CN107145771A - application program unlocking method, device and terminal - Google Patents
application program unlocking method, device and terminal Download PDFInfo
- Publication number
- CN107145771A CN107145771A CN201710233522.XA CN201710233522A CN107145771A CN 107145771 A CN107145771 A CN 107145771A CN 201710233522 A CN201710233522 A CN 201710233522A CN 107145771 A CN107145771 A CN 107145771A
- Authority
- CN
- China
- Prior art keywords
- user
- application program
- message
- checking
- current application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The disclosure is directed to a kind of application program unlocking method, device and terminal, wherein, this method includes:Receive the unlocking request for current application program that user sends;If it is determined that user is secondary identification user, then checking message corresponding with current application program is pushed, checking message includes word and verifies message and/or speech verification message;The confirmation message that user sends is received, judges whether confirmation message matches with checking message, to determine whether to unlock current application program.Underage users excessive use application program etc. is not intended in guardian, or when wishing that underage users can also learn to thing when using application program, when it is determined that user is secondary identification user, word checking message and/or speech verification message are pushed for user, the confirmation message that user is sent carries out the matching analysis with checking message, goes to determine whether to unlock current application program.And then underage users are learnt simultaneously when application program.
Description
Technical field
This disclosure relates to field of terminal technology, more particularly to application program unlocking method, device and terminal.
Background technology
With the development of terminal technology, terminal has been widely used in the live and work of people.In terminal
Also various types of application programs, the application program of such as office-type, the application program of management type, game have been mounted with
The application program of type, the application program of video, application program of music type etc..
In correlation technique, user is if necessary to enter in terminal, and the application program gone in using terminal, user can be direct
The main button of terminal is selected, or is entered by way of unlocked by fingerprint, speech unlocking in terminal.
But in correlation technique, if user's underage users, its guardian is not intended to underage users and used excessively
Type of play, the application program of audio frequency and video type etc., it is desirable alternatively to underage users also may be used when using application program
To learn to arrive thing, so as to how to meet this portion requirements of adult human user so that underage users are when application program
Learnt simultaneously, the problem of needing to solve as one.
The content of the invention
Excessive type of play, sound are used to overcome its guardian present in correlation technique to be not intended to underage users
Application program of video type etc., it is desirable alternatively to which underage users can also learn to thing to ask when using application program
Topic, the disclosure provides a kind of application program unlocking method, device and terminal.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of application program unlocking method, including:
Receive the unlocking request for current application program that user sends;
Whether according to the unlocking request, it is secondary identification user to judge the user;
If it is determined that user is secondary identification user, then checking message corresponding with the current application program is pushed, wherein,
The checking message includes word and verifies message and/or speech verification message;
The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, with true
It is fixed whether to unlock the current application program.
Further, it is described to receive the confirmation message that user sends, and judge the confirmation message and the checking message
Whether match, to determine whether to unlock the current application program, including:
Touch feedback information and/or voice feedback information that user sends are received, wherein, the touch feedback information is institute
State user to be inputted according to the checking message, the voice feedback information is sent out for the user according to the checking message
Go out;
Judge whether the touch information matches with the checking information;
If it is determined that the touch information is matched with the checking information, then the current application program is unlocked.
Further, the unblock current application program, including:
The current application program is unlocked with preset time, so that the current application program is after the preset time
It is locked again.
Further, methods described, in addition to:
If it is determined that the touch information is mismatched with the checking information, then played and the checking information with preset times
Corresponding object information.
Further, whether described according to the unlocking request, it is secondary identification user to judge the user, including:
According to the unlocking request, whether be the user that with present terminal binds, to judge the use if judging the user
Whether family is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described
Secondary identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary
Recognize user.
Further, the unlocking request for current application program for receiving user's transmission, including:
The unlocking request produced during the current application program shown on user's touch terminal screen is obtained, it is described
Unlocking request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice letter
Breath.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the pin that user sends
To the unlocking request of current application program;Whether according to unlocking request, it is secondary identification user to judge user;If it is determined that user is
Secondary identification user, then push checking message corresponding with current application program, wherein, checking message includes word and verifies message
And/or speech verification message;The confirmation message that user sends is received, and judges whether confirmation message matches with checking message, with
Determine whether to unlock current application program.Excessive type of play, sound are used so as to be not intended to underage users in guardian
Application program of video type etc., it is desirable alternatively to which underage users can also learn to arrive thing when using application program
When, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is secondary identification
It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent and checking during user
Message carries out the matching analysis, goes to determine whether to unlock current application program.And then cause underage users application program when
Wait and learnt simultaneously.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of application program tripper, including:
Receiving module, is configured as receiving the unlocking request for current application program that user sends;
Judge module, is configured as according to the unlocking request, and whether judge the user is secondary identification user;
Pushing module, be configured as if it is determined that user be secondary identification user, then push with the current application program pair
The checking message answered, wherein, the checking message includes word and verifies message and/or speech verification message;
Matching module, is configured as receiving the confirmation message that user sends, and judge the confirmation message and the checking
Whether message matches, to determine whether to unlock the current application program.
