CN107145771A - application program unlocking method, device and terminal - Google Patents

application program unlocking method, device and terminal Download PDF

Info

Publication number
CN107145771A
CN107145771A CN201710233522.XA CN201710233522A CN107145771A CN 107145771 A CN107145771 A CN 107145771A CN 201710233522 A CN201710233522 A CN 201710233522A CN 107145771 A CN107145771 A CN 107145771A
Authority
CN
China
Prior art keywords
user
application program
message
checking
current application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710233522.XA
Other languages
Chinese (zh)
Other versions
CN107145771B (en
Inventor
杨冬东
顾凌华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710233522.XA priority Critical patent/CN107145771B/en
Publication of CN107145771A publication Critical patent/CN107145771A/en
Application granted granted Critical
Publication of CN107145771B publication Critical patent/CN107145771B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure is directed to a kind of application program unlocking method, device and terminal, wherein, this method includes:Receive the unlocking request for current application program that user sends;If it is determined that user is secondary identification user, then checking message corresponding with current application program is pushed, checking message includes word and verifies message and/or speech verification message;The confirmation message that user sends is received, judges whether confirmation message matches with checking message, to determine whether to unlock current application program.Underage users excessive use application program etc. is not intended in guardian, or when wishing that underage users can also learn to thing when using application program, when it is determined that user is secondary identification user, word checking message and/or speech verification message are pushed for user, the confirmation message that user is sent carries out the matching analysis with checking message, goes to determine whether to unlock current application program.And then underage users are learnt simultaneously when application program.

Description

Application program unlocking method, device and terminal
Technical field
This disclosure relates to field of terminal technology, more particularly to application program unlocking method, device and terminal.
Background technology
With the development of terminal technology, terminal has been widely used in the live and work of people.In terminal Also various types of application programs, the application program of such as office-type, the application program of management type, game have been mounted with The application program of type, the application program of video, application program of music type etc..
In correlation technique, user is if necessary to enter in terminal, and the application program gone in using terminal, user can be direct The main button of terminal is selected, or is entered by way of unlocked by fingerprint, speech unlocking in terminal.
But in correlation technique, if user's underage users, its guardian is not intended to underage users and used excessively Type of play, the application program of audio frequency and video type etc., it is desirable alternatively to underage users also may be used when using application program To learn to arrive thing, so as to how to meet this portion requirements of adult human user so that underage users are when application program Learnt simultaneously, the problem of needing to solve as one.
The content of the invention
Excessive type of play, sound are used to overcome its guardian present in correlation technique to be not intended to underage users Application program of video type etc., it is desirable alternatively to which underage users can also learn to thing to ask when using application program Topic, the disclosure provides a kind of application program unlocking method, device and terminal.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of application program unlocking method, including:
Receive the unlocking request for current application program that user sends;
Whether according to the unlocking request, it is secondary identification user to judge the user;
If it is determined that user is secondary identification user, then checking message corresponding with the current application program is pushed, wherein, The checking message includes word and verifies message and/or speech verification message;
The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, with true It is fixed whether to unlock the current application program.
Further, it is described to receive the confirmation message that user sends, and judge the confirmation message and the checking message Whether match, to determine whether to unlock the current application program, including:
Touch feedback information and/or voice feedback information that user sends are received, wherein, the touch feedback information is institute State user to be inputted according to the checking message, the voice feedback information is sent out for the user according to the checking message Go out;
Judge whether the touch information matches with the checking information;
If it is determined that the touch information is matched with the checking information, then the current application program is unlocked.
Further, the unblock current application program, including:
The current application program is unlocked with preset time, so that the current application program is after the preset time It is locked again.
Further, methods described, in addition to:
If it is determined that the touch information is mismatched with the checking information, then played and the checking information with preset times Corresponding object information.
Further, whether described according to the unlocking request, it is secondary identification user to judge the user, including:
According to the unlocking request, whether be the user that with present terminal binds, to judge the use if judging the user Whether family is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described Secondary identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary Recognize user.
Further, the unlocking request for current application program for receiving user's transmission, including:
The unlocking request produced during the current application program shown on user's touch terminal screen is obtained, it is described Unlocking request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice letter Breath.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the pin that user sends To the unlocking request of current application program;Whether according to unlocking request, it is secondary identification user to judge user;If it is determined that user is Secondary identification user, then push checking message corresponding with current application program, wherein, checking message includes word and verifies message And/or speech verification message;The confirmation message that user sends is received, and judges whether confirmation message matches with checking message, with Determine whether to unlock current application program.Excessive type of play, sound are used so as to be not intended to underage users in guardian Application program of video type etc., it is desirable alternatively to which underage users can also learn to arrive thing when using application program When, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is secondary identification It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent and checking during user Message carries out the matching analysis, goes to determine whether to unlock current application program.And then cause underage users application program when Wait and learnt simultaneously.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of application program tripper, including:
Receiving module, is configured as receiving the unlocking request for current application program that user sends;
Judge module, is configured as according to the unlocking request, and whether judge the user is secondary identification user;
Pushing module, be configured as if it is determined that user be secondary identification user, then push with the current application program pair The checking message answered, wherein, the checking message includes word and verifies message and/or speech verification message;
Matching module, is configured as receiving the confirmation message that user sends, and judge the confirmation message and the checking Whether message matches, to determine whether to unlock the current application program.
Further, the matching module, including:
Receiving submodule, is configured as receiving touch feedback information and/or the voice feedback information that user sends, wherein, The touch feedback information user inputs according to the checking message, and the voice feedback information is the user Sent according to the checking message;
Judging submodule, is configured as judging whether the touch information matches with the checking information;
Submodule is unlocked, is configured as if it is determined that the touch information is matched with the checking information, then unblock is described works as Preceding application program.
Further, the unblock submodule, is specifically configured to:
If it is determined that the touch information is matched with the checking information, then the current application journey is unlocked with preset time Sequence, so that the current application program is locked again after the preset time.
Further, the matching module, in addition to:
Submodule is played, is configured as if it is determined that the touch information is mismatched with the checking information, then with default time Number plays object information corresponding with the checking information.
Further, the judge module, is specifically configured to:
According to the unlocking request, whether be the user that with present terminal binds, to judge the use if judging the user Whether family is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described Secondary identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary Recognize user.
Further, the receiving module, is specifically configured to:
The unlocking request produced during the current application program shown on user's touch terminal screen is obtained, it is described Unlocking request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice letter Breath.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the pin that user sends To the unlocking request of current application program;Whether according to unlocking request, it is secondary identification user to judge user;If it is determined that user is Secondary identification user, then push checking message corresponding with current application program, wherein, checking message includes word and verifies message And/or speech verification message;The confirmation message that user sends is received, and judges whether confirmation message matches with checking message, with Determine whether to unlock current application program.Excessive type of play, sound are used so as to be not intended to underage users in guardian Application program of video type etc., it is desirable alternatively to which underage users can also learn to arrive thing when using application program When, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is secondary identification It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent and checking during user Message carries out the matching analysis, goes to determine whether to unlock current application program.And then cause underage users application program when Wait and learnt simultaneously.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of terminal, including:
Processor, and for storing the memory of processor-executable instruction;
Wherein, the processor is configured as:Receive the unlocking request for current application program that user sends;According to Whether the unlocking request, it is secondary identification user to judge the user;If it is determined that user be secondary identification user, then push with The corresponding checking message of the current application program, wherein, the checking message includes word and verifies message and/or speech verification Message;The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, to determine to be The no unblock current application program.
The technical scheme provided by this disclosed embodiment can include the following benefits:By receiving the pin that user sends To the unlocking request of current application program;Whether according to unlocking request, it is secondary identification user to judge user;If it is determined that user is Secondary identification user, then push checking message corresponding with current application program, wherein, checking message includes word and verifies message And/or speech verification message;The confirmation message that user sends is received, and judges whether confirmation message matches with checking message, with Determine whether to unlock current application program.Excessive type of play, sound are used so as to be not intended to underage users in guardian Application program of video type etc., it is desirable alternatively to which underage users can also learn to arrive thing when using application program When, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is secondary identification It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent and checking during user Message carries out the matching analysis, goes to determine whether to unlock current application program.And then cause underage users application program when Wait and learnt simultaneously.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the present invention Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of application program unlocking method embodiment one according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of application program unlocking method embodiment two according to an exemplary embodiment;
Fig. 3 is a kind of block diagram of application program tripper embodiment three according to an exemplary embodiment;
Fig. 4 is a kind of block diagram of application program tripper example IV according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the entity of terminal according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
Fig. 1 is a kind of flow chart of application program unlocking method embodiment one according to an exemplary embodiment, such as Shown in Fig. 1, application program unlocking method is used in terminal, and the terminal includes mobile terminal, personal terminal etc., such as touch screen hand Machine, tablet personal computer, PC etc., this method comprises the following steps.
In step s 11, the unlocking request for current application program that user sends is received.
In this step, each application program that terminal-pair is installed in the terminal adds lock function, and each applies journey Sequence needs user to be unlocked application program before it is being used.So, application program of the user in using terminal when Wait, it is necessary to be unlocked to current application program, user sends a unlocking request to current application program so that terminal is received The unlocking request.
In step s 12, whether according to the unlocking request, it is secondary identification user to judge the user.
In this step, after terminal receives the unlocking request, terminal needs the information in unlocking request, goes to sentence Whether disconnected current user is secondary identification user that terminal is set.Wherein, secondary identification user is the need for terminal is set It is secondary to carry out voice, the user of word checking.In the present embodiment, secondary identification user refers to underage users.
In step s 13, however, it is determined that user is secondary identification user, then pushes test corresponding with the current application program Message is demonstrate,proved, wherein, the checking message includes word and verifies message and/or speech verification message.
In this step, it is directed to secondary identification use because each application program that terminal has been directed in terminal is provided with The checking message at family, wherein, checking message can verify message for word, or speech verification message, or text Word verifies message and speech verification message.For from different application programs, different checking message can be set.Also, it is each The checking message of application program can be determined at random, or user can pre-enter to the checking message of each application program.
If terminal judges current user for secondary identification user, terminal then determines checking corresponding with current application program Message, also, terminal shows checking message corresponding with current application program.
For example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be write out into Language is made three calls at the thatched cottage ";Or, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be explained bright Repair the meaning that plank road advances secretly by an unknown path ";Or, terminal is if it is determined that user is secondary identification user, then terminal shows that word checking disappears Cease " title that Chinese four great classical masterpieces please be write out ".
In step S14, the confirmation message that user sends is received, and judge that the confirmation message is with the checking message No matching, to determine whether to unlock the current application program.
In this step, user is after seeing or hearing the checking message that terminal is pushed, and user can send to terminal Confirmation message, and then, the confirmation message that terminal sends user carries out the matching analysis with checking message, according to the knot of the matching analysis Fruit goes to determine whether to unlock current application program.
For example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be write out into Language is made three calls at the thatched cottage " so that user writes answer " making three calls at the thatched cottage ", and then the confirmation that terminal inputs user on the screen of terminal Message " making three calls at the thatched cottage " carries out the matching analysis with " making three calls at the thatched cottage " in speech verification message, unlocks and currently should if matching is correct Use program.
Again for example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be explained Pretend to prepare to advance along one path the meaning advanced secretly by an unknown path ", user writes answer on the screen of terminal, or user inputs voice to terminal, from And the explanation that terminal advances secretly by an unknown path the confirmation message received and pretending to prepare to advance along one path of prestoring carries out the matching analysis, if matching is correct Then unlock current application program.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The confirmation for receiving user's transmission disappears Breath, and judge whether confirmation message matches with checking message, to determine whether to unlock current application program.So that in guardian simultaneously It is not intended to underage users and uses excessive type of play, application program of audio frequency and video type etc., it is desirable alternatively to underage users When can also learning to thing when using application program, terminal may determine that the user of solution locked application is No is secondary identification user, when it is determined that user is secondary identification user, is that user pushes word checking message and/or voice is tested Message is demonstrate,proved, so that the confirmation message that user is sent carries out the matching analysis with checking message, goes to determine whether to unlock current application Program.And then underage users are learnt simultaneously when application program.
On the basis of the embodiment shown in above-mentioned Fig. 1, Fig. 2 is one kind application journey according to an exemplary embodiment The flow chart of sequence unlocking method embodiment two, as shown in Fig. 2 step S11 specific implementation includes:
The unlocking request produced during the current application program shown on user's touch terminal screen is obtained, it is described Unlocking request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice letter Breath.
In this step, user can click on the current application program of the display on terminal screen, and terminal can be got The user fingerprints information of user, so that terminal generates a unlocking request according to the user fingerprints information, terminal receives the use Family finger print information.Or, user sends voice messaging to terminal, is asked so that terminal generates a unblock according to the voice messaging Ask.
For example, user clicks on " the applying shop " shown on terminal screen, and terminal can get user fingerprints letter Breath;Or, user sends voice messaging " please open and apply shop " to terminal, and terminal determines whether to open according to the voice messaging Using the application program in shop.
Step S12 specific implementation includes:
According to the unlocking request, whether be the user that with present terminal binds, to judge the use if judging the user Whether family is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described Secondary identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary Recognize user.
In this step, due to having prestored the user profile with the user of terminal binding, Yong Huxin in terminal Breath can be finger print information, user speech etc..Terminal can by the user fingerprints information or voice messaging in unlocking request, with The user profile prestored is matched, so as to go to determine whether user is the user bound with present terminal;If it is determined that mismatch, Then determine that user is not the user bound with present terminal, it is secondary identification user to determine active user;If it is determined that matching, then really It is the user bound with present terminal to determine user, and it is not secondary identification user to determine active user.
Or, terminal has prestored a secondary identification user list, and the secondary identification user list includes The personal information of at least one secondary identification user, personal information can be finger print information, user speech etc..Terminal can be by User fingerprints information or voice messaging in unlocking request, are matched with the personal information in secondary identification user list, from And go to determine whether user is secondary identification user;If it is determined that matching, it is determined that active user is secondary identification user;If it is determined that Mismatch, it is determined that active user is not secondary identification user.
Step S14 is specifically included:
In step s 141, touch feedback information and/or voice feedback information that user sends are received, wherein, it is described to touch Touch the feedback information user to be inputted according to the checking message, the voice feedback information is the user according to institute State checking message and send.
In this step, user is after seeing or hearing the checking message that terminal is pushed, and user can send to terminal Confirmation message.Specifically, user is after seeing or hearing the checking message that terminal is pushed, and user is according to checking message to end Input touches feedback information in end;Or, user is after seeing or hearing the checking message that terminal is pushed, and user is according to checking Message inputs voice feedback information into terminal;Or, user inputs touch feedback information and voice feedback letter into terminal Breath.
In step S142, judge whether the touch information matches with the checking information.
In this step, terminal sends user touch feedback information and/or voice feedback information, enter with checking message Row the matching analysis, goes to determine whether to unlock current application program according to the result of the matching analysis.
In step S143, however, it is determined that the touch information is matched with the checking information, then the current application is unlocked Program.
Wherein, the unblock current application program, including:
The current application program is unlocked with preset time, so that the current application program is after the preset time It is locked again.
In this step, terminal is if it is determined that touch information is matched with checking information, and terminal can be by current application program solution Lock a period of time, the time is preset time;Then, current application program can be locked again after the preset lime.Now It is not carried out step S144.
For example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be write out into Language is mended the fold after the sheep is lost " so that user writes answer " mending the fold after the sheep is lost ", and then the confirmation that terminal inputs user on the screen of terminal Message " mending the fold after the sheep is lost " carries out the matching analysis with " mending the fold after the sheep is lost " in speech verification message, unlocks and currently should if matching is correct With program, then after 30 minutes, terminal again locks current application program;Afterwards, if user still wants to answer using current With program, then also need to be unlocked current application program, then repeat step S11- steps S14.
In step S144, however, it is determined that the touch information is mismatched with the checking information, then is played with preset times Object information corresponding with the checking information.
In this step, terminal is if it is determined that touch information is mismatched with checking information, and then terminal will be with checking information pair The object information answered plays multiple, and current number of times can be preset.Now it is not carried out step S143.
For example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be write out into Language is mended the fold after the sheep is lost " so that user writes answer " mending the fold after the sheep is lost ", and then the confirmation that terminal inputs user on the screen of terminal Message " mending the fold after the sheep is lost " carries out the matching analysis with " mending the fold after the sheep is lost " in speech verification message, if matching is incorrect, and terminal will " mending the fold after the sheep is lost " shows once.
Again for example, terminal is if it is determined that user is secondary identification user, then terminal plays speech verification message " please be explained Pretend to prepare to advance along one path the meaning advanced secretly by an unknown path ", user writes answer on the screen of terminal, or user inputs voice to terminal, from And the explanation that terminal advances secretly by an unknown path the confirmation message received and pretending to prepare to advance along one path of prestoring carries out the matching analysis, if matching is not just Really, then the explanation that terminal " will pretend to prepare to advance along one path and advance secretly by an unknown path " is played multiple.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The touch for receiving user's transmission is anti- Feedforward information and/or voice feedback information, wherein, it is that user inputs, voice feedback according to checking message to touch feedback information Information is that user sends according to checking message;Judge whether touch information matches with checking information;If it is determined that touch information Matched with checking information, then unlock current application program;If it is determined that touch information is mismatched with checking information, then with preset times Play object information corresponding with checking information.Excessive game class is used so as to be not intended to underage users in guardian Type, application program of audio frequency and video type etc., it is desirable alternatively to which underage users can also learn to arrive when using application program When thing, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is two It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent during secondary identification user The matching analysis is carried out with checking message, goes to determine whether to unlock current application program;Also, in touch information and checking information not When matching, object information corresponding with checking information is played with preset times.And then cause underage users applying journey Learnt simultaneously when sequence.
Fig. 3 is a kind of block diagram of application program tripper embodiment three according to an exemplary embodiment.Reference Fig. 3, the device includes:
Receiving module 31, is configured as receiving the unlocking request for current application program that user sends;
Judge module 32, is configured as according to the unlocking request, and whether judge the user is secondary identification user;
Pushing module 33, be configured as if it is determined that user be secondary identification user, then push with the current application program Corresponding checking message, wherein, the checking message includes word and verifies message and/or speech verification message;
Matching module 34, is configured as receiving the confirmation message that user sends, and judge that the confirmation message is tested with described Whether card message matches, to determine whether to unlock the current application program.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment one in be described in detail, explanation will be not set forth in detail herein.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The confirmation for receiving user's transmission disappears Breath, and judge whether confirmation message matches with checking message, to determine whether to unlock current application program.So that in guardian simultaneously It is not intended to underage users and uses excessive type of play, application program of audio frequency and video type etc., it is desirable alternatively to underage users When can also learning to thing when using application program, terminal may determine that the user of solution locked application is No is secondary identification user, when it is determined that user is secondary identification user, is that user pushes word checking message and/or voice is tested Message is demonstrate,proved, so that the confirmation message that user is sent carries out the matching analysis with checking message, goes to determine whether to unlock current application Program.And then underage users are learnt simultaneously when application program.
On the basis of the embodiment shown in above-mentioned Fig. 3, Fig. 4 is one kind application journey according to an exemplary embodiment The block diagram of sequence tripper example IV.Reference picture 4, the matching module 34, including:
Receiving submodule 341, is configured as receiving touch feedback information and/or the voice feedback information that user sends, its In, the touch feedback information user inputs according to the checking message, and the voice feedback information is described User sends according to the checking message;
Judging submodule 342, is configured as judging whether the touch information matches with the checking information;
Submodule 343 is unlocked, is configured as if it is determined that the touch information is matched with the checking information, then unblock is described Current application program.
Wherein, the unblock submodule 343, is specifically configured to:
If it is determined that the touch information is matched with the checking information, then the current application journey is unlocked with preset time Sequence, so that the current application program is locked again after the preset time.
The matching module 34, in addition to:
Submodule 344 is played, is configured as if it is determined that the touch information is mismatched with the checking information, then with default Number of times plays object information corresponding with the checking information.
The judge module 32, is specifically configured to:
According to the unlocking request, whether be the user that with present terminal binds, to judge the use if judging the user Whether family is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described Secondary identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary Recognize user.
The receiving module 31, is specifically configured to:
The unlocking request produced during the current application program shown on user's touch terminal screen is obtained, it is described Unlocking request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice letter Breath.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment two in be described in detail, explanation will be not set forth in detail herein.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The touch for receiving user's transmission is anti- Feedforward information and/or voice feedback information, wherein, it is that user inputs, voice feedback according to checking message to touch feedback information Information is that user sends according to checking message;Judge whether touch information matches with checking information;If it is determined that touch information Matched with checking information, then unlock current application program;If it is determined that touch information is mismatched with checking information, then with preset times Play object information corresponding with checking information.Excessive game class is used so as to be not intended to underage users in guardian Type, application program of audio frequency and video type etc., it is desirable alternatively to which underage users can also learn to arrive when using application program When thing, terminal may determine that whether the user of solution locked application is secondary identification user, it is determined that user is two It is that user pushes word checking message and/or speech verification message, so that the confirmation message that user is sent during secondary identification user The matching analysis is carried out with checking message, goes to determine whether to unlock current application program;Also, in touch information and checking information not When matching, object information corresponding with checking information is played with preset times.And then cause underage users applying journey Learnt simultaneously when sequence.
Fig. 5 is a kind of block diagram of the entity of terminal according to an exemplary embodiment.Reference picture 5, the terminal can be with It is implemented as:Processor 51, and it is configured as storing the memory 52 of processor-executable instruction;
Wherein, the processor 51 is configured as:Receive the unlocking request for current application program that user sends;Root Whether according to the unlocking request, it is secondary identification user to judge the user;If it is determined that user is secondary identification user, then push Checking message corresponding with the current application program, wherein, the checking message includes word and verifies that message and/or voice are tested Demonstrate,prove message;The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, to determine Whether the current application program is unlocked.
In the above-described embodiments, it should be appreciated that the processor can be CPU (English:Central Processing Unit, referred to as:CPU), it can also be other general processors, digital signal processor (English:Digital Signal Processor, referred to as:DSP), application specific integrated circuit (English:Application Specific Integrated Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor can also be any conventional place Device etc. is managed, and foregoing memory can be read-only storage (English:Read-only memory, abbreviation:ROM), deposit at random Access to memory (English:Random access memory, referred to as:RAM), flash memory, hard disk or solid state hard disc.SIM Card is also referred to as subscriber identification card, smart card, and digital mobile telephone must load onto this card and can use.I.e. in computer chip On store the information of digital mobile phone client, the content such as the key of encryption and the telephone directory of user.With reference to of the invention real The step of applying the method disclosed in example can be embodied directly in hardware processor and perform completion, or with the hardware in processor and Software module combination performs completion.
On the terminal in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method It is described in detail with the embodiment of device, explanation will be not set forth in detail herein.
The present embodiment is by receiving the unlocking request for current application program that user sends;According to unlocking request, sentence Whether disconnected user is secondary identification user;If it is determined that user is secondary identification user, then push corresponding with current application program Message is verified, wherein, checking message includes word and verifies message and/or speech verification message;The confirmation for receiving user's transmission disappears Breath, and judge whether confirmation message matches with checking message, to determine whether to unlock current application program.So that in guardian simultaneously It is not intended to underage users and uses excessive type of play, application program of audio frequency and video type etc., it is desirable alternatively to underage users When can also learning to thing when using application program, terminal may determine that the user of solution locked application is No is secondary identification user, when it is determined that user is secondary identification user, is that user pushes word checking message and/or voice is tested Message is demonstrate,proved, so that the confirmation message that user is sent carries out the matching analysis with checking message, goes to determine whether to unlock current application Program.And then underage users are learnt simultaneously when application program.
Fig. 6 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.For example, terminal device 800 can To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for Body equipment, personal digital assistant etc..
Reference picture 6, terminal device 800 can include following one or more assemblies:Processing assembly 802, memory 804, Power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, And communication component 816.
The integrated operation of the usual control terminal equipment 800 of processing assembly 802, such as with display, call, data are led to Letter, the camera operation operation associated with record operation.Processing assembly 802 can include one or more processors 820 to hold Row instruction, to complete all or part of step of above-mentioned method.In addition, processing assembly 802 can include one or more moulds Block, is easy to the interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, with Facilitate the interaction between multimedia groupware 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in terminal device 800.These data Example include the instruction of any application program or method for being used to operate on terminal device 800, contact data, telephone directory Data, message, picture, video etc..Memory 804 can by any kind of volatibility or non-volatile memory device or it Combination realize that such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable Except programmable read only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, soon Flash memory, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal device 800.Power supply module 806 can include power supply pipe Reason system, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between the terminal device 800 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip The border of action, but also the detection duration related to the touch or slide and pressure.In certain embodiments, Multimedia groupware 808 includes a front camera and/or rear camera.When terminal device 800 is in operator scheme, such as clap When taking the photograph pattern or video mode, front camera and/or rear camera can receive the multi-medium data of outside.It is each preposition Camera and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when terminal device 800 is in operator scheme, when such as call model, logging mode and speech recognition mode, microphone It is configured as receiving external audio signal.The audio signal received can be further stored in memory 804 or via logical Letter component 816 is sent.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 is provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, the state for providing various aspects for terminal device 800 Assess.For example, sensor cluster 814 can detect opening/closed mode of terminal device 800, the relative positioning of component, example As described component be terminal device 800 display and keypad, sensor cluster 814 can also detect terminal device 800 or The position of 800 1 components of terminal device changes, the existence or non-existence that user contacts with terminal device 800, terminal device 800 The temperature change of orientation or acceleration/deceleration and terminal device 800.Sensor cluster 814 can include proximity transducer, be configured For the presence of object near being detected in not any physical contact.Sensor cluster 814 can also include optical sensor, Such as CMOS or ccd image sensor, for being used in imaging applications.In certain embodiments, the sensor cluster 814 may be used also With including acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal device 800 and other equipment. Terminal device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Show at one In example property embodiment, communication component 816 receives broadcast singal or broadcast from external broadcasting management system via broadcast channel Relevant information.In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, short to promote Cheng Tongxin.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal device 800 can be by one or more application specific integrated circuits (ASIC), number Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of terminal device 800.Example Such as, the non-transitorycomputer readable storage medium can be ROM, it is random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device is performed so that mobile terminal is able to carry out a kind of application program unlocking method, and methods described includes:
Receive the unlocking request for current application program that user sends;
Whether according to the unlocking request, it is secondary identification user to judge the user;
If it is determined that user is secondary identification user, then checking message corresponding with the current application program is pushed, wherein, The checking message includes word and verifies message and/or speech verification message;
The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, with true It is fixed whether to unlock the current application program.
Those skilled in the art will readily occur to its of the present invention after considering specification and putting into practice invention disclosed herein Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or Person's adaptations follow the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (13)

1. a kind of application program unlocking method, it is characterised in that including:
Receive the unlocking request for current application program that user sends;
Whether according to the unlocking request, it is secondary identification user to judge the user;
If it is determined that user is secondary identification user, then checking message corresponding with the current application program is pushed, wherein, it is described Verify that message includes word and verifies message and/or speech verification message;
The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, to determine to be The no unblock current application program.
2. according to the method described in claim 1, it is characterised in that described to receive the confirmation message that user sends, and judge institute State whether confirmation message matches with the checking message, to determine whether to unlock the current application program, including:
Touch feedback information and/or voice feedback information that user sends are received, wherein, the touch feedback information is used to be described Family is inputted according to the checking message, and the voice feedback information sends for the user according to the checking message 's;
Judge whether the touch information matches with the checking information;
If it is determined that the touch information is matched with the checking information, then the current application program is unlocked.
3. method according to claim 2, it is characterised in that the unblock current application program, including:
The current application program is unlocked with preset time so that the current application program after the preset time again It is locked.
4. method according to claim 2, it is characterised in that methods described, in addition to:
If it is determined that the touch information is mismatched with the checking information, then play corresponding with the checking information with preset times Object information.
5. according to the method described in claim 1, it is characterised in that described according to the unlocking request, judge that the user is No is secondary identification user, including:
Whether according to the unlocking request, it is the user bound with present terminal to judge the user, to judge that the user is No is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described secondary Identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary identification User.
6. the method according to claim any one of 1-5, it is characterised in that what the reception user sent answers for current With the unlocking request of program, including:
Obtain the unlocking request produced during the current application program shown on user's touch terminal screen, the unblock Request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice messaging.
7. a kind of application program tripper, it is characterised in that including:
Receiving module, is configured as receiving the unlocking request for current application program that user sends;
Judge module, is configured as according to the unlocking request, and whether judge the user is secondary identification user;
Pushing module, is configured as if it is determined that user is secondary identification user, then push is corresponding with the current application program Message is verified, wherein, the checking message includes word and verifies message and/or speech verification message;
Matching module, is configured as receiving the confirmation message that user sends, and judge the confirmation message and the checking message Whether match, to determine whether to unlock the current application program.
8. device according to claim 7, it is characterised in that the matching module, including:
Receiving submodule, is configured as receiving touch feedback information and/or the voice feedback information that user sends, wherein, it is described Touch the feedback information user according to it is described checking message and input, the voice feedback information for the user according to It is described to verify message and send;
Judging submodule, is configured as judging whether the touch information matches with the checking information;
Submodule is unlocked, is configured as if it is determined that the touch information match with the checking information, then unlocks described current answer Use program.
9. device according to claim 8, it is characterised in that the unblock submodule, is specifically configured to:
If it is determined that the touch information is matched with the checking information, then the current application program is unlocked with preset time, with The current application program is set to be locked again after the preset time.
10. device according to claim 8, it is characterised in that the matching module, in addition to:
Submodule is played, is configured as if it is determined that the touch information and checking information mismatch, then broadcast with preset times Put object information corresponding with the checking information.
11. device according to claim 7, it is characterised in that the judge module, is specifically configured to:
Whether according to the unlocking request, it is the user bound with present terminal to judge the user, to judge that the user is No is secondary identification user;
Or,
According to the unlocking request, judge that the user is present in the secondary identification user list prestored, wherein, it is described secondary Identification user list includes the personal information of at least one secondary identification user, to judge whether the user is secondary identification User.
12. the device according to claim any one of 7-11, it is characterised in that the receiving module, is specifically configured to:
Obtain the unlocking request produced during the current application program shown on user's touch terminal screen, the unblock Request includes the user fingerprints information;
Or,
The unlocking request for current application program of user's input is received, the unlocking request includes voice messaging.
13. a kind of terminal, it is characterised in that including:
Processor, and for storing the memory of processor-executable instruction;
Wherein, the processor is configured as:Receive the unlocking request for current application program that user sends;According to described Whether unlocking request, it is secondary identification user to judge the user;If it is determined that user be secondary identification user, then push with it is described The corresponding checking message of current application program, wherein, the checking message includes word and verifies that message and/or speech verification disappear Breath;The confirmation message that user sends is received, and judges whether the confirmation message matches with the checking message, to determine whether Unlock the current application program.
CN201710233522.XA 2017-04-11 2017-04-11 Application program unlocking method and device and terminal Active CN107145771B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710233522.XA CN107145771B (en) 2017-04-11 2017-04-11 Application program unlocking method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710233522.XA CN107145771B (en) 2017-04-11 2017-04-11 Application program unlocking method and device and terminal

Publications (2)

Publication Number Publication Date
CN107145771A true CN107145771A (en) 2017-09-08
CN107145771B CN107145771B (en) 2021-03-16

Family

ID=59774638

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710233522.XA Active CN107145771B (en) 2017-04-11 2017-04-11 Application program unlocking method and device and terminal

Country Status (1)

Country Link
CN (1) CN107145771B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108111901A (en) * 2017-12-15 2018-06-01 广州视源电子科技股份有限公司 Program locking method and system
CN109063033A (en) * 2018-07-16 2018-12-21 佛山市影腾科技有限公司 A kind of method, apparatus and terminal of search for application
CN112367432A (en) * 2018-03-16 2021-02-12 卓中朝 Data viewing method based on double verification
CN116193020A (en) * 2023-04-27 2023-05-30 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system
CN105224838A (en) * 2015-09-28 2016-01-06 广东欧珀移动通信有限公司 A kind of user authority control method based on recognition of face and system
CN105809005A (en) * 2016-03-29 2016-07-27 四川效率源信息安全技术股份有限公司 Method for locking or unlocking computer screen based on fingerprints

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system
CN105224838A (en) * 2015-09-28 2016-01-06 广东欧珀移动通信有限公司 A kind of user authority control method based on recognition of face and system
CN105809005A (en) * 2016-03-29 2016-07-27 四川效率源信息安全技术股份有限公司 Method for locking or unlocking computer screen based on fingerprints

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108111901A (en) * 2017-12-15 2018-06-01 广州视源电子科技股份有限公司 Program locking method and system
CN112367432A (en) * 2018-03-16 2021-02-12 卓中朝 Data viewing method based on double verification
CN112367432B (en) * 2018-03-16 2021-11-26 深圳市酷迈网络科技有限公司 Data viewing method based on double verification
CN109063033A (en) * 2018-07-16 2018-12-21 佛山市影腾科技有限公司 A kind of method, apparatus and terminal of search for application
CN116193020A (en) * 2023-04-27 2023-05-30 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system
CN116193020B (en) * 2023-04-27 2023-08-11 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system

Also Published As

Publication number Publication date
CN107145771B (en) 2021-03-16

Similar Documents

Publication Publication Date Title
CN103916233B (en) A kind of information ciphering method and device
CN104091376B (en) Intelligent lock control method and apparatus thereof
CN104391870B (en) Logistics information acquisition methods and device
CN104216742B (en) Brush machine control method and device based on password
CN107145771A (en) application program unlocking method, device and terminal
CN104933351A (en) Information security processing method and information security processing device
CN104093119B (en) unlocking method and device
CN104484593B (en) terminal verification method and device
CN106156561A (en) Application locking method, application unlocking method and a device
CN105631254B (en) Unlocking method and tripper
CN106375096A (en) Short message verification method and device
CN107729000A (en) Application program installation kit generation method and device
CN106600768A (en) Intelligent door lock authentication method, device and terminal
CN107733872A (en) Information Method of printing and device
CN107230060A (en) The method and apparatus that a kind of account is reported the loss
CN106919283A (en) The touch event processing method of terminal, device and terminal
CN106060027B (en) Method, apparatus, equipment and the system verified based on identifying code
CN106126082A (en) Control the method for terminal, device and terminal
CN106656746A (en) Information output method and device
CN104468581A (en) Method and device for logging into application program
CN109254661A (en) Image display method, device, storage medium and electronic equipment
CN107819740A (en) Verification method, terminal device, audio amplifier and the server of terminal device
CN107622189A (en) Optimize the method and apparatus of unlocked by fingerprint
CN107341657A (en) Payment process method, apparatus and terminal based on application program
CN107562500A (en) Debugging apparatus, method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant