[go: up one dir, main page]

CN108288472A - Releasing screen locking method based on speech recognition and mobile terminal - Google Patents

Releasing screen locking method based on speech recognition and mobile terminal Download PDF

Info

Publication number
CN108288472A
CN108288472A CN201810055172.7A CN201810055172A CN108288472A CN 108288472 A CN108288472 A CN 108288472A CN 201810055172 A CN201810055172 A CN 201810055172A CN 108288472 A CN108288472 A CN 108288472A
Authority
CN
China
Prior art keywords
information
voice messaging
screen
locking
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810055172.7A
Other languages
Chinese (zh)
Inventor
金果
卢云伟
董斌
王鲲
伍威铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN HIPAD COMMUNICATION TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN HIPAD COMMUNICATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN HIPAD COMMUNICATION TECHNOLOGY Co Ltd filed Critical SHENZHEN HIPAD COMMUNICATION TECHNOLOGY Co Ltd
Priority to CN201810055172.7A priority Critical patent/CN108288472A/en
Publication of CN108288472A publication Critical patent/CN108288472A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/02Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Theoretical Computer Science (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of releasing screen locking method and mobile terminal based on speech recognition, includes the following steps:Step S10, when receiving the operational order for locking screen interface, the display reminding information on locking screen interface, and enroll the first voice messaging;Step S20 matches first voice messaging with the history voice messaging in speech database;Step S30, if the encrypted message is correct, releases the locking for the screen if first voice messaging and the history voice messaging successful match, prompt user to input encrypted message on the screen.The present invention solve it is existing in the prior art, based on figure and number as protect password, for solve lock screen, there is technical issues that safety it is low and with leakage, with raising for information in mobile terminal protectiveness.

