WO2016065895A1 - 一种终端解锁方法及终端 - Google Patents

一种终端解锁方法及终端 Download PDF

Info

Publication number
WO2016065895A1
WO2016065895A1 PCT/CN2015/080159 CN2015080159W WO2016065895A1 WO 2016065895 A1 WO2016065895 A1 WO 2016065895A1 CN 2015080159 W CN2015080159 W CN 2015080159W WO 2016065895 A1 WO2016065895 A1 WO 2016065895A1
Authority
WO
WIPO (PCT)
Prior art keywords
contact
terminal
unlocked
identifier
unlocking
Prior art date
Application number
PCT/CN2015/080159
Other languages
English (en)
French (fr)
Inventor
卢伟冰
Original Assignee
深圳市金立通信设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201410606501.4A external-priority patent/CN104462892A/zh
Priority claimed from CN201410606507.1A external-priority patent/CN104378502B/zh
Application filed by 深圳市金立通信设备有限公司 filed Critical 深圳市金立通信设备有限公司
Publication of WO2016065895A1 publication Critical patent/WO2016065895A1/zh
Priority to US15/156,588 priority Critical patent/US20160259925A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to the field of information security technologies, and in particular, to a terminal unlocking method and a terminal.
  • smartphones are becoming more and more popular in life and more and more functions. People can use smartphones to conduct business activities, contact friends and family, share personal life status information, etc., which makes individuals carried in smart phones. More and more privacy data, protecting privacy and preventing misuse are gradually being valued by users.
  • the mobile phone In order to protect personal privacy and prevent user misuse, the mobile phone usually has a locking function, that is, the mobile phone is in a locked state when it is in a standby state. When the user desires to use it, the mobile phone needs to be correctly unlocked before continuing to use the mobile phone normally. .
  • the mobile phone unlocking methods commonly used in the prior art include: long pressing a specific button to unlock, sliding unlocking, unlocking a key combination, unlocking a password, unlocking a nine-square grid, and the like.
  • the long-pressing specific button unlocking and sliding unlocking execution actions are simple and do not have the security function;
  • the button combination unlocking is generally applied to the old-fashioned function mobile phone, and for the smart phone with less mobile phone keys, the security of the key combination unlocking is not high;
  • the unlocking action is generally a simple action such as clicking or sliding. After the setting, the change will not change. The person around you can remember it, especially for the unlocking of the nine squares, because the screen will remain on the screen after sliding. Under the trace, other people can get the user's unlocking track according to the trace on the screen, and its security is also limited.
  • the embodiment of the invention provides a terminal unlocking method and a terminal, which can be displayed in the terminal unlocking interface.
  • the contact identifier set is used to obtain an unlocking instruction input by the user for the target contact identifier in the contact identifier set, and then the terminal is unlocked according to the judgment that the target contact identifier is the unlocked contact identifier, and the terminal lock screen is strengthened in the terminal.
  • the protection of privacy data improves the confidentiality and security of the terminal.
  • an embodiment of the present invention provides a method for unlocking a terminal, where the method includes:
  • a contact identifier set Displaying, in the terminal unlocking interface, a contact identifier set, where the contact identifier set includes a preset unlock contact identifier and an interference contact identifier;
  • an embodiment of the present invention provides a terminal, where the terminal includes:
  • a display unit configured to display a contact identifier set in the terminal unlocking interface, where the contact identifier set includes a preset unlocking contact identifier and an interference contact identifier;
  • An obtaining unit configured to acquire an unlocking instruction input by the user for the target contact identifier in the contact identifier set
  • a determining unit configured to determine whether the target contact identifier is an unlocked contact identifier
  • an unlocking unit configured to: when the target contact identifier is determined to be an unlocked contact identifier, unlock the terminal.
  • the embodiment of the present invention may display the contact identifier set in the terminal unlocking interface, and may also obtain an unlocking instruction input by the user for the target contact identifier in the contact identifier set, and then according to the judgment that the target contact identifier is the unlocked contact identifier, The terminal is unlocked, and the protection of the privacy data in the terminal by the terminal lock screen is enhanced, and the confidentiality and security of the terminal are improved.
  • FIG. 1 is a schematic flowchart of a method for unlocking a terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another terminal unlocking method according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a display unit displaying a contact identifier according to an embodiment of the present invention
  • FIG. 3b is a second schematic diagram of a display unit displaying a contact identifier according to an embodiment of the present disclosure
  • FIG. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
  • the terminal described in the embodiment of the present invention includes, but is not limited to, an electronic device such as a mobile phone, a tablet computer, a notebook computer, an in-vehicle electronic device, a palmtop computer, and a wearable smart device.
  • an electronic device such as a mobile phone, a tablet computer, a notebook computer, an in-vehicle electronic device, a palmtop computer, and a wearable smart device.
  • the terminal unlocking method and terminal provided by the embodiment of the present invention will be specifically described below with reference to FIG. 1 to FIG.
  • FIG. 1 is a schematic flowchart of a method for unlocking a terminal according to an embodiment of the present invention.
  • the method for unlocking a terminal may include the following steps:
  • the contact identifier set includes a preset unlock contact identifier and an interference contact identifier.
  • the terminal unlocking interface is presented on a display screen of the terminal, and the display screen may be a terminal touch screen capable of providing a user to perform a touch control operation, or may be a display screen having only a display function.
  • the terminal user wants to obtain more terminal application information or operate more terminal application functions, such as making a call, sending an email, or browsing a webpage. You need to enter the terminal unlocking interface to unlock the terminal to enter the terminal operation interface to make a call and send an email.
  • the terminal can only unlock the terminal if it detects that the user selects the unlocked contact identifier instead of the contact identifier.
  • the contact is from a contact list of instant messaging software such as QQ, mobile phone, Fetion, WeChat, and social software.
  • the contact list includes But not limited to: mobile phone address book, mail contact list, WeChat contact list, QQ contact list, Fetion contact list and list of friends and so on.
  • the contact identification includes, but is not limited to, a contact name, a contact nickname, a contact avatar, and the like.
  • the contact identifier set includes a plurality of contact identifiers, including a preset one unlock contact identifier and at least one preset interference contact identifier.
  • FIG. 3a a schematic diagram of the display unit displaying the contact identifier
  • FIG. 3b is a schematic diagram showing the second embodiment of the display unit displaying the contact identifier provided by the embodiment of the present invention, and is connected in the terminal lock screen interface.
  • the contact identifiers in the person identification set are displayed in the terminal unlocking interface on the terminal display screen in a floating manner or in an icon arrangement.
  • the user may perform an unlocking operation on the contact identifier set displayed in the terminal unlocking interface, where the unlocking operation includes the user selecting the target contact identifier, and inputting an unlocking instruction for the target contact identifier.
  • the target contact identifier is the contact identifier selected by the user in the contact identification set.
  • the unlocking instruction includes, but is not limited to, long pressing the target contact identifier, double-clicking the target contact identifier, clicking the target contact identifier, sliding the target contact identifier according to the preset trajectory, and long pressing the OK button to select the target contact. Person identification, double-click the OK button to select the target contact ID or click the OK button to select the target contact ID.
  • the user first selects one of the contact identifiers as the target contact identifier in the terminal unlocking interface. If the terminal display screen is a touch screen, the user can double-click the target contact identifier on the touch screen to complete the contact.
  • the target contact identifier in the person identification set inputs an unlocking instruction, and the terminal acquires the target contact identifier and the unlocking instruction when detecting that the user performs a double-click operation on the target contact identifier in the contact identifier set.
  • the terminal may preset the unlock contact and the interference contact when the terminal locks the screen, and then obtain the contact identifier of the unlock contact and the interference contact to form a contact identifier set and display the contact identifier set on the terminal unlock interface.
  • the contact identifier selected by the user in the process of performing the unlocking operation may be an unlocked contact identifier, or may be an interference contact identifier. Only when the target contact identifier selected by the user is the unlocked contact identifier, step S104 may be performed. Can be unlocked.
  • step S102 the target contact identifier in the set of contact identifiers by the user
  • the target contact identifier is obtained, and in this step, it is determined whether the target contact identifier is a preset unlocking contact identifier.
  • the terminal can be unlocked only when the target contact identifier described in step S103 is the unlocked contact identifier instead of the interference contact identifier, so that the user enters the terminal operation interface to obtain more terminal application information and the terminal application.
  • the target contact identifier described in step S103 is the unlocked contact identifier instead of the interference contact identifier, so that the user enters the terminal operation interface to obtain more terminal application information and the terminal application.
  • Features such as making calls, browsing the web, sharing information, and more.
  • the terminal may perform the following steps before performing step S101:
  • the communication event includes: an instant messaging event such as an email, a short message, a phone call, a chat, a message, and various social software communication events.
  • the processed communication event includes: a read email, a read short message, a received call or outgoing call, a replied chat record, and the like, at least a communication event that the user has viewed so that the user has an image.
  • the preset time of the terminal can be 24 hours, 12 hours or 6 hours, etc., and the communication busy event is easy to be confused and easy to forget for the communication event that occurred before 24 hours. The time should not be too long, and the user who is not busy in communication may not have processed the communication event within 6 hours, so the preset time should not be too short.
  • the terminal can provide the user with the function of manually setting the preset time, so the preset The time can also be set according to the user's willingness to enter the setting options provided by the terminal for the preset time.
  • the terminal enters the lock screen state, first query various instant communication events and social software communication events in the terminal, and then filter out the communication events that have been processed within the preset time, and finally obtain the communication events that have been processed within the preset time.
  • the corresponding contact is used as the set of unlocked contacts.
  • the preset time is 24 hours, and the mobile terminal enters the lock screen state at 12:00 on October 9th.
  • the mobile terminal queries the mobile phone call record to include: [150 ****3456, at 11:00 on October 9th, received calls], [150****3457, October 8th, 11:59, received calls], [150****3458, October At 15:00 on the 8th, I have received the call] and [150****3459, 10:00 on October 9th, missed calls] four call records, and the QQ mailbox inbox record in the mobile phone includes: [email protected], 9:00 on October 9th, read the mail], [[email protected], October 9th, 11:00, unread mail] two mail records; Among them [150****3457, October 8th, 11:59, received calls] is the processed communication event outside the preset time, [150****3459, October 9th, 10:00, not Answering calls] and [[email protected], October 9th, 11:00, unread mail] are communication events that are not processed within the preset time, and [150****3456, October 9th 11 :00, received calls], [150******3456
  • the terminal may provide a function for the user to manually select and unlock the contact set, so the terminal may acquire at least one contact manually selected by the user in the contact list as the unlocked contact set, for example, when the preset time has not been processed.
  • the communication event the terminal will send a text prompt message "Please select to unlock the contact" when it is about to enter the lock screen state and display it on the terminal display screen. If the display screen is a touch screen, when the user clicks on the text prompt information, the terminal is contacted.
  • the user can select at least one contact manually selected in the contact list, and the terminal acquires at least one contact manually selected by the user in the contact list as the unlocked contact set.
  • the terminal may select one of the unlocked contact sets as the unlocked contact according to the communication event generation time.
  • the time when the communication event is generated is shorter than the time when the terminal locks the screen. Deep, so the contact corresponding to the processed communication event closest to the terminal lock screen time can be preferentially selected as the unlock contact.
  • the terminal queries the contact 150****3456 in the contact set: 150****3456, 150****3458, and [email protected].
