the user's operation to The second terminal sends an unlock request.
  • the first terminal may display a prompt message, for example, “the remaining 2 unlock opportunities, if the continuous error 3 times will be locked for 3 hours, you can choose to trust the device to unlock”.
  • the first terminal sends an unlock request to the second terminal in response to the unlocking operation input by the user in the lock screen state.
  • 4C is a schematic diagram of a first terminal sending an unlock request to a second terminal. It should be understood that, as shown in FIG. 4C, the user can directly select the trusted device to unlock in the lock screen state, and the first terminal sends an unlock request to the second terminal in response to the user's operation.
  • the first terminal displays the first prompt information, and the first prompt information is used to prompt the user to send an unlock request to the second terminal, if the number of times the unlocking fails is greater than or equal to the preset threshold.
  • the first terminal acquires an operation of the user based on the first prompt information, and sends an unlock request to the second terminal.
  • the first terminal acquires the identity authentication information input by the user in the lock screen state; if the identity authentication information input by the user matches the preset identity authentication information, the first terminal sends an unlock request to the second terminal.
  • the identity authentication information can be the name of the parent, the favorite movie, the most impressive thing, and the like.
  • the first terminal presents the second prompt information in the lock screen state, the second prompt information includes the contact manner of the at least two contacts, and the second prompt information is used to prompt the user to select the contact to be sent the unlock request; a terminal acquires a user input selection operation; if the contact for which the operation is selected is a preset contact, the first terminal sends an unlock request to the second terminal, and the second terminal is a terminal corresponding to the preset contact; The contact is not a preset contact, and the first terminal triggers an alarm prompt.
  • the unlock request may be sent by using hiShare, Bluetooth, wireless fidelity, short message, Universal Serial Bus (USB), etc., and is not specifically limited herein. .
  • the second terminal verifies the unlock request, and sends the unlock information to the first terminal.
  • FIG. 4D is a schematic diagram of the second terminal sending the unlocking information.
  • the unlocking information is information for unlocking the first terminal.
  • the unlocking request may include a unique identifier of the first terminal, where the unique identifier of the first terminal is used to uniquely identify the first terminal; if the unique identifier of the first terminal is the same as the unique identifier previously saved by the second terminal, The second terminal sends the unlocking information to the first terminal, where the unlocking information is used to perform a related operation of releasing the lock screen state of the first terminal.
  • the second terminal verifies the unlocking request, and sends the unlocking information to the first terminal, which may include the following situations:
  • the unlock request includes a unique identifier of the first terminal and a unique identifier of the second terminal. If the second terminal determines that the identification code of the first terminal matches the identification code of the first terminal in the verification information, the verification succeeds, and the second terminal verifies that the unique identification code of the second terminal matches the unique identification code of the second terminal, and the verification succeeds. The first terminal sends the unlocking information to the second terminal.
  • the unlocking request includes a unique identifier of the first terminal, a unique identifier of the second terminal, and an agreed password.
  • the second terminal also needs to verify the agreement password included in the unlocking request, that is, if the unique identifier of the first terminal, the unique identifier of the second terminal, and the agreed password are all successfully verified, the second terminal sends the unlocking information to the first terminal.
  • the second terminal displays a prompt message similar to “Friend A requests unlocking, is it determined that the terminal of the friend A is unlocked?”, the user Other identifiers such as "OK” or “Yes” may be clicked, and the second terminal sends the unlock information to the second terminal in response to the user's operation.
  • the second terminal displays a prompt message, similar to “Friend A requests unlocking, and is determined to be friend A.
  • the terminal unlocks?", the user can click other identifiers such as "OK” or "Yes", and the second terminal sends the unlock information to the second terminal in response to the user's operation.
  • the identity authentication information input by the user is obtained; if the identity authentication information input by the user matches the preset identity authentication information, the second terminal sends the unlocking information to the first terminal.
  • the unlocking information may include a first unlocking password of the first terminal, and the first unlocking password is used to unlock the first terminal.
  • the unlocking information may include a first unlocking password of the first terminal, and then unlocking the first terminal and then displaying the lock screen.
  • the password setting interface is used for the user to reset the unlocking password; or the unlocking information is used to forcibly clear the first unlocking password of the first terminal, that is, the unlocking password of the first terminal is cleared, and the operation interface is entered; Alternatively, the unlocking information is used to forcibly clear the first unlocking password of the first terminal, and then display the lock screen password setting interface, where the lock screen password setting interface is used for the user to reset the second unlocking password.
  • the manner in which the second terminal sends the unlocking information to the first terminal may be: for example, the unlocking password included in the unlocking information is a digital password, and the second terminal may use a short message, a notification, a WeChat message, a QQ message, etc.
  • the first terminal sends a digital password.
  • the unlocking code included in the unlocking information is a sliding track, and the second terminal may send a picture indication of the sliding track to the first terminal, where the picture indication may be sent to the first terminal by using a short message, a notification, a WeChat message, a QQ message, or the like.
  • the user can refer to the sliding track displayed by the picture and slide the unlocking password to unlock the first terminal.
  • the unlocking password included in the unlocking information is a fingerprint, and the second terminal may send the fingerprint to the first terminal by using a short message, a notification, or the like in a picture manner, and the first terminal automatically recognizes the fingerprint to unlock.
  • the unlocking information may also be sent by means of hiShare, Bluetooth, wireless fidelity, short message, USB, etc., which is not specifically limited herein.
  • the first terminal responds to the unlocking information, and performs a related operation of releasing the lock screen state.
  • the first terminal After receiving the unlocking information sent by the second terminal, the first terminal unlocks using the unlocking information. Specifically, the following situations may be included:
  • FIG. 4E is a schematic diagram of unlocking the first terminal.
  • the unlocking information includes a first unlocking password of the first terminal. If the first unlocking password is a digital password, the second terminal may send the message by using a short message, a notification, a WeChat message, a QQ message, etc., and the user may include the short message, the notification, the WeChat message, the QQ message, and the like presented on the lock screen interface.
  • the first unlock password manually enter the first unlock password to unlock the terminal.
  • the first unlocking password may be included in the unlocking information, and the first terminal automatically recognizes that the first unlocking password is unlocked.
  • first terminal displays the first unlocking password may also depend on the manner in which the second terminal sends the unlocking information to the first terminal. If it is a short message, it is usually displayed, and if it is other information, it may not be displayed.
  • the first terminal may directly display the sliding information on the unlocking interface in the idle position of the unlocking interface, and the user refers to the input sliding track to unlock or automatically recognize the filling sliding track. Unlock. If the first unlocking password is a fingerprint, the first terminal may directly recognize the fingerprint to unlock.
  • FIG. 4F is a schematic diagram of unlocking the first terminal. As shown in FIG. 4F, after the first terminal is unlocked according to the unlocking information, the lock screen password setting interface may also be displayed, and the user may reset the second unlocking password for the first terminal.
  • FIG. 4G is a schematic diagram of unlocking the first terminal.
  • the first terminal forcibly clears the first unlocking password according to the unlocking information, that is, the first terminal forcibly clears the previously set first unlocking password, and can directly enter the operation interface, before the password is reset next time. Will enter the lock screen state again.
  • FIG. 4H is a schematic diagram of unlocking the first terminal.
  • the first terminal may also display a lock screen password setting interface, and the user may reset the second unlocking password for the first terminal.
  • the trusted unlocking device may also be selected. If not, the second unlocking device may continue to be the trusted unlocking device of the first terminal.
  • first The terminal may further send the reset second unlocking password to the second terminal; the second terminal may receive the second unlocking password sent by the first terminal.
  • the resetting the lock screen password setting interface for the first terminal may include: displaying, by the first terminal, the lock screen password setting interface after unlocking according to the first unlock password or forcibly clearing the first unlock password.
  • the user can set a trust unlocking device for the terminal device, and the unlocking device can perform the unlocking operation when the password is forgotten.
  • the user is provided with a method of unlocking without clearing the terminal data; the security of the unlocking can be ensured by verifying the unique identifier of the trusted unlocking device (for example, binding the family's mobile phone).
  • FIG. 5 is a schematic flowchart of a method for unlocking a screen in an embodiment of the present application. As shown in FIG. 5, the method includes:
  • the first terminal sets an unlock password.
  • the first terminal supports setting the unlocking password, and can cancel the lock screen state of the first terminal by using the set unlocking password
  • the applied unlocking password type may include a digital password, a sliding track, a fingerprint, and the like.
  • the password is unlocked.
  • the first terminal generates a first scan code.
  • the first terminal when the first terminal sets or modifies the unlock password, the first terminal may generate the first scan code.
  • the first scan code is used to carry related information of the unlock password of the first terminal, so that the first terminal may perform an unlock-related operation when scanning the first scan code.
  • the information carried by the first scan code includes, but is not limited to, the following description:
  • the information carried by the first scan code may include a unique identifier of the first terminal and a first unlock password of the first terminal, where the unique identifier of the first terminal is used to uniquely identify the first terminal; the first unlock password may be In the case of the first terminal lock screen, the lock screen state of the first terminal is released, and the unique identifier of the first terminal is used to determine that the first scan code is only the scan code of the unlocking state of the first terminal.
  • the information carried by the first scan code includes a user identifier and a first unlock password of the first terminal, where the user identifier is used to uniquely identify the user of the first terminal.
  • the user identifier may be the user's identity authentication information (such as ID number, passport number, social security number, etc.).
  • the information carried by the first scan code includes the unique identification code of the first terminal, the user identifier, and the first unlock password of the first terminal.
  • the information carried by the first scanning code includes the first indication information for clearing the first unlocking password of the first terminal, that is, after the first terminal scans the first scanning code, the first unlocking password of the first terminal may be cleared. The first terminal is released from the lock screen state.
  • the information carried by the first scan code includes skipping the second indication information of the first terminal to enter the first unlock password, that is, after the first terminal scans the first scan code, the first unlock password may be automatically skipped.
  • the interface thereby releasing the lock screen state of the first terminal.
  • the first scan code may be a one-dimensional barcode, a two-dimensional code, a three-dimensional code, or a four-dimensional code.
  • the two-dimensional code may include an unlock password and a unique identifier of the first terminal, and the unique identifier of the first terminal may be an identifier such as IMEI or SN.
  • FIG. 6A is a schematic diagram of generating a two-dimensional code by the first terminal. In the picture In the example shown in FIG. 6A, when the user sets the unlock password, the user may generate a prompt message, and generate a two-dimensional code according to the determination operation that the user clicks in the prompt information.
  • the unlock password is 123456 and the IMEI is 866369030001848.
  • the generated two-dimensional code can include these two pieces of information.
  • the unique identification code of the first terminal may be automatically obtained, and the unlocking password may be manually input by the user, or the first terminal may automatically obtain the unlocking password set or modified by the user.
  • the first terminal may generate more than one two-dimensional code. If the unlock password is modified once, the first terminal generates a two-dimensional code, and may also prompt the last generated two-dimensional code to be invalid, whether to delete information such as deletion.
  • the two-digit code displayed by the second terminal is effectively ensured to be the latest unlocked two-dimensional code, and the first terminal can be unlocked.
  • the first terminal sends a first scan code to the electronic device.
  • the user may also fill in or select an account that saves the first scan code.
  • the account number is an email address, a network disk address, etc.
  • the first terminal sends the first scan code to the server, that is, the electronic device is a server; if the account number is a mobile phone number, a WeChat account, a QQ account, and a Weibo account Then, the first terminal sends the first scan code to the second terminal, that is, the electronic device is the second terminal.
  • FIG. 6B is a schematic diagram of a second terminal transmitting a two-dimensional code.
  • the first terminal can directly send the two-dimensional code to the email address "12345678@qq.com".
  • the first terminal may further send a short message to the second terminal corresponding to the first mobile phone number in the mobile phone address book by using a short message, where the short message may include a two-dimensional code; of course, the first mobile phone number corresponds to the first A contact is usually a family member, a friend, a classmate, etc. that the user thinks is relatively reliable.
  • FIG. 6C is a schematic diagram of transmitting a two-dimensional code by the first terminal.
  • the user may not fill in or save the account of the two-dimensional code.
  • the user may perform a long press operation on the two-dimensional code.
  • the first terminal responds to the operation of the user pressing the two-dimensional code (that is, the duration of the user pressing the two-dimensional code exceeds the preset threshold), and displays the sent list, such as information, WeChat, QQ, Sina Weibo, Alipay, and the like. If the user clicks on WeChat, the first terminal user's WeChat friend list can be displayed, the target friend is selected, and the QR code is sent to the target friend. It should be understood that the target friend may also be the first terminal user's own account, that is, the second terminal may log in to the account of the first terminal user to save or display the two-dimensional code.
  • step 503 is an optional step.
  • the first terminal may also print the first scan code and store it in a relatively safe place, for example, a safe. After the user of the first terminal forgets to unlock the password, the first terminal may scan the first scan code to release the lock screen state of the first terminal.
  • the first terminal opens the scan code application in response to a user input operation in a lock screen state.
  • the unlock-related operation can be performed according to the previously saved first scan code.
  • the information stored in the first scan code can be obtained by opening a viewfinder window of a scan code application (such as a camera, an independent scan code application) and reading the first scan code.
  • a scan code application such as a camera, an independent scan code application
  • the user can implement this function in the following ways:
  • FIG. 6D is a schematic diagram of the first terminal opening the scan code application.
  • the first terminal receives the unlock password input by the user, and the number of times the unlocking fails reaches the upper limit within the preset duration.
  • the user can manually select the unlock function using the two-dimensional code, and the first terminal responds to the operation selected by the user, and opens. Scan code application.
  • FIG. 6E is a schematic diagram of the first terminal opening the scan code application. As shown in FIG. 6E, the first terminal receives the unlock password input by the user, and the number of times the unlocking fails reaches the upper limit within the preset duration, and directly triggers the first terminal to automatically open the scan code application.
  • FIG. 6F is a schematic diagram of the first terminal opening the scan code application. As shown in FIG. 6F, the first terminal receives the unlock password input by the user, and the unlocking fails. The user can manually select the scan code unlocking function, and the first terminal responds to the user's operation to open the scan code application.
  • FIG. 6G is a schematic diagram of the first terminal opening the scan code application.
  • the first terminal displays the input password unlocking and the scan code unlocking at the initial time.
  • the first terminal opens the scan code application in response to the user's operation.
  • the first terminal presents the user prompt information, and the user prompt information is used to prompt the user whether to open the scan code application; The user opens the scan code application based on the operation of the user prompt information.
  • the first terminal acquires the identity authentication information input by the user in the lock screen state; if the identity authentication information input by the user matches the preset identity authentication information, the first terminal opens the scan code application.
  • the identity authentication information may be a secret question, such as a parent's name, a favorite movie, or the most impressive thing, or a user's input of biometrics for verification.
  • the first terminal is in the responsive to the scan code operation of the scan code application, and the lock screen state is released, which may be implemented by the following steps 505 and 506, or may be other implementation manners, and is not specifically limited. .
  • the second terminal displays the first scan code.
  • the first scan code may be saved in the second terminal or may be stored in the server.
  • the QR code is stored in the email address, the network disk address, the Weibo account, the WeChat account, and the QQ account; it can also be saved in the library of the second terminal, or can be saved in the short message.
  • the second terminal may view the short message sent by the first terminal to display the two-dimensional code; or the second terminal login email address may display the two-dimensional code, as shown in FIG. 6H, and FIG. 6H shows the second terminal displaying the two-dimensional code.
  • the second terminal may log in to other accounts such as WeChat, QQ, Sina Weibo, and cloud to view and display the QR code sent by the first terminal.
  • step 505 is an optional step.
  • the first terminal cancels the lock screen state in response to the scan code operation of the scan code application.
  • the object of the scan code operation is a scan code
  • the first terminal cancels the lock screen state in response to the scan code operation of the scan code application and may include: the first terminal responds to the scan code application If the information carried by the scan code does not match the preset information, the method may further include: if the information carried by the scan code matches the preset information, the lock screen state is cancelled; The first terminal presents prompt information.
  • the prompt information may be a scan code error or an alarm prompt.
  • the first terminal uses the scan code application to scan the first scan code displayed by the second terminal to cancel the lock screen state of the first terminal.
  • FIG. 6I is a schematic diagram of scanning a two-dimensional code by a first terminal. It should be understood that, in FIG. 6I, the unlock code and the unique identifier of the first terminal are included in the two-dimensional code, and the unique identifier of the first terminal may be determined again as the unlocked two-dimensional code of the first terminal, or there may be several
  • the unlock password set by the terminal is the same.
  • the QR code includes only the unlock password.
  • the other terminal scans the QR code, it can also be unlocked, which cannot effectively guarantee its security.
  • the unlock password of the first terminal can be unlocked.
  • FIG. 6J is a schematic diagram of the first terminal scanning the two-dimensional code unlocking.
  • the first terminal opens the scan code application in the lock screen state.
  • the first terminal scans the two-dimensional code for information verification, and if the verification is successful, it can be automatically unlocked.
  • FIG. 6K is a schematic diagram of the first terminal scanning the two-dimensional code unlocking. As shown in FIG. 6K, the first terminal scans the two-dimensional code for information verification. If the verification succeeds, the password reset interface is automatically displayed, and the user can reset the password. New unlock password. If the verification fails, you can prompt that the verification information does not match and no other operations are performed.
  • the information carried in the two-dimensional code includes skipping the second indication information of the first terminal to enter the first unlocking password
  • the first input may be automatically skipped.
  • the password unlocking interface is unlocked, thereby unlocking the first terminal.
  • a threshold may also be set for the number of times the first terminal scans the two-dimensional code not unlocked. For example, if the first terminal scans the QR code 5 times in a row and has not unlocked it, then in the next 3 hours, the function of scanning the QR code is prohibited to prevent the malicious elements from using the function of scanning the QR code to unlock. Get user information.
  • the first terminal may send a two-dimensional code request to the second terminal when the scan code application is opened, and the second terminal may send the two-dimensional code to the first terminal according to the two-dimensional code request.
  • a terminal receives a two-dimensional code picture, it can automatically scan and recognize the two-dimensional code to unlock. It can effectively avoid the problem that only the first terminal is currently available, and the second terminal does not display the two-dimensional code, so that the first terminal cannot be unlocked.
  • the first terminal if the first unlocking password of the first terminal is updated to the second unlocking password, the first terminal generates a second scanning code according to the second unlocking password and the unique identifier of the first terminal; or, the first terminal periodically The current unlocking password and the unique identification code of the first terminal update the first scan code to generate a third scan code.
  • the regenerated second scan code or the third scan code may be sent to the second terminal or server automatically or manually by the user.
  • the scan code application may be other applications such as a camera, that is, the camera has functions of scanning a barcode, a two-dimensional code, a three-digit code, a four-dimensional code, and the like.
  • the user may generate a unique scan code for the terminal, and the scan code may be a barcode, a two-dimensional code, a three-digit code, a four-dimensional code, or the like.
  • the two-dimensional code is mainly taken as an example, and other scan codes are similar.
  • the scan code includes the unique identifier of the first terminal and the unlock password, so when the user forgets to unlock the password, the unlock operation can be performed by scanning the two-dimensional code.
  • the user is provided with a way to unlock the password without forgetting the terminal data when unlocking the password; by using the unlock password and the unique identification code of the terminal to generate the two-dimensional code, the uniqueness of the unlocking key is ensured, and the unlocking is improved. Security.
  • FIG. 7 is a schematic diagram of an embodiment of a method for unlocking a screen according to an embodiment of the present disclosure, including:
  • the first terminal sets an unlock password.
