CN104915582A - Unlocking method and unlocking device - Google Patents

Unlocking method and unlocking device Download PDF

Info

Publication number
CN104915582A
CN104915582A CN201510283777.8A CN201510283777A CN104915582A CN 104915582 A CN104915582 A CN 104915582A CN 201510283777 A CN201510283777 A CN 201510283777A CN 104915582 A CN104915582 A CN 104915582A
Authority
CN
China
Prior art keywords
certificate parameter
mobile terminal
lock
verified
enter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510283777.8A
Other languages
Chinese (zh)
Other versions
CN104915582B (en
Inventor
申世安
沈闯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201510283777.8A priority Critical patent/CN104915582B/en
Publication of CN104915582A publication Critical patent/CN104915582A/en
Application granted granted Critical
Publication of CN104915582B publication Critical patent/CN104915582B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an unlocking method. The unlocking method comprises the following steps: when a mobile terminal is in a locked state and an unlocking request is detected, acquiring at least one verification parameter carried by the unlocking request; performing verification operation on the acquired at least one verification parameter; and when the verification on the at least one verification parameter is successful, exiting from a locked state and operating in a preset permission mode. The invention further discloses an unlocking device. By virtue of the unlocking method and the unlocking terminal, the mobile terminal is capable of improving the privacy on the premise of meeting the safety.

Description

Unlock method and device
Technical field
The present invention relates to intelligent terminal technical field, particularly relate to unlock method and device.
Background technology
Along with the develop rapidly of intelligent terminal technology, the popularization degree of the mobile terminals such as mobile phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP (portable media player) and guider is more and more higher.At present, in order to ensure the security of mobile terminal, mobile terminal is lock-screen and/or keyboard when non-operating state usually.User needs to carry out unlocking operation by predetermined manner, after making mobile terminal exit lock-out state, normally could use mobile terminal.For mobile phone, well-known, when mobile phone does not receive user operation within a certain period of time, the lock-out state such as screen locking and/or keyboard can be switched to, after only having user to adopt default unlocking manner to remove the locking of mobile phone, normally can use mobile phone, to reach the object promoting security and prevent maloperation.But, when mobile phone is in released state, any all functions that can use mobile phone per capita, and check the user data etc. that mobile phone stores, cause privacy of user to be revealed.In prior art, there is the problem that security of mobile terminal and privacy can not be taken into account.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of unlock method and device, is intended to make mobile terminal under the prerequisite meeting security, improves privacy.
For achieving the above object, the invention provides a kind of unlock method, this unlock method comprises:
Be in the lock state at mobile terminal, and when detecting unlocking request, obtain at least one certificate parameter that described unlocking request is carried;
Verification operation is carried out at least one certificate parameter described in acquisition;
When at least one certificate parameter described is verified, exits lock-out state and enter default access mode operation.
Preferably, described to after described in acquisition, at least one certificate parameter carries out the step of verification operation, described unlock method, also comprises:
When at least one certificate parameter authentication failed described, position prompting operation.
Preferably, described when at least one certificate parameter authentication failed described, position prompting operation and comprise:
When at least one certificate parameter authentication failed described, obtain the positional information of current present position;
The positional information of acquisition is sent to default communication terminal.
Preferably, described certificate parameter comprises the first certificate parameter and the second certificate parameter, described when at least one certificate parameter described is verified, and exits lock-out state and enter default access mode operation to comprise:
When described first certificate parameter and described second certificate parameter are all verified, exit lock-out state and enter the first permission mode and run;
Be verified in described first certificate parameter, and during described second certificate parameter authentication failed, exit lock-out state and enter the second permission mode and run;
In described first certificate parameter authentication failed, and when described second certificate parameter is verified, exit lock-out state and enter the 3rd permission mode and run.
Preferably, described when at least one certificate parameter described is verified, exit lock-out state and after entering the step of default access mode operation, described unlock method, also comprises:
When not detecting user operation in preset time period, enter lock-out state.
In addition, for achieving the above object, the present invention also provides a kind of tripper, and this tripper comprises:
Acquisition module, for being in the lock state when its place mobile terminal, and when detecting unlocking request, obtains at least one certificate parameter that described unlocking request is carried;
Authentication module, carries out verification operation at least one certificate parameter described in obtaining described acquisition module;
Control module, for when at least one certificate parameter described is verified, controls its place mobile terminal and exits lock-out state and enter default access mode operation.
Preferably, described tripper also comprises locating module, for when at least one certificate parameter authentication failed described, positions prompting operation.
Preferably, described locating module comprises:
Positioning unit, for when at least one certificate parameter authentication failed described, obtains the positional information of its current present position of place mobile terminal;
Transmitting element, the positional information for being obtained by positioning unit is sent to default communication terminal.
Preferably, described certificate parameter comprises the first certificate parameter and the second certificate parameter, described control module also for,
When described first certificate parameter and described second certificate parameter are all verified, control its place mobile terminal and exit lock-out state and enter the first permission mode operation;
Be verified in described first certificate parameter, and during described second certificate parameter authentication failed, control its place mobile terminal and exit lock-out state and enter the second permission mode operation;
In described first certificate parameter authentication failed, and when described second certificate parameter is verified, control its place mobile terminal and exit lock-out state and enter the 3rd permission mode operation.
Preferably, described control module also for, when its place running of mobile terminal is in described default access pattern, and when not detecting user operation in preset time period, control its place mobile terminal and enter lock-out state.
The present invention by being in the lock state at mobile terminal, and when detecting unlocking request, obtains at least one certificate parameter that described unlocking request is carried; Verification operation is carried out at least one certificate parameter described in acquisition; When at least one certificate parameter described is verified, exits lock-out state and enter default access mode operation.Compared to prior art, the present invention by mobile terminal unblock while, automatically default access mode operation is entered, wherein, described mobile terminal when with default access mode operation, the local user data etc. that the operable application program of limited subscriber, the operable systemic-function of limited subscriber and limited subscriber can be accessed.Thus the present invention can make mobile terminal under the prerequisite meeting security, promote privacy.
Accompanying drawing explanation
Fig. 1 is the hardware configuration schematic diagram of the mobile terminal realizing each embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the schematic flow sheet of unlock method first embodiment of the present invention;
Fig. 4 is the schematic flow sheet of unlock method second embodiment of the present invention;
Fig. 5 is the refinement schematic flow sheet of S40 in Fig. 4;
Fig. 6 is the schematic flow sheet of unlock method of the present invention 4th embodiment;
Fig. 7 is the high-level schematic functional block diagram of tripper first embodiment of the present invention;
Fig. 8 is the high-level schematic functional block diagram of tripper second embodiment of the present invention;
Fig. 9 is the refinement high-level schematic functional block diagram of locating module in Fig. 8.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use the suffix of such as " module ", " parts " or " unit " for representing element only in order to be conducive to explanation of the present invention, itself is specific meaning not.Therefore, " module " and " parts " can mixedly use.
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can comprise the such as mobile terminal of mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP (portable media player), guider etc. and the fixed terminal of such as digital TV, desk-top computer etc.Below, suppose that terminal is mobile terminal.But it will be appreciated by those skilled in the art that except the element except being used in particular for mobile object, structure according to the embodiment of the present invention also can be applied to the terminal of fixed type.
Fig. 1 is the hardware configuration signal of the mobile terminal realizing each embodiment of the present invention.
Mobile terminal 100 can comprise wireless communication unit 110, A/V (audio/video) input block 120, user input unit 130, sensing cell 140, output unit 150, storer 160, interface unit 170, controller 180 and power supply unit 190 etc.Fig. 1 shows the mobile terminal with various assembly, it should be understood that, does not require to implement all assemblies illustrated.Can alternatively implement more or less assembly.Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows the wireless communication between mobile terminal 100 and wireless communication system or network.Such as, wireless communication unit can comprise at least one in broadcast reception module 111, mobile communication module 112, wireless Internet module 113, short range communication module 114 and positional information module 115.
Broadcast reception module 111 via broadcast channel from external broadcasting management server receiving broadcast signal and/or broadcast related information.Broadcast channel can comprise satellite channel and/or terrestrial channel.Broadcast management server can be generate and send the server of broadcast singal and/or broadcast related information or the broadcast singal generated before receiving and/or broadcast related information and send it to the server of terminal.Broadcast singal can comprise TV broadcast singal, radio signals, data broadcasting signal etc.And broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast related information also can provide via mobile communications network, and in this case, broadcast related information can be received by mobile communication module 112.Broadcast singal can exist in a variety of manners, such as, it can exist with the form of the electronic service guidebooks (ESG) of the electronic program guides of DMB (DMB) (EPG), digital video broadcast-handheld (DVB-H) etc.Broadcast reception module 111 can by using the broadcast of various types of broadcast system Received signal strength.Especially, broadcast reception module 111 can by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video broadcasting-hand-held (DVB-H), forward link media (MediaFLO @) Radio Data System, received terrestrial digital broadcasting integrated service (ISDB-T) etc. digit broadcasting system receive digital broadcasting.Broadcast reception module 111 can be constructed to be applicable to providing the various broadcast system of broadcast singal and above-mentioned digit broadcasting system.The broadcast singal received via broadcast reception module 111 and/or broadcast related information can be stored in storer 160 (or storage medium of other type).
Radio signal is sent at least one in base station (such as, access point, Node B etc.), exterior terminal and server and/or receives radio signals from it by mobile communication module 112.Various types of data that such radio signal can comprise voice call signal, video calling signal or send according to text and/or Multimedia Message and/or receive.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be inner or be externally couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can comprise WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave access), HSDPA (high-speed downlink packet access) etc.
Short range communication module 114 is the modules for supporting junction service.Some examples of short-range communication technology comprise bluetooth tM, radio-frequency (RF) identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee tMetc..
Positional information module 115 is the modules of positional information for checking or obtain mobile terminal.The typical case of positional information module is GPS (GPS).According to current technology, GPS module 115 calculates from the range information of three or more satellite and correct time information and for the Information application triangulation calculated, thus calculates three-dimensional current location information according to longitude, latitude and pin-point accuracy.Current, the method for calculating position and temporal information uses three satellites and by using the error of the position that goes out of an other satellite correction calculation and temporal information.In addition, GPS module 115 can carry out computing velocity information by Continuous plus current location information in real time.
A/V input block 120 is for audio reception or vision signal.A/V input block 120 can comprise camera 121 and microphone 1220, and the view data of camera 121 to the static images obtained by image capture apparatus in Video Capture pattern or image capture mode or video processes.Picture frame after process may be displayed on display unit 151.Picture frame after camera 121 processes can be stored in storer 160 (or other storage medium) or via wireless communication unit 110 and send, and can provide two or more cameras 1210 according to the structure of mobile terminal.Such acoustic processing can via microphones sound (voice data) in telephone calling model, logging mode, speech recognition mode etc. operational mode, and can be voice data by microphone 122.Audio frequency (voice) data after process can be converted to the formatted output that can be sent to mobile communication base station via mobile communication module 112 when telephone calling model.Microphone 122 can be implemented various types of noise and eliminate (or suppress) algorithm and receiving and sending to eliminate (or suppression) noise or interference that produce in the process of sound signal.
User input unit 130 can generate key input data to control the various operations of mobile terminal according to the order of user's input.User input unit 130 allows user to input various types of information, and keyboard, the young sheet of pot, touch pad (such as, detecting the touch-sensitive assembly of the change of the resistance, pressure, electric capacity etc. that cause owing to being touched), roller, rocking bar etc. can be comprised.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch-screen can be formed.
Sensing cell 140 detects the current state of mobile terminal 100, (such as, mobile terminal 100 open or close state), the position of mobile terminal 100, user for mobile terminal 100 contact (namely, touch input) presence or absence, the orientation of mobile terminal 100, the acceleration or deceleration of mobile terminal 100 move and direction etc., and generate order or the signal of the operation for controlling mobile terminal 100.Such as, when mobile terminal 100 is embodied as sliding-type mobile phone, sensing cell 140 can sense this sliding-type phone and open or close.In addition, whether whether sensing cell 140 can detect power supply unit 190 provides electric power or interface unit 170 to couple with external device (ED).Sensing cell 140 can comprise proximity transducer 1410 and will be described this in conjunction with touch-screen below.
Interface unit 170 is used as at least one external device (ED) and is connected the interface that can pass through with mobile terminal 100.Such as, external device (ED) can comprise wired or wireless head-band earphone port, external power source (or battery charger) port, wired or wireless FPDP, memory card port, for connecting the port, audio frequency I/O (I/O) port, video i/o port, ear port etc. of the device with identification module.Identification module can be that storage uses the various information of mobile terminal 100 for authentication of users and can comprise subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) etc.In addition, the device (hereinafter referred to " recognition device ") with identification module can take the form of smart card, and therefore, recognition device can be connected with mobile terminal 100 via port or other coupling arrangement.Interface unit 170 may be used for receive from external device (ED) input (such as, data message, electric power etc.) and the input received be transferred to the one or more element in mobile terminal 100 or may be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connected with external base, interface unit 170 can be used as to allow by it electric power to be provided to the path of mobile terminal 100 from base or can be used as the path that allows to be transferred to mobile terminal by it from the various command signals of base input.The various command signal inputted from base or electric power can be used as and identify whether mobile terminal is arranged on the signal base exactly.Output unit 150 is constructed to provide output signal (such as, sound signal, vision signal, alarm signal, vibration signal etc.) with vision, audio frequency and/or tactile manner.Output unit 150 can comprise display unit 151, dio Output Modules 152, alarm unit 153 etc.
Display unit 151 may be displayed on the information of process in mobile terminal 100.Such as, when mobile terminal 100 is in telephone calling model, display unit 151 can show with call or other communicate (such as, text messaging, multimedia file are downloaded etc.) be correlated with user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern or image capture mode, display unit 151 can the image of display capture and/or the image of reception, UI or GUI that video or image and correlation function are shown etc.
Meanwhile, when display unit 151 and touch pad as a layer superposed on one another to form touch-screen time, display unit 151 can be used as input media and output unit.Display unit 151 can comprise at least one in liquid crystal display (LCD), thin film transistor (TFT) LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc.Some in these displays can be constructed to transparence and watch from outside to allow user, and this can be called transparent display, and typical transparent display can be such as TOLED (transparent organic light emitting diode) display etc.According to the specific embodiment wanted, mobile terminal 100 can comprise two or more display units (or other display device), such as, mobile terminal can comprise outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used for detecting touch input pressure and touch input position and touch and inputs area.
When dio Output Modules 152 can be under the isotypes such as call signal receiving mode, call mode, logging mode, speech recognition mode, broadcast reception mode at mobile terminal, voice data convert audio signals that is that wireless communication unit 110 is received or that store in storer 160 and exporting as sound.And dio Output Modules 152 can provide the audio frequency relevant to the specific function that mobile terminal 100 performs to export (such as, call signal receives sound, message sink sound etc.).Dio Output Modules 152 can comprise loudspeaker, hummer etc.
Alarm unit 153 can provide and export that event informed to mobile terminal 100.Typical event can comprise calling reception, message sink, key signals input, touch input etc.Except audio or video exports, alarm unit 153 can provide in a different manner and export with the generation of notification event.Such as, alarm unit 153 can provide output with the form of vibration, when receive calling, message or some other enter communication (incomingcommunication) time, alarm unit 153 can provide sense of touch to export (that is, vibrating) to notify to user.By providing such sense of touch to export, even if when the mobile phone of user is in the pocket of user, user also can identify the generation of various event.Alarm unit 153 also can provide the output of the generation of notification event via display unit 151 or dio Output Modules 152.
Storer 160 software program that can store process and the control operation performed by controller 180 etc., or temporarily can store oneself through exporting the data (such as, telephone directory, message, still image, video etc.) that maybe will export.And, storer 160 can store about when touch be applied to touch-screen time the vibration of various modes that exports and the data of sound signal.
Storer 160 can comprise the storage medium of at least one type, described storage medium comprises flash memory, hard disk, multimedia card, card-type storer (such as, SD or DX storer etc.), random access storage device (RAM), static random-access memory (SRAM), ROM (read-only memory) (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc.And mobile terminal 100 can be connected the memory function of execute store 160 network storage device with by network cooperates.
Controller 180 controls the overall operation of mobile terminal usually.Such as, controller 180 performs the control relevant to voice call, data communication, video calling etc. and process.In addition, controller 180 can comprise the multi-media module 1810 for reproducing (or playback) multi-medium data, and multi-media module 1810 can be configured in controller 180, or can be configured to be separated with controller 180.Controller 180 can pattern recognition process, is identified as character or image so that input is drawn in the handwriting input performed on the touchscreen or picture.
Power supply unit 190 receives external power or internal power and provides each element of operation and the suitable electric power needed for assembly under the control of controller 180.
Various embodiment described herein can to use such as computer software, the computer-readable medium of hardware or its any combination implements.For hardware implementation, embodiment described herein can by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), processor, controller, microcontroller, microprocessor, being designed at least one performed in the electronic unit of function described herein and implementing, in some cases, such embodiment can be implemented in controller 180.For implement software, the embodiment of such as process or function can be implemented with allowing the independent software module performing at least one function or operation.Software code can be implemented by the software application (or program) write with any suitable programming language, and software code can be stored in storer 160 and to be performed by controller 180.
So far, oneself is through the mobile terminal according to its functional description.Below, for the sake of brevity, by the slide type mobile terminal that describes in various types of mobile terminals of such as folded form, board-type, oscillating-type, slide type mobile terminal etc. exemplarily.Therefore, the present invention can be applied to the mobile terminal of any type, and is not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 can be constructed to utilize and send the such as wired and wireless communication system of data via frame or grouping and satellite-based communication system operates.
Describe wherein according to the communication system that mobile terminal of the present invention can operate referring now to Fig. 2.
Such communication system can use different air interfaces and/or Physical layer.Such as, the air interface used by communication system comprises such as frequency division multiple access (FDMA), time division multiple access (TDMA) (TDMA), CDMA (CDMA) and universal mobile telecommunications system (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc.As non-limiting example, description below relates to cdma communication system, but such instruction is equally applicable to the system of other type.