  • the communication event is that the received call that was received at 11:00 on October 9 is the latest processed communication event when the terminal lock screen is closed, then 150****3456 is selected as the unlock contact.
  • the terminal may obtain the terminal in this step.
  • One of the unlocked contact sets manually selected by the user is used as the unlocked contact.
  • one of the contacts in the contact set is randomly selected as the unlocked contact.
  • the contacts in the contact set are unlocked in step 11), and then at least one contact other than the set of unlocked contacts in the user contact list may be randomly selected.
  • the terminal may select, according to the type of the communication event corresponding to the unlocked contact, the selection of the interference contact in the contact list of the same type, for example, if the communication event corresponding to the unlocked contact is a voice call, the mobile terminal is on the mobile phone.
  • the address book performs the selection of the interference contact. If the communication event corresponding to the unlocked contact is a QQ mailbox mail, the mobile terminal selects the interference contact in the QQ mailbox contact list.
  • the terminal may determine an unlocking contact and an interference contact, and then obtain a contact identifier corresponding to the unlocked contact and the interference contact to form a contact identifier set.
  • the contact identifier includes but is not limited to: a contact name, a contact nickname, and a contact avatar.
  • the terminal can obtain the contact identifier set for displaying the unlocking operation performed by the user for the contact identifier set in the unlocking interface of the terminal.
  • the unlocking instruction input by the user for the target contact identifier in the contact identifier set is obtained by displaying the contact identifier set in the terminal unlocking interface, and determining that the target contact identifier is the unlocking contact identifier, and the terminal is Unlocking can enhance the protection of the privacy data of the terminal by the terminal lock screen, and improve the confidentiality and security of the terminal lock screen.
  • FIG. 2 is a schematic flowchart of another method for unlocking a terminal according to an embodiment of the present invention.
  • the method for unlocking a terminal as shown in the following figure may include the following steps:
  • step 11 For the step, refer to step 11) in the embodiment shown in FIG. 1 , and details are not described herein again.
  • the time when the communication event is generated is shorter than the time when the terminal locks the screen.
  • the priority corresponding to the processed communication event closest to the terminal lock screen time can be preferentially selected as the unlock contact.
  • the terminal queries the contact in the contact set: 150****3456, 150****3458, and [email protected].
  • the communication event corresponding to the person 150****3456 is that the received communication call at 11:00 on October 9 is the latest processed communication event when the terminal is locked, then 150****3456 is selected as the unlocking contact.
  • the type information of the processed communication event corresponding to the unlocked contact may be obtained.
  • step S205 the terminal unlocking interface is displayed to prompt the user to select the unlocked contact.
  • the type of the communication event includes but is not limited to : Various types of instant messaging and social software communications such as calls, text messages, emails, WeChat or video.
  • the communication event corresponding to the unlocked contact 150****3456 is a received call generated at 11:00 on October 9th, and the type of the processed communication event corresponding to the unlocked contact is the call.
  • the terminal may determine the manually selected unlocked contact.
  • the terminal may acquire one of the unlocked contact sets manually selected by the user as the unlocked contact.
  • the terminal may randomly select one of the contacts in the contact set to unlock the contact.
  • the contact list includes, but is not limited to, a mobile phone address book, a mail contact list, a WeChat contact list, a QQ contact list, a Fetion contact list, and a list of all friends, such as a list of instant messaging contacts. And a list of social software contacts.
  • the terminal After acquiring the various contact lists of the users in the terminal, the terminal excludes the contacts in the unlocked contact set in step S201, and then randomly selects at least one contact other than the set of unlocked contacts in the user contact list as the interference contact. .
  • the terminal may select, according to the type of the communication event corresponding to the unlocked contact, the selection of the interference contact in the contact list of the same type, for example, if the communication event corresponding to the unlocked contact is a voice call, the mobile terminal is on the mobile phone.
  • the address book performs the selection of the interference contact. If the communication event corresponding to the unlocked contact is a QQ mailbox mail, the mobile terminal is in the QQ mailbox contact. Select the interference contact in the list.
  • the terminal may determine an unlocking contact and an interference contact, and then obtain a contact identifier corresponding to the unlocked contact and the interference contact to form a contact identifier set.
  • the contact identifier includes, but is not limited to, one or more of a contact name, a contact nickname, and a contact avatar.
  • the contact identifier set includes an unlock contact identifier and at least one interference contact identifier.
  • the terminal When the terminal is in the lock screen state, the user enters the terminal unlocking interface when the terminal is activated, and displays the contact identifier set in the terminal unlocking interface.
  • the terminal unlocking interface is presented on a display screen of the terminal, and the display screen may be a terminal touch screen capable of providing a user to perform a touch control operation, or may be a display screen having only a display function.
  • the terminal user wants to obtain more terminal application information or operate more terminal application functions, such as making a call, sending an email, or browsing a webpage.
  • the contact identifiers in the contact identifier set in the terminal lock screen interface are displayed on the terminal display screen in a manner that bubbles float or are arranged in an icon.
  • the prompt information of the unlocked contact is displayed in the terminal unlocking interface, where the prompt information carries type information of the processed communication event corresponding to the unlocked contact, where the communication event type includes but is not limited to: a call, Various types of instant messaging and social software communications, such as SMS, email, WeChat or video.
  • the communication event corresponding to the unlocked contact 150****3456 displayed in the unlocking contact terminal unlocking interface is the received call that is generated at 11:00 on October 9th, and the terminal may unlock the contact prompt information if the terminal is unlocked. Please select the contact you recently called to unlock.”
  • step S102 For the step, refer to step S102 in the embodiment shown in FIG. 1 , and details are not described herein again.
  • the unlocking instruction includes, but is not limited to, long pressing the target contact identifier, double-clicking the target contact identifier, clicking the target contact identifier, and performing the target contact identifier according to the preset trajectory. Skip operation, long press the OK button to select the target contact ID, double-click the OK button to select the target contact ID or click the OK button to select the target contact ID.
  • the terminal if the matching does not match, the terminal returns an unlocking instruction error message and displays the information on the terminal unlocking interface. For example, if the preset unlocking command is long pressing the target contact identifier, and the terminal obtains the unlocking command as double-clicking the target contact identifier, At this point, the terminal returns the text message “Please press and hold the unlock contact ID” to the terminal unlock interface.
  • the contact identifier selected by the user in the process of performing the unlocking operation may be an unlocked contact identifier, or may be an interference contact identifier, and only when the target contact identifier selected by the user is obtained as the unlocked contact identifier, In order to execute step S209, the terminal can be unlocked.
  • the unlocking instruction input by the user for the target contact identifier in the contact identifier set is obtained in step S206, the target contact identifier is obtained, and in this step, it is determined whether the target contact identifier is preset.
  • Unlocking the contact identifier if yes, proceeding to step S209; if not, returning to step S202, and sequentially performing steps S202-S208, reselecting another contact in the unlocked contact set as the unlocked contact, and reselecting the user contact
  • At least one contact other than the contact set in the person list is used as the interference contact, and the contact ID of the unlocked contact and the interfering contact obtained by reselecting is reconstituted into the contact identification set, and displayed in the terminal unlocking interface.
  • the terminal Forming a set of contact identifiers, re-acquiring the unlocking instruction input by the user for the target contact identifier in the contact identifier set, re-determining whether the unlocking instruction matches the preset unlocking instruction, and re-determining the target contact identifier Whether to unlock the contact ID.
  • the terminal determines whether the target contact identifier is the number of times the contact identifier is unlocked. When the terminal determines that the obtained target contact identifier is not the unlocked contact identifier within the preset number of times, the terminal enters the temporarily locked state. Only another unlock can be performed later or the password unlocked state is prompted to prompt the user to unlock the terminal by entering a password.
  • step S206 only when the target contact identifier described in step S206 is an unlocked contact identifier instead of an interference contact identifier, and the unlocking instruction and the preset unlocking instruction are performed in step S207.
  • the terminal can be unlocked, so that the user enters the terminal operation interface to obtain more terminal application information and terminal application functions, such as making a call, browsing a webpage, sharing information, and the like.
  • the contact identifier and the interference contact are preset in the terminal, and the contact identifier set composed of the contact identifier of the unlocked contact and the interfering contact is displayed in the terminal unlocking interface, and then the user is targeted by the user.
  • the unlocking instruction input by the target contact identifier in the contact identifier set determines that the target contact identifier is the unlocked contact identifier, and the unlock command input is unlocked when the unlock command is matched with the preset unlocking command, thereby enhancing the terminal lock.
  • the screen protects the privacy data in the terminal and improves the confidentiality and security of the terminal.
  • FIG. 4 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • the terminal shown in the figure includes at least a display unit 401, an obtaining unit 402, a determining unit 403, and an unlocking unit 404.
  • the display unit 401 is configured to display a contact identifier set in the terminal unlocking interface, where the contact identifier set includes a preset unlock contact identifier and an interference contact identifier.
  • the terminal unlocking interface when the terminal is in the lock screen state, the user enters the terminal unlocking interface when the terminal is activated, and the display unit 401 displays the contact identifier set in the terminal unlocking interface.
  • the terminal unlocking interface is presented on a display screen of the terminal, and the display screen may be a terminal touch screen capable of providing a user to perform a touch control operation, or may be a display screen having only a display function.
  • the terminal user wants to obtain more terminal application information or operate more terminal application functions, such as making a call, sending an email, or browsing a webpage. You need to enter the terminal unlocking interface to unlock the terminal to enter the terminal operation interface to make a call and send an email. Or browse the web and more.
  • the contact is from a contact list of instant messaging software such as QQ, mobile phone, Fetion, WeChat, and social software.
  • the contact list includes, but is not limited to, a mobile phone address book, a mail contact list, a WeChat contact list, a QQ contact list, a Fetion contact list, a list of everyone friends, and the like.
  • the contact identification includes, but is not limited to, a contact name, a contact nickname, a contact avatar, and the like.
  • the contact identifier set includes a plurality of contact identifiers, including a preset one unlock contact identifier and at least one preset interference contact identifier.
  • FIG. 3a a schematic diagram of the display unit displaying the contact identifier is provided, and FIG.
  • 3b is a schematic diagram showing the second embodiment of the display unit displaying the contact identifier provided by the embodiment of the present invention, and is connected in the terminal lock screen interface.
  • the contact identifiers in the person identification set are displayed on the terminal display screen in a floating manner or in an icon arrangement.
  • the obtaining unit 402 is configured to acquire an unlocking instruction input by the user for the target contact identifier in the contact identifier set.
  • the user may perform an unlocking operation on the contact identifier set displayed in the terminal unlocking interface, where the unlocking operation includes the user selecting the target contact identifier, and inputting an unlocking instruction for the target contact identifier.
  • the target contact identifier is the contact identifier selected by the user in the contact identification set.
  • the unlocking instruction includes, but is not limited to, long pressing the target contact identifier, double-clicking the target contact identifier, clicking the target contact identifier, sliding the target contact identifier according to the preset trajectory, and long pressing the OK button to select the target contact. Person identification, double-click the OK button to select the target contact ID or click the OK button to select the target contact ID.