  • the first terminal supports setting the unlocking password, and can cancel the lock screen state of the first terminal by using the set unlocking password
  • the applied unlocking password type may include a digital password, a sliding track, a fingerprint, and the like.
  • the password is unlocked.
  • the first terminal may set or modify the unlocking password.
  • the first terminal sets the second terminal that is connected to the first terminal to be a trusted unlocking device.
  • the first terminal uses a mobile phone as an example
  • the second terminal uses a smart watch as an example for description.
  • Figure 8A A schematic diagram of setting up a connected smart watch as a trusted unlock device for the phone in the settings.
  • the mobile phone can first establish a Bluetooth connection with the smart watch, and then set the smart watch as the trust unlocking device of the mobile phone in the setting.
  • FIG. 8B is a schematic diagram of setting a connected smart watch as a trusted unlocking device in a smart watch application.
  • an APP of a smart watch is installed on the mobile phone, and the user can open the application of the smart watch installed on the mobile phone, and set the smart watch as the trust unlocking device of the mobile phone.
  • the smart watch connected to the mobile phone may be set as the trust unlocking device of the mobile phone; or, the unlock password may be set on the mobile phone, after a period of time, the user considers the actual demand. , you can enter the setting interface again, set the smart watch connected to the phone to unlock the device for the trust of the phone.
  • connection with the first terminal herein may refer to a scenario where the first terminal and the second terminal Bluetooth are connected or the USB is being connected, or the first terminal and the second terminal are connected before the Bluetooth or the previous USB connection.
  • the first terminal may send an indication information to the second terminal, where the indication information includes a Bluetooth address of the first terminal, where the indication information is used to notify the second terminal that The unlocking device of a terminal can unlock the first terminal.
  • the first unlocking password of the first terminal may also be sent to the second terminal.
  • each Bluetooth-enabled device has a Bluetooth address.
  • the mobile phone can save the Bluetooth address of each terminal. If the mobile phone sets one or more terminals with established Bluetooth connection to the trusted unlocking device, the mobile phone will save an identifier or Instructions. As shown in Table 1 below, the mobile phone saves the Bluetooth address of the device that establishes a Bluetooth connection with the mobile phone and whether it is a sample information for trusting to unlock the device.
  • the corresponding device type such as a mobile phone, a wristband, a notebook, etc.
  • Table 1 which is not limited herein.
  • the first terminal acquires unlocking information.
  • the unlocking information acquired by the first terminal may be an unlocking request sent by the first terminal to the second terminal, and the unlocking information sent by the second terminal to the first terminal according to the unlocking request may also be the second The unlocking information sent by the terminal to the first terminal is not required to send the unlocking request by the first terminal.
  • the sending, by the first terminal, the unlocking request to the second terminal includes but is not limited to the following implementation manners:
  • the first terminal in the lock screen state in response to the unlocking operation input by the user, may determine that the trust unlocking device of the first terminal is the second terminal according to the above table 1, and send an unlock request to the second terminal (refer to As shown in FIG. 4C, the second terminal feedbacks the unlock information according to the unlock request.
  • the first terminal sends an unlock request to the second terminal in response to the unlocking operation input by the user (refer to FIG. 4B).
  • the first terminal presents the first prompt information, and the first prompt information is used to prompt the user whether to send to the second terminal, if the number of times the unlocking fails is greater than or equal to the first preset threshold.
  • the unlocking request the first terminal acquires an operation of the user based on the first prompt information, and sends an unlock request to the second terminal.
  • the first terminal sends an unlock request to the second terminal if the duration of the second terminal is greater than or equal to the second preset threshold in the preset range.
  • the first terminal presents the second prompt information in the lock screen state, the second prompt information includes the contact manner of the at least two contacts, and the second prompt information is used to prompt the user to select the contact to be sent the unlock request; a terminal acquires a user input selection operation; if the contact for which the operation is selected is a preset contact, the first terminal sends an unlock request to the second terminal, and the second terminal is a terminal corresponding to the preset contact; The contact is not a preset contact, and the first terminal triggers an alarm prompt.
  • the above-mentioned unlocking request includes the Bluetooth address of the first terminal, and the second terminal can perform authentication to establish the trust unlocking device with the first terminal, and the Bluetooth address included in the indication information sent to the second terminal is the same, if the same The second terminal sends the unlocking information to the first terminal.
  • the sending, by the second terminal, the unlocking information to the first terminal may further include:
  • the second terminal receives the unlock operation input by the user, and sends the unlock information to the first terminal.
  • FIG. 8C is a schematic diagram of a smart watch sending unlock information to a mobile phone.
  • the unlocking identifier is an identifier that can unlock the mobile phone
  • the user clicks the unlocking identifier and the second terminal responds to the user's clicking operation, and pops up a prompt message to re-confirm to the user whether to send the unlocking information to the mobile phone.
  • the second terminal sends the unlocking information to the first terminal; the first terminal receives the unlocking information in the lock screen state.
  • the first terminal determines whether the second terminal is the connected trusted unlocking device set by the first terminal, and if yes, the first terminal uses the unlocking information to unlock.
  • the second terminal If the second terminal detects the first terminal within the preset range, the second terminal sends the unlocking information to the first terminal.
  • the second terminal If the second terminal detects that the duration of the first terminal is greater than a preset threshold within the preset range, the second terminal sends the unlocking information to the first terminal.
  • FIG. 8D is a schematic diagram of the distance between the mobile phone and the smart watch within a preset range.
  • the second terminal detects the first terminal within the preset distance range (L), or detects that the duration of the first terminal reaches a preset threshold, and sends the unlocking information to the first terminal, where the first terminal is In the lock screen state, the unlocking information is received.
  • the first terminal determines whether the second terminal is the connected trusted unlocking device set by the first terminal according to the foregoing table 1. If yes, the first terminal uses the unlocking information. Unlock.
  • the first terminal detects the second terminal in the preset range (L) in the lock screen state, or detects that the duration of the second terminal reaches a preset threshold, and may determine that the first terminal is according to Table 1 above.
  • the second device is trusted to unlock the device, and the second terminal sends an unlock request to the second terminal, and the second terminal feeds back the unlock information according to the unlock request.
  • the unlocking information may include a first unlocking password of the first terminal, where the first unlocking password is used to unlock the first
  • the unlocking information may include a first unlocking password of the first terminal, and then unlocking the first terminal and then displaying a lock screen password setting interface, where the lock screen password setting interface is used for the user to reset the unlock password; or, the unlocking information is used.
  • Forcibly clearing the first unlocking password of the first terminal that is, the unlocking password of the first terminal is cleared, and entering the operation interface; or, the unlocking information is used to forcibly clear the first unlocking password of the first terminal, and then displaying the lock screen password setting interface.
  • the lock screen password setting interface is used for the user to reset the second unlock password.
  • the first terminal sends an unlock request to the second terminal, or when the second terminal sends the unlock information to the first terminal, the first terminal and the second terminal are in a state in which the Bluetooth is being connected.
  • the first terminal responds to the unlocking information, and performs a related operation of releasing the lock screen state.
  • the first terminal responds to the unlocking information, and performs related operations for releasing the lock screen state, which may include, but is not limited to, the following implementation manners:
  • the first terminal may be unlocked using the first unlocking password. For details, refer to FIG. 4E above, and details are not described herein again.
  • the first terminal may unlock the unlocking information and display a lock screen password setting interface, and the user may reset the second unlocking password.
  • the first terminal may use the unlocking information to clear the first unlocking password. For details, refer to FIG. 4G above, and details are not described herein again.
  • the first terminal may use the unlocking information to clear the first unlocking password and display the lock screen password setting interface, and the user may reset the second Unlock your password.
  • the unlocking information includes the indication information for clearing the unlocking password and the indication information for resetting the unlocking password
  • the first terminal may use the unlocking information to clear the first unlocking password and display the lock screen password setting interface, and the user may reset the second Unlock your password.
  • the first terminal may also identify whether the smart watch is connected and set to trust and unlock the device, and if the verification is successful, the device can be unlocked; or the password is reset, or the password is cleared, or Reset the password and clear the password. That is, the unlocking information may further include a Bluetooth address of the second terminal.
  • FIG. 8E is a schematic diagram showing whether the smart terminal is unlocked on the first terminal. It should be understood that the unlocking information sent by the second terminal to the first terminal may not be requested by the first terminal. In this case, as shown in FIG. 8E, when the first terminal receives the unlocking information, the user may give a prompt to the user. Information, such as "Do you want to unlock through a smart watch?" and other similar information to ensure the security of the first end user information.
  • the user when the user forgets to unlock the password, the user can unlock by using the trusted unlocking device that the terminal has connected.
  • the trusted unlocking device that the terminal has connected.
  • the first terminal if the first terminal is in a black screen state, if the unlocking information sent by the second terminal is received, the unlocking information includes a unique identifier of the first terminal and an unlocking password, where the unlocking password is used to cancel the first terminal.
  • the first terminal may be configured to receive the unlocking information sent by the second terminal, the first terminal lights up the screen, enters the lock screen state, presents a lock screen interface, and automatically fills the unlock password on the lock screen interface; Lock screen status.
  • the black screen state is a state in which the screen is not lit or is not powered.
  • the first terminal After the first terminal receives the unlocking information sent by the second terminal, the first terminal illuminates the screen in response to receiving the unlocking information sent by the second terminal.
  • the screen enters the lock screen state and presents a lock screen interface, and the unlock password is automatically filled on the lock screen interface to release the lock screen state.
  • the first terminal may also receive the unlocking information sent by the second terminal, light the screen, enter the lock screen state, and present a lock screen interface, and the user manually inputs the unlocking password according to the prompt in the unlocking information to release the first terminal. Lock screen status.
  • the first terminal detects that the second terminal is within a preset distance range (eg, 5 cm)
  • the first terminal sends an unlock request to the second terminal, where the unlock request is used to request the second terminal to release the a lock screen state of the terminal, the first request includes a unique identifier of the first terminal and a unique identifier of the second terminal;
  • the first terminal receives the unlock information sent by the second terminal, and the unlock information is a response of the second terminal to the unlock request
  • the unlocking information includes a unique identifier of the second terminal and an unlocking password, where the unlocking password is used to cancel the lock screen state of the first terminal; in response to receiving the unlocking information, the first terminal presents a lock screen interface, and automatically fills the lock screen interface. Unlock the password and unlock the lock screen.
  • the first terminal if the first terminal detects the second terminal within the preset distance range, the first terminal sends an unlock request to the second terminal, and receives the unlock information sent by the second terminal, in response to receiving To the unlocking information, the first terminal presents a lock screen interface, and the unlock password is automatically filled on the lock screen interface to release the lock screen state.
  • the first terminal may also display a lock screen interface in response to receiving the unlock information sent by the second terminal, and the user manually inputs the unlock password according to the prompt in the unlock information to cancel the lock screen state of the first terminal.
  • the first terminal automatically sends an unlock request to the second terminal, where the first terminal detects that the second terminal is within the preset distance range. And the first terminal sends an unlock request to the second terminal when the duration of the second terminal in the preset distance range is greater than the preset time threshold.
  • FIG. 9 is a schematic diagram of an embodiment of a terminal according to an embodiment of the present application, including:
  • the sending module 901 is configured to: send, by the first terminal, an unlock request to the second terminal in a lock screen state, where the unlock request includes a unique identifier of the first terminal and a unique identifier of the second terminal, where the unique identifier of the first terminal is used by The unique identifier of the second terminal is used to uniquely identify the first terminal, and the unique identifier of the second terminal is used to uniquely identify the second terminal;
  • the receiving module 902 is configured to receive the unlocking information sent by the second terminal, where the unlocking information is a response of the second terminal to the unlocking request.
  • the unlocking module 903 is configured to perform a related operation of releasing the lock screen state in response to the unlocking information.
  • FIG. 10 is a schematic diagram of another embodiment of a terminal according to an embodiment of the present application, including:
  • the receiving module 1001 is configured to receive an unlocking request sent by the first terminal, where the unlocking request includes a unique identifier of the first terminal, where the unique identifier of the first terminal is used to uniquely identify the first terminal;
  • the sending module 1002 is configured to: if the unique identifier of the first terminal is the same as the unique identifier previously saved by the second terminal, send the unlocking information to the first terminal, where the unlocking information is used to perform the function of releasing the lock screen state of the first terminal. operating.
  • the terminal shown in FIG. 9 and FIG. 10 can be used to perform the method shown in FIG. 2, and the same or corresponding technical features can be referred to each other, and details are not described herein.
  • FIG. 11 is a schematic diagram of another embodiment of a terminal according to an embodiment of the present application, including:
  • the opening module 1101 is configured to open a scan code application in response to a user input operation in a lock screen state
  • the release module 1102 is configured to cancel the lock screen state in response to the scan code operation of the scan code application.
  • the terminal shown in FIG. 11 can be used to perform the method shown in FIG. 5, and the same or corresponding technical features can be referred to each other, and details are not described herein.
  • FIG. 12 is a schematic diagram of another embodiment of a terminal according to an embodiment of the present application, including:
  • the receiving module 1201 is configured to: when the first terminal is in a lock screen state, receive the unlocking information sent by the second terminal, where the second terminal is a terminal that establishes a communication connection with the first terminal;
  • the unlocking module 1202 is configured to: clear the first unlocking password of the first terminal according to the unlocking information, or cancel the lock screen state of the first terminal according to the first unlocking password included in the unlocking information.
  • the terminal shown in FIG. 12 can be used to perform the method shown in FIG. 7, and the same or corresponding technical features can be referred to each other, and details are not described herein.
  • FIG. 13 is a schematic diagram of another embodiment of a terminal according to an embodiment of the present application, including:
  • the receiving module 1301 is configured to: when the first terminal is in a black screen state, receive the unlocking information sent by the second terminal, where the unlocking information includes a unique identifier of the first terminal and an unlocking password, where the unlocking password is used to cancel the lock screen state of the first terminal;
  • the display module 1302 is configured to: in response to receiving the unlocking information sent by the second terminal, the first terminal lights up the screen, enters a lock screen state, presents a lock screen interface, and automatically fills the unlock password on the lock screen interface;
  • the unlocking module 1303 is configured to release the lock screen state.
  • FIG. 14 is a schematic diagram of another embodiment of a terminal according to an embodiment of the present application, including:
  • the sending module 1401 is configured to: if the first terminal detects that the second terminal is within the preset distance range, send an unlock request to the second terminal, where the unlock request is used to request the second terminal to cancel the lock screen state of the first terminal, the first request Including a unique identifier of the first terminal and a unique identifier of the second terminal;
  • the receiving module 1402 is configured to receive the unlocking information sent by the second terminal, where the unlocking information is a response of the second terminal to the unlocking request, where the unlocking information includes a unique identifier of the second terminal and an unlocking password, where the unlocking password is used to cancel the first terminal. Lock screen status;
  • the display module 1403 is configured to: in response to receiving the unlocking information, the first terminal presents a lock screen interface;
  • the unlocking module 1404 is configured to automatically fill the unlocking password on the lock screen interface to release the lock screen state.
  • the sending module 1401 is specifically configured to send an unlock request to the second terminal if the first terminal detects that the second terminal is within the preset distance range, and the duration of the second terminal in the preset distance range is greater than the preset time threshold. .
  • the embodiment of the present application further provides a schematic diagram of an embodiment of a terminal.
  • FIG. 15 for the convenience of description, only parts related to the embodiment of the present application are shown. For details that are not disclosed, refer to the implementation of the present application. Example method section.
  • the terminal shown in FIG. 15 may be used to perform the method shown in FIG. 2, FIG. 5, or FIG. 7, and the same or corresponding technical features may be referred to each other, and details are not described herein.
  • the terminal may include any terminal device such as a mobile phone, a tablet computer, a personal digital assistant (PDA), a point of sales (POS), a car computer, and the like. Take the terminal as a mobile phone as an example:
  • PDA personal digital assistant
  • POS point of sales
  • FIG. 15 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 1510 , a memory 1520 , an input unit 1530 , a display unit 1540 , a sensor 1550 , an audio circuit 1560 , a wireless fidelity (WiFi) module 1570 , and a processor 1580 .
  • RF radio frequency
  • the RF circuit 1510 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the processing is processed by the processor 1580. In addition, the data designed for the uplink is sent to the base station.
  • RF circuit 1510 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 1510 can also communicate with the network and other devices via wireless communication.
  • the memory 1520 can be used to store software programs and modules, and the processor 1580 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1520.
  • the memory 1520 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1520 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1530 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 1530 may include a touch panel 1531 and other input devices 1532.
  • the touch panel 1531 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1531 or near the touch panel 1531. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 1531 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1580 is provided and can receive commands from the processor 1580 and execute them.
  • the touch panel 1531 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1530 may also include other input devices 1532.
  • other input devices 1532 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1540 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 1540 can include a display panel 1541.
  • the display panel 1541 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1531 may cover the display panel 1541. After the touch panel 1531 detects a touch operation on or near the touch panel 1531, the touch panel 1531 transmits to the processor 1580 to determine the type of the touch event, and then the processor 1580 according to the touch event. The type provides a corresponding visual output on display panel 1541.
  • touch panel 1531 and the display panel 1541 are used as two independent components to implement the input and input functions of the mobile phone in FIG. 15, in some embodiments, the touch panel 1531 and the display panel 1541 may be integrated. Realize the input and output functions of the phone.
  • the handset may also include at least one type of sensor 1550, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may be based on ambient light
  • the brightness of the display panel 1541 is adjusted to close the display panel 1541 and/or the backlight when the handset is moved to the ear.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 1560, a speaker 1561, and a microphone 1562 can provide an audio interface between the user and the handset.
  • the audio circuit 1560 can transmit the converted electrical data of the received audio data to the speaker 1561, and convert it into a sound signal output by the speaker 1561.
  • the microphone 1562 converts the collected sound signal into an electrical signal, and the audio circuit 1560. After receiving, it is converted into audio data, and then processed by the audio data output processor 1580, sent to, for example, another mobile phone via the RF circuit 1510, or outputted to the memory 1520 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone through the WiFi module 1570 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
  • FIG. 15 shows the WiFi module 1570, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 1580 is a control center for the handset that connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1520, and invoking data stored in the memory 1520, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 1580 may include one or more processing units; preferably, the processor 1580 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1580.
  • the handset also includes a power source 1590 (such as a battery) that supplies power to the various components.
  • a power source 1590 such as a battery
  • the power source can be logically coupled to the processor 1580 via a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the structure of the terminal in the foregoing method embodiment may be based on the structure shown in FIG. 15.
  • the terminal structure shown in FIG. 15 may correspondingly perform the steps in the foregoing method embodiment, and details are not described herein again.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • wire eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be stored by a computer or a server, data center, etc. that includes one or more available media integrations. According to the storage device.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种屏幕解锁的方法及终端,用于第一终端在锁屏状态下可以通过第二终端发送的解锁信息解除锁屏状态。该方法包括:第一终端在锁屏状态下,向第二终端发送解锁请求(204),所述解锁请求包括所述第一终端的唯一识别码和所述第二终端的唯一识别码,所述第一终端的唯一识别码用于唯一标识所述第一终端,所述第二终端的唯一识别码用于唯一标识所述第二终端;所述第一终端接收所述第二终端发送的解锁信息(205),所述解锁信息为所述第二终端对所述解锁请求的响应,所述解锁信息包括所述第二终端的唯一识别码;所述第一终端响应所述解锁信息,执行解除所述锁屏状态的相关操作(206)。