Further, the matching module, including:
Receiving submodule, is configured as receiving touch feedback information and/or the voice feedback information that user sends, wherein,
The touch feedback information user inputs according to the checking message, and the voice feedback information is the user
Sent according to the checking message;
Judging submodule, is configured as judging whether the touch information matches with the checking information;
Submodule is unlocked, is configured as if it is determined that the touch information is matched with the checking information, then unblock is described works as
Preceding application program.
Further, the unblock submodule, is specifically configured to:
If it is determined that the touch information is matched with the checking information, then the current application journey is unlocked with preset time
Sequence, so that the current application program is locked again after the preset time.
Further, the matching module, in addition to:
Submodule is played, is configured as if it is determined that the touch information is mismatched with the checking information, then with default time
Number plays object information corresponding with the checking information.
Further, the judge module, is specifically configured to:
According to the unlocking request, whether be the user that with present terminal binds, to judge the use if judging the user
Whether family is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described
Secondary identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary
Recognize user.
Further, the receiving module, is specifically configured to:
The unlocking request produced during the current application program shown on user's touch terminal screen is obtained, it is described
Unlocking request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice letter
Breath.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the pin that user sends
To the unlocking request of current application program;Whether according to unlocking request, it is secondary identification user to judge user;If it is determined that user is
Secondary identification user, then push checking message corresponding with current application program, wherein, checking message includes word and verifies message
And/or speech verification message;The confirmation message that user sends is received, and judges whether confirmation message matches with checking message, with
Determine whether to unlock current application program.Excessive type of play, sound are used so as to be not intended to underage users in guardian
Application program of video type etc., it is desirable alternatively to which underage users can also learn to arrive thing when using application program
When, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is secondary identification
It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent and checking during user
Message carries out the matching analysis, goes to determine whether to unlock current application program.And then cause underage users application program when
Wait and learnt simultaneously.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of terminal, including:
Processor, and for storing the memory of processor-executable instruction;
Wherein, the processor is configured as:Receive the unlocking request for current application program that user sends;According to
Whether the unlocking request, it is secondary identification user to judge the user;If it is determined that user be secondary identification user, then push with
The corresponding checking message of the current application program, wherein, the checking message includes word and verifies message and/or speech verification
Message;The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, to determine to be
The no unblock current application program.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the pin that user sends
To the unlocking request of current application program;Whether according to unlocking request, it is secondary identification user to judge user;If it is determined that user is
Secondary identification user, then push checking message corresponding with current application program, wherein, checking message includes word and verifies message
And/or speech verification message;The confirmation message that user sends is received, and judges whether confirmation message matches with checking message, with
Determine whether to unlock current application program.Excessive type of play, sound are used so as to be not intended to underage users in guardian
Application program of video type etc., it is desirable alternatively to which underage users can also learn to arrive thing when using application program
When, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is secondary identification
It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent and checking during user
Message carries out the matching analysis, goes to determine whether to unlock current application program.And then cause underage users application program when
Wait and learnt simultaneously.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the present invention
Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of application program unlocking method embodiment one according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of application program unlocking method embodiment two according to an exemplary embodiment;
Fig. 3 is a kind of block diagram of application program tripper embodiment three according to an exemplary embodiment;
Fig. 4 is a kind of block diagram of application program tripper example IV according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the entity of terminal according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
Fig. 1 is a kind of flow chart of application program unlocking method embodiment one according to an exemplary embodiment, such as
Shown in Fig. 1, application program unlocking method is used in terminal, and the terminal includes mobile terminal, personal terminal etc., such as touch screen hand
Machine, tablet personal computer, PC etc., this method comprises the following steps.
In step s 11, the unlocking request for current application program that user sends is received.
In this step, each application program that terminal-pair is installed in the terminal adds lock function, and each applies journey
Sequence needs user to be unlocked application program before it is being used.So, application program of the user in using terminal when
Wait, it is necessary to be unlocked to current application program, user sends a unlocking request to current application program so that terminal is received
The unlocking request.