Description

Releasing screen locking method based on speech recognition and mobile terminal
Technical field
The invention belongs to electronic communication technology field more particularly to a kind of releasing screen locking methods and shifting based on speech recognition Dynamic terminal.
Background technology
Currently, as the information age arrives, stored information is very heavy for user in most of mobile terminals It wants, therefore it is current important research direction to protect privacy.It is existing for information in mobile terminal guard method, be confined to shield Curtain locking, i.e. screen locking.It is typically required user's tablet pattern password and numerical ciphers could carry out unlocking screen, but this biography The unlock scheme of system has increasingly been unsatisfactory for the diversified functional requirement of user, and figure, and number does not have unique simultaneously Property, that is, indicate that figure and number after there are more people to know, can release screen locking, there are larger safety is hidden Suffer from.
Therefore, the prior art is to be improved.
Invention content
It is a primary object of the present invention to propose a kind of releasing screen locking method and mobile terminal based on speech recognition, with solution It is certainly existing in the prior art, based on figure and number protection password, for solve lock screen, there are safety it is low and have Have and reveal possible technical problem, to improve for information in mobile terminal protectiveness.
In order to solve the above-mentioned technical problem, the releasing screen locking method of the invention based on speech recognition, includes the following steps:
Step S10, when receiving the operational order for locking screen interface, the display reminding information on locking screen interface, and enroll First voice messaging;
Step S20 matches first voice messaging with the history voice messaging in speech database;
Step S30 prompts user's input on the screen if first voice messaging and the history voice messaging successful match Encrypted message releases the locking for the screen if the encrypted message is correct.
Preferably, in the step S30, the encrypted message includes that numerical ciphers information, finger print information or figure are close Code information.
Preferably, the history voice messaging includes pre-stored at least two pronunciation information of user, the prompt letter Breath includes the pattern by being mixed with the font corresponding at least two pronunciation information.
Preferably, the step S20 includes step:
Step S21 extracts loudness information, timbre information and the tone information of first voice messaging;
Step S22 matches the loudness information, timbre information and tone information with corresponding pronunciation information respectively.
Preferably, further include step:
Step S40, every preset time period show a font corresponding with the pronunciation information and enroll second on the screen Voice messaging;
Step S50 verifies second voice messaging, and screen locking or maintenance are carried out to current screen based on verification result Present situation operates.
The present invention also provides a kind of mobile terminals, including:
First admission module, for when receiving the operational order for locking screen interface, display reminding to be believed on locking screen interface Breath, and enroll the first voice messaging;
First matching module, for matching first voice messaging with the history voice messaging in speech database;
Module is released, if for first voice messaging and the history voice messaging successful match, prompt on the screen is used Family inputs encrypted message, if the encrypted message is correct, releases the locking for the screen.
Preferably, the encrypted message includes numerical ciphers information, finger print information or graphical passwords information.
Preferably, the history voice messaging includes pre-stored at least two pronunciation information of user, the prompt letter Breath includes the pattern by being mixed with the font corresponding at least two pronunciation information.
Preferably, first matching module includes:
Extracting sub-module, loudness information, timbre information and tone information for extracting first voice messaging;
Matched sub-block, for carrying out the loudness information, timbre information and tone information with corresponding pronunciation information respectively Matching.
Preferably, further include:
Second admission module, a font corresponding with the pronunciation information is shown for every preset time period simultaneously on the screen Enroll the second voice messaging;
Authentication module, for being verified to second voice messaging, based on verification result to current screen carry out screen locking or Person maintains the statusquo operation.
The invention has the advantages that:
1, the present invention is based on the first voice is enrolled, the voice based on people is unique, and compare figure and digital cryptoguard, base When voice is as salvo, others can not pretend to be the voice of mobile terminal user, and figure and numerical ciphers be can With leakage, therefore improve the protectiveness for information in mobile terminal.
2, the present invention is after voice match success, it is also necessary to encrypted message be verified, i.e., if necessary to release lock Screen is first then to be verified by encrypted message after voice match success, unlocking screen could be executed, based on voice and password The combination of information further improves the protectiveness for information in mobile terminal.
Description of the drawings
Fig. 1 is the flow diagram of first embodiment of the invention;
Fig. 2 is the refinement flow diagram of step S20 in first embodiment of the invention;
Fig. 3 is the flow diagram of second embodiment of the invention;
Fig. 4 is the structural schematic diagram of the mobile terminal of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
It should be noted that relational language such as " first ", " second " can be used for description various assemblies, but these arts Language is not intended to limit the component.These terms are only used to distinguish a component and another component.For example, not departing from the model of the present invention It encloses, first assembly can be referred to as the second component, and the second component can also similarly be referred to as first assembly.Term " and/ Or " refer to continuous item and description item the combination of any one or more.
With reference to figure 1, Fig. 1 is the flow diagram of first embodiment of the invention.
As shown in Figure 1, the releasing screen locking method based on speech recognition of the present invention, includes the following steps:
Step S10, when receiving the operational order for locking screen interface, the display reminding information on locking screen interface, and enroll First voice messaging;
The releasing screen locking method based on speech recognition of the present invention is to be suitable for mobile terminal;The mobile terminal include mobile phone, IPAD or notebook.In general, mobile terminal does not operate meeting automatically into locking screen interface, if that is, user will execute for a long time Operation is to need to carry out screen locking releasing, is based on this:In step slo, when receiving the operational order for locking screen interface, institute It includes slide and pressing HOME keys to state operational order;The display reminding information on locking screen interface, prompt message can be figures Can also be word, be not limited to herein it is above-mentioned, as long as convenient for for seeing, being prompted for voice output; User carries out voice repetition after seeing the prompt message, and the first voice letter of user is enrolled based on the microphone in mobile terminal Breath.
Step S20 matches first voice messaging with the history voice messaging in speech database;
After executing the step S10, step S20 is executed, by the history voice in first voice messaging and speech database Information is matched;The speech database is that user builds in mobile terminal in advance, the history language for storing user Message ceases;Indicate that the history voice messaging is the history voice data that user is stored in mobile terminal.Wherein, match party Formula is as follows:First voice messaging is parsed, to obtain corresponding with the first voice messaging first waveform information, by described the One waveform carries out overlapping matching with the second shape information in the history voice messaging;It should be noted that being not limited to Above-mentioned matching way, as long as waveform analysis is carried out for the first voice messaging, and with storage to the history language in mobile terminal Message breath is matched, and the equivalents of step S20 are belonged to.
Step S30, if first voice messaging and the history voice messaging successful match, prompt user on the screen Encrypted message is inputted, if the encrypted message is correct, releases the locking for the screen.
After executing the step S20, step S30 is executed, if first voice messaging and the history voice messaging With success, for example it is based on above-mentioned matching way, show that Duplication is more than 90%, that is, assert successful match;User is prompted on the screen Encrypted message is inputted, the encrypted message includes that the encrypted message includes numerical ciphers information, finger print information or graphical passwords Information, then mobile terminal verifies the encrypted message, if the encrypted message is correct, releases for the screen Locking;Complete unlock operation.The beneficial effects of the invention are as follows:The present invention is based on enrolling the first voice, the voice based on people It is unique, compare figure and digital cryptoguard, and when based on voice as salvo, others can not pretend to be mobile whole The voice of user is held, and figure and numerical ciphers can be revealed, therefore improve the guarantor for information in mobile terminal Shield property.The present invention is after voice match success, it is also necessary to encrypted message be verified, i.e., if necessary to release screen locking, be It first after voice match success, then is verified by encrypted message, unlocking screen could be executed, based on voice and encrypted message In conjunction with being very important, existing encrypted message leakage be it is relatively common, voice be although with uniqueness, but it is just in case logical It crosses after recorder includes, and there are certain security risk, therefore the combination of the two is during for releasing screen locking, further Improve the protectiveness for information in mobile terminal;When executing screen lock protection, first voice, rear encrypted message input Sequence is vital, existing hacker software is invaded, it is to need to solve to be cracked based on voice in cracking voice process Analysis process, thus for the decryption information that compares be need it is additional it is more crack time and difficulty, and when hacker software is broken After having solved voice messaging, that is, behind the first layer defence line for having broken the present invention, it is still desirable to execute encrypted message and crack, this is for black For objective software, it is difficult to;Because existing hacker software is not provided simultaneously with speech analysis and encrypted message cracks Driving, it is excessively high based on R&D costs, it is rare.
Wherein, the history voice messaging includes pre-stored at least two pronunciation information of user, the prompt message It include the pattern by being mixed with the font corresponding at least two pronunciation information.For history voice messaging and prompt Information limit, the pattern mixed by font, a kind of random combine and formed, first pass through microphone in advance with user and deposit The pronunciation information stored up in mobile terminal is not quite similar, and based on characteristics this random and without logic rules, improves language Difficulty in sound identification process and randomness are conducive to that someone is avoided deliberately to overcome speech recognition with recorder.Wherein, English words Mother also belongs to the equivalents of font in the present embodiment, should belong to the protection domain of the present embodiment.
With reference to figure 2, Fig. 2 is the refinement flow diagram of step S20 in first embodiment of the invention.
As shown in Figure 2, it is preferable that the step S20 includes step:
Step S21 extracts loudness information, timbre information and the tone information of first voice messaging;
Step S22 matches the loudness information, timbre information and tone information with corresponding pronunciation information respectively.
In the present embodiment, step S20 is defined, after having enrolled the first voice messaging, step is first carried out S21 extracts loudness information, timbre information and the tone information of first voice messaging, and the loudness information includes volume, than If the volume is 80 decibels;The timbre information includes waveform peak-to-peak value, and what the waveform peak peak value indicated is for first After voice messaging parsing in acquired waveform in a cycle peak and minimum difference;The tone information includes frequency Rate, such as the frequency are 20KHZ, indicate 200,000 hertz;Then above-mentioned loudness information, timbre information and tone information are distinguished It is matched with corresponding pronunciation information, the history voice messaging in the speech database includes User ID and the use The corresponding fonts of family ID, frequency corresponding with the font, peak-to-peak value and volume.In step S22, based on the sound extracted Information, timbre information and tone information are spent to carry out and the frequency, peak-to-peak value and volume Corresponding matching;This preferred embodiment base The loudness information, timbre information and the tone information that are extracted in the first voice messaging is matched, and speech recognition is improved Accuracy in the process and speed.
With reference to figure 3, Fig. 3 is the flow diagram of second embodiment of the invention.
As shown in Figure 3, it is preferable that further include step:
Step S40, every preset time period show a font corresponding with the pronunciation information and enroll second on the screen Voice messaging;
Step S50 verifies second voice messaging, and screen locking or maintenance are carried out to current screen based on verification result Present situation operates.
This preferred embodiment is by additional step S40, and after solution lock screen success, every preset time period is on the screen Show that a font corresponding with the pronunciation information simultaneously enrolls the second voice messaging, the preset time period is 30S, and base In subsequent step S50, second voice messaging is verified, screen locking or dimension are carried out to current screen based on verification result Hold present situation operation;And be for a font corresponding with the pronunciation information, it is to be extracted from speech database at random A font to be displayed on the screen, voice input is carried out after user sees one font, one font is Randomly select, and only there are one, the great contingency for verification process;It improves and information in mobile terminal is protected The stability of shield.
As shown in figure 4, the present invention also provides a kind of mobile terminals, including:
First admission module 101, for when receiving the operational order for locking screen interface, the display reminding on locking screen interface Information, and enroll the first voice messaging;
First matching module 102 is used for the history voice messaging progress in first voice messaging and speech database Match;
Module 103 is released, if for first voice messaging and the history voice messaging successful match, is prompted on the screen User inputs encrypted message, if the encrypted message is correct, releases the locking for the screen.
Preferably, the encrypted message includes numerical ciphers information, finger print information or graphical passwords information.
Preferably, the history voice messaging includes pre-stored at least two pronunciation information of user, the prompt letter Breath includes the pattern by being mixed with the font corresponding at least two pronunciation information.
Preferably, first matching module includes:
Extracting sub-module, loudness information, timbre information and tone information for extracting first voice messaging;
Matched sub-block, for carrying out the loudness information, timbre information and tone information with corresponding pronunciation information respectively Matching.
Preferably, further include:
Second admission module, a font corresponding with the pronunciation information is shown for every preset time period simultaneously on the screen Enroll the second voice messaging;
Authentication module, for being verified to second voice messaging, based on verification result to current screen carry out screen locking or Person maintains the statusquo operation.
Above-mentioned mobile terminal is corresponding with the releasing screen locking method based on speech recognition;Included in the mobile terminal Module be that by the electronic component or device of the releasing each step of screen locking method based on speech recognition;Cause The embodiment that this mobile terminal is included is also corresponding with the embodiment released in screen locking method based on speech recognition;Here It no longer describes, but can realize that the device of each step of releasing screen locking method based on speech recognition or module should all belong to In protection scope of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of releasing screen locking method based on speech recognition, which is characterized in that include the following steps:
Step S10, when receiving the operational order for locking screen interface, the display reminding information on locking screen interface, and enroll First voice messaging;
Step S20 matches first voice messaging with the history voice messaging in speech database;
Step S30 prompts user's input on the screen if first voice messaging and the history voice messaging successful match Encrypted message releases the locking for the screen if the encrypted message is correct.
2. the releasing screen locking method based on speech recognition as described in claim 1, which is characterized in that in the step S30, institute It includes numerical ciphers information, finger print information or graphical passwords information to state encrypted message.
3. the releasing screen locking method based on speech recognition as described in claim 1, which is characterized in that the history voice messaging packet Pre-stored at least two pronunciation information of user is included, the prompt message includes by right at least two pronunciation information institute The pattern that the font answered mixes.
4. the releasing screen locking method based on speech recognition as claimed in claim 3, which is characterized in that the step S20 includes step Suddenly:
Step S21 extracts loudness information, timbre information and the tone information of first voice messaging;
Step S22 matches the loudness information, timbre information and tone information with corresponding pronunciation information respectively.
5. the releasing screen locking method based on speech recognition as claimed in claim 3, which is characterized in that further include step:
Step S40, every preset time period show a font corresponding with the pronunciation information and enroll second on the screen Voice messaging;
Step S50 verifies second voice messaging, and screen locking or maintenance are carried out to current screen based on verification result Present situation operates.
6. a kind of mobile terminal, which is characterized in that including:
First admission module, for when receiving the operational order for locking screen interface, display reminding to be believed on locking screen interface Breath, and enroll the first voice messaging;
First matching module, for matching first voice messaging with the history voice messaging in speech database;
Module is released, if for first voice messaging and the history voice messaging successful match, prompt on the screen is used Family inputs encrypted message, if the encrypted message is correct, releases the locking for the screen.
7. mobile terminal as claimed in claim 6, which is characterized in that the encrypted message includes numerical ciphers information, fingerprint letter Breath or graphical passwords information.
8. mobile terminal as claimed in claim 6, which is characterized in that the history voice messaging includes that user is pre-stored extremely Few two pronunciation informations, the prompt message includes by being mixed with the font corresponding at least two pronunciation information Pattern.
9. mobile terminal as claimed in claim 8, which is characterized in that first matching module includes:
Extracting sub-module, loudness information, timbre information and tone information for extracting first voice messaging;
Matched sub-block, for carrying out the loudness information, timbre information and tone information with corresponding pronunciation information respectively Matching.
10. mobile terminal as claimed in claim 8, which is characterized in that further include:
Second admission module, a font corresponding with the pronunciation information is shown for every preset time period simultaneously on the screen Enroll the second voice messaging;
Authentication module, for being verified to second voice messaging, based on verification result to current screen carry out screen locking or Person maintains the statusquo operation.
CN201810055172.7A 2018-01-19 2018-01-19 Releasing screen locking method based on speech recognition and mobile terminal Pending CN108288472A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810055172.7A CN108288472A (en) 2018-01-19 2018-01-19 Releasing screen locking method based on speech recognition and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810055172.7A CN108288472A (en) 2018-01-19 2018-01-19 Releasing screen locking method based on speech recognition and mobile terminal

Publications (1)

Publication Number Publication Date
CN108288472A true CN108288472A (en) 2018-07-17

Family

ID=62835477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810055172.7A Pending CN108288472A (en) 2018-01-19 2018-01-19 Releasing screen locking method based on speech recognition and mobile terminal

Country Status (1)

Country Link
CN (1) CN108288472A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919021A (en) * 2019-01-29 2019-06-21 深圳市海派通讯科技有限公司 Face shoots image guard method
CN111191206A (en) * 2019-12-23 2020-05-22 东莞宇龙通信科技有限公司 Unlocking verification method and device, storage medium and terminal
CN113220196A (en) * 2021-04-30 2021-08-06 深圳掌酷软件有限公司 Awakening method for designated application in breath screen state

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267310A (en) * 2008-05-04 2008-09-17 王琰 Computer network access control system and method
CN103531200A (en) * 2013-10-29 2014-01-22 宇龙计算机通信科技(深圳)有限公司 Voice unlocking method and terminal
CN104142796A (en) * 2013-05-07 2014-11-12 北京三星通信技术研究有限公司 Terminal unlocking method and terminal
US20150026480A1 (en) * 2006-05-05 2015-01-22 Proxense, Llc Personal Digital Key Initialization And Registration For Secure Transactions
CN104317515A (en) * 2014-10-22 2015-01-28 广州视源电子科技股份有限公司 Unlocking method and unlocking device of mobile terminal and mobile terminal
CN106653033A (en) * 2016-10-28 2017-05-10 努比亚技术有限公司 Voice unlocking device, terminal and method
CN106874724A (en) * 2016-12-30 2017-06-20 深圳天珑无线科技有限公司 Prevent the method and system that electronic equipment is stolen
CN107463815A (en) * 2016-06-06 2017-12-12 中兴通讯股份有限公司 Method for authenticating and device
CN107491671A (en) * 2016-06-13 2017-12-19 中兴通讯股份有限公司 A kind of safe login method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150026480A1 (en) * 2006-05-05 2015-01-22 Proxense, Llc Personal Digital Key Initialization And Registration For Secure Transactions
CN101267310A (en) * 2008-05-04 2008-09-17 王琰 Computer network access control system and method
CN104142796A (en) * 2013-05-07 2014-11-12 北京三星通信技术研究有限公司 Terminal unlocking method and terminal
CN103531200A (en) * 2013-10-29 2014-01-22 宇龙计算机通信科技(深圳)有限公司 Voice unlocking method and terminal
CN104317515A (en) * 2014-10-22 2015-01-28 广州视源电子科技股份有限公司 Unlocking method and unlocking device of mobile terminal and mobile terminal
CN107463815A (en) * 2016-06-06 2017-12-12 中兴通讯股份有限公司 Method for authenticating and device
CN107491671A (en) * 2016-06-13 2017-12-19 中兴通讯股份有限公司 A kind of safe login method and device
CN106653033A (en) * 2016-10-28 2017-05-10 努比亚技术有限公司 Voice unlocking device, terminal and method
CN106874724A (en) * 2016-12-30 2017-06-20 深圳天珑无线科技有限公司 Prevent the method and system that electronic equipment is stolen

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919021A (en) * 2019-01-29 2019-06-21 深圳市海派通讯科技有限公司 Face shoots image guard method
CN111191206A (en) * 2019-12-23 2020-05-22 东莞宇龙通信科技有限公司 Unlocking verification method and device, storage medium and terminal
CN113220196A (en) * 2021-04-30 2021-08-06 深圳掌酷软件有限公司 Awakening method for designated application in breath screen state

Similar Documents

Publication Publication Date Title
Barkadehi et al. Authentication systems: A literature review and classification
US8117458B2 (en) Methods and systems for graphical image authentication
KR101719933B1 (en) Method for producing dynamic data structures for authentication and/or password identification
US8396711B2 (en) Voice authentication system and method
EP1540869B1 (en) System and method for user authentication with enhanced passwords
CA2649015C (en) Graphical image authentication and security system
US20180247483A1 (en) Security systems for protecting an asset
US20090276839A1 (en) Identity collection, verification and security access control system
US10909230B2 (en) Methods for user authentication
US8539574B2 (en) User authentication and access control system and method
CN108684041A (en) The system and method for login authentication
JPWO2003069489A1 (en) Identification method
CN108288472A (en) Releasing screen locking method based on speech recognition and mobile terminal
CN101110667A (en) User authentication method and user authentication system
CN101877636A (en) Equation password encryption method
Ferbrache Passwords are broken–the future shape of biometrics
Alsuhibany A Camouflage Text‐Based Password Approach for Mobile Devices against Shoulder‐Surfing Attack
Di Campi Password guessing: learn the nature of passwords by studying the human behavior
CN105897429B (en) Method for authenticating, authentication device and terminal
CN105373743B (en) The calling control method of input method process, call control system and terminal
Kaushik et al. A novel graphical password scheme to avoid shoulder-surfing attacks in android devices
Patel et al. Graphical Password Authentication Using Colour Login Technique
JP2003157412A (en) Client device, PIN unlocking device, and PIN unlocking method
CN106301790B (en) Confidential information interaction method, mobile terminal
US12395485B2 (en) Fraud resistant passcode entry system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180717

RJ01 Rejection of invention patent application after publication