Description

一种屏幕解锁的方法及终端 技术领域
本申请涉及终端应用领域,尤其涉及一种屏幕解锁的方法及终端。
背景技术
为保障用户的信息安全,很多终端都可以设置锁屏。在锁屏状态下,只有输入特定的解锁密码才能查阅终端上的相关信息。用户有时会忘记解锁密码,尽管大多终端提供三到五次甚至更多输入密码的机会,但也存在用户多次输入错误密码,最终还是没解锁的情况。目前,针对忘记解锁密码问题,一般要通过恢复出厂或者售后刷机来解决,但是恢复出厂设置或者重新刷机都会导致终端上的用户数据丢失。
发明内容
本申请实施例提供了一种屏幕解锁的方法及终端,用于第一终端在锁屏状态下可以通过第二终端发送的解锁信息进行解锁。
本申请实施例的第一方面提供一种屏幕解锁的方法,可以包括:第一终端在锁屏状态下,向第二终端发送解锁请求,该解锁请求包括该第一终端的唯一识别码和该第二终端的唯一识别码,该第一终端的唯一识别码用于唯一标识该第一终端,该第二终端的唯一识别码用于唯一标识该第二终端;其中,第一终端的唯一识别码可以用于第二终端进行验证,第二终端的唯一识别码是用来找到发送解锁请求的终端。该第一终端接收该第二终端发送的解锁信息,该解锁信息为该第二终端对该解锁请求的响应,该解锁信息可以包括该第二终端的唯一识别码;该第一终端响应该解锁信息,执行解除该锁屏状态的相关操作。
在本申请实施例中,第一终端在锁屏状态下,响应用户的操作,可以向第二终端发送解锁请求,用于请求第一终端的解锁信息。第一终端接收第二终端发送的解锁信息后,可以执行解除锁屏状态的相关操作,从而解除第一终端的锁屏状态,为用户提供了一种无需清除终端数据即可解锁的方法;通过验证信任解锁设备的唯一识别码可以保证解锁的安全。
可选的,在本申请的一些实施例中,该解锁信息还可以包括该第一终端的第一解锁密码;该第一终端响应该解锁信息,执行解除该锁屏状态的相关操作,可以包括:该第一终端响应该解锁信息中的该第一解锁密码,解除该锁屏状态。在本申请实施例中,第一终端接收的第二终端发送的解锁信息中包括第一终端的第一解锁密码,那么,第一终端可以直接响应第一解锁密码,解除锁屏状态。这个第一解锁密码可以是第一终端自动填充,也可以是由用户手动输入,从而解除第一终端的锁屏状态。提供了一种解除锁屏状态的实现方式,增加方案的多样性。
可选的,在本申请的一些实施例中,该第一终端响应该解锁信息,执行解除该锁屏状态的相关操作,可以包括:该第一终端响应该解锁信息清除该第一终端的第一解锁密码,以使得该第一终端解除该锁屏状态;该第一解锁密码为解除该第一终端的锁屏状态的密 码。在本申请实施例中,即解锁信息可以清除第一终端的第一解锁密码,那么,当第一终端接收第二终端发送的解锁信息后,可以直接响应解锁信息清除第一解锁密码,从而使得第一终端解除锁屏状态。提供了一种解除锁屏状态的实现方式,增加方案的多样性。
可选的,在本申请的一些实施例中,该第一终端解除该锁屏状态后,该方法还可以包括:该第一终端显示重设解锁密码界面;该第一终端响应用户输入的设置解锁密码的操作,重新设置该第一终端的解锁密码。在本申请实施例中,第一终端在根据第一解锁密码解除锁屏状态后,或者,根据解锁信息清除第一终端的第一解锁密码后,可以显示重设解锁密码界面,用户可以再重设第二解锁密码。这个第二解锁密码可以为用户比较容易记住的解锁密码。
可选的,在本申请的一些实施例中,该第一终端在锁屏状态下,向第二终端发送解锁请求,可以包括但不限于以下几种实现方式:
(1)该第一终端在锁屏状态下,响应用户输入的解锁密码,若解锁失败的次数大于或等于预置阈值,则该第一终端自动向该第二终端发送解锁请求。
(2)该第一终端在锁屏状态下,响应用户输入的解锁操作,向该第一终端发送解锁请求;可以理解的是,可以是用户在初始的情况下,选择第二终端来解除锁屏状态,或者,用户在有输错密码,但还没有达到解锁失败的上限,用户也可以选择第二终端来解除锁屏状态。
(3)该第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则该第一终端呈现第一提示信息,该第一提示信息用于提示用户是否向该第二终端发送该解锁请求,该第一终端获取用户基于该第一提示信息的操作,即如果用户选择向第二终端发送解锁请求的标识,则第一终端向该第二终端发送解锁请求;如果用户没有选择向第二终端发送解锁请求的标识,则第一终端不向第二终端发送解锁请求。实现了用户的可控性,用户可以根据实际需求,选择是否通过第二终端来解除第一终端的锁屏状态。
(4)该第一终端在锁屏状态下,获取用户输入的身份认证信息;若该用户输入的身份认证信息与预设的身份认证信息相匹配,该第一终端向该第二终端发送解锁请求;可以理解的是,这个身份认证信息可以是用户设置的密保问题,例如父母的名字、最喜欢的电影、印象最深刻的事情、身份证号码等。
(5)该第一终端在锁屏状态下,呈现第二提示信息,该第二提示信息包括至少两个联系人的联系方式,该第二提示信息用于提示用户选择待发送解锁请求的联系人;用户可以对至少两个联系人进行选择,该第一终端获取用户输入的选择操作;若该选择操作针对的联系人为预设联系人,则该第一终端向第二终端发送解锁请求,该第二终端为与该预设联系人对应的终端;若该选择操作针对的联系人不是预设联系人,则该第一终端触发报警提示。这个报警提示可以是:“通过联系人解锁失败”或者“异常解锁,请注意安全”等。
在本申请实施例中,提供了几种第一终端向第二终端发送解锁请求的具体实现方式,第一终端可以自动向第二终端发送解锁请求,也可以是响应用户的操作,向第二终端发送解锁请求,提供了多样化的实现方案,增加了方案的可行性。
可选的,在本申请的一些实施例中,该第一终端向第二终端发送解锁请求之前,该方 法还可以包括:该第一终端获取该第一终端的唯一识别码和该第二终端的唯一识别码;该第一终端向该第二终端发送认证请求,该认证请求用于请求该第二终端同意为该第一终端执行解除该第一终端的锁屏状态的相关操作;该认证请求中包括该第一终端的唯一识别码和该第二终端的唯一识别码;该第一终端接收该第二终端发送的认证响应,该认证响应为该第二终端对该认证请求的响应。在本申请实施例中,是对第一终端设置第二终端为信任解锁设备的一个说明,只有信任机制建立成功后,第二终端才有权限可以解除第一终端的锁屏状态。第一终端向第二终端发送认证请求后,第二终端如果对认证请求中的信息验证成功,则可以返回指示信任机制建立成功的响应,若是第二终端对认证请求中的信息未验证成功,则可以返回指示信息机制建立失败的响应。
可选的,在本申请的一些实施例中,该认证请求还包括该第一终端的第一解锁密码。即该认证请求中包括该第一终端的唯一识别码和该第二终端的唯一识别码之外,还可以包括第一终端的第一解锁密码,当第一终端向第二终端发起解锁请求后,第二终端可以直接向第一终端发送第一解锁密码,解除第一终端的锁屏状态。
本申请实施例第二方面提供了一种屏幕解锁的方法,可以包括:第二终端接收第一终端发送的解锁请求,该解锁请求包括该第一终端的唯一识别码,该第一终端的唯一识别码用于唯一标识该第一终端;第一终端的唯一识别码可以用于第二终端进行验证。若该第一终端的唯一识别码与该第二终端预先保存的唯一识别码相同,则该第二终端向该第一终端发送解锁信息,该解锁信息用于执行解除该第一终端的锁屏状态的相关操作。
在本申请实施例中,第二终端接收第一终端发送的解锁请求,第二终端可以对解锁请求中包括的第一终端的唯一识别码和预先保存的唯一识别码进行匹配,若匹配成功,则第二终端向第一终端发送解锁信息。第一终端接收第二终端发送的解锁信息后,可以执行解除锁屏状态的相关操作,从而解除第一终端的锁屏状态,为用户提供了一种无需清除终端数据即可解锁的方法;通过验证唯一识别码可以保证解锁的安全。
可选的,在本申请的一些实施例中,在第二终端向第一终端发送解锁信息之前,方法还可以包括:获取用户输入的身份认证信息;第二终端向第一终端发送解锁信息,可以包括:若用户输入的身份认证信息与预设的身份认证信息相匹配,则第二终端向第一终端发送解锁信息。可以理解的是,这个身份认证信息可以是用户设置的密保问题,例如父母的名字、最喜欢的电影、印象最深刻的事情、身份证号码等。
可选的,在本申请的一些实施例中,该解锁信息还包括该第一终端的第一解锁密码,该第一解锁密码用于该第一终端解除该锁屏状态;或,该解锁信息用于指示该第一终端清除第一解锁密码,以使得该第一终端解除该锁屏状态。在本申请实施例中,第二终端向第一终端发送的解锁信息中包括第一终端的第一解锁密码,那么,第一终端可以直接响应第一解锁密码,解除锁屏状态。或者,第二终端向第一终端发送的解锁信息可以清除第一终端的第一解锁密码,那么,当第一终端接收第二终端发送的解锁信息后,可以直接响应解锁信息清除第一解锁密码,从而使得第一终端解除锁屏状态。提供了一种解除锁屏状态的实现方式,增加方案的多样性。
可选的,在本申请的一些实施例中,在第二终端向第一终端发送解锁信息之前,方法 还可以包括:第二终端呈现提示信息,提示信息用于提示用户是否向第一终端发送解锁信息;第二终端向第一终端发送解锁信息,可以包括:第二终端获取用户基于提示信息的操作,向第一终端发送解锁信息。在本申请实施例中,第二终端向第一终端发送的解锁信息,可以先根据解锁请求呈现提示信息,由用户选择是否向第一终端发送解锁信息。如果用户选择向第一终端发送解锁信息的标识,则第二终端向第一终端发送解锁信息;如果用户选择不向第一终端发送解锁信息的标识,则第二终端不向第一终端发送解锁信息。用户可以根据自身的实际需求,来达到想要的效果,实现用户的可控性。
可选的,在本申请的一些实施例中,该第二终端接收第一终端发送的解锁请求之前,该方法还可以包括:该第二终端接收该第一终端发送的认证请求,该认证请求包括该第一终端的唯一识别码和该第二终端的唯一识别码;该第二终端验证该第二终端的唯一识别码,并保存该第一终端的唯一识别码;若验证成功,则该第二终端向该第一终端发送认证响应,该认证响应用于指示该第一终端与该第二终端建立信任机制。在本申请实施例中,是对第一终端设置第二终端为信任解锁设备的一个说明,第二终端接收第一终端发送的认证请求,第二终端进行信息验证,若验证成功,则第二终端可以向第一终端发送认证响应,认证响应可以指示信任机制建立成功。只有信任机制建立成功后,第二终端才有权限解除第一终端的锁屏状态。若是第二终端对认证请求中的信息未验证成功,则可以返回指示信息机制建立失败的响应。
可选的,在本申请的一些实施例中,该认证请求还包括该第一终端的第一解锁密码。即该认证请求中包括该第一终端的唯一识别码和该第二终端的唯一识别码之外,还可以包括第一终端的第一解锁密码,当第一终端向第二终端发起解锁请求后,第二终端可以直接向第一终端发送第一解锁密码,解除第一终端的锁屏状态。
可选的,在本申请的一些实施例中,在该第二终端向该第一终端发送该解锁信息之后,该方法还可以包括:该第二终端接收该第一终端发送的第二解锁密码,该第二解锁密码为该第一终端重新设置后的解锁密码。
本申请实施例第三方面提供一种屏幕解锁的方法,可以包括:第一终端在锁屏状态下,响应用户输入的操作,打开扫码应用;该第一终端响应于该扫码应用的扫码操作,解除该锁屏状态。第一终端可以在锁屏状态下,当用户忘记解锁密码时,可以通过扫描应用的扫码操作,解除锁屏状态,提供了一种解锁的实现方案。
可选的,在本申请的一些实施例中,该扫码操作的对象为扫描码;应理解,该扫描码可以是一维条码、二维码、三维码或者四维码等。该第一终端响应于该扫码应用的扫码操作,解除该锁屏状态,可以包括:该第一终端响应于该扫码应用的扫码操作,若该扫描码承载的信息与预设的信息相匹配,则解除该锁屏状态;该方法还可以包括:若该扫描码承载的信息与预设的信息不匹配,则无法解除该锁屏状态。具体可以是呈现给用户一个提示信息,该提示信息可以为扫描码错误或者报警提示等。在本申请实施例中,对扫描扫描码解除锁屏状态进行了一个具体的说明,在扫描码承载的信息与预设的信息相匹配的情况下,第一终端可以解除该锁屏状态。
可选的,在本申请的一些实施例中,该扫码操作的对象为扫描码;该扫描码承载的信 息包括该第一终端的唯一识别码和该第一终端的解锁密码,该第一终端的唯一识别码用于唯一标识该第一终端;或者,该扫描码承载的信息包括用户标识和该第一终端的解锁密码,该用户标识用于唯一标识该第一终端的用户;或者,该扫描码承载的信息包括该第一终端的唯一识识别码、该用户标识和该第一终端的解锁密码。在本申请实施例中,用户标识可以是身份证号码、手机号码等其他标识;第一终端的解锁密码可以解除第一终端的锁屏状态。这里主要是对扫描码承载的信息做了一个可选性的说明。
可选的,在本申请的一些实施例中,该第一终端解除该锁屏状态之前,该方法还可以包括:该第一终端获取用户输入的身份认证信息;若用户输入的身份认证信息与预设的身份认证信息不匹配,该第一终端呈现报警提示;该第一终端解除该锁屏状态,可以包括:若用户输入的身份认证信息与预设的身份认证信息匹配,该第一终端解除该锁屏状态。在本申请实施例中,第一终端解除锁屏状态之前,可以先输入身份认证信息,这个身份认证信息可以用来保障解锁的安全性。
可选的,在本申请的一些实施例中,该第一终端解除该锁屏状态之后,该方法还可以包括:该第一终端显示重设解锁密码界面;该第一终端响应用户输入的重设密码操作,设置第二解锁密码。在本申请实施例中,第一终端在根据第一解锁密码解除锁屏状态后,或者,根据解锁信息清除第一终端的第一解锁密码后,可以显示重设解锁密码界面,用户可以再重设第二解锁密码。这个第二解锁密码可以为用户比较容易记住的解锁密码。
可选的,在本申请的一些实施例中,该第一终端在锁屏状态下,打开扫码应用,可以包括:
(1)该第一终端在锁屏状态下,响应用户输入的解锁密码,若解锁失败的次数大于或等于预置阈值,则该第一终端可以自动打开该扫码应用。
(2)该第一终端在锁屏状态下,响应用户输入的打开操作,打开该扫码应用。可以理解的是,可以是用户在初始的情况下,打开扫码应用来解除锁屏状态,或者,用户在有输错密码,但还没有达到解锁失败的上限,用户也可以选择打开扫码应用来解除锁屏状态。
(3)该第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则该第一终端呈现用户提示信息,该用户提示信息用于提示用户是否打开该扫码应用;该第一终端获取用户基于该用户提示信息的操作,如果用户选择打开扫码应用的标识,则第一终端打开该扫码应用。如果用户没有选择打开扫码应用的标识,则第一终端不打开扫码应用。实现了用户的可控性,用户可以根据实际需求,选择是否通过扫码应用的扫码操作来解除锁屏状态。
(4)该第一终端在锁屏状态下,获取用户输入的身份认证信息;若该用户输入的身份认证信息与预设的身份认证信息相匹配,该第一终端打开该扫码应用。可以理解的是,这个身份认证信息可以是用户设置的密保问题,例如父母的名字、最喜欢的电影、印象最深刻的事情、身份证号码等。
在本申请实施例中,提供了几种第一终端打开扫码应用的具体实现方式,第一终端可以自动打开扫码应用,也可以是响应用户的操作,打开扫码应用,提供了多样化的实现方案,增加了方案的可行性。
可选的,在本申请的一些实施例中,该第一终端在锁屏状态下,打开扫码应用之前,该方法还可以包括:该第一终端生成第一扫描码;该第一终端向第二终端发送该第一扫描码,例如:通过短信、微信消息、QQ消息等方式向第二终端发送第一扫描码。或者,该第一终端向服务器发送该第一扫描码。例如:第一终端向邮箱地址、网盘地址等发送第一扫描码。即第一扫描码可以保存在另一设备中,当第一终端在锁屏状态下,可以扫描另一设备上显示的第一扫描码来解除锁屏状态。
可选的,在本申请的一些实施例中,该方法还可以包括:若该第一终端的第一解锁密码发生改变,则该第一终端根据改变后的第一解锁密码和该第一终端的唯一识别码生成第二扫描码;或者,该第一终端定期更新该第一扫描码,生成第三扫描码。在本申请实施例中,主要是对第一终端生成的第一扫描码进行更新的一个说明,例如:第一终端可以根据更改后的解锁密码和第一终端的唯一识别码来生成第二扫描码;或者,第一终端可以定期根据当前的解锁密码和第一终端的唯一识别码来生成第三扫描码。
本申请实施例第四方面还提供一种屏幕解锁的方法,可以包括:第一终端在锁屏状态下,接收该第二终端发送的解锁信息,该第二终端为与该第一终端建立过通信连接的终端;该第一终端根据该解锁信息清除该第一终端的第一解锁密码,或者,根据该解锁信息包括的第一解锁密码,解除该第一终端的该锁屏状态。在本申请实施例中,第一终端在锁屏状态下,接收第二终端发送的解锁信息后,可以根据该解锁信息清除该第一终端的第一解锁密码,或者,根据该解锁信息包括的第一解锁密码,解除该第一终端的该锁屏状态。为用户提供了一种无需清除终端数据即可解锁的方法。这里的建立通信连接可以是建立过蓝牙连接,也可以是建立过USB连接等。
可选的,在本申请的一些实施例中,该方法还可以包括:该第一终端显示重设解锁密码界面;该第一终端响应用户输入的重新设置解锁密码的操作,重新设置该第一终端的第二解锁密码。在本申请实施例中,第一终端在根据第一解锁密码解除锁屏状态后,或者,根据解锁信息清除第一终端的第一解锁密码后,可以显示重设解锁密码界面,用户可以再重设第二解锁密码。这个第二解锁密码可以为用户比较容易记住的解锁密码。
可选的,在本申请的一些实施例中,该第一终端在锁屏状态下,接收该第二终端发送的解锁信息之前,可以包括但不限于以下几种实现方式:
(1)该第一终端在锁屏状态下,响应用户输入的解锁密码,若解锁失败的次数大于或等于第一预置阈值,则该第一终端自动向该第二终端发送解锁请求。
(2)该第一终端在锁屏状态下,响应用户输入的解锁操作,向该第一终端发送解锁请求。可以理解的是,可以是用户在初始的情况下,选择第二终端来解除锁屏状态,或者,用户在有输错密码,但还没有达到解锁失败的上限,用户也可以选择第二终端来解除锁屏状态。
(3)该第一终端在锁屏状态下,若解锁失败的次数大于或等于第一预置阈值,则该第一终端呈现第一提示信息,该第一提示信息用于提示用户是否向该第二终端发送该解锁请求,该第一终端获取用户基于该第一提示信息的操作,即如果用户选择向第二终端发送解锁请求的标识,则第一终端向该第二终端发送解锁请求;如果用户没有选择向第二终端发 送解锁请求的标识,则第一终端不向第二终端发送解锁请求。实现了用户的可控性,用户可以根据实际需求,选择是否通过第二终端来解除第一终端的锁屏状态。
(4)该第一终端在锁屏状态下,获取用户输入的身份认证信息;若该用户输入的身份认证信息与预设的身份认证信息相匹配,该第一终端向该第二终端发送解锁请求;可以理解的是,这个身份认证信息可以是用户设置的密保问题,例如父母的名字、最喜欢的电影、印象最深刻的事情、身份证号码等。
(5)该第一终端在锁屏状态下,若在预置范围内检测到该第二终端,则该第一终端向该第二终端发送该解锁请求。
(6)该第一终端在锁屏状态下,若在预置范围内检测到该第二终端的时长大于或等于第二预置阈值,则该第一终端向该第二终端发送该解锁请求。
(7)该第一终端在锁屏状态下,呈现第二提示信息,该第二提示信息包括至少两个联系人的联系方式,该第二提示信息用于提示用户选择待发送解锁请求的联系人;该第一终端获取用户输入的选择操作;若该选择操作针对的联系人为预设联系人,则该第一终端向第二终端发送解锁请求,该第二终端为与该预设联系人对应的终端;若该选择操作针对的联系人不是预设联系人,则该第一终端触发报警提示。这个报警提示可以是:“通过联系人解锁失败”或者“异常解锁,请注意安全”等。
在本申请实施例中,提供了几种第一终端向第二终端发送解锁请求的具体实现方式,第一终端可以自动向第二终端发送解锁请求,也可以是响应用户的操作,向第二终端发送解锁请求,提供了多样化的实现方案,增加了方案的可行性。
本申请实施例第五方面还提供一种屏幕解锁的方法,可以包括:第一终端在黑屏状态下,接收第二终端发送的解锁信息,该解锁信息包括该第一终端的唯一识别码和解锁密码,该解锁密码用于解除该第一终端的锁屏状态;响应于接收该第二终端发送的解锁信息,该第一终端点亮屏幕,进入锁屏状态,呈现锁屏界面,在该锁屏界面上自动填充该解锁密码;该第一终端解除该锁屏状态。
在本申请实施例中,黑屏状态是屏幕没有被点亮或者没有上电的状态。当第一终端接收第二终端发送的解锁信息后,第一终端响应于接收该第二终端发送的解锁信息,点亮屏幕,进入锁屏状态,呈现锁屏界面,在该锁屏界面上自动填充该解锁密码,解除该锁屏状态。也可以是第一终端响应于接收该第二终端发送的解锁信息,点亮屏幕,进入锁屏状态,呈现锁屏界面,用户根据解锁信息中的提示,手动输入解锁密码来解除第一终端的锁屏状态。
本申请实施例第六方面还提供一种屏幕解锁的方法,可以包括:若该第一终端检测到第二终端在预设距离范围内,该第一终端向该第二终端发送解锁请求,该解锁请求用于请求该第二终端解除该第一终端的锁屏状态,该第一请求包括该第一终端的唯一识别码和该第二终端的唯一识别码;该第一终端接收该第二终端发送的解锁信息,该解锁信息为该第二终端对该解锁请求的响应,该解锁信息包括该第二终端的唯一识别码和解锁密码,该解锁密码用于解除该第一终端的锁屏状态;响应于接收到该解锁信息,该第一终端呈现锁屏界面,在锁屏界面上自动填充该解锁密码,解除该锁屏状态。
在本申请实施例中,若该第一终端在预设距离范围内检测到第二终端,则该第一终端向该第二终端发送解锁请求,接收第二终端发送的解锁信息,响应于接收到该解锁信息,该第一终端呈现锁屏界面,在锁屏界面上自动填充该解锁密码,解除该锁屏状态。也可以是第一终端响应于接收该第二终端发送的解锁信息,呈现锁屏界面,用户根据解锁信息中的提示,手动输入解锁密码来解除第一终端的锁屏状态。
可选的,在本申请的一些实施例中,所述若所述第一终端监测到第二终端在预设距离范围内,所述第一终端自动向所述第二终端发送解锁请求,可以包括:若所述第一终端检测到第二终端在预设距离范围内,且所述第二终端在预设距离范围内的持续时长大于预设时间阈值时,所述第一终端向所述第二终端发送解锁请求。即第一终端在预设距离范围内检测到第二终端,且时长达到预设时间阈值时,才会向第二终端发送解锁请求。
本申请实施例第七方面提供了一种终端,具有在锁屏状态下,向第二终端发送解锁请求,接收第二终端的发送的解锁信息解除锁屏状态的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
本申请实施例第八方面提供了一种终端,具有根据第一终端发送的解锁请求,向第一终端发送解锁信息,以使得第一终端使用解锁信息解除锁屏状态的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
本申请实施例第九方面提供了一种终端,具有在锁屏状态下,响应于所述扫码应用的扫码操作,解除所述锁屏状态的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
本申请实施例第十方面提供了一种终端,具有在锁屏状态下,接收第二终端的发送的解锁信息解除锁屏状态的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
本申请实施例第十一方面提供了一种终端,具有在锁屏状态下,接收第二终端的发送的解锁信息解除锁屏状态的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
本申请实施例第十二方面提供了一种终端,具有在锁屏状态下,向第二终端发送解锁请求,接收第二终端的发送的解锁信息解除锁屏状态的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
本申请实施例第十三方面提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。需要说明的是,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产口的形式体现出来,该计算机软件产品存储在一个存储介质中,用于储存为上述设备所用的计算机软件指令,其包含用于执行上述第一方面、第二方面为数据节点或者管理节点所设计的程序。
该存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
本申请实施例第十四方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第一方面或第一方面任一可选实现方式,或者,本申请第二方面或第二方面任一可选实现方式、如本申请第三方面或第三方面任一可选实现方式、如本申请第四方面或第四方面任一可选实现方式、如本申请第五方面或第五方面任一可选实现方式、如本申请第六方面或第六方面任一可选实现方式中所述的方法。
本申请实施例提供的技术方案中,具有以下有益效果:
通过提供了一种第一终端在锁屏状态下可以通过第二终端发送解锁信息进行解锁的方法,用户在忘记终端的锁屏密码的情况下,不需要刷机或者恢复出厂就能解锁。
附图说明
图1为本申请实施例所应用的场景示意图;
图2为本申请实施例中屏幕解锁的方法的一个实施例示意图;
图3A为第一终端设置的解锁密码为数字密码的示意图;
图3B为第一终端设置的解锁密码为滑动轨迹的示意图;
图3C为第一终端设置的解锁密码为指纹的示意图;
图3D为第一终端设置第二终端为信任解锁设备的示意图;