In step s 12, whether according to the unlocking request, it is secondary identification user to judge the user.
In this step, after terminal receives the unlocking request, terminal needs the information in unlocking request, goes to sentence
Whether disconnected current user is secondary identification user that terminal is set.Wherein, secondary identification user is the need for terminal is set
It is secondary to carry out voice, the user of word checking.In the present embodiment, secondary identification user refers to underage users.
In step s 13, however, it is determined that user is secondary identification user, then pushes test corresponding with the current application program
Message is demonstrate,proved, wherein, the checking message includes word and verifies message and/or speech verification message.
In this step, it is directed to secondary identification use because each application program that terminal has been directed in terminal is provided with
The checking message at family, wherein, checking message can verify message for word, or speech verification message, or text
Word verifies message and speech verification message.For from different application programs, different checking message can be set.Also, it is each
The checking message of application program can be determined at random, or user can pre-enter to the checking message of each application program.
If terminal judges current user for secondary identification user, terminal then determines checking corresponding with current application program
Message, also, terminal shows checking message corresponding with current application program.
For example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be write out into
Language is made three calls at the thatched cottage ";Or, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be explained bright
Repair the meaning that plank road advances secretly by an unknown path ";Or, terminal is if it is determined that user is secondary identification user, then terminal shows that word checking disappears
Cease " title that Chinese four great classical masterpieces please be write out ".
In step S14, the confirmation message that user sends is received, and judge that the confirmation message is with the checking message
No matching, to determine whether to unlock the current application program.
In this step, user is after seeing or hearing the checking message that terminal is pushed, and user can send to terminal
Confirmation message, and then, the confirmation message that terminal sends user carries out the matching analysis with checking message, according to the knot of the matching analysis
Fruit goes to determine whether to unlock current application program.
For example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be write out into
Language is made three calls at the thatched cottage " so that user writes answer " making three calls at the thatched cottage ", and then the confirmation that terminal inputs user on the screen of terminal
Message " making three calls at the thatched cottage " carries out the matching analysis with " making three calls at the thatched cottage " in speech verification message, unlocks and currently should if matching is correct
Use program.
Again for example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be explained
Pretend to prepare to advance along one path the meaning advanced secretly by an unknown path ", user writes answer on the screen of terminal, or user inputs voice to terminal, from
And the explanation that terminal advances secretly by an unknown path the confirmation message received and pretending to prepare to advance along one path of prestoring carries out the matching analysis, if matching is correct
Then unlock current application program.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence
Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program
Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The confirmation for receiving user's transmission disappears
Breath, and judge whether confirmation message matches with checking message, to determine whether to unlock current application program.So that in guardian simultaneously
It is not intended to underage users and uses excessive type of play, application program of audio frequency and video type etc., it is desirable alternatively to underage users
When can also learning to thing when using application program, terminal may determine that the user of solution locked application is
No is secondary identification user, when it is determined that user is secondary identification user, is that user pushes word checking message and/or voice is tested
Message is demonstrate,proved, so that the confirmation message that user is sent carries out the matching analysis with checking message, goes to determine whether to unlock current application
Program.And then underage users are learnt simultaneously when application program.
On the basis of the embodiment shown in above-mentioned Fig. 1, Fig. 2 is one kind application journey according to an exemplary embodiment
The flow chart of sequence unlocking method embodiment two, as shown in Fig. 2 step S11 specific implementation includes:
The unlocking request produced during the current application program shown on user's touch terminal screen is obtained, it is described
Unlocking request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice letter
Breath.
In this step, user can click on the current application program of the display on terminal screen, and terminal can be got
The user fingerprints information of user, so that terminal generates a unlocking request according to the user fingerprints information, terminal receives the use
Family finger print information.Or, user sends voice messaging to terminal, is asked so that terminal generates a unblock according to the voice messaging
Ask.
For example, user clicks on " the applying shop " shown on terminal screen, and terminal can get user fingerprints letter
Breath;Or, user sends voice messaging " please open and apply shop " to terminal, and terminal determines whether to open according to the voice messaging
Using the application program in shop.
Step S12 specific implementation includes:
According to the unlocking request, whether be the user that with present terminal binds, to judge the use if judging the user
Whether family is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described
Secondary identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary
Recognize user.
In this step, due to having prestored the user profile with the user of terminal binding, Yong Huxin in terminal
Breath can be finger print information, user speech etc..Terminal can by the user fingerprints information or voice messaging in unlocking request, with
The user profile prestored is matched, so as to go to determine whether user is the user bound with present terminal;If it is determined that mismatch,
Then determine that user is not the user bound with present terminal, it is secondary identification user to determine active user;If it is determined that matching, then really
It is the user bound with present terminal to determine user, and it is not secondary identification user to determine active user.
Or, terminal has prestored a secondary identification user list, and the secondary identification user list includes
The personal information of at least one secondary identification user, personal information can be finger print information, user speech etc..Terminal can be by
User fingerprints information or voice messaging in unlocking request, are matched with the personal information in secondary identification user list, from
And go to determine whether user is secondary identification user;If it is determined that matching, it is determined that active user is secondary identification user;If it is determined that
Mismatch, it is determined that active user is not secondary identification user.
Step S14 is specifically included:
In step s 141, touch feedback information and/or voice feedback information that user sends are received, wherein, it is described to touch
Touch the feedback information user to be inputted according to the checking message, the voice feedback information is the user according to institute
State checking message and send.
In this step, user is after seeing or hearing the checking message that terminal is pushed, and user can send to terminal
Confirmation message.Specifically, user is after seeing or hearing the checking message that terminal is pushed, and user is according to checking message to end
Input touches feedback information in end;Or, user is after seeing or hearing the checking message that terminal is pushed, and user is according to checking
Message inputs voice feedback information into terminal;Or, user inputs touch feedback information and voice feedback letter into terminal
Breath.
In step S142, judge whether the touch information matches with the checking information.
In this step, terminal sends user touch feedback information and/or voice feedback information, enter with checking message
Row the matching analysis, goes to determine whether to unlock current application program according to the result of the matching analysis.
In step S143, however, it is determined that the touch information is matched with the checking information, then the current application is unlocked
Program.
Wherein, the unblock current application program, including:
The current application program is unlocked with preset time, so that the current application program is after the preset time
It is locked again.
In this step, terminal is if it is determined that touch information is matched with checking information, and terminal can be by current application program solution
Lock a period of time, the time is preset time;Then, current application program can be locked again after the preset lime.Now
It is not carried out step S144.
For example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be write out into
Language is mended the fold after the sheep is lost " so that user writes answer " mending the fold after the sheep is lost ", and then the confirmation that terminal inputs user on the screen of terminal
Message " mending the fold after the sheep is lost " carries out the matching analysis with " mending the fold after the sheep is lost " in speech verification message, unlocks and currently should if matching is correct
With program, then after 30 minutes, terminal again locks current application program;Afterwards, if user still wants to answer using current
With program, then also need to be unlocked current application program, then repeat step S11- steps S14.
In step S144, however, it is determined that the touch information is mismatched with the checking information, then is played with preset times
Object information corresponding with the checking information.
In this step, terminal is if it is determined that touch information is mismatched with checking information, and then terminal will be with checking information pair
The object information answered plays multiple, and current number of times can be preset.Now it is not carried out step S143.
For example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be write out into
Language is mended the fold after the sheep is lost " so that user writes answer " mending the fold after the sheep is lost ", and then the confirmation that terminal inputs user on the screen of terminal
Message " mending the fold after the sheep is lost " carries out the matching analysis with " mending the fold after the sheep is lost " in speech verification message, if matching is incorrect, and terminal will
" mending the fold after the sheep is lost " shows once.
Again for example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be explained
Pretend to prepare to advance along one path the meaning advanced secretly by an unknown path ", user writes answer on the screen of terminal, or user inputs voice to terminal, from
And the explanation that terminal advances secretly by an unknown path the confirmation message received and pretending to prepare to advance along one path of prestoring carries out the matching analysis, if matching is not just
Really, then the explanation that terminal " will pretend to prepare to advance along one path and advance secretly by an unknown path " is played multiple.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence
Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program
Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The touch for receiving user's transmission is anti-
Feedforward information and/or voice feedback information, wherein, it is that user inputs, voice feedback according to checking message to touch feedback information
Information is that user sends according to checking message;Judge whether touch information matches with checking information;If it is determined that touch information
Matched with checking information, then unlock current application program;If it is determined that touch information is mismatched with checking information, then with preset times
Play object information corresponding with checking information.Excessive game class is used so as to be not intended to underage users in guardian
Type, application program of audio frequency and video type etc., it is desirable alternatively to which underage users can also learn to arrive when using application program
When thing, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is two
It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent during secondary identification user
The matching analysis is carried out with checking message, goes to determine whether to unlock current application program;Also, in touch information and checking information not
When matching, object information corresponding with checking information is played with preset times.And then cause underage users applying journey
Learnt simultaneously when sequence.
