专利摘要:
method, apparatus and device of unlocking process for a terminal a method of unlocking process for a terminal is provided by the present disclosure. the method includes: receiving an entry unlock instruction; determining whether a current unlocking user belongs to a first user group pre-set according to the unlocking instruction; and the acquisition and storage of information about the current unlocking user, if the current unlocking user does not belong to the first pre-regulated user group. by using the present exhibit, information about invalid users can be recorded, and the security of the device can be improved. an unlocking process apparatus and a device for a terminal are also provided by the present exhibition. by using the present exhibit, information about invalid users can be recorded, and the security of the terminal can be improved.
公开号:BR112014017739B1
申请号:R112014017739-2
申请日:2014-05-09
公开日:2020-12-15
发明作者:Song Bao;Bin Zhang;Zhiyong Feng
申请人:Xiaomi Inc.;
IPC主号:
专利说明:

[0001] This application is based on and claims the priority benefit for Chinese Patent Application No. CN 2013104446823.2, filed on September 26, 2012, the content of which is incorporated herein by reference. TECHNICAL FIELD
[0002] The present exhibition generally refers to a field of technology of an electronic device, and, more particularly, to a method, an apparatus and an unlocking process device for a terminal. BACKGROUND
[0003] Nowadays, with the continuous development of electronic communication technology, portable electronic devices have become indispensable in the transfer of information between people, and devices including mobile phones and tablet computers and the like are popularized. Since a device like this has a large storage space and versatile functions, the user tends to develop a habit for storing a large amount of private information on the device, which proposes a higher requirement for the security of the device. Currently, unlocking methods for an electronic device include numeric passwords, framed figures, fingerprint recognition, voice recognition and face recognition and the like. While these methods can provide password protection for a locked screen, when a user other than the owner tries to unlock the machine, the existing unlock method can only alert you to a wrong password and request another and similar password, and cannot provide additional information. Also, the owner cannot find out that another user tried to unlock the native machine, which is a potential security risk for the device. SUMMARY
[0004] A method, apparatus and device for unlocking a terminal are provided by the terms of the present exhibition, for recording information about an invalid user to inform the owner of the machine.
[0005] According to a first aspect of the modalities of the present exhibition, a method of unlocking process for a terminal is provided, which includes: receiving an entry unlocking instruction; determining whether a user currently unlocking belongs to a first user group pre-set according to the unlocking instruction; and the acquisition and storage of information about the current unlocking user, if the current unlocking user does not belong to the first pre-regulated user group.
[0006] The solution provided by the modalities of the present exhibition can have the following advantageous effect: through the above solution, when trying to unlock the terminal device, and the user unlocking is an invalid user, who does not belong to the first user group pre-set, information about the user unlocking is acquired by the machine owner for checking. In this way, the owner can take the unlock history of the native machine, and security is improved.
[0007] If the current unlocking user does not belong to the first pre-set user group, an information acquisition device will be started; the information acquisition device acquires information about the user by unlocking the current one; wherein the information about the current user unlocking includes a face image information, a voice information or a current user unlocking fingerprint information.
[0008] By using the information acquisition device, such as a camera, microphone or fingerprint recording device, etc., it is convenient for the owner to recognize the identity of the invalid user.
[0009] If the current unlocking user does not belong to the first preset user group, after information about the current unlocking user is acquired and stored, it will be determined whether the current unlocking user belongs to a second preset user group of according to the information about the current unlocking user; if the current user unlocking belongs to the second pre-set user group, a screen will be unlocked and a restricted user mode will be entered; and a user operation unlocking current in restricted user mode will be recorded; in which, in restricted user mode, a terminal system and / or applications only respond to pre-regulated operations, which include start, inquisition, modification, addition and / or high production device.
[0010] Through the solution above, a secondary determination mechanism is performed based on the information about the user unlocking the current one. If the user unlocking is a particular user, a restricted user mode will be entered, in which a restricted permission is offered to a certain group of users in particular and the operations carried out for the terminal by the particular user in the mode of restricted user are recorded for the owner to check. In this way, not only can the owner take the unlock history of the native machine, but he can also protect personal privacy, and can find out what operation the user unlocked performed on the native machine. So, security is thus improved. Also, emergency assistance can be provided for the restricted user.
[0011] If the current unlocking user belongs to the first pre-set user group, the terminal will be unlocked; and information stored about and / or an operation recorded by the user unlocking that does not belong to the first preset user group will be displayed.
[0012] Through the above solution, after a correct unlock instruction is received, information about users unlocking who attempted to unlock the native machine is displayed, which serves as a notification.
[0013] After the operation recorded by the user unlocking that does not belong to the first pre-set user group is displayed, an alert information is extracted to alert if it is to undo the operation; and the operation is undone after the alert information is confirmed.
[0014] Through the above solution, if it is discovered that there were operations performed on the native machine by invalid users in restricted user mode, an undo option can be provided for the owner to undo these operations, thus the terminal can be restored to prior status, prior to operations by invalid users, to facilitate use by the owner.
[0015] If the current unlocking user does not belong to the first preset user group, after information about the current unlocking user is acquired and stored, it will be determined whether the current unlocking user belongs to a second preset user group of according to the information about the current unlocking user; if the current unlocking user does not belong to the second preset user group, a locked screen status will be entered.
[0016] Through the solution, above, a secondary determination mechanism is performed based on the information about the user unlocking. If the user unlocking is neither the owner nor belonging to a particular pre-regulated user group, only information about the user unlocking will be acquired and stored, and after the information is acquired, it will be entered into the status of locked screen, that is, the terminal will not be unlocked, and restricted user mode will not be entered.
[0017] Before an input unlock instruction is received, it is determined whether to display a screen unlock interface according to an inclined angle between a plane on which a geometric axis of the terminal is located and a horizontal plane; and if the inclined angle is greater than or equivalent to a preset limit, the screen unlock interface will be displayed.
[0018] Through the solution above, if the user unlocking wants to enter an unlock instruction, he only needs to tilt the terminal by a certain angle and a locked screen interface can be released, and the operation is easy.
[0019] The unlocking instruction is based on character password information, pattern information, face image information, voice information or fingerprint information.
[0020] In accordance with a second aspect of the modalities of the present exhibition, an unlocking process apparatus for a terminal is provided, which includes: a receiving module, configured to receive an incoming unlocking instruction; a determination module, configured for determining whether a current unlocking user belongs to a first user group pre-set according to the unlocking instruction; and an information acquisition process module, configured for the acquisition and storage of information about the current unlocking user, if the current unlocking user does not belong to the first pre-regulated user group; the unlocking process apparatus further includes: an information acquisition device and a device start module; wherein the device start module is configured to start the information acquisition device, if the current unlocking user does not belong to the first pre-set user group; the information acquisition device is configured to acquire information about the current unlocking user, in which the information about the current unlocking user comprises a face image information, a voice information or a current user unlocking fingerprint information.
[0021] The unlocking process apparatus also includes: a second determination module, configured to determine whether the current unlocking user belongs to a second pre-set user group according to information about the current unlocking user; a second unlocking module, configured for unlocking a screen and entering a restricted user mode, if the current unlocking user belongs to the second preset user group; and a recording process module, configured to record a user's operation by unlocking the current in restricted user mode; in which, in restricted user mode, a terminal system and / or applications only respond to pre-regulated operations which comprise start, inquisition, modification, addition and / or deletion.
[0022] The unlocking process device also includes: a first unlocking process module, configured for unlocking the terminal, if the current unlocking user belongs to the pre-set user group; and a display process module, configured to display information stored about and / or a recorded user operation unlocking that does not belong to the first pre-set user group; the unlocking process apparatus also includes: an information extraction module, configured to extract an alert information to alert if it is to undo the operation; and an undo process module, configured to undo the operation after the alert information is confirmed.
[0023] The unlocking process device also includes: a screen locking process module, configured to enter a locked screen status, if the current unlocking user does not belong to the second group; the unlocking process apparatus also includes: a third determination module, configured for determining the display of a screen unlocking interface according to an inclined angle between a plane on which a geometric axis of the terminal is located and a plane horizontal; and an interface process module, configured to display the screen unlock interface, if the inclined angle is greater than or equal to a preset limit.
[0024] In accordance with a third aspect of the modalities of the present exhibition, a terminal device is provided, which includes a memory and one or more programs stored in memory, in which the terminal device is configured to run one or more programs by one or more processors, one or more programs containing instructions for performing the following operations: receiving an input unlock instruction; determination as to whether a current user unlocking belongs to a first user group pre-set according to the unlocking instruction; and acquisition and storage of information about the current unlocking user, if the current unlocking user does not belong to the first pre-regulated user group.
[0025] Through the present exhibition, information about invalid users can be recorded for the owner to check, and it is convenient for the owner to take the unlock history of the terminal, so that the security factor can be improved. For a terminal device with a biological recognition function, it is convenient to make a device for multiple users through the present exhibition, and to offer a different permission to different users, so that it is desired for the protection of the privacy information of the owner.
[0026] Other characteristics and advantages of this exhibition will be established in the description below and, in part, will be evident from the description, or may be appreciated through the practice of this exhibition. The objectives and other advantages of the present exhibition can be realized and obtained through the structures particularly highlighted in the written description, in the claims and in the associated drawings.
[0027] It should be appreciated that the general description above and the detailed description below are merely examples and do not limit exposure. The technical solution of the present exhibition will be described in greater detail with reference to the associated drawings and modalities. BRIEF DESCRIPTION OF THE DRAWINGS
[0028] The associated drawings, which are incorporated into and constitute a part of this specification, illustrate modalities consistent with the invention and, together with the description, serve to explain the principles of the invention.
[0029] The associated drawings, which form part of the description and serve to explain the present exhibition together with the modalities of the present exhibition, are provided for a better understanding of the present exhibition, but do not constitute a limitation for the present exhibition. In the drawings:
[0030] figure 1 is an example flowchart showing an unlocking process method for a terminal according to an example embodiment;
[0031] figure 2 is an example flowchart showing an unlocking process method for a terminal according to an example embodiment;
[0032] figure 3 is an example flowchart showing an unlocking process method for a terminal according to an example embodiment;
[0033] figure 4 is an example flowchart showing an unlocking process method for a terminal according to an example embodiment;
[0034] figure 5 is an example flowchart showing an unlocking process method for a terminal according to an example embodiment;
[0035] figure 6 is an example flowchart showing an unlocking process method for a terminal according to an example embodiment;
[0036] figure 7 is an example flow chart showing an unlocking process method for a terminal according to an example embodiment;
[0037] figure 8 is an example flow chart showing a screen unlocking process for a mobile phone with a face recognition function according to an example modality;
[0038] figure 9 is a block diagram showing an unlocking process apparatus for a terminal according to an example embodiment;
[0039] figure 10 is a block diagram showing an unlocking process apparatus for a terminal according to an example embodiment;
[0040] figure 11 is a block diagram showing an unlocking process apparatus for a terminal according to an example embodiment;
[0041] figure 12 is a block diagram showing an unlocking process apparatus for a terminal according to an example embodiment;
[0042] figure 13 is a block diagram showing an unlocking process apparatus for a terminal according to an example embodiment;
[0043] figure 14 is a block diagram showing an unlocking process apparatus for a terminal according to an example embodiment;
[0044] figure 15 is a block diagram showing a terminal device according to an example embodiment.
[0045] The explicit modalities of the present exhibition that have been illustrated in the associated drawings above will be described in greater detail hereinafter. These associated drawings and a literal description are in no way intended to limit the scope of the idea of the present exhibition, but to explain the concept of the present exhibition to those skilled in the art with reference to particular modalities. DETAILED DESCRIPTION
[0046] The modalities of this exhibition will be described with reference to the associated drawings. It should be appreciated that the modalities described here are only for illustration and explanation, rather than limiting the modalities of the present exhibition.
[0047] An unlocking process method for a terminal is provided by the modalities of this exhibition, whereby, when an invalid user tries to unlock a native machine, not only is the machine not allowed to be unlocked, but also a locking device information acquisition is started for information acquisition on the user by unlocking. In this way, the method can provide a notification to the machine owner to check the information after he has unlocked the machine, to find out which invalid user tried to unlock the native machine.
[0048] Figure 1 is a flowchart showing a method for unlocking a terminal according to a modality of the present exhibition, which includes the following steps.
[0049] In step S101, an input unlock instruction is received (the method according to this modality is carried out at the terminal).
[0050] In step S102, it is determined whether a current unlocking user belongs to the first pre-set user group according to the unlocking instruction.
[0051] In step S103, if the current unlocking user does not belong to the first pre-set user group, information about the current unlocking user will be acquired and stored.
[0052] If the current user unlocking belongs to the first pre-set user group, the process will be terminated and the machine will be unlocked as normal for displaying a home page.
[0053] In a practical application, the unlocking instruction is introduced through a screen interface locked by a user, which is based on character password information, standard information or biological recognition information, including a pre-set numeric password, a particular pattern, a face image, voice information or fingerprint information, etc. Taking a numeric password, for example, if the user unlocking is an invalid user, the login password will not match the pre-set password, the terminal will determine that the invalid user is not the owner of the machine upon receipt of the wrong password, and acquires and stores the information on the user unlocking for the owner to check who tried to unlock the machine after he unlocked the terminal.
[0054] An information acquisition device can be used for the acquisition of information about the user unlocking according to a modality of the present exhibition. Figure 2 is a flowchart showing an unlocking process method according to another embodiment of the present exhibition, which includes the following steps.
[0055] In step S201, an input unlock instruction is received (the method according to this mode is executed at the terminal).
[0056] In step S202, it is determined whether a current unlocking user belongs to a first pre-set user group according to the unlocking instruction; if it does not belong to the first pre-set user group, the process will be continued to step 203; otherwise, the process will be terminated and the machine will be unlocked as normal to display a home page.
[0057] In step S203, if the current unlocking user does not belong to the first pre-set user group, an information acquisition device is started to acquire information about the current unlocking user; wherein the information about the current user unlocking includes a face image information, a voice information or a fingerprint information.
[0058] In a practical application, the information acquisition device above includes a camera, a microphone or a fingerprint recording device, etc. Taking a camera as an example, after an invalid user enters a wrong unlock instruction, the terminal starts the camera provided on it, sets the camera for the user by unlocking in front of the screen to capture a photo, and stores the photo on the native machine or in a cloud. The machine owner can recognize the user's identity by unlocking based on the photo when checking the photo. In addition, if the native machine's unlock instruction is based on biological recognition technology, a microphone or fingerprint recording device can be used to easily record the user's voice information or fingerprint information by unlocking. Also, the identity of the user unlocking can be determined by a comparison with the voice information or the existing fingerprint information.
[0059] In an embodiment of the present exhibition, a secondary determination mechanism against the user unlocking can be provided, in order to identify the particular users, such as family members and friends of the machine owner and to provide a corresponding permission to those users in particular. Figure 3 is a flow chart showing an unlocking process method according to another mode of the present exhibition, which includes the steps to follow.
[0060] In step S301, an input unlock instruction is received (the method according to this modality is carried out at the terminal).
[0061] In step S302, it is determined whether a current unlocking user belongs to a first pre-set user group according to the unlocking instruction; if it does not belong to the first pre-set user group, the process will continue until step S303; otherwise, the process will be terminated, and the machine is unlocked as normal for displaying a home page.
[0062] In step S303, if the current unlocking user does not belong to the first pre-set user group, information about the current unlocking user will be acquired and stored.
[0063] In step S304, it is determined whether the current unlocking user belongs to a second pre-set user group according to an information about the current unlocking user; if it belongs to the second preset user group, the process will be continued to step S305; otherwise, the process will be terminated.
[0064] In step S305, if the current user unlocking belongs to the second pre-set user group, the screen will be unlocked and a restricted user mode will be entered.
[0065] In step S306, a user operation unlocking the current is recorded in the restricted user mode.
[0066] In restricted user mode, the system and / or applications of the terminal device only respond to pre-regulated operations which include start, inquisition, modification, addition and / or deletion.
[0067] In a practical application, if he wants his family members or friends to be allowed to use the native machine, by unlocking the machine. Taking a child from the owner, for example, a photo of the child can be stored locally by the machine owner, and then, when the child tries to unlock and enter a wrong password, the camera will capture a photo of the child, and the terminal system will compare the captured photo with each of a plurality of photos stored beforehand. If the current unlocking user is determined to be one of the preset user group, rather than a stranger, using face recognition technology, the screen will be unlocked and an awakened status will be entered.
[0068] Still, in a mode of the present exhibition, the respective user modes can be set for a particular user, such as a family member or a friend, beforehand, in which the particular user can unlock the screen, but only to perform restricted operations on the operating system or applications loaded from the native machine. Still taking the owner's child as an example, a user mode for the child is set in advance, in which, after the terminal is unlocked, only game apps are available, while shopping apps are not available, nor any instructions for executing modifications, additions or deletions are available, to avoid a malfunction by the child when making any purchases or other changes. Different user modes are set for different users in particular by the machine owner. Then, privacy information can be regulated as inaccessible, to protect privacy information. In the form of the present exhibition, a full user permission can be regulated for a particular user.
[0069] Still, in a modality of the present exhibition, operations including beginning, inquisition, modification, addition and / or high production apparatus, etc. performed for the system and the terminal device applications by a particular user for the native machine can be recorded.
[0070] In a mode of the present exhibition, information about a user unlocking is displayed after the machine is unlocked by the owner. Figure 4 is a flowchart showing an unlocking process method according to another embodiment of the present exhibition, which includes the steps to follow.
[0071] In step S401, an input unlock instruction is received (the method according to this modality is carried out at the terminal).
[0072] In step S402, it is determined whether a current unlocking user belongs to a first user group pre-set according to the unlocking instruction; if you belong to the first pre-set user group, the process will be continued to step 403; otherwise, the process will be terminated, and successive processes may be referred to in steps S203 and S303.
[0073] In step S403, if the current user unlocking belongs to the first pre-set user group, the terminal will be unlocked.
[0074] In step S404, the information stored about and / or an operation recorded by the user unlocking that does not belong to the first pre-set user group are displayed.
[0075] Information about the user unlocking that does not belong to the first pre-regulated user group includes face image information, voice information or fingerprint information.
[0076] Operation by a user unlocking that does not belong to the first pre-set user group includes start, inquisition, modification, addition and / or deletion for the terminal device system and applications by users unlocking that do not belong to the first group user preset in restricted user mode.
[0077] In a practical application, when the screen is unlocked after the owner introduces a correct unlocking instruction, and if it enters a normal user mode, the information previously acquired about users unlocking, other than the owner, that is, the captured photos, recorded voices or received fingerprints, etc. are displayed, and if there is a particular user pre-set by the owner among the users unlocking, a recording of an operation for the native machine by the particular user will also be displayed.
[0078] Through the mode of the present exhibition, the operation by the user in particular for the native machine can be undone. Figure 5 is a flowchart showing an unlocking process method according to another embodiment of the present exhibition, which includes the following steps.
[0079] In step S501, an input unlock instruction is received (the method according to this modality is executed at the terminal).
[0080] In step S502, it is determined whether a current unlocking user belongs to a first pre-set user group according to the unlocking instruction; if it belongs to the first pre-set user group, the process will be continued to step 503; otherwise, the process will be terminated, and successive processes may be referred to steps 203 and 303.
[0081] In step S503, if the current user unlocking belongs to the first pre-set user group, the terminal will be unlocked.
[0082] In step S504, the information stored about and / or the operation recorded by a user unlocking that does not belong to the first pre-set user group are displayed.
[0083] In step S505, an alert information is extracted to alert if it is to undo the operation.
[0084] In step S506, the operation is undone after the alert information is confirmed.
[0085] In a practical application, the mode of the present exhibition provides an undo function to undo the operation by the user in particular for the native machine for system restoration and application to the previous status, by alerting for an undo option after recording from the operation by the user in particular to the native machine being displayed to the owner and restoring the system and application to the status prior to the operation after the owner approves the undo operation. For example, an owner’s girlfriend is one of the users in particular, and you enter a restricted user mode after the native machine is unlocked by it, in which it loads a map application to the native machine, deletes a weather forecast and modify an avatar configuration for an instant messaging application. When the owner uses the native machine, he discovers the above operations performed by his girlfriend, and selects an option to "confirm to undo" in a dialog box that pops up instantly to alert you if it is to undo operations. Then, the map application is deleted, the weather forecast application is restored, and the avatar configuration for the instant messaging application is restored, that is, the native machine configuration is restored to the status prior to operations by the girlfriend. . In an embodiment of the present exhibition, the original configuration can be restored with a key press, or the operations can be selectively undone one by one, in order to keep traces of the operations concerned.
[0086] In an embodiment of the present exhibition, after the owner has unlocked the machine, only information about invalid users acquired by the system during the time from the last unlock by the owner until the current unlock by the owner is displayed. Historical information prior to that time can be displayed through an inquisition. The advantage of this is that it is convenient for the owner to quickly catch recent unlock events.
[0087] In a mode of the present exhibition, double identification determinations for the current unlocking user can be performed. Figure 6 is a flowchart showing an unlocking process method according to another embodiment of the present exhibition, which includes the following steps.
[0088] In step S601, an input unlock instruction is received (the method according to this modality is carried out at the terminal).
[0089] In step S602, it is determined whether a current unlocking user belongs to a first pre-set user group according to the unlocking instruction; if it belongs to the first pre-set user group, the process will continue until step S603; otherwise, the process will be terminated, and the machine can be unlocked as normal to display a home page.
[0090] In step S603, if the current unlocking user does not belong to the first pre-set user group, information about the current unlocking user is acquired and stored.
[0091] In step S604, it is determined whether the current user unlocking belongs to a second group of users pre-set according to the information about the current user unlocking; if it belongs to the second pre-set user group, the process will continue until step 605; otherwise, the process will be terminated, and the successive process can be referred to step 305.
[0092] In step S605, if the current unlocking user does not belong to the second pre-set user group, a locked screen status will be entered.
[0093] In a practical application, for a user unlocking that is not the owner or a particular user, an identification information is acquired and the terminal is not unlocked.
[0094] In an embodiment of the present exhibition, it is determined when a screen unlock interface is started by using an inclined angle of the device. Before the input unlock instruction is received, it is determined whether the screen unlock interface is displayed according to an inclined angle between a plane on which a geometric axis of the terminal device is located in a horizontal plane; and if the inclined angle is greater than or equal to a preset limit, the screen unlock interface will be displayed.
[0095] Figure 7 is a schematic view showing a relationship of the angles of the terminal device placed in a space, according to one embodiment of the present exhibition. As shown in figure 7, which is a side view, a terminal device 100 is a mobile phone, an angle included between a plane 200 on which the geometric axis of the mobile phone is located and a horizontal plane 300 is θ, which is between 0 ° and 180 °. When an unlocking user picks up the mobile phone, the mobile phone automatically detects a value of θ. If the value of θ reaches a predetermined limit (for example, 30 °, 60 °, 90 °, etc.), the screen unlock interface will be started, and the unlock instruction entered by the user can be received. The advantage of this configuration is that the screen can be started only by the user to change the positioning direction of the mobile phone, without mechanical operation, so that it is convenient to use and the user experience is improved.
[0096] Also, the terminal device 100 can also be a tablet computer, an e-book or a usable device, etc. The screen unlock interface can be started only after the value of θ is greater than or equivalent to the predetermined limit and remains on it for a certain period of time, for example, θ is 90 ° for 5 seconds or more, to prevent the screen unlock interface is often started because of random placements of the mobile phone ported in daily life.
[0097] Figure 8 is a flowchart showing a screen unlocking process for a mobile phone with a face recognition function, according to a modality of the present exhibition. First, the user picks up the mobile phone, tilts it to an angle that reaches a limit and then remains on it for 5 seconds. The mobile phone detects whether its inclined angle reaches the predetermined limit (step 801). If it does not reach the predetermined limit, the mobile phone's screen will remain blank (step 802); if he does, the screen will be lit and an interface for entering passwords will be displayed. An incoming unlock instruction is received and it is determined whether the received unlock instruction is correct (step 803). If the unlocking instruction is correct, the screen will be unlocked, and the mobile phone can be used as normal. If anyone has tried to unlock the native mobile phone previously, a photo information of the user unlocking the previous one and the information and the for the native mobile phone will be displayed (step 804). Also, the mobile phone displays recorded operation information and provides an option to undo with a key press, etc. If the unlock instruction is not correct, the user will be indicated as an invalid user, a camera will be started to take a picture of the user's face unlocking (step 805). The captured photo is compared to the photos of a pre-regulated user group using face recognition technology (step 806). If the current unlocking user is one of the particular users, the screen will be unlocked and a restricted user mode corresponding to the particular user will be entered (step 807, 808 or 809), and the operation information will be recorded (step 811, 812 or 813). For example, there are three pre-regulated groups of users in particular, respectively, a first user in particular, a second user in particular and a third user in particular. If it is determined as the first particular user after an acknowledgment, the process will be continued to steps 807 and 811. If it is determined as the second particular user after an acknowledgment, the process will be continued to steps 808 and 812. If it is determined as the particular third user after an acknowledgment, the process will be continued to steps 809 and 813. And, if the current unlocking user is not any of the particular users, it will be indicated as an invalid user, and he will not be allowed to use the native mobile phone, and the mobile phone will be returned to a blank screen status (step 810).
[0098] An unlocking process apparatus for a terminal is also provided by another embodiment of the present exhibition, which is shown in a block diagram of figure 9, and includes:
[0099] a receiving module 1001, configured to receive an input unlock instruction;
[0100] a first determination module 1002, configured to determine whether a current unlocking user belongs to a first pre-set user group according to the unlocking instruction; and
[0101] an information acquisition process module 1003, configured to acquire and store information about the current unlocking user, if the current unlocking user does not belong to the first pre-set user group.
[0102] An unlocking process device for a terminal is also provided by another modality of the present exhibition, which is shown in a block diagram of figure 10. The difference compared to the modality shown in figure 9 is in the fact that that the unlocking process apparatus still includes a device start module 1004, configured to start an information acquisition device, if the current unlocking user does not belong to the first preset user group.
[0103] The information acquisition device includes a camera, a microphone or a fingerprint recording device, etc., and it acquires face image information, voice information and fingerprint information, etc. about the current unlocking user after being started.
[0104] An unlocking process device for a terminal is also provided by another mode of the present exhibition, which is shown in a block diagram in figure 11. The difference compared to the mode shown in figure 9 is in the fact that that the unlocking process apparatus further includes a second determination module 1005, a second unlocking module 1006 and a recording process module 1007.
[0105] The second determination module 1005 is configured to determine whether the current unlocking user belongs to a second preset user group according to information about the current unlocking user.
[0106] The second unlocking module 1006 is configured to unlock the screen and enter a restricted user mode, if the current unlocking user belongs to the second preset user group.
[0107] The recording process module 1007 is configured to record a user operation by unlocking the current in restricted user mode.
[0108] In restricted user mode, the terminal device system and / or applications only respond to pre-regulated operations, which include start, inquisition, modification, addition and / or deletion.
[0109] An unlocking process device for a terminal is also provided by another mode of the present exhibition, which is shown in a block diagram in figure 12. The difference, if compared with the mode shown in figure 9, is in the fact that the unlocking process apparatus still includes a first unlocking module 1008 and a display process module 1009.
[0110] The first unlocking module 1008 is configured to unlock the terminal, if the current unlocking user belongs to the first pre-set user group. The display process module 1009 is configured to display information about the user by unlocking that does not belong to the first preset user group.
[0111] An unlocking process device for a terminal is also provided by another modality of the present exhibition, which is shown in a block diagram in figure 13. The difference, compared with figure 11, is in the fact that that the unlocking process apparatus still includes a first unlocking module 1008 and a display process module 1009.
[0112] The first unlocking module 1008 is configured to unlock the terminal, if the current unlocking user belongs to the first pre-set user group; the display process module 1009 is configured to display an operation by the user unlocking that does not belong to the first preset user group.
[0113] An unlocking process apparatus for a terminal is also provided by another modality of the present exhibition, which is shown in a block diagram in figure 14. The difference, if compared with the modality shown in figure 13, is in the fact that the unlocking process apparatus also includes a 1010 information extraction module and a 1011 undo process module.
[0114] The 1010 information extraction module is configured to extract alert information to alert you if it is to undo the operation.
[0115] The 1011 undo process module is configured to undo the operation, after the alert information is confirmed.
[0116] An unlocking device for a terminal is also provided by another embodiment of the present exhibition. The difference, if compared to the modality shown in figure 9, is in the fact that the unlocking process apparatus still includes an inclined angle determination module and an interface process module.
[0117] The inclined angle determination module is configured to determine whether to display a screen unlock interface according to an inclined angle between a plane on which a geometric axis of the terminal device is located and a horizontal plane, and determine which is to display if the inclined angle reaches a predetermined limit. The interface process module is configured to display the screen unlock interface, if the inclined angle is greater than or equal to the predetermined limit.
[0118] Through the mode of the present exhibition, information about invalid users can be recorded for the owner to check, and the owner will find out who used the native machine, when he unlocks the machine the next time. It is convenient for the owner to take the unlock history of the terminal, to warn the owner to exclude potential security risks. For a terminal device with a biological recognition function, it is convenient to make a device for multiple users through this exhibition, and offer a different permission to different users. The owner can find out what operations have been performed by users, and restore with a keystroke to remove the effect of user operations, so that the operator's maintenance charge for the terminal is reduced.
[0119] A terminal device is also provided by the present exhibition. With reference to figure 15, the terminal device that is configured to carry out the unlocking process method for a terminal device according to the above modalities can be a mobile phone, a tablet, a usable mobile device, such as a smart watch, and the like.
[0120] Terminal device 700 may include a communication unit 110, a memory 120 including one or more computer-readable storage media, an input unit 130, a display unit 140, a sensor 150, a audio circuit 160, a wireless communication unit 170, a processor 180 including one or more processing cores, and a power supply 190 and other components. It should be appreciated by those skilled in the art that the structure of the terminal device shown in figure 5 is not a limitation for the terminal device, and may include more or less components than what is illustrated, or combine some of the components, or have different component arrangements. On what,
[0121] Communication unit 110 can be configured for transmitting and receiving information, or for transmitting and receiving a signal during a call procedure. The communication unit 110 can be a network communication device, such as an RF (radio frequency) circuit, a router, a modem, etc. In particular, when the communication unit 110 is an RF circuit, the communication unit 110 receives downlink information from a base station, and then transfers the information to one or more processors 180 to be processed. Also, the communication unit 110 transmits uplink data to the base station. Generally, the RF circuit as a communication unit includes, but is not limited to, an antenna, at least an amplifier, a tuner, one or more oscillators, a subscriber identity module (SIM) card, a transceiver, a coupler, an LNA (low noise amplifier), a duplexer, etc. Furthermore, the communication unit 110 can communicate with a network and other devices via wireless communication. Wireless communication can use any communication standards or protocols, including, but not limited to, GSM (global mobile communication system), GPRS (general packet radio service), CDMA (code split multiple access), WCDMA ( multiple access with broadband code division), LTE (long-term evolution), e-mail, SMS (short message service), etc. Memory 120 can be configured to store software programs and modules. Processor 180 runs a number of functional applications and data processing when running software programs and modules stored in memory 120. Memory 120 may primarily include a program storage area and a data storage area, where the storage area for program can store operating systems, application programs required by at least one function (such as a sound replay function, an image replay function, etc.), etc .; and the data storage area can store data created during an operation of the terminal device 700 (such as audio data, a phonebook, etc.), etc. In addition, memory 120 may include a high speed random access memory and may also include a non-volatile memory. For example, memory 120 may include at least one disk storage device, a flash memory device or other volatile solid state memory devices. Accordingly, memory 120 may also include a memory controller for providing access to memory 120 performed by processor 180 and input unit 130.
[0122] Input unit 130 can be configured to receive input numbers or characters, and generate keyboard, mouse, joystick, optical or trackball input signals related to user regulation and functional control. Input unit 130 can include a touch sensitive surface 131 and another input device 132. Touch sensitive surface 131, also known as a touch screen or trackpad, can collect user touch operations on or near the touch sensitive surface 131 (such as an operation performed by users using any suitable object or accessory, such as a finger, a touch pen and the like on or near the touch sensitive surface 131) and operating a corresponding connected device in accordance with a pre-set program. Optionally, the touch sensitive surface 131 may include two parts of a touch detection device and a touch controller; wherein the touch detection device detects a user's touch position, detects a signal caused by the touch operation, and transmits the signal to the touch controller. The touch controller receives touch information from the touch detection device, transforms it into touch point coordinates, and sends the coordinates to processor 180. The touch controller can also receive a command from the processor 180 and execute the command. In addition, the touch sensitive surface 131 can be made in various types, such as a resistive type, a capacitive type, an infrared type and a surface acoustic wave type, etc. In addition to the touch sensitive surface 131, input unit 130 may also include another input device 132. The other input device 132 may include, but is not limited to one or more of a physical keyboard, functional keys (such as keys volume, switch buttons, etc.), a trackball, a mouse and a joystick.
[0123] Display unit 140 can be configured to display information entered by the user or information provided to the user and various graphical user interfaces of the terminal device 700. These graphical user interfaces can consist of graphical items, texts, icons, videos and any combination of them. Display unit 140 may include display panel 141 and, body portion, display panel 141 may be configured with LCD (liquid crystal display), OLED (organic light emitting diode), etc. In addition, the touch sensitive surface 131 can cover the display panel 141. When a touch operation on or near the touch sensitive surface 131 is detected by the touch sensitive surface 131, the touch operation is sent to processor 180 for if the type of touch event is determined, and a corresponding visual output will be provided to display panel 141 by processor 180, according to the type of touch event. Although in figure 30 the touch sensitive surface 131 and display panel 141 are two separate components for carrying out the input and output functions, in some embodiments, the 131 and display panel 141 can be integrated for carrying out input and output functions.
[0124] Terminal device 700 may further include at least one type of sensor 150, such as a light sensor, a motion sensor and other sensors. The light sensor can include an ambient light sensor and a proximity sensor. The ambient light sensor can adjust the brightness of the display panel 141 according to the brightness of the ambient light. The proximity sensor can turn off display panel 141 and / or the rear light when the terminal device 700 moves closer to the ear. As a type of motion sensor, a gravity acceleration sensor can detect acceleration in each direction (typically on three axes), and can detect the magnitude and direction of gravity when stationary, which can be used in applications for recognizing the attitudes of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), functions related to vibration recognition (such as a pedometer, click), etc. The terminal device 700 can also be equipped with other sensors, such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which will not be described redundantly here.
[0125] The audio circuit 160, a speaker 161 and a microphone 162 can provide an audio interface between the user and the terminal device 700. The audio circuit 160 can transform the received audio data into electrical signals. which are transmitted to speaker 161 and transformed into sound signals to be extracted by speaker 161. On the other hand, microphone 162 transforms the collected sound signals into electrical signals which are received and transformed into audio data through audio circuit 160. After being extracted to processor 180 for processing, audio data is transmitted, for example, to another terminal device via RF circuit 110, or for extraction to memory 120 for further processing . Audio circuit 160 may also include a headphone jack to allow communication between an external headset and terminal device 700.
[0126] In order to achieve wireless communication, the terminal device can be equipped with a wireless communication unit 170, which can be a WiFi module (wireless fidelity). WiFi is a short-range wireless transmission technology. The terminal device 700 allows the user to send and receive e-mails, browse web pages and access streaming media, etc. via the wireless communication unit 170, which provides the user with wireless broadband Internet access. Although figure 15 shows wireless communication unit 170, it should be appreciated that wireless communication unit 170 is not a necessary component of terminal device 700, and can be omitted, as desired, without changing the essential scope of the exhibition.
[0127] Processor 180 is a control center for the terminal device 700 that connects various parts of the entire mobile phone through various interfaces and circuits, performs various functions and data processing of the terminal device 700 by running or executing programs software and / or modules stored in memory 120 and when invoking data stored in memory 120, in order to monitor the mobile phone in general. Optionally, processor 180 may include one or more processing cores. Processor 180 can be integrated with an application processor that primarily processes operating systems, user interfaces and application programs, and a modem processor that primarily processes wireless communication. It should be appreciated that the above modem processor cannot be integrated into processor 180.
[0128] Terminal device 700 may also include a power supply 190 (such as a battery) for power supply for each component. The power supply can be logically connected to the processor 180 through a power supply management system, in order to obtain functions such as loading, unloading and power consumption management, etc. through the power supply management system. The power supply 190 may also include one or more components of a DC or AC power, a recharge system, a power failure detection circuit, a power converter or an inverter, a power status indicator, etc. Although not shown, the terminal device 700 may also include a camera, a Bluetooth module, etc., which are not redundantly described here.
[0129] In the present embodiment, specifically, the terminal device includes a memory and one or more programs stored in memory, and the terminal device is configured to run one or more programs by one or more processors, one or more programs containing instructions to carry out the following operations:
[0130] receipt of an entry unlock instruction;
[0131] determination as to whether a current unlocking user belongs to a first user group pre-set according to the unlocking instruction; and
[0132] acquisition and storage of information on the user unlocking current, if the user unlocking current does not belong to the first pre-regulated user group.
[0133] The memory also contains instructions for performing the following operations: start of an information acquisition device, if the current unlocking user does not belong to the first pre-set user group. The information acquisition device acquires information about the user by unlocking the current one. The information about the current user unlocking includes a face image information, a voice information or a fingerprint information.
[0134] The memory also contains instructions for performing the following operations: after information about the current unlocking user is acquired and stored, if the current unlocking user does not belong to the first preset user group, a determination as to whether the current unlocking user belongs to a second user group pre-set according to the information about the current unlocking user;
[0135] unlocking the screen and entering a restricted user mode, if the current user unlocking belongs to the second pre-set user group; and
[0136] recording a user operation unlocking current in restricted user mode; on what,
[0137] in restricted user mode, the terminal device's system and / or applications only respond to pre-regulated operations which include start, inquisition, modification, addition and / or deletion.
[0138] The memory also contains instructions for performing the following operations: unlocking the terminal, if the user unlocking the current one belongs to the first pre-set user group; and displaying stored information and / or an operation recorded by the user unlocking that does not belong to the first pre-set user group.
[0139] The memory also contains instructions for performing the following operations: after displaying the operation recorded by the user unlocking that does not belong to the first pre-set user group, the extraction of an alert information to alert as to whether it is for undo the operation; and undo the operation after the alert information is confirmed.
[0140] The memory also contains instructions for performing the following operations: after information about the current unlocking user is acquired and stored, if the current unlocking user does not belong to the first pre-set user group, the determination as to whether the current unlocking user belongs to a second pre-set user group according to information about the current unlocking user; and
[0141] the entry in a locked screen status, if the current user unlocking does not belong to the second preset user group.
[0142] The memory also contains instructions for performing the following operations: before the input unlock instruction is received, a determination as to whether to display a screen unlock interface according to an inclined angle between a plane on which a geometric axis of the terminal device is located and a horizontal plane; and displaying the screen unlock interface, if the inclined angle is greater than or equal to a predetermined limit.
[0143] Through the mode of the present exhibition, information about invalid users can be recorded for the owner to check, and the owner will find out who used the native machine when he unlocks the machine the next time. It is convenient for the owner to take the unlock history of the terminal, to advise the owner to exclude potential security risks. For a terminal device with a biological recognition function, it is convenient to make a device for multiple users through this exhibition, and offer a different permission to different users. The owner can find out what operations have been performed by users, and restore with a keystroke to remove the effect of user operations, so that the operator's maintenance charge for the terminal is reduced.
[0144] It should be appreciated by those skilled in the art that the modalities of the present exhibition can be provided as a method, a system or a computer program product. Therefore, the present exhibition can take the form of an entirely hardware modality, an entirely software modality, or a combination of software and hardware modalities. Furthermore, the present exhibition may take the form of a computer program product running on one or more storage media available on a computer (including, but not limited to, disk storage, and optical memory, etc.) containing codes available on a computer.
[0145] The present exhibition is described with reference to the flowchart and / or a block diagram showing the method, the device (system) and a computer product according to the modalities of the present exhibition. It should be appreciated that each process and / or block of the flowchart and / or block diagram and combinations of the processes and / or blocks in the flowchart and / or block diagram can be implemented by computer program instructions. These computer program instructions can be provided for a general purpose computer central processor, a special purpose computer, an embedded processor or other programmable data processing device for the production of a machine, so that a medium is used. produced, which implements the specific functions in one or more flowchart processes and / or one or more blocks in the block diagram through instructions executed by the computer's central processor or other programmable data processing device.
[0146] These computer program instructions can also be loaded onto a computer or other programmable data processing device, making the implementation of a series of steps on the computer or on another programmable device, for the implementation of the processes by the computer, from so that instructions executed on the computer or other programmable data processing device can provide steps that implement the functions specified in one or more flowchart processes and / or one or more blocks in the block diagram.
[0147] Of course, various modifications and variations can be made by those skilled in the art, without departing from the spirit and scope of the present exhibition. Thus, if those modifications and variations for the present exhibition belong to the scope of the claims of the present exhibition and its equivalents, it will be intended to involve those modifications and variations in the present exhibition.
权利要求:
Claims (7)
[0001]
1. Method of unlocking process for a terminal, characterized by the fact that it comprises: the receipt of an entry unlocking instruction; determining whether a current unlocking user belongs to a first user group pre-set according to the unlocking instruction; wherein the first pre-regulated user group comprises a terminal owner; and the acquisition and storage of information about the current unlocking user, if the current unlocking user does not belong to the first pre-regulated user group, after the acquisition and storage of the current unlocking user information, if the current unlocking user does not belong to the first pre-set user group, the unlocking process method still comprises: determining whether the current user unlocking belongs to a second pre-set user group according to the information about the current unlocking user; entering a locked screen status if the current user unlocking does not belong to the second pre-set user group; unlocking a screen and entering a restricted user mode, if the current user unlocking belongs to the second pre-set user group; and recording a user operation by unlocking current in restricted user mode; in which, in restricted user mode, a terminal system and / or applications only respond to pre-regulated operations, which comprise one or more of the beginning, inquisition, modification, addition and / or deletion; the unlocking of the terminal, if the current unlocking user belongs to the first pre-set user group; the display of stored information about and / or a recorded user operation unlocking that does not belong to the first pre-set user group; the extraction of an alert information to alert if it is to undo the operation; and undo the operation after the alert information is confirmed, in which the acquisition of information about the current unlocking user if the current unlocking user does not belong to the first pre-regulated user group comprises: starting an information acquisition device, if the current unlocking user does not belong to the first pre-set user group; and acquire, through the information acquisition device, the information about the current user unlocking; wherein the information about the current user unlocking comprises a face image information, a voice information or a fingerprint information of the current user unlocking.
[0002]
2. Unlocking process method according to claim 1, characterized in that, before receiving an input unlocking instruction, the unlocking process method still comprises: determining how to display an unlocking interface screen according to an inclined angle between a plane on which a geometric axis of the terminal is located and a horizontal plane; and the display of the screen unlock interface if the inclined angle is greater than or equal to a pre-set limit.
[0003]
3. Unlocking process method according to claim 1, characterized in that the unlocking instruction is based on character password information, pattern information, face image information, voice information or a fingerprint information.
[0004]
4. Unlocking process apparatus for a terminal, characterized by the fact that it comprises: a receiving module, configured to receive an input unlocking instruction; a determination module, configured for determining whether a current unlocking user belongs to a first pre-set user group according to the unlock instruction, where the first pre-set user group comprises a terminal owner; and an information acquisition process module, configured for the acquisition and storage of information about the current unlocking user, if the current unlocking user does not belong to the first pre-regulated user group, the unlocking process device still comprises : a second determination module, configured to determine whether the current unlocking user belongs to a second pre-set user group according to the information about the current unlocking user; a screen locking process module, configured to enter a locked screen status, if the current unlocking user does not belong to the second group; a second unlocking module, configured for unlocking a screen and entering a restricted user mode, if the current unlocking user belongs to the second preset user group; and a recording process module, configured to record a user's operation by unlocking the current in restricted user mode; in which, in restricted user mode, a terminal system and / or applications only respond to pre-regulated operations which comprise start, inquisition, modification, addition and / or deletion, the unlocking process device still comprises: a first unlocking process module, configured for unlocking the terminal, if the current unlocking user belongs to the pre-set user group; and a display process module, configured to display the stored information about and / or a recorded user operation unlocking that does not belong to the first pre-set user group, the unlocking process device still comprises: an extraction module information, configured to extract an alert information to alert if it is to undo the operation; and an undo process module, configured to undo the operation after the alert information is confirmed, an information acquisition device and a device start module; wherein, the device start module is configured to start the information acquisition device, if the current unlocking user does not belong to the first pre-set user group; and the information acquisition device is configured to acquire information about the current unlocking user, wherein the information about the current unlocking user comprises a face image information, a voice information or a current user unlocking fingerprint information .
[0005]
5. Unlocking process apparatus, according to claim 4, characterized in that the unlocking process apparatus still comprises: a third determination module, configured for determining the display of a screen unlocking interface according to with an inclined angle between a plane on which a geometric axis of the terminal is located and a horizontal plane; and an interface process module, configured to display the screen unlock interface, if the inclined angle is greater than or equal to a pre-set limit.
[0006]
6. Unlocking process apparatus according to claim 4, characterized in that the unlocking instruction is based on character password information, pattern information, face image information, voice information or a fingerprint information.
[0007]
7. Terminal device characterized by the fact that the terminal device comprises a memory and one or more programs stored in memory, in which the terminal device is configured to run one or more programs by one or more processors, one or more programs containing instructions for executing the unlocking process operations below: receiving an incoming unlocking instruction; determination as to whether a current user unlocking belongs to a first pre-regulated user group according to the unlocking instruction, where the first pre-regulated user group comprises a terminal owner; and acquisition and storage of information about the current unlocking user, if the current unlocking user does not belong to the first pre-regulated user group; the unlocking process also includes: determining whether the current unlocking user belongs to a second group of users pre-set according to the information about the current unlocking user; entering a locked screen status, if the current user unlocking does not belong to the second pre-set user group; unlocking a screen and entering a restricted user mode, if the current user unlocking belongs to the second pre-set user group; and recording a user operation by unlocking current in restricted user mode; in which, in restricted user mode, a terminal system and / or applications only respond to pre-regulated operations, which comprise one or more of the beginning, inquisition, modification, addition and / or deletion; the unlocking of the terminal, if the current unlocking user belongs to the first pre-set user group; the display of stored information about and / or a recorded user operation unlocking that does not belong to the first pre-set user group; the extraction of an alert information to alert if it is to undo the operation; and undo the operation after the alert information is confirmed, in which the acquisition of information about the current unlocking user if the current unlocking user does not belong to the first pre-regulated user group comprises: starting an information acquisition device, if the current unlocking user does not belong to the first pre-set user group; and acquire, through the information acquisition device, the information about the current user unlocking; wherein the information about the current user unlocking comprises a face image information, a voice information or a fingerprint information of the current user unlocking.
类似技术:
公开号 | 公开日 | 专利标题
BR112014017739B1|2020-12-15|METHOD, APPLIANCE AND UNLOCK PROCESS DEVICE FOR A TERMINAL
US9509828B2|2016-11-29|Method of providing notification and electronic device thereof
EP3340009A1|2018-06-27|Electronic device and heat control method based on temperature of battery in electronic device
US9940448B2|2018-04-10|Unlock processing method and device
US10242167B2|2019-03-26|Method for user authentication and electronic device implementing the same
US9774599B2|2017-09-26|Authenticating method and apparatus using electronic device
KR102247343B1|2021-05-03|Electronic apparatus and method for network temporary unlock
CN106778175B|2020-07-07|Interface locking method and device and terminal equipment
US10769258B2|2020-09-08|Electronic device for performing authentication using multiple authentication means and method for operating the same
US9870490B2|2018-01-16|Apparatus and method for an antitheft secure operating system module
US9848072B2|2017-12-19|Electronic device monitoring method and apparatus
US11030288B2|2021-06-08|Electronic device for authenticating using biometric information and method of operating electronic device
CN108702414B|2021-04-09|Screen locking method and device and computer readable storage medium
KR20170014407A|2017-02-08|Apparatus and method for controlling a security of electronic device
KR20170081500A|2017-07-12|Electronic Device and Operating Method Thereof
KR20180046149A|2018-05-08|Electronic apparatus and method for performing authentication
KR102316278B1|2021-10-22|Electronic device and method for controlling fingerprint information
US20190340343A1|2019-11-07|Application interface display method, apparatus, and terminal, and storage medium
US20170078269A1|2017-03-16|Method for managing application and electronic device supporting the same
KR20170054072A|2017-05-17|Electronic Apparatus and Operation Method for Detecting of Accessory Device Thereof
US20210311752A1|2021-10-07|Electronic apparatus and operating method thereof
US20190220290A1|2019-07-18|Method for Managing Application Program Use Time Offline, And Terminal Device
KR20170098112A|2017-08-29|Electronic apparatus and operating method thereof
KR20170041473A|2017-04-17|Method and electronic device for controlling power supply
CN113157368A|2021-07-23|Screen locking method and device
同族专利:
公开号 | 公开日
EP2854071A2|2015-04-01|
RU2618932C2|2017-05-11|
CN103488924B|2017-03-08|
MX348966B|2017-07-04|
CN103488924A|2014-01-01|
JP2015534405A|2015-11-26|
EP2854071A3|2015-07-01|
RU2015125464A|2017-01-10|
MX2014008738A|2015-05-28|
JP6060267B2|2017-01-11|
WO2015043193A1|2015-04-02|
EP2854071B1|2018-02-28|
KR20150046766A|2015-04-30|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

JP3654240B2|2001-11-30|2005-06-02|日本電気株式会社|Wireless portable terminal device and security check method in wireless portable terminal device|
US7774742B2|2003-11-04|2010-08-10|Realization Technologies, Inc.|Facilitation of multi-project management using task hierarchy|
JP2005229151A|2004-02-10|2005-08-25|Murata Mach Ltd|Communication terminal apparatus|
US20050272410A1|2004-06-03|2005-12-08|Inventec Corporation|Monitoring system for use status of computer apparatus|
JP2006060685A|2004-08-23|2006-03-02|Yasutomo Karasawa|Portable information terminal, method and program for controlling the portable information terminal, and recording medium|
US7724926B2|2004-09-15|2010-05-25|Iannone Mary A|Foster care monitoring and verification device, method and system|
AT393424T|2004-10-06|2008-05-15|Nokia Corp|ACCESS CONTROL FOR COMMUNICATION TERMINAL|
JP4284309B2|2005-08-31|2009-06-24|ソフトバンクモバイル株式会社|Emergency operation execution method and electronic device|
JP2007195063A|2006-01-20|2007-08-02|Sharp Corp|Portable terminal device|
JP2007299236A|2006-04-28|2007-11-15|Toshiba Corp|Information processor and authentication method|
US8063889B2|2007-04-25|2011-11-22|Honeywell International Inc.|Biometric data collection system|
JP2009129419A|2007-11-28|2009-06-11|Kyocera Corp|Electronic equipment and authentication method|
JP2010086281A|2008-09-30|2010-04-15|Toshiba Corp|Portable terminal|
US8406736B2|2008-12-30|2013-03-26|Symbol Technologies, Inc.|System and method for identifying and locating wireless devices that are being operated by unauthorized users|
JP5606705B2|2009-08-27|2014-10-15|京セラ株式会社|Mobile terminal device|
CN101794188A|2009-12-17|2010-08-04|宇龙计算机通信科技有限公司|Screen locking/ unlocking control method, system and mobile terminal|
CN102075627A|2011-01-12|2011-05-25|宇龙计算机通信科技有限公司|Information prompting method and mobile terminal|
CN102457619A|2011-12-30|2012-05-16|广东欧珀移动通信有限公司|Method for setting permission password for mobile phone|
EP2821881B1|2012-03-02|2018-08-22|NEC Corporation|Device capable of startup ui presentation, method of said presentation and non-temporary computer-readable medium storing presentation program|
US20140007223A1|2012-06-29|2014-01-02|Apple Inc.|Biometric Capture for Unauthorized User Identification|
CN102932540B|2012-10-24|2014-05-14|广东欧珀移动通信有限公司|Mobile terminal and stealing prevention method thereof|
CN103051799A|2012-12-24|2013-04-17|联信摩贝软件(北京)有限公司|Unlock password error trigger-based photographing method and device|
CN103108082B|2013-01-24|2014-06-04|北京航空航天大学|Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system|
CN103488924B|2013-09-26|2017-03-08|小米科技有限责任公司|A kind of unlocking processing method of terminal, device and equipment|CN103488924B|2013-09-26|2017-03-08|小米科技有限责任公司|A kind of unlocking processing method of terminal, device and equipment|
US9940448B2|2013-09-26|2018-04-10|Xiaomi Inc.|Unlock processing method and device|
CN104809372B|2014-01-24|2018-10-16|北京奇虎科技有限公司|Judge the device and method of head-wearing type intelligent device authentication effectiveness of information|
WO2015131352A1|2014-03-05|2015-09-11|华为终端有限公司|Method for starting electronic device, and electronic device|
CN103823632B|2014-03-18|2018-02-13|福州瑞芯微电子股份有限公司|A kind of unlocking screen method and its terminal|
CN104980532A|2014-04-10|2015-10-14|金刚刚|Student watch phone|
CN104023133B|2014-05-23|2017-05-24|北京金山安全软件有限公司|Antitheft method of mobile terminal and device thereof|
CN104063248B|2014-06-27|2018-01-16|上海摩软通讯技术有限公司|The startup method of intelligent watch and its application program|
CN105450841A|2014-09-25|2016-03-30|小米科技有限责任公司|Method and device of terminal guard against theft|
CN104331651A|2014-10-08|2015-02-04|无锡指网生物识别科技有限公司|Fingerprint- and voice recognition-based control system and equipment|
CN104573479B|2014-12-18|2018-07-06|百度在线网络技术(北京)有限公司|A kind of use control method and device of user equipment|
CN105808115A|2014-12-31|2016-07-27|中兴通讯股份有限公司|Control method and system of terminal, and terminal|
CN113792277A|2015-02-15|2021-12-14|华为技术有限公司|Method and device for displaying application and picture and electronic equipment|
CN104751218B|2015-04-13|2018-01-23|京东方科技集团股份有限公司|A kind of electronic certificate and its display methods|
CN106156559A|2015-04-22|2016-11-23|中兴通讯股份有限公司|A kind of terminal unlocking method and device|
CN104765552B|2015-04-28|2019-04-19|小米科技有限责任公司|Right management method and device|
EP3185163B1|2015-06-30|2019-10-02|Huawei Technologies Co., Ltd.|Method and terminal for unlocking screen with fingerprint|
CN105095716A|2015-07-01|2015-11-25|小米科技有限责任公司|Method and device for terminal detection|
CN105138880B|2015-07-31|2018-08-14|努比亚技术有限公司|The processing unit and method of terminal operation data|
CN106469260A|2015-08-20|2017-03-01|中兴通讯股份有限公司|A kind of method and device accessing mobile terminal|
CN105205383A|2015-08-25|2015-12-30|努比亚技术有限公司|Screen unlocking device and method|
CN105045083B|2015-08-26|2017-09-19|广东欧珀移动通信有限公司|The control method and intelligent watch of a kind of intelligent watch|
CN105279402B|2015-09-25|2019-03-15|Oppo广东移动通信有限公司|A kind of unlocking method and mobile terminal based on placed angle|
CN105404803B|2015-10-30|2018-12-11|北京视觉世界科技有限公司|Operation responding device and operation response method for terminal device|
CN105353657B|2015-11-09|2018-01-23|珠海格力电器股份有限公司|Dispense cabinet and its control method|
CN105574378A|2015-12-09|2016-05-11|小米科技有限责任公司|Terminal control method and terminal control device|
CN105631250A|2015-12-18|2016-06-01|北京奇虎科技有限公司|Method and device for obtaining image information of users illegally accessing to application programs|
CN106909295B|2015-12-23|2020-05-15|北京奇虎科技有限公司|Application processing method and terminal|
CN106127077B|2016-06-30|2019-04-23|成都中科创达软件有限公司|A kind of method and terminal for protecting user privacy information|
CN106303017A|2016-08-11|2017-01-04|北京小米移动软件有限公司|Alarm processing method and device|
CN106407779A|2016-09-05|2017-02-15|广东欧珀移动通信有限公司|Information acquisition method and apparatus, and terminal|
CN106506812A|2016-10-13|2017-03-15|深圳缪斯智能珠宝有限公司|A kind of method of unblock mobile terminal and mobile terminal|
CN106682524A|2016-11-23|2017-05-17|张伟彬|Data privacy protection method of mobile terminal|
CN106940620A|2017-03-22|2017-07-11|广东小天才科技有限公司|Control the method and mobile terminal of mobile terminal|
CN107483723A|2017-07-31|2017-12-15|广东欧珀移动通信有限公司|Mobile terminal and its operation process recording method, computer-readable recording medium|
CN109501718B|2017-09-15|2020-12-25|比亚迪股份有限公司|Vehicle unlocking control method, device and system and intelligent terminal|
CN109841140B|2017-11-28|2021-04-27|合肥欣奕华智能机器有限公司|Demonstrator, operation method thereof, computing device and computer readable medium|
TWI652597B|2017-12-05|2019-03-01|緯創資通股份有限公司|Electronic device and unlocking method thereof|
CN108154014B|2017-12-22|2020-06-02|Oppo广东移动通信有限公司|Electronic equipment unlocking method and device, storage medium and electronic equipment|
CN108052818B|2017-12-28|2020-11-13|Oppo广东移动通信有限公司|Application starting method and device, storage medium and electronic equipment|
CN108540654A|2018-03-22|2018-09-14|维沃移动通信有限公司|A kind of operating method and mobile terminal of mobile terminal|
CN110164012A|2019-05-31|2019-08-23|广州软盈科技有限公司|A kind of community's access control system and working method thereof|
法律状态:
2018-11-13| B06F| Objections, documents and/or translations needed after an examination request according art. 34 industrial property law|
2020-03-03| B06V| Preliminary requirement: requests without searches performed by other patent offices: suspension of the patent application procedure|
2020-10-20| B09A| Decision: intention to grant|
2020-12-15| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 09/05/2014, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
申请号 | 申请日 | 专利标题
CN201310446823.2|2013-09-26|
CN201310446823.2A|CN103488924B|2013-09-26|2013-09-26|A kind of unlocking processing method of terminal, device and equipment|
PCT/CN2014/077106|WO2015043193A1|2013-09-26|2014-05-09|Unlocking processing method, apparatus and device for terminal|
[返回顶部]