图3E为第一终端设置第二终端为信任解锁设备的示意图;
图3F为第二终端与第一终端建立信任机制的示意图;
图3G为第二终端与第一终端建立信任机制的示意图;
图3H为第二终端与第一终端建立信任机制的示意图;
图3I为第二终端与第一终端建立信任机制的示意图;
图4A为第一终端向第二终端发送解锁请求的示意图;
图4B为第一终端向第二终端发送解锁请求的示意图;
图4C为第一终端向第二终端发送解锁请求的示意图;
图4D为第二终端发送解锁信息的示意图;
图4E为第一终端解锁的示意图;
图4F为第一终端解锁的示意图;
图4G为第一终端解锁的示意图;
图4H为第一终端解锁的示意图;
图5为本申请实施例中屏幕解锁的方法的一个实施例示意图;
图6A为第一终端生成二维码的示意图;
图6B为第一终端发送二维码的示意图;
图6C为第一终端发送二维码的示意图;
图6D为第一终端打开扫码应用的示意图;
图6E为第一终端打开扫码应用的示意图;
图6F为第一终端打开扫码应用的示意图;
图6G为第一终端打开扫码应用的示意图;
图6H为第二终端显示二维码的示意图;
图6I为第一终端扫描二维码的示意图;
图6J为第一终端扫描二维码解锁的示意图;
图6K为第一终端扫描二维码解锁的示意图;
图7为本申请实施例中屏幕解锁的方法的一个实施例示意图;
图8A为手机设置已连接的智能手表为信任解锁设备的示意图;
图8B为手机设置已连接的智能手表为信任解锁设备的示意图;
图8C为智能手表向手机发送解锁信息的示意图;
图8D为手机和智能手表的距离在预设范围内的示意图;
图8E为第一终端上显示是否通过智能手表解锁的示意图;
图9为本申请实施例中终端的一个实施例示意图;
图10为本申请实施例中终端的另一个实施例示意图;
图11为本申请实施例中终端的另一个实施例示意图;
图12为本申请实施例中终端的另一个实施例示意图;
图13为本申请实施例中终端的另一个实施例示意图;
图14为本申请实施例中终端的另一个实施例示意图;
图15为本申请实施例中终端的另一个实施例示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请所涉及的终端可以为:手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)、数码相机、个人数字助理(personal digital assistant,简称PDA)、导航装置、移动上网装置(Mobile Internet Device,MID)或可穿戴式设备(Wearable Device),如手环、手表等。
图1为本申请实施例所应用的场景示意图。在图1所示中,终端解锁失败。本申请可以解决用户在忘记终端屏幕解锁密码的场景下无法解锁的问题。具体的实现可以包括以下几种方式:其一,在终端设置或修改解锁密码时,设定一个解锁终端(也称信任解锁设备),该解锁终端用于解锁该终端,使得该终端进入操作界面。其二,在终端设置或修改解锁密码时,生成唯一的扫描码,该扫描码包括该终端的解锁密码和唯一识别码。应理解,唯一识别码可以是终端的国际移动设备身份码(international mobile equipment identity,IMEI),也可以是序列号(series number,SN),也可以是其他的识别码来唯一指示不同的终端。用户忘记终端的解锁密码时,可利用解锁终端或扫描码强制密码清除或密码重置的 操作,或从解锁终端获取解锁密码来解锁当前终端、或扫描一维条码、二维码、三维码、四维码等解锁当前终端。如下将以实施例的方式,对本申请技术方案做进一步的说明。
图2为本申请实施例中屏幕解锁的方法的一个实施例示意图。本方案为通过解锁终端来实现终端屏幕解锁的示例,其具体包括:
201、第一终端设置解锁密码。
锁屏是指终端的屏幕处于锁定状态。在本申请实施例中,第一终端支持在锁屏状态下通过解锁密码来解除当前屏幕的锁定状态。其中,第一终端所应用的解锁密码类型可以包括数字密码、滑动轨迹、指纹等类型的密码解锁。第一终端可以设置或者修改解锁密码。图3A为第一终端设置的解锁密码为数字密码的示意图。图3B为第一终端设置的解锁密码为滑动轨迹的示意图。图3C为第一终端设置的解锁密码为指纹的示意图。
终端锁屏主要有两种:一种是以美化为主要作用的锁屏;一种是以安全为主要作用的锁屏,这种锁屏在解锁时需要输入密码或绘制正确的九宫格图案等。本申请技术方案对不管是以安全为主要作用的锁屏,还是以美化为主要作用的锁屏,只要是需要输入密码或绘制正确的九宫格图案解锁的锁屏都适用。锁屏状态为需要输入密码或绘制正确的九宫格图案等解锁之前的加锁状态。锁屏和黑屏、息屏有关联,也有区别。通常而言,黑屏状态是屏幕没有被点亮或者没有上电的状态。息屏状态是处于灭屏状态,如果终端没加锁(即终端的屏幕没有锁定),用户按电源键亮屏可以直接进入桌面;如果终端加锁(即终端的屏幕锁定),用户按电源键亮屏,终端可在亮屏状态下显示锁屏界面。手机默认亮屏时经过第一预置时长(如15s)不操作,会自动息屏,息屏后经过第二预置时长(如5s)后无点亮操作,手机加锁;或者,手机亮屏时按power键会立刻加锁并进入息屏状态。
202、第一终端设置第二终端为信任解锁设备,并向第二终端发送认证信息。
在本申请实施例中,用户为第一终端设置信任解锁设备,可以是第一终端在初始设置解锁密码的同时,设置第二终端为其信任解锁设备;也可以是在第一终端已经设置解锁密码有一段时间后,用户考虑到实际需求,设置第二终端为其信任解锁设备;也可以是在用户修改第一终端的解锁密码时,为第一终端设置信任解锁设备。用户为第一终端设置信任解锁设备的场景不做限定。
示例性的,以第一终端设置的解锁密码为滑动轨迹为例进行说明。在解锁密码设置好后,用户可以点击“完成”或者下一步操作时,在第一终端上可以弹出一个提示框,提示“是否设置信任解锁设备,以防忘记密码”等类似信息。如果用户选择“是”,第一终端响应用户的操作,可以显示一个提示用户填写认证信息的界面。认证信息可以包括,例如:第一终端的唯一识别码和第二终端的唯一识别码;或者,第一终端的唯一识别码、第二终端的唯一识别码和约定密码;或者,第一终端的唯一识别码、第二终端的唯一识别码、第一终端的解锁密码;或者,第一终端的唯一识别码、第二终端的唯一识别码、约定密码、第一终端的解锁密码等其他信息。第一终端的唯一识别码用于唯一标识第一终端,第二终端的唯一识别码用于唯一标识第二终端。
其中,设定约定密码是一种用于安全验证的方式。第一终端的解锁密码可以用于第一终端解锁失败时,第二终端向第一终端发送解锁密码使得第一终端解锁。对于第一终端的 唯一识别码,第一终端可以自动识别获取,第二终端的唯一识别码,可以由用户手动输入。
当用户填好认证信息后,进入下一步操作,选择向第二终端发送认证信息的方式。例如,图3D为第一终端设置第二终端为信任解锁设备的示意图。在图3D所示中,第一终端可以通过hiShare、蓝牙、无线保真(Wireless Fidelity,WIFI)、第三方应用的软件账号(如微信号、QQ号等)、短消息等方式向第二终端发送认证信息。进一步的,在第一终端上可以提示认证信息已发送成功,也可以不提示,具体不做限定。需要说明的是,终端之间的交互可以包括:一种是短距离无线通讯的方式进行交互,例如通过蓝牙、WIFI直连等;一种是通过第三方服务器进行交互,例如微信、QQ、短信这些都是通过服务器进行信息中转的。
可选的,在具体的实现方式中,如图3E所示,选择发送认证信息的方式也可以在填写认证信息之前,图3E为第一终端设置第二终端为信任解锁设备的示意图。
需要说明的是,第一终端向第二终端发送认证信息,可以是用户填好认证信息后,执行长按操作,第一终端响应用户长按的操作,显示“通信录、微信好友、QQ好友等”,用户再进行选择,如选择通信录,则第一终端可以显示通信录中的联系人,选定联系人A,可以通过短信的方式,向联系人A发送认证信息;如选择微信好友,则第一终端显示微信好友,选定好友B,向好友B发送认证信息。应理解,第一终端确定认证信息的方式,以及向第二终端发送该认证信息的方式都不做具体限定。
203、第二终端与第一终端建立信任机制。
在本申请实施例中,第二终端接收第一终端发送的认证信息,认证信息中包括第一终端的唯一识别码和第二终端的唯一识别码。该第一终端的唯一识别码用于指示第二终端确定为第一终端的信任解锁设备;该第二终端的唯一识别码用于与第二终端的识别码进行匹配,若匹配成功,第二终端可以默认为第一终端的信任解锁设备,与第一终端建立信任机制,保存第一终端的唯一识别码,即有权限解锁第一终端。图3F为第二终端与第一终端建立信任机制的示意图。在图3F所示中,第二终端接收到认证信息后,若认证信息匹配成功,则第二终端可以显示一个匹配成功的提示信息。若匹配未成功,则信任机制建立失败,第二终端无权限解锁第一终端。
可选择的,图3G为第二终端与第一终端建立信任机制的示意图。在图3G所示中,第二终端接收认证信息并通过验证后,用户可以对验证信息进行再次确认,即可以在第二终端上提示“是否同意为第一终端的信任解锁设备?”等提示信息。若用户点击“同意”,则第二终端响应用户的操作,与第一终端建立信任机制,保存第一终端的唯一识别码,成为第一终端的信任解锁设备,可以解锁第一终端。若“不同意”,则第二终端响应用户的操作,与第一终端信任机制建立失败,第二终端无法解锁第一终端。
可选择的,图3H为第二终端与第一终端建立信任机制的示意图。在图3H所示中,认证信息中还包括约定密码,约定密码用于保障认证信息的安全。为那么第二终端不仅要匹配第二终端的唯一识别码,还需要验证约定密码,当两者都指示成功时,第二终端可以默认为第一终端的信任解锁设备,与第一终端建立信任机制。如果第二终端对约定密码的验证失败或第二终端的唯一识别码匹配失败,则信任机制建立失败。
图3I为第二终端与第一终端建立信任机制的示意图。在图3I所示中,第二终端不仅要匹配第二终端的唯一识别码,还需要验证约定密码。第二终端验证完约定密码后,用户可以对验证信息进行再次确认,第二终端响应用户的操作,与第一终端建立信任机制。
可选的,认证信息中还可以包括第一终端的解锁密码。当第一终端的用户忘记锁屏密码时,第二终端接收到第一终端的解锁请求后,可以向第一终端发送第一终端的解锁密码,该解锁密码用于供第一终端解锁。
可选择的,第二终端对认证信息匹配成功后,也可以向第一终端发送认证响应,认证响应为第二终端对认证请求的响应,告知第一终端信任机制建立成功。
需要说明的是,第一终端与第二终端建立信任机制后,第二终端可以对第一终端进行远程授权操作,如清除密码、强制加锁、关机等操作。其中,强制加锁可以理解为第一终端丢失或者找不到时,担心用户信息泄露,可以通过第二终端进行远程操作,将第一终端锁屏。强制加锁也可以理解为第一终端没有设定解锁密码,但是用户将第一终端丢失了,可以通过第二终端为第一终端设定解锁密码,将第一终端锁屏。可以理解的是,第二终端接收的认证信息可以在显示屏上显示,也可以不显示。
204、第一终端响应用户的操作,向第二终端发送解锁请求。
在本申请实施例中,第一终端响应用户的操作,向第二终端发送解锁请求,解锁请求包括第一终端的唯一识别码和第二终端的唯一识别码。第一终端的唯一识别码是用来给第二终端执行验证动作的,第二终端的唯一识别码是用来找到发送解锁请求的第二终端,即发送解锁请求的对象。
第一终端向第二终端发送解锁请求可以包括但不限于以下几种实现方式:
(1)第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则第一终端向第二终端发送解锁请求。图4A为第一终端向第二终端发送解锁请求的示意图。应理解,在图4A所示中,第一终端在预置时长内的解锁次数用完,提示“是否通过信任解锁设备解锁?”或“是否通过信任设备清除密码”的提示信息。用户可以根据需求选择“是”或“否”,若选择“是”,第一终端响应用户的操作,向第二终端发送解锁请求。可选择的,在具体实现方式中,若在预置时长内的解锁次数用完,可以自动触发第一终端向第二终端发送解锁请求,不需要用户去选择是否通过信任解锁设备解锁的操作。
(2)第一终端在锁屏状态下,若解锁失败,响应用户输入的解锁操作,第一终端向第二终端发送解锁请求。图4B为第一终端向第二终端发送解锁请求的示意图。应理解,在图4B所示中,用户第一次输入的解锁密码解锁失败,或者第二次输入的解锁密码解锁失败,用户可以选择信任解锁设备来解锁,第一终端响应用户的操作,向第二终端发送解锁请求。示例性的,如果用户输入的解锁密码解锁失败,第一终端可以显示提示信息,例如“剩余2次解锁机会,若连续错误3次将被锁定3小时,您可以选择信任设备解锁”。
(3)第一终端在锁屏状态下,响应用户输入的解锁操作,向第二终端发送解锁请求。图4C为第一终端向第二终端发送解锁请求的示意图。应理解,在图4C所示中,用户可以在锁屏状态下,还没输入解锁密码,直接可以选择信任设备解锁,第一终端响应用户的操作,向第二终端发送解锁请求。
(4)第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则第一终端呈现第一提示信息,第一提示信息用于提示用户是否向第二终端发送解锁请求,第一终端获取用户基于第一提示信息的操作,向第二终端发送解锁请求。
(5)第一终端在锁屏状态下,获取用户输入的身份认证信息;若用户输入的身份认证信息与预设的身份认证信息相匹配,第一终端向第二终端发送解锁请求。例如,身份认证信息可以是父母的名字,最喜欢的电影,印象最深刻的事情等。
(6)第一终端在锁屏状态下,呈现第二提示信息,第二提示信息包括至少两个联系人的联系方式,第二提示信息用于提示用户选择待发送解锁请求的联系人;第一终端获取用户输入的选择操作;若选择操作针对的联系人为预设联系人,则第一终端向第二终端发送解锁请求,第二终端为与预设联系人对应的终端;若选择操作针对的联系人不是预设联系人,则第一终端触发报警提示。
应理解,第一终端向第二终端发送解锁请求时,可以通过hiShare、蓝牙、无线保真、短信、通用串行总线(Universal Serial Bus,USB)等方式发送解锁请求,此处不做具体限定。
205、第二终端验证解锁请求,向第一终端发送解锁信息。
在本申请实施例中,第二终端接收第一终端发送的解锁请求后,第二终端的界面呈现可如图4D所示,图4D为第二终端发送解锁信息的示意图。其中,解锁信息为解锁第一终端的信息。该解锁请求可以包括第一终端的唯一识别码,第一终端的唯一识别码用于唯一标识第一终端;若第一终端的唯一识别码与第二终端预先保存的唯一识别码相同,则第二终端向第一终端发送解锁信息,解锁信息用于执行解除第一终端的锁屏状态的相关操作。
第二终端验证解锁请求,向第一终端发送解锁信息,可以包括如下几种情况:
解锁请求中包括第一终端的唯一识别码和第二终端的唯一识别码。若第二终端确定第一终端的识别码与验证信息中第一终端的识别码匹配,则验证成功,以及第二终端验证第二终端的唯一识别码与自身的唯一识别码匹配,则验证成功,则第一终端向第二终端发送解锁信息。
或者,解锁请求中包括第一终端的唯一识别码和第二终端的唯一识别码、约定密码。第二终端还需要验证解锁请求中包括的约定密码,即若第一终端的唯一识别码、第二终端的唯一识别码、约定密码都验证成功,则第二终端向第一终端发送解锁信息。
或者,若第一终端的唯一识别码和第二终端的唯一识别码验证成功,第二终端会显示一个提示信息,类似于“好友A请求解锁,是否确定为好友A的终端解锁?”,用户可以点击“确定”或“是”等其他标识,第二终端响应用户的操作,向第二终端发送解锁信息。
或者,若第一终端的唯一识别码和第二终端的唯一识别码验证成功,约定密码也验证成功,第二终端会显示一个提示信息,类似于“好友A请求解锁,是否确定为好友A的终端解锁?”,用户可以点击“确定”或“是”等其他标识,第二终端响应用户的操作,向第二终端发送解锁信息。
或者,获取用户输入的身份认证信息;若用户输入的身份认证信息与预设的身份认证信息相匹配,则第二终端向第一终端发送解锁信息。
其中,解锁信息可以包括第一终端的第一解锁密码,第一解锁密码用于解锁第一终端;或者,解锁信息可以包括第一终端的第一解锁密码,解锁第一终端后再显示锁屏密码设置界面,该锁屏密码设置界面用于供用户重设解锁密码;或者,解锁信息用于强制清除第一终端的第一解锁密码,即将第一终端的解锁密码清除掉,进入操作界面;或者,解锁信息用于强制清除第一终端的第一解锁密码后再显示锁屏密码设置界面,该锁屏密码设置界面用于供用户重设第二解锁密码。
需要说明的是,第二终端向第一终端发送解锁信息的方式可以为:例如,解锁信息中包括的解锁密码为数字密码,第二终端可以通过短信、通知、微信消息、QQ消息等方式向第一终端发送数字密码。解锁信息中包括的解锁密码为滑动轨迹,第二终端可以向第一终端发送滑动轨迹的图片指示,该图片指示可以通过短信、通知、微信消息、QQ消息等方式向第一终端发送。用户可以参照图片显示的滑动轨迹,滑动解锁密码解锁第一终端。解锁信息中包括的解锁密码为指纹,第二终端可以将指纹以图片的方式通过短信、通知等向第一终端发送,第一终端自动识别指纹来解锁。
应理解,第二终端向第一终端发送解锁信息时,也可以通过hiShare、蓝牙、无线保真、短信、USB等方式发送解锁信息,此处不做具体限定。
206、第一终端响应解锁信息,执行解除锁屏状态的相关操作。
第一终端接收第二终端发送的解锁信息后,使用解锁信息解锁。具体可包括如下情形:
(1)图4E为第一终端解锁的示意图。在图4E所示中,解锁信息包括第一终端的第一解锁密码。如果第一解锁密码为数字密码,第二终端可以通过短信、通知、微信消息、QQ消息等方式发来,用户可以根据呈现在锁屏界面上的短信、通知、微信消息、QQ消息等中包括的第一解锁密码,手动输入第一解锁密码来解锁终端。或者,也可以是解锁信息中有包括第一解锁密码,第一终端会自动识别填充第一解锁密码解锁。应理解,第一终端是否显示第一解锁密码,也可以取决于第二终端向第一终端发送解锁信息的方式,如果为短信,则通常会显示,如果是其他信息,也可以不显示。
如果第一解锁密码为滑动轨迹,则第一终端可以直接将接收的解锁信息在解锁界面除去输入解锁密码界面的空闲位置上显示滑动轨迹,用户参考输入滑动轨迹来解锁或者自动识别填充滑动轨迹来解锁。如果第一解锁密码为指纹,则第一终端可以直接自动识别指纹来解锁。
(2)图4F为第一终端解锁的示意图。在图4F所示中,第一种终端根据解锁信息解锁后,还可以显示锁屏密码设置界面,用户可以为第一终端重设第二解锁密码。
(3)图4G为第一终端解锁的示意图。在图4G所示中,第一终端根据解锁信息强制清除第一解锁密码,即第一终端将之前设置的第一解锁密码强制清除掉,可以直接进入操作界面,在下次重设密码之前,不会再进入锁屏状态。
(4)图4H为第一终端解锁的示意图。在图4H所示中,第一终端根据解锁信息强制清除第一解锁密码后,还可以显示锁屏密码设置界面,用户可以为第一终端重设第二解锁密码。可选择的,在重设第二解锁密码的时候,还可以选定是否保留信任解锁设备,如果不保留,可以删除,如果保留,第二终端继续为第一终端的信任解锁设备。进一步的,第一 终端还可以将重设的第二解锁密码向第二终端发送;第二终端可以接收第一终端发送的第二解锁密码。
可选择的,对于第一终端显示重设锁屏密码设置界面,可以包括:第一终端检测到根据第一解锁密码解锁后或强制清除第一解锁密码后显示锁屏密码设置界面。可以理解的是,上述的图示说明,解锁密码主要以滑动轨迹为例进行说明的,对于其他的解锁方式,也是类似的,此处不再赘述。
在本申请实施例中,用户可以为自己的终端设备设置信任解锁设备,在忘记解锁密码时可通过该信任解锁设备进行解锁操作。为用户提供了一种无需清除终端数据即可解锁的方法;通过验证信任解锁设备的唯一识别码可以保证解锁的安全(比如绑定家人的手机)。
图5为本申请实施例中屏幕解锁的方法的一个方法流程示意图,如图5所示,方法包括:
501、第一终端设置解锁密码。
在本申请实施例中,第一终端支持设置解锁密码,并可以用设置好的解锁密码解除第一终端的锁屏状态,所应用的解锁密码类型可以包括数字密码、滑动轨迹、指纹等类型的密码解锁。具体可参考图3A-图3C任一所示,此处不再赘述。
502、第一终端生成第一扫描码。
在本申请实施例中,第一终端在设置或者修改解锁密码时,可以生成第一扫描码。第一扫描码用于承载第一终端的解锁密码的相关信息,以使得第一终端在扫描第一扫描码时可执行解锁相关的操作。其中,第一扫描码承载的信息包括但不限于以下的说明:
(1)第一扫描码承载的信息可以包括第一终端的唯一识别码和第一终端的第一解锁密码,第一终端的唯一识别码用于唯一标识第一终端;第一解锁密码可以在第一终端锁屏的情况下解除第一终端的锁屏状态,第一终端的唯一识别码用于确定该第一扫描码只是第一终端的解除锁屏状态的扫描码。
(2)第一扫描码承载的信息包括用户标识和第一终端的第一解锁密码,用户标识用于唯一标识第一终端的用户。例如,用户标识可以为用户的身份认证信息(如身份证号、护照号、社保号等)。
(3)第一扫描码承载的信息包括第一终端的唯一识识别码、用户标识和第一终端的第一解锁密码。
(4)第一扫描码承载的信息包括清除第一终端的第一解锁密码的第一指示信息,即当第一终端扫描该第一扫描码后,可以清除第一终端的第一解锁密码,使得第一终端解除锁屏状态。
(5)第一扫描码承载的信息包括跳过第一终端的输入第一解锁密码的第二指示信息,即当第一终端扫描该第一扫描码后,可以自动跳过输入第一解锁密码的界面,从而解除第一终端的锁屏状态。
第一扫描码可以是个一维条码、二维码、三维码或者四维码等。以第一扫描码是二维码为例进行说明,这个二维码可以包括第一终端的解锁密码和唯一识别码,第一终端的唯一识别码可以是IMEI、SN等识别码。例如,图6A为第一终端生成二维码的示意图。在图 6A所示中,用户在设置解锁密码时,可生成提示信息,根据用户在提示信息中点击的确定操作,生成二维码。例如,解锁密码为123456,IMEI为866369030001848,生成的二维码可以包括这两个信息。在生成二维码时,第一终端的唯一识别码可以自动获取,解锁密码可以由用户手动输入,也可以是第一终端自动获取用户设置或修改的解锁密码。
需要说明的是,第一终端生成的二维码可能不止一个,如果修改一次解锁密码,第一终端生成一个二维码,还可以提示上次生成的二维码作废,是否删除之类的信息,有效保证第二终端显示的二位码是最新的解锁二维码,可以解锁第一终端。
503、第一终端向电子设备发送第一扫描码。
在本申请实施例中,在第一终端生成第一扫描码之后,用户还可以填写或者选择保存第一扫描码的账号。如果填写的账号是邮箱地址、网盘地址等,那么第一终端是向服务器发送该第一扫描码,即电子设备为服务器;如果填写的账号是手机号码、微信账号、QQ账号、微博账号等,那么第一终端是向第二终端发送该第一扫描码,即电子设备为第二终端。
应理解,以第一扫描码为二维码,保存第一扫描码的账号以邮箱地址为例进行说明。图6B为第一终端发送二维码的示意图。在图6B所示中,第一终端可以直接将二维码发送到邮箱地址“12345678@qq.com”中。
可选择的,第一终端还可以短消息的方式向手机通讯录中的第一手机号码对应的第二终端发送短消息,短消息中可以包括二维码;当然,第一手机号码对应的第一联系人通常是用户认为比较可靠地家人、好友、同学等。
以微信账号来说,在生成二维码之后,可以填写保存二维码的第一微信账号,第一终端向登录第一微信账号的第二终端发送二维码。图6C为第一终端发送二维码的示意图。在图6C所示中,用户可以不用填写或者保存二维码的账号,第一终端生成二维码之后,用户可以对二维码进行长按操作。第一终端响应用户长按二维码的操作(即用户按压二维码的时长超过预置阈值),显示发送的列表,如信息、微信、QQ、新浪微博、支付宝等。若用户点击微信,可以显示第一终端用户的微信好友列表,选定目标好友,向目标好友发送二维码。应理解,目标好友也可以是第一终端用户自己的账号,即可以在第二终端上可以登录第一终端用户的账号,来保存或显示二维码。
需要说明的是,步骤503为可选的步骤。可选择的,第一终端在生成第一扫描码之后,也可以将第一扫描码打印出来,存放在比较安全的地方,例如,保险柜等。当第一终端的用户忘记解锁密码后,可以用第一终端扫描该第一扫描码,解除第一终端的锁屏状态。
504、第一终端在锁屏状态下,响应用户输入的操作,打开扫码应用。
若用户忘记了解锁密码,可根据以前保存的第一扫描码来执行解锁相关的操作。在本申请实施例中,可通过打开扫码应用(如相机、独立的扫码应用)的取景窗口,读取第一扫描码的方式来获取第一扫描码中保存的信息。示例性地,用户可通过如下几种方式来实现本功能:
(1)图6D为第一终端打开扫码应用的示意图。在图6D所示中,第一终端接收用户输入的解锁密码,解锁失败的次数达到预置时长内的上限,用户可以手动选择使用二维码解锁功能,第一终端响应用户选择的操作,打开扫码应用。
(2)图6E为第一终端打开扫码应用的示意图。在图6E所示中,第一终端接收用户输入的解锁密码,解锁失败的次数达到预置时长内的上限,直接触发第一终端自动打开扫码应用。
(3)图6F为第一终端打开扫码应用的示意图。在图6F所示中,第一终端接收用户输入的解锁密码,解锁失败,用户可以手动选择使用扫码解锁功能,第一终端响应用户的操作,打开扫码应用。