Fig. 3 is a kind of block diagram of application program tripper embodiment three according to an exemplary embodiment.Reference
Fig. 3, the device includes:
Receiving module 31, is configured as receiving the unlocking request for current application program that user sends;
Judge module 32, is configured as according to the unlocking request, and whether judge the user is secondary identification user;
Pushing module 33, be configured as if it is determined that user be secondary identification user, then push with the current application program
Corresponding checking message, wherein, the checking message includes word and verifies message and/or speech verification message;
Matching module 34, is configured as receiving the confirmation message that user sends, and judge that the confirmation message is tested with described
Whether card message matches, to determine whether to unlock the current application program.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment one in be described in detail, explanation will be not set forth in detail herein.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence
Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program
Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The confirmation for receiving user's transmission disappears
Breath, and judge whether confirmation message matches with checking message, to determine whether to unlock current application program.So that in guardian simultaneously
It is not intended to underage users and uses excessive type of play, application program of audio frequency and video type etc., it is desirable alternatively to underage users
When can also learning to thing when using application program, terminal may determine that the user of solution locked application is
No is secondary identification user, when it is determined that user is secondary identification user, is that user pushes word checking message and/or voice is tested
Message is demonstrate,proved, so that the confirmation message that user is sent carries out the matching analysis with checking message, goes to determine whether to unlock current application
Program.And then underage users are learnt simultaneously when application program.
On the basis of the embodiment shown in above-mentioned Fig. 3, Fig. 4 is one kind application journey according to an exemplary embodiment
The block diagram of sequence tripper example IV.Reference picture 4, the matching module 34, including:
Receiving submodule 341, is configured as receiving touch feedback information and/or the voice feedback information that user sends, its
In, the touch feedback information user inputs according to the checking message, and the voice feedback information is described
User sends according to the checking message;
Judging submodule 342, is configured as judging whether the touch information matches with the checking information;
Submodule 343 is unlocked, is configured as if it is determined that the touch information is matched with the checking information, then unblock is described
Current application program.
Wherein, the unblock submodule 343, is specifically configured to:
If it is determined that the touch information is matched with the checking information, then the current application journey is unlocked with preset time
Sequence, so that the current application program is locked again after the preset time.
The matching module 34, in addition to:
Submodule 344 is played, is configured as if it is determined that the touch information is mismatched with the checking information, then with default
Number of times plays object information corresponding with the checking information.
The judge module 32, is specifically configured to:
According to the unlocking request, whether be the user that with present terminal binds, to judge the use if judging the user
Whether family is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described
Secondary identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary
Recognize user.
The receiving module 31, is specifically configured to:
The unlocking request produced during the current application program shown on user's touch terminal screen is obtained, it is described
Unlocking request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice letter
Breath.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment two in be described in detail, explanation will be not set forth in detail herein.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence
Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program
Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The touch for receiving user's transmission is anti-
Feedforward information and/or voice feedback information, wherein, it is that user inputs, voice feedback according to checking message to touch feedback information
Information is that user sends according to checking message;Judge whether touch information matches with checking information;If it is determined that touch information
Matched with checking information, then unlock current application program;If it is determined that touch information is mismatched with checking information, then with preset times
Play object information corresponding with checking information.Excessive game class is used so as to be not intended to underage users in guardian
Type, application program of audio frequency and video type etc., it is desirable alternatively to which underage users can also learn to arrive when using application program
When thing, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is two
It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent during secondary identification user
The matching analysis is carried out with checking message, goes to determine whether to unlock current application program;Also, in touch information and checking information not
When matching, object information corresponding with checking information is played with preset times.And then cause underage users applying journey
Learnt simultaneously when sequence.
Fig. 5 is a kind of block diagram of the entity of terminal according to an exemplary embodiment.Reference picture 5, the terminal can be with
It is implemented as:Processor 51, and it is configured as storing the memory 52 of processor-executable instruction;
Wherein, the processor 51 is configured as:Receive the unlocking request for current application program that user sends;Root
Whether according to the unlocking request, it is secondary identification user to judge the user;If it is determined that user is secondary identification user, then push
Checking message corresponding with the current application program, wherein, the checking message includes word and verifies that message and/or voice are tested
Demonstrate,prove message;The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, to determine
Whether the current application program is unlocked.