  • the user first selects one of the contact identifiers as the target contact identifier in the terminal unlocking interface. If the terminal display screen is a touch screen, the user can double-click the target contact identifier on the touch screen to complete the contact.
  • the target contact identifier in the person identification set inputs an unlocking instruction, and when the terminal detects that the user performs a double-click operation on the target contact identifier in the contact identifier set, the obtaining unit 402 acquires the target contact identifier and the unlocking instruction.
  • the determining unit 403 is configured to determine whether the target contact identifier is an unlocked contact identifier.
  • the terminal may preset the unlock contact and the interference contact when the screen is locked, and obtain the contact identifier of the unlock contact and the interference contact to form a contact identifier set, and display the contact identifier set in the terminal unlock interface.
  • the contact identifier selected by the user in the process of performing the unlocking operation may be an unlocked contact identifier or an interference contact identifier.
  • the terminal can be unlocked only when the target contact identifier selected by the user is the unlocked contact identifier.
  • the obtaining unit 402 obtains the unlocking instruction input by the user for the target contact identifier in the contact identifier set, the target contact identifier is obtained, and the determining unit 403 determines whether the target contact identifier is a preset unlocking. Contact ID.
  • the unlocking unit 404 is configured to: when determining that the target contact identifier is an unlocked contact identifier, unlock the terminal.
  • the unlocking unit 404 can unlock the terminal only when the determining unit 403 determines that the target contact identifier is the unlocking contact identifier instead of the interference contact identifier, so that the user enters the terminal operation interface to obtain more terminal application information and Terminal application features such as making calls, browsing the web, sharing information, and more.
  • the obtaining unit 402 is further configured to acquire a contact corresponding to the processed communication event in the preset time as the unlocked contact set.
  • the communication event includes: an instant messaging event such as an email, a short message, a phone call, a chat, a message, and various social software communication events.
  • the processed communication event includes: a read email, a read short message, a received call or outgoing call, a replied chat record, and the like, at least a communication event that the user has viewed so that the user has an image.
  • the preset time of the terminal can be 24 hours, 12 hours or 6 hours, etc., and the communication busy event is easy to be confused and easy to forget for the communication event that occurred before 24 hours. The time should not be too long, and the user who is not busy in communication may not have processed the communication event within 6 hours, so the preset time should not be too short.
  • the terminal can also provide the user with the function of manually setting the preset time. Set the time to enter the setting options provided by the terminal according to the user's wishes to set the preset time.
  • the terminal enters the lock screen state firstly, various instant communication events and social software communication events in the terminal are queried, and then the communication events that have been processed within the preset time are filtered out, and finally the obtaining unit 402 acquires the processed time within the preset time.
  • the contact corresponding to the communication event is used as the set of unlocked contacts.
  • the preset time is 24 hours, and the mobile terminal enters the lock screen state at 12:00 on October 9th. At this time, the mobile terminal query includes the mobile phone call record.
  • the terminal can provide a function for the user to manually select and unlock the contact set.
  • the obtaining unit 402 acquires at least one contact manually selected by the user in the contact list as the unlocked contact set. For example, when there is no processed communication event within the preset time, the terminal sends a text prompt message “Please select to unlock the contact” and Displayed on the terminal display screen, if the display screen is a touch screen, when the user clicks the text prompt information, the user enters the terminal contact list interface, the user can manually select at least one contact in the contact list, and the obtaining unit 402 acquires the user. At least one contact manually selected in the contact list is used as an unlocked contact set.
  • the terminal further includes:
  • the selecting unit 405 is configured to select one of the unlocked contact sets as the unlocked contact.
  • the selecting unit 405 may select one of the unlocked contact sets as the unlocking contact according to the communication event generation time, and the time when the communication event is generated is shorter than the time when the terminal locks the screen. The deeper the image, the better the contact corresponding to the processed communication event closest to the terminal lock screen time can be selected as the unlock contact.
  • the mobile terminal queries the contact 150****3456.
  • the communication event is that the received call that was generated at 11:00 on October 9 is the latest processed communication event when the terminal is locked, the selection unit 405 selects 150****3456 as the unlocked contact.
  • the selecting unit 405 may obtain the manually selected by the user. Unlock one of the contacts in the contact collection as an unlocked contact.
  • the selecting unit 405 may randomly select one of the unlocked contact sets as the unlocking contact.
  • the selecting unit 405 is further configured to select at least one contact other than the set of unlocked contacts in the user contact list as the interference contact.
  • the obtaining unit 402 excludes the contacts in the unlocked contact set after acquiring the various contact lists of the users in the terminal, and then the selecting unit 405 may randomly select at least one of the unlocked contact sets in the user contact list.
  • the contact is the interference contact.
  • the selecting unit 405 may select to select the interference contact in the contact list of the same type according to the type of the communication event corresponding to the unlocking contact, for example, if the communication event corresponding to the unlocked contact is a voice call, the selecting unit 405 in the phone address book to make interference contact selection, if you unlock contacts
  • the corresponding communication event is a QQ mailbox mail, and the selecting unit 405 selects an interference contact in the QQ mailbox contact list.
  • the obtaining unit 402 is further configured to acquire the contact identifier of the unlocked contact and the interference contact to form the contact identifier set.
  • the terminal may determine the unlocking contact and the interference contact, and then the obtaining unit 402 obtains the unlocking contact and
  • the contact identifier corresponding to the interference contact constitutes a contact identifier set.
  • the contact identifier includes but is not limited to: a contact name, a contact nickname, and a contact avatar.
  • the determining unit 403 is further configured to confirm that the unlocking instruction input by the user matches the preset unlocking command, so that the unlocking unit 404 unlocks the terminal.
  • the unlocking instruction includes, but is not limited to, long pressing the target contact identifier, double-clicking the target contact identifier, clicking the target contact identifier, sliding the target contact identifier according to the preset trajectory, and pressing the OK button. Select the target contact ID, double-click the OK button to select the target contact ID, or click the OK button to select the target contact ID.
  • the unlocking unit 404 can unlock the terminal; if not, the terminal stays in the terminal to unlock the terminal.
  • the interface obtaining unit 402 continues to acquire an unlocking instruction input by the user for the target contact identifier in the contact identification set.
  • the determining unit 403 returns the unlocking instruction error information and displays the information on the terminal unlocking interface through the display unit 401. For example, if the preset unlocking command is long pressing the target contact identifier, the terminal obtains the unlocking command as Double-click the target contact identifier. At this time, the determining unit 403 of the terminal returns the text message “Please press and hold the unlocked contact identifier” to the terminal unlocking interface.
  • the terminal further includes:
  • the receiving unit 406 is configured to receive the unlocking instruction error information returned by the determining unit 403 when the determining unit 403 confirms that the unlocking instruction does not match the preset unlocking instruction.
  • the determining unit 403 returns the unlocking instruction error information to the receiving unit 406 when it is confirmed that the unlocking command input by the user does not match the preset unlocking command, and displays it on the terminal display screen through the display unit 401, for example, if the preset unlocking The command is to press and hold the target contact identifier, and the terminal obtains the unlock command to double-click the target contact identifier. At this time, the determining unit 403 returns “Please press and unlock the target.
  • the contact identification "text information is sent to the receiving unit 406, and the receiving unit 406 pushes the text information onto the display unit 401 for display through the terminal display screen.
  • the contact identifier and the interference contact are preset in the terminal, and the contact identifier set composed of the contact identifier of the unlocked contact and the interfering contact is displayed in the terminal unlocking interface, and then the user is targeted by the user.
  • the unlocking instruction input by the target contact identifier in the contact identifier set determines that the target contact identifier is the unlocked contact identifier, and the unlock command input is unlocked when the unlock command is matched with the preset unlocking command, thereby enhancing the terminal lock.
  • the screen protects the privacy data in the terminal and improves the confidentiality and security of the terminal.
  • FIG. 5 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
  • the terminal in this embodiment may include: at least one processor 501, such as a CPU; at least one input device 502, at least one output. Device 503 and memory 504.
  • the above processor 501, input device 502, output device 503, and memory 504 are connected by a bus 505.
  • the input device 502 may include a touch panel, a fingerprint sensor (for collecting fingerprint information of the user and direction information of the fingerprint), and the like, and the output device 503 may include a display screen.
  • the memory 504 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • the memory 504 can also optionally be at least one storage terminal located away from the aforementioned processor 501.
  • the processor 501 can be combined with the terminal shown in FIG. 4, wherein a set of program codes is stored in the memory 501, and the processor 501 calls the program code stored in the memory 504 for performing the following operations:
  • the output device 503 is configured to display a contact identifier set in the terminal unlocking interface, where the contact identifier set includes a preset unlock contact identifier and an interference contact identifier.
  • the input device 502 is configured to acquire an unlocking instruction input by the user for the target contact identifier in the contact identifier set.
  • the processor 501 is configured to determine whether the target contact identifier is an unlocked contact identifier.
  • the processor 501 is further configured to: when the target contact identifier is an unlocked contact identifier, unlock the terminal.
  • the processor 501 is further configured to:
  • the contact identifier includes at least one of a contact name, a contact nickname, and a contact avatar.
  • the processed communication event includes: a read email, a read short message, a received call or outgoing call, a replied chat record, and the like, at least a communication event that the user has viewed so that the user has an image.
  • the contact list includes: a mobile phone address book, a mail contact list, a WeChat contact list, a QQ contact list, a Fetion contact list, a list of personal friends, and other instant communication contact lists and various social software contacts. At least one of the lists.
  • the processor 501 further invokes the program code stored in the memory 504 to perform the following operations:
  • the reconstituted set of contact identifiers is displayed in the terminal unlocking interface.
  • the processor 501 is further configured to: before the terminal is unlocked, confirm that the unlocking instruction input by the user matches the preset unlocking command, and confirm the unlocking instruction input by the user and the preset unlocking instruction. If not, the processor 501 returns an unlock instruction error message and displays it through the output device 503.
  • the processor 501, the input device 502, and the output device 503 in the embodiment of the present invention may perform the first embodiment and the second embodiment of the method for unlocking the terminal provided by the embodiment of the present invention.
  • the implementation manner of the terminal described in the embodiment of the present invention may also be implemented in the implementation manners in the embodiments, and details are not described herein again.
  • the units in all the embodiments of the present invention may be implemented by a general-purpose integrated circuit, such as a CPU (Central Processing Unit), or by an ASIC (Application Specific Integrated Circuit).
  • a general-purpose integrated circuit such as a CPU (Central Processing Unit), or by an ASIC (Application Specific Integrated Circuit).
  • the units in the terminal in the embodiment of the present invention may be combined, divided, and deleted according to actual needs.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
  • the embodiment of the present invention may display the contact identifier set in the terminal unlocking interface, and may also obtain an unlocking instruction input by the user for the target contact identifier in the contact identifier set, and then according to the judgment that the target contact identifier is the unlocked contact identifier, The terminal is unlocked, and the protection of the privacy data in the terminal by the terminal lock screen is enhanced, and the confidentiality and security of the terminal are improved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

本发明提供了一种终端解锁方法及终端,其中方法包括:在终端解锁界面中显示联系人标识集合;获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令;判断所述目标联系人标识是否为解锁联系人标识;若是,将所述终端解除锁定。采用本发明可增强终端锁屏对终端内隐私数据的保护,提高了终端的保密性和安全性。

Description

一种终端解锁方法及终端
本申请要求与2014年10月31日提交中国专利局,申请号为201410606507.1,发明名称为“一种终端解锁方法”的中国专利申请的优先权,以及与2014年10月31日提交中国专利局,申请号为201410606501.4,发明名称为“一种终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及信息安全技术领域,尤其涉及一种终端解锁方法及终端。
背景技术
随着通信技术的飞速发展,智能手机在生活中不断普及并且功能越来越丰富,人们使用智能手机可以进行商务活动、联系亲朋好友、分享个人生活状态信息等,这使得智能手机中携带的个人隐私数据越来越多,保护隐私并防止误操作逐渐受到用户重视。为了保护个人隐私及防止用户误操作等各方面的需要,通常手机具有锁定功能,即手机处于待机状态时处于锁定状态,当用户期望使用时,首先需要进行正确的解锁,才能继续正常使用该手机。现有技术中常使用的手机解锁方法有:长按特定按键解锁、滑动解锁、按键组合解锁、密码解锁、九宫格解锁等。其中,长按特定按键解锁和滑动解锁执行动作简单并不具备保密功能;按键组合解锁一般应用于老式的功能手机,对于手机按键少的智能手机来说,按键组合解锁的安全性不高;而对于密码解锁及九宫格解锁,其解锁动作一般为点击或者滑动等简单的动作,设定之后不会变化,身边人看一遍就可以记住,尤其是对于九宫格解锁,由于滑动之后手机屏幕上会留下痕迹,其他人可以根据屏幕上痕迹获得用户的解锁轨迹,其安全性也受到限制。
发明内容
本发明实施例提供一种终端解锁方法及终端,可在终端解锁界面中显示 联系人标识集合,获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令,进而根据判断目标联系人标识是解锁联系人标识时将终端解锁,加强了终端锁屏对终端内隐私数据的保护,提高了终端的保密性和安全性。
第一方面,本发明实施例提供了一种终端解锁方法,该方法包括:
在终端解锁界面中显示联系人标识集合,所述联系人标识集合包括预设的解锁联系人标识和干扰联系人标识;
获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令;
判断所述目标联系人标识是否为解锁联系人标识;
若是,将所述终端解除锁定。
另一方面,本发明实施例提供了一种终端,该终端包括:
显示单元,用于在终端解锁界面中显示联系人标识集合,所述联系人标识集合包括预设的解锁联系人标识和干扰联系人标识;
获取单元,用于获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令;
判断单元,用于判断所述目标联系人标识是否为解锁联系人标识;
解锁单元,用于当判断目标联系人标识是解锁联系人标识时,将所述终端解除锁定。
本发明实施例可在终端解锁界面中显示联系人标识集合,还可获取用户针对联系人标识集合中的目标联系人标识输入的解锁指令,进而根据判断目标联系人标识是解锁联系人标识时将终端解锁,加强了终端锁屏对终端内隐私数据的保护,提高了终端的保密性和安全性。
附图说明
为了更清楚地说明本发明实施例技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供一种终端解锁方法的流程示意图;
图2是本发明实施例提供的另一种终端解锁方法的流程示意图;
图3a是本发明实施例提供的显示单元显示联系人标识的一示意图;
图3b是本发明实施例提供的显示单元显示联系人标识的二示意图;
图4是本发明实施例提供的一种终端结构示意图;
图5是本发明实施例提供的另一种终端结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
具体实现中,本发明实施例中描述的终端包括但不限于:手机、平板电脑、笔记本电脑、车载电子设备、掌上电脑、穿戴式智能设备等电子设备。
下面将结合图1至图5对本发明实施例提供的终端解锁方法及终端进行具体描述。
参见图1,是本发明实施例提供一种终端解锁方法的流程示意图,如图所示终端解锁方法可包括以下步骤:
S101,在终端解锁界面中显示联系人标识集合。
具体实现中,所述联系人标识集合包括预设的解锁联系人标识和干扰联系人标识。当终端处于锁屏状态,用户启动终端时进入终端解锁界面,终端在终端解锁界面中显示联系人标识集合。所述终端解锁界面呈现于终端的显示屏上,所述显示屏可以为能提供用户进行触摸控制操作的终端触控屏,还可以为仅仅具有显示功能的显示屏。终端用户想要获取更多的终端应用信息或者操作更多的终端应用功能,例如打电话、发邮件或浏览网页等,需要进入终端解锁界面对终端进行解锁才能进入终端操作界面打电话、发邮件或浏览网页等,在本实施例中终端只有检测到用户选择了解锁联系人标识而不是干扰联系人标识的情况下终端才能解锁。所述联系人来自于如QQ、手机、飞信、微信等即时通信软件及社交软件的联系人列表。所述联系人列表包括 但不限于:手机通讯录、邮件联系人列表、微信联系人列表、QQ联系人列表、飞信联系人列表及人人好友列表等等。所述联系人标识包括但不限于:联系人姓名、联系人昵称、联系人头像等等。所述联系人标识集合包含多个联系人标识,其中包括预设的一个解锁联系人标识和至少一个预设的干扰联系人标识。可选的,如图3a本发明实施例提供的显示单元显示联系人标识的一示意图和图3b本发明实施例提供的显示单元显示联系人标识的二示意图所示,在终端锁屏界面中联系人标识集合中的联系人标识以气泡漂浮的方式或以图标排列的方式显示在终端显示屏上的终端解锁界面中。
S102,获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令。
具体实现中,用户在进入终端解锁界面之后,可针对显示在终端解锁界面中的联系人标识集合进行解锁操作,解锁操作包括用户选择目标联系人标识,并针对目标联系人标识输入解锁指令两个步骤。目标联系人标识为用户在联系人标识集合中选择的联系人标识。所述解锁指令包括但不限于:长按目标联系人标识、双击目标联系人标识、单击目标联系人标识、将目标联系人标识按预设轨迹进行滑行操作、长按确定按键选定目标联系人标识、双击确定按键选定目标联系人标识或单击确定按键选定目标联系人标识。例如,用户在解锁过程中首先在终端解锁界面中选择其中一个联系人标识作为目标联系人标识,若终端显示屏为触控屏,则用户可在触控屏上双击目标联系人标识完成针对联系人标识集合中的目标联系人标识输入解锁指令,终端在检测到用户针对所述联系人标识集合中的目标联系人标识进行双击操作时,则获取所述目标联系人标识和所述解锁指令。
S103,判断所述目标联系人标识是否为解锁联系人标识。
具体实现中,终端可在终端锁屏时预先设置解锁联系人和干扰联系人,然后获取解锁联系人和干扰联系人的联系人标识组成联系人标识集合并在终端解锁界面显示联系人标识集合。用户在进行解锁操作的过程中所选择的联系人标识可能为解锁联系人标识,也可能为干扰联系人标识,只有用户选择的目标联系人标识为解锁联系人标识时,才能执行步骤S104,终端才能被解锁。在步骤S102中获取到用户针对所述联系人标识集合中的目标联系人标 识输入的解锁指令时,获取所述目标联系人标识,在本步骤中判断所述目标联系人标识是否为预设的解锁联系人标识。
S104,若是,将所述终端解除锁定。
具体实现中,只有在步骤中S103所述的目标联系人标识为解锁联系人标识而不是干扰联系人标识时,终端才能被解锁,从而让用户进入终端操作界面获得更多终端应用信息和终端应用功能,如打电话、浏览网页、分享信息等等。
作为一种可选的实施方式,在图1所示的方法中,终端在执行步骤S101之前,可以先执行以下步骤:
11).获取预设时间内已处理通信事件所对应的联系人作为解锁联系人集合。
具体实现中,所述通信事件包括:邮件、短信、电话、聊天、留言等即时通信事件及各种社交软件通信事件。所述已处理通信事件包括:已读邮件、已读短信、已接的来电或去电、已回复的聊天记录等各种至少是用户已经查看过使得用户有映像的通信事件。需要说明的是,终端可默认预设时间为24小时、12小时或6小时等比较合理的时间段,通信比较繁忙的用户对于24小时之前发生过的通信事件已经容易混淆也容易遗忘因此预设时间不宜过长,而通信并不繁忙的用户可能6小时以内终端并没有产生已处理过通信事件因此预设时间也不宜过短,终端可提供给用户手动设置预设时间的功能,因此预设时间也可根据用户意愿进入终端提供的设置选项进行预设时间的设置。终端进入锁屏状态时,首先查询终端内各种即时通信事件及社交软件通信事件,然后筛选出在预设时间内已处理的通信事件,最后获取所述预设时间内已处理的通信事件所对应的联系人作为解锁联系人集合,例如:预设时间为24小时,手机终端在10月9日12:00进入锁屏状态,此时,手机终端查询到手机通话记录中包括了:[150****3456,10月9日11:00,已接来电],[150****3457,10月8日11:59,已接来电],[150****3458,10月8日15:00已接去电]和[150****3459,10月9日10:00,未接来电]四条通话记录,而在手机的QQ邮箱收件箱记录中包括了:[[email protected],10月9日9:00,已读邮件],[[email protected],10月9日11:00,未读邮件]两条邮件记录; 其中[150****3457,10月8日11:59,已接来电]为预设时间之外的已处理通信事件,[150****3459,10月9日10:00,未接来电]和[[email protected],10月9日11:00,未读邮件]为在预设时间内但未处理的通信事件,而[150****3456,10月9日11:00,已接来电]、[150****3458,10月8日15:00已接去电]及[[email protected],10月9日9:00,已读邮件]为在24小时内已处理的通信事件,因此手机终端筛选出这三件预设时间内已处理的通信事件,最后获取这三件预设时间内已处理的通信事件所对应的联系人150****3456、150****3458及[email protected]作为解锁联系人集合。
可选的,终端可提供用户手动选择解锁联系人集合的功能,因此终端可获取用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合,例如当在预设时间内无已处理的通信事件,终端在即将进入锁屏状态时发出文字提示信息“请选择解锁联系人”并显示在终端显示屏上,若显示屏为触控屏,当用户点击此文字提示信息时进入终端联系人列表界面,用户可选择联系人列表中手动选择的至少一个联系人,终端获取用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合。
12).选择所述解锁联系人集合中的一个联系人作为解锁联系人。
在具体实现中,终端可以根据通信事件产生时间选择所述解锁联系人集合中的一个联系人作为解锁联系人,通常通信事件产生的时间离终端锁屏时的时间越短用户对其的映像越深刻,因此可以优先选择离终端锁屏时间最近的已处理通信事件所对应的联系人作为解锁联系人。例如,在步骤11)所述的实例中,在联系人集合:150****3456、150****3458及[email protected]中终端查询到联系人150****3456对应的通信事件为产生在10月9日11:00的已接电话是距离终端锁屏时最近的已处理通信事件,则选择150****3456作为解锁联系人。可选的,若预设时间内无已处理的通信事件,在步骤11)中获取了用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合之后,在本步骤中终端可获取用户手动选择的解锁联系人集合中的一个联系人作为解锁联系人。可选的,随机选择解锁联系人集合中的一个联系人作为解锁联系人。
13).选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为 干扰联系人。
具体实现中,获取到终端中用户的各种联系人列表后排除步骤11)中解锁联系人集合中的联系人,然后可随机选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为干扰联系人。进一步的,终端可根据解锁联系人对应的通信事件的类型选择在与其同类型的联系人列表中进行干扰联系人的选择,例如若解锁联系人对应的通信事件为语音电话,则手机终端在手机通讯录进行干扰联系人的选择,若解锁联系人对应的通信事件为QQ邮箱邮件,则手机终端在QQ邮箱联系人列表中选择干扰联系人。
14).获取所述解锁联系人和所述干扰联系人的联系人标识组成所述联系人标识集合。
具体实现中,在执行步骤11)~13)后终端可确定解锁联系人和干扰联系人,然后获取与解锁联系人和干扰联系人所对应的联系人标识组成联系人标识集合。所述联系人标识包括但不限于:联系人姓名、联系人昵称、联系人头像。
通过步骤11)~14)终端可获取到联系人标识集合用于显示在终端的解锁界面中等待用户针对联系人标识集合进行的解锁操作。
本发明实施例,通过在终端解锁界面中显示联系人标识集合,获取用户针对联系人标识集合中的目标联系人标识输入的解锁指令,判断目标联系人标识是解锁联系人标识时将所述终端解除锁定,可增强终端锁屏对终端内隐私数据的保护,提高终端锁屏的保密性和安全性。
参见图2,是本发明实施例提供的另一种终端解锁方法的流程示意图,如图所示的终端解锁方法可包括以下步骤:
S201,获取预设时间内已处理通信事件所对应的联系人作为解锁联系人集合。
本步骤可参见图1所示实施例中的步骤11),此处不再赘述。
S202,根据通信事件产生时间选择所述解锁联系人集合中的一个联系人作为解锁联系人。
具体实现中,通常通信事件产生的时间离终端锁屏时的时间越短用户对 其的映像越深刻,因此可以优先选择离终端锁屏时间最近的已处理通信事件所对应的联系人作为解锁联系人。例如,在图1所示的实施例中的步骤11)中所述实例中,在联系人集合:150****3456、150****3458及[email protected]中终端查询到联系人150****3456对应的通信事件为产生在10月9日11:00的已接电话是距离终端锁屏时最近的已处理通信事件,则选择150****3456作为解锁联系人。进一步的,在本步骤中可获取解锁联系人所对应的已处理通信事件的类型信息在步骤S205中显示在终端解锁界面用以提示用户选择解锁联系人,所述通信事件的类型包括但不限于:通话、短信、邮件、微信或视频等各种即时通信和社交软件通信类型。例如上述实例中解锁联系人150****3456对应的通信事件为产生在10月9日11:00的已接电话,则解锁联系人所对应的已处理通信事件的类型为通话。可选的,若预设时间内无已处理的通信事件,在步骤S201中获取了用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合之后,终端可判断手动选择的解锁联系人集合中的解锁联系人是否存在对应的已处理通信事件,若存在,在本步骤中可根据通信事件产生时间选择所述解锁联系人集合中的一个联系人作为解锁联系人;若不存在,则终端可获取用户手动选择的解锁联系人集合中的一个联系人作为解锁联系人。可选的,终端可随机选择解锁联系人集合中的一个联系人作为解锁联系人。
S203,选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为干扰联系人。
具体实现中,所述联系人列表包括但不限于:手机通讯录、邮件联系人列表、微信联系人列表、QQ联系人列表、飞信联系人列表及人人好友列表等各种即时通信联系人列表及社交软件联系人列表。终端获取到终端中用户的各种联系人列表后排除步骤S201中解锁联系人集合中的联系人,然后可随机选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为干扰联系人。进一步的,终端可根据解锁联系人对应的通信事件的类型选择在与其同类型的联系人列表中进行干扰联系人的选择,例如若解锁联系人对应的通信事件为语音电话,则手机终端在手机通讯录进行干扰联系人的选择,若解锁联系人对应的通信事件为QQ邮箱邮件,则手机终端在QQ邮箱联系人 列表中选择干扰联系人。
S204,获取所述解锁联系人和所述干扰联系人的联系人标识组成所述联系人标识集合。
具体实现中,在执行步骤S201~S203后终端可确定解锁联系人和干扰联系人,然后获取与解锁联系人和干扰联系人所对应的联系人标识组成联系人标识集合。所述联系人标识包括但不限于:联系人姓名、联系人昵称、联系人头像中的一种或多种。
S205,在终端解锁界面中显示联系人标识集合。
由步骤S201~S204可知,联系人标识集合包括一个解锁联系人标识和至少一个干扰联系人标识。当终端处于锁屏状态,用户启动终端时进入终端解锁界面,在终端解锁界面中显示联系人标识集合。所述终端解锁界面呈现于终端的显示屏上,所述显示屏可以为能提供用户进行触摸控制操作的终端触控屏,还可以为仅仅具有显示功能的显示屏。终端用户想要获取更多的终端应用信息或者操作更多的终端应用功能,例如打电话、发邮件或浏览网页等,需要进入终端解锁界面对终端进行解锁才能进入终端操作界面打电话、发邮件或浏览网页等。可选的,在终端锁屏界面中联系人标识集合中的联系人标识以气泡漂浮的方式或以图标排列的方式显示在终端显示屏上。可选的,在终端解锁界面中显示解锁联系人的提示信息,所述提示信息携带所述解锁联系人所对应的已处理通信事件的类型信息,所述通信事件类型包括但不限于:通话、短信、邮件、微信或视频等各种即时通信和社交软件通信类型。例如,解锁联系人终端解锁界面中显示的解锁联系人150****3456对应的通信事件为产生在10月9日11:00的已接电话,则终端若解锁联系人提示信息可以为“请选择最近与您通话的联系人进行解锁”。
S206,获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令。
本步骤可参见图1所示实施例中的步骤S102,此处不再赘述。
S207,判断所述解锁指令是否与预设的解锁指令匹配。
具体实现中,所述解锁指令包括但不限于:长按目标联系人标识、双击目标联系人标识、单击目标联系人标识、将目标联系人标识按预设轨迹进行 滑行操作、长按确定按键选定目标联系人标识、双击确定按键选定目标联系人标识或单击确定按键选定目标联系人标识。当终端获取到用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令与预设的解锁指令匹配时转向执行步骤S208,若不匹配,终端停留在终端解锁界面继续获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令。可选的,若不匹配,终端返回解锁指令错误信息并显示在终端解锁界面上,例如若预设的解锁指令为长按目标联系人标识,而终端获取到解锁指令为双击目标联系人标识,此时终端返回“请长按解锁联系人标识”文本信息到终端解锁界面显示。
S208,判断所述目标联系人标识是否为解锁联系人标识。
具体实现中,用户在进行解锁操作的过程中所选择的联系人标识可能为解锁联系人标识,也可能为干扰联系人标识,只有获取到用户选择的目标联系人标识为解锁联系人标识时,才能执行步骤S209,终端才能被解锁。在步骤S206中获取到用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令时,获取所述目标联系人标识,在本步骤中判断所述目标联系人标识是否为预设的解锁联系人标识,若是,则执行步骤S209;若不是,则返回步骤S202,并依次重新执行步骤S202~S208,重新选择解锁联系人集合中的另一联系人作为解锁联系人,重新选择用户联系人列表中解锁联系人集合之外的其他至少一个联系人作为干扰联系人,获取重新选择得到的解锁联系人和干扰联系人的联系人标识重新组成联系人标识集合,在终端解锁界面中显示重新组成的联系人标识集合,重新获取用户针对联系人标识集合中的目标联系人标识输入的解锁指令,重新判断所述解锁指令是否与预设的解锁指令匹配,并重新判断所述目标联系人标识是否为解锁联系人标识。可选的,可预设判断目标联系人标识是否为解锁联系人标识的次数,当终端在预设次数内判断到获取的目标联系人标识都不是解锁联系人标识时,终端进入暂时锁定状态用户稍后才能进行另一次解锁或者进入密码解锁状态提示用户通过输入密码进行终端的解锁。
S209,若是,将所述终端解除锁定。
具体实现中,只有在步骤中S206所述的目标联系人标识为解锁联系人标识而不是干扰联系人标识时并且步骤S207中解锁指令与预设的解锁指令 匹配时,终端才能解锁,从而让用户进入终端操作界面获得更多终端应用信息和终端应用功能,如打电话、浏览网页、分享信息等等。
在本发明实施例,可通过在终端中预设解锁联系人和干扰联系人,在终端解锁界面中显示解锁联系人和干扰联系人的联系人标识组成的联系人标识集合,再通过获取用户针对联系人标识集合中的目标联系人标识输入的解锁指令,判断目标联系人标识是解锁联系人标识时并且输入的解锁指令与预设的解锁指令匹配时将所述终端解除锁定,可增强终端锁屏对终端内隐私数据的保护,提高终端的保密性和安全性。
图4为本发明实施例提供的一种终端结构示意图,如图所示的终端至少包括:显示单元401、获取单元402、判断单元403和解锁单元404。
显示单元401,用于在终端解锁界面中显示联系人标识集合,所述联系人标识集合包括预设的解锁联系人标识和干扰联系人标识。
具体实现中,当终端处于锁屏状态,用户启动终端时进入终端解锁界面,显示单元401在终端解锁界面中显示联系人标识集合。所述终端解锁界面呈现于终端的显示屏上,所述显示屏可以为能提供用户进行触摸控制操作的终端触控屏,还可以为仅仅具有显示功能的显示屏。终端用户想要获取更多的终端应用信息或者操作更多的终端应用功能,例如打电话、发邮件或浏览网页等,需要进入终端解锁界面对终端进行解锁才能进入终端操作界面打电话、发邮件或浏览网页等。所述联系人来自于如QQ、手机、飞信、微信等即时通信软件及社交软件的联系人列表。所述联系人列表包括但不限于:手机通讯录、邮件联系人列表、微信联系人列表、QQ联系人列表、飞信联系人列表及人人好友列表等等。所述联系人标识包括但不限于:联系人姓名、联系人昵称、联系人头像等等。所述联系人标识集合包含多个联系人标识,其中包括预设的一个解锁联系人标识和至少一个预设的干扰联系人标识。可选的,如图3a本发明实施例提供的显示单元显示联系人标识的一示意图和图3b本发明实施例提供的显示单元显示联系人标识的二示意图所示,在终端锁屏界面中联系人标识集合中的联系人标识以气泡漂浮的方式或以图标排列的方式显示在终端显示屏上。
获取单元402,用于获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令。
具体实现中,用户在进入终端解锁界面之后,可针对显示在终端解锁界面中的联系人标识集合进行解锁操作,解锁操作包括用户选择目标联系人标识,并针对目标联系人标识输入解锁指令两个步骤。目标联系人标识为用户在联系人标识集合中选择的联系人标识。所述解锁指令包括但不限于:长按目标联系人标识、双击目标联系人标识、单击目标联系人标识、将目标联系人标识按预设轨迹进行滑行操作、长按确定按键选定目标联系人标识、双击确定按键选定目标联系人标识或单击确定按键选定目标联系人标识。例如,用户在解锁过程中首先在终端解锁界面中选择其中一个联系人标识作为目标联系人标识,若终端显示屏为触控屏,则用户可在触控屏上双击目标联系人标识完成针对联系人标识集合中的目标联系人标识输入解锁指令,终端在检测到用户针对所述联系人标识集合中的目标联系人标识进行双击操作时,获取单元402获取所述目标联系人标识和所述解锁指令。
判断单元403,用于判断所述目标联系人标识是否为解锁联系人标识。
具体实现中,终端可在锁屏时预先设置解锁联系人和干扰联系人并获取解锁联系人和干扰联系人的联系人标识组成联系人标识集合并在终端解锁界面显示所述联系人标识集合。用户在进行解锁操作的过程中所选择的联系人标识可能为解锁联系人标识,也可能为干扰联系人标识,只有用户选择的目标联系人标识为解锁联系人标识时,终端才能解锁。在获取单元402获取到用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令时,获取所述目标联系人标识,判断单元403判断所述目标联系人标识是否为预设的解锁联系人标识。
解锁单元404,用于当判断目标联系人标识是解锁联系人标识时,将所述终端解除锁定。
具体实现中,只有在判断单元403判断到目标联系人标识为解锁联系人标识而不是干扰联系人标识时,解锁单元404才能将终端解锁,从而让用户进入终端操作界面获得更多终端应用信息和终端应用功能,如打电话、浏览网页、分享信息等等。
可选实施例中,所述获取单元402,还用于获取预设时间内已处理通信事件所对应的联系人作为解锁联系人集合。
具体实现中,所述通信事件包括:邮件、短信、电话、聊天、留言等即时通信事件及各种社交软件通信事件。所述已处理通信事件包括:已读邮件、已读短信、已接的来电或去电、已回复的聊天记录等各种至少是用户已经查看过使得用户有映像的通信事件。需要说明的是,终端可默认预设时间为24小时、12小时或6小时等比较合理的时间段,通信比较繁忙的用户对于24小时之前发生过的通信事件已经容易混淆也容易遗忘因此预设时间不宜过长,而通信并不繁忙的用户可能6小时以内终端并没有产生已处理过通信事件因此预设时间也不宜过短,终端也可提供给用户手动设置预设时间的功能,因此预设时间也可根据用户意愿进入终端提供的设置选项进行预设时间的设置。终端进入锁屏状态时,首先查询终端内各种即时通信事件及社交软件通信事件,然后筛选出在预设时间内已处理的通信事件,最后获取单元402获取所述预设时间内已处理的通信事件所对应的联系人作为解锁联系人集合,例如:预设时间为24小时,手机终端在10月9日12:00进入锁屏状态,此时,手机终端查询到手机通话记录中包括了:[150****3456,10月9日11:00,已接来电],[150****3457,10月8日11:59,已接来电],[150****3458,10月8日15:00已接去电]和[150****3459,10月9日10:00,未接来电]四条通话记录,而在手机终端的QQ邮箱收件箱记录中包括了:[[email protected],10月9日9:00,已读邮件],[[email protected],10月9日11:00,未读邮件]两条邮件记录;其中[150****3457,10月8日11:59,已接来电]为预设时间之外的已处理通信事件,[150****3459,10月9日10:00,未接来电]和[[email protected],10月9日11:00,未读邮件]为在预设时间内但未处理的通信事件,而[150****3456,10月9日11:00,已接来电]、[150****3458,10月8日15:00已接去电]及[[email protected],10月9日9:00,已读邮件]为在24小时内已处理的通信事件,因此手机终端筛选出这三件预设时间内已处理的通信事件,最后获取单元402获取这三件预设时间内已处理的通信事件所对应的联系人150****3456、150****3458及[email protected]作为解锁联系人集合。可选的,终端可提供用户手动选择解锁联系人集合的功能, 获取单元402获取用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合,例如当在预设时间内无已处理的通信事件,终端发出文字提示信息“请选择解锁联系人”并显示在终端显示屏上,若显示屏为触控屏,当用户点击此文字提示信息时进入终端联系人列表界面,用户可在联系人列表中手动选择的至少一个联系人,获取单元402获取用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合。
相应的,所述终端还包括:
选择单元405,用于选择所述解锁联系人集合中的一个联系人作为解锁联系人。
在具体实现中,选择单元405可以根据通信事件产生时间选择所述解锁联系人集合中的一个联系人作为解锁联系人,通常通信事件产生的时间离终端锁屏时的时间越短用户对其的映像越深刻,因此可以优先选择离终端锁屏时间最近的已处理通信事件所对应的联系人作为解锁联系人。例如,在步骤11)所述的实例中,在联系人集合:150****3456、150****3458及[email protected]中手机终端查询到联系人150****3456对应的通信事件为产生在10月9日11:00的已接电话是距离终端锁屏时最近的已处理通信事件,则选择单元405选择150****3456作为解锁联系人。可选的,若预设时间内无已处理的通信事件,获取单元402获取了用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合之后,选择单元405可获取用户手动选择的解锁联系人集合中的一个联系人作为解锁联系人。可选的,选择单元405可随机选择解锁联系人集合中的一个联系人作为解锁联系人。
所述选择单元405,还用于选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为干扰联系人。
具体实现中,获取单元402获取到终端中用户的各种联系人列表后排除解锁联系人集合中的联系人,然后选择单元405可随机选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为干扰联系人。进一步的,选择单元405可根据解锁联系人对应的通信事件的类型选择在与其同类型的联系人列表中进行干扰联系人的选择,例如若解锁联系人对应的通信事件为语音电话,则选择单元405在手机通讯录进行干扰联系人的选择,若解锁联系人 对应的通信事件为QQ邮箱邮件,则选择单元405在QQ邮箱联系人列表中选择干扰联系人。
所述获取单元402,还用于获取所述解锁联系人和所述干扰联系人的联系人标识组成所述联系人标识集合。
具体实现中,在获取单元402、选择单元405执行如图1所示的实施例中的步骤11)~13)之后终端可确定解锁联系人和干扰联系人,然后获取单元402获取解锁联系人和干扰联系人所对应的联系人标识组成联系人标识集合。所述联系人标识包括但不限于:联系人姓名、联系人昵称、联系人头像。
在可选实施例中,所述判断单元403,还用于确认用户输入的解锁指令与预设的解锁指令匹配用以解锁单元404将终端解锁。
具体实现中,所述解锁指令包括但不限于:长按目标联系人标识、双击目标联系人标识、单击目标联系人标识、将目标联系人标识按预设轨迹进行滑行操作、长按确定按键选定目标联系人标识、双击确定按键选定目标联系人标识或单击确定按键选定目标联系人标识。当获取单元402获取到用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令与预设的解锁指令匹配时,解锁单元404才能将终端解锁;若不匹配,终端停留在终端解锁界面获取单元402继续获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令。可选的,若不匹配,判断单元403返回解锁指令错误信息并通过显示单元401显示在终端解锁界面上,例如若预设的解锁指令为长按目标联系人标识,而终端获取到解锁指令为双击目标联系人标识,此时终端的判断单元403返回“请长按解锁联系人标识”文本信息到终端解锁界面显示。
相应的,所述终端还包括:
接收单元406,用于所述判断单元403确认所述解锁指令与预设的解锁指令不匹配时,接收判断单元403返回的解锁指令错误信息。
具体实现中,判断单元403在确认用户输入的解锁指令与预设的解锁指令不匹配时返回解锁指令错误信息到接收单元406并通过显示单元401显示到终端显示屏上,例如若预设的解锁指令为长按目标联系人标识,而终端获取到解锁指令为双击目标联系人标识,此时判断单元403返回“请长按解锁 联系人标识”文本信息到接收单元406,接收单元406将文本信息推送到显示单元401上通过终端显示屏进行显示。
在本发明实施例,可通过在终端中预设解锁联系人和干扰联系人,在终端解锁界面中显示解锁联系人和干扰联系人的联系人标识组成的联系人标识集合,再通过获取用户针对联系人标识集合中的目标联系人标识输入的解锁指令,判断目标联系人标识是解锁联系人标识时并且输入的解锁指令与预设的解锁指令匹配时将所述终端解除锁定,可增强终端锁屏对终端内隐私数据的保护,提高终端的保密性和安全性。
参见图5,是本发明实施例提供的另一种终端结构示意图,如图所示的本实施例中的终端可以包括:至少一个处理器501,例如CPU;至少一个输入设备502,至少一个输出设备503和存储器504。上述处理器501、输入设备502、输出设备503和存储器504通过总线505连接。
其中,输入设备502可以包括触控板、指纹采传感器(用于采集用户的指纹信息和指纹的方向信息)等,输出设备503可以包括显示屏。存储器504可以是高速RAM存储器,也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。存储器504可选的还可以是至少一个位于远离前述处理器501的存储终端。其中处理器501可以结合图4所示的终端,其中存储器501中存储一组程序代码,且处理器501调用存储器504中存储的程序代码,用于执行以下操作:
上述输出设备503,用于在终端解锁界面中显示联系人标识集合,所述联系人标识集合包括预设的解锁联系人标识和干扰联系人标识。
上述输入设备502,用于获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令。
上述处理器501,用于判断所述目标联系人标识是否为解锁联系人标识。
上述处理器501,还用于判断所述目标联系人标识是解锁联系人标识时,将所述终端解除锁定。
在一些可行的实施方式中,上述处理器501还用于:
获取预设时间内已处理通信事件所对应的联系人作为解锁联系人集合或 获取用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合;
选择所述解锁联系人集合中的一个联系人作为解锁联系人;
选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为干扰联系人;
获取所述解锁联系人和所述干扰联系人的联系人标识组成所述联系人标识集合。
其中,所述联系标识包括:联系人姓名、联系人昵称、联系人头像中的至少一种。
所述已处理通信事件包括:已读邮件、已读短信、已接的来电或去电、已回复的聊天记录等各种至少是用户已经查看过使得用户有映像的通信事件。
所述联系人列表包括:手机通讯录、邮件联系人列表、微信联系人列表、QQ联系人列表、飞信联系人列表及人人好友列表等各种即时通信联系人列表及各种社交软件联系人列表中的至少一种。
在一些可行的实施方式中,上述处理器501在判断所述目标联系人标识不是解锁联系人标识之后,还调用存储器504中存储的程序代码执行以下操作:
重新选择所述解锁联系人集合中的另一联系人作为解锁联系人;
重新选择用户联系人列表中所述解锁联系人集合之外的其他至少一个联系人作为干扰联系人;
获取重新选择得到的解锁联系人和干扰联系人的联系人标识重新组成联系人标识集合;
在终端解锁界面中显示重新组成的联系人标识集合。
在一些可行的实施方式中,上述处理器501还用于将所述终端解除锁定之前,确认用户输入的解锁指令与预设的解锁指令匹配,若确认用户输入的解锁指令与预设的解锁指令不匹配,处理器501返回解锁指令错误信息,并通过输出设备503显示。
具体实现中,本发明实施例中所描述的处理器501、输入设备502、输出设备503可执行本发明实施例提供的终端解锁的方法的第一实施例和第二实 施例中所描述的实现方式,也可执行本发明实施例所描述的终端的实现方式,在此不再赘述。
本发明所有实施例中的单元,可以通过通用集成电路,例如CPU(Central Processing Unit,中央处理器),或通过ASIC(Application Specific Integrated Circuit,专用集成电路)来实现。
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。
本发明实施例终端中的单元可以根据实际需要进行合并、划分和删减。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
本发明实施例可在终端解锁界面中显示联系人标识集合,还可获取用户针对联系人标识集合中的目标联系人标识输入的解锁指令,进而根据判断目标联系人标识是解锁联系人标识时将终端解锁,加强了终端锁屏对终端内隐私数据的保护,提高了终端的保密性和安全性。
以上对本发明实施例公开的一种终端解锁方法及终端进行了详细介绍,以上所揭露的仅为本发明较佳实施例而已,当然不能以此来限定本发明之权利范围,因此依本发明权利要求所作的等同变化,仍属本发明所涵盖的范围。

Claims (20)

  1. 一种终端解锁方法,其特征在于,包括:
    在终端解锁界面中显示联系人标识集合,所述联系人标识集合包括预设的解锁联系人标识和干扰联系人标识;
    获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令;
    判断所述目标联系人标识是否为解锁联系人标识;
    若是,将所述终端解除锁定。
  2. 根据权利要求1所述的方法,其特征在于,所述在终端解锁界面中显示联系人标识集合之前还包括:
    获取预设时间内已处理通信事件所对应的联系人作为解锁联系人集合或获取用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合;
    选择所述解锁联系人集合中的一个联系人作为解锁联系人;
    选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为干扰联系人;
    获取所述解锁联系人和所述干扰联系人的联系人标识组成所述联系人标识集合。
  3. 根据权利要求2所述的方法,其特征在于,所述选择所述解锁联系人集合中的一个联系人作为解锁联系人包括:
    根据通信事件产生时间选择所述解锁联系人集合中的一个联系人作为解锁联系人、获取用户手动选择的所述解锁联系人集合中的一个联系人作为解锁联系人或随机选择所述解锁联系人集合中的一个联系人作为解锁联系人。
  4. 根据权利要求2所述的方法,其特征在于,若判断所述目标联系人标识不是解锁联系人标识,所述方法还包括:
    重新选择所述解锁联系人集合中的另一联系人作为解锁联系人;
    重新选择用户联系人列表中所述解锁联系人集合之外的其他至少一个联系人作为干扰联系人;
    获取重新选择得到的解锁联系人和干扰联系人的联系人标识重新组成联系人标识集合;
    在终端解锁界面中显示重新组成的联系人标识集合。
  5. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    在终端解锁界面中显示所述解锁联系人的提示信息,所述提示信息携带所述解锁联系人所对应的已处理通信事件的类型信息。
  6. 根据权利要求1所述的方法,其特征在于,所述将所述终端解除锁定之前还包括:
    确认用户输入的解锁指令与预设的解锁指令匹配。
  7. 根据权利要求6所述的方法,其特征在于,若所述用户输入的解锁指令与预设的解锁指令不匹配则返回解锁指令错误信息。
  8. 根据权利要求1所述的方法,其特征在于,所述显示联系人标识集合包括:
    以气泡漂浮的方式显示联系人标识或以图标排列的方式显示联系人标识。
  9. 根据权利要求1所述的方法,其特征在于,所述解锁指令包括:
    长按目标联系人标识、双击目标联系人标识、单击目标联系人标识、将目标联系人标识按预设轨迹进行滑行操作、长按确定按键选定目标联系人标识、双击确定按键选定目标联系人标识或单击确定按键选定目标联系人标识。
  10. 根据权利要求1~9任一项所述方法,其特征在于,所述联系人标识包括:联系人姓名、联系人昵称、联系人头像中的一种或者多种。
  11. 一种终端,其特征在于,包括:
    显示单元,用于在终端解锁界面中显示联系人标识集合,所述联系人标识集合包括预设的解锁联系人标识和干扰联系人标识;
    获取单元,用于获取用户针对所述联系人标识集合中的目标联系人标识输入的解锁指令;
    判断单元,用于判断所述目标联系人标识是否为解锁联系人标识;
    解锁单元,用于当判断目标联系人标识是解锁联系人标识时,将所述终端解除锁定。
  12. 根据权利要求11所述的终端,其特征在于,
    所述获取单元,还用于获取预设时间内已处理通信事件所对应的联系人作为解锁联系人集合或获取用户在联系人列表中手动选择的至少一个联系人作为解锁联系人集合;
    所述终端还包括:
    选择单元,用于选择所述解锁联系人集合中的一个联系人作为解锁联系人;
    所述选择单元,还用于选择用户联系人列表中解锁联系人集合之外的至少一个联系人作为干扰联系人;
    所述获取单元,还用于获取所述解锁联系人和所述干扰联系人的联系人标识组成所述联系人标识集合。
  13. 根据权利要求12所述的终端,其特征在于,所述选择单元选择所述解锁联系人集合中的一个联系人作为解锁联系人包括:
    根据通信事件产生时间选择所述解锁联系人集合中的一个联系人作为解锁联系人、获取用户手动选择的所述解锁联系人集合中的一个联系人作为解锁联系人或随机选择所述解锁联系人集合中的一个联系人作为解锁联系人。
  14. 根据权利要求12所述的终端,其特征在于,
    所述选择单元,还用于重新选择所述解锁联系人集合中的另一联系人作为解锁联系人;
    所述选择单元,还用于重新选择用户联系人列表中所述解锁联系人集合之外的其他至少一个联系人作为干扰联系人;
    所述获取单元,还用于获取重新选择得到的解锁联系人和干扰联系人的联系人标识重新组成联系人标识集合;
    所述显示单元,还用于在终端解锁界面中显示重新组成的联系人标识集合。
  15. 根据权利要求12所述的终端,其特征在于,所述显示单元还用于:
    在终端解锁界面中显示所述解锁联系人的提示信息,所述提示信息携带所述解锁联系人所对应的已处理通信事件的类型信息。
  16. 根据权利要求11所述的终端,其特征在于,所述判断单元,在将所述终端解除锁定之前还用于:
    确认用户输入的解锁指令与预设的解锁指令匹配。
  17. 根据权利要求16所述的终端,其特征在于,所述终端还包括:
    接收单元,用于所述判断单元确认所述解锁指令与预设的解锁指令不匹配时,接收判断单元返回的解锁指令错误信息。
  18. 根据权利要求11所述的终端,其特征在于,所述显示单元在终端解锁界面中显示所述联系人标识集合包括:
    以气泡漂浮的方式显示联系人标识或以图标排列的方式显示联系人标识。
  19. 根据权利要求11所述的终端,其特征在于,所述获取单元获取的所述输入的解锁指令包括:
    长按目标联系人标识、双击目标联系人标识、单击目标联系人标识、将 目标联系人标识按预设轨迹进行滑行操作、长按确定按键选定目标联系人标识、双击确定按键选定目标联系人标识或单击确定按键选定目标联系人标识。
  20. 根据权利要求11~19所述的终端,其特征在于,所述联系人标识包括:联系人姓名、联系人昵称、联系人头像中的一种或者多种。
PCT/CN2015/080159 2014-10-31 2015-05-29 一种终端解锁方法及终端 WO2016065895A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/156,588 US20160259925A1 (en) 2014-10-31 2016-05-17 Terminal unlocking method and terminal

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201410606501.4A CN104462892A (zh) 2014-10-31 2014-10-31 一种终端
CN201410606507.1 2014-10-31
CN201410606507.1A CN104378502B (zh) 2014-10-31 2014-10-31 一种终端解锁方法
CN201410606501.4 2014-10-31

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/156,588 Continuation US20160259925A1 (en) 2014-10-31 2016-05-17 Terminal unlocking method and terminal

Publications (1)

Publication Number Publication Date
WO2016065895A1 true WO2016065895A1 (zh) 2016-05-06

Family

ID=55856523

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/080159 WO2016065895A1 (zh) 2014-10-31 2015-05-29 一种终端解锁方法及终端

Country Status (2)

Country Link
US (1) US20160259925A1 (zh)
WO (1) WO2016065895A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10476875B2 (en) * 2017-04-21 2019-11-12 T-Mobile Usa, Inc. Secure updating of telecommunication terminal configuration
CN107613124B (zh) * 2017-09-20 2020-10-02 深圳传音通讯有限公司 智能设备的解锁方法、智能设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8387141B1 (en) * 2011-09-27 2013-02-26 Green Head LLC Smartphone security system
CN103200011A (zh) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 一种密码认证方法及装置
CN103645838A (zh) * 2013-11-28 2014-03-19 宇龙计算机通信科技(深圳)有限公司 一种移动终端及其解锁方法
CN103974249A (zh) * 2013-01-29 2014-08-06 北京三星通信技术研究有限公司 基于验证信息通信的方法及其设备
CN104378502A (zh) * 2014-10-31 2015-02-25 深圳市金立通信设备有限公司 一种终端解锁方法
CN104462892A (zh) * 2014-10-31 2015-03-25 深圳市金立通信设备有限公司 一种终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8387141B1 (en) * 2011-09-27 2013-02-26 Green Head LLC Smartphone security system
CN103974249A (zh) * 2013-01-29 2014-08-06 北京三星通信技术研究有限公司 基于验证信息通信的方法及其设备
CN103200011A (zh) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 一种密码认证方法及装置
CN103645838A (zh) * 2013-11-28 2014-03-19 宇龙计算机通信科技(深圳)有限公司 一种移动终端及其解锁方法
CN104378502A (zh) * 2014-10-31 2015-02-25 深圳市金立通信设备有限公司 一种终端解锁方法
CN104462892A (zh) * 2014-10-31 2015-03-25 深圳市金立通信设备有限公司 一种终端

Also Published As

Publication number Publication date
US20160259925A1 (en) 2016-09-08

Similar Documents

Publication Publication Date Title
US11934505B2 (en) Information content viewing method and terminal
US9532212B2 (en) Method and apparatus for processing data and message
CA2852346C (en) System and method for managing electronic groups
AU2011215010B2 (en) Method and apparatus for providing information in mobile terminal
US20180063717A1 (en) Bypassing security authentication scheme on a lost device to return the device to the owner
US8913099B2 (en) Systems and methods to manage video chat contacts
CN108810283A (zh) 用于提供通知并与通知进行交互的设备、方法和图形用户界面
US20150169505A1 (en) Textbox magnifier
CN109155750B (zh) 一种通信方法及设备
CN107395880B (zh) 信息显示方法、装置及终端
US20160241530A1 (en) Systems and methods for managing access to message content
CN104462892A (zh) 一种终端
US11593464B2 (en) System and method for providing user accounts through which users are able to operate computing devices
CN103442140B (zh) 一种输入法与通讯录协同的方法、***及移动终端
CN103188371A (zh) 私密通信的方法及其通信终端
US20080160960A1 (en) Remote processing device management
CN104378502B (zh) 一种终端解锁方法
CN106549859A (zh) 会话消息管理方法及装置
TW201409988A (zh) 手持裝置及其解除鎖定的方法
WO2016065895A1 (zh) 一种终端解锁方法及终端
KR20160029045A (ko) 메시지 전송 차단 방법
CN107241515B (zh) 一种来电拒接的处理方法及终端
US20160294787A1 (en) Secure and confidential messaging systems
EP2584457A1 (en) System and method for providing identifying information related to an incoming or outgoing call
CN103491231A (zh) 基于时间和位置的限制呼叫方法及***

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15854498

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15854498

Country of ref document: EP

Kind code of ref document: A1