(4)第一终端在锁屏状态下,响应用户输入的打开操作,打开扫码应用。例如:图6G为第一终端打开扫码应用的示意图。在图6G所示中,第一终端在初始的时候,显示输入密码解锁和扫码解锁,当用户选择扫码解锁时,第一终端响应用户的操作,打开扫码应用。
(5)第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则第一终端呈现用户提示信息,用户提示信息用于提示用户是否打开扫码应用;第一终端获取用户基于用户提示信息的操作,打开扫码应用。
(6)第一终端在锁屏状态下,获取用户输入的身份认证信息;若用户输入的身份认证信息与预设的身份认证信息相匹配,第一终端打开扫码应用。例如,身份认证信息可以是密保问题,如父母的名字、最喜欢的电影或者印象最深刻的事情等;也可以是要求用户输入生物特征进行验证等。
可以理解的是,第一终端响应于扫码应用的扫码操作,解除锁屏状态,具体可以由下述步骤505和步骤506中的内容实现,也可以是其他的实现方式,不做具体限定。
505、第二终端显示第一扫描码。
第一扫描码可以保存在第二终端中,也可以保存在服务器中。例如:二维码保存在邮箱地址、网盘地址、微博账号、微信账号、QQ账号中;也可以保存在第二终端的图库中,也可以保存在短消息中。第二终端可以查看第一终端发送的短消息来显示二维码;也可以是第二终端登录邮箱地址,显示二维码,如图6H所示,图6H为第二终端显示二维码的示意图;也可以是第二终端登录微信、QQ、新浪微博、云端等其他账号,查看并显示第一终端发送的二维码。
应理解,步骤504和步骤505的时序不做限定,步骤505为可选的步骤。
506、第一终端响应于扫码应用的扫码操作,解除锁屏状态。
在本申请实施例中,扫码操作的对象为扫描码;第一终端响应于所述扫码应用的扫码操作,解除所述锁屏状态,可以包括:第一终端响应于扫码应用的扫码操作,若扫描码承载的信息与预设的信息相匹配,则解除所述锁屏状态;所述方法还可以包括:若所述扫描码承载的信息与预设的信息不匹配,所述第一终端呈现提示信息。该提示信息可以为扫描码错误或者报警提示。
示例性的,第一终端使用扫码应用扫描第二终端显示的第一扫描码解除第一终端的锁屏状态。图6I为第一终端扫描二维码的示意图。应理解,在图6I所示中,二维码中包括第一终端的解锁密码和唯一识别码,第一终端的唯一识别码可以再次确定为第一终端的解锁二维码,不然可能存在几个终端设置的解锁密码是相同的,当二维码中只包括解锁密码 时,其他的终端扫描该二维码也可以解锁,不能有效的保障其安全性。第一终端的解锁密码可以解锁。
图6J为第一终端扫描二维码解锁的示意图,如图6J所示,第一终端在锁屏状态下,打开扫码应用。第一终端扫描二维码进行信息校验,如果校验成功,则可以自动解锁。或者,图6K为第一终端扫描二维码解锁的示意图,如图6K所示,第一终端扫描二维码进行信息校验,如果校验成功,自动跳出密码重置界面,用户可以重新设置新解锁密码。如果校验失败,则可以提示校验信息不匹配,不进行其他操作。
可选择的,如果二维码中承载的信息包括跳过第一终端的输入第一解锁密码的第二指示信息,那么当第一终端扫描该第一扫描码后,可以自动跳过输入第一解锁密码的界面,从而解除第一终端的锁屏状态。
应理解,还可以对第一终端扫描二维码未解锁的次数设置一个阈值。例如,第一终端连续扫了5次二维码,还没解锁,那么,在接下来的3小时内,禁止使用扫描二维码解锁的功能,防止不法分子恶意使用扫描二维码解锁的功能获取用户信息。
在一种可能的实现方式中,第一终端在打开扫码应用时,可以向第二终端发送二维码请求,第二终端可以根据二维码请求向第一终端发送该二维码,第一终端接收二维码图片时,可以自动扫描识别该二维码,从而解锁。可以有效避免当前只有第一终端,没有第二终端来显示二维码,从而第一终端无法解锁的问题。
可选择的,若第一终端的第一解锁密码更新为第二解锁密码,则第一终端根据第二解锁密码和第一终端的唯一识别码生成第二扫描码;或者,第一终端定期根据当前解锁密码和第一终端的唯一识别码更新第一扫描码,生成第三扫描码。重新生成的第二扫描码或者第三扫描码可以自动或者由用户手动选择发送给第二终端或者服务器。
需要说明的是,在一种可能的实现方式中,扫码应用可以为相机等其他应用,即相机具有扫描条码、二维码、三位码、四维码等功能。
在本申请实施例中,用户可以为自己的终端生成唯一的扫描码,该扫描码可以是条码、二维码、三位码、四维码等。上述实施例中主要以二维码为例进行说明的,其他的扫描码也是类似的。扫描码中包括第一终端的唯一识别码和解锁密码,因此在用户忘记解锁密码时可通过扫描该二维码进行解锁操作。为用户提供了一种忘记解锁密码时无需清除终端数据即可解锁的方式;通过使用解锁密码和终端的唯一识别码生成二维码的方式,保证了该解锁秘钥的唯一性,提高了解锁的安全性。
图7为本申请实施例中屏幕解锁的方法的一个实施例示意图,包括:
701、第一终端设置解锁密码。
在本申请实施例中,第一终端支持设置解锁密码,并可以用设置好的解锁密码解除第一终端的锁屏状态,所应用的解锁密码类型可以包括数字密码、滑动轨迹、指纹等类型的密码解锁。第一终端可以设置或者修改解锁密码,具体可参考上述图3A-图3C任一所示,此处不再赘述。
702、第一终端设置与第一终端已连接的第二终端为信任解锁设备。
在本申请实施例中,第一终端以手机为例、第二终端以智能手表为例进行说明。图8A 为手机在设置中设置已连接的智能手表为信任解锁设备的示意图。在图8A所示中,手机可以先与智能手表建立蓝牙连接,然后在设置中设置智能手表为手机的信任解锁设备。图8B为手机设置在智能手表应用中设置已连接的智能手表为信任解锁设备的示意图。在图8B所示中,在手机上安装有智能手表的APP,用户可以打开手机上安装的智能手表的应用,设置智能手表为手机的信任解锁设备。
或者,在初始设置手机的解锁密码时,可以设置与手机已连接的智能手表为手机的信任解锁设备;或者,也可以是在手机已经设置有解锁密码,经过一段时间后,用户考虑到实际需求,可以再次进入设置界面,设置与手机已连接的智能手表为手机的信任解锁设备。
应理解,这里的与第一终端已连接,可以指第一终端与第二终端蓝牙正在连接或USB正在连接等场景,或者第一终端和第二终端之前蓝牙连接过或者之前USB连接过等场景。可选择的,第一终端将第二终端设置为信任解锁设备后,可以向第二终端发送一个指示信息,该指示信息包括第一终端的蓝牙地址,该指示信息用于告知第二终端为第一终端的解锁设备,可以解锁第一终端。
可选择的,在第一终端设置与第一终端已连接的第二终端为信任解锁设备时,还可以将第一终端的第一解锁密码发送给第二终端。
需要说明的是,每个具有蓝牙功能的设备都具有一个蓝牙地址。当手机与其他终端建立蓝牙连接时,手机可以保存每个终端的蓝牙地址,如果手机将其中的一个或多个已建立蓝牙连接的终端设置为信任解锁设备时,手机会对应的保存一个标识或者指示信息。如下表1所示,手机保存与该手机建立蓝牙连接的设备的蓝牙地址和是否为信任解锁设备的示例信息。
已连接设备的蓝牙地址 是否为信任解锁设备
EB:F3:AC:F6:E9:17
FC:F5:EC:E6:R9:50
AM:E5:BC:N6:R7:35
表1
可选择的,在表1中还可以包括对应的设备类型,如手机、手环、笔记本等,此处不做限定。
703、第一终端获取解锁信息。
在本申请实施例中,第一终端获取的解锁信息可以是由第一终端向第二终端发送的解锁请求,第二终端根据解锁请求向第一终端发送的解锁信息,也可以是由第二终端主动向第一终端发送的解锁信息,不需要第一终端发送解锁请求。
其中,关于第一终端向第二终端发送解锁请求,包括但不限于以下几种实现方式:
(1)第一终端在锁屏状态下,响应用户输入的解锁操作,可以根据上述表1,确定为第一终端的信任解锁设备的是第二终端,向第二终端发送解锁请求(可参考图4C所示),第二终端反馈根据解锁请求反馈解锁信息。
(2)第一终端在锁屏状态下,若解锁失败的次数大于或等于第一预置阈值,则第一终端自动向第二终端发送解锁请求(可参考图4A所示)。
(3)第一终端在锁屏状态下,若解锁失败,响应用户输入的解锁操作,向第二终端发送解锁请求(可参考图4B所示)。
(4)第一终端在锁屏状态下,若解锁失败的次数大于或等于第一预置阈值,则第一终端呈现第一提示信息,第一提示信息用于提示用户是否向第二终端发送解锁请求,第一终端获取用户基于第一提示信息的操作,向第二终端发送解锁请求。
(5)第一终端在锁屏状态下,若在预置范围内检测到第二终端,则第一终端向第二终端发送解锁请求。
(6)第一终端在锁屏状态下,若在预置范围内检测到第二终端的时长大于或等于第二预置阈值,则第一终端向第二终端发送解锁请求。
(7)第一终端在锁屏状态下,呈现第二提示信息,第二提示信息包括至少两个联系人的联系方式,第二提示信息用于提示用户选择待发送解锁请求的联系人;第一终端获取用户输入的选择操作;若选择操作针对的联系人为预设联系人,则第一终端向第二终端发送解锁请求,第二终端为与预设联系人对应的终端;若选择操作针对的联系人不是预设联系人,则第一终端触发报警提示。
应理解,上述的解锁请求中包括第一终端的蓝牙地址,第二终端可以进行认证是否与第一终端建立信任解锁设备时,向第二终端发送的指示信息中包括的蓝牙地址相同,若相同,则第二终端向第一终端发送解锁信息。
第二终端向第一终端发送解锁信息,还可以包括:
(1)第二终端接收用户输入的解锁操作,向第一终端发送解锁信息。例如:图8C为智能手表向手机发送解锁信息的示意图。应理解,在图8C所示中,解锁标识是可以解锁手机的标识,用户点击解锁标识,第二终端响应用户的点击操作,弹出一个提示信息,向用户再次确认是否向手机发送解锁信息。若用户选“是”,则第二终端向第一终端发送解锁信息;第一终端在锁屏状态下,接收解锁信息。第一终端接收解锁信息时,可以根据上述表1确定第二终端是否为第一终端设置的已连接过的信任解锁设备,若是,则第一终端使用解锁信息解锁。
(2)若第二终端在预置范围内检测到第一终端,则第二终端向第一终端发送解锁信息。
(3)若第二终端在预置范围内检测到第一终端的时长大于预置阈值,则第二终端向第一终端发送解锁信息。
例如:图8D为手机和智能手表的距离在预设范围内的示意图。在图8D所示中,第二终端在预设距离范围(L)内检测到第一终端,或者检测到第一终端的时长达到预置阈值,向第一终端发送解锁信息,第一终端在锁屏状态下,接收解锁信息;第一终端接收解锁信息时,可以根据上述表1确定第二终端是否为第一终端设置的已连接过的信任解锁设备,若是,则第一终端使用解锁信息解锁。
或者,第一终端在锁屏状态下,在预设范围(L)内检测到第二终端,或者检测到第二终端的时长达到预置阈值,可以根据上述表1,确定为第一终端的信任解锁设备的是第二终端,向第二终端发送解锁请求,第二终端根据解锁请求反馈解锁信息。
可选择的,解锁信息可以包括第一终端的第一解锁密码,第一解锁密码用于解锁第一 终端;或者,解锁信息可以包括第一终端的第一解锁密码,解锁第一终端后再显示锁屏密码设置界面,该锁屏密码设置界面用于供用户重设解锁密码;或者,解锁信息用于强制清除第一终端的第一解锁密码,即将第一终端的解锁密码清除掉,进入操作界面;或者,解锁信息用于强制清除第一终端的第一解锁密码后再显示锁屏密码设置界面,该锁屏密码设置界面用于供用户重设第二解锁密码。
需要说明的是,第一终端向第二终端发送解锁请求,或者,第二终端向第一终端发送解锁信息时,第一终端和第二终端是处于蓝牙正在连接的状态。
704、第一终端响应解锁信息,执行解除锁屏状态的相关操作。
在本申请实施例中,第一终端响应解锁信息,执行解除锁屏状态的相关操作,可以包括但不限于以下几种实现方式:
(1)如果解锁信息包括第一终端的第一解锁密码,那么第一终端可以使用第一解锁密码解锁。具体可参考上述图4E所示,此处不再赘述。
(2)如果解锁信息包括第一终端的第一解锁密码和重设解锁密码的指示信息,那么第一终端可以使用解锁信息解锁后并显示锁屏密码设置界面,用户可以重设第二解锁密码。具体可参考上述图4F所示,此处不再赘述。
(3)如果解锁信息包括清除解锁密码的指示信息,那么第一终端可以使用解锁信息清除第一解锁密码。具体可参考上述图4G所示,此处不再赘述。
(4)如果解锁信息包括清除解锁密码的指示信息和重设解锁密码的指示信息,那么第一终端可以使用解锁信息清除第一解锁密码后并显示锁屏密码设置界面,用户可以重设第二解锁密码。具体可参考上述图4H所示,此处不再赘述。
需要说明的是,第一终端接收解锁信息后,还可以识别智能手表是否为已连接且设置为信任解锁的设备,如果验证成功,才可以解锁;或解锁后重设密码、或清除密码、或清除密码后重设密码。即解锁信息中还可以包括第二终端的蓝牙地址。
图8E为第一终端上显示是否通过智能手表解锁的示意图。应理解,第二终端向第一终端发送的解锁信息,可以不是由第一终端主动请求的,在这种情况下,如图8E所示,第一终端接收解锁信息时,可以给用户一个提示信息,如“是否通过智能手表解锁?”等类似信息的提示,确保第一终端用户信息的安全。
在本申请实施例中,用户忘记解锁密码时可通过该终端已连接过的信任解锁设备进行解锁。为忘记解锁密码提供一种可行的方案,无需清除终端上的用户数据即可清除解锁密码或清除解锁密码后重置解锁密码;本申请通过授权已连接的终端(如手环、智能手表等)解锁,可安全有效解决用户忘记终端的解锁密码问题。
在一种可能的实现方式中,第一终端在黑屏状态下,如果接收第二终端发送的解锁信息,解锁信息包括第一终端的唯一识别码和解锁密码,解锁密码用于解除第一终端的锁屏状态;第一终端可以响应于接收第二终端发送的解锁信息,第一终端点亮屏幕,进入锁屏状态,呈现锁屏界面,在锁屏界面上自动填充解锁密码;第一终端解除锁屏状态。
在本申请实施例中,黑屏状态是屏幕没有被点亮或者没有上电的状态。当第一终端接收第二终端发送的解锁信息后,第一终端响应于接收该第二终端发送的解锁信息,点亮屏 幕,进入锁屏状态,呈现锁屏界面,在该锁屏界面上自动填充该解锁密码,解除该锁屏状态。也可以是第一终端响应于接收该第二终端发送的解锁信息,点亮屏幕,进入锁屏状态,呈现锁屏界面,用户根据解锁信息中的提示,手动输入解锁密码来解除第一终端的锁屏状态。
在一种可能的实现方式中,若第一终端检测到第二终端在预设距离范围(如5cm)内,第一终端向第二终端发送解锁请求,解锁请求用于请求第二终端解除第一终端的锁屏状态,第一请求包括第一终端的唯一识别码和第二终端的唯一识别码;第一终端接收第二终端发送的解锁信息,解锁信息为第二终端对解锁请求的响应,解锁信息包括第二终端的唯一识别码和解锁密码,解锁密码用于解除第一终端的锁屏状态;响应于接收到解锁信息,第一终端呈现锁屏界面,在锁屏界面上自动填充解锁密码,解除锁屏状态。
在本申请实施例中,若该第一终端在预设距离范围内检测到第二终端,则该第一终端向该第二终端发送解锁请求,接收第二终端发送的解锁信息,响应于接收到该解锁信息,该第一终端呈现锁屏界面,在锁屏界面上自动填充该解锁密码,解除该锁屏状态。也可以是第一终端响应于接收该第二终端发送的解锁信息,呈现锁屏界面,用户根据解锁信息中的提示,手动输入解锁密码来解除第一终端的锁屏状态。
可选择的,若第一终端监测到第二终端在预设距离范围内,第一终端自动向第二终端发送解锁请求,可以包括:若第一终端检测到第二终端在预设距离范围内,且第二终端在预设距离范围内的持续时长大于预设时间阈值时,第一终端向第二终端发送解锁请求。
可以理解的是,在本申请中所有的示例以及附图说明,只是为了更清楚的表达本申请的技术方案,并不构成对本申请保护范围的限定。
图9为本申请实施例中终端的一个实施例示意图,包括:
发送模块901用于,第一终端在锁屏状态下,向第二终端发送解锁请求,解锁请求包括第一终端的唯一识别码和第二终端的唯一识别码,第一终端的唯一识别码用于唯一标识第一终端,第二终端的唯一识别码用于唯一标识第二终端;
接收模块902用于,接收第二终端发送的解锁信息,解锁信息为第二终端对解锁请求的响应;
解锁模块903用于,响应解锁信息,执行解除锁屏状态的相关操作。
图10为本申请实施例中终端的另一个实施例示意图,包括:
接收模块1001用于,接收第一终端发送的解锁请求,解锁请求包括第一终端的唯一识别码,第一终端的唯一识别码用于唯一标识第一终端;
发送模块1002用于,若第一终端的唯一识别码与第二终端预先保存的唯一识别码相同,则向第一终端发送解锁信息,解锁信息用于执行解除第一终端的锁屏状态的相关操作。
如图9和图10所示的终端可用于执行图2所示的方法,其相同或相应的技术特征可相互援引,在此不做赘述。
图11为本申请实施例中终端的另一个实施例示意图,包括:
打开模块1101用于,在锁屏状态下,响应用户输入的操作,打开扫码应用;
解除模块1102用于,响应于扫码应用的扫码操作,解除锁屏状态。
如图11所示的终端可用于执行图5所示的方法,其相同或相应的技术特征可相互援引,在此不做赘述。
图12为本申请实施例中终端的另一个实施例示意图,包括:
接收模块1201用于,第一终端在锁屏状态下,接收第二终端发送的解锁信息,第二终端为与第一终端建立过通信连接的终端;
解锁模块1202用于,根据解锁信息清除第一终端的第一解锁密码,或者,根据解锁信息包括的第一解锁密码,解除第一终端的锁屏状态。
如图12所示的终端可用于执行图7所示的方法,其相同或相应的技术特征可相互援引,在此不做赘述。
图13为本申请实施例中终端的另一个实施例示意图,包括:
接收模块1301用于,第一终端在黑屏状态下,接收第二终端发送的解锁信息,解锁信息包括第一终端的唯一识别码和解锁密码,解锁密码用于解除第一终端的锁屏状态;
显示模块1302用于,响应于接收第二终端发送的解锁信息,第一终端点亮屏幕,进入锁屏状态,呈现锁屏界面,在锁屏界面上自动填充解锁密码;
解锁模块1303用于,解除锁屏状态。
图14为本申请实施例中终端的另一个实施例示意图,包括:
发送模块1401用于,若第一终端检测到第二终端在预设距离范围内,向第二终端发送解锁请求,解锁请求用于请求第二终端解除第一终端的锁屏状态,第一请求包括第一终端的唯一识别码和第二终端的唯一识别码;
接收模块1402用于,接收第二终端发送的解锁信息,解锁信息为第二终端对解锁请求的响应,解锁信息包括第二终端的唯一识别码和解锁密码,解锁密码用于解除第一终端的锁屏状态;
显示模块1403用于,响应于接收到解锁信息,第一终端呈现锁屏界面;
解锁模块1404用于,在锁屏界面上自动填充解锁密码,解除锁屏状态。
可选的,在本申请的一些实施例中,
发送模块1401具体用于,若第一终端检测到第二终端在预设距离范围内,且第二终端在预设距离范围内的持续时长大于预设时间阈值时,向第二终端发送解锁请求。
本申请实施例还提供了一种终端的实施例示意图,如图15所示,为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。具体可包括:如图15所示的终端可用于执行图2、图5或图7所示的方法,其相同或相应的技术特征可相互援引,在此不做赘述。该终端可以包括手机、平板电脑、个人数字助理(personal digital assistant,PDA)、销售终端(point of sales,POS)、车载电脑等任意终端设备。以终端为手机为例:
图15示出的是与本申请实施例提供的终端相关的手机的部分结构的框图。参考图15,手机包括:射频(Radio Frequency,RF)电路1510、存储器1520、输入单元1530、显示单元1540、传感器1550、音频电路1560、无线保真(wireless fidelity,WiFi)模块1570、处理器1580、以及电源1590等部件。本领域技术人员可以理解,图15中示出的手机结构 并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图15对手机的各个构成部件进行具体的介绍:
RF电路1510可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1580处理;另外,将设计上行的数据发送给基站。通常,RF电路1510包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1510还可以通过无线通信与网络和其他设备通信。
存储器1520可用于存储软件程序以及模块,处理器1580通过运行存储在存储器1520的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1520可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1520可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元1530可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1530可包括触控面板1531以及其他输入设备1532。触控面板1531,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1531上或在触控面板1531附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1531可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1580,并能接收处理器1580发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1531。除了触控面板1531,输入单元1530还可以包括其他输入设备1532。具体地,其他输入设备1532可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元1540可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1540可包括显示面板1541,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1541。进一步的,触控面板1531可覆盖显示面板1541,当触控面板1531检测到在其上或附近的触摸操作后,传送给处理器1580以确定触摸事件的类型,随后处理器1580根据触摸事件的类型在显示面板1541上提供相应的视觉输出。虽然在图15中,触控面板1531与显示面板1541是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1531与显示面板1541集成而实现手机的输入和输出功能。
手机还可包括至少一种传感器1550,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线 的明暗来调节显示面板1541的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1541和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路1560、扬声器1561,传声器1562可提供用户与手机之间的音频接口。音频电路1560可将接收到的音频数据转换后的电信号,传输到扬声器1561,由扬声器1561转换为声音信号输出;另一方面,传声器1562将收集的声音信号转换为电信号,由音频电路1560接收后转换为音频数据,再将音频数据输出处理器1580处理后,经RF电路1510以发送给比如另一手机,或者将音频数据输出至存储器1520以便进一步处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块1570可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图15示出了WiFi模块1570,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器1580是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1520内的软件程序和/或模块,以及调用存储在存储器1520内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1580可包括一个或多个处理单元;优选的,处理器1580可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1580中。
手机还包括给各个部件供电的电源1590(比如电池),优选的,电源可以通过电源管理系统与处理器1580逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。
上述方法实施例中终端的结构可以基于图15所示的结构,图15所示的终端结构可以对应的执行上述方法实施例中的步骤,此处不再一一赘述。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数 据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。

Claims (88)

  1. 一种屏幕解锁的方法,其特征在于,包括:
    第一终端在锁屏状态下,向第二终端发送解锁请求,所述解锁请求包括所述第一终端的唯一识别码和所述第二终端的唯一识别码,所述第一终端的唯一识别码用于唯一标识所述第一终端,所述第二终端的唯一识别码用于唯一标识所述第二终端;
    所述第一终端接收所述第二终端发送的解锁信息,所述解锁信息为所述第二终端对所述解锁请求的响应;
    所述第一终端响应所述解锁信息,执行解除所述锁屏状态的相关操作。
  2. 根据权利要求1所述的方法,其特征在于,所述解锁信息还包括所述第一终端的第一解锁密码;所述第一终端响应所述解锁信息,执行解除所述锁屏状态的相关操作,包括:
    所述第一终端响应所述解锁信息中的所述第一解锁密码,解除所述锁屏状态。
  3. 根据权利要求1所述的方法,其特征在于,所述第一终端响应所述解锁信息,执行解除所述锁屏状态的相关操作,包括:
    所述第一终端响应所述解锁信息清除所述第一终端的第一解锁密码,以使得所述第一终端解除所述锁屏状态;所述第一解锁密码为解除所述第一终端的锁屏状态的密码。
  4. 根据权利要求2或3所述的方法,其特征在于,所述第一终端解除所述锁屏状态后,所述方法还包括:
    所述第一终端显示重设解锁密码界面;
    所述第一终端响应用户输入的设置解锁密码的操作,重新设置所述第一终端的解锁密码。
  5. 根据权利要求1-4任一所述的方法,其特征在于,所述第一终端在锁屏状态下,向第二终端发送解锁请求,包括:
    所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则所述第一终端自动向所述第二终端发送解锁请求;或者,
    所述第一终端在锁屏状态下,响应用户输入的解锁操作,向所述第一终端发送解锁请求;或者,
    所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则所述第一终端呈现第一提示信息,所述第一提示信息用于提示用户是否向所述第二终端发送所述解锁请求,所述第一终端获取用户基于所述第一提示信息的操作,向所述第二终端发送解锁请求;或者,
    所述第一终端在锁屏状态下,获取用户输入的身份认证信息;若所述用户输入的身份认证信息与预设的身份认证信息相匹配,所述第一终端向所述第二终端发送解锁请求。
  6. 根据权利要求1-4任一所述的方法,其特征在于,所述第一终端在锁屏状态下,向第二终端发送解锁请求,包括:
    所述第一终端在锁屏状态下,呈现第二提示信息,所述第二提示信息包括至少两个联系人的联系方式,所述第二提示信息用于提示用户选择待发送解锁请求的联系人;
    所述第一终端获取用户输入的选择操作;
    若所述选择操作针对的联系人为预设联系人,则所述第一终端向第二终端发送解锁请求,所述第二终端为与所述预设联系人对应的终端;
    若所述选择操作针对的联系人不是预设联系人,则所述第一终端触发报警提示。
  7. 根据权利要求1-6任一所述的方法,其特征在于,所述第一终端向第二终端发送解锁请求之前,所述方法还包括:
    所述第一终端获取所述第一终端的唯一识别码和所述第二终端的唯一识别码;
    所述第一终端向所述第二终端发送认证请求,所述认证请求用于请求所述第二终端同意为所述第一终端执行解除所述第一终端的锁屏状态的相关操作;所述认证请求中包括所述第一终端的唯一识别码;
    所述第一终端接收所述第二终端发送的认证响应,所述认证响应为所述第二终端对所述认证请求的响应。
  8. 根据权利要求7所述的方法,其特征在于,所述认证请求还包括所述第一终端的第一解锁密码。
  9. 一种屏幕解锁的方法,其特征在于,包括:
    第二终端接收第一终端发送的解锁请求,所述解锁请求包括所述第一终端的唯一识别码,所述第一终端的唯一识别码用于唯一标识所述第一终端;
    若所述第一终端的唯一识别码与所述第二终端预先保存的唯一识别码相同,则所述第二终端向所述第一终端发送解锁信息,所述解锁信息用于执行解除所述第一终端的锁屏状态的相关操作。
  10. 根据权利要求9所述的方法,其特征在于,在所述第二终端向所述第一终端发送解锁信息之前,所述方法还包括:
    获取用户输入的身份认证信息;
    所述第二终端向所述第一终端发送解锁信息,包括:
    若所述用户输入的身份认证信息与预设的身份认证信息相匹配,则所述第二终端向所述第一终端发送所述解锁信息。
  11. 根据权利要求9或10所述的方法,其特征在于,所述解锁信息还包括所述第一终端的第一解锁密码,所述第一解锁密码用于所述第一终端解除所述第一终端的锁屏状态;或,所述解锁信息用于指示所述第一终端清除第一解锁密码,以使得所述第一终端解除所述锁屏状态。
  12. 根据权利要求9-11任一所述的方法,其特征在于,在所述第二终端向所述第一终端发送解锁信息之前,所述方法还包括:
    所述第二终端呈现提示信息,所述提示信息用于提示用户是否向所述第一终端发送解锁信息;
    所述第二终端向所述第一终端发送解锁信息,包括:
    所述第二终端获取用户基于所述提示信息的操作,向所述第一终端发送所述解锁信息。
  13. 根据权利要求9-12任一所述的方法,其特征在于,在所述第二终端向所述第一终端发送解锁信息之后,所述方法还包括:
    所述第二终端接收所述第一终端发送的第二解锁密码,所述第二解锁密码为所述第一终端重新设置后的解锁密码。
  14. 一种屏幕解锁的方法,其特征在于,包括:
    第一终端在锁屏状态下,响应用户输入的操作,打开扫码应用;
    所述第一终端响应于所述扫码应用的扫码操作,解除所述锁屏状态。
  15. 根据权利要求14所述的方法,其特征在于,所述扫码操作的对象为扫描码;所述第一终端响应于所述扫码应用的扫码操作,解除所述锁屏状态,包括:
    所述第一终端响应于所述扫码应用的扫码操作,若所述扫描码承载的信息与预设的信息相匹配,则解除所述锁屏状态;
    所述方法还包括:
    若所述扫描码承载的信息与预设的信息不匹配,所述第一终端呈现提示信息。
  16. 根据权利要求14或15所述的方法,其特征在于,所述扫码操作的对象为扫描码;
    所述扫描码承载的信息包括所述第一终端的唯一识别码和所述第一终端的解锁密码,所述第一终端的唯一识别码用于唯一标识所述第一终端;或者,
    所述扫描码承载的信息包括用户标识和所述第一终端的解锁密码,所述用户标识用于唯一标识所述第一终端的用户;或者,
    所述扫描码承载的信息包括所述第一终端的唯一识识别码、所述用户标识和所述第一终端的解锁密码。
  17. 根据权利要求14-16任一所述的方法,其特征在于,所述第一终端解除所述锁屏状态之前,所述方法还包括:
    所述第一终端获取用户输入的身份认证信息;
    若用户输入的身份认证信息与预设的身份认证信息不匹配,所述第一终端呈现报警提示;
    所述第一终端解除所述锁屏状态,包括:
    若用户输入的身份认证信息与预设的身份认证信息匹配,所述第一终端解除所述锁屏状态。
  18. 根据权利要求14-17任一所述的方法,其特征在于,所述第一终端解除所述锁屏状态之后,所述方法还包括:
    所述第一终端显示重设解锁密码界面;
    所述第一终端响应用户输入的重设密码操作,设置第二解锁密码。
  19. 根据权利要求14-18任一所述的方法,其特征在于,所述第一终端在锁屏状态下,打开扫码应用,包括:
    所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则所述第一终端打开所述扫码应用;
    或者,
    所述第一终端在锁屏状态下,响应用户输入的打开操作,打开所述扫码应用;
    或者,
    所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则所述第一终端呈现用户提示信息,所述用户提示信息用于提示用户是否打开所述扫码应用;所述第一终端获取用户基于所述用户提示信息的操作,打开所述扫码应用;
    或者,
    所述第一终端在锁屏状态下,获取用户输入的身份认证信息;若所述用户输入的身份认证信息与预设的身份认证信息相匹配,所述第一终端打开所述扫码应用。
  20. 根据权利要求14-19任一所述的方法,其特征在于,所述第一终端在锁屏状态下,打开扫码应用之前,所述方法还包括:
    所述第一终端生成第一扫描码;
    所述第一终端向第二终端发送所述第一扫描码,或者,所述第一终端向服务器发送所述第一扫描码。
  21. 根据权利要求20所述的方法,其特征在于,所述方法还包括:
    若所述第一终端的第一解锁密码发生改变,则所述第一终端根据改变后的第一解锁密码和所述第一终端的唯一识别码生成第二扫描码;或者,
    所述第一终端定期更新所述第一扫描码,生成第三扫描码。
  22. 一种屏幕解锁的方法,其特征在于,包括:
    第一终端在锁屏状态下,接收所述第二终端发送的解锁信息,所述第二终端为与所述第一终端建立过通信连接的终端;
    所述第一终端根据所述解锁信息清除所述第一终端的第一解锁密码,或者,根据所述解锁信息包括的第一解锁密码,解除所述第一终端的所述锁屏状态。
  23. 根据权利要求22所述的方法,其特征在于,所述方法还包括:
    所述第一终端显示重设解锁密码界面;
    所述第一终端响应用户输入的重新设置解锁密码的操作,重新设置所述第一终端的第二解锁密码。
  24. 根据权利要求22或23所述的方法,其特征在于,所述第一终端在锁屏状态下,接收所述第二终端发送的解锁信息之前,包括:
    所述第一终端在锁屏状态下,若解锁失败的次数大于或等于第一预置阈值,则所述第一终端自动向所述第二终端发送解锁请求;或者,
    所述第一终端在锁屏状态下,响应用户输入的解锁操作,向所述第一终端发送解锁请求;或者,
    所述第一终端在锁屏状态下,若解锁失败的次数大于或等于第一预置阈值,则所述第一终端呈现第一提示信息,所述第一提示信息用于提示用户是否向所述第二终端发送所述解锁请求,所述第一终端获取用户基于所述第一提示信息的操作,向所述第二终端发送解锁请求;或者,
    所述第一终端在锁屏状态下,获取用户输入的身份认证信息;若所述用户输入的身份认证信息与预设的身份认证信息相匹配,所述第一终端向所述第二终端发送解锁请求;或者,
    所述第一终端在锁屏状态下,若在预置范围内检测到所述第二终端,则所述第一终端向所述第二终端发送所述解锁请求;或者,
    所述第一终端在锁屏状态下,若在预置范围内检测到所述第二终端的时长大于或等于第二预置阈值,则所述第一终端向所述第二终端发送所述解锁请求。
  25. 根据权利要求22或23所述的方法,其特征在于,所述第一终端在锁屏状态下,接收所述第二终端发送的解锁信息之前,包括:
    所述第一终端在锁屏状态下,呈现第二提示信息,所述第二提示信息包括至少两个联系人的联系方式,所述第二提示信息用于提示用户选择待发送解锁请求的联系人;
    所述第一终端获取用户输入的选择操作;
    若所述选择操作针对的联系人为预设联系人,则所述第一终端向第二终端发送解锁请求,所述第二终端为与所述预设联系人对应的终端;
    若所述选择操作针对的联系人不是预设联系人,则所述第一终端触发报警提示。
  26. 一种屏幕解锁的方法,其特征在于,所述方法包括:
    第一终端在黑屏状态下,接收第二终端发送的解锁信息,所述解锁信息包括所述第一终端的唯一识别码和解锁密码,所述解锁密码用于解除所述第一终端的锁屏状态;
    响应于接收所述第二终端发送的解锁信息,所述第一终端点亮屏幕,进入锁屏状态,呈现锁屏界面,在所述锁屏界面上自动填充所述解锁密码;
    所述第一终端解除所述锁屏状态。
  27. 一种屏幕解锁的方法,其特征在于,所述方法包括:
    若所述第一终端检测到第二终端在预设距离范围内,所述第一终端向所述第二终端发送解锁请求,所述解锁请求用于请求所述第二终端解除所述第一终端的锁屏状态,所述第一请求包括所述第一终端的唯一识别码和所述第二终端的唯一识别码;
    所述第一终端接收所述第二终端发送的解锁信息,所述解锁信息为所述第二终端对所述解锁请求的响应,所述解锁信息包括所述第二终端的唯一识别码和解锁密码,所述解锁密码用于解除所述第一终端的锁屏状态;
    响应于接收到所述解锁信息,所述第一终端呈现锁屏界面,在锁屏界面上自动填充所述解锁密码,解除所述锁屏状态。
  28. 根据权利要求27所述的方法,其特征在于,所述若所述第一终端监测到第二终端在预设距离范围内,所述第一终端自动向所述第二终端发送解锁请求,包括:
    若所述第一终端检测到第二终端在预设距离范围内,且所述第二终端在预设距离范围内的持续时长大于预设时间阈值时,所述第一终端向所述第二终端发送解锁请求。
  29. 一种终端,其特征在于,包括:
    发送器、接收器和处理器,所述发送器、所述接收器和所述处理器通过总线连接;
    所述发送器用于,第一终端在锁屏状态下,向第二终端发送解锁请求,所述解锁请求包括所述第一终端的唯一识别码和所述第二终端的唯一识别码,所述第一终端的唯一识别码用于唯一标识所述第一终端,所述第二终端的唯一识别码用于唯一标识所述第二终端;
    所述接收器用于,接收所述第二终端发送的解锁信息,所述解锁信息为所述第二终端 对所述解锁请求的响应;
    所述处理器,用于响应所述解锁信息,执行解除所述锁屏状态的相关操作。
  30. 根据权利要求29所述的终端,其特征在于,所述解锁信息还包括所述第一终端的第一解锁密码;
    所述处理器具体用于,响应所述解锁信息中的所述第一解锁密码,解除所述锁屏状态。
  31. 根据权利要求29所述的终端,其特征在于,
    所述处理器具体用于,响应所述解锁信息清除所述第一终端的第一解锁密码,以使得所述第一终端解除所述锁屏状态;所述第一解锁密码为解除所述第一终端的锁屏状态的密码。
  32. 根据权利要求30或31所述的终端,其特征在于,所述终端还包括输出设备和输入设备,
    所述输出设备用于,显示重设解锁密码界面;
    所述输入设备用于,响应用户输入的设置解锁密码的操作;
    所述处理器还用于,重新设置所述第一终端的解锁密码。
  33. 根据权利要求29-32任一所述的终端,其特征在于,所述终端还包括输入设备和输出设备,
    所述发送器具体用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则自动向所述第二终端发送解锁请求;或者,
    所述发送器具体用于,所述第一终端在锁屏状态下,响应用户输入的解锁操作,向所述第一终端发送解锁请求;或者,
    所述输出设备用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则呈现第一提示信息,所述第一提示信息用于提示用户是否向所述第二终端发送所述解锁请求,
    所述发送器具体用于,获取用户基于所述第一提示信息的操作,向所述第二终端发送解锁请求;或者,
    所述输入设备用于,所述第一终端在锁屏状态下,获取用户输入的身份认证信息;
    所述发送器具体用于,若所述用户输入的身份认证信息与预设的身份认证信息相匹配,则向所述第二终端发送解锁请求。
  34. 根据权利要求29-32任一所述的终端,其特征在于,所述终端还包括输入设备和输出设备,
    所述输出设备用于,所述第一终端在锁屏状态下,呈现第二提示信息,所述第二提示信息包括至少两个联系人的联系方式,所述第二提示信息用于提示用户选择待发送解锁请求的联系人;
    所述输入设备用于,获取用户输入的选择操作;
    所述发送器还用于,若所述选择操作针对的联系人为预设联系人,则向第二终端发送解锁请求,所述第二终端为与所述预设联系人对应的终端;
    所述输出设备还用于,若所述选择操作针对的联系人不是预设联系人,则触发报警提 示。
  35. 根据权利要求29-34任一所述的终端,其特征在于,
    所述处理器还用于,获取所述第一终端的唯一识别码和所述第二终端的唯一识别码;
    所述发送器还用于,向所述第二终端发送认证请求,所述认证请求用于请求所述第二终端同意为所述第一终端执行解除所述第一终端的锁屏状态的相关操作;所述认证请求中包括所述第一终端的唯一识别码;
    所述接收器还用于,接收所述第二终端发送的认证响应,所述认证响应为所述第二终端对所述认证请求的响应。
  36. 根据权利要求35所述的终端,其特征在于,所述认证请求还包括所述第一终端的第一解锁密码。
  37. 一种终端,其特征在于,包括:
    处理器和接收器,所述处理器和所述接收器通过总线连接;
    所述接收器用于,接收第一终端发送的解锁请求,所述解锁请求包括所述第一终端的唯一识别码,所述第一终端的唯一识别码用于唯一标识所述第一终端;
    所述处理器用于,若所述第一终端的唯一识别码与所述第二终端预先保存的唯一识别码相同,则向所述第一终端发送解锁信息,所述解锁信息用于执行解除所述第一终端的锁屏状态的相关操作。
  38. 根据权利要求37所述的终端,其特征在于,所述终端还包括输入模块,
    所述输入模块用于,获取用户输入的身份认证信息;
    所述发送模块还用于,若所述用户输入的身份认证信息与预设的身份认证信息相匹配,则向所述第一终端发送所述解锁信息。
  39. 根据权利要求37或38所述的终端,其特征在于,所述解锁信息还包括所述第一终端的第一解锁密码,所述第一解锁密码用于所述第一终端解除所述锁屏状态;或,所述解锁信息用于指示所述第一终端清除第一解锁密码,以使得所述第一终端解除所述锁屏状态。
  40. 根据权利要求37-39任一所述的终端,其特征在于,所述终端还包括输出设备,
    所述输出设备用于,呈现提示信息,所述提示信息用于提示用户是否向所述第一终端发送解锁信息;
    所述处理器具体用于,获取用户基于所述提示信息的操作,向所述第一终端发送所述解锁信息。
  41. 根据权利要求37-40任一所述的终端,其特征在于,
    所述接收器还用于,接收所述第一终端发送的第二解锁密码,所述第二解锁密码为所述第一终端重新设置后的解锁密码。
  42. 一种终端,其特征在于,包括:
    输入设备和处理器,所述输入设备和所述处理器通过总线连接;
    所述输入设备用于,第一终端在锁屏状态下,响应用户输入的操作,打开扫码应用;
    所述处理器用于,响应于所述扫码应用的扫码操作,解除所述锁屏状态。
  43. 根据权利要求42所述的终端,其特征在于,所述终端还包括输出设备,所述扫码操作的对象为扫描码;
    所述处理器具体用于,响应于所述扫码应用的扫码操作,若所述扫描码承载的信息与预设的信息相匹配,则解除所述锁屏状态;
    所述处理器还用于,若所述扫描码承载的信息与预设的信息不匹配,在所述输出设备上呈现提示信息。
  44. 根据权利要求42或43所述的终端,其特征在于,所述扫码操作的对象为扫描码;
    所述扫描码承载的信息包括所述第一终端的唯一识别码和所述第一终端的解锁密码,所述第一终端的唯一识别码用于唯一标识所述第一终端;或者,
    所述扫描码承载的信息包括用户标识和所述第一终端的解锁密码,所述用户标识用于唯一标识所述第一终端的用户;或者,
    所述扫描码承载的信息包括所述第一终端的唯一识识别码、所述用户标识和所述第一终端的解锁密码。
  45. 根据权利要求42-44任一所述的终端,其特征在于,所述终端还包括输入设备和输出设备,
    所述输入设备用于,获取用户输入的身份认证信息;
    所述处理器还用于,若用户输入的身份认证信息与预设的身份认证信息匹配,所述处理器解除所述锁屏状态;
    所述输出设备用于,若用户输入的身份认证信息与预设的身份认证信息不匹配,呈现报警提示。
  46. 根据权利要求42-45任一所述的终端,其特征在于,所述终端还包括输出设备,
    所述输出设备用于,显示重设解锁密码界面;
    所述处理器还用于,响应用户输入的重设密码操作,设置第二解锁密码。
  47. 根据权利要求42-46任一所述的终端,其特征在于,所述终端还包括输出设备和输入设备,
    所述处理器具体用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则打开所述扫码应用;
    或者,
    所述处理器具体用于,所述第一终端在锁屏状态下,响应用户输入的打开操作,打开所述扫码应用;
    或者,
    所述输出设备还用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,呈现用户提示信息,所述用户提示信息用于提示用户是否打开所述扫码应用;
    所述处理器具体用于,获取用户基于所述用户提示信息的操作,打开所述扫码应用;
    或者,
    所述输入设备还用于,所述第一终端在锁屏状态下,获取用户输入的身份认证信息;
    所述处理器具体用于,若所述用户输入的身份认证信息与预设的身份认证信息相匹配, 打开所述扫码应用。
  48. 根据权利要求42-47任一所述的终端,其特征在于,所述终端还包括发送器,
    所述处理器还用于,生成第一扫描码;
    所述发送器还用于,向第二终端发送所述第一扫描码,或者,向服务器发送所述第一扫描码。
  49. 根据权利要求48所述的终端,其特征在于,
    所述处理器还用于,若所述第一终端的第一解锁密码发生改变,则根据改变后的第一解锁密码和所述第一终端的唯一识别码生成第二扫描码;或者,
    所述处理器还用于,定期更新所述第一扫描码,生成第三扫描码。
  50. 一种终端,其特征在于,包括:
    处理器和接收器,所述处理器和所述接收器通过总线连接;
    所述接收器用于,第一终端在锁屏状态下,接收所述第二终端发送的解锁信息,所述第二终端为与所述第一终端建立过通信连接的终端;
    所述处理器用于,根据所述解锁信息清除所述第一终端的第一解锁密码,或者,根据所述解锁信息包括的第一解锁密码,解除所述第一终端的所述锁屏状态。
  51. 根据权利要求50所述的终端,其特征在于,所述终端还包括显示器,
    所述显示器用于,显示重设解锁密码界面;
    所述处理器还用于,响应用户输入的重新设置解锁密码的操作,重新设置所述第一终端的第二解锁密码。
  52. 根据权利要求50或51所述的终端,其特征在于,所述终端还包括输入设备、输出设备和发送器,
    所述发送器用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于第一预置阈值,则自动向所述第二终端发送解锁请求;或者,
    所述发送器用于,所述第一终端在锁屏状态下,响应用户输入的解锁操作,向所述第一终端发送解锁请求;或者,
    所述输出设备用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于第一预置阈值,则呈现第一提示信息,所述第一提示信息用于提示用户是否向所述第二终端发送所述解锁请求;
    所述发送器用于,获取用户基于所述第一提示信息的操作,向所述第二终端发送解锁请求;或者,
    所述输入设备用于,所述第一终端在锁屏状态下,获取用户输入的身份认证信息;
    所述发送器用于,若所述用户输入的身份认证信息与预设的身份认证信息相匹配,则向所述第二终端发送解锁请求;或者,
    所述发送器用于,所述第一终端在锁屏状态下,若在预置范围内检测到所述第二终端,则向所述第二终端发送所述解锁请求;或者,
    所述发送器用于,所述第一终端在锁屏状态下,若在预置范围内检测到所述第二终端的时长大于或等于第二预置阈值,则向所述第二终端发送所述解锁请求。
  53. 根据权利要求50或51所述的终端,其特征在于,所述终端还包括输入设备和输出设备,
    所述输出设备用于,所述第一终端在锁屏状态下,呈现第二提示信息,所述第二提示信息包括至少两个联系人的联系方式,所述第二提示信息用于提示用户选择待发送解锁请求的联系人;
    所述输入设备用于,获取用户输入的选择操作;
    所述发送器用于,若所述选择操作针对的联系人为预设联系人,则向第二终端发送解锁请求,所述第二终端为与所述预设联系人对应的终端;
    所述输出设备还用于,若所述选择操作针对的联系人不是预设联系人,则触发报警提示。
  54. 一种终端,其特征在于,包括:
    处理器、接收器和输出设备,所述接收器、所述处理器和所述输出设备通过总线连接;
    所述接收器用于,第一终端在黑屏状态下,接收第二终端发送的解锁信息,所述解锁信息包括所述第一终端的唯一识别码和解锁密码,所述解锁密码用于解除所述第一终端的锁屏状态;
    所述输出设备用于,响应于接收所述第二终端发送的解锁信息,所述第一终端点亮屏幕,进入锁屏状态,在所述显示器上呈现锁屏界面,
    所述处理器用于,在所述锁屏界面上自动填充所述解锁密码;解除所述锁屏状态。
  55. 一种终端,其特征在于,包括:
    处理器、接收器、发送器和所述输出设备,所述处理器、所述接收器、所述发送器和所述输出设备通过总线连接;
    所述发送器用于,若所述第一终端检测到第二终端在预设距离范围内,向所述第二终端发送解锁请求,所述解锁请求用于请求所述第二终端解除所述第一终端的锁屏状态,所述第一请求包括所述第一终端的唯一识别码和所述第二终端的唯一识别码;
    所述接收器用于,接收所述第二终端发送的解锁信息,所述解锁信息为所述第二终端对所述解锁请求的响应,所述解锁信息包括所述第二终端的唯一识别码和解锁密码,所述解锁密码用于解除所述第一终端的锁屏状态;
    所述输出设备用于,响应于接收到所述解锁信息,呈现锁屏界面,
    所述处理器用于,在锁屏界面上自动填充所述解锁密码,解除所述锁屏状态。
  56. 根据权利要求55所述的终端,其特征在于,
    所述发送器具体用于,若所述第一终端检测到第二终端在预设距离范围内,且所述第二终端在预设距离范围内的持续时长大于预设时间阈值时,则向所述第二终端发送解锁请求。
  57. 一种计算机可读存储介质,包括指令,当其在终端上运行时,使得终端执行如权利要求1-8或14-28任意一项所述的方法。
  58. 一种计算机可读存储介质,包括指令,当其在终端上运行时,使得终端执行如权利要求1-8或14-28任意一项所述的方法。
  59. 一种计算机可读存储介质,包括指令,当其在终端上运行时,使得终端执行如权利要求9-13任意一项所述的方法。
  60. 一种计算机可读存储介质,包括指令,当其在终端上运行时,使得终端执行如权利要求9-13任意一项所述的方法。
  61. 一种终端,其特征在于,包括:
    发送模块用于,第一终端在锁屏状态下,向第二终端发送解锁请求,所述解锁请求包括所述第一终端的唯一识别码和所述第二终端的唯一识别码,所述第一终端的唯一识别码用于唯一标识所述第一终端,所述第二终端的唯一识别码用于唯一标识所述第二终端;
    接收模块用于,接收所述第二终端发送的解锁信息,所述解锁信息为所述第二终端对所述解锁请求的响应;
    解锁模块用于,响应所述解锁信息,执行解除所述锁屏状态的相关操作。
  62. 根据权利要求61所述的终端,其特征在于,
    所述解锁模块具体用于,响应所述解锁信息中的所述第一解锁密码,解除所述锁屏状态。
  63. 根据权利要求61所述的终端,其特征在于,
    所述解锁模块具体用于,响应所述解锁信息清除所述第一终端的第一解锁密码,以使得所述第一终端解除所述锁屏状态;所述第一解锁密码为解除所述第一终端的锁屏状态的密码。
  64. 根据权利要求62或63所述的终端,其特征在于,所述终端还包括:
    显示模块用于,显示重设解锁密码界面;
    设置模块用于,响应用户输入的设置解锁密码的操作,重新设置所述第一终端的解锁密码。
  65. 根据权利要求61-64任一所述的终端,其特征在于,所述终端还包括:
    所述发送模块具体用于,在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则自动向所述第二终端发送解锁请求;或者,
    所述发送模块具体用于,所述第一终端在锁屏状态下,响应用户输入的解锁操作,向所述第一终端发送解锁请求;或者,
    显示模块用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则呈现第一提示信息,所述第一提示信息用于提示用户是否向所述第二终端发送所述解锁请求;
    所述发送模块具体用于,获取用户基于所述第一提示信息的操作,向所述第二终端发送解锁请求;或者,
    获取模块用于,所述第一终端在锁屏状态下,获取用户输入的身份认证信息;
    所述发送模块具体用于,若所述用户输入的身份认证信息与预设的身份认证信息相匹配,向所述第二终端发送解锁请求。
  66. 根据权利要求61-64任一所述的终端,其特征在于,所述终端还包括:
    显示模块用于,所述第一终端在锁屏状态下,呈现第二提示信息,所述第二提示信息 包括至少两个联系人的联系方式,所述第二提示信息用于提示用户选择待发送解锁请求的联系人;
    获取模块用于,获取用户输入的选择操作;
    所述发送模块用于,若所述选择操作针对的联系人为预设联系人,则向第二终端发送解锁请求,所述第二终端为与所述预设联系人对应的终端;
    提示模块用于,若所述选择操作针对的联系人不是预设联系人,则发报警提示。
  67. 根据权利要求61-66任一所述的终端,其特征在于,所述终端还包括:
    所述获取模块用于,获取所述第一终端的唯一识别码和所述第二终端的唯一识别码;
    所述发送模块用于,向所述第二终端发送认证请求,所述认证请求用于请求所述第二终端同意为所述第一终端执行解除所述第一终端的锁屏状态的相关操作;所述认证请求中包括所述第一终端的唯一识别码;
    所述接收模块用于,接收所述第二终端发送的认证响应,所述认证响应为所述第二终端对所述认证请求的响应。
  68. 根据权利要求67所述的终端,其特征在于,所述认证请求还包括所述第一终端的第一解锁密码。
  69. 一种终端,其特征在于,包括:
    接收模块用于,接收第一终端发送的解锁请求,所述解锁请求包括所述第一终端的唯一识别码,所述第一终端的唯一识别码用于唯一标识所述第一终端;
    发送模块用于,若所述第一终端的唯一识别码与所述第二终端预先保存的唯一识别码相同,则向所述第一终端发送解锁信息,所述解锁信息用于执行解除所述第一终端的锁屏状态的相关操作。
  70. 根据权利要求69所述的终端,其特征在于,所述终端还包括:
    获取模块用于,获取用户输入的身份认证信息;
    发送模块用于,若所述用户输入的身份认证信息与预设的身份认证信息相匹配,则向所述第一终端发送所述解锁信息。
  71. 根据权利要求69或70所述的终端,其特征在于,所述解锁信息还包括所述第一终端的第一解锁密码,所述第一解锁密码用于所述第一终端解除所述第一终端的锁屏状态;或,所述解锁信息用于指示所述第一终端清除第一解锁密码,以使得所述第一终端解除所述锁屏状态。
  72. 根据权利要求69-71任一所述的终端,其特征在于,所述终端还包括:
    显示模块用于,呈现提示信息,所述提示信息用于提示用户是否向所述第一终端发送解锁信息;
    获取模块用于,获取用户基于所述提示信息的操作,向所述第一终端发送所述解锁信息。
  73. 根据权利要求69-72任一所述的终端,其特征在于,
    所述接收模块用于,接收所述第一终端发送的第二解锁密码,所述第二解锁密码为所述第一终端重新设置后的解锁密码。
  74. 一种终端,其特征在于,包括:
    打开模块用于,在锁屏状态下,响应用户输入的操作,打开扫码应用;
    解除模块用于,响应于所述扫码应用的扫码操作,解除所述锁屏状态。
  75. 根据权利要求74所述的终端,其特征在于,所述终端还包括:
    解除模块还用于,响应于所述扫码应用的扫码操作,若所述扫描码承载的信息与预设的信息相匹配,则解除所述锁屏状态;
    显示模块用于,若所述扫描码承载的信息与预设的信息不匹配,呈现提示信息。
  76. 根据权利要求74或75所述的终端,其特征在于,所述扫码操作的对象为扫描码;
    所述扫描码承载的信息包括所述第一终端的唯一识别码和所述第一终端的解锁密码,所述第一终端的唯一识别码用于唯一标识所述第一终端;或者,
    所述扫描码承载的信息包括用户标识和所述第一终端的解锁密码,所述用户标识用于唯一标识所述第一终端的用户;或者,
    所述扫描码承载的信息包括所述第一终端的唯一识识别码、所述用户标识和所述第一终端的解锁密码。
  77. 根据权利要求74-76任一所述的终端,其特征在于,所述终端还包括:
    获取模块用于,获取用户输入的身份认证信息;
    显示模块用于,若用户输入的身份认证信息与预设的身份认证信息不匹配,呈现报警提示;
    所述解除模块具体用于,若用户输入的身份认证信息与预设的身份认证信息匹配,解除所述锁屏状态。
  78. 根据权利要求74-77任一所述的终端,其特征在于,所述终端还包括:
    显示模块用于,显示重设解锁密码界面;
    设置模块用于,响应用户输入的重设密码操作,设置第二解锁密码。
  79. 根据权利要求74-78任一所述的终端,其特征在于,所述终端还包括:
    所述打开模块具体用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则打开所述扫码应用;或者,
    所述打开模块具体用于,所述第一终端在锁屏状态下,响应用户输入的打开操作,打开所述扫码应用;或者,
    显示模块用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则呈现用户提示信息,所述用户提示信息用于提示用户是否打开所述扫码应用;
    所述打开模块具体用于,获取用户基于所述用户提示信息的操作,打开所述扫码应用;或者,
    所述打开模块具体用于,所述第一终端在锁屏状态下,获取用户输入的身份认证信息;若所述用户输入的身份认证信息与预设的身份认证信息相匹配,所述第一终端打开所述扫码应用。
  80. 根据权利要求74-79任一所述的终端,其特征在于,所述终端还包括:
    所述生成模块用于,生成第一扫描码;
    发送模块用于,向第二终端发送所述第一扫描码,或者,向服务器发送所述第一扫描码。
  81. 根据权利要求80所述的终端,其特征在于,所述终端还包括:
    所述生成模块用于,若所述第一终端的第一解锁密码发生改变,则根据改变后的第一解锁密码和所述第一终端的唯一识别码生成第二扫描码;或者,定期更新所述第一扫描码,生成第三扫描码。
  82. 一种终端,其特征在于,包括:
    接收模块用于,第一终端在锁屏状态下,接收所述第二终端发送的解锁信息,所述第二终端为与所述第一终端建立过通信连接的终端;
    解锁模块用于,根据所述解锁信息清除所述第一终端的第一解锁密码,或者,根据所述解锁信息包括的第一解锁密码,解除所述第一终端的所述锁屏状态。
  83. 根据权利要求82所述的终端,其特征在于,所述终端还包括:
    显示模块用于,显示重设解锁密码界面;
    设置模块用于,响应用户输入的重新设置解锁密码的操作,重新设置所述第一终端的第二解锁密码。
  84. 根据权利要求82或83所述的终端,其特征在于,所述终端还包括:
    发送模块用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则自动向所述第二终端发送解锁请求;或者,
    发送模块用于,所述第一终端在锁屏状态下,响应用户输入的解锁操作,向所述第一终端发送解锁请求;或者,
    显示模块用于,所述第一终端在锁屏状态下,若解锁失败的次数大于或等于预置阈值,则呈现第一提示信息,所述第一提示信息用于提示用户是否向所述第二终端发送所述解锁请求;
    发送模块用于,获取用户基于所述第一提示信息的操作,向所述第二终端发送解锁请求;或者,
    获取模块用于,所述第一终端在锁屏状态下,获取用户输入的身份认证信息;
    发送模块用于,若所述用户输入的身份认证信息与预设的身份认证信息相匹配,向所述第二终端发送解锁请求。
  85. 根据权利要求82或83所述的终端,其特征在于,所述终端还包括:
    所述显示模块用于,所述第一终端在锁屏状态下,呈现第二提示信息,所述第二提示信息包括至少两个联系人的联系方式,所述第二提示信息用于提示用户选择待发送解锁请求的联系人;
    所述获取模块用于,获取用户输入的选择操作;
    所述发送模块用于,若所述选择操作针对的联系人为预设联系人,则向第二终端发送解锁请求,所述第二终端为与所述预设联系人对应的终端;
    提示模块用于,若所述选择操作针对的联系人不是预设联系人,则触发报警提示。
  86. 一种终端,其特征在于,包括:
    接收模块用于,第一终端在黑屏状态下,接收第二终端发送的解锁信息,所述解锁信息包括所述第一终端的唯一识别码和解锁密码,所述解锁密码用于解除所述第一终端的锁屏状态;
    显示模块用于,响应于接收所述第二终端发送的解锁信息,点亮屏幕,进入锁屏状态,呈现锁屏界面,在所述锁屏界面上自动填充所述解锁密码;
    解锁模块用于,解除所述锁屏状态。
  87. 一种终端,其特征在于,包括:
    发送模块用于,若所述第一终端检测到第二终端在预设距离范围内,向所述第二终端发送解锁请求,所述解锁请求用于请求所述第二终端解除所述第一终端的锁屏状态,所述第一请求包括所述第一终端的唯一识别码和所述第二终端的唯一识别码;
    接收模块用于,接收所述第二终端发送的解锁信息,所述解锁信息为所述第二终端对所述解锁请求的响应,所述解锁信息包括所述第二终端的唯一识别码和解锁密码,所述解锁密码用于解除所述第一终端的锁屏状态;
    显示模块用于,响应于接收到所述解锁信息,所述第一终端呈现锁屏界面;
    解锁模块用于,在锁屏界面上自动填充所述解锁密码,解除所述锁屏状态。
  88. 根据权利要求87所述的终端终端,其特征在于,
    所述发送模块具体用于,若所述第一终端检测到第二终端在预设距离范围内,且所述第二终端在预设距离范围内的持续时长大于预设时间阈值时,向所述第二终端发送解锁请求。
PCT/CN2017/104197 2017-09-29 2017-09-29 一种屏幕解锁的方法及终端 WO2019061219A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/CN2017/104197 WO2019061219A1 (zh) 2017-09-29 2017-09-29 一种屏幕解锁的方法及终端
CN202111188784.1A CN114168916A (zh) 2017-09-29 2017-09-29 一种屏幕解锁的方法及终端
CN201780087948.7A CN110419042B (zh) 2017-09-29 2017-09-29 一种屏幕解锁的方法及终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/104197 WO2019061219A1 (zh) 2017-09-29 2017-09-29 一种屏幕解锁的方法及终端

Publications (1)

Publication Number Publication Date
WO2019061219A1 true WO2019061219A1 (zh) 2019-04-04

Family

ID=65902665

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/104197 WO2019061219A1 (zh) 2017-09-29 2017-09-29 一种屏幕解锁的方法及终端

Country Status (2)

Country Link
CN (2) CN110419042B (zh)
WO (1) WO2019061219A1 (zh)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110620847A (zh) * 2019-10-21 2019-12-27 深圳传音控股股份有限公司 智能终端的防盗方法、该智能终端
CN110753118A (zh) * 2019-10-24 2020-02-04 东北大学秦皇岛分校 基于网络的远程计算机开机解锁以及文件传输系统及方法
CN111400694A (zh) * 2020-04-01 2020-07-10 Oppo广东移动通信有限公司 一种解锁方法、第一终端、第二终端及存储介质
CN111581630A (zh) * 2020-05-12 2020-08-25 上海闻泰信息技术有限公司 一种电脑解锁方法、装置、设备和介质
CN114077323A (zh) * 2020-07-30 2022-02-22 荣耀终端有限公司 电子设备的触摸屏防误触方法、电子设备及芯片系统
WO2022052720A1 (zh) * 2020-09-09 2022-03-17 华为技术有限公司 解锁控制方法、系统、计算机存储介质及电子设备
WO2023016289A1 (zh) * 2021-08-13 2023-02-16 华为技术有限公司 远程身份认证方法及相关设备

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114692105A (zh) * 2020-12-31 2022-07-01 华为技术有限公司 一种密码重置的方法、装置和电子设备
CN113253907B (zh) * 2021-06-16 2023-06-16 北京交通大学 一种基于环境传感器的智能设备隐式身份识别方法
CN116541810A (zh) * 2022-01-26 2023-08-04 Oppo广东移动通信有限公司 设备解锁方法、装置、电子设备及计算机可读存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101990196A (zh) * 2010-11-12 2011-03-23 中兴通讯股份有限公司 运营商解锁移动终端的方法、装置和系统
CN102882679A (zh) * 2012-07-24 2013-01-16 中兴通讯股份有限公司 电子设备的解锁方法及解锁装置
CN104156648A (zh) * 2014-08-25 2014-11-19 北京网秦天下科技有限公司 屏幕解锁方法及装置
CN104424409A (zh) * 2013-08-30 2015-03-18 中兴通讯股份有限公司 一种应用解锁方法及装置
CN105160222A (zh) * 2015-09-30 2015-12-16 宇龙计算机通信科技(深圳)有限公司 一种解锁方法和移动终端
CN106778113A (zh) * 2015-11-20 2017-05-31 北京奇虎科技有限公司 通过智能穿戴设备解锁移动终端和应用的方法和装置
CN106897591A (zh) * 2015-12-18 2017-06-27 小米科技有限责任公司 解锁方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143483A (zh) * 2011-03-15 2011-08-03 中兴通讯股份有限公司 一种获取解锁码的方法及终端
CN104052873B (zh) * 2014-06-09 2017-01-11 宇龙计算机通信科技(深圳)有限公司 终端、多屏的解锁装置、方法及屏幕不同区域的解锁方法
CN105049562B (zh) * 2015-07-14 2017-09-19 广东欧珀移动通信有限公司 一种用户识别卡的解锁方法及通讯终端

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101990196A (zh) * 2010-11-12 2011-03-23 中兴通讯股份有限公司 运营商解锁移动终端的方法、装置和系统
CN102882679A (zh) * 2012-07-24 2013-01-16 中兴通讯股份有限公司 电子设备的解锁方法及解锁装置
CN104424409A (zh) * 2013-08-30 2015-03-18 中兴通讯股份有限公司 一种应用解锁方法及装置
CN104156648A (zh) * 2014-08-25 2014-11-19 北京网秦天下科技有限公司 屏幕解锁方法及装置
CN105160222A (zh) * 2015-09-30 2015-12-16 宇龙计算机通信科技(深圳)有限公司 一种解锁方法和移动终端
CN106778113A (zh) * 2015-11-20 2017-05-31 北京奇虎科技有限公司 通过智能穿戴设备解锁移动终端和应用的方法和装置
CN106897591A (zh) * 2015-12-18 2017-06-27 小米科技有限责任公司 解锁方法及装置

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110620847A (zh) * 2019-10-21 2019-12-27 深圳传音控股股份有限公司 智能终端的防盗方法、该智能终端
CN110620847B (zh) * 2019-10-21 2022-08-30 深圳传音控股股份有限公司 智能终端的防盗方法、该智能终端
CN110753118A (zh) * 2019-10-24 2020-02-04 东北大学秦皇岛分校 基于网络的远程计算机开机解锁以及文件传输系统及方法
CN111400694A (zh) * 2020-04-01 2020-07-10 Oppo广东移动通信有限公司 一种解锁方法、第一终端、第二终端及存储介质
CN111581630A (zh) * 2020-05-12 2020-08-25 上海闻泰信息技术有限公司 一种电脑解锁方法、装置、设备和介质
CN111581630B (zh) * 2020-05-12 2023-12-15 上海闻泰信息技术有限公司 一种电脑解锁方法、装置、设备和介质
CN114077323A (zh) * 2020-07-30 2022-02-22 荣耀终端有限公司 电子设备的触摸屏防误触方法、电子设备及芯片系统
CN114077323B (zh) * 2020-07-30 2024-04-19 荣耀终端有限公司 电子设备的触摸屏防误触方法、电子设备及芯片系统
WO2022052720A1 (zh) * 2020-09-09 2022-03-17 华为技术有限公司 解锁控制方法、系统、计算机存储介质及电子设备
WO2023016289A1 (zh) * 2021-08-13 2023-02-16 华为技术有限公司 远程身份认证方法及相关设备

Also Published As

Publication number Publication date
CN114168916A (zh) 2022-03-11
CN110419042A (zh) 2019-11-05
CN110419042B (zh) 2021-10-15

Similar Documents

Publication Publication Date Title
WO2019061219A1 (zh) 一种屏幕解锁的方法及终端
US11057376B2 (en) Method, apparatus, and system for controlling intelligent device, and storage medium
EP2985975B1 (en) Method, apparatus and system for authenticating access and computer program
EP3764253B1 (en) Method for quickly opening application or application function, and terminal
EP2761429B1 (en) Policy compliance-based secure data access
WO2018032661A1 (zh) 一种终端设备信息显示方法和终端设备
CN106778175B (zh) 一种界面锁定方法、装置和终端设备
WO2018161743A1 (zh) 指纹识别方法及相关产品
JP6765004B2 (ja) データ共有方法及び端末
CN108156537B (zh) 一种移动终端的远程操作方法及移动终端
CN108551521B (zh) 一种登录信息提示方法及移动终端
WO2016078504A1 (zh) 身份鉴权方法和装置
CN107682359B (zh) 一种应用注册方法、移动终端
WO2016192511A1 (zh) 远程删除信息的方法和装置
CN109274635B (zh) 安全管理方法、客户端设备、服务器、通信系统及存储介质
WO2019019837A1 (zh) 生物识别方法及相关产品
CN108491713B (zh) 一种安全提醒方法和电子设备
CN111756696A (zh) 应用程序的登录方法、第一电子设备和第二电子设备
WO2016106774A1 (zh) 一种图案锁的解锁方法及终端
CN111357245A (zh) 一种信息搜索的方法、终端、网络设备和系统
WO2019090702A1 (zh) 一种终端的安全保护方法及装置
WO2018166103A1 (zh) 一种基于无线通信的连接方法及终端
CN105262909B (zh) 一种移动终端使用方法、移动终端及存储介质
US20210173667A1 (en) Electronic Device Configuration Tool and Corresponding Methods
WO2017000496A1 (zh) 一种添加联系人的方法及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17927098

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17927098

Country of ref document: EP

Kind code of ref document: A1