In the above-described embodiments, it should be appreciated that the processor can be CPU (English:Central
Processing Unit, referred to as:CPU), it can also be other general processors, digital signal processor (English:Digital
Signal Processor, referred to as:DSP), application specific integrated circuit (English:Application Specific Integrated
Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor can also be any conventional place
Device etc. is managed, and foregoing memory can be read-only storage (English:Read-only memory, abbreviation:ROM), deposit at random
Access to memory (English:Random access memory, referred to as:RAM), flash memory, hard disk or solid state hard disc.SIM
Card is also referred to as subscriber identification card, smart card, and digital mobile telephone must load onto this card and can use.I.e. in computer chip
On store the information of digital mobile phone client, the content such as the key of encryption and the telephone directory of user.With reference to of the invention real
The step of applying the method disclosed in example can be embodied directly in hardware processor and perform completion, or with the hardware in processor and
Software module combination performs completion.
On the terminal in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
It is described in detail with the embodiment of device, explanation will be not set forth in detail herein.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence
Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program
Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The confirmation for receiving user's transmission disappears
Breath, and judge whether confirmation message matches with checking message, to determine whether to unlock current application program.So that in guardian simultaneously
It is not intended to underage users and uses excessive type of play, application program of audio frequency and video type etc., it is desirable alternatively to underage users
When can also learning to thing when using application program, terminal may determine that the user of solution locked application is
No is secondary identification user, when it is determined that user is secondary identification user, is that user pushes word checking message and/or voice is tested
Message is demonstrate,proved, so that the confirmation message that user is sent carries out the matching analysis with checking message, goes to determine whether to unlock current application
Program.And then underage users are learnt simultaneously when application program.
Fig. 6 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.For example, terminal device 800 can
To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for
Body equipment, personal digital assistant etc..
Reference picture 6, terminal device 800 can include following one or more assemblies:Processing assembly 802, memory 804,
Power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814,
And communication component 816.
The integrated operation of the usual control terminal equipment 800 of processing assembly 802, such as with display, call, data are led to
Letter, the camera operation operation associated with record operation.Processing assembly 802 can include one or more processors 820 to hold
Row instruction, to complete all or part of step of above-mentioned method.In addition, processing assembly 802 can include one or more moulds
Block, is easy to the interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, with
Facilitate the interaction between multimedia groupware 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in terminal device 800.These data
Example include the instruction of any application program or method for being used to operate on terminal device 800, contact data, telephone directory
Data, message, picture, video etc..Memory 804 can by any kind of volatibility or non-volatile memory device or it
Combination realize that such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable
Except programmable read only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, soon
Flash memory, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal device 800.Power supply module 806 can include power supply pipe
Reason system, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between the terminal device 800 and user.
In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface
Plate, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch
Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip
The border of action, but also the detection duration related to the touch or slide and pressure.In certain embodiments,
Multimedia groupware 808 includes a front camera and/or rear camera.When terminal device 800 is in operator scheme, such as clap
When taking the photograph pattern or video mode, front camera and/or rear camera can receive the multi-medium data of outside.It is each preposition
Camera and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike
Wind (MIC), when terminal device 800 is in operator scheme, when such as call model, logging mode and speech recognition mode, microphone
It is configured as receiving external audio signal.The audio signal received can be further stored in memory 804 or via logical
Letter component 816 is sent.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 is provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, the state for providing various aspects for terminal device 800
Assess.For example, sensor cluster 814 can detect opening/closed mode of terminal device 800, the relative positioning of component, example
As described component be terminal device 800 display and keypad, sensor cluster 814 can also detect terminal device 800 or
The position of 800 1 components of terminal device changes, the existence or non-existence that user contacts with terminal device 800, terminal device 800
The temperature change of orientation or acceleration/deceleration and terminal device 800.Sensor cluster 814 can include proximity transducer, be configured
For the presence of object near being detected in not any physical contact.Sensor cluster 814 can also include optical sensor,
Such as CMOS or ccd image sensor, for being used in imaging applications.In certain embodiments, the sensor cluster 814 may be used also
With including acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal device 800 and other equipment.
Terminal device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Show at one
In example property embodiment, communication component 816 receives broadcast singal or broadcast from external broadcasting management system via broadcast channel
Relevant information.In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, short to promote
Cheng Tongxin.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal device 800 can be by one or more application specific integrated circuits (ASIC), number
Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of terminal device 800.Example
Such as, the non-transitorycomputer readable storage medium can be ROM, it is random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device is performed so that mobile terminal is able to carry out a kind of application program unlocking method, and methods described includes:
Receive the unlocking request for current application program that user sends;
Whether according to the unlocking request, it is secondary identification user to judge the user;
If it is determined that user is secondary identification user, then checking message corresponding with the current application program is pushed, wherein,
The checking message includes word and verifies message and/or speech verification message;
The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, with true
It is fixed whether to unlock the current application program.
Those skilled in the art will readily occur to its of the present invention after considering specification and putting into practice invention disclosed herein
Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or
Person's adaptations follow the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.
Claims (13)
1. a kind of application program unlocking method, it is characterised in that including:
Receive the unlocking request for current application program that user sends;
Whether according to the unlocking request, it is secondary identification user to judge the user;
If it is determined that user is secondary identification user, then checking message corresponding with the current application program is pushed, wherein, it is described
Verify that message includes word and verifies message and/or speech verification message;
The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, to determine to be
The no unblock current application program.
2. according to the method described in claim 1, it is characterised in that described to receive the confirmation message that user sends, and judge institute
State whether confirmation message matches with the checking message, to determine whether to unlock the current application program, including:
Touch feedback information and/or voice feedback information that user sends are received, wherein, the touch feedback information is used to be described
Family is inputted according to the checking message, and the voice feedback information sends for the user according to the checking message
's;
Judge whether the touch information matches with the checking information;
If it is determined that the touch information is matched with the checking information, then the current application program is unlocked.
3. method according to claim 2, it is characterised in that the unblock current application program, including:
The current application program is unlocked with preset time so that the current application program after the preset time again
It is locked.
4. method according to claim 2, it is characterised in that methods described, in addition to:
If it is determined that the touch information is mismatched with the checking information, then play corresponding with the checking information with preset times
Object information.
5. according to the method described in claim 1, it is characterised in that described according to the unlocking request, judge that the user is
No is secondary identification user, including:
Whether according to the unlocking request, it is the user bound with present terminal to judge the user, to judge that the user is
No is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described secondary
Identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary identification
User.
6. the method according to claim any one of 1-5, it is characterised in that what the reception user sent answers for current
With the unlocking request of program, including:
Obtain the unlocking request produced during the current application program shown on user's touch terminal screen, the unblock
Request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice messaging.
7. a kind of application program tripper, it is characterised in that including:
Receiving module, is configured as receiving the unlocking request for current application program that user sends;
Judge module, is configured as according to the unlocking request, and whether judge the user is secondary identification user;
Pushing module, is configured as if it is determined that user is secondary identification user, then push is corresponding with the current application program
Message is verified, wherein, the checking message includes word and verifies message and/or speech verification message;
Matching module, is configured as receiving the confirmation message that user sends, and judge the confirmation message and the checking message
Whether match, to determine whether to unlock the current application program.
8. device according to claim 7, it is characterised in that the matching module, including:
Receiving submodule, is configured as receiving touch feedback information and/or the voice feedback information that user sends, wherein, it is described
Touch the feedback information user according to it is described checking message and input, the voice feedback information for the user according to
It is described to verify message and send;
Judging submodule, is configured as judging whether the touch information matches with the checking information;
Submodule is unlocked, is configured as if it is determined that the touch information match with the checking information, then unlocks described current answer
Use program.
9. device according to claim 8, it is characterised in that the unblock submodule, is specifically configured to:
If it is determined that the touch information is matched with the checking information, then the current application program is unlocked with preset time, with
The current application program is set to be locked again after the preset time.
10. device according to claim 8, it is characterised in that the matching module, in addition to:
Submodule is played, is configured as if it is determined that the touch information and checking information mismatch, then broadcast with preset times
Put object information corresponding with the checking information.
11. device according to claim 7, it is characterised in that the judge module, is specifically configured to:
Whether according to the unlocking request, it is the user bound with present terminal to judge the user, to judge that the user is
No is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described secondary
Identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary identification
User.
12. the device according to claim any one of 7-11, it is characterised in that the receiving module, is specifically configured to:
Obtain the unlocking request produced during the current application program shown on user's touch terminal screen, the unblock
Request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice messaging.
13. a kind of terminal, it is characterised in that including:
Processor, and for storing the memory of processor-executable instruction;
Wherein, the processor is configured as:Receive the unlocking request for current application program that user sends;According to described
Whether unlocking request, it is secondary identification user to judge the user;If it is determined that user be secondary identification user, then push with it is described
The corresponding checking message of current application program, wherein, the checking message includes word and verifies that message and/or speech verification disappear
Breath;The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, to determine whether
Unlock the current application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710233522.XA CN107145771B (en) | 2017-04-11 | 2017-04-11 | Application program unlocking method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710233522.XA CN107145771B (en) | 2017-04-11 | 2017-04-11 | Application program unlocking method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107145771A true CN107145771A (en) | 2017-09-08 |
CN107145771B CN107145771B (en) | 2021-03-16 |
Family
ID=59774638
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710233522.XA Active CN107145771B (en) | 2017-04-11 | 2017-04-11 | Application program unlocking method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107145771B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108111901A (en) * | 2017-12-15 | 2018-06-01 | 广州视源电子科技股份有限公司 | Program locking method and system |
CN109063033A (en) * | 2018-07-16 | 2018-12-21 | 佛山市影腾科技有限公司 | A kind of method, apparatus and terminal of search for application |
CN112367432A (en) * | 2018-03-16 | 2021-02-12 | 卓中朝 | Data viewing method based on double verification |
CN116193020A (en) * | 2023-04-27 | 2023-05-30 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104038502A (en) * | 2014-06-24 | 2014-09-10 | 五八同城信息技术有限公司 | Verification method and system |
CN105224838A (en) * | 2015-09-28 | 2016-01-06 | 广东欧珀移动通信有限公司 | A kind of user authority control method based on recognition of face and system |
CN105809005A (en) * | 2016-03-29 | 2016-07-27 | 四川效率源信息安全技术股份有限公司 | Method for locking or unlocking computer screen based on fingerprints |
-
2017
- 2017-04-11 CN CN201710233522.XA patent/CN107145771B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104038502A (en) * | 2014-06-24 | 2014-09-10 | 五八同城信息技术有限公司 | Verification method and system |
CN105224838A (en) * | 2015-09-28 | 2016-01-06 | 广东欧珀移动通信有限公司 | A kind of user authority control method based on recognition of face and system |
CN105809005A (en) * | 2016-03-29 | 2016-07-27 | 四川效率源信息安全技术股份有限公司 | Method for locking or unlocking computer screen based on fingerprints |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108111901A (en) * | 2017-12-15 | 2018-06-01 | 广州视源电子科技股份有限公司 | Program locking method and system |
CN112367432A (en) * | 2018-03-16 | 2021-02-12 | 卓中朝 | Data viewing method based on double verification |
CN112367432B (en) * | 2018-03-16 | 2021-11-26 | 深圳市酷迈网络科技有限公司 | Data viewing method based on double verification |
CN109063033A (en) * | 2018-07-16 | 2018-12-21 | 佛山市影腾科技有限公司 | A kind of method, apparatus and terminal of search for application |
CN116193020A (en) * | 2023-04-27 | 2023-05-30 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
CN116193020B (en) * | 2023-04-27 | 2023-08-11 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
Also Published As
Publication number | Publication date |
---|---|
CN107145771B (en) | 2021-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103916233B (en) | A kind of information ciphering method and device | |
CN104091376B (en) | Intelligent lock control method and apparatus thereof | |
CN104391870B (en) | Logistics information acquisition methods and device | |
CN104216742B (en) | Brush machine control method and device based on password | |
CN107145771A (en) | application program unlocking method, device and terminal | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN104093119B (en) | unlocking method and device | |
CN104484593B (en) | terminal verification method and device | |
CN106156561A (en) | Application locking method, application unlocking method and a device | |
CN105631254B (en) | Unlocking method and tripper | |
CN106375096A (en) | Short message verification method and device | |
CN107729000A (en) | Application program installation kit generation method and device | |
CN106600768A (en) | Intelligent door lock authentication method, device and terminal | |
CN107733872A (en) | Information Method of printing and device | |
CN107230060A (en) | The method and apparatus that a kind of account is reported the loss | |
CN106919283A (en) | The touch event processing method of terminal, device and terminal | |
CN106060027B (en) | Method, apparatus, equipment and the system verified based on identifying code | |
CN106126082A (en) | Control the method for terminal, device and terminal | |
CN106656746A (en) | Information output method and device | |
CN104468581A (en) | Method and device for logging into application program | |
CN109254661A (en) | Image display method, device, storage medium and electronic equipment | |
CN107819740A (en) | Verification method, terminal device, audio amplifier and the server of terminal device | |
CN107622189A (en) | Optimize the method and apparatus of unlocked by fingerprint | |
CN107341657A (en) | Payment process method, apparatus and terminal based on application program | |
CN107562500A (en) | Debugging apparatus, method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |