WO2024104102A1 - 屏幕解锁方法、装置、电子设备及可读存储介质 - Google Patents

屏幕解锁方法、装置、电子设备及可读存储介质 Download PDF

Info

Publication number
WO2024104102A1
WO2024104102A1 PCT/CN2023/127507 CN2023127507W WO2024104102A1 WO 2024104102 A1 WO2024104102 A1 WO 2024104102A1 CN 2023127507 W CN2023127507 W CN 2023127507W WO 2024104102 A1 WO2024104102 A1 WO 2024104102A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
geographical location
unlocking
user
biometric
Prior art date
Application number
PCT/CN2023/127507
Other languages
English (en)
French (fr)
Inventor
姜小伟
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024104102A1 publication Critical patent/WO2024104102A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Definitions

  • the present application belongs to the field of terminal technology, and specifically relates to a screen unlocking method, device, electronic device and readable storage medium.
  • biometric unlocking such as face unlocking, fingerprint unlocking, iris unlocking, etc.
  • smartphones are required to force users to use a password to unlock once every set period of time (for example, every 72 hours) when setting up biometric unlocking. This is called the biometric unlocking timeout limit.
  • the purpose of the embodiments of the present application is to provide a screen unlocking method, device, electronic device and readable storage medium, which can solve the problem that the device cannot be used due to the user forgetting the unlocking password.
  • an embodiment of the present application provides a screen unlocking method, the method comprising:
  • the electronic device is unlocked using the biometric function of the electronic device.
  • an embodiment of the present application provides a screen unlocking device, the device comprising:
  • a first acquisition module is used to acquire a first geographical location of the electronic device when it is detected that the electronic device is used for more than a preset time;
  • a second acquisition module is used to acquire a biometric feature of a user when the first geographical location is located in a safe unlocking area;
  • the unlocking module is used to unlock the electronic device using the biometric function of the electronic device when the user's biometric features pass the biometric verification.
  • an embodiment of the present application provides an electronic device, which includes a processor and a memory, wherein the memory stores programs or instructions that can be executed on the processor, and when the programs or instructions are executed by the processor, the steps of the method of the first aspect are implemented.
  • an embodiment of the present application provides a readable storage medium, on which a program or instruction is stored, and when the program or instruction is executed by a processor, the steps of the method of the first aspect are implemented.
  • an embodiment of the present application provides a chip, the chip including a processor and a communication interface, the communication interface and the processor are coupled, and the processor is used to run programs or instructions to implement the method of the first aspect.
  • an embodiment of the present application provides a computer program product, which is stored in a storage medium and is executed by at least one processor to implement the method of the first aspect.
  • the geographical location of the electronic device can be obtained, and when the geographical location of the electronic device is within the safe unlocking area, the user's biometric features can be obtained, and when the user's biometric features pass the biometric verification, the electronic device is unlocked using the biometric recognition function of the electronic device. That is, the electronic device is pre-set with a safe unlocking area, and if the geographical location of the electronic device is within the safe unlocking area, the biometric unlocking timeout limit is canceled, and the electronic device is unlocked directly through biometric recognition, so as to ensure that the user can quickly use the electronic device while ensuring a certain degree of security.
  • FIG1 is a flow chart of a screen unlocking method provided in an embodiment of the present application.
  • FIG2 is a schematic diagram of a display interface of an electronic device provided in an embodiment of the present application.
  • FIG3 is a second schematic diagram of a display interface of an electronic device provided in an embodiment of the present application.
  • FIG4 is a flow chart of a screen unlocking device provided in an embodiment of the present application.
  • FIG5 is a schematic diagram of the structure of an electronic device provided in an embodiment of the present application.
  • FIG. 6 is a schematic diagram of the structure of an electronic device provided in another embodiment of the present application.
  • first, second, etc. in the specification and claims of this application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the data used in this way can be interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by "first”, “second”, etc. are generally of one type, and the number of objects is not limited.
  • the first object can be one or more.
  • “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally indicates that the objects associated with each other are in an "or” relationship.
  • the screen unlocking method provided in the embodiment of the present application may be executed by the screen unlocking device provided in the embodiment of the present application, or an electronic device integrating the screen unlocking device, wherein the screen unlocking device may be implemented in hardware or software.
  • the typical application scenario of the screen unlocking method of the embodiment of the present application is first introduced.
  • the electronic device currently used by the user fails and cannot be used, the previous electronic device needs to be used for emergency. Since the previous electronic device has not been used for a long time, the user cannot directly use the biometric recognition function to unlock the electronic device, and must enter the password to unlock the electronic device. However, since the user has not used it for a long time, he usually forgets the password, which makes the user unable to unlock the electronic device, and further makes the previous electronic device unusable.
  • the user is at home, since home is a place where electronic devices are often used, if the password was entered when using the electronic device at home before, then the electronic device can be unlocked directly through the biometric recognition function.
  • FIG1 is a flow chart of a screen unlocking method provided in an embodiment of the present application.
  • the method can be applied to an electronic device, which can be a mobile phone, a tablet computer, a laptop computer, etc. As shown in FIG1, the method can include steps 1100 to 1300, which are described in detail below.
  • Step 1100 When it is detected that the electronic device is used for more than a preset time, a first geographical location of the electronic device is obtained.
  • the preset duration may be related to the security level of the biometric sensor in the electronic device. Specifically, the higher the security level of the biometric sensor, the longer the preset duration can be.
  • the preset duration can be 72 hours. It is understandable that in the related art, in order to ensure security, a password needs to be entered to unlock the electronic device every time the electronic device is used for more than 72 hours.
  • the use of the electronic device in the embodiment of the present application for more than the preset duration can also be understood as the electronic device being used for the preset duration again after the last password unlocking.
  • the electronic device has a positioning device, which can be a global positioning system (GPS) or a global navigation satellite system (GNSS).
  • GPS global positioning system
  • GNSS global navigation satellite system
  • the current geographical location of the electronic device can be obtained. For example, if it is detected that the electronic device has been used for 72 hours after the last password unlock, the current geographical location of the electronic device will be obtained through the positioning device in the electronic device.
  • Step 1200 When the first geographical location is within a secure unlocking area, obtain a user's biometric feature.
  • the security unlocking area can be an area pre-set by the user based on the actual scenario, or it can be an area automatically generated by the electronic device based on the location of each password input in historical operations.
  • the domain can be one or more.
  • the safe unlocking area can usually represent the area where the user often uses the electronic device, such as the user's home or the office where the user works. When the electronic device is in these areas, it is considered that the electronic device is highly likely not to be stolen, so the electronic device can be directly unlocked using biometric unlocking.
  • the biometric unlocking timeout limit can be canceled, that is, even if it is detected that the electronic device has been used for more than the preset time, the user does not need to be forced to use a password to unlock, making it more convenient for the user to unlock.
  • Step 1300 When the user's biological characteristics pass the biometric verification, the electronic device is unlocked using the biometric function of the electronic device.
  • the electronic device after the electronic device acquires the biometric feature, it is necessary to verify the matching of the biometric feature. When it is determined that the acquired biometric feature passes the verification, the electronic device is unlocked directly by biometric feature recognition.
  • the lock screen interface 21 includes a password unlocking area 22 and a fingerprint unlocking area 23.
  • a password can be entered through the password unlocking area 22, and the electronic device can be unlocked if the password is verified.
  • a fingerprint feature can be entered through the fingerprint unlocking area 23, and the electronic device can be unlocked if the fingerprint is verified. If the electronic device is used for more than 72 hours, the location of the electronic device at this time can be further obtained. If the current location of the electronic device is within the safe unlocking area, the electronic device does not need to display the password input interface, but can directly obtain the user's fingerprint feature. After further determining that the user's fingerprint feature is verified, the electronic device can be directly unlocked.
  • the geographical location of the electronic device can be obtained, and when the geographical location of the electronic device is within the security unlocking area, the user's biometric features can be obtained, and when the user's biometric features pass the biometric verification, the electronic device can be unlocked using the biometric recognition function of the electronic device. That is, the electronic device is pre-set with a corresponding security unlocking area, and there is usually no situation in which the device is stolen or the password is maliciously cracked within the security unlocking area. Therefore, if the geographical location of the electronic device is within the security unlocking area, the biometric unlocking timeout limit is canceled, that is, the user does not need to enter a password, and the device can be unlocked directly through biometric recognition. Unlock electronic devices.
  • the screen unlocking method of the embodiment of the present application when executing the above step 1200 and the first geographic location is located in the security unlocking area, before obtaining the user's biometric features, the screen unlocking method of the embodiment of the present application also includes the step of generating a security unlocking area.
  • the generation of the safety unlocking area may further include the following steps 2100 to 2300 .
  • Step 2100 Display a security unlock area generation control on the first interface.
  • the first interface can be a setting interface, which includes a password unlock setting control, a biometric unlock setting control, and a security unlock area generation control.
  • a password can be entered through the password unlock setting control, and biometric information (such as fingerprint information) can be entered through the biometric unlock setting control.
  • biometric information such as fingerprint information
  • the security unlock area can be set through the security unlock area generation control.
  • Step 2200 receiving a third input from the user for generating a control for a security unlocking area.
  • Step 2200 Generate a security unlock area in response to a third input.
  • the user can click on the security unlock area generation control to enter the security unlock area selection interface, and select "home” as one of the security unlock areas in the security unlock area selection interface, or select "work office” as another security unlock area in the security unlock area selection interface.
  • the user can flexibly set the security unlocking area, thereby realizing flexible setting of the security unlocking area.
  • the generation of the security unlocking area may further include the following steps 3100 to 3300.
  • Step 3100 receiving the password entered by the user in the lock screen interface of the electronic device.
  • Step 3200 When the password verification is successful, record the second geographic location of the electronic device.
  • the password entered in the lock screen interface of the electronic device is used to unlock the electronic device with a password.
  • the second geographical location is the geographical location of the electronic device when the password verification is passed.
  • the electronic device can record the second geographical location at that time.
  • Step 3300 When the number of password verifications passed at the target geographic location exceeds a set number, a safe unlocking area is generated according to the target geographic location.
  • the second geographical location includes the target geographical location.
  • the set number of times can be set according to the actual application scenario and actual needs, for example, the set number of times is 3 times. It is understandable that the electronic device can continuously record the geographical location of the electronic device when the electronic device is unlocked based on the password, and if the number of times the password is unlocked at a geographical location exceeds 3 times, the area is considered to be a safe unlocking area. It is understandable that the geographical location of the electronic device is a range, for example, a circular area with the specific location of the electronic device as the center and the set value as the radius.
  • the geographical location of the user's frequently used electronic device can be automatically recorded, and a safe unlocking area can be generated based on the automatically recorded geographical location, thereby achieving automatic and accurate setting of the safe unlocking area.
  • the screen unlocking method of the embodiment of the present application further includes the following steps 4100 to 4300.
  • Step 4100 Display a map interface when the first geographical location is not within the security unlocking area.
  • the electronic device when the geographical location of the electronic device is not within the security unlocking area, the electronic device can call a map application and further display a map interface 301 as shown in FIG. 3 .
  • Step 4200 receiving the user's first input to the map interface.
  • the first input is used to select a target geographical location in the map interface.
  • the target geographical location may be a geographical location where the user frequently uses the electronic device, and the target geographical location may be one or more.
  • the user may select geographic location 41 on map interface 301 as one of the target geographic locations, select geographic location 42 on map interface 301 as another target geographic location, and select geographic location 43 on map interface 301 as yet another target geographic location.
  • Step 4300 in response to the first input, upon detecting the selected target geographic location and the safety unlock When the areas match, the user's biometric features are obtained, and when the user's biometric features pass biometric verification, the electronic device is unlocked using the biometric function of the electronic device.
  • the electronic device may respond to the first input and, if it is detected that there are N security unlocking areas, if the selected N target geographic locations correspond to the N security unlocking areas one by one, determine that the selected target geographic location matches the security unlocking area, where N is a positive integer. And when it is detected that the selected target geographic location matches the security unlocking area, the user's biometric feature is obtained. After the electronic device obtains the biometric feature, it is also necessary to verify the matching of the biometric feature. When it is determined that the obtained biometric feature passes the verification, the electronic device is unlocked directly by biometric recognition.
  • the electronic device detects the existence of three security unlock areas, namely security unlock area 31, security unlock area 32 and security unlock area 33 shown in Figure 3, and further detects that geographic location 41 is located in security unlock area 31, geographic location 42 is located in security unlock area 32, and geographic location 43 is located in security unlock area 33, it can be determined that the selected target geographic location matches the security unlock area, and further obtain the user's biometric features. When the obtained biometric features are verified, the electronic device can be unlocked directly by biometric recognition.
  • the user when the geographical location of the electronic device is not within the security unlocking area, the user is not forced to use a password to unlock the electronic device. Instead, a map interface is displayed for the user to manually select the target geographical location through the map interface. If the target geographical location matches the security unlocking area, the electronic device can be directly unlocked using biometrics, making it more convenient for the user to unlock.
  • the screen unlocking method of the embodiment of the present application further includes the following steps 5100 to 5300.
  • Step 5100 receiving a second input from the user.
  • the second input is used to retrieve the password.
  • the lock screen interface includes a retrieval password control, and the user can click the retrieval password control.
  • Step 5200 In response to the second input, obtain a third geographic location of the electronic device.
  • the electronic device can record the Your current geographical location.
  • Step 5300 When it is detected that the third geographic location is located in the safe unlocking area, a password retrieval operation is performed.
  • the password retrieval operation only requires inputting a new password, without inputting an old password.
  • the password retrieval operation is directly performed.
  • the electronic device when the geographical location of the electronic device is not within the security unlocking area, indicating that the user is currently in an unfamiliar geographical location, the electronic device displays a map interface and receives a first input from the user to the map interface, where the first input is used to select a target geographical location in the map interface; in response to the first input, when it is detected that the selected target geographical location matches the security unlocking area, a password retrieval operation is performed, and specific details may refer to the above steps 4100 to 4300.
  • the electronic device can call the map application and display the map interface 301 shown in FIG. 3.
  • the user can select the geographical location 41 as one of the target geographical locations on the map interface 301, select the geographical location 42 as another target geographical location on the map interface 301, and select the geographical location 43 as another target geographical location on the map interface 301.
  • the electronic device detects that it has three security unlocking areas, namely, the security unlocking area 31, the security unlocking area 32, and the security unlocking area 33, and further detects that the geographical location 41 is within the security unlocking area 31, the geographical location 42 is within the security unlocking area 32, and the geographical location 43 is within the security unlocking area 33, and then determines that the selected target geographical location matches the security unlocking area, and then performs the password retrieval operation.
  • the user when the geographical location of the electronic device is within the security unlocking area, the user can be quickly helped to retrieve the password. Moreover, when the geographical location of the electronic device is not within the security unlocking area, a map interface is displayed for the user to manually select the target geographical location. If the target geographical location matches the security unlocking area, the password retrieval operation can be performed. At the same time, the user needs to manually select multiple target geographical locations. If the selected multiple target geographical locations are consistent with multiple security unlocking areas, the password retrieval operation can be performed to prevent the thief from knowing the user's approximate residence and cracking the password.
  • the screen unlocking method provided in the embodiment of the present application can be executed by a screen unlocking device.
  • the screen unlocking method performed by the screen unlocking device is taken as an example to illustrate the screen unlocking device provided in the embodiment of the present application.
  • an embodiment of the present application further provides a screen unlocking device 400 , which includes a first acquisition module 410 , a second acquisition module 420 , and an unlocking module 430 .
  • the first acquisition module 410 is used to acquire a first geographical location of the electronic device when it is detected that the electronic device is used for more than a preset time;
  • the second acquisition module 420 is used to acquire the user's biometric characteristics when the first geographical location is located in the security unlocking area;
  • the unlocking module 430 is used to unlock the electronic device using the biometric function of the electronic device when the user's biometric features pass the biometric verification.
  • the apparatus 400 further includes a first display module and a first receiving module.
  • a first display module configured to display a map interface when the first geographical location is not located in the security unlocking area
  • a first receiving module used to receive a first input from a user on a map interface, the first input being used to select a target geographic location in the map interface;
  • the second acquisition module 420 is further configured to, in response to the first input, acquire a user's biometric feature when it is detected that the selected target geographic location matches the security unlocking area;
  • the unlocking module 430 is further used to unlock the electronic device using the biometric function of the electronic device when the user's biometric features pass the biometric verification.
  • the apparatus 400 further includes a determination module.
  • a determination module is used to respond to a first input, and when it is detected that there are N security unlocking areas, if the selected N target geographic locations correspond one-to-one with the N security unlocking areas, determine that the selected target geographic location matches the security unlocking area, where N is a positive integer.
  • the device further includes a second receiving module, a recording module and a generating module.
  • a second receiving module used to receive a password entered by a user in a lock screen interface of an electronic device
  • a recording module used for recording the second geographical location of the electronic device when the password verification is passed
  • a generating module for generating a safe unlocking area according to the target geographical location when the number of password verifications passed at the target geographical location exceeds a set number
  • the second geographical location includes the target geographical location.
  • the device 400 further includes a third receiving module, a third obtaining module and a password retrieving module.
  • a third receiving module is used to receive a second input from the user, where the second input is used to retrieve the password;
  • the password retrieval module is used to perform a password retrieval operation when it is detected that the third geographical location is located in the safe unlocking area.
  • the geographical location of the electronic device when it is detected that the electronic device has been used for more than a preset time, the geographical location of the electronic device can be obtained, and when the geographical location of the electronic device is located in a safe unlocking area, the user's biometric features can be obtained, and when the user's biometric features pass the biometric verification, the electronic device can be unlocked using the biometric recognition function of the electronic device. That is, the electronic device is pre-set with a corresponding safe unlocking area, and there is usually no situation in which the device is stolen or the password is maliciously cracked in the safe unlocking area. Therefore, if the geographical location of the electronic device is located in the safe unlocking area, the biometric unlocking timeout limit is canceled, that is, the user does not need to enter a password, and the electronic device is unlocked directly by biometric recognition.
  • the screen unlocking device in the embodiment of the present application can be an electronic device or a component in the electronic device, such as an integrated circuit or a chip.
  • the electronic device can be a terminal or a device other than a terminal.
  • the electronic device can be a mobile phone, a tablet computer, a laptop computer, a PDA, a vehicle-mounted electronic device, a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) device, a robot, a wearable device, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a netbook or a personal digital assistant (personal digital assistant, PDA), etc.
  • It can also be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), television (TV), ATM or self-service machine, etc., which is not specifically limited in the embodiments of the present application.
  • the screen unlocking device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 1. To avoid repetition, it will not be repeated here.
  • an embodiment of the present application also provides an electronic device 500, including a processor 501 and a memory 502, and the memory 502 stores a program or instruction that can be executed on the processor 501.
  • the program or instruction is executed by the processor 501, the various steps of the above-mentioned screen unlocking method embodiment are implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the electronic devices in the embodiments of the present application include the above-mentioned mobile electronic devices and non-mobile electronic devices.
  • FIG. 6 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
  • the electronic device 1000 includes but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, and a processor 1010 and other components.
  • the electronic device 1000 can also include a power supply (such as a battery) for supplying power to each component, and the power supply can be logically connected to the processor 1010 through a power management system, so that the power management system can manage charging, discharging, and power consumption.
  • a power supply such as a battery
  • the electronic device structure shown in FIG6 does not constitute a limitation on the electronic device, and the electronic device can include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
  • processor 1010 is used to obtain a first geographic location of the electronic device when it is detected that the electronic device has been used for more than a preset time; obtain a user's biometric characteristics when the first geographic location is within a safe unlocking area; and use the biometric function of the electronic device to unlock the electronic device when the user's biometric characteristics pass biometric verification.
  • the electronic device when it is detected that the electronic device has been used for more than a preset time, The geographical location of the electronic device is obtained, and when the geographical location of the electronic device is within the safe unlocking area, the user's biometric features are obtained, and when the user's biometric features pass the biometric verification, the electronic device is unlocked using the biometric recognition function of the electronic device. That is, the electronic device is pre-set with a corresponding safe unlocking area, and there is usually no situation of device theft or malicious password cracking in the safe unlocking area. Therefore, if the geographical location of the electronic device is within the safe unlocking area, the biometric unlocking timeout limit is canceled, that is, the user does not need to enter a password, and the electronic device is unlocked directly by biometric recognition.
  • processor 1010 is further used to display a map interface when the first geographic location is not within the security unlocking area; receive a first input from a user on the map interface, the first input being used to select a target geographic location in the map interface; in response to the first input, when it is detected that the selected target geographic location matches the security unlocking area, obtain a biometric feature of the user, and when the biometric feature of the user passes biometric verification, use the biometric function of the electronic device to unlock the electronic device.
  • the processor 1010 is further used to respond to the first input and, when it is detected that there are N security unlocking areas, determine that the selected target geographic location matches the security unlocking area if the selected N target geographic locations correspond one-to-one to the N security unlocking areas, where N is a positive integer.
  • processor 1010 is also used to receive a password entered by a user in the lock screen interface of an electronic device; if the password verification is successful, record the second geographic location of the electronic device; if the number of password verifications at the target geographic location exceeds a set number, generate a safe unlocking area according to the target geographic location; wherein the second geographic location includes the target geographic location.
  • processor 1010 is further used to receive a second input from the user, where the second input is used to retrieve a password; in response to the second input, obtain a third geographic location of the electronic device; and perform a password retrieval operation when it is detected that the third geographic location is located in a safe unlocking area.
  • the input unit 1004 may include a graphics processing unit (GPU) 10041 and a microphone 10042.
  • the graphics processor 10041 processes still images obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode.
  • the image data of the picture or video is processed.
  • the display unit 1006 may include a display panel 10061, and the display panel 10061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
  • the user input unit 1007 includes a touch panel 10071 and at least one of other input devices 10072.
  • the touch panel 10071 is also called a touch screen.
  • the touch panel 10071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 10072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
  • the memory 1009 can be used to store software programs and various data.
  • the memory 1009 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
  • the memory 1009 may include a volatile memory or a non-volatile memory, or the memory 1009 may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM) and a direct memory bus random access memory (DRRAM).
  • the memory 1009 in the embodiment of the present application includes but is not limited to these and any other suitable types of memory.
  • the processor 1010 may include one or more processing units; optionally, the processor 1010 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 1010.
  • the present application also provides a readable storage medium on which a program or instruction is stored.
  • a program or instruction is stored on which a program or instruction is stored.
  • the processor is the processor in the electronic device in the above embodiment.
  • the readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
  • An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface and the processor are coupled, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned screen unlocking method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • An embodiment of the present application provides a computer program product, which is stored in a storage medium.
  • the program product is executed by at least one processor to implement the various processes of the above-mentioned screen unlocking method embodiment and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the above embodiment methods can be implemented by means of software plus a necessary general hardware platform, or by hardware, but in many cases the former is a better implementation method.
  • the technical solution of the present application, or the part that contributes to the prior art can be implemented in the form of a computer software product.
  • the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, or optical disk), and includes a number of instructions for enabling a terminal (which may be a mobile phone, computer, server, or network device, etc.) to execute the methods of the various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本申请公开了一种屏幕解锁方法、装置、电子设备及可读存储介质,属于终端技术领域。该方法包括:在检测到电子设备使用超过预设时长的情况下,获取电子设备所处的第一地理位置;在第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征;在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。

Description

屏幕解锁方法、装置、电子设备及可读存储介质
相关申请的交叉引用
本申请主张在2022年11月15日在中国提交的中国专利申请号202211432022.6的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于终端技术领域,具体涉及一种屏幕解锁方法、装置、电子设备及可读存储介质。
背景技术
目前的智能手机,均支持生物识别解锁,如人脸解锁、指纹解锁、虹膜解锁等,但是由于生物识别解锁可能会被恶意破解,因此智能手机上均要求在设置使用生物识别解锁时,每隔设定时间段(例如每隔72小时)会强制用户使用一次密码解锁,其称为生物识别解锁超时限制。
然而,由于每隔一段时间,就需强制用户必须使用一次密码来解锁设备,对于长期未使用的设备,用户在再次使用的时候很有可能已经忘记了解锁密码,导致设备无法使用,降低了用户的使用体验。
发明内容
本申请实施例的目的是提供一种屏幕解锁方法、装置、电子设备及可读存储介质,能够解决用户由于忘记解锁密码导致设备无法使用的问题。
第一方面,本申请实施例提供了一种屏幕解锁方法,该方法包括:
在检测到电子设备使用超过预设时长的情况下,获取电子设备所处的第一地理位置;
在第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征;
在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。
第二方面,本申请实施例提供了一种屏幕解锁装置,该装置包括:
第一获取模块,用于在检测到电子设备使用超过预设时长的情况下,获取电子设备所处的第一地理位置;
第二获取模块,用于在第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征;
解锁模块,用于在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。
第三方面,本申请实施例提供了一种电子设备,该电子设备包括处理器和存储器,存储器存储可在处理器上运行的程序或指令,程序或指令被处理器执行时实现如第一方面的方法的步骤。
第四方面,本申请实施例提供了一种可读存储介质,可读存储介质上存储程序或指令,程序或指令被处理器执行时实现如第一方面的方法的步骤。
第五方面,本申请实施例提供了一种芯片,芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行程序或指令,实现如第一方面的方法。
第六方面,本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如第一方面的方法。
在本申请实施例中,当检测到电子设备使用超过预设时长的情况下,便可获取电子设备所处的地理位置,并在电子设备所处的地理位置位于安全解锁区域内的情况下,获取用户的生物特征,并在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备解锁。即,电子设备预先设置有安全解锁区域,若电子设备所处的地理位置位于安全解锁区域,则取消生物识别解锁超时限制,直接通过生物识别对电子设备进行解锁,以在一定程度保证安全程度的情况下,确定用户能够快速使用电子设备。
附图说明
图1是本申请实施例提供的屏幕解锁方法的流程图;
图2是本申请实施例提供的电子设备的显示界面示意图之一;
图3是本申请实施例提供的电子设备的显示界面示意图之二;
图4是本申请实施例提供的屏幕解锁装置的流程图;
图5是本申请实施例提供的电子设备的结构示意图;
图6是本申请另一实施例提供的电子设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”,一般表示前后关联对象是一种“或”的关系。
本申请实施例提供的屏幕解锁方法,其执行主体可以是本申请实施例提供的屏幕解锁装置,或者集成了该屏幕解锁装置的电子设备,其中该屏幕解锁装置可以采用硬件或软件的方式实现。
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的屏幕解锁方法进行详细地说明。
在介绍本申请实施例的屏幕解锁方法的各个执行步骤之前,先对本申请实施例的屏幕解锁方法的典型应用场景进行介绍。在用户当前所使用的电子设备存在故障无法使用的情况下,需要使用以前的电子设备进行救急,这个时候由 于以前的电子设备长时间未使用,用户无法直接使用生物识别功能对电子设备进行解锁,必须输入密码才能解锁电子设备。但是用户由于长时间未使用,通常会忘记密码,从而导致用户无法解锁电子设备,进一步导致以前的电子设备无法使用。而本申请实施例中,若用户位于家中,由于家是个较常使用电子设备的地点,因此若以前在家中使用该电子设备时输入过密码,那么可直接通过生物识别功能解锁该电子设备。
请参看图1,其是本申请实施例提供的一种屏幕解锁方法的流程图。该方法可以应用于电子设备中,该电子设备可以为手机、平板电脑、笔记本电脑等。如图1所示,该方法可以包括步骤1100~步骤1300,以下予以详细说明。
步骤1100,在检测到电子设备使用超过预设时长的情况下,获取电子设备所处的第一地理位置。
其中,预设时长可以是与电子设备中的生物识别传感器的安全等级有关,具体地,生物识别传感器的安全等级越高,预设时长可以越长,在此,预设时长可以为72小时。可以理解的是,相关技术中,为了保证安全性,在电子设备每使用超过72小时,需要输入密码才能解锁电子设备。除此之外,本申请实施例中的电子设备使用超过预设时长还可以理解为是,电子设备在上一次密码解锁后又使用了预设时长。
在一个可选地实施例中,电子设备中具有定位装置,该定位装置可以是全球定位系统(Global Positioning System,GPS),也可以是全球导航卫星系统(Global Navigation Satellite System,GNSS)。通过该定位装置,便可获取电子设备当前所处的地理位置。示例性地,若检测到电子设备在上一次密码解锁后又使用了72小时,则会通过电子设备中的定位装置获取电子设备当前所处的地理位置。
步骤1200,在第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征。
其中,安全解锁区域可以是用户基于实际场景预先设置的区域,也可以是电子设备基于历史操作中每次输入密码所在位置自动生成的区域。安全解锁区 域可以是一个,也可以是多个。
可以理解的是,安全解锁区域通常能够表征用户经常使用电子设备的区域,例如用户的家中、用户所工作的办公室,当电子设备处于这些区域中时,认为电子设备大概率没有被盗,因此可以直接使用生物识别解锁对电子设备进行解锁。在电子设备所处的地理位置位于安全解锁区域内的情况下,便可取消生物识别解锁超时限制,也就是即使检测到电子设备使用超过预设时长,也不需要强制用户使用密码解锁,使得用户解锁更加便捷。
步骤1300,在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。
本实施例中,在电子设备获取到生物特征之后,还需对生物特征的匹配情况进行验证,在确定获取到的生物特征通过验证的情况下,直接通过生物特征识别的方式对电子设备进行解锁。
示例性地,参照图2所示的锁屏界面21,锁屏界面21包括密码解锁区域22和指纹解锁区域23,通过密码解锁区域22可以输入密码,进而在密码通过验证的情况下将电子设备解锁。通过指纹解锁区域23可以输入指纹特征,进而在指纹通过验证的情况下对电子设备进行解锁。若电子设备使用超过72小时,则可以进一步获取电子设备此时所在的位置,如果电子设备当前所处的位置位于安全解锁区域内,则电子设备即无需显示密码输入界面,而是可以直接获取用户的指纹特征,在进一步确定用户的指纹特征通过验证的情况下,可以直接对电子设备进行解锁。
根据本申请实施例,当检测到电子设备使用超过预设时长的情况下,便可获取电子设备所处的地理位置,并在电子设备所处的地理位置位于安全解锁区域内的情况下,获取用户的生物特征,并在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备解锁。即,电子设备预先设置有对应的安全解锁区域,在安全解锁区域内通常不存在设备被盗,或者恶意破解密码的情况,因此,若电子设备所处的地理位置位于安全解锁区域,则取消生物识别解锁超时限制,即无需用户输入密码,而直接通过生物识别的方 式解锁电子设备。
在一个实施例中,在执行以上步骤1200在第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征之前,本申请实施例的屏幕解锁方法还包括生成安全解锁区域的步骤。
在安全解锁区域为用户基于实际场景预先设置的情况下,该生成安全解锁区域可以进一步包括如下步骤2100~步骤2300。
步骤2100,在第一界面上显示安全解锁区域生成控件。
本步骤2100中,第一界面可以是设置界面,第一界面上包括密码解锁设置控件、生物识别解锁设置控件以及安全解锁区域生成控件,通过密码解锁设置控件可以输入密码,通过生物识别解锁设置控件可以输入生物特征信息(如录入指纹信息),通过该安全解锁区域生成控件便可设置安全解锁区域。
步骤2200,接收用户对安全解锁区域生成控件的第三输入。
步骤2200,响应于第三输入,生成安全解锁区域。
示例性地,用户可以点击该安全解锁区域生成控件,进入安全解锁区域选择界面,并在安全解锁区域选择界面选择“家”作为其中的一个安全解锁区域,也可以在安全解锁区域选择界面选择“所工作的办公室”作为再一个安全解锁区域。
根据以上步骤2100~步骤2300,其可以由用户灵活设置安全解锁区域,实现了安全解锁区域的灵活设置。
在安全解锁区域是由基于历史操作中每次输入密码所在位置自动生成的情况下,该生成安全解锁区域可以进一步包括如下步骤3100~步骤3300。
步骤3100,接收用户在电子设备的锁屏界面中输入的密码。
步骤3200,在密码验证通过的情况下,记录电子设备所处的第二地理位置。
其中,在电子设备的锁屏界面中输入的密码用于对电子设备进行密码解锁。第二地理位置为密码验证通过时电子设备所处的地理位置。
可以理解的,当用户每次通过输入密码成功解锁电子设备时,电子设备都可以对此时所处的第二地理位置进行记录。
步骤3300,在目标地理位置处密码验证通过的次数超过设定次数的情况下,根据目标地理位置,生成安全解锁区域。
其中,第二地理位置包括目标地理位置。
能够理解的,设定次数可以是根据实际应用场景和实际需求设置,例如,设定次数为3次。可以理解的,电子设备可以持续记录基于密码解锁电子设备时该电子设备所处的地理位置,而在一个地理位置通过密码解锁的次数超过3次,则认为该区域为安全解锁区域。可以理解的是,电子设备所处的地理位置是一个范围,例如,以该电子设备所处的具体位置为圆心,以设定数值为半径的圆形区域。
根据以上步骤3100~步骤3300,能够将用户经常使用电子设备的地理位置自动记录,并基于自动记录的地理位置生成安全解锁区域,实现了安全解锁区域的自动、精准设置。
在一个实施例中,在执行以上步骤1100获取电子设备所处的第一地理位置之后,本申请实施例的屏幕解锁方法还进一步包括如下步骤4100~步骤4300。
步骤4100,在第一地理位置不位于安全解锁区域内的情况下,显示地图界面。
本实施例中,在电子设备所处的地理位置不位于安全解锁区域内的情况下,电子设备便可调用地图应用,并进一步显示图3所示的地图界面301。
步骤4200,接收用户对地图界面的第一输入。
其中,第一输入用于在地图界面中选择目标地理位置。其中,目标地理位置可以是用户经常使用电子设备的地理位置,目标地理位置可以是一个,也可以是多个。
继续上述示例,参照图3,用户可以在地图界面301上选择地理位置41作为其中一个目标地理位置,在地图界面301上选择地理位置42作为又一个目标地理位置,以及在地图界面301上选择地理位置43作为再一个目标地理位置。
步骤4300,响应于第一输入,在检测到所选择的目标地理位置与安全解锁 区域匹配的情况下,获取用户的生物特征,并在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。
在一个可选地实施例中,电子设备在接收到用户对地图界面的第一输入之后,可响应于该第一输入,在检测到存在N个安全解锁区域的情况下,若所选择的N个目标地理位置与N个安全解锁区域一一对应的情况下,确定所选择的目标地理位置与安全解锁区域匹配,其中,N为正整数。并在检测到所选择的目标地理位置和安全解锁区域匹配的情况下,获取用户的生物特征。在电子设备获取到生物特征之后,还需对生物特征的匹配情况进行验证,在确定获取到的生物特征通过验证的情况下,直接通过生物特征识别的方式对电子设备进行解锁。
继续上述示例,若电子设备检测到存在图3所示的安全解锁区域31、安全解锁区域32和安全解锁区域33这三个安全解锁区域,且进一步检测到地理位置41位于安全解锁区域31内,地理位置42位于安全解锁区域32内,以及地理位置43位于安全解锁区域33内,便可确定所选择的目标地理位置和安全解锁区域匹配,并进一步获取用户的生物特征,在所获取的生物特征通过验证的情况下,直接通过生物特征识别的方式对电子设备进行解锁。
根据本实施例,在电子设备所处的地理位置不位于安全解锁区域内的情况下,并不是强制用户使用密码解锁电子设备,而是显示地图界面,供用户通过地图界面手动选择出目标地理位置,若目标地理位置与安全解锁区域匹配,则可以直接使用生物识别的方式解锁电子设备,使得用户解锁更加便捷。
在一个实施例中,在显示锁屏界面的情况下,本申请实施例的屏幕解锁方法还包括如下步骤5100~步骤5300。
步骤5100,接收用户的第二输入。
其中,第二输入用于找回密码。示例性地,锁屏界面上包括找回密码控件,用户可以点击该找回密码控件。
步骤5200,响应于第二输入,获取电子设备所处的第三地理位置。
继续上述示例,在用户点击找回密码控件的情况下,电子设备便可记录自 身当前所处的地理位置。
步骤5300,在检测到第三地理位置位于安全解锁区域的情况下,执行找回密码操作。
可以理解的,该找回密码操作仅需要输入新密码,无需输入旧密码。在一个可选地实施例中,在电子设备所处的地理位置位于安全解锁区域内的情况下,则直接执行找回密码操作。
在一个可选地实施例中,在电子设备所处的地理位置不位于安全解锁区域内,表明用户当前处于一个陌生的地理位置,此时电子设备显示地图界面,并接收用户对地图界面的第一输入,第一输入用于在地图界面中选择目标地理位置;响应于第一输入,在检测到所选择的目标地理位置与安全解锁区域匹配的情况下,执行找回密码操作,具体可以参照上述步骤4100~步骤4300。
示例性地,在电子设备所处的地理位置不位于安全解锁区域内,电子设备便可调用地图应用,并显示图3所示的地图界面301。用户可以在地图界面301上选择地理位置41作为其中一个目标地理位置,在地图界面301上选择地理位置42作为又一个目标地理位置,以及在地图界面301上选择地理位置43作为再一个目标地理位置。电子设备检测到其存在安全解锁区域31、安全解锁区域32和安全解锁区域33这三个安全解锁区域,且进一步检测到地理位置41位于安全解锁区域31内,地理位置42位于安全解锁区域32内,以及地理位置43位于安全解锁区域33内,便可确定所选择的目标地理位置和安全解锁区域匹配,进而执行找回密码操作。
根据本实施例,在电子设备所处的地理位置位于安全解锁区域内的情况下,可以快速帮助用户找回密码。而且,在电子设备所处的地理位置不位于安全解锁区域内的情况下,显示地图界面,供用户手动选择目标地理位置,若目标地理位置与安全解锁区域匹配,便可执行找回密码操作。与此同时,用户需要手动选择出多个目标地理位置,若所选择出的多个目标地理位置与多个安全解锁区域一致,才可执行找回密码操作,以防止盗窃者知道用户的大概住处破解密码的情况出现。
本申请实施例提供的屏幕解锁方法,执行主体可以为屏幕解锁装置。本申请实施例中以屏幕解锁装置执行屏幕解锁的方法为例,说明本申请实施例提供的屏幕解锁装置。
与上述实施例相对应,参见图4,本申请实施例还提供一种屏幕解锁装置400,该屏幕解锁装置400包括第一获取模块410、第二获取模块420、解锁模块430。
第一获取模块410,用于在检测到电子设备使用超过预设时长的情况下,获取电子设备所处的第一地理位置;
第二获取模块420,用于在第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征;
解锁模块430,用于在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。
在一个实施例中,装置400还包括第一显示模块和第一接收模块。
第一显示模块,用于在第一地理位置不位于安全解锁区域内的情况下,显示地图界面;
第一接收模块,用于接收用户对地图界面的第一输入,第一输入用于在地图界面中选择目标地理位置;
第二获取模块420,还用于响应于第一输入,在检测到所选择的目标地理位置与安全解锁区域匹配的情况下,获取用户的生物特征;
解锁模块430,还用于在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。
在一个实施例中,装置400还包括确定模块。
确定模块,用于响应于第一输入,在检测到存在N个安全解锁区域的情况下,若所选择的N个目标地理位置与N个安全解锁区域一一对应的情况下,确定所选择的目标地理位置与安全解锁区域匹配,其中,N为正整数。
在一个实施例中,装置还包括第二接收模块、记录模块和生成模块。
第二接收模块,用于接收用户在电子设备的锁屏界面中输入的密码;
记录模块,用于在密码验证通过的情况下,记录电子设备所处的第二地理位置;
生成模块,用于在目标地理位置处密码验证通过的次数超过设定次数的情况下,根据目标地理位置,生成安全解锁区域;
其中,第二地理位置包括目标地理位置。
在一个实施例中,装置400还包括第三接收模块、第三获取模块和密码找回模块。
第三接收模块,用于接收用户的第二输入,第二输入用于找回密码;
第三获取模块,用于响应于第二输入,获取电子设备所处的第三地理位置;
密码找回模块,用于在检测到第三地理位置位于安全解锁区域的情况下,执行找回密码操作。
根据本申请实施例,当检测到电子设备使用超过预设时长的情况下,便可获取电子设备所处的地理位置,并在电子设备所处的地理位置位于安全解锁区域内的情况下,获取用户的生物特征,并在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备解锁。即,电子设备预先设置有对应的安全解锁区域,在安全解锁区域内通常不存在设备被盗,或者恶意破解密码的情况,因此,若电子设备所处的地理位置位于安全解锁区域,则取消生物识别解锁超时限制,即无需用户输入密码,而直接通过生物识别的方式解锁电子设备。
本申请实施例中的屏幕解锁装置可以是电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,还可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer, PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例中的屏幕解锁装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为ios操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。
本申请实施例提供的屏幕解锁装置能够实现图1的方法实施例实现的各个过程,为避免重复,这里不再赘述。
可选地,如图5所示,本申请实施例还提供一种电子设备500,包括处理器501和存储器502,存储器502上存储有可在处理器501上运行的程序或指令,该程序或指令被处理器501执行时实现上述屏幕解锁方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,本申请实施例中的电子设备包括上述的移动电子设备和非移动电子设备。
图6为实现本申请实施例的一种电子设备的硬件结构示意图。
该电子设备1000包括但不限于:射频单元1001、网络模块1002、音频输出单元1003、输入单元1004、传感器1005、显示单元1006、用户输入单元1007、接口单元1008、存储器1009、以及处理器1010等部件。
本领域技术人员可以理解,电子设备1000还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1010逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图6中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
其中,处理器1010,用于在检测到电子设备使用超过预设时长的情况下,获取电子设备所处的第一地理位置;在第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征;在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。
根据本申请实施例,当检测到电子设备使用超过预设时长的情况下,便可 获取电子设备所处的地理位置,并在电子设备所处的地理位置位于安全解锁区域内的情况下,获取用户的生物特征,并在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备解锁。即,电子设备预先设置有对应的安全解锁区域,在安全解锁区域内通常不存在设备被盗,或者恶意破解密码的情况,因此,若电子设备所处的地理位置位于安全解锁区域,则取消生物识别解锁超时限制,即无需用户输入密码,而直接通过生物识别的方式解锁电子设备。
可选地,处理器1010,还用于在第一地理位置不位于安全解锁区域内的情况下,显示地图界面;接收用户对地图界面的第一输入,第一输入用于在地图界面中选择目标地理位置;响应于第一输入,在检测到所选择的目标地理位置与安全解锁区域匹配的情况下,获取用户的生物特征,并在用户的生物特征通过生物识别验证的情况下,使用电子设备的生物识别功能对电子设备进行解锁。
可选地,处理器1010,还用于响应于第一输入,在检测到存在N个安全解锁区域的情况下,若所选择的N个目标地理位置与N个安全解锁区域一一对应的情况下,确定所选择的目标地理位置与安全解锁区域匹配,其中,N为正整数。
可选地,处理器1010,还用于接收用户在电子设备的锁屏界面中输入的密码;在密码验证通过的情况下,记录电子设备所处的第二地理位置;在目标地理位置处密码验证通过的次数超过设定次数的情况下,根据目标地理位置,生成安全解锁区域;其中,第二地理位置包括目标地理位置。
可选地,处理器1010,还用于接收用户的第二输入,第二输入用于找回密码;响应于第二输入,获取电子设备所处的第三地理位置;在检测到第三地理位置位于安全解锁区域的情况下,执行找回密码操作。
应理解的是,本申请实施例中,输入单元1004可以包括图形处理器(Graphics Processing Unit,GPU)10041和麦克风10042,图形处理器10041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态 图片或视频的图像数据进行处理。显示单元1006可包括显示面板10061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板10061。用户输入单元1007包括触控面板10071以及其他输入设备10072中的至少一种。触控面板10071,也称为触摸屏。触控面板10071可包括触摸检测装置和触摸控制器两个部分。其他输入设备10072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
存储器1009可用于存储软件程序以及各种数据。存储器1009可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1009可以包括易失性存储器或非易失性存储器,或者,存储器1009可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器1009包括但不限于这些和任意其它适合类型的存储器。
处理器1010可包括一个或多个处理单元;可选的,处理器1010集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1010中。
本申请实施例还提供一种可读存储介质,可读存储介质上存储有程序或指 令,该程序或指令被处理器执行时实现上述屏幕解锁方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,处理器为上述实施例中的电子设备中的处理器。可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,芯片包括处理器和通信接口,通信接口和处理器耦合,处理器用于运行程序或指令,实现上述屏幕解锁方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片、系统芯片、芯片系统或片上系统芯片等。
本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如上述屏幕解锁方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体 现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (15)

  1. 一种屏幕解锁方法,所述方法包括:
    在检测到电子设备使用超过预设时长的情况下,获取所述电子设备所处的第一地理位置;
    在所述第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征;
    在所述用户的生物特征通过生物识别验证的情况下,使用所述电子设备的生物识别功能对所述电子设备进行解锁。
  2. 根据权利要求1所述的方法,其中,在获取所述电子设备所处的第一地理位置之后,包括:
    在所述第一地理位置不位于安全解锁区域内的情况下,显示地图界面;
    接收用户对所述地图界面的第一输入,所述第一输入用于在所述地图界面中选择目标地理位置;
    响应于所述第一输入,在检测到所选择的目标地理位置与所述安全解锁区域匹配的情况下,获取用户的生物特征,并在所述用户的生物特征通过生物识别验证的情况下,使用所述电子设备的生物识别功能对所述电子设备进行解锁。
  3. 根据权利要求2所述的方法,其中,在所述接收用户对所述地图界面的第一输入之后,还包括:
    响应于所述第一输入,在检测到存在N个安全解锁区域的情况下,若所选择的N个目标地理位置与N个安全解锁区域一一对应的情况下,确定所选择的目标地理位置与所述安全解锁区域匹配,其中,N为正整数。
  4. 根据权利要求1所述的方法,其中,在所述第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征之前,包括:
    接收用户在所述电子设备的锁屏界面中输入的密码;
    在密码验证通过的情况下,记录所述电子设备所处的第二地理位置;
    在目标地理位置处密码验证通过的次数超过设定次数的情况下,根据所述目标地理位置,生成所述安全解锁区域;
    其中,所述第二地理位置包括所述目标地理位置。
  5. 根据权利要求1所述的方法,其中,在显示锁屏界面的情况下,所述方法还包括:
    接收用户的第二输入,所述第二输入用于找回密码;
    响应于所述第二输入,获取所述电子设备所处的第三地理位置;
    在检测到所述第三地理位置位于安全解锁区域的情况下,执行找回密码操作。
  6. 一种屏幕解锁装置,所述装置包括:
    第一获取模块,用于在检测到电子设备使用超过预设时长的情况下,获取所述电子设备所处的第一地理位置;
    第二获取模块,用于在所述第一地理位置位于安全解锁区域内的情况下,获取用户的生物特征;
    解锁模块,用于在所述用户的生物特征通过生物识别验证的情况下,使用所述电子设备的生物识别功能对所述电子设备进行解锁。
  7. 根据权利要求6所述的装置,其中,所述装置还包括第一显示模块和第一接收模块,
    所述第一显示模块,用于在所述第一地理位置不位于安全解锁区域内的情况下,显示地图界面;
    所述第一接收模块,用于接收用户对所述地图界面的第一输入,所述第一输入用于在所述地图界面中选择目标地理位置;
    所述第二获取模块,还用于响应于所述第一输入,在检测到所选择的目标地理位置与所述安全解锁区域匹配的情况下,获取用户的生物特征;
    所述解锁模块,还用于在所述用户的生物特征通过生物识别验证的情况下,使用所述电子设备的生物识别功能对所述电子设备进行解锁。
  8. 根据权利要求7所述的装置,其中,所述装置还包括确定模块,
    所述确定模块,用于响应于所述第一输入,在检测到存在N个安全解锁区域的情况下,若所选择的N个目标地理位置与N个安全解锁区域一一对应的情况下,确定所选择的目标地理位置与所述安全解锁区域匹配,其中,N为正整数。
  9. 根据权利要求6所述的装置,其中,所述装置还包括第二接收模块、记录模块和生成模块,
    所述第二接收模块,用于接收用户在所述电子设备的锁屏界面中输入的密码;
    所述记录模块,用于在密码验证通过的情况下,记录所述电子设备所处的第二地理位置;
    所述生成模块,用于在目标地理位置处密码验证通过的次数超过设定次数的情况下,根据所述目标地理位置,生成所述安全解锁区域;
    其中,所述第二地理位置包括所述目标地理位置。
  10. 根据权利要求9所述的装置,其中,所述装置还包括第三接收模块、第三获取模块和密码找回模块,
    第三接收模块,用于接收用户的第二输入,所述第二输入用于找回密码;
    第三获取模块,用于响应于所述第二输入,获取所述电子设备所处的第三地理位置;
    密码找回模块,用于在检测到所述第三地理位置位于安全解锁区域的情况 下,执行找回密码操作。
  11. 一种电子设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1-5中任一项所述的屏幕解锁方法的步骤。
  12. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-5中任一项所述的屏幕解锁方法的步骤。
  13. 一种电子设备,用于实现如权利要求1-5任一项所述的屏幕解锁方法。
  14. 一种芯片,包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1-5任一项所述的屏幕解锁方法。
  15. 一种计算机程序产品,所述计算机程序产品被至少一个处理器执行以实现如权利要求1-5任一项所述的屏幕解锁方法。
PCT/CN2023/127507 2022-11-15 2023-10-30 屏幕解锁方法、装置、电子设备及可读存储介质 WO2024104102A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211432022.6 2022-11-15
CN202211432022.6A CN115758309A (zh) 2022-11-15 2022-11-15 屏幕解锁方法、装置、电子设备及可读存储介质

Publications (1)

Publication Number Publication Date
WO2024104102A1 true WO2024104102A1 (zh) 2024-05-23

Family

ID=85371799

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/127507 WO2024104102A1 (zh) 2022-11-15 2023-10-30 屏幕解锁方法、装置、电子设备及可读存储介质

Country Status (2)

Country Link
CN (1) CN115758309A (zh)
WO (1) WO2024104102A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115758309A (zh) * 2022-11-15 2023-03-07 维沃移动通信有限公司 屏幕解锁方法、装置、电子设备及可读存储介质

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8302152B1 (en) * 2012-02-17 2012-10-30 Google Inc. Location-based security system for portable electronic device
US20150358333A1 (en) * 2014-06-04 2015-12-10 Grandios Technologies, Llc Geo-location and biometric presence security
US9218474B1 (en) * 2014-01-13 2015-12-22 Amazon Technologies, Inc. Enhanced biometric security measures
CN105912914A (zh) * 2016-05-27 2016-08-31 广东欧珀移动通信有限公司 一种指纹解锁方法、及终端设备
CN106055952A (zh) * 2016-05-27 2016-10-26 广东欧珀移动通信有限公司 一种指纹解锁方法、装置及用户终端
CN106066951A (zh) * 2016-05-24 2016-11-02 广东欧珀移动通信有限公司 一种电子终端的屏幕解锁方法、图像采集方法及装置
CN106682539A (zh) * 2016-11-30 2017-05-17 宇龙计算机通信科技(深圳)有限公司 一种终端屏幕解锁控制方法及装置
US20170195339A1 (en) * 2015-08-20 2017-07-06 Cloudwear Inc. Method and apparatus for geographic location based electronic security management
CN115758309A (zh) * 2022-11-15 2023-03-07 维沃移动通信有限公司 屏幕解锁方法、装置、电子设备及可读存储介质

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8302152B1 (en) * 2012-02-17 2012-10-30 Google Inc. Location-based security system for portable electronic device
US9218474B1 (en) * 2014-01-13 2015-12-22 Amazon Technologies, Inc. Enhanced biometric security measures
US20150358333A1 (en) * 2014-06-04 2015-12-10 Grandios Technologies, Llc Geo-location and biometric presence security
US20170195339A1 (en) * 2015-08-20 2017-07-06 Cloudwear Inc. Method and apparatus for geographic location based electronic security management
CN108369620A (zh) * 2015-08-20 2018-08-03 艾佛伦美国公司 用于基于地理位置的电子安全管理的方法和装置
CN106066951A (zh) * 2016-05-24 2016-11-02 广东欧珀移动通信有限公司 一种电子终端的屏幕解锁方法、图像采集方法及装置
CN105912914A (zh) * 2016-05-27 2016-08-31 广东欧珀移动通信有限公司 一种指纹解锁方法、及终端设备
CN106055952A (zh) * 2016-05-27 2016-10-26 广东欧珀移动通信有限公司 一种指纹解锁方法、装置及用户终端
CN106682539A (zh) * 2016-11-30 2017-05-17 宇龙计算机通信科技(深圳)有限公司 一种终端屏幕解锁控制方法及装置
CN115758309A (zh) * 2022-11-15 2023-03-07 维沃移动通信有限公司 屏幕解锁方法、装置、电子设备及可读存储介质

Also Published As

Publication number Publication date
CN115758309A (zh) 2023-03-07

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US20140344896A1 (en) Method and apparatus for using electronic device
EP3147768A1 (en) Screen interface unlocking method and screen interface unlocking device
US20080016371A1 (en) System and Method for Registering a Fingerprint, for Setting a Login Method of an Application, and for Logining in the Application
WO2024104102A1 (zh) 屏幕解锁方法、装置、电子设备及可读存储介质
US20180157817A1 (en) Unlocking method and apparatus, and storage medium
EP3680807B1 (en) Password verification method, password setting method, and mobile terminal
JP2015515694A (ja) 携帯型電子装置のための位置に基づくアクセス制御
US8719922B2 (en) Sensory association passcode
RU2636686C2 (ru) Способ и устройство для отправки информации в голосовой службе
WO2019101096A1 (zh) 安全验证的方法、装置及移动终端
US20220012317A1 (en) Systems and methods for providing a continuous biometric authentication of an electronic device
GB2447752A (en) Registering fingerprints for application software login
CN109214187B (zh) 一种控制计算机启动的方法、装置和电子设备
EP3407256A1 (en) Recognizing biological feature
US11405193B2 (en) Encrypted photographing method and system based on fingerprint recognition
US20150047019A1 (en) Information processing method and electronic device
WO2018107761A1 (zh) 信息处理方法及电子设备
EP4254225A1 (en) Terminal information display control method, apparatus, terminal, and storage medium
JP6938579B2 (ja) モバイル端末のプライバシー保護方法および保護装置、並びにモバイル端末
EP3460717A1 (en) Method, apparatus, terminal, and computer-readable storage medium for processing fingerprints
EP3236377B1 (en) Method, device and system for preventing account from being broken into
US20140373185A1 (en) Anti-theft Method and Computer System thereof
CN109800548B (zh) 一种防止个人信息泄露的方法和装置
CN113282202A (zh) 应用图标功能执行方法、装置、通信设备及存储介质