CN106327193B - A kind of system unlocking method and equipment - Google Patents
A kind of system unlocking method and equipment Download PDFInfo
- Publication number
- CN106327193B CN106327193B CN201610718935.2A CN201610718935A CN106327193B CN 106327193 B CN106327193 B CN 106327193B CN 201610718935 A CN201610718935 A CN 201610718935A CN 106327193 B CN106327193 B CN 106327193B
- Authority
- CN
- China
- Prior art keywords
- terminal device
- authentication
- information
- threshold
- authentication information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 77
- 238000012795 verification Methods 0.000 claims description 8
- 230000008014 freezing Effects 0.000 claims description 6
- 238000007710 freezing Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 4
- 230000007246 mechanism Effects 0.000 claims description 3
- 230000006854 communication Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 230000008569 process Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 9
- 238000012545 processing Methods 0.000 description 7
- 238000012546 transfer Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 241000196324 Embryophyta Species 0.000 description 3
- 230000004913 activation Effects 0.000 description 3
- 230000001186 cumulative effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012905 input function Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Telephone Function (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of system unlocking method and equipment, this method comprises: terminal device receives authentication information under system lock state;The terminal device authenticates the authentication information using preset system unlock authentication information, if authentification failure, authentication information is then received again, and received authentication information again is authenticated using the preset system unlock authentication information, until certification passes through;The terminal device counts authentification failure number, enters the first system if the authentification failure number is less than or equal to first threshold, if the authentification failure number is greater than second threshold and enters second system;The second system lacks payment class application compared to the first system, and the second threshold is greater than or equal to the first threshold.The present invention can protect the safety of its personal property in the case where terminal device owner is forced and is unlocked to its terminal device.
Description
Technical field
The present invention relates to field of communication technology, in particular to a kind of method and apparatus of system unlock.
Background technique
With the development of communication technology, various terminal equipment is more more and more universal, such as mobile phone, tablet computer etc. are
As part essential in daily life.Meanwhile more and more people like using the wechat branch on communication terminal device
It pays, Mobile banking, the application such as Alipay are paid.
For the safety and safety of payment of the information for protecting user in use, the relevant lock of many installing terminal equipments
Screen and unlocking program, screen locking and unlocking program are run on a terminal screen, show relevant unlock interface, user's input
Authentication information is by can just be successfully entered system after certification.
In the prior art, a unlock interface and corresponding password can only be arranged in usual communication terminal device, work as end
The owner of end equipment may be forced to say password or to terminal device in the case where personal safety is restricted and is threatened
It is unlocked.After being forced to unlock terminal device by infringer, infringer can be operated to be logged in by the terminal device of infringer
Payment application carries out the operation such as transfer accounts.The unlocking manner that terminal device uses at present has: numerical ciphers, gesture pattern, cunning
Dynamic unlock etc., these unlocking manners cannot have in the case where the owner of terminal device is forced to be unlocked its terminal device
Effect prevents illegal person from carrying out the operation such as transfer accounts.
Summary of the invention
The embodiment of the invention provides a kind of methods and apparatus of system unlock, to be forced pair in terminal device owner
Its terminal device protects the safety of its personal property in the case where being unlocked.
On the one hand the embodiment of the present invention provides a kind of method of system unlock, comprising:
Terminal device receives authentication information under system lock state;
The terminal device authenticates the authentication information using preset system unlock authentication information, if certification is lost
Lose, then receive authentication information again, and using the preset system unlock authentication information to received authentication information again into
Row certification, until certification passes through;
The terminal device counts authentification failure number, enters first if the authentification failure number is less than first threshold
System enters second system if the authentification failure number is greater than second threshold;The second system compares first system
System lacks payment class application, and the second threshold is greater than or equal to the first threshold.
In an optional implementation, before the terminal device receives authentication information under system lock state,
The method also includes:
The terminal device shows authentication interface after receiving unlock instruction.
In an optional implementation, enter the second system if the authentification failure number is greater than the second threshold
Before system, the method also includes:
The terminal device freezes and hides the payment class application.
In an optional implementation, after authentification failure, the method also includes:
Prompt information is exported, prompts whether replace authentication mode;
If receiving replacement instruction, currently used authentication mode is changed to the certification of the replacement instruction
Mode, then execution is described receives authentication information again.
In an optional implementation, the terminal device enters after second system, the method also includes:
The terminal device sends the location information and warning message of the terminal device to preset target terminal.
Correspondingly, the embodiment of the invention also discloses a kind of terminal devices, comprising:
Receiving unit receives authentication information for terminal device under system lock state;After authentification failure, again
Receive authentication information;
Authentication unit, for being authenticated using preset system unlock authentication information to the authentication information;
Statistic unit, for counting authentification failure number;
Execution unit, for entering the first system if the authentification failure number is less than first threshold, if the certification
The frequency of failure is greater than the second threshold and then enters second system;The second system lacks payment class compared to the first system
Using the second threshold is greater than or equal to the first threshold;
In an optional implementation, the receiving unit is also used to receive unlock instruction;The equipment is also wrapped
It includes:
Display unit, for showing authentication interface after the receiving unit receives unlock instruction.
In an optional implementation, the equipment further include:
Application control unit, for before entering second system if the authentification failure number is greater than the second threshold
Freeze and hides the payment class application in the terminal device.
In an optional implementation, the equipment further include:
Output unit prompts whether replace authentication mode for exporting prompt information after authentification failure;
The receiving unit is also used to receive replacement instruction;
Authentication control unit, if the replacement instruction is received for the receiving unit, by currently used certification
Mode is changed to the authentication mode of the replacement instruction;
The receiving unit is also used to be changed to the certification of the replacement instruction in currently used authentication mode
After mode, authentication information is received again.
In an optional implementation, the equipment further include:
Positioning unit, for positioning the location information of the terminal device.
Transmission unit, for after the terminal device enters second system, send to preset target terminal described in
The location information and warning message of terminal device.
As can be seen that the method for the present embodiment provides a kind of unlocking method that can freeze and hide payment class application.
It can be freezed and hidden in the case where terminal device owner is forced to be unlocked its terminal device by shirtsleeve operation
The application of hiding payment class and then the safety for protecting its personal property.
Detailed description of the invention
Technical method in order to illustrate the embodiments of the present invention more clearly, below by embodiment it is required use it is attached
Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this field
For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of system unlocking method of the embodiment of the present invention;
Fig. 2 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 3 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 4 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 5 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 6 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 7 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 8 is the terminal of that embodiment of the invention device structure schematic diagram.
Specific embodiment
In order to keep the purpose of the present invention, technical method and advantage clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a kind of system unlocking methods, as shown in Figure 1, comprising:
101: terminal device receives authentication information under system lock state;
Wherein, terminal device for example can be mobile phone, tablet computer, laptop, palm PC etc..
System lock state is the state that terminal device does not unlock, and terminal device is generally in standby shape in this state
State.Authentication information is verification information needed for releasing the lock state of terminal device.Authentication information can be character string, fingerprint,
One of voice etc. is a variety of, it is corresponding with the authentication mode of unlocking terminal equipment.Authentication mode for example can be sliding
Unlock, unlocked by fingerprint, speech unlocking etc..Such as the authentication mode of terminal device is unlocked by fingerprint, then corresponding authentication information is just
It is fingerprint.Authentication mode and the corresponding authentication information embodiment of the present invention do not make uniqueness restriction.
Terminal device receives authentication information under system lock state can be in blank screen shape without authentication interface, that is, mobile phone
State.User input authentication information can authenticate when terminal device is in black state, such as under black state
Pass through unlocked by fingerprint.
102: above-mentioned terminal device authenticates above-mentioned authentication information using preset system unlock authentication information, if recognizing
Card failure is then received authentication information again, and is believed using above-mentioned preset system unlock authentication information received certification again
Breath is authenticated, until certification passes through;
Preset system unlock authentication information is the authentication information being locally stored in terminal device, for what is inputted to user
Authentication information is authenticated.Authentication information can be one of character string, fingerprint, voice etc. or a variety of, it and terminal device
The authentication mode of unlock is corresponding.The embodiment of the present invention does not pay close attention to how to be authenticated, therefore does not make to this in detail at this
It states.If authentification failure, user needs to re-enter authentication information, and terminal device authenticates received authentication information again,
User of authentification failure needs to re-enter once, until certification passes through.If authenticating successfully preceding no longer input authentication information,
After then terminal device waits certain time, into standby mode.
103: above-mentioned terminal device counts authentification failure number, enters if above-mentioned authentification failure number is less than first threshold
The first system enters second system if above-mentioned authentification failure number is greater than second threshold;Above-mentioned second system is compared to above-mentioned the
One system lacks payment class application, and above-mentioned second threshold is greater than or equal to above-mentioned first threshold.
The first system is the system after normal starting, and the payment class in second system is applied in the shape for freezing and hiding
Payment class application in state, that is, terminal device system is freezed and be can not find in systems.
Payment class application refers to the application that Alipay, wechat payment, Mobile banking etc. use on communication terminal device
Program.
First threshold for example can be the positive integers such as 2,3,4,5,6, and second threshold for example can be 2,3,4,5,6,7 etc. just
Integer.Second threshold is greater than or equal to first threshold, if second threshold is equal to first threshold, such as first threshold and second threshold
All it is 3, the first system is entered if authentification failure number is less than 3, enters the second system if authentification failure number is greater than 3
System is not construed as limiting if authentification failure number is equal to 3, both can be into the first system or into second system;If the second threshold
Value is greater than first threshold, such as first threshold is 3, and second threshold is 4, and the first system is entered if authentification failure number is less than 3
System enters second system if authentification failure number is greater than 4, is not construed as limiting if when authentification failure number is 3 or 4, both
It can be into the first system or into second system.
For example, when first threshold and second threshold are all 3, if the 4th authenticates successfully, enter the second system
System, in such a system it can be seen that and operating all applications in addition to paying class;If the 2nd time authenticates successfully, enter first
System, that is, normal activation system.
As can be seen that present embodiments providing the unlocking method that can freeze and hide payment class application.In terminal device
Owner is forced to freeze in the case where being unlocked its terminal device by shirtsleeve operation and hiding payment class is answered
With the safety for protecting its personal property in turn.
Terminal device and a variety of authentication modes of support are unlocked in order to further facilitate user, the embodiment of the present invention is in preceding implementation
Another method for receiving authentication information is provided on the basis of example, it is specific as follows: in above-mentioned terminal device in system lock shape
Before receiving authentication information under state, the above method further include:
Above-mentioned terminal device shows authentication interface after receiving unlock instruction.
The method provided in an embodiment of the present invention for receiving authentication information is that user unlocks terminal device and support for convenience
A variety of authentication modes.Terminal device in the embodiment of the present invention shows authentication interface, authentication interface after receiving unlock instruction
Can be there are many form, such as can be unlocked by fingerprint, pattern unlock, speech unlocking etc..
For example, after user shows authentication interface on the display screen of terminal device, the case where according to authentication interface
Corresponding authentication information is inputted, authentication information is re-entered if authentification failure.For example, user lights terminal device display screen
Afterwards, by accordingly unlocking operation, terminal device can show unlock interface, and then user can input corresponding certification letter
Breath is authenticated.If after authenticating successfully, entering corresponding system;If certification is unsuccessful, re-enters authentication information and recognized
Card.
The method provided in an embodiment of the present invention for receiving authentication information is simpler and supports a variety of authentication modes.
The embodiment of the present invention provides the method for configuration security system on the basis of previous embodiment, specific as follows: on if
It states authentification failure number then to enter before second system greater than above-mentioned second threshold, the above method further include:
Above-mentioned terminal device freezes and hides above-mentioned payment class application.
Above-mentioned second system is exactly that the payment class with the security system that postpones, in second system is applied in freezing and hidden
The state of hiding, can not find in second system payment class application, even if therefore unlocking terminal equipment can not successfully transfer accounts
Deng operation.
For example, if the authentification failure number of user is greater than second threshold, terminal device first freezes payment class application
It ties and stashes, then enter back into the second system after authenticating successfully.In actual verification process, the configuration of second system
The process freezed and hidden that class application is paid in process, that is, terminal device is very fast, and user will not notice this process.With
For mobile phone, after authenticating successfully, if the number of the authentification failure of mobile phone statistics is greater than second threshold, in mobile phone
The payment class applications such as Alipay, Mobile banking, wechat payment are freezed and be can not find in mobile phone.
The method of configuration security system provided in an embodiment of the present invention is very hidden rapidly and to be can effectively prevent user and is forced
Operation of illegally transferring accounts etc. after unlock terminal device.
The embodiment of the present invention additionally provides a kind of method for replacing authentication mode on the basis of preceding embodiment, specifically such as
Under: after authentification failure, the above method further include:
Prompt information is exported, prompts whether replace authentication mode;
If receiving replacement instruction, currently used authentication mode is changed to the certification of above-mentioned replacement instruction
Then mode executes and above-mentioned receives authentication information again.
Authentication mode can there are many, such as the unlock of unlocked by fingerprint, pattern, speech unlocking etc..It can be set in terminal device
A variety of authentication modes are set, current authentication information can also replace other authenticating party if one side user forgets terminal device
Formula;Another aspect user can choose the authentication mode of more easily authentification failure when being forced and unlocking terminal device.For
For the embodiment of the present invention, authentication mode is most important, if terminal device there was only a kind of authentication mode and authentication mode is difficult
The method of intentional authentification failure, the embodiment of the present invention just loses meaning.For example, if terminal device only have unlocked by fingerprint this
It plants authentication mode and finger print identifying is very accurate, user is difficult the number so that authentification failure when being forced and unlocking terminal device
Reach above-mentioned second threshold.
For example, three kinds of authentication modes such as pattern unlock, unlocked by fingerprint and speech unlocking can be set in terminal device,
The authentication mode of default is unlocked by fingerprint.If user is under secure conditions, he can choose can also be using unlocked by fingerprint
Other authentication mode is selected after authentification failure;If user, in the case where being forced unlock, he can deliberately authentification failure select again
Select the pattern unlocking manner for being easy intentional authentification failure.
The number of authentification failure is cumulative in the embodiment of the present invention, and authentification failure number is authenticated under different authentication mode
The summation of the frequency of failure.Above-mentioned second threshold is more easily reachd in this way, and terminal device is caused to enter second system.
The method of replacement authentication mode provided in an embodiment of the present invention, not only enriches authentication mode, also improves this hair
The practical value of bright embodiment method.
The embodiment of the present invention additionally provides a kind of alarm method on the basis of preceding embodiment, specific as follows: above-mentioned terminal
Equipment enters after second system, the above method further include:
Above-mentioned terminal device sends the location information and warning message of above-mentioned terminal device to preset target terminal.
Wherein, the terminal device that preset target terminal can be the mechanisms such as the pre-set police office of user is also possible to
Other terminal devices.Warning message is used to illustrate that the user of terminal device is in danger and wants help.Warning message can
To include the identity information, sign information, appearance information etc. of user.The position of location information accurate positionin terminal device.Terminal
Equipment timing sends location information to preset target terminal equipment, constantly notifies the position of preset target terminal terminal device
Information.
Above-mentioned terminal device sends the location information of above-mentioned terminal device to preset target terminal and warning message passes through
Hidden mode carries out, and terminal device does not show corresponding information.
Alarm method provided in an embodiment of the present invention hidden can send out the location information of terminal device and warning message
Preset target terminal is given, so that victim be helped to be saved in time.
The embodiment of the invention also provides a kind of terminal devices, as shown in Figure 2, comprising:
Receiving unit 201 receives authentication information for terminal device under system lock state;After authentification failure, weight
It is new to receive authentication information;
Authentication unit 202, for being authenticated using preset system unlock authentication information to above-mentioned authentication information;
Statistic unit 203, for counting authentification failure number;
Execution unit 204, for entering the first system if above-mentioned authentification failure number is less than first threshold, if above-mentioned recognize
The card frequency of failure is greater than above-mentioned second threshold and then enters second system;Above-mentioned second system lacks payment compared to above-mentioned the first system
Class application, above-mentioned second threshold are greater than or equal to above-mentioned first threshold.
Wherein, terminal device for example can be mobile phone, tablet computer, laptop, palm PC, MID etc..
System lock state is the state that terminal device does not unlock, and terminal device is generally in standby shape in this state
State.Authentication information is verification information needed for releasing the lock state of terminal device.Authentication information can be character string, fingerprint,
One of voice etc. is a variety of, it is corresponding with the authentication mode of unlocking terminal equipment.Authentication mode for example can be sliding
Unlock, unlocked by fingerprint, speech unlocking etc..Such as the authentication mode of terminal device is unlocked by fingerprint, then corresponding authentication information is just
It is fingerprint.Authentication mode and the corresponding authentication information embodiment of the present invention do not make uniqueness restriction.Receiving unit 201 is for receiving
Authentication information, authentication information can be diversified forms.
Terminal device receives authentication information under system lock state can be in blank screen shape without authentication interface, that is, mobile phone
State.User input authentication information can authenticate when terminal device is in black state, such as under black state
Pass through unlocked by fingerprint.
Preset system unlock authentication information is the authentication information being locally stored in terminal device, for what is inputted with user
Authentication information is authenticated.Authentication information can be one of character string, fingerprint, voice etc. or a variety of, it and terminal device
The authentication mode of unlock is corresponding.Authentication unit 202 is carried out using preset system unlock authentication information and above-mentioned authentication information
Certification.The embodiment of the present invention does not pay close attention to how to be authenticated, therefore is not described further at this to this.If authentification failure, use
Family needs to re-enter authentication information, and terminal device authenticates received authentication information again, user of authentification failure
It needs to re-enter once, until certification passes through.If no longer input authentication information, terminal device wait one before authenticating successfully
After fixing time, into standby mode.
The first system is the system after normal starting, and the payment class in second system is applied in the shape for freezing and hiding
Payment class application in state, that is, terminal device system is freezed and be can not find in systems.
Payment class application refers to the application program that Alipay, wechat payment, Mobile banking etc. use on communication terminals.
First threshold for example can be the positive integers such as 2,3,4,5,6, and second threshold for example can be 2,3,4,5,6,7 etc. just
Integer.Second threshold is greater than or equal to first threshold, if second threshold is equal to first threshold, such as first threshold and second threshold
All it is 3, the first system is entered if authentification failure number is less than 3, enters the second system if authentification failure number is greater than 3
System is not construed as limiting if authentification failure number is equal to 3, both can be into the first system or into second system;If the second threshold
Value is greater than first threshold, such as first threshold is 3, and second threshold is 4, and the first system is entered if authentification failure number is less than 3
System enters second system if authentification failure number is greater than 4, is not construed as limiting if when authentification failure number is 3 or 4, both
It can be into the first system or into second system;
For example, when first threshold and second threshold are all 3, if the 4th authenticates successfully, enter the second system
System, in such a system it can be seen that and operating all applications in addition to paying class;If the 2nd time authenticates successfully, enter first
System, that is, normal activation system.
As can be seen that the method for the present embodiment provides a kind of unlocking manner that can freeze and hide payment class application.
It can be freezed and hidden in the case where mobile terminal owner is forced to be unlocked its mobile terminal by shirtsleeve operation
The application of hiding payment class and then the safety for protecting its personal property.
The embodiment of the present invention additionally provides another method for receiving authentication information on the basis of preceding embodiment, specifically such as
Under: further, as shown in figure 3, above equipment further include:
The receiving unit is also used to receive unlock instruction;
Display unit 301, for showing authentication interface after above-mentioned receiving unit receives above-mentioned unlock instruction.
The method provided in an embodiment of the present invention for receiving authentication information is that user unlocks terminal device and support for convenience
A variety of authentication modes.Terminal device in the embodiment of the present invention shows authentication interface upon receipt of the instructions, and authentication interface can be with
There are many forms, such as can be unlocked by fingerprint, pattern unlock, speech unlocking etc..
For example, after user shows authentication interface on the display screen of terminal device, the case where according to authentication interface
Corresponding authentication information is inputted, authentication information is re-entered if authentification failure.For example, user lights terminal device display screen
Afterwards, by accordingly unlocking operation, terminal device can show unlock interface, and then user can input corresponding certification letter
Breath is authenticated.If after authenticating successfully, entering corresponding system;If certification is unsuccessful, re-enters authentication information and recognized
Card.
The method provided in an embodiment of the present invention for receiving authentication information is simpler and supports a variety of authentication modes.
The embodiment of the present invention additionally provides a kind of method for configuring security system on the basis of preceding embodiment, specifically such as
Under: further, as shown in figure 4, above equipment further include:
Application control unit 401, for entering second system if above-mentioned authentification failure number is greater than above-mentioned second threshold
Freeze before and hides the payment class application in above-mentioned terminal device.
Above-mentioned second system is exactly the security system configured, and the payment class in second system, which is applied to be in, to be freezed and hide
State, can not find in second system payment class application, even if therefore unlocking terminal equipment can not successfully transfer accounts etc.
Operation.
For example, if the authentification failure number of user is greater than second threshold, terminal device first freezes payment class application
It ties and stashes, then enter back into second system after authenticating successfully.In actual verification process, the configuration of second system
The process of payment class application in journey, that is, terminal device freezed and hidden is very fast, and user will not notice this process.With
Payment for mobile phone, after authenticating successfully, if the number of the authentification failure of mobile phone statistics is greater than second threshold, in mobile phone
The payment classes such as treasured, Mobile banking, wechat payment are applied can not find in mobile phone.
The method of configuration security system provided in an embodiment of the present invention is very hidden rapidly and to be can effectively prevent user and is forced
Operation of illegally transferring accounts etc. after unlock terminal device.
The embodiment of the present invention additionally provides a kind of method for replacing authentication mode on the basis of preceding embodiment, specifically such as
Under: further, as shown in figure 5, above equipment further include:
Output unit 501 prompts whether replace authentication mode for exporting prompt information after authentification failure;
The receiving unit is also used to receive replacement instruction;
Authentication control unit 502, if being changed to currently used authentication mode for receiving above-mentioned replacement instruction
The authentication mode of above-mentioned replacement instruction;
Above-mentioned receiving unit is also used to the authenticating party that currently used authentication mode is changed to above-mentioned replacement instruction
Again authentication information is received after formula.
Authentication mode can there are many, such as the unlock of unlocked by fingerprint, pattern, speech unlocking etc..It can be set in terminal device
A variety of authentication modes are set, current authentication information can also replace other authenticating party if one side user forgets terminal device
Formula;Another aspect user can choose the authentication mode of more easily authentification failure when being forced and unlocking terminal device.For
For the embodiment of the present invention, authentication mode is most important, if terminal device there was only a kind of authentication mode and authentication mode is difficult
The method of intentional authentification failure, the embodiment of the present invention just loses meaning.For example, if terminal device only have unlocked by fingerprint this
It plants authentication mode and finger print identifying is very accurate, user is difficult the number so that authentification failure when being forced and unlocking terminal device
Reach above-mentioned second threshold.
For example, three kinds of authentication modes such as pattern unlock, unlocked by fingerprint and speech unlocking can be set in terminal device,
The authentication mode of default is unlocked by fingerprint.If user is under secure conditions, he can choose can also be using unlocked by fingerprint
Other authentication mode is selected after authentification failure;If user, in the case where being forced unlock, he can deliberately authentification failure choosing
Select the pattern unlocking manner for being easy intentional authentification failure.
The number of authentification failure is cumulative in the embodiment of the present invention, and authentification failure number is authenticated under different authentication mode
The summation of the frequency of failure.Above-mentioned second threshold is more easily reachd in this way, and terminal device is caused to enter second system.
The method of replacement authentication mode provided in an embodiment of the present invention, not only enriches authentication mode, also improves this hair
The practical value of bright embodiment method.
The embodiment of the present invention provides a kind of alarm method on the basis of preceding embodiment, specific as follows: further, such as
Shown in Fig. 6, above equipment further include:
Transmission unit 601 after entering second system for above-mentioned terminal device, is sent above-mentioned to preset target terminal
The location information and warning message of terminal device.
Positioning unit 602, for positioning the location information of above-mentioned terminal device.
Wherein, the terminal device that preset target terminal can be the police office that user preset is set is also possible to other ends
End.Warning message is used to illustrate that the user of terminal device is in danger and want help, may include user identity information,
Sign information, appearance information etc..The position of location information accurate positionin terminal device.Terminal device timing is whole to preset target
End sends location information, constantly notifies the location information of preset target terminal terminal device.
Above-mentioned terminal device sends the location information of above-mentioned terminal device to preset target terminal and warning message passes through
Hidden mode carries out, and terminal device does not show corresponding information.
Alarm method provided in an embodiment of the present invention hidden can send out the location information of terminal device and warning message
Preset target terminal is given, helps victim out of danger in time.
The embodiment of the invention also provides a kind of terminal devices, as shown in fig. 7, comprises: processor 701 and memory
702, input equipment 703, output equipment 704;Wherein memory 702 may be used to provide processor 701 and execute data processing institute
The local cache of the caching and preset system unlock authentication information that need, can be also used for providing the execution data of processor 701
Handle the memory space of the result data of the data and acquisition called;Wherein input equipment 703 in terminal device for being in
Authentication information is received under lock state, be also used to receive authentication information again after authentification failure and receives change directive;Output is set
Standby 704, for exporting prompting message and authentication interface, are also used to send the position of above-mentioned terminal device to preset target terminal
Information and warning message.
Wherein, above-mentioned processor 701, for obtaining authentication information in the case where terminal device is in the lock state;Using preset
System unlock authentication information above-mentioned authentication information is authenticated, if authentification failure, receive authentication information again, and use
Above-mentioned preset system unlock authentication information authenticates received authentication information again, until certification passes through;Statistics certification
The frequency of failure enters the first system if above-mentioned authentification failure number is less than first threshold, if above-mentioned authentification failure number is greater than
Second threshold then enters second system;Above-mentioned second system lacks payment class application, above-mentioned second threshold compared to above-mentioned the first system
Value is greater than or equal to above-mentioned first threshold.
Wherein, terminal device for example can be mobile phone, tablet computer, laptop, palm PC, MID etc..
System lock state is the state that terminal device does not unlock, and terminal device is generally in standby shape in this state
State.Authentication information is verification information needed for releasing the lock state of terminal device.Authentication information can be character string, fingerprint,
One of voice etc. is a variety of, it is corresponding with the authentication mode of unlocking terminal equipment.Authentication mode for example can be sliding
Unlock, unlocked by fingerprint, speech unlocking etc..Such as the authentication mode of terminal device is unlocked by fingerprint, then corresponding authentication information is just
It is fingerprint.Authentication mode and the corresponding authentication information embodiment of the present invention do not make uniqueness restriction.
Terminal device receives authentication information under system lock state can be in blank screen shape without authentication interface, that is, mobile phone
State.User input authentication information can authenticate when terminal device is in black state, such as under black state
Pass through unlocked by fingerprint.
Preset system unlock authentication information is the authentication information being locally stored in terminal device, for what is inputted with user
Authentication information is authenticated.Authentication information can be one of character string, fingerprint, voice etc. or a variety of, it and terminal device
The authentication mode of unlock is corresponding.The embodiment of the present invention does not pay close attention to how to be authenticated, therefore does not make to this in detail at this
It states.If authentification failure, user needs to re-enter authentication information, and terminal device authenticates received authentication information again,
User of authentification failure needs to re-enter once, until certification passes through.If authenticating successfully preceding no longer input authentication information,
After then terminal device waits certain time, into standby mode.
The first system is the system after normal starting, and the payment class in second system is applied in the shape for freezing and hiding
Payment class application in state, that is, terminal device system is freezed and be can't see in systems.
Payment class application refers to the application program that Alipay, wechat payment, Mobile banking etc. use on communication terminals.
First threshold for example can be the positive integers such as 2,3,4,5,6, and second threshold for example can be 2,3,4,5,6,7 etc. just
Integer.Second threshold is greater than or equal to first threshold, if second threshold is equal to first threshold, such as first threshold and second threshold
All it is 3, the first system is entered if authentification failure number is less than 3, enters the second system if authentification failure number is greater than 3
System is not construed as limiting if authentification failure number is equal to 3, both can be into the first system or into second system;If the second threshold
Value is greater than first threshold, such as first threshold is 3, and second threshold is 4, and the first system is entered if authentification failure number is less than 3
System enters second system if authentification failure number is greater than 4, is not construed as limiting if when authentification failure number is 3 or 4, both
It can be into the first system or into second system;
For example, when first threshold and second threshold are all 3, if the 4th authenticates successfully, enter the second system
System, in such a system it can be seen that and operating all applications in addition to paying class;If the 2nd time authenticates successfully, enter first
System, that is, normal activation system.
As can be seen that the method for the present embodiment provides a kind of unlocking manner that can freeze and hide payment class application.
It can be freezed and hidden in the case where terminal device owner is forced to be unlocked its terminal device by shirtsleeve operation
The application of hiding payment class and then the safety for protecting its personal property.
The embodiment of the present invention still further provides a kind of implementation method for receiving authentication information, specific as follows: above-mentioned place
Device 701 is managed, is also used to show authentication interface after above-mentioned receiving unit receives unlock instruction.
The method provided in an embodiment of the present invention for receiving authentication information is that user unlocks terminal device and support for convenience
A variety of authentication modes.Terminal device in the embodiment of the present invention shows authentication interface upon receipt of the instructions, and authentication interface can be with
There are many forms, such as can be unlocked by fingerprint, pattern unlock, speech unlocking etc..
For example, after user shows authentication interface on the display screen of terminal device, the case where according to authentication interface
Corresponding authentication information is inputted, authentication information is re-entered if authentification failure.For example, user lights terminal device display screen
Afterwards, by accordingly unlocking operation, terminal device can show unlock interface, and then user can input corresponding certification letter
Breath is authenticated.If after authenticating successfully, entering corresponding system;If certification is unsuccessful, re-enters authentication information and recognized
Card.
The method provided in an embodiment of the present invention for receiving authentication information is simpler and supports a variety of authentication modes.
It is specific as follows the embodiment of the invention also provides a kind of method for configuring security system: above-mentioned processor 701, also
It is set for freezing before entering second system if above-mentioned authentification failure number is greater than above-mentioned second threshold and hiding above-mentioned terminal
Payment class application in standby.
Above-mentioned second system is exactly the security system configured, and the payment class in second system, which is applied to be in, to be freezed and hide
State.Can not find in second system payment class application, even if therefore unlocking terminal equipment can not successfully transfer accounts etc.
Operation.
For example, if the authentification failure number of user is greater than second threshold, terminal device first freezes payment class application
It ties and stashes, then enter back into second system after authenticating successfully.In actual verification process, the configuration of second system
The process of payment class application in journey, that is, terminal device freezed and hidden is very fast, and user, which not will be considered that, has this process.
It takes the mobile phone as an example, the branch after authenticating successfully, if the number of the authentification failure of mobile phone statistics is greater than second threshold, in mobile phone
The payment classes such as Fu Bao, Mobile banking, wechat payment are applied can not find in mobile phone.
The method of configuration security system provided in an embodiment of the present invention is very hidden rapidly and to be can effectively prevent user and is forced
Operation of illegally transferring accounts etc. after unlock terminal device.
It is specific as follows the embodiment of the invention also provides a kind of method for replacing authentication mode: above-mentioned processor 701, also
For exporting prompt information after authentification failure, prompting whether to replace authentication mode and currently making after receiving replacement instruction
Authentication mode is changed to the authentication mode of above-mentioned replacement instruction and receives authentication information again.
Authentication mode can there are many, such as the unlock of unlocked by fingerprint, pattern, speech unlocking etc..It can be set in terminal device
A variety of authentication modes are set, current authentication information can also replace other authenticating party if one side user forgets terminal device
Formula;Another aspect user can choose the authentication mode of more easily authentification failure when being forced and unlocking terminal device.For
For the embodiment of the present invention, authentication mode is most important, if terminal device there was only a kind of authentication mode and authentication mode is difficult
The method of intentional authentification failure, the embodiment of the present invention just loses meaning.For example, if terminal device only have unlocked by fingerprint this
It plants authentication mode and finger print identifying is very accurate, user is difficult the number so that authentification failure when being forced and unlocking terminal device
Reach above-mentioned second threshold.
For example, three kinds of authentication modes such as pattern unlock, unlocked by fingerprint and speech unlocking can be set in terminal device,
The authentication mode of default is unlocked by fingerprint.If user is under secure conditions, he can choose can also event using unlocked by fingerprint
Meaning authentification failure selects other authentication mode;If user, in the case where being forced unlock, he can deliberately authentification failure selection
It is easy the pattern unlocking manner of intentional authentification failure.
The number of authentification failure is cumulative in the embodiment of the present invention, and authentification failure number is authenticated under different authentication mode
The summation of the frequency of failure.Above-mentioned second threshold is more easily reachd in this way, and terminal device is caused to enter second system.
The method of replacement authentication mode provided in an embodiment of the present invention, not only enriches authentication mode, also improves this hair
The practical value of bright method.
Specific as follows the embodiment of the invention also provides a kind of alarm method: above-mentioned processor 701 is also used to above-mentioned
Terminal device enters after second system, and the location information and alarm signal of above-mentioned terminal device are sent to preset target terminal
Breath.
Wherein, the terminal device that preset target terminal can be the police office that user preset is set is also possible to other ends
End.Warning message is used to illustrate that the user of terminal device is in danger and want help, may include user identity information,
Sign information, appearance information etc..The position of location information accurate positionin terminal device.Terminal device timing is whole to preset target
End sends location information, constantly notifies the location information of preset target terminal terminal device.
Above-mentioned terminal device sends the location information of above-mentioned terminal device to preset target terminal and warning message passes through
Hidden mode carries out, and terminal device does not show corresponding information.
Alarm method provided in an embodiment of the present invention hidden can send out the location information of terminal device and warning message
Preset target terminal is given, victim can be helped to be saved in time.
The embodiment of the invention also provides another terminal devices, as shown in figure 8, for ease of description, illustrate only with
The relevant part of the embodiment of the present invention, it is disclosed by specific technical details, please refer to present invention method part.The terminal
Equipment can be include any terminal device such as mobile phone, tablet computer, vehicle-mounted computer, by terminal device be mobile phone for:
Fig. 8 shows the block diagram of the part-structure of mobile phone relevant to terminal device provided in an embodiment of the present invention.Ginseng
Fig. 8 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit
840, sensor 850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880,
And the equal components of power supply 890.It will be understood by those skilled in the art that handset structure shown in Fig. 8 is not constituted to mobile phone
It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 8 to mobile phone:
RF circuit 810 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, handled to processor 880;In addition, the data for designing uplink are sent to base station.In general, RF circuit 810
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..In addition, RF circuit 810 can also be communicated with network and other equipment by wireless communication.
Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access
(Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution,
LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storing software program and module, and processor 880 is stored in memory 820 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 820 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone
Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 820 may include high-speed random access memory
Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.
Input unit 830 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 830 may include that touch panel 831 and other inputs are set
Standby 832.Other input equipments 832 can be used for receiving the information such as the fingerprint of input, voice.Touch panel 831, also referred to as touches
Screen, collecting the touch operation of user on it or nearby, (for example user uses any suitable object or attached such as finger, stylus
Operation of the part on touch panel 831 or near touch panel 831), and connected accordingly according to the driving of preset formula
Connection device.Optionally, touch panel 831 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 880, and can connect
It receives the order that processor 880 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface acoustic wave
Equal multiple types realize touch panel 831.In addition to touch panel 831, input unit 830 can also include other input equipments
832.Specifically, other input equipments 832 can include but is not limited to physical keyboard, function key (for example volume control button, is opened
Close button etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Display unit 840 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 840 may include display panel 841, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 841.Further, touch panel 831 can cover display panel 841, when touch panel 831 detect it is on it or attached
After close touch operation, processor 880 is sent to determine the type of touch event, is followed by subsequent processing device 880 according to touch event
Type corresponding visual output is provided on display panel 841.Although in fig. 8, touch panel 831 and display panel 841
It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control
Panel 831 and display panel 841 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 841, proximity sensor can close display panel 841 when mobile phone is moved in one's ear
And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions
Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 861, be converted to sound by loudspeaker 861 by road 860
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860
It is changed to audio data, then by after the processing of audio data output processor 880, such as another mobile phone is sent to through RF circuit 810,
Or audio data is exported to memory 820 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 870
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 is shown
WiFi module 870, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 880 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 820, and call and be stored in memory 820
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 880 can wrap
Include one or more processing units;Preferably, processor 880 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile phone further includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 880 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In previous embodiment, each step method process can be realized based on the structure of the terminal device.Wherein sensor 850
Or touch panel 831 can be used as the use of fingerprint collecting equipment.
It is worth noting that, included each unit is only according to function in above-mentioned unlocked by fingerprint control apparatus embodiments
Energy logic is divided, but is not limited to the above division, as long as corresponding functions can be realized;In addition, each function
The specific name of energy unit is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in above-mentioned each method embodiment
It is that relevant hardware can be instructed to complete by program, corresponding program can store in a kind of computer readable storage medium
In, storage medium mentioned above can be read-only memory, disk or CD etc..
The above is only the preferable specific embodiments of the embodiment of the present invention, but protection scope of the present invention is not limited to
This, anyone skilled in the art is in the technical scope that the embodiment of the present invention discloses, the change that can readily occur in
Change or replace, should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with claim
Subject to protection scope.
Claims (6)
1. a kind of system unlocking method characterized by comprising
Terminal device receives authentication information under system lock state, and the authentication information is the locking for releasing the terminal device
Verification information needed for state, the authentication information comprise at least one of the following: character string, fingerprint, voice;
The terminal device authenticates the authentication information using preset system unlock authentication information, if authentification failure,
Prompt information is then exported, prompts whether replace authentication mode;
If receiving replacement instruction, currently used authentication mode is changed to the authenticating party of the replacement instruction
Then formula receives authentication information again, and using the preset system unlock authentication information to received authentication information again
It is authenticated, until certification passes through, the certification difficulty of the authentication mode of the replacement instruction is greater than described currently used
Authentication mode certification difficulty;
The terminal device counts authentification failure number, if the authentification failure number is less than first threshold, enters the first system
System;
If the authentification failure number is greater than second threshold, the terminal device freezes and hides to pay class application, into the
Two system, the second system lack the payment class application compared to the first system, and the second threshold is greater than or equal to
The first threshold;
The terminal device constantly sends the location information of the terminal device by hidden mode to preset target terminal
And warning message, the terminal device do not show that the location information and the warning message, the preset target terminal are
The terminal device of the mechanisms such as the pre-set police office of user either other terminal devices, the warning message includes user's
Identity information, sign information, appearance information.
2. the method according to claim 1, wherein the terminal device receives certification under system lock state
Before information, the method also includes:
The terminal device shows authentication interface after receiving unlock instruction.
3. according to the method described in claim 2, it is characterized in that, if the authentification failure number is greater than the second threshold
Into before second system, the method also includes:
The terminal device freezes and hides the payment class application.
4. a kind of terminal device characterized by comprising
Receiving unit receives authentication information for terminal device under system lock state, and the authentication information is described in releasing
Verification information needed for the lock state of terminal device, the authentication information comprise at least one of the following: character string, fingerprint, language
Sound;
Authentication unit, for being authenticated using preset system unlock authentication information to the authentication information;
Output unit prompts whether replace authentication mode for exporting prompt information after authentification failure;
The receiving unit is also used to receive replacement instruction;
Authentication control unit, if the replacement instruction is received for the receiving unit, by currently used authentication mode
It is changed to the authentication mode of the replacement instruction, the certification difficulty of the authentication mode of the replacement instruction is greater than
The certification difficulty of the currently used authentication mode;
The receiving unit is also used to be changed to the authentication mode of the replacement instruction in currently used authentication mode
Later, authentication information is received again;
Statistic unit, for counting authentification failure number;
Execution unit enters the first system if being less than first threshold for the authentification failure number;
Execution unit, if being also used to the authentification failure number greater than second threshold, the terminal device freezes and hides branch
Class application is paid, into second system, the second system lacks the payment class application compared to the first system, and described second
Threshold value is greater than or equal to the first threshold;
Positioning unit, for positioning the location information of the terminal device;
Transmission unit, for after the terminal device enters second system, by hidden mode constantly to preset mesh
Mark terminal sends the location information and warning message of the terminal device, and the terminal device does not show the location information and institute
Warning message is stated, the preset target terminal is that the terminal device of the mechanisms such as the pre-set police office of user is either other
Terminal device, the warning message include the identity information, sign information, appearance information of user.
5. equipment according to claim 4, which is characterized in that
The receiving unit is also used to receive unlock instruction;The equipment further include:
Display unit, for showing authentication interface after the receiving unit receives the unlock instruction.
6. equipment according to claim 5, which is characterized in that the equipment further include:
Application control unit, for freezing before entering second system if the authentification failure number is greater than the second threshold
And hide the payment class application in the terminal device.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610718935.2A CN106327193B (en) | 2016-08-24 | 2016-08-24 | A kind of system unlocking method and equipment |
PCT/CN2016/100778 WO2018035930A1 (en) | 2016-08-24 | 2016-09-29 | System unlocking method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610718935.2A CN106327193B (en) | 2016-08-24 | 2016-08-24 | A kind of system unlocking method and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106327193A CN106327193A (en) | 2017-01-11 |
CN106327193B true CN106327193B (en) | 2019-08-02 |
Family
ID=57791098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610718935.2A Expired - Fee Related CN106327193B (en) | 2016-08-24 | 2016-08-24 | A kind of system unlocking method and equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106327193B (en) |
WO (1) | WO2018035930A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108320391B (en) * | 2017-01-18 | 2021-03-09 | 芜湖美的厨卫电器制造有限公司 | Unlocking method and system of rental equipment and equipment thereof |
EP3564839B1 (en) * | 2017-01-22 | 2022-01-05 | Huawei Technologies Co., Ltd. | Authentication method, mobile terminal, device and system |
CN107395889B (en) | 2017-07-28 | 2020-01-21 | Oppo广东移动通信有限公司 | Method and device for reducing power consumption of mobile terminal, storage medium and mobile terminal |
KR102520199B1 (en) * | 2018-07-23 | 2023-04-11 | 삼성전자주식회사 | Electronic apparatus and controlling method thereof |
CN111128138A (en) * | 2020-03-30 | 2020-05-08 | 深圳市友杰智新科技有限公司 | Voice wake-up method and device, computer equipment and storage medium |
CN111814121B (en) * | 2020-06-29 | 2021-08-31 | 江苏中州科技有限公司 | Login authentication management system and method based on computer system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1472952A (en) * | 2002-06-26 | 2004-02-04 | 夏普株式会社 | Method and electronic device for eliminating lock on functions of electronic device |
CN101345967A (en) * | 2008-08-15 | 2009-01-14 | 深圳华为通信技术有限公司 | Function control method and embedded type terminal |
CN104253818A (en) * | 2011-12-13 | 2014-12-31 | 华为终端有限公司 | Server and terminal authentication method, server, terminal |
CN104361303A (en) * | 2014-10-22 | 2015-02-18 | 小米科技有限责任公司 | Terminal exception processing method and device and electronic equipment |
CN105574378A (en) * | 2015-12-09 | 2016-05-11 | 小米科技有限责任公司 | Terminal control method and terminal control device |
-
2016
- 2016-08-24 CN CN201610718935.2A patent/CN106327193B/en not_active Expired - Fee Related
- 2016-09-29 WO PCT/CN2016/100778 patent/WO2018035930A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1472952A (en) * | 2002-06-26 | 2004-02-04 | 夏普株式会社 | Method and electronic device for eliminating lock on functions of electronic device |
CN101345967A (en) * | 2008-08-15 | 2009-01-14 | 深圳华为通信技术有限公司 | Function control method and embedded type terminal |
CN104253818A (en) * | 2011-12-13 | 2014-12-31 | 华为终端有限公司 | Server and terminal authentication method, server, terminal |
CN104361303A (en) * | 2014-10-22 | 2015-02-18 | 小米科技有限责任公司 | Terminal exception processing method and device and electronic equipment |
CN105574378A (en) * | 2015-12-09 | 2016-05-11 | 小米科技有限责任公司 | Terminal control method and terminal control device |
Also Published As
Publication number | Publication date |
---|---|
CN106327193A (en) | 2017-01-11 |
WO2018035930A1 (en) | 2018-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106327193B (en) | A kind of system unlocking method and equipment | |
US11269981B2 (en) | Information displaying method for terminal device and terminal device | |
CN104767863B (en) | The unlocking method and terminal of terminal screen | |
KR20150046766A (en) | Unlocking process mehtod, apparatus and device for terminal | |
CN106920307A (en) | Gate inhibition's open method, device and mobile terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
US9940448B2 (en) | Unlock processing method and device | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
CN109102297A (en) | Revocable payment method and device | |
CN108694784A (en) | A kind of storage cabinet system of multiple instructions transmitting-receiving | |
CN108229149B (en) | Data protection method and device | |
CN108156537B (en) | Remote operation method of mobile terminal and mobile terminal | |
CN104573437B (en) | Information authentication method and device and terminal | |
CN109300203A (en) | Mobile terminal and unlocking method, device | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN103366104A (en) | Method and device for controlling accessing of application | |
CN108989534A (en) | Message prompt method, mobile terminal and computer readable storage medium | |
CN109151150A (en) | Mobile terminal and unlocking screen method, apparatus | |
CN109918944A (en) | An information protection method, device, mobile terminal and storage medium | |
CN106803027A (en) | Application function entrance starts method, device and mobile terminal | |
CN108781234A (en) | Function control method and terminal | |
CN110062929A (en) | A kind of method, apparatus and terminal showing data | |
WO2019090702A1 (en) | Terminal security protection method and device | |
CN109189397A (en) | The method, apparatus of mobile terminal and intelligent display hiden application | |
CN106503512A (en) | Mobile terminal and its plus/unlocking method and a device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190802 Termination date: 20210824 |