With reference to figure 2, cdma wireless communication system can comprise multiple mobile terminal 100, multiple base station (BS) 270, base station controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is constructed to form interface with Public Switched Telephony Network (PSTN) 290.MSC280 is also constructed to form interface with the BSC275 that can be couple to base station 270 via back haul link.Back haul link can construct according to any one in some interfaces that oneself knows, described interface comprises such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.Will be appreciated that system as shown in Figure 2 can comprise multiple BSC2750.
Each BS270 can serve one or more subregion (or region), by multidirectional antenna or point to specific direction each subregion of antenna cover radially away from BS270.Or each subregion can by two or more antenna covers for diversity reception.Each BS270 can be constructed to support multiple parallel compensate, and each parallel compensate has specific frequency spectrum (such as, 1.25MHz, 5MHz etc.).
Subregion can be called as CDMA Channel with intersecting of parallel compensate.BS270 also can be called as base station transceiver subsystem (BTS) or other equivalent terms.Under these circumstances, term " base station " may be used for broadly representing single BSC275 and at least one BS270.Base station also can be called as " cellular station ".Or each subregion of particular B S270 can be called as multiple cellular station.
As shown in Figure 2, broadcast singal is sent to the mobile terminal 100 at operate within systems by broadcsting transmitter (BT) 295.Broadcast reception module 111 as shown in Figure 1 is arranged on mobile terminal 100 and sentences the broadcast singal receiving and sent by BT295.In fig. 2, several GPS (GPS) satellite 300 is shown.Satellite 300 helps at least one in the multiple mobile terminal 100 in location.
In fig. 2, depict multiple satellite 300, but understand, the satellite of any number can be utilized to obtain useful locating information.GPS module 115 as shown in Figure 1 is constructed to coordinate to obtain the locating information wanted with satellite 300 usually.Substitute GPS tracking technique or outside GPS tracking technique, can use can other technology of position of tracking mobile terminal.In addition, at least one gps satellite 300 optionally or extraly can process satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link signal from various mobile terminal 100.Mobile terminal 100 participates in call usually, information receiving and transmitting communicates with other type.Each reverse link signal that certain base station 270 receives is processed by particular B S270.The data obtained are forwarded to relevant BSC275.BSC provides call Resourse Distribute and comprises the mobile management function of coordination of the soft switching process between BS270.The data received also are routed to MSC280 by BSC275, and it is provided for the extra route service forming interface with PSTN290.Similarly, PSTN290 and MSC280 forms interface, and MSC and BSC275 forms interface, and BSC275 correspondingly control BS270 so that forward link signals is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each embodiment of unlock method of the present invention is proposed.
With reference to Fig. 3, in the first embodiment of unlock method of the present invention, described unlock method comprises the following steps:
S10, is in the lock state at mobile terminal, and when detecting unlocking request, obtains at least one certificate parameter that described unlocking request is carried;
The unlock method that the embodiment of the present invention provides is mainly used in the mobile terminals such as mobile phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP (portable media player), guider, be intended to make mobile terminal under the prerequisite meeting security, can privacy be improved.
It should be noted that, mobile terminal is being in the lock state, and when detecting user operation, automatically triggers unlocking request, and described unlocking request carries user's operation information.Such as, mobile terminal is when detecting the finger print data of the fingerprint sensor input that user is arranged based on it, and trigger unlocking request, described unlocking request carries the finger print data of user's input; Or mobile terminal is when detecting user and carrying out touch control operation based on its screen, and trigger unlocking request, described unlocking request carries the touch data that user carries out touch control operation; Or mobile terminal is when detecting the speech data of the sound transducer input that user is arranged based on it, and trigger unlocking request, described unlocking request carries the speech data of user's input.
At present, mobile terminal is built-in with tripper, processes, with unlocking mobile terminal for user for the unlocking request triggered mobile terminal.The unlock method that the present embodiment provides is to improve tripper to the treatment scheme of aforementioned unlocking request, to realize above-mentioned purpose.Particularly, described tripper is in the lock state at mobile terminal, and when detecting the unlocking request based on described mobile terminal, obtains at least one certificate parameter that described unlocking request is carried.Particularly, tripper is when detecting the unlocking request based on described mobile terminal, extract user's operation information that described unlocking request carries (finger print data of such as aforementioned user's input, touch data and/or speech data etc.), and using the user's operation information that extracts as certificate parameter.
S20, carries out verification operation at least one certificate parameter described in acquisition;
In the present embodiment, tripper, after getting at least one certificate parameter that described unlocking request carries, carries out verification operation at least one certificate parameter described in acquisition.Particularly, mobile terminal this locality stores certificate parameter database, and each certificate parameter in the described certificate parameter obtained and described certificate parameter database, after getting the certificate parameter that described unlocking request carries, is compared by tripper; When described certificate parameter is not all mated with each certificate parameter in described certificate parameter database, authentication failed; When there is the occurrence mated with described certificate parameter in described certificate parameter database, be verified.Such as:
It is the finger print data (this finger print data comprises fingerprint size, the streakline width and fold information etc. of respective user) that user inputs that tripper gets the certificate parameter that described unlocking request carries; The finger print data of the finger print data got and described certificate parameter database purchase is compared by tripper, when the finger print data that described tripper obtains all does not mate with each finger print data in described certificate parameter database, and authentication failed; When there is the finger print data mated with the finger print data that described tripper obtains in described certificate parameter database, be verified.Wherein, coupling refers to that the fingerprint size of any two finger print datas is identical, streakline width is identical and fold information is identical; Or the similarity that the similarity of the fingerprint size of any two finger print datas meets certain threshold value, the similarity of streakline width meets certain threshold value and fold information meets certain threshold value.
It is the speech data (this speech data comprises the acoustic feature of respective user) that user inputs that tripper gets the certificate parameter that described unlocking request carries; The speech data of the speech data got and described certificate parameter database purchase is compared by tripper, when the speech data that described tripper obtains all does not mate with each speech data in described certificate parameter database, and authentication failed; When there is the speech data mated with the speech data that described tripper obtains in described certificate parameter database, be verified.Wherein, coupling refers to that the acoustic feature of any two speech datas is identical, or the similarity of any two speech data acoustic features meets certain threshold value.
It is the touch data (this touch data comprises the sliding trace information of respective user touch point) that user inputs that tripper gets the certificate parameter that described unlocking request carries; The touch data of the touch data got and described certificate parameter database purchase is compared by tripper, when the touch data that described tripper obtains all is not mated with each touch data in described certificate parameter database, and authentication failed; When there is the touch data of mating with the touch data that described tripper obtains in described certificate parameter database, be verified.Wherein, coupling refers to that the sliding trace information of any two touch data is identical, or the similarity of the sliding trace information of any two touch data meets certain threshold value.
S30, when at least one certificate parameter described is verified, exits lock-out state and enters default access mode operation.
In the present embodiment, when at least one certificate parameter described is verified, tripper controls described mobile terminal and exits lock-out state and enter default access mode operation.It should be noted that; described mobile terminal is when with default access mode operation; the local user data etc. that the operable application program of limited subscriber, the operable systemic-function of limited subscriber and limited subscriber can be accessed, to realize the protection to described mobile terminal home subscriber privacy.For mobile phone, screen lock state is at mobile phone, and when detecting the unlocking request based on described mobile phone, tripper obtains the sliding trace information that described unlocking request is carried, itself and the sliding trace information being used for unlocking preset are compared, the described sliding trace information obtained with preset for unlock sliding trace information matches time, control mobile phone unlock screen and also enter default access mode operation (hide the icon of related application, hide the icon of related system function and the relevant user data etc. of hiding mobile phone this locality).
The unlock method that the present embodiment proposes, is in the lock state at mobile terminal, and when detecting unlocking request, obtains at least one certificate parameter that described unlocking request is carried; Verification operation is carried out at least one certificate parameter described in acquisition; When at least one certificate parameter described is verified, exits lock-out state and enter default access mode operation.Compared to prior art, the present invention while unblock, enters default access mode operation by mobile terminal automatically, to limit the operable application program of user, operable systemic-function and the local user data that can access.Thus the present invention can make mobile terminal under the prerequisite meeting security, promote privacy.
Further, based on the first embodiment, propose the second embodiment of unlock method of the present invention, in the present embodiment, with reference to Fig. 4, after above-mentioned steps S20, described unlock method, also comprises:
S40, when at least one certificate parameter authentication failed described, positions prompting operation.
In the present embodiment, when at least one certificate parameter authentication failed described, illustrate now mobile terminal may stolen or lose, tripper position prompting operation.Such as, tripper can control the default high pitch jingle bell of mobile terminal playing and/or its LED of glimmering, to indicate its place, position.
Particularly, with reference to Fig. 5, above-mentioned steps S40 comprises:
S401, when at least one certificate parameter authentication failed described, obtains the positional information of current present position;
In the present embodiment, when at least one certificate parameter authentication failed described, tripper obtains the positional information of the current present position of described mobile terminal.It should be noted that, the present embodiment does not limit the mode of the positional information obtaining mobile terminal, can adopt the mode of architecture, can adopt the mode of the satnav such as the Big Dipper, GPS, GLONASS, Galileo yet.Such as, tripper when described certificate parameter authentication failed, the GPS module that starting hand-set is built-in, and the warp/latitude coordinate being obtained the current present position of mobile phone by institute GPS module.
S402, is sent to default communication terminal by the positional information of acquisition.
In the present embodiment, the positional information got, after getting the positional information of mobile terminal, can be sent to default communication terminal by certain hour gap periods by tripper; Also can be when the positional information quantity obtained exceedes predetermined threshold value, be sent to default communicating terminal by unified for the positional information got.Mobile terminal home subscriber can at the appointment interface of mobile terminal, input be used for the contact methods such as the phone number of receiving position information or email address in advance, the positional information got, after getting the positional information of mobile terminal, is sent to corresponding communication terminal according to contact methods such as described phone number or email addresses by tripper.Such as, the warp/latitude coordinate obtained, after the warp/latitude coordinate getting the current present position of mobile phone, is sent to other mobile phones of mobile phone home subscriber by tripper.The present embodiment by when described certificate parameter authentication failed, positions prompting operation, can the security of lifting mobile terminal further.
Further, based on the first embodiment, propose the 3rd embodiment of unlock method of the present invention, in the present embodiment, described certificate parameter comprises the first certificate parameter and the second certificate parameter, and above-mentioned steps S30 comprises:
When described first certificate parameter and described second certificate parameter are all verified, exit lock-out state and enter the first permission mode and run;
Be verified in described first certificate parameter, and during described second certificate parameter authentication failed, exit lock-out state and enter the second permission mode and run;
In described first certificate parameter authentication failed, and when described second certificate parameter is verified, exit lock-out state and enter the 3rd permission mode and run.
The present embodiment provides multiple different permission mode, when mobile terminal runs with aforementioned different permission mode, controls accordingly according to the access/rights of using of permission mode to user that it runs, to be embodied as the service that different user provides different.Particularly, described certificate parameter comprises the first certificate parameter and the second certificate parameter, and this enforcement, according to the result to described first certificate parameter and described second certificate parameter, carries out the switching of the permission mode of described mobile terminal:
Tripper is getting the first certificate parameter and the second certificate parameter, and when described first certificate parameter and described second certificate parameter are all verified, control described mobile terminal and exit lock-out state and enter the first permission mode operation;
Tripper is getting the first certificate parameter and the second certificate parameter, and described first certificate parameter is verified, and during described second certificate parameter authentication failed, controls described mobile terminal and exits lock-out state and enter the second permission mode operation; Or tripper is only getting the first certificate parameter, and when described first certificate parameter is verified, controlling described mobile terminal and exiting lock-out state and enter the second permission mode operation;
Tripper is getting the first certificate parameter and the second certificate parameter, and described first certificate parameter authentication failed, when described second certificate parameter is verified, controls described mobile terminal and exit lock-out state and enter the 3rd permission mode operation; Or tripper is only getting the second certificate parameter, and when described second certificate parameter is verified, controlling described mobile terminal and exiting lock-out state and enter the 3rd permission mode operation.
Wherein, described first permission mode is highest weight limiting mode, running of mobile terminal is when highest weight limiting mode, user has the highest access/rights of using, can use all application programs of mobile terminal, carry out Operation system setting and the local all user/system datas etc. of access mobile terminal.Such as, when mobile phone runs on highest weight limiting mode, user can delete/add the system application of mobile phone.
Described second permission mode is equity stock limiting mode, and running of mobile terminal is when equity stock limiting mode, and access/rights of using that user has are lower than access/rights of using during aforementioned highest weight limiting mode.Such as, when mobile phone runs on equity stock limiting mode, although user can use all application programs of mobile phone, can not delete/add the system application of mobile phone.
Described 3rd permission mode is visitor's permission mode, and running of mobile terminal is when visitor's permission mode, and access/rights of using that user has are lower than access/rights of using during aforementioned equity stock limiting mode.Such as, mobile phone, when running on visitor's permission mode, only provides part application program for user, and hides local all user data.
It should be noted that, the home subscriber of described mobile terminal can arrange the access/rights of using of mobile terminal under different rights pattern.Such as, described home subscriber enter into visitor's permission mode interface is set after, by choosing talk application (system application of mobile terminal) and note application (system application of mobile terminal), be set to the system application prohibitted the use; Mobile phone, when entering visitor's permission mode and running, hides the icon of talk application and note application automatically; Or, do not respond the operation that any user starts described talk application and/or the application of described note.
At present, the mobile terminal based on mobile phone is equipped with fingerprint sensor and touch-screen usually, and the finger print data that the present embodiment preferably adopts fingerprint sensor to obtain is as described first certificate parameter, and the touch data that touch-screen obtains is as described second certificate parameter.Unlock mobile phone (aforementioned tripper is integrated in mobile phone) with user to be below described:
Mobile phone is receiving finger print data and the touch data of user's input, and when described finger print data and described touch data are all verified, exit lock-out state and enter the first permission mode (highest weight limiting mode) and run;
Mobile phone is receiving finger print data and the touch data of user's input, and described finger print data is verified, and during described touch data authentication failed, exits lock-out state and enters the second permission mode (normal user permission pattern) and run; Or mobile phone only receives the finger print data of user's input, and when described finger print data is verified, mobile phone exits lock-out state and enters the second permission mode (normal user permission pattern) and runs;
Mobile phone is receiving finger print data and the touch data of user's input, and described finger print data authentication failed, when described touch data is verified, exits lock-out state and enter the 3rd permission mode (visitor's permission mode) and run; Or mobile phone is only receiving touch data, and when described touch data is verified, exiting lock-out state and entering the 3rd permission mode (visitor's permission mode) and running.
The present embodiment by mobile terminal unblock while, automatically enter corresponding permission mode according to the result to run, to be embodied as the service that different user provides different, improve the privacy of mobile terminal further, and provide better Consumer's Experience.
Further, based on the first embodiment, propose the 4th embodiment of unlock method of the present invention, with reference to Fig. 6, after above-mentioned steps S30, described unlock method, also comprises:
S50, when not detecting user operation in preset time period, enters lock-out state.
For preventing unlocking mobile terminal in unwanted situation, and after unlocking mobile terminal, mobile terminal is not used in user is long-time, cause the waste of mobile terminal electricity, in the present embodiment, at running of mobile terminal in described default access pattern, and when not detecting user operation in preset time period, tripper controls described mobile terminal and enters lock-out state.Wherein, described preset time period can rule of thumb be arranged, and such as, is set to 30 seconds; Can also according to acquisition for mobile terminal to user's usage data arrange, and in real time or timing adjust, the present embodiment is not specifically limited.The present embodiment, by when user does not use mobile terminal for a long time, controls mobile terminal and enters lock-out state, under the prerequisite ensureing security of mobile terminal, reduces the energy consumption of mobile terminal.
The present invention further provides a kind of tripper, with reference to Fig. 7, in the first embodiment of tripper of the present invention, described tripper comprises:
Acquisition module 10, for being in the lock state when its place mobile terminal, and when detecting unlocking request, obtains at least one certificate parameter that described unlocking request is carried;
The tripper that the embodiment of the present invention provides is mainly used in the mobile terminals such as mobile phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP (portable media player), guider, be intended to make mobile terminal under the prerequisite meeting security, can privacy be improved.
It should be noted that, mobile terminal is being in the lock state, and when detecting user operation, automatically triggers unlocking request, and described unlocking request carries user's operation information.Such as, mobile terminal is when detecting the finger print data of the fingerprint sensor input that user is arranged based on it, and trigger unlocking request, described unlocking request carries the finger print data of user's input; Or mobile terminal is when detecting user and carrying out touch control operation based on its screen, and trigger unlocking request, described unlocking request carries the touch data that user carries out touch control operation; Or mobile terminal is when detecting the speech data of the sound transducer input that user is arranged based on it, and trigger unlocking request, described unlocking request carries the speech data of user's input.
At present, mobile terminal is built-in with tripper, processes, with unlocking mobile terminal for user for the unlocking request triggered mobile terminal.The tripper that the present embodiment provides is to improve existing tripper, to realize above-mentioned purpose.Particularly, acquisition module 10 is in the lock state at its place mobile terminal, and when detecting the unlocking request based on described mobile terminal, obtains at least one certificate parameter that described unlocking request is carried.Particularly, acquisition module 10 is when detecting the unlocking request based on described mobile terminal, extract user's operation information that described unlocking request carries (finger print data of such as aforementioned user's input, touch data and/or speech data etc.), and using the user's operation information that extracts as certificate parameter.
Authentication module 20, for carrying out verification operation at least one certificate parameter described in described acquisition module 10 acquisition;
In the present embodiment, authentication module 20, after acquisition module 10 gets at least one certificate parameter that described unlocking request carries, carries out verification operation at least one certificate parameter described in acquisition.Particularly, mobile terminal this locality stores certificate parameter database, each certificate parameter in the described certificate parameter obtained and described certificate parameter database, after acquisition module 10 gets the certificate parameter that described unlocking request carries, is compared by authentication module 20; When described certificate parameter is not all mated with each certificate parameter in described certificate parameter database, authentication failed; When there is the occurrence mated with described certificate parameter in described certificate parameter database, be verified.Such as:
It is the finger print data (this finger print data comprises fingerprint size, the streakline width and fold information etc. of respective user) that user inputs that acquisition module 10 gets the certificate parameter that described unlocking request carries; The finger print data of the finger print data that acquisition module 10 gets by authentication module 20 and described certificate parameter database purchase is compared, when the finger print data that described acquisition module 10 obtains all does not mate with each finger print data in described certificate parameter database, authentication failed; When there is the finger print data mated with the finger print data that described acquisition module 10 obtains in described certificate parameter database, be verified.Wherein, coupling refers to that the fingerprint size of any two finger print datas is identical, streakline width is identical and fold information is identical; Or the similarity that the similarity of the fingerprint size of any two finger print datas meets certain threshold value, the similarity of streakline width meets certain threshold value and fold information meets certain threshold value.
It is the speech data (this speech data comprises the acoustic feature of respective user) that user inputs that acquisition module 10 gets the certificate parameter that described unlocking request carries; The speech data of the speech data that acquisition module 10 gets by authentication module 20 and described certificate parameter database purchase is compared, when the speech data that described acquisition module 10 obtains all does not mate with each speech data in described certificate parameter database, authentication failed; When there is the speech data mated with the speech data that described acquisition module 10 obtains in described certificate parameter database, be verified.Wherein, coupling refers to that the acoustic feature of any two speech datas is identical, or the similarity of any two speech data acoustic features meets certain threshold value.
It is the touch data (this touch data comprises the sliding trace information of respective user touch point) that user inputs that acquisition module 10 gets the certificate parameter that described unlocking request carries; The touch data of the touch data that acquisition module 10 gets by authentication module 20 and described certificate parameter database purchase is compared, when the touch data that described acquisition module 10 obtains all is not mated with each touch data in described certificate parameter database, authentication failed; When there is the touch data of mating with the touch data that described acquisition module 10 obtains in described certificate parameter database, be verified.Wherein, coupling refers to that the sliding trace information of any two touch data is identical, or the similarity of the sliding trace information of any two touch data meets certain threshold value.
Control module 30, for when at least one certificate parameter described is verified, controls its place mobile terminal and exits lock-out state and enter default access mode operation.
In the present embodiment, control module 30 when certificate parameter is verified described at least one, controls its place mobile terminal and exits lock-out state and enter default access mode operation.It should be noted that; described mobile terminal is when with default access mode operation; the local user data etc. that the operable application program of limited subscriber, the operable systemic-function of limited subscriber and limited subscriber can be accessed, to realize the protection to described mobile terminal home subscriber privacy.For mobile phone, screen lock state is at mobile phone, and when detecting the unlocking request based on described mobile phone, acquisition module 10 obtains the sliding trace information that described unlocking request is carried, the sliding trace information that acquisition module 10 obtains by authentication module 20 is compared with the sliding trace information being used for unlocking preset, acquisition module 10 obtain described sliding trace information with preset for unlock sliding trace information matches time, control module 30 controls mobile phone unlock screen and enters default access mode operation (to hide the icon of related application, hide the icon of related system function and the relevant user data etc. of hiding mobile phone this locality).
The tripper that the present embodiment proposes, is in the lock state at mobile terminal, and when detecting unlocking request, obtains at least one certificate parameter that described unlocking request is carried; Verification operation is carried out at least one certificate parameter described in acquisition; When at least one certificate parameter described is verified, exits lock-out state and enter default access mode operation.Compared to prior art, the present invention while unblock, enters default access mode operation by mobile terminal automatically, to limit the passable use application program of user, operable systemic-function and the local user data that can access.Thus the present invention can make mobile terminal under the prerequisite meeting security, promote privacy.
Further, based on the first embodiment, the second embodiment of tripper of the present invention is proposed, in the present embodiment, with reference to Fig. 8, described tripper also comprises locating module 40, for when at least one certificate parameter authentication failed described, position prompting operation.
In the present embodiment, when at least one certificate parameter authentication failed described, illustrate now mobile terminal may stolen or lose, locating module 40 position prompting operation.Such as, locating module 40 can control the default high pitch jingle bell of mobile terminal playing and/or its LED of glimmering, to indicate its place, position.
Particularly, with reference to Fig. 9, described locating module 40 comprises:
Positioning unit 401, for when at least one certificate parameter authentication failed described, obtains the positional information of its current present position of place mobile terminal;
In the present embodiment, when at least one certificate parameter authentication failed described, positioning unit 401 obtains the positional information of the current present position of described mobile terminal.It should be noted that, the present embodiment does not limit the mode of the positional information obtaining mobile terminal, can adopt the mode of architecture, can adopt the mode of the satnav such as the Big Dipper, GPS, GLONASS, Galileo yet.Such as, positioning unit 401 when described certificate parameter authentication failed, the GPS module that starting hand-set is built-in, and the warp/latitude coordinate being obtained the current present position of mobile phone by institute GPS module.
Transmitting element 402, the positional information for being obtained by positioning unit is sent to default communication terminal.
In the present embodiment, the positional information that positioning unit 401 gets, after positioning unit 401 gets the positional information of mobile terminal, can be sent to default communication terminal by certain hour gap periods by transmitting element 402; Also can be that the positional information got by positioning unit 401 is unified is sent to default communicating terminal when the positional information quantity of positioning unit 401 acquisition exceedes predetermined threshold value.Mobile terminal home subscriber can at the appointment interface of mobile terminal, input be used for the contact methods such as the phone number of receiving position information or email address in advance, the positional information that positioning unit 401 gets, after positioning unit 401 gets the positional information of mobile terminal, is sent to corresponding communication terminal according to contact methods such as described phone number or email addresses by transmitting element 402.Such as, the warp/latitude coordinate that positioning unit 401 obtains, after positioning unit 401 gets the warp/latitude coordinate of the current present position of mobile phone, is sent to other mobile phones of mobile phone home subscriber by transmitting element 402.The present embodiment by when described certificate parameter authentication failed, positions prompting operation, can the security of lifting mobile terminal further.
Further, based on the first embodiment, propose the 3rd embodiment of tripper of the present invention, in the present embodiment, described certificate parameter comprises the first certificate parameter and the second certificate parameter, described control module 30 also for,
When described first certificate parameter and described second certificate parameter are all verified, control its place mobile terminal and exit lock-out state and enter the first permission mode operation;
Be verified in described first certificate parameter, and during described second certificate parameter authentication failed, control its place mobile terminal and exit lock-out state and enter the second permission mode operation;
In described first certificate parameter authentication failed, and when described second certificate parameter is verified, control its place mobile terminal and exit lock-out state and enter the 3rd permission mode operation.
The present embodiment provides multiple different permission mode, when mobile terminal runs with aforementioned different permission mode, controls accordingly according to the access/rights of using of permission mode to user that it runs, to be embodied as the service that different user provides different.Particularly, described certificate parameter comprises the first certificate parameter and the second certificate parameter, and this enforcement, according to the result to described first certificate parameter and described second certificate parameter, carries out the switching of the permission mode of described mobile terminal:
Get the first certificate parameter and the second certificate parameter at acquisition module 10, and when described first certificate parameter and described second certificate parameter are all verified, control module 30 controls its place mobile terminal and exits lock-out state and enter the first permission mode operation;
The first certificate parameter and the second certificate parameter is got at acquisition module 10, and described first certificate parameter is verified, during described second certificate parameter authentication failed, control module 30 controls its place mobile terminal and exits lock-out state and enter the second permission mode operation; Or, only get the first certificate parameter at acquisition module 10, and when described first certificate parameter is verified, control module 30 controls its place mobile terminal and exits lock-out state and enter the second permission mode operation;
The first certificate parameter and the second certificate parameter is got at acquisition module 10, and described first certificate parameter authentication failed, when described second certificate parameter is verified, control module 30 controls its place mobile terminal and exits lock-out state and enter the 3rd permission mode operation; Or, only get the second certificate parameter at acquisition module 10, and when described second certificate parameter is verified, control module 30 controls its place mobile terminal and exits lock-out state and enter the 3rd permission mode operation.
Wherein, described first permission mode is highest weight limiting mode, running of mobile terminal is when highest weight limiting mode, user has the highest access/rights of using, can use all application programs of mobile terminal, carry out Operation system setting and the local all user/system datas etc. of access mobile terminal.Such as, when mobile phone runs on highest weight limiting mode, user can delete/add the system application of mobile phone.
Described second permission mode is equity stock limiting mode, and running of mobile terminal is when equity stock limiting mode, and access/rights of using that user has are lower than access/rights of using during aforementioned highest weight limiting mode.Such as, when mobile phone runs on equity stock limiting mode, although user can use all application programs of mobile phone, can not delete/add the system application of mobile phone.
Described 3rd permission mode is visitor's permission mode, and running of mobile terminal is when visitor's permission mode, and access/rights of using that user has are lower than access/rights of using during aforementioned equity stock limiting mode.Such as, mobile phone, when running on visitor's permission mode, only provides part application program for user, and hides local all user data.
It should be noted that, the home subscriber of described mobile terminal can arrange the access/rights of using of mobile terminal under different rights pattern.Such as, described home subscriber enter into visitor's permission mode interface is set after, by choosing talk application (system application of mobile terminal) and note application (system application of mobile terminal), be set to the system application prohibitted the use; Mobile phone, when entering visitor's permission mode and running, hides the icon of talk application and note application automatically; Or, do not respond the operation that any user starts described talk application and/or the application of described note.
At present, the mobile terminal based on mobile phone is equipped with fingerprint sensor and touch-screen usually, and the finger print data that the present embodiment preferably adopts fingerprint sensor to obtain is as described first certificate parameter, and the touch data that touch-screen obtains is as described second certificate parameter.Unlock mobile phone (aforementioned tripper is integrated in mobile phone) with user to be below described:
Mobile phone is receiving finger print data and the touch data of user's input, and when described finger print data and described touch data are all verified, exit lock-out state and enter the first permission mode (highest weight limiting mode) and run;
Mobile phone is receiving finger print data and the touch data of user's input, and described finger print data is verified, and during described touch data authentication failed, exits lock-out state and enters the second permission mode (normal user permission pattern) and run; Or mobile phone only receives the finger print data of user's input, and when described finger print data is verified, mobile phone exits lock-out state and enters the second permission mode (normal user permission pattern) and runs;
Mobile phone is receiving finger print data and the touch data of user's input, and described finger print data authentication failed, when described touch data is verified, exits lock-out state and enter the 3rd permission mode (visitor's permission mode) and run; Or mobile phone is only receiving touch data, and when described touch data is verified, exiting lock-out state and entering the 3rd permission mode (visitor's permission mode) and running.
The present embodiment by mobile terminal unblock while, automatically enter corresponding permission mode according to the result to run, to be embodied as the service that different user provides different, improve the privacy of mobile terminal further, and provide better Consumer's Experience.
Further, based on the first embodiment, 4th embodiment of tripper of the present invention is proposed, in the present embodiment, described control module 30 also for, when its place running of mobile terminal is in described default access pattern, and when not detecting user operation in preset time period, control its place mobile terminal and enter lock-out state.
For preventing unlocking mobile terminal in unwanted situation, and after unlocking mobile terminal, mobile terminal is not used in user is long-time, cause the waste of mobile terminal electricity, in the present embodiment, at running of mobile terminal in described default access pattern, and when not detecting user operation in preset time period, control module 30 controls described mobile terminal and enters lock-out state.Wherein, described preset time period can rule of thumb be arranged, and such as, is set to 30 seconds; Can also according to acquisition for mobile terminal to user's usage data arrange, and in real time or timing adjust, the present embodiment is not specifically limited.The present embodiment, by when user does not use mobile terminal for a long time, controls mobile terminal and enters lock-out state, under the prerequisite ensureing security of mobile terminal, reduces the energy consumption of mobile terminal.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or device and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or device.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the device comprising this key element and also there is other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that above-described embodiment method can add required general hardware platform by software and realize, hardware can certainly be passed through, but in a lot of situation, the former is better embodiment.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium (as ROM/RAM, magnetic disc, CD), comprising some instructions in order to make a station terminal equipment (can be mobile phone, computing machine, server, air conditioner, or the network equipment etc.) perform method described in each embodiment of the present invention.
These are only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a unlock method, is characterized in that, described unlock method comprises:
Be in the lock state at mobile terminal, and when detecting unlocking request, obtain at least one certificate parameter that described unlocking request is carried;
Verification operation is carried out at least one certificate parameter described in acquisition;
When at least one certificate parameter described is verified, exits lock-out state and enter default access mode operation.
2. unlock method as claimed in claim 1, is characterized in that, described the step of verification operation is carried out at least one certificate parameter described in acquisition after, described unlock method, also comprises:
When at least one certificate parameter authentication failed described, position prompting operation.
3. unlock method as claimed in claim 2, is characterized in that, described when at least one certificate parameter authentication failed described, positions prompting operation and comprises:
When at least one certificate parameter authentication failed described, obtain the positional information of current present position;
The positional information of acquisition is sent to default communication terminal.
4. unlock method as claimed in claim 1, it is characterized in that, described certificate parameter comprises the first certificate parameter and the second certificate parameter, described when at least one certificate parameter described is verified, and exits lock-out state and enter default access mode operation to comprise:
When described first certificate parameter and described second certificate parameter are all verified, exit lock-out state and enter the first permission mode and run;
Be verified in described first certificate parameter, and during described second certificate parameter authentication failed, exit lock-out state and enter the second permission mode and run;
In described first certificate parameter authentication failed, and when described second certificate parameter is verified, exit lock-out state and enter the 3rd permission mode and run.
5. unlock method as claimed in claim 1, is characterized in that, described when at least one certificate parameter described is verified, and exits lock-out state and after entering the step of default access mode operation, described unlock method, also comprises:
When not detecting user operation in preset time period, enter lock-out state.
6. a tripper, is characterized in that, described tripper comprises:
Acquisition module, for being in the lock state when its place mobile terminal, and when detecting unlocking request, obtains at least one certificate parameter that described unlocking request is carried;
Authentication module, carries out verification operation at least one certificate parameter described in obtaining described acquisition module;
Control module, for when at least one certificate parameter described is verified, controls its place mobile terminal and exits lock-out state and enter default access mode operation.
7. tripper as claimed in claim 6, it is characterized in that, described tripper also comprises locating module, for when at least one certificate parameter authentication failed described, positions prompting operation.
8. tripper as claimed in claim 7, it is characterized in that, described locating module comprises:
Positioning unit, for when at least one certificate parameter authentication failed described, obtains the positional information of its current present position of place mobile terminal;
Transmitting element, the positional information for being obtained by positioning unit is sent to default communication terminal.
9. tripper as claimed in claim 6, it is characterized in that, described certificate parameter comprises the first certificate parameter and the second certificate parameter, described control module also for,
When described first certificate parameter and described second certificate parameter are all verified, control its place mobile terminal and exit lock-out state and enter the first permission mode operation;
Be verified in described first certificate parameter, and during described second certificate parameter authentication failed, control its place mobile terminal and exit lock-out state and enter the second permission mode operation;
In described first certificate parameter authentication failed, and when described second certificate parameter is verified, control its place mobile terminal and exit lock-out state and enter the 3rd permission mode operation.
10. tripper as claimed in claim 6, it is characterized in that, described control module also for, when its place running of mobile terminal is in described default access pattern, and when not detecting user operation in preset time period, control its place mobile terminal and enter lock-out state.
CN201510283777.8A 2015-05-28 2015-05-28 unlocking method and device Active CN104915582B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510283777.8A CN104915582B (en) 2015-05-28 2015-05-28 unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510283777.8A CN104915582B (en) 2015-05-28 2015-05-28 unlocking method and device

Publications (2)

Publication Number Publication Date
CN104915582A true CN104915582A (en) 2015-09-16
CN104915582B CN104915582B (en) 2017-12-22

Family

ID=54084644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510283777.8A Active CN104915582B (en) 2015-05-28 2015-05-28 unlocking method and device

Country Status (1)

Country Link
CN (1) CN104915582B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208211A (en) * 2015-09-29 2015-12-30 努比亚技术有限公司 Privacy protection device and method and mobile terminal
CN105589643A (en) * 2015-12-18 2016-05-18 努比亚技术有限公司 Mobile terminal unlocking method and mobile terminal
CN106196435A (en) * 2016-07-04 2016-12-07 珠海格力电器股份有限公司 Air-conditioning line control machine and control method thereof and device
CN106203156A (en) * 2016-06-28 2016-12-07 青岛海信移动通信技术股份有限公司 A kind of unlocking method and a device of mobile device
CN106295279A (en) * 2016-08-11 2017-01-04 北京小米移动软件有限公司 The method and device of terminal control
CN106682618A (en) * 2016-12-27 2017-05-17 努比亚技术有限公司 Fingerprint identification method and mobile terminal
WO2017084501A1 (en) * 2015-11-20 2017-05-26 中兴通讯股份有限公司 Terminal unlocking method and device, and terminal
CN107480493A (en) * 2017-07-19 2017-12-15 广东欧珀移动通信有限公司 Information processing method and related product
CN109117616A (en) * 2018-08-02 2019-01-01 Oppo广东移动通信有限公司 Verification method and device, electronic equipment, computer readable storage medium
WO2019114507A1 (en) * 2017-12-14 2019-06-20 Oppo广东移动通信有限公司 Voice processing method and apparatus, storage medium, and terminal device
CN110060675A (en) * 2019-03-29 2019-07-26 华为技术有限公司 Wake up the method and apparatus of speaker
CN110708364A (en) * 2019-09-19 2020-01-17 RealMe重庆移动通信有限公司 Electronic equipment unlocking method and device, electronic equipment and storage medium
CN115206006A (en) * 2022-06-23 2022-10-18 浙江骑客机器人科技有限公司 Electric vehicle and unlocking method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227731A (en) * 2008-02-01 2008-07-23 中兴通讯股份有限公司 Mobile phone tracing method and system
CN102638628A (en) * 2012-03-30 2012-08-15 深圳市金立通信设备有限公司 Mobile phone anti-theft system and method based on camera and GPS (Global Position System) of mobile phone
CN103714278A (en) * 2012-09-29 2014-04-09 北京三星通信技术研究有限公司 Password authentication method and password authentication device of terminal equipment
CN103885772A (en) * 2014-03-07 2014-06-25 联想(北京)有限公司 Unlocking method and electronic device
CN104281388A (en) * 2014-10-11 2015-01-14 广东欧珀移动通信有限公司 Smart mobile terminal based multiple-unlocking setting method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227731A (en) * 2008-02-01 2008-07-23 中兴通讯股份有限公司 Mobile phone tracing method and system
CN102638628A (en) * 2012-03-30 2012-08-15 深圳市金立通信设备有限公司 Mobile phone anti-theft system and method based on camera and GPS (Global Position System) of mobile phone
CN103714278A (en) * 2012-09-29 2014-04-09 北京三星通信技术研究有限公司 Password authentication method and password authentication device of terminal equipment
CN103885772A (en) * 2014-03-07 2014-06-25 联想(北京)有限公司 Unlocking method and electronic device
CN104281388A (en) * 2014-10-11 2015-01-14 广东欧珀移动通信有限公司 Smart mobile terminal based multiple-unlocking setting method and device

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208211A (en) * 2015-09-29 2015-12-30 努比亚技术有限公司 Privacy protection device and method and mobile terminal
CN105208211B (en) * 2015-09-29 2019-02-12 努比亚技术有限公司 A kind of privacy protection device, method and mobile terminal
WO2017084501A1 (en) * 2015-11-20 2017-05-26 中兴通讯股份有限公司 Terminal unlocking method and device, and terminal
CN105589643A (en) * 2015-12-18 2016-05-18 努比亚技术有限公司 Mobile terminal unlocking method and mobile terminal
CN105589643B (en) * 2015-12-18 2019-02-12 努比亚技术有限公司 Mobile terminal unlocking method and mobile terminal
CN106203156A (en) * 2016-06-28 2016-12-07 青岛海信移动通信技术股份有限公司 A kind of unlocking method and a device of mobile device
CN106196435A (en) * 2016-07-04 2016-12-07 珠海格力电器股份有限公司 Air-conditioning line control machine and control method thereof and device
CN106295279B (en) * 2016-08-11 2019-05-10 北京小米移动软件有限公司 The method and device of terminal control
CN106295279A (en) * 2016-08-11 2017-01-04 北京小米移动软件有限公司 The method and device of terminal control
CN106682618A (en) * 2016-12-27 2017-05-17 努比亚技术有限公司 Fingerprint identification method and mobile terminal
CN107480493A (en) * 2017-07-19 2017-12-15 广东欧珀移动通信有限公司 Information processing method and related product
WO2019114507A1 (en) * 2017-12-14 2019-06-20 Oppo广东移动通信有限公司 Voice processing method and apparatus, storage medium, and terminal device
CN109117616A (en) * 2018-08-02 2019-01-01 Oppo广东移动通信有限公司 Verification method and device, electronic equipment, computer readable storage medium
CN109117616B (en) * 2018-08-02 2021-03-02 Oppo广东移动通信有限公司 Verification method and device, electronic equipment and computer readable storage medium
CN110060675A (en) * 2019-03-29 2019-07-26 华为技术有限公司 Wake up the method and apparatus of speaker
CN110708364A (en) * 2019-09-19 2020-01-17 RealMe重庆移动通信有限公司 Electronic equipment unlocking method and device, electronic equipment and storage medium
CN110708364B (en) * 2019-09-19 2022-05-20 RealMe重庆移动通信有限公司 Electronic equipment unlocking method and device, electronic equipment and storage medium
CN115206006A (en) * 2022-06-23 2022-10-18 浙江骑客机器人科技有限公司 Electric vehicle and unlocking method thereof

Also Published As

Publication number Publication date
CN104915582B (en) 2017-12-22

Similar Documents

Publication Publication Date Title
CN104915582A (en) Unlocking method and unlocking device
CN105100476B (en) A kind of mobile terminal unlocking device and method
CN104765994A (en) User identity recognition method and device
CN105117123A (en) Device and method for displaying hidden object
CN105046131A (en) Fingerprint identification apparatus and method
CN104793849A (en) Application icon display method and device
CN105094613A (en) Terminal control device and method
CN105468153A (en) Mobile terminal and control realizing method thereof
CN104992101A (en) Mobile terminal desktop icon display method and device
CN104618605A (en) Mobile terminal positioning method and device
CN105791548A (en) Voice information broadcast device and method
CN105208211A (en) Privacy protection device and method and mobile terminal
CN104636030A (en) Method and device for starting application programs and mobile terminal
CN105118201A (en) Mobile terminal theft prevention method and device
CN105095790A (en) Hidden object view method and device
CN104836884A (en) Standby unlocking method of mobile terminal, and mobile terminal
CN104966013A (en) Unlocking method and apparatus
CN104917879A (en) Method for canceling alarm clock prompt, device for canceling alarm clock prompt and mobile terminal
CN104850799A (en) Mobile terminal and method of hiding data in mobile terminal
CN105138874A (en) Screen unlocking control device and method
CN105094532A (en) Method and device for data access
CN104735258A (en) Mobile terminal control method and system
CN104932697A (en) Gesture unlocking method and device
CN105227754A (en) Mobile terminal solution lock control system and method
CN105138880A (en) Processing apparatus and method for terminal operation data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant