CN109040411A - A kind of mobile phone safe and operation method based on user fingerprints - Google Patents

A kind of mobile phone safe and operation method based on user fingerprints Download PDF

Info

Publication number
CN109040411A
CN109040411A CN201810956041.6A CN201810956041A CN109040411A CN 109040411 A CN109040411 A CN 109040411A CN 201810956041 A CN201810956041 A CN 201810956041A CN 109040411 A CN109040411 A CN 109040411A
Authority
CN
China
Prior art keywords
mobile phone
user
shutdown
card slot
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810956041.6A
Other languages
Chinese (zh)
Inventor
宋庚辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810956041.6A priority Critical patent/CN109040411A/en
Publication of CN109040411A publication Critical patent/CN109040411A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of mobile phone safe and operation method based on user fingerprints, closing key is arranged in mobile phone screen in a manner of contact of shutting down, mobile phone side is arranged in former power button in a manner of mechanical key mapping, specific method includes: touching by the closing key in mobile phone interface, identify that the touching of user presses number by duration and touching, and match with cleaning caching duration threshold values, cleaning caching number threshold values, shutdown duration threshold values and shutdown number threshold values, if successful match, execute corresponding operation.Closing key is arranged in software interface the present invention, shuts down so that user can not be realized by mechanical key mapping, while shutdown needs fingerprint authentication etc. to operate, and is stolen defensive position function and provides mobile phone positioning for a long time, novel in design, easy to use.

Description

A kind of mobile phone safe and operation method based on user fingerprints
Technical field
The present invention relates to technical field of mobile phones, especially a kind of mobile phone safe and operation method based on user fingerprints.
Background technique
Currently, mobile phone has become the requirement of people, either live, work etc., almost it be unable to do without mobile phone.But at present Mobile phone haves the shortcomings that very big can not be given for change in time after hand-set from stolen, will be shut down, can not mobile phone positioning.A few thing Mobile phone can be transformed into dereliction mobile phone rapidly, so that former mobile phone master by refreshing the modes such as cell phone system, replacement mobile phone card by personnel People again can not getting back mobile phone.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of mobile phone safe and fortune based on user fingerprints Row method solves the problem of being shut down rapidly after conventional mobile phone is stolen, can not position and give for change, and closing key is arranged the application In software interface, shuts down, while shutdown needs fingerprint authentication etc. to operate, be stolen so that user can not be realized by mechanical key mapping Defensive position function provides mobile phone positioning for a long time, novel in design, easy to use.
The purpose of the present invention is achieved through the following technical solutions:
Hand is arranged in a manner of contact of shutting down in closing key by a kind of mobile phone safe and operation method based on user fingerprints In machine screen, mobile phone side is arranged in former power button in a manner of mechanical key mapping, and specific method includes:
User is obtained by screen and touches shutdown key operation, and accumulative user touches the duration of closing key and in the short time Number of clicks;
If user touches the duration of closing key and number of clicks caches duration threshold values with cleaning and clears up caching click threshold values Match, then closes not used software program for a long time, and clear up system cache;
If threshold values phase is clicked in the duration and number of clicks and shutdown caching duration threshold values of user's touch closing key and shutdown Match, then requests user's checking finger print information, if finger print information is proved to be successful, and executes shutdown command, if authentication failed, into Enter screen lock state, and mobile phone real-time positioning information is uploaded into Cloud Server.
Preferably, when executing shutdown command, all operation programs of closing hand phone system, and remove the operation caching of system.
Preferably, setting mobile phone further includes the method for requesting typing fingerprint, specifically includes in non-typing finger print information:
Request typing finger print information order is sent to user;
It after user's typing finger print information, is sent to user and whether locks the request of mobile phone card card slot, if user agrees to locking hand Machine card card slot then when each typing fingerprint, just unlocks mobile phone card card slot, if user disagrees, does not execute locking mobile phone card card Slot operation.
Preferably, power-off operation is executed in user, and after verifying finger print information, automatic unlocking mobile phone card card slot.
Preferably, further include user by logging in Cloud Server account after setting mobile phone is lost, send control life to mobile phone It enables.
Preferably, after setting is switched on by power button, mobile phone clears up system cache again.
Preferably, setting mobile phone clicks the power button of mobile phone side in screen illuminating state, then it is simultaneously automatic clear to close screen Reason caching.
Preferably, setting mobile phone is in off-mode, long-pressing power button, and presses duration threshold values more than default touching, then opens automatically Machine.
Preferably, setting mobile phone further includes the method for unlocking mobile phone card card slot, is specifically included:
Unlock mobile phone card card slot request is initiated to mobile phone, and pops up requests verification finger print information interface;
After user's checking fingerprint, mobile phone card card slot is unlocked, extracts card slot, and mobile phone card is installed.
The invention has the benefit that
(1) tradition machinery closing key is arranged in system software the present invention, so that user can only execute pass out of system Machine operation, mechanical key can only realize the operation of booting and cleaning caching, avoid conventional mobile phone is stolen from being closed rapidly by criminal The problem of machine, lost mobile phone positions;
(2) present invention is provided with shutdown contact in mobile phone interface, clears up caching when clicking automatically, and long-pressing is then shut down, When shutdown and power-on operation, the handset program having been turned on can all be emptied, and remove the mobile phone caching in memory, be conducive to mention The operational efficiency of high mobile phone avoids mobile phone Caton;
(3) present invention when executing power-off operation, need fingerprint authentication, can not fingerprint authentication cannot then execute shutdown grasp Make, avoids criminal by shutdown and nip off mobile phone positioning;
(4) present invention can unlock mobile phone card card slot after fingerprint authentication, avoid anyone that from can replacing mobile phone card card Slot brings dangerous application risk to mobile phone user.
Detailed description of the invention
Fig. 1 is the schematic diagram that software contact is arranged in the present invention in screen;
Fig. 2 is the schematic diagram that the present invention executes power-off operation by secondary interface;
In figure, 10- closing key, 20- power button.
Specific embodiment
Technical solution of the present invention is described in further detail with reference to the accompanying drawing, but protection scope of the present invention is not limited to It is as described below.
Embodiment 1:
Closing key 10 is arranged in a kind of mobile phone safe and operation method based on user fingerprints in a manner of contact of shutting down In mobile phone screen, mobile phone side is arranged in former power button 20 in a manner of mechanical key mapping, and specific method includes:
User is obtained by screen and touches shutdown key operation, and accumulative user touches duration and the short time of closing key 10 Interior number of clicks;
If user touches the duration of closing key 10 and number of clicks caches duration threshold values with cleaning and clears up caching click valve Value matches, then closes not used software program for a long time, and clear up system cache;
If threshold values phase is clicked in the duration and number of clicks and shutdown caching duration threshold values of user's touch closing key 10 and shutdown Matching, then request user's checking finger print information, if finger print information is proved to be successful, and executes shutdown command, if authentication failed, Cloud Server is uploaded into screen lock state, and by mobile phone real-time positioning information.
Further, setting mobile phone further includes the method for requesting typing fingerprint in non-typing finger print information, specific to wrap It includes:
Request typing finger print information order is sent to user;
It after user's typing finger print information, is sent to user and whether locks the request of mobile phone card card slot, if user agrees to locking hand Machine card card slot then when each typing fingerprint, just unlocks mobile phone card card slot, if user disagrees, does not execute locking mobile phone card card Slot operation.
After hand-set from stolen originally, being operated first is shutdown.Since existing mobile phone shutdown is all complete by mechanical key At, so, even if not being mobile phone owner, also can quickly shut down in the short time.Maximum difficulty is brought to mobile phone owner after shutdown It is that mobile phone can not position in real time, while be also easy to be replaced mobile phone card, refreshes the operation such as cell phone system, so that mobile phone owner is again It also can not searching mobile phone.
Closing key 10 is built in screen by the application, by the way of software contact, so that shutdown is not necessarily to mechanical key, But need to touch the operation in mobile phone, and it also requires verifying user fingerprints information can.
As shown in Fig. 1, shutdown contact is arranged in the application on the screen, when user's finger does not touch the shutdown contact, Entire shutdown contact is pellucidity, does not influence the use of user, when user's touching is by shutdown contact, the transparency for contact of shutting down It gradually decreases, so that showing translucent.When user enters the software at full frame interface using mobile phone, then hiding automatically should Shutdown contact, avoids user misoperation from popping up fingerprint authentication section.
It should be further noted that the shutdown contact of the application includes the shapes such as round, rectangular or strip, work as user When touching the time more than preset time threshold values, fingerprint authentication interface can be popped up.Preset time threshold values described in the present embodiment is 3s, that is to say, that user's touching is temporally shorter than the 3s time, then clears up system cache automatically, and not will pop up fingerprint authentication interface, Shutdown will not be triggered simultaneously, when touching is temporally more than the 3s time, then contact transparency of shutting down reduces, after clearing up system cache, Automatic shutdown.
Embodiment 2:
The present embodiment on the basis of embodiment 1, as shown in Fig. 2, specifically includes and how to realize power-off operation.
It shuts down described in the present embodiment, by touching by the shutdown contact in mobile phone interface, and is more than default unused time threshold values, Then automatic trigger mobile phone shutdown before mobile phone shutdown, clears up system software program, and clear up system cache automatically.
It shuts down described in the present embodiment, further includes into the secondary operation interface of system setting, out of secondary operation interface Setting options in, select shutdown options, then pass through execution power-off operation in the secondary operation interfaces of shutdown options.
Embodiment 3:
The present embodiment specifically includes on the basis of embodiment 1 and embodiment 2 and how to verify finger print information.
The present embodiment needs typing finger print information before verifying finger print information, and typing finger print information includes pop-up typing Finger print information interface, pop-up guidance typing finger print information prompt and the operation such as typing fingerprint and verifying.
The present embodiment is when verifying finger print information, the fingerprint letter including obtaining user by the Home key below mobile phone screen It ceases, is compared after acquisition finger print information and with the information in fingerprint database, if comparing successfully, is proved to be successful, if comparing Failure, then pop up authentication failed.
The present embodiment obtains the fingerprint letter of user including the fingerprint collecting plate by mobile phone back when verifying finger print information Breath further includes denoising operation when obtaining user fingerprints information, and the impurity etc. on denoising operation discharge fingerprint collecting plate causes Phenomena such as fingerprint collecting deviation.
When verifying finger print information, the finger print information including obtaining user by mobile phone camera is obtained and is used the present embodiment After the finger print information of family, scheduling algorithm is compared by gray scale, calculates and compares out whether user fingerprints match.
The present embodiment is when verifying finger print information, the finger print information including obtaining user by mobile phone screen, i.e., in mobile phone Fingerprint Identification sensor is set below screen, when pressure sensor obtains the finger pressure information of user, then starts fingerprint recognition biography Sensor is scanned the user fingerprints on mobile phone screen.
Embodiment 4:
The present embodiment includes how to optimize system on the basis of embodiment 4 embodiment 1-.
Mobile phone described in the present embodiment realizes booting when opening, using the mechanical open switch 20 of mobile phone side, is shutting down When, shutdown is realized using built-in software contact or secondary operation interface.It needs to realize fingerprint authentication before shutdown.
The software program that mobile phone described in the present embodiment needs closing hand phone to have been turned on before being powered off, and remove in mobile phone EMS memory Cache information.
Mobile phone described in the present embodiment needs further to clear up Installed System Memory, and scan each software in booting Stub File and file to be deleted in program, clear up and delete.
Mobile phone described in the present embodiment can pass through when cell phone system Caton and software are out of control to execute power-off operation Preset mechanical key operating method, which is realized, closes screen and cleaning caching.
Mobile phone described in the present embodiment can not realize power-off operation by mechanical key, can only realize that closing screen and cleaning delays Operation is deposited, is conducive to after avoiding criminal from stealing mobile phone, the drawbacks of shutdown immediately by mechanical key.
Embodiment 5:
The present embodiment includes how locking mobile phone card card slot on the basis of embodiment 1 and embodiment 4.
It is provided with locking through-hole on mobile phone card card slot described in the present embodiment, adjustable locking card is provided in mobile phone shell Button can lock mobile phone card card slot or unlock mobile phone card card slot by the mobile realization of triggering locking buckle.
Mobile phone described in the present embodiment includes passing through unlocked by fingerprint mobile phone card card slot.When user needs to unlock mobile phone card card slot, It only needs to enter set interface, unlock mobile phone card card slot option is found out of set interface, from the second level of unlock mobile phone card card slot In interface, mobile phone card card slot is unlocked by verifying user fingerprints information, to pop up mobile phone card card slot, user carries out mobile phone card The operation such as replacement.
Mobile phone described in the present embodiment includes automatic unlocking mobile phone card card slot, when user executes power-off operation, user's checking After finger print information, mobile phone card card slot automatic unlocking, user can take out mobile phone card card slot at random after shut down.
Embodiment 6:
The present embodiment includes how to realize hand-set from stolen tracking on the basis of embodiment 5 embodiment 1-.
Mobile phone described in the present embodiment includes that closing key is arranged in system software interface, and shutdown is closed after needing fingerprint authentication Machine, booting are realized by mechanical keys.
After hand-set from stolen described in the present embodiment, user is by logging in Cloud Server account, by Cloud Server account The real-time positioning of searching mobile phone option acquisition mobile phone.
After hand-set from stolen described in the present embodiment, user is by logging in Cloud Server account, by Cloud Server account Low battery positions option, and all software programs are closed and removed to remote controlling mobile phone, low battery and positioning function is kept, convenient for real When to field feedback.
After hand-set from stolen described in the present embodiment, including theft personnel are unsuccessfully more than preset threshold by fingerprint authentication, then hand Machine locks screen automatically, and removes all program informations in mobile phone, and alarm to preset mobile phone account by Cloud Server.
After hand-set from stolen described in the present embodiment, including user sends unloading pre-set programs to stolen mobile phone by Cloud Server Order, specifically: user to stolen mobile phone send unloading Alipay software order, stolen mobile phone remove it is all operation it is soft It is automatic to unload Alipay software after part program, and keep low battery and automatic positioning mode.
The present invention avoids the problem that conventionally employed mechanical key shutdown, executes power-off operation after realizing fingerprint authentication, shuts down Operation caching is removed before operation, and mobile phone card card slot etc. is unlocked after fingerprint authentication, so that the mobile phone of user is other than oneself, it can not It is operated by stranger, after hand-set from stolen, the problem of being also avoided that conventional mobile phone shutdown, can not position, user can pass through Cloud Server Mobile phone is controlled, while stolen personnel can not execute shutdown to mobile phone.It is of the invention novel in design, it is cooperated using software and hardware Mode, solve the problems, such as that conventional mobile phone safe coefficient is low and mobile phone run it is slow.
A specific embodiment of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.

Claims (9)

1. a kind of mobile phone safe and operation method based on user fingerprints, which is characterized in that by closing key with the side for contact of shutting down Formula is arranged in mobile phone screen, and mobile phone side is arranged in former power button in a manner of mechanical key mapping, and specific method includes:
User, which is obtained, by screen touches shutdown key operation, and the duration of accumulative user's touch closing key and the point in the short time Hit number;
If user touches the duration of closing key and number of clicks caches with cleaning caching duration threshold values and cleaning and clicks threshold values phase Match, then closes not used software program for a long time, and clear up system cache;
If user touches the duration of closing key and number of clicks clicks threshold values with shutdown caching duration threshold values and shutdown and matches, User's checking finger print information is requested, if finger print information is proved to be successful, and executes shutdown command, if authentication failed, enters lock Screen state, and mobile phone real-time positioning information is uploaded into Cloud Server.
2. a kind of mobile phone safe and operation method based on user fingerprints according to claim 1, which is characterized in that execute pass When machine order, all operation programs of closing hand phone system, and remove the operation caching of system.
3. a kind of mobile phone safe and operation method based on user fingerprints according to claim 1, which is characterized in that setting hand Machine further includes the method for requesting typing fingerprint, specifically includes in non-typing finger print information:
Request typing finger print information order is sent to user;
It after user's typing finger print information, is sent to user and whether locks the request of mobile phone card card slot, if user agrees to locking mobile phone card Card slot then when each typing fingerprint, just unlocks mobile phone card card slot, if user disagrees, does not execute locking mobile phone card card slot behaviour Make.
4. a kind of mobile phone safe and operation method based on user fingerprints according to claim 1, which is characterized in that in user Power-off operation is executed, and after verifying finger print information, automatic unlocking mobile phone card card slot.
5. a kind of mobile phone safe and operation method based on user fingerprints according to claim 1, which is characterized in that setting hand After machine is lost, further includes user by logging in Cloud Server account, send control command to mobile phone.
6. a kind of mobile phone safe and operation method based on user fingerprints according to claim 1, which is characterized in that setting is logical After crossing power button booting, mobile phone clears up system cache again.
7. a kind of mobile phone safe and operation method based on user fingerprints according to claim 1, which is characterized in that setting hand Machine clicks the power button of mobile phone side in screen illuminating state, then closes screen and automatically cleaning caching.
8. a kind of mobile phone safe and operation method based on user fingerprints according to claim 1, which is characterized in that setting hand Machine is more than that duration threshold values is pressed in default touching in off-mode, long-pressing power button, then Auto Power On.
9. a kind of mobile phone safe and operation method based on user fingerprints according to claim 1, which is characterized in that setting hand Machine further includes the method for unlocking mobile phone card card slot, is specifically included:
Unlock mobile phone card card slot request is initiated to mobile phone, and pops up requests verification finger print information interface;
After user's checking fingerprint, mobile phone card card slot is unlocked, extracts card slot, and mobile phone card is installed.
CN201810956041.6A 2018-08-21 2018-08-21 A kind of mobile phone safe and operation method based on user fingerprints Pending CN109040411A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810956041.6A CN109040411A (en) 2018-08-21 2018-08-21 A kind of mobile phone safe and operation method based on user fingerprints

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810956041.6A CN109040411A (en) 2018-08-21 2018-08-21 A kind of mobile phone safe and operation method based on user fingerprints

Publications (1)

Publication Number Publication Date
CN109040411A true CN109040411A (en) 2018-12-18

Family

ID=64627571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810956041.6A Pending CN109040411A (en) 2018-08-21 2018-08-21 A kind of mobile phone safe and operation method based on user fingerprints

Country Status (1)

Country Link
CN (1) CN109040411A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110446162A (en) * 2019-07-13 2019-11-12 恒大智慧科技有限公司 A kind of router anti-lost method and system, computer readable storage medium
CN113032067A (en) * 2021-03-23 2021-06-25 深圳市沃特沃德信息有限公司 Hidden interface calling method and device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019777A (en) * 2012-11-28 2013-04-03 广东欧珀移动通信有限公司 Method and system for automatically cleaning background applications of mobile terminal
CN105224335A (en) * 2015-10-22 2016-01-06 上海斐讯数据通信技术有限公司 A kind of control method of Automatic clearance terminal device, system and terminal device
CN105472459A (en) * 2015-11-20 2016-04-06 四川长虹电器股份有限公司 Automatic optimization system and method of intelligent television system
CN105892853A (en) * 2016-03-31 2016-08-24 北京百纳威尔无线通信设备有限公司 Memory clearing method and terminal
CN106897594A (en) * 2017-01-04 2017-06-27 广东小天才科技有限公司 Method, system and terminal for realizing remote positioning of terminal
CN107728888A (en) * 2017-10-26 2018-02-23 竞技世界(北京)网络技术有限公司 A kind of android terminal virtual key implementation method
CN108400794A (en) * 2017-02-07 2018-08-14 南昌黑鲨科技有限公司 SIM card separation method, device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019777A (en) * 2012-11-28 2013-04-03 广东欧珀移动通信有限公司 Method and system for automatically cleaning background applications of mobile terminal
CN105224335A (en) * 2015-10-22 2016-01-06 上海斐讯数据通信技术有限公司 A kind of control method of Automatic clearance terminal device, system and terminal device
CN105472459A (en) * 2015-11-20 2016-04-06 四川长虹电器股份有限公司 Automatic optimization system and method of intelligent television system
CN105892853A (en) * 2016-03-31 2016-08-24 北京百纳威尔无线通信设备有限公司 Memory clearing method and terminal
CN106897594A (en) * 2017-01-04 2017-06-27 广东小天才科技有限公司 Method, system and terminal for realizing remote positioning of terminal
CN108400794A (en) * 2017-02-07 2018-08-14 南昌黑鲨科技有限公司 SIM card separation method, device and electronic equipment
CN107728888A (en) * 2017-10-26 2018-02-23 竞技世界(北京)网络技术有限公司 A kind of android terminal virtual key implementation method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110446162A (en) * 2019-07-13 2019-11-12 恒大智慧科技有限公司 A kind of router anti-lost method and system, computer readable storage medium
CN113032067A (en) * 2021-03-23 2021-06-25 深圳市沃特沃德信息有限公司 Hidden interface calling method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US10024081B2 (en) Door lock
US9359794B2 (en) Method for operating an intelligent door knob
US9725927B1 (en) System for intelligent door knob (handle)
US20170198497A1 (en) Padlock and cabinet lock
CN108898724A (en) Intelligent human-face identification lock
KR101229604B1 (en) Portable terminal device and method of judging communication permission thereof
CN109830023B (en) Intelligent building access control system
CN109040411A (en) A kind of mobile phone safe and operation method based on user fingerprints
CN207198943U (en) Finger vein identification access control system based on intelligent management
CN107730672A (en) A kind of face identification unit gate control system and control method
WO2018165942A1 (en) Terminal device and fingerprint recognition method
CN109508522B (en) Data clearing method, device, storage medium and terminal
US20200002977A1 (en) Door access device
EP3009950B1 (en) Method and apparatus for continuous and implicit local authentication of wireless mobile users based on dynamic profiling of conduct patterns
CN109854125A (en) A kind of safety cabinet and its method for unlocking
CN106529258A (en) Security management method and system for mobile equipment
CN102852400A (en) Coded lock system based on USB (universal serial bus) key and authentication control method thereof
CN105530357A (en) Gesture identity authentication system and method based on sensor on mobile phone
CN109410371A (en) Finger vein identification access control system based on intelligent management
CN204303055U (en) Embedded intelligence door-lock controller
CN105649469A (en) Dual-password control system for intelligent safe
CN202299716U (en) Security cabinet unlocking system based on vein recognition
CN101196775A (en) Computer power control system and method thereof
CN210836253U (en) Intelligent lock based on biological identification
CN211454675U (en) Intelligent door lock non-inductive unlocking system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218

RJ01 Rejection of invention patent application after publication