[go: up one dir, main page]

CN106327193B - A kind of system unlocking method and equipment - Google Patents

A kind of system unlocking method and equipment Download PDF

Info

Publication number
CN106327193B
CN106327193B CN201610718935.2A CN201610718935A CN106327193B CN 106327193 B CN106327193 B CN 106327193B CN 201610718935 A CN201610718935 A CN 201610718935A CN 106327193 B CN106327193 B CN 106327193B
Authority
CN
China
Prior art keywords
terminal device
authentication
information
threshold
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610718935.2A
Other languages
Chinese (zh)
Other versions
CN106327193A (en
Inventor
卢乐金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610718935.2A priority Critical patent/CN106327193B/en
Priority to PCT/CN2016/100778 priority patent/WO2018035930A1/en
Publication of CN106327193A publication Critical patent/CN106327193A/en
Application granted granted Critical
Publication of CN106327193B publication Critical patent/CN106327193B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Telephone Function (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of system unlocking method and equipment, this method comprises: terminal device receives authentication information under system lock state;The terminal device authenticates the authentication information using preset system unlock authentication information, if authentification failure, authentication information is then received again, and received authentication information again is authenticated using the preset system unlock authentication information, until certification passes through;The terminal device counts authentification failure number, enters the first system if the authentification failure number is less than or equal to first threshold, if the authentification failure number is greater than second threshold and enters second system;The second system lacks payment class application compared to the first system, and the second threshold is greater than or equal to the first threshold.The present invention can protect the safety of its personal property in the case where terminal device owner is forced and is unlocked to its terminal device.

Description

A kind of system unlocking method and equipment
Technical field
The present invention relates to field of communication technology, in particular to a kind of method and apparatus of system unlock.
Background technique
With the development of communication technology, various terminal equipment is more more and more universal, such as mobile phone, tablet computer etc. are As part essential in daily life.Meanwhile more and more people like using the wechat branch on communication terminal device It pays, Mobile banking, the application such as Alipay are paid.
For the safety and safety of payment of the information for protecting user in use, the relevant lock of many installing terminal equipments Screen and unlocking program, screen locking and unlocking program are run on a terminal screen, show relevant unlock interface, user's input Authentication information is by can just be successfully entered system after certification.
In the prior art, a unlock interface and corresponding password can only be arranged in usual communication terminal device, work as end The owner of end equipment may be forced to say password or to terminal device in the case where personal safety is restricted and is threatened It is unlocked.After being forced to unlock terminal device by infringer, infringer can be operated to be logged in by the terminal device of infringer Payment application carries out the operation such as transfer accounts.The unlocking manner that terminal device uses at present has: numerical ciphers, gesture pattern, cunning Dynamic unlock etc., these unlocking manners cannot have in the case where the owner of terminal device is forced to be unlocked its terminal device Effect prevents illegal person from carrying out the operation such as transfer accounts.
Summary of the invention
The embodiment of the invention provides a kind of methods and apparatus of system unlock, to be forced pair in terminal device owner Its terminal device protects the safety of its personal property in the case where being unlocked.
On the one hand the embodiment of the present invention provides a kind of method of system unlock, comprising:
Terminal device receives authentication information under system lock state;
The terminal device authenticates the authentication information using preset system unlock authentication information, if certification is lost Lose, then receive authentication information again, and using the preset system unlock authentication information to received authentication information again into Row certification, until certification passes through;
The terminal device counts authentification failure number, enters first if the authentification failure number is less than first threshold System enters second system if the authentification failure number is greater than second threshold;The second system compares first system System lacks payment class application, and the second threshold is greater than or equal to the first threshold.
In an optional implementation, before the terminal device receives authentication information under system lock state, The method also includes:
The terminal device shows authentication interface after receiving unlock instruction.
In an optional implementation, enter the second system if the authentification failure number is greater than the second threshold Before system, the method also includes:
The terminal device freezes and hides the payment class application.
In an optional implementation, after authentification failure, the method also includes:
Prompt information is exported, prompts whether replace authentication mode;
If receiving replacement instruction, currently used authentication mode is changed to the certification of the replacement instruction Mode, then execution is described receives authentication information again.
In an optional implementation, the terminal device enters after second system, the method also includes:
The terminal device sends the location information and warning message of the terminal device to preset target terminal.
Correspondingly, the embodiment of the invention also discloses a kind of terminal devices, comprising:
Receiving unit receives authentication information for terminal device under system lock state;After authentification failure, again Receive authentication information;
Authentication unit, for being authenticated using preset system unlock authentication information to the authentication information;
Statistic unit, for counting authentification failure number;
Execution unit, for entering the first system if the authentification failure number is less than first threshold, if the certification The frequency of failure is greater than the second threshold and then enters second system;The second system lacks payment class compared to the first system Using the second threshold is greater than or equal to the first threshold;
In an optional implementation, the receiving unit is also used to receive unlock instruction;The equipment is also wrapped It includes:
Display unit, for showing authentication interface after the receiving unit receives unlock instruction.
In an optional implementation, the equipment further include:
Application control unit, for before entering second system if the authentification failure number is greater than the second threshold Freeze and hides the payment class application in the terminal device.
In an optional implementation, the equipment further include:
Output unit prompts whether replace authentication mode for exporting prompt information after authentification failure;
The receiving unit is also used to receive replacement instruction;
Authentication control unit, if the replacement instruction is received for the receiving unit, by currently used certification Mode is changed to the authentication mode of the replacement instruction;
The receiving unit is also used to be changed to the certification of the replacement instruction in currently used authentication mode After mode, authentication information is received again.
In an optional implementation, the equipment further include:
Positioning unit, for positioning the location information of the terminal device.
Transmission unit, for after the terminal device enters second system, send to preset target terminal described in The location information and warning message of terminal device.
As can be seen that the method for the present embodiment provides a kind of unlocking method that can freeze and hide payment class application. It can be freezed and hidden in the case where terminal device owner is forced to be unlocked its terminal device by shirtsleeve operation The application of hiding payment class and then the safety for protecting its personal property.
Detailed description of the invention
Technical method in order to illustrate the embodiments of the present invention more clearly, below by embodiment it is required use it is attached Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this field For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of system unlocking method of the embodiment of the present invention;
Fig. 2 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 3 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 4 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 5 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 6 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 7 is the terminal of that embodiment of the invention device structure schematic diagram;
Fig. 8 is the terminal of that embodiment of the invention device structure schematic diagram.
Specific embodiment
In order to keep the purpose of the present invention, technical method and advantage clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a kind of system unlocking methods, as shown in Figure 1, comprising:
101: terminal device receives authentication information under system lock state;
Wherein, terminal device for example can be mobile phone, tablet computer, laptop, palm PC etc..
System lock state is the state that terminal device does not unlock, and terminal device is generally in standby shape in this state State.Authentication information is verification information needed for releasing the lock state of terminal device.Authentication information can be character string, fingerprint, One of voice etc. is a variety of, it is corresponding with the authentication mode of unlocking terminal equipment.Authentication mode for example can be sliding Unlock, unlocked by fingerprint, speech unlocking etc..Such as the authentication mode of terminal device is unlocked by fingerprint, then corresponding authentication information is just It is fingerprint.Authentication mode and the corresponding authentication information embodiment of the present invention do not make uniqueness restriction.
Terminal device receives authentication information under system lock state can be in blank screen shape without authentication interface, that is, mobile phone State.User input authentication information can authenticate when terminal device is in black state, such as under black state Pass through unlocked by fingerprint.
102: above-mentioned terminal device authenticates above-mentioned authentication information using preset system unlock authentication information, if recognizing Card failure is then received authentication information again, and is believed using above-mentioned preset system unlock authentication information received certification again Breath is authenticated, until certification passes through;
Preset system unlock authentication information is the authentication information being locally stored in terminal device, for what is inputted to user Authentication information is authenticated.Authentication information can be one of character string, fingerprint, voice etc. or a variety of, it and terminal device The authentication mode of unlock is corresponding.The embodiment of the present invention does not pay close attention to how to be authenticated, therefore does not make to this in detail at this It states.If authentification failure, user needs to re-enter authentication information, and terminal device authenticates received authentication information again, User of authentification failure needs to re-enter once, until certification passes through.If authenticating successfully preceding no longer input authentication information, After then terminal device waits certain time, into standby mode.
103: above-mentioned terminal device counts authentification failure number, enters if above-mentioned authentification failure number is less than first threshold The first system enters second system if above-mentioned authentification failure number is greater than second threshold;Above-mentioned second system is compared to above-mentioned the One system lacks payment class application, and above-mentioned second threshold is greater than or equal to above-mentioned first threshold.
The first system is the system after normal starting, and the payment class in second system is applied in the shape for freezing and hiding Payment class application in state, that is, terminal device system is freezed and be can not find in systems.
Payment class application refers to the application that Alipay, wechat payment, Mobile banking etc. use on communication terminal device Program.
First threshold for example can be the positive integers such as 2,3,4,5,6, and second threshold for example can be 2,3,4,5,6,7 etc. just Integer.Second threshold is greater than or equal to first threshold, if second threshold is equal to first threshold, such as first threshold and second threshold All it is 3, the first system is entered if authentification failure number is less than 3, enters the second system if authentification failure number is greater than 3 System is not construed as limiting if authentification failure number is equal to 3, both can be into the first system or into second system;If the second threshold Value is greater than first threshold, such as first threshold is 3, and second threshold is 4, and the first system is entered if authentification failure number is less than 3 System enters second system if authentification failure number is greater than 4, is not construed as limiting if when authentification failure number is 3 or 4, both It can be into the first system or into second system.
For example, when first threshold and second threshold are all 3, if the 4th authenticates successfully, enter the second system System, in such a system it can be seen that and operating all applications in addition to paying class;If the 2nd time authenticates successfully, enter first System, that is, normal activation system.
As can be seen that present embodiments providing the unlocking method that can freeze and hide payment class application.In terminal device Owner is forced to freeze in the case where being unlocked its terminal device by shirtsleeve operation and hiding payment class is answered With the safety for protecting its personal property in turn.
Terminal device and a variety of authentication modes of support are unlocked in order to further facilitate user, the embodiment of the present invention is in preceding implementation Another method for receiving authentication information is provided on the basis of example, it is specific as follows: in above-mentioned terminal device in system lock shape Before receiving authentication information under state, the above method further include:
Above-mentioned terminal device shows authentication interface after receiving unlock instruction.
The method provided in an embodiment of the present invention for receiving authentication information is that user unlocks terminal device and support for convenience A variety of authentication modes.Terminal device in the embodiment of the present invention shows authentication interface, authentication interface after receiving unlock instruction Can be there are many form, such as can be unlocked by fingerprint, pattern unlock, speech unlocking etc..
For example, after user shows authentication interface on the display screen of terminal device, the case where according to authentication interface Corresponding authentication information is inputted, authentication information is re-entered if authentification failure.For example, user lights terminal device display screen Afterwards, by accordingly unlocking operation, terminal device can show unlock interface, and then user can input corresponding certification letter Breath is authenticated.If after authenticating successfully, entering corresponding system;If certification is unsuccessful, re-enters authentication information and recognized Card.
The method provided in an embodiment of the present invention for receiving authentication information is simpler and supports a variety of authentication modes.
The embodiment of the present invention provides the method for configuration security system on the basis of previous embodiment, specific as follows: on if It states authentification failure number then to enter before second system greater than above-mentioned second threshold, the above method further include:
Above-mentioned terminal device freezes and hides above-mentioned payment class application.
Above-mentioned second system is exactly that the payment class with the security system that postpones, in second system is applied in freezing and hidden The state of hiding, can not find in second system payment class application, even if therefore unlocking terminal equipment can not successfully transfer accounts Deng operation.
For example, if the authentification failure number of user is greater than second threshold, terminal device first freezes payment class application It ties and stashes, then enter back into the second system after authenticating successfully.In actual verification process, the configuration of second system The process freezed and hidden that class application is paid in process, that is, terminal device is very fast, and user will not notice this process.With For mobile phone, after authenticating successfully, if the number of the authentification failure of mobile phone statistics is greater than second threshold, in mobile phone The payment class applications such as Alipay, Mobile banking, wechat payment are freezed and be can not find in mobile phone.
The method of configuration security system provided in an embodiment of the present invention is very hidden rapidly and to be can effectively prevent user and is forced Operation of illegally transferring accounts etc. after unlock terminal device.
The embodiment of the present invention additionally provides a kind of method for replacing authentication mode on the basis of preceding embodiment, specifically such as Under: after authentification failure, the above method further include:
Prompt information is exported, prompts whether replace authentication mode;
If receiving replacement instruction, currently used authentication mode is changed to the certification of above-mentioned replacement instruction Then mode executes and above-mentioned receives authentication information again.
Authentication mode can there are many, such as the unlock of unlocked by fingerprint, pattern, speech unlocking etc..It can be set in terminal device A variety of authentication modes are set, current authentication information can also replace other authenticating party if one side user forgets terminal device Formula;Another aspect user can choose the authentication mode of more easily authentification failure when being forced and unlocking terminal device.For For the embodiment of the present invention, authentication mode is most important, if terminal device there was only a kind of authentication mode and authentication mode is difficult The method of intentional authentification failure, the embodiment of the present invention just loses meaning.For example, if terminal device only have unlocked by fingerprint this It plants authentication mode and finger print identifying is very accurate, user is difficult the number so that authentification failure when being forced and unlocking terminal device Reach above-mentioned second threshold.
For example, three kinds of authentication modes such as pattern unlock, unlocked by fingerprint and speech unlocking can be set in terminal device, The authentication mode of default is unlocked by fingerprint.If user is under secure conditions, he can choose can also be using unlocked by fingerprint Other authentication mode is selected after authentification failure;If user, in the case where being forced unlock, he can deliberately authentification failure select again Select the pattern unlocking manner for being easy intentional authentification failure.
The number of authentification failure is cumulative in the embodiment of the present invention, and authentification failure number is authenticated under different authentication mode The summation of the frequency of failure.Above-mentioned second threshold is more easily reachd in this way, and terminal device is caused to enter second system.
The method of replacement authentication mode provided in an embodiment of the present invention, not only enriches authentication mode, also improves this hair The practical value of bright embodiment method.
The embodiment of the present invention additionally provides a kind of alarm method on the basis of preceding embodiment, specific as follows: above-mentioned terminal Equipment enters after second system, the above method further include:
Above-mentioned terminal device sends the location information and warning message of above-mentioned terminal device to preset target terminal.
Wherein, the terminal device that preset target terminal can be the mechanisms such as the pre-set police office of user is also possible to Other terminal devices.Warning message is used to illustrate that the user of terminal device is in danger and wants help.Warning message can To include the identity information, sign information, appearance information etc. of user.The position of location information accurate positionin terminal device.Terminal Equipment timing sends location information to preset target terminal equipment, constantly notifies the position of preset target terminal terminal device Information.
Above-mentioned terminal device sends the location information of above-mentioned terminal device to preset target terminal and warning message passes through Hidden mode carries out, and terminal device does not show corresponding information.
Alarm method provided in an embodiment of the present invention hidden can send out the location information of terminal device and warning message Preset target terminal is given, so that victim be helped to be saved in time.
The embodiment of the invention also provides a kind of terminal devices, as shown in Figure 2, comprising:
Receiving unit 201 receives authentication information for terminal device under system lock state;After authentification failure, weight It is new to receive authentication information;
Authentication unit 202, for being authenticated using preset system unlock authentication information to above-mentioned authentication information;
Statistic unit 203, for counting authentification failure number;
Execution unit 204, for entering the first system if above-mentioned authentification failure number is less than first threshold, if above-mentioned recognize The card frequency of failure is greater than above-mentioned second threshold and then enters second system;Above-mentioned second system lacks payment compared to above-mentioned the first system Class application, above-mentioned second threshold are greater than or equal to above-mentioned first threshold.
Wherein, terminal device for example can be mobile phone, tablet computer, laptop, palm PC, MID etc..
System lock state is the state that terminal device does not unlock, and terminal device is generally in standby shape in this state State.Authentication information is verification information needed for releasing the lock state of terminal device.Authentication information can be character string, fingerprint, One of voice etc. is a variety of, it is corresponding with the authentication mode of unlocking terminal equipment.Authentication mode for example can be sliding Unlock, unlocked by fingerprint, speech unlocking etc..Such as the authentication mode of terminal device is unlocked by fingerprint, then corresponding authentication information is just It is fingerprint.Authentication mode and the corresponding authentication information embodiment of the present invention do not make uniqueness restriction.Receiving unit 201 is for receiving Authentication information, authentication information can be diversified forms.
Terminal device receives authentication information under system lock state can be in blank screen shape without authentication interface, that is, mobile phone State.User input authentication information can authenticate when terminal device is in black state, such as under black state Pass through unlocked by fingerprint.
Preset system unlock authentication information is the authentication information being locally stored in terminal device, for what is inputted with user Authentication information is authenticated.Authentication information can be one of character string, fingerprint, voice etc. or a variety of, it and terminal device The authentication mode of unlock is corresponding.Authentication unit 202 is carried out using preset system unlock authentication information and above-mentioned authentication information Certification.The embodiment of the present invention does not pay close attention to how to be authenticated, therefore is not described further at this to this.If authentification failure, use Family needs to re-enter authentication information, and terminal device authenticates received authentication information again, user of authentification failure It needs to re-enter once, until certification passes through.If no longer input authentication information, terminal device wait one before authenticating successfully After fixing time, into standby mode.
The first system is the system after normal starting, and the payment class in second system is applied in the shape for freezing and hiding Payment class application in state, that is, terminal device system is freezed and be can not find in systems.
Payment class application refers to the application program that Alipay, wechat payment, Mobile banking etc. use on communication terminals.
First threshold for example can be the positive integers such as 2,3,4,5,6, and second threshold for example can be 2,3,4,5,6,7 etc. just Integer.Second threshold is greater than or equal to first threshold, if second threshold is equal to first threshold, such as first threshold and second threshold All it is 3, the first system is entered if authentification failure number is less than 3, enters the second system if authentification failure number is greater than 3 System is not construed as limiting if authentification failure number is equal to 3, both can be into the first system or into second system;If the second threshold Value is greater than first threshold, such as first threshold is 3, and second threshold is 4, and the first system is entered if authentification failure number is less than 3 System enters second system if authentification failure number is greater than 4, is not construed as limiting if when authentification failure number is 3 or 4, both It can be into the first system or into second system;
For example, when first threshold and second threshold are all 3, if the 4th authenticates successfully, enter the second system System, in such a system it can be seen that and operating all applications in addition to paying class;If the 2nd time authenticates successfully, enter first System, that is, normal activation system.
As can be seen that the method for the present embodiment provides a kind of unlocking manner that can freeze and hide payment class application. It can be freezed and hidden in the case where mobile terminal owner is forced to be unlocked its mobile terminal by shirtsleeve operation The application of hiding payment class and then the safety for protecting its personal property.
The embodiment of the present invention additionally provides another method for receiving authentication information on the basis of preceding embodiment, specifically such as Under: further, as shown in figure 3, above equipment further include:
The receiving unit is also used to receive unlock instruction;
Display unit 301, for showing authentication interface after above-mentioned receiving unit receives above-mentioned unlock instruction.
The method provided in an embodiment of the present invention for receiving authentication information is that user unlocks terminal device and support for convenience A variety of authentication modes.Terminal device in the embodiment of the present invention shows authentication interface upon receipt of the instructions, and authentication interface can be with There are many forms, such as can be unlocked by fingerprint, pattern unlock, speech unlocking etc..
For example, after user shows authentication interface on the display screen of terminal device, the case where according to authentication interface Corresponding authentication information is inputted, authentication information is re-entered if authentification failure.For example, user lights terminal device display screen Afterwards, by accordingly unlocking operation, terminal device can show unlock interface, and then user can input corresponding certification letter Breath is authenticated.If after authenticating successfully, entering corresponding system;If certification is unsuccessful, re-enters authentication information and recognized Card.
The method provided in an embodiment of the present invention for receiving authentication information is simpler and supports a variety of authentication modes.
The embodiment of the present invention additionally provides a kind of method for configuring security system on the basis of preceding embodiment, specifically such as Under: further, as shown in figure 4, above equipment further include:
Application control unit 401, for entering second system if above-mentioned authentification failure number is greater than above-mentioned second threshold Freeze before and hides the payment class application in above-mentioned terminal device.
Above-mentioned second system is exactly the security system configured, and the payment class in second system, which is applied to be in, to be freezed and hide State, can not find in second system payment class application, even if therefore unlocking terminal equipment can not successfully transfer accounts etc. Operation.
For example, if the authentification failure number of user is greater than second threshold, terminal device first freezes payment class application It ties and stashes, then enter back into second system after authenticating successfully.In actual verification process, the configuration of second system The process of payment class application in journey, that is, terminal device freezed and hidden is very fast, and user will not notice this process.With Payment for mobile phone, after authenticating successfully, if the number of the authentification failure of mobile phone statistics is greater than second threshold, in mobile phone The payment classes such as treasured, Mobile banking, wechat payment are applied can not find in mobile phone.
The method of configuration security system provided in an embodiment of the present invention is very hidden rapidly and to be can effectively prevent user and is forced Operation of illegally transferring accounts etc. after unlock terminal device.
The embodiment of the present invention additionally provides a kind of method for replacing authentication mode on the basis of preceding embodiment, specifically such as Under: further, as shown in figure 5, above equipment further include:
Output unit 501 prompts whether replace authentication mode for exporting prompt information after authentification failure;
The receiving unit is also used to receive replacement instruction;
Authentication control unit 502, if being changed to currently used authentication mode for receiving above-mentioned replacement instruction The authentication mode of above-mentioned replacement instruction;
Above-mentioned receiving unit is also used to the authenticating party that currently used authentication mode is changed to above-mentioned replacement instruction Again authentication information is received after formula.
Authentication mode can there are many, such as the unlock of unlocked by fingerprint, pattern, speech unlocking etc..It can be set in terminal device A variety of authentication modes are set, current authentication information can also replace other authenticating party if one side user forgets terminal device Formula;Another aspect user can choose the authentication mode of more easily authentification failure when being forced and unlocking terminal device.For For the embodiment of the present invention, authentication mode is most important, if terminal device there was only a kind of authentication mode and authentication mode is difficult The method of intentional authentification failure, the embodiment of the present invention just loses meaning.For example, if terminal device only have unlocked by fingerprint this It plants authentication mode and finger print identifying is very accurate, user is difficult the number so that authentification failure when being forced and unlocking terminal device Reach above-mentioned second threshold.
For example, three kinds of authentication modes such as pattern unlock, unlocked by fingerprint and speech unlocking can be set in terminal device, The authentication mode of default is unlocked by fingerprint.If user is under secure conditions, he can choose can also be using unlocked by fingerprint Other authentication mode is selected after authentification failure;If user, in the case where being forced unlock, he can deliberately authentification failure choosing Select the pattern unlocking manner for being easy intentional authentification failure.
The number of authentification failure is cumulative in the embodiment of the present invention, and authentification failure number is authenticated under different authentication mode The summation of the frequency of failure.Above-mentioned second threshold is more easily reachd in this way, and terminal device is caused to enter second system.
The method of replacement authentication mode provided in an embodiment of the present invention, not only enriches authentication mode, also improves this hair The practical value of bright embodiment method.
The embodiment of the present invention provides a kind of alarm method on the basis of preceding embodiment, specific as follows: further, such as Shown in Fig. 6, above equipment further include:
Transmission unit 601 after entering second system for above-mentioned terminal device, is sent above-mentioned to preset target terminal The location information and warning message of terminal device.
Positioning unit 602, for positioning the location information of above-mentioned terminal device.
Wherein, the terminal device that preset target terminal can be the police office that user preset is set is also possible to other ends End.Warning message is used to illustrate that the user of terminal device is in danger and want help, may include user identity information, Sign information, appearance information etc..The position of location information accurate positionin terminal device.Terminal device timing is whole to preset target End sends location information, constantly notifies the location information of preset target terminal terminal device.
Above-mentioned terminal device sends the location information of above-mentioned terminal device to preset target terminal and warning message passes through Hidden mode carries out, and terminal device does not show corresponding information.
Alarm method provided in an embodiment of the present invention hidden can send out the location information of terminal device and warning message Preset target terminal is given, helps victim out of danger in time.
The embodiment of the invention also provides a kind of terminal devices, as shown in fig. 7, comprises: processor 701 and memory 702, input equipment 703, output equipment 704;Wherein memory 702 may be used to provide processor 701 and execute data processing institute The local cache of the caching and preset system unlock authentication information that need, can be also used for providing the execution data of processor 701 Handle the memory space of the result data of the data and acquisition called;Wherein input equipment 703 in terminal device for being in Authentication information is received under lock state, be also used to receive authentication information again after authentification failure and receives change directive;Output is set Standby 704, for exporting prompting message and authentication interface, are also used to send the position of above-mentioned terminal device to preset target terminal Information and warning message.
Wherein, above-mentioned processor 701, for obtaining authentication information in the case where terminal device is in the lock state;Using preset System unlock authentication information above-mentioned authentication information is authenticated, if authentification failure, receive authentication information again, and use Above-mentioned preset system unlock authentication information authenticates received authentication information again, until certification passes through;Statistics certification The frequency of failure enters the first system if above-mentioned authentification failure number is less than first threshold, if above-mentioned authentification failure number is greater than Second threshold then enters second system;Above-mentioned second system lacks payment class application, above-mentioned second threshold compared to above-mentioned the first system Value is greater than or equal to above-mentioned first threshold.
Wherein, terminal device for example can be mobile phone, tablet computer, laptop, palm PC, MID etc..
System lock state is the state that terminal device does not unlock, and terminal device is generally in standby shape in this state State.Authentication information is verification information needed for releasing the lock state of terminal device.Authentication information can be character string, fingerprint, One of voice etc. is a variety of, it is corresponding with the authentication mode of unlocking terminal equipment.Authentication mode for example can be sliding Unlock, unlocked by fingerprint, speech unlocking etc..Such as the authentication mode of terminal device is unlocked by fingerprint, then corresponding authentication information is just It is fingerprint.Authentication mode and the corresponding authentication information embodiment of the present invention do not make uniqueness restriction.
Terminal device receives authentication information under system lock state can be in blank screen shape without authentication interface, that is, mobile phone State.User input authentication information can authenticate when terminal device is in black state, such as under black state Pass through unlocked by fingerprint.
Preset system unlock authentication information is the authentication information being locally stored in terminal device, for what is inputted with user Authentication information is authenticated.Authentication information can be one of character string, fingerprint, voice etc. or a variety of, it and terminal device The authentication mode of unlock is corresponding.The embodiment of the present invention does not pay close attention to how to be authenticated, therefore does not make to this in detail at this It states.If authentification failure, user needs to re-enter authentication information, and terminal device authenticates received authentication information again, User of authentification failure needs to re-enter once, until certification passes through.If authenticating successfully preceding no longer input authentication information, After then terminal device waits certain time, into standby mode.
The first system is the system after normal starting, and the payment class in second system is applied in the shape for freezing and hiding Payment class application in state, that is, terminal device system is freezed and be can't see in systems.
Payment class application refers to the application program that Alipay, wechat payment, Mobile banking etc. use on communication terminals.
First threshold for example can be the positive integers such as 2,3,4,5,6, and second threshold for example can be 2,3,4,5,6,7 etc. just Integer.Second threshold is greater than or equal to first threshold, if second threshold is equal to first threshold, such as first threshold and second threshold All it is 3, the first system is entered if authentification failure number is less than 3, enters the second system if authentification failure number is greater than 3 System is not construed as limiting if authentification failure number is equal to 3, both can be into the first system or into second system;If the second threshold Value is greater than first threshold, such as first threshold is 3, and second threshold is 4, and the first system is entered if authentification failure number is less than 3 System enters second system if authentification failure number is greater than 4, is not construed as limiting if when authentification failure number is 3 or 4, both It can be into the first system or into second system;
For example, when first threshold and second threshold are all 3, if the 4th authenticates successfully, enter the second system System, in such a system it can be seen that and operating all applications in addition to paying class;If the 2nd time authenticates successfully, enter first System, that is, normal activation system.
As can be seen that the method for the present embodiment provides a kind of unlocking manner that can freeze and hide payment class application. It can be freezed and hidden in the case where terminal device owner is forced to be unlocked its terminal device by shirtsleeve operation The application of hiding payment class and then the safety for protecting its personal property.
The embodiment of the present invention still further provides a kind of implementation method for receiving authentication information, specific as follows: above-mentioned place Device 701 is managed, is also used to show authentication interface after above-mentioned receiving unit receives unlock instruction.
The method provided in an embodiment of the present invention for receiving authentication information is that user unlocks terminal device and support for convenience A variety of authentication modes.Terminal device in the embodiment of the present invention shows authentication interface upon receipt of the instructions, and authentication interface can be with There are many forms, such as can be unlocked by fingerprint, pattern unlock, speech unlocking etc..
For example, after user shows authentication interface on the display screen of terminal device, the case where according to authentication interface Corresponding authentication information is inputted, authentication information is re-entered if authentification failure.For example, user lights terminal device display screen Afterwards, by accordingly unlocking operation, terminal device can show unlock interface, and then user can input corresponding certification letter Breath is authenticated.If after authenticating successfully, entering corresponding system;If certification is unsuccessful, re-enters authentication information and recognized Card.
The method provided in an embodiment of the present invention for receiving authentication information is simpler and supports a variety of authentication modes.
It is specific as follows the embodiment of the invention also provides a kind of method for configuring security system: above-mentioned processor 701, also It is set for freezing before entering second system if above-mentioned authentification failure number is greater than above-mentioned second threshold and hiding above-mentioned terminal Payment class application in standby.
Above-mentioned second system is exactly the security system configured, and the payment class in second system, which is applied to be in, to be freezed and hide State.Can not find in second system payment class application, even if therefore unlocking terminal equipment can not successfully transfer accounts etc. Operation.
For example, if the authentification failure number of user is greater than second threshold, terminal device first freezes payment class application It ties and stashes, then enter back into second system after authenticating successfully.In actual verification process, the configuration of second system The process of payment class application in journey, that is, terminal device freezed and hidden is very fast, and user, which not will be considered that, has this process. It takes the mobile phone as an example, the branch after authenticating successfully, if the number of the authentification failure of mobile phone statistics is greater than second threshold, in mobile phone The payment classes such as Fu Bao, Mobile banking, wechat payment are applied can not find in mobile phone.
The method of configuration security system provided in an embodiment of the present invention is very hidden rapidly and to be can effectively prevent user and is forced Operation of illegally transferring accounts etc. after unlock terminal device.
It is specific as follows the embodiment of the invention also provides a kind of method for replacing authentication mode: above-mentioned processor 701, also For exporting prompt information after authentification failure, prompting whether to replace authentication mode and currently making after receiving replacement instruction Authentication mode is changed to the authentication mode of above-mentioned replacement instruction and receives authentication information again.
Authentication mode can there are many, such as the unlock of unlocked by fingerprint, pattern, speech unlocking etc..It can be set in terminal device A variety of authentication modes are set, current authentication information can also replace other authenticating party if one side user forgets terminal device Formula;Another aspect user can choose the authentication mode of more easily authentification failure when being forced and unlocking terminal device.For For the embodiment of the present invention, authentication mode is most important, if terminal device there was only a kind of authentication mode and authentication mode is difficult The method of intentional authentification failure, the embodiment of the present invention just loses meaning.For example, if terminal device only have unlocked by fingerprint this It plants authentication mode and finger print identifying is very accurate, user is difficult the number so that authentification failure when being forced and unlocking terminal device Reach above-mentioned second threshold.
For example, three kinds of authentication modes such as pattern unlock, unlocked by fingerprint and speech unlocking can be set in terminal device, The authentication mode of default is unlocked by fingerprint.If user is under secure conditions, he can choose can also event using unlocked by fingerprint Meaning authentification failure selects other authentication mode;If user, in the case where being forced unlock, he can deliberately authentification failure selection It is easy the pattern unlocking manner of intentional authentification failure.
The number of authentification failure is cumulative in the embodiment of the present invention, and authentification failure number is authenticated under different authentication mode The summation of the frequency of failure.Above-mentioned second threshold is more easily reachd in this way, and terminal device is caused to enter second system.
The method of replacement authentication mode provided in an embodiment of the present invention, not only enriches authentication mode, also improves this hair The practical value of bright method.
Specific as follows the embodiment of the invention also provides a kind of alarm method: above-mentioned processor 701 is also used to above-mentioned Terminal device enters after second system, and the location information and alarm signal of above-mentioned terminal device are sent to preset target terminal Breath.
Wherein, the terminal device that preset target terminal can be the police office that user preset is set is also possible to other ends End.Warning message is used to illustrate that the user of terminal device is in danger and want help, may include user identity information, Sign information, appearance information etc..The position of location information accurate positionin terminal device.Terminal device timing is whole to preset target End sends location information, constantly notifies the location information of preset target terminal terminal device.
Above-mentioned terminal device sends the location information of above-mentioned terminal device to preset target terminal and warning message passes through Hidden mode carries out, and terminal device does not show corresponding information.
Alarm method provided in an embodiment of the present invention hidden can send out the location information of terminal device and warning message Preset target terminal is given, victim can be helped to be saved in time.
The embodiment of the invention also provides another terminal devices, as shown in figure 8, for ease of description, illustrate only with The relevant part of the embodiment of the present invention, it is disclosed by specific technical details, please refer to present invention method part.The terminal Equipment can be include any terminal device such as mobile phone, tablet computer, vehicle-mounted computer, by terminal device be mobile phone for:
Fig. 8 shows the block diagram of the part-structure of mobile phone relevant to terminal device provided in an embodiment of the present invention.Ginseng Fig. 8 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 810, memory 820, input unit 830, display unit 840, sensor 850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880, And the equal components of power supply 890.It will be understood by those skilled in the art that handset structure shown in Fig. 8 is not constituted to mobile phone It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 8 to mobile phone:
RF circuit 810 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 880;In addition, the data for designing uplink are sent to base station.In general, RF circuit 810 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 810 can also be communicated with network and other equipment by wireless communication. Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storing software program and module, and processor 880 is stored in memory 820 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 820 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 820 may include high-speed random access memory Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
Input unit 830 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 830 may include that touch panel 831 and other inputs are set Standby 832.Other input equipments 832 can be used for receiving the information such as the fingerprint of input, voice.Touch panel 831, also referred to as touches Screen, collecting the touch operation of user on it or nearby, (for example user uses any suitable object or attached such as finger, stylus Operation of the part on touch panel 831 or near touch panel 831), and connected accordingly according to the driving of preset formula Connection device.Optionally, touch panel 831 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 880, and can connect It receives the order that processor 880 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface acoustic wave Equal multiple types realize touch panel 831.In addition to touch panel 831, input unit 830 can also include other input equipments 832.Specifically, other input equipments 832 can include but is not limited to physical keyboard, function key (for example volume control button, is opened Close button etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Display unit 840 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 840 may include display panel 841, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 841.Further, touch panel 831 can cover display panel 841, when touch panel 831 detect it is on it or attached After close touch operation, processor 880 is sent to determine the type of touch event, is followed by subsequent processing device 880 according to touch event Type corresponding visual output is provided on display panel 841.Although in fig. 8, touch panel 831 and display panel 841 It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control Panel 831 and display panel 841 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 841, proximity sensor can close display panel 841 when mobile phone is moved in one's ear And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 861, be converted to sound by loudspeaker 861 by road 860 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860 It is changed to audio data, then by after the processing of audio data output processor 880, such as another mobile phone is sent to through RF circuit 810, Or audio data is exported to memory 820 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 870 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 is shown WiFi module 870, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 880 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 820, and call and be stored in memory 820 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 880 can wrap Include one or more processing units;Preferably, processor 880 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile phone further includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 880 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In previous embodiment, each step method process can be realized based on the structure of the terminal device.Wherein sensor 850 Or touch panel 831 can be used as the use of fingerprint collecting equipment.
It is worth noting that, included each unit is only according to function in above-mentioned unlocked by fingerprint control apparatus embodiments Energy logic is divided, but is not limited to the above division, as long as corresponding functions can be realized;In addition, each function The specific name of energy unit is also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.
In addition, those of ordinary skill in the art will appreciate that realizing all or part of the steps in above-mentioned each method embodiment It is that relevant hardware can be instructed to complete by program, corresponding program can store in a kind of computer readable storage medium In, storage medium mentioned above can be read-only memory, disk or CD etc..
The above is only the preferable specific embodiments of the embodiment of the present invention, but protection scope of the present invention is not limited to This, anyone skilled in the art is in the technical scope that the embodiment of the present invention discloses, the change that can readily occur in Change or replace, should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with claim Subject to protection scope.

Claims (6)

1. a kind of system unlocking method characterized by comprising
Terminal device receives authentication information under system lock state, and the authentication information is the locking for releasing the terminal device Verification information needed for state, the authentication information comprise at least one of the following: character string, fingerprint, voice;
The terminal device authenticates the authentication information using preset system unlock authentication information, if authentification failure, Prompt information is then exported, prompts whether replace authentication mode;
If receiving replacement instruction, currently used authentication mode is changed to the authenticating party of the replacement instruction Then formula receives authentication information again, and using the preset system unlock authentication information to received authentication information again It is authenticated, until certification passes through, the certification difficulty of the authentication mode of the replacement instruction is greater than described currently used Authentication mode certification difficulty;
The terminal device counts authentification failure number, if the authentification failure number is less than first threshold, enters the first system System;
If the authentification failure number is greater than second threshold, the terminal device freezes and hides to pay class application, into the Two system, the second system lack the payment class application compared to the first system, and the second threshold is greater than or equal to The first threshold;
The terminal device constantly sends the location information of the terminal device by hidden mode to preset target terminal And warning message, the terminal device do not show that the location information and the warning message, the preset target terminal are The terminal device of the mechanisms such as the pre-set police office of user either other terminal devices, the warning message includes user's Identity information, sign information, appearance information.
2. the method according to claim 1, wherein the terminal device receives certification under system lock state Before information, the method also includes:
The terminal device shows authentication interface after receiving unlock instruction.
3. according to the method described in claim 2, it is characterized in that, if the authentification failure number is greater than the second threshold Into before second system, the method also includes:
The terminal device freezes and hides the payment class application.
4. a kind of terminal device characterized by comprising
Receiving unit receives authentication information for terminal device under system lock state, and the authentication information is described in releasing Verification information needed for the lock state of terminal device, the authentication information comprise at least one of the following: character string, fingerprint, language Sound;
Authentication unit, for being authenticated using preset system unlock authentication information to the authentication information;
Output unit prompts whether replace authentication mode for exporting prompt information after authentification failure;
The receiving unit is also used to receive replacement instruction;
Authentication control unit, if the replacement instruction is received for the receiving unit, by currently used authentication mode It is changed to the authentication mode of the replacement instruction, the certification difficulty of the authentication mode of the replacement instruction is greater than The certification difficulty of the currently used authentication mode;
The receiving unit is also used to be changed to the authentication mode of the replacement instruction in currently used authentication mode Later, authentication information is received again;
Statistic unit, for counting authentification failure number;
Execution unit enters the first system if being less than first threshold for the authentification failure number;
Execution unit, if being also used to the authentification failure number greater than second threshold, the terminal device freezes and hides branch Class application is paid, into second system, the second system lacks the payment class application compared to the first system, and described second Threshold value is greater than or equal to the first threshold;
Positioning unit, for positioning the location information of the terminal device;
Transmission unit, for after the terminal device enters second system, by hidden mode constantly to preset mesh Mark terminal sends the location information and warning message of the terminal device, and the terminal device does not show the location information and institute Warning message is stated, the preset target terminal is that the terminal device of the mechanisms such as the pre-set police office of user is either other Terminal device, the warning message include the identity information, sign information, appearance information of user.
5. equipment according to claim 4, which is characterized in that
The receiving unit is also used to receive unlock instruction;The equipment further include:
Display unit, for showing authentication interface after the receiving unit receives the unlock instruction.
6. equipment according to claim 5, which is characterized in that the equipment further include:
Application control unit, for freezing before entering second system if the authentification failure number is greater than the second threshold And hide the payment class application in the terminal device.
CN201610718935.2A 2016-08-24 2016-08-24 A kind of system unlocking method and equipment Expired - Fee Related CN106327193B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610718935.2A CN106327193B (en) 2016-08-24 2016-08-24 A kind of system unlocking method and equipment
PCT/CN2016/100778 WO2018035930A1 (en) 2016-08-24 2016-09-29 System unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610718935.2A CN106327193B (en) 2016-08-24 2016-08-24 A kind of system unlocking method and equipment

Publications (2)

Publication Number Publication Date
CN106327193A CN106327193A (en) 2017-01-11
CN106327193B true CN106327193B (en) 2019-08-02

Family

ID=57791098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610718935.2A Expired - Fee Related CN106327193B (en) 2016-08-24 2016-08-24 A kind of system unlocking method and equipment

Country Status (2)

Country Link
CN (1) CN106327193B (en)
WO (1) WO2018035930A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108320391B (en) * 2017-01-18 2021-03-09 芜湖美的厨卫电器制造有限公司 Unlocking method and system of rental equipment and equipment thereof
EP3564839B1 (en) * 2017-01-22 2022-01-05 Huawei Technologies Co., Ltd. Authentication method, mobile terminal, device and system
CN107395889B (en) 2017-07-28 2020-01-21 Oppo广东移动通信有限公司 Method and device for reducing power consumption of mobile terminal, storage medium and mobile terminal
KR102520199B1 (en) * 2018-07-23 2023-04-11 삼성전자주식회사 Electronic apparatus and controlling method thereof
CN111128138A (en) * 2020-03-30 2020-05-08 深圳市友杰智新科技有限公司 Voice wake-up method and device, computer equipment and storage medium
CN111814121B (en) * 2020-06-29 2021-08-31 江苏中州科技有限公司 Login authentication management system and method based on computer system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472952A (en) * 2002-06-26 2004-02-04 夏普株式会社 Method and electronic device for eliminating lock on functions of electronic device
CN101345967A (en) * 2008-08-15 2009-01-14 深圳华为通信技术有限公司 Function control method and embedded type terminal
CN104253818A (en) * 2011-12-13 2014-12-31 华为终端有限公司 Server and terminal authentication method, server, terminal
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472952A (en) * 2002-06-26 2004-02-04 夏普株式会社 Method and electronic device for eliminating lock on functions of electronic device
CN101345967A (en) * 2008-08-15 2009-01-14 深圳华为通信技术有限公司 Function control method and embedded type terminal
CN104253818A (en) * 2011-12-13 2014-12-31 华为终端有限公司 Server and terminal authentication method, server, terminal
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device

Also Published As

Publication number Publication date
CN106327193A (en) 2017-01-11
WO2018035930A1 (en) 2018-03-01

Similar Documents

Publication Publication Date Title
CN106327193B (en) A kind of system unlocking method and equipment
US11269981B2 (en) Information displaying method for terminal device and terminal device
CN104767863B (en) The unlocking method and terminal of terminal screen
KR20150046766A (en) Unlocking process mehtod, apparatus and device for terminal
CN106920307A (en) Gate inhibition's open method, device and mobile terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
US9940448B2 (en) Unlock processing method and device
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
CN109102297A (en) Revocable payment method and device
CN108694784A (en) A kind of storage cabinet system of multiple instructions transmitting-receiving
CN108229149B (en) Data protection method and device
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN104573437B (en) Information authentication method and device and terminal
CN109300203A (en) Mobile terminal and unlocking method, device
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN103366104A (en) Method and device for controlling accessing of application
CN108989534A (en) Message prompt method, mobile terminal and computer readable storage medium
CN109151150A (en) Mobile terminal and unlocking screen method, apparatus
CN109918944A (en) An information protection method, device, mobile terminal and storage medium
CN106803027A (en) Application function entrance starts method, device and mobile terminal
CN108781234A (en) Function control method and terminal
CN110062929A (en) A kind of method, apparatus and terminal showing data
WO2019090702A1 (en) Terminal security protection method and device
CN109189397A (en) The method, apparatus of mobile terminal and intelligent display hiden application
CN106503512A (en) Mobile terminal and its plus/unlocking method and a device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190802

Termination date: 20210824