[go: up one dir, main page]

WO2018035930A1 - System unlocking method and device - Google Patents

System unlocking method and device Download PDF

Info

Publication number
WO2018035930A1
WO2018035930A1 PCT/CN2016/100778 CN2016100778W WO2018035930A1 WO 2018035930 A1 WO2018035930 A1 WO 2018035930A1 CN 2016100778 W CN2016100778 W CN 2016100778W WO 2018035930 A1 WO2018035930 A1 WO 2018035930A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
terminal device
threshold
information
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/100778
Other languages
French (fr)
Chinese (zh)
Inventor
卢乐金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Publication of WO2018035930A1 publication Critical patent/WO2018035930A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method and device for unlocking a system.
  • many terminal devices are equipped with relevant lock screens and unlocking programs.
  • the lock screen and the unlocking program are run on the terminal screen, and the related unlocking interface is displayed.
  • the authentication information input by the user is passed. After the certification, the system can be successfully entered.
  • the communication terminal device can only set one unlock interface and corresponding password.
  • the terminal device may be forced to speak the password or perform the terminal device. Unlock.
  • the infringer can operate the terminal device of the victim to log in to the payment application to perform the transfer and other operations.
  • the unlocking methods adopted by the terminal device include: digital password, gesture pattern, sliding unlocking, etc., and these unlocking methods cannot effectively prevent the unscrupulous person from performing the transfer and the like when the owner of the terminal device is forced to unlock the terminal device.
  • the embodiment of the invention provides a method and a device for unlocking a system, so as to protect the security of the personal property of the terminal device owner when it is forced to unlock the terminal device.
  • An embodiment of the present invention provides a method for unlocking a system, including:
  • the terminal device receives the authentication information in a system locked state
  • the terminal device uses the preset system unlocking authentication information to authenticate the authentication information. If the authentication fails, the authentication information is re-received, and the re-received authentication information is authenticated by using the preset system unlocking authentication information. Until the certification is passed;
  • the terminal device counts the number of authentication failures, and enters the first system if the number of authentication failures is less than the first threshold, and enters the second system if the number of authentication failures is greater than the second threshold;
  • the first system lacks a payment class application, and the second threshold is greater than or equal to the first threshold.
  • the method before the terminal device receives the authentication information in the system locked state, the method further includes:
  • the terminal device displays an authentication interface after receiving the unlocking instruction.
  • the method further includes:
  • the terminal device freezes and hides the payment application.
  • the method further includes:
  • the replacement command is received, the currently used authentication mode is replaced with the authentication mode specified by the replacement instruction, and then the re-receiving authentication information is executed.
  • the method further includes:
  • the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal.
  • the embodiment of the invention further discloses a terminal device, including:
  • the receiving unit is configured to receive the authentication information when the terminal device is in the system locked state; and re-receive the authentication information after the authentication fails;
  • An authentication unit configured to authenticate the authentication information by using preset system unlock authentication information
  • the statistical unit is set to count the number of failed authentication attempts.
  • An execution unit configured to enter the first system if the number of authentication failures is less than the first threshold, and enter the second system if the number of authentication failures is greater than the second threshold;
  • the system lacks a payment application, and the second threshold is greater than or equal to the first threshold;
  • the receiving unit is further configured to receive an unlocking instruction; the device further includes:
  • a display unit configured to display an authentication interface after the receiving unit receives the unlocking instruction.
  • the device further includes:
  • the application control unit is configured to freeze and hide the payment application in the terminal device before entering the second system if the number of authentication failures is greater than the second threshold.
  • the device further includes:
  • the output unit is configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode
  • the receiving unit is further configured to receive a replacement instruction
  • the authentication control unit is configured to: if the receiving unit receives the replacement instruction, replace the currently used authentication mode with the authentication mode specified by the replacement instruction;
  • the receiving unit is further configured to re-receive the authentication information after the currently used authentication mode is replaced with the authentication mode specified by the replacement instruction.
  • the device further includes:
  • a positioning unit configured to locate location information of the terminal device.
  • the sending unit is configured to send the location information and the alarm information of the terminal device to the preset target terminal after the terminal device enters the second system.
  • the method of the embodiment provides an unlocking method that can freeze and hide the payment application.
  • the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.
  • FIG. 1 is a schematic flowchart of a system unlocking method according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • the embodiment of the invention provides a system unlocking method, as shown in FIG. 1 , including:
  • the terminal device receives the authentication information in a system locked state
  • the terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, or the like.
  • the system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state.
  • the authentication information is verification information required to release the locked state of the terminal device.
  • the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
  • the authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like.
  • the corresponding authentication information is a fingerprint.
  • the authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention.
  • the terminal device receives the authentication information in the system locked state.
  • the authentication device may have no authentication interface, that is, the mobile phone is in a black screen state.
  • the user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.
  • the terminal device authenticates the authentication information by using preset system unlocking authentication information, and if the authentication fails, re-receiving the authentication information, and authenticating the re-received authentication information by using the preset system unlocking authentication information, until Certification passed.
  • the preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authenticating the authentication information input by the user.
  • the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
  • the embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.
  • the first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be found in the system.
  • the payment application refers to an application used on a communication terminal device such as Alipay, WeChat payment, and mobile banking.
  • the first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc.
  • the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7.
  • the second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4.
  • the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the first system or the second system may be entered.
  • both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.
  • the embodiment provides an unlocking method that can freeze and hide the payment application.
  • the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.
  • the embodiment of the present invention provides another method for receiving authentication information on the basis of the previous embodiment, which is specifically as follows: the terminal device receives the authentication in the system locked state. Before the information, the above methods also include:
  • the authentication interface is displayed.
  • the method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes.
  • the terminal device in the embodiment of the present invention displays the authentication interface after receiving the unlocking instruction.
  • the authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.
  • the user After the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.
  • the method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.
  • the method of the present invention provides a method for configuring a security system, which is as follows: Before the number of the authentication failures is greater than the second threshold, the method further includes:
  • the above terminal device freezes and hides the above payment type application.
  • the second system is the configured security system.
  • the payment application in the second system is in a frozen and hidden state, and the payment application cannot be found in the second system. Therefore, even if the terminal device is successfully unlocked, the transfer cannot be performed. operating.
  • the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds.
  • the configuration process of the second system that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not notice the process.
  • the payment application such as Alipay, mobile banking, WeChat payment, etc. in the mobile phone is frozen and cannot be found in the mobile phone.
  • the method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.
  • the method of the present invention further provides a method for replacing the authentication mode, as follows: After the authentication fails, the method further includes:
  • the currently used authentication method is replaced with the authentication method specified by the replacement instruction, and then the above re-accept authentication information is executed.
  • a plurality of authentication modes can be set in the terminal device.
  • the user forgets the current authentication information of the terminal device, the user can also change another authentication mode.
  • the user when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. .
  • the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.
  • three authentication modes such as pattern unlocking, fingerprint unlocking, and voice unlocking
  • the default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or select another authentication method after the authentication fails; if the user is forced to unlock, he can deliberately fail the authentication and then select the pattern that is easy to deliberately failed to be unlocked. the way.
  • the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.
  • the method for replacing the authentication method provided by the embodiment of the present invention not only enriches the authentication mode, but also improves the practical value of the method of the embodiment of the present invention.
  • An embodiment of the present invention provides an alarm method, which is as follows: After the terminal device enters the second system, the method further includes:
  • the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal.
  • the preset target terminal may be a terminal device of a mechanism such as a police station preset by the user, or may be another terminal device.
  • the alarm message is used to indicate that the user of the terminal device is in danger and needs help.
  • the alarm information may include the user's identity information, physical information, appearance information, and the like.
  • the location information accurately locates the location of the terminal device.
  • the terminal device periodically sends location information to the preset target terminal device, and continuously notifies the location information of the preset target terminal device.
  • the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.
  • the alarm method provided by the embodiment of the invention can covertly transmit the location information and the alarm information of the terminal device to the preset target terminal, thereby helping the victim to be rescued in time.
  • the embodiment of the invention further provides a terminal device, as shown in FIG. 2, comprising:
  • the receiving unit 201 is configured to receive the authentication information when the terminal device is in the system locked state, and re-receive the authentication information after the authentication fails;
  • the authentication unit 202 is configured to authenticate the foregoing authentication information by using preset system unlock authentication information;
  • the statistics unit 203 is configured to count the number of failed authentication attempts
  • the executing unit 204 is configured to enter the first system if the number of authentication failures is less than the first threshold, and enter the second system if the number of authentication failures is greater than the second threshold; the second system lacks a payment class compared to the first system.
  • the second threshold is greater than or equal to the first threshold.
  • the terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a MID, or the like.
  • the system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state.
  • the authentication information is verification information required to release the locked state of the terminal device.
  • the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
  • the authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like.
  • the corresponding authentication information is a fingerprint.
  • the authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention.
  • the receiving unit 201 is arranged to receive authentication information, which may be in various forms.
  • the terminal device receives the authentication information in the system locked state.
  • the authentication device may have no authentication interface, that is, the mobile phone is in a black screen state.
  • the user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.
  • the preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authentication with the authentication information input by the user.
  • the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
  • the authentication unit 202 performs authentication using the preset system unlock authentication information and the above-described authentication information.
  • the embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.
  • the first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be found in the system.
  • the payment application refers to an application used on a communication terminal such as Alipay, WeChat payment, and mobile banking.
  • the first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc.
  • the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7.
  • the second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4.
  • the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the system may enter the first system or the second system.
  • both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.
  • the method of the embodiment provides an unlocking method that can freeze and hide the payment application.
  • the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.
  • the embodiment of the present invention further provides another method for receiving the authentication information, which is specifically as follows. Further, as shown in FIG. 3, the device further includes:
  • the receiving unit is further configured to receive an unlocking instruction
  • the display unit 301 is configured to display an authentication interface after the receiving unit receives the unlocking instruction.
  • the method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes.
  • the terminal device in the embodiment of the present invention displays the authentication interface after receiving the instruction, and the authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.
  • the user After the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.
  • the method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.
  • the embodiment of the present invention further provides a method for configuring a security system, which is specifically as follows. Further, as shown in FIG. 4, the terminal device further includes:
  • the freeze and hide unit unit 401 is configured to freeze and hide the payment application in the terminal device before entering the second system if the number of authentication failures is greater than the second threshold.
  • the second system is a configured security system.
  • the payment application in the second system is in a frozen and hidden state, and the payment application cannot be found in the second system. Therefore, even if the terminal device is successfully unlocked, the transfer cannot be performed. .
  • the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds.
  • the configuration process of the second system that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not notice the process.
  • the payment application such as Alipay, mobile banking, and WeChat payment in the mobile phone cannot be found in the mobile phone.
  • the method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.
  • the embodiment of the present invention further provides a method for replacing the authentication mode, which is specifically as follows. Further, as shown in FIG. 5, the device further includes:
  • the output unit 501 is configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode;
  • the receiving unit 201 is further configured to receive a replacement instruction
  • the replacing unit 502 is configured to replace the currently used authentication method with the authentication method specified by the replacement instruction, if the replacement command is received;
  • the receiving unit 201 is further configured to re-receive the authentication information after the current authentication mode is replaced with the authentication mode specified by the replacement command.
  • a plurality of authentication modes can be set in the terminal device.
  • the user forgets the current authentication information of the terminal device, the user can also change another authentication mode.
  • the user when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. .
  • the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.
  • three authentication modes such as pattern unlocking, fingerprint unlocking, and voice unlocking
  • the default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or select another authentication method after the authentication fails; if the user is forced to unlock, he can deliberately fail to select the pattern unlocking method that is easy to deliberately fail to authenticate. .
  • the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.
  • the method for replacing the authentication method provided by the embodiment of the present invention not only enriches the authentication mode, but also improves the practical value of the method of the embodiment of the present invention.
  • the embodiment of the present invention provides an alarm method based on the foregoing embodiment, and is specifically as follows. Further, as shown in FIG. 6, the device further includes:
  • the sending unit 601 is configured to send the location information and the alarm information of the terminal device to the preset target terminal after the terminal device enters the second system.
  • the positioning unit 602 is configured to locate the location information of the terminal device.
  • the preset target terminal may be a terminal device of a police station preset by the user or may be another terminal.
  • the alarm information is used to indicate that the user of the terminal device is in danger and needs help, and may include the user's identity information, physical information, and appearance information.
  • the location information accurately locates the location of the terminal device.
  • the terminal device periodically sends the location information to the preset target terminal, and continuously notifies the location information of the preset target terminal terminal device.
  • the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.
  • the alarm method provided by the embodiment of the invention can covertly transmit the location information and the alarm information of the terminal device to the preset target terminal, thereby helping the victim to get out of danger in time.
  • the embodiment of the present invention further provides a terminal device, as shown in FIG. 7, comprising: a processor 701 and a memory 702, an input device 703, and an output device 704; wherein the memory 702 can be used to provide the processor 701 for performing data processing.
  • the cache and the local cache of the preset system unlock authentication information may also be used to provide a storage space for the processor 701 to execute the data processing call and the obtained result data; wherein the input device 703 is configured to be in the locked state of the terminal device Receiving the authentication information, and also for re-receiving the authentication information and receiving the change instruction after the authentication fails; the output device 704 is configured to output the prompt message and the authentication interface, and is further configured to send the location information and the alarm information of the terminal device to the preset target terminal. .
  • the processor 701 is configured to acquire authentication information when the terminal device is in a locked state, and use the preset system unlock authentication information to authenticate the authentication information, and if the authentication fails, re-receive the authentication information, and use the foregoing pre-
  • the system unlocking authentication information is used to authenticate the re-accepted authentication information until the authentication is passed; if the number of authentication failures is less than the first threshold, the system enters the first system, and if the number of authentication failures is greater than the second threshold, the system enters The second system; the second system lacks a payment application compared to the first system, and the second threshold is greater than or equal to the first threshold.
  • the terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a MID, or the like.
  • the system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state.
  • the authentication information is verification information required to release the locked state of the terminal device.
  • the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
  • the authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like.
  • the corresponding authentication information is a fingerprint.
  • the authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention.
  • the terminal device receives the authentication information in the system locked state.
  • the authentication device may have no authentication interface, that is, the mobile phone is in a black screen state.
  • the user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.
  • the preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authentication with the authentication information input by the user.
  • the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
  • the embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.
  • the first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be seen in the system.
  • the payment application refers to an application used on a communication terminal such as Alipay, WeChat payment, and mobile banking.
  • the first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc.
  • the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7.
  • the second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4.
  • the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the system may enter the first system or the second system.
  • both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.
  • the method of the embodiment provides an unlocking method that can freeze and hide the payment application.
  • the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.
  • the embodiment of the present invention further provides an implementation method for receiving authentication information, which is specifically as follows:
  • the processor 701 is further configured to display an authentication interface after the receiving unit receives the unlocking instruction.
  • the method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes.
  • the terminal device in the embodiment of the present invention displays the authentication interface after receiving the instruction, and the authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.
  • the user After the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.
  • the method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.
  • the embodiment of the present invention further provides a method for configuring a security system, where the processor 701 is further configured to freeze and hide the terminal device before entering the second system if the number of authentication failures is greater than the second threshold. Payment application.
  • the second system described above is the configured security system, and the payment application in the second system is in a frozen and hidden state.
  • the payment type application cannot be found in the second system, so even if the terminal device is successfully unlocked, operations such as transfer cannot be performed.
  • the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds.
  • the configuration process of the second system that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not think that there is such a process.
  • the payment application such as Alipay, mobile banking, and WeChat payment in the mobile phone cannot be found in the mobile phone.
  • the method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.
  • the embodiment of the present invention further provides a method for replacing the authentication mode, which is specifically as follows: the processor 701 is further configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode and the current authentication mode after receiving the replacement command. Replace the authentication method specified by the above replacement command and re-accept the authentication information.
  • a plurality of authentication modes can be set in the terminal device.
  • the user forgets the current authentication information of the terminal device, the user can also change another authentication mode.
  • the user when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. .
  • the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.
  • three authentication modes such as pattern unlocking, fingerprint unlocking, and voice unlocking
  • the default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or deliberately fail to select another authentication method; if the user is forced to unlock, he can deliberately fail to select the pattern unlocking method that is easy to deliberately fail.
  • the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.
  • the method for replacing the authentication method provided by the embodiment of the invention not only enriches the authentication mode, but also improves the practical value of the method of the invention.
  • the embodiment of the present invention further provides an alarm method, which is specifically as follows:
  • the processor 701 is further configured to: after the terminal device enters the second system, send the location information and the alarm information of the terminal device to the preset target terminal.
  • the preset target terminal may be a terminal device of a police station preset by the user or may be another terminal.
  • the alarm information is used to indicate that the user of the terminal device is in danger and needs help, and may include the user's identity information, physical information, and appearance information.
  • the location information accurately locates the location of the terminal device.
  • the terminal device periodically sends the location information to the preset target terminal, and continuously notifies the location information of the preset target terminal terminal device.
  • the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.
  • the alarm method provided by the embodiment of the invention can covertly the location information and the alarm information of the terminal device to the preset target terminal, which can help the victim to be rescued in time.
  • the embodiment of the present invention further provides another terminal device.
  • FIG. 8 for the convenience of description, only parts related to the embodiment of the present invention are shown. For details that are not disclosed, refer to the method of the embodiment of the present invention. section.
  • the terminal device may be any terminal device including a mobile phone, a tablet computer, a vehicle-mounted computer, and the terminal device is used as a mobile phone as an example.
  • FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a terminal device provided by an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components.
  • RF radio frequency
  • the RF circuit 810 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, it is processed by the processor 880. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • the memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820.
  • the memory 820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 830 may include a touch panel 831 and other input devices 832.
  • Other input devices 832 can be used to receive input fingerprints, voice, and the like.
  • the touch panel 831 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 831 or near the touch panel 831. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 831 can include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 880 is provided and can receive commands from the processor 880 and execute them.
  • the touch panel 831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 830 may also include other input devices 832.
  • other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 840 can include a display panel 841.
  • the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 831 can cover the display panel 841. When the touch panel 831 detects a touch operation thereon or nearby, the touch panel 831 transmits to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event. The type provides a corresponding visual output on display panel 841.
  • the touch panel 831 and the display panel 841 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 831 can be integrated with the display panel 841. Realize the input and output functions of the phone.
  • the handset may also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • Audio circuitry 860, speaker 861, and microphone 862 provide an audio interface between the user and the handset.
  • the audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then the audio data is output to the processor 880 for processing, sent to the mobile phone 810 via the RF circuit 810, or the audio data is output to the memory 820 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access.
  • FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 880 may include one or more processing units; preferably, the processor 880 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 880.
  • the handset also includes a power source 890 (such as a battery) that supplies power to the various components.
  • a power source 890 such as a battery
  • the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • each step method flow may be implemented based on the structure of the terminal device.
  • the sensor 850 or the touch panel 831 can be used as a fingerprint collection device.
  • each unit included is only divided according to functional logic, but is not limited to the above division, as long as the corresponding function can be implemented;
  • the specific names are also for convenience of distinguishing from each other and are not intended to limit the scope of the present invention.
  • the storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Telephone Function (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system unlocking method and device. The method comprises: a terminal device receives authentication information in a locked state of a system (101); the terminal device authenticates the authentication information by using preset system unlocking authentication information, again receives the authentication information if the authentication fails, and authenticates the again-received authentication information by using the preset system unlocking authentication information, until the authentication passes (102); and the terminal device counts the number of times of authentication failures, the terminal device enters a first system if the number of times of authentication failures is less than or equal to a first threshold, and the terminal device enters a second system if the number of times of authentication failures is greater than a second threshold, the second system not having a payment application in comparison with the first system, and the second threshold being greater than or equal to the first threshold (103). By means of the device and the method, the safety of personal property can be protected in a case in which an owner of a terminal device is forced to unlock the terminal device of the owner.

Description

一种系统解锁方法和设备System unlocking method and device

本申请要求于2016年8月24日提交中国专利局,申请号为201610718935.2、发明名称为“一种系统解锁方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims priority to Chinese Patent Application No. 201610718935.2, entitled "System Unlocking Method and Apparatus", filed on August 24, 2016, the entire contents of .

技术领域Technical field

本发明涉及通信技术领域,特别涉及一种系统解锁的方法和设备。The present invention relates to the field of communications technologies, and in particular, to a method and device for unlocking a system.

背景技术Background technique

随着通信技术的发展,各种终端设备已经越来越普及,例如手机、平板电脑等已经成为日常生活中必不可少的部分。同时,越来越多的人喜欢使用通信终端设备上的微信支付、手机银行、支付宝等应用进行支付。With the development of communication technologies, various terminal devices have become more and more popular, such as mobile phones and tablet computers, which have become an indispensable part of daily life. At the same time, more and more people like to use WeChat payment, mobile banking, Alipay and other applications on the communication terminal equipment for payment.

为了保护用户在使用中的信息的安全和支付安全,很多终端设备安装了相关的锁屏以及解锁程序,锁屏以及解锁程序在终端屏幕上运行,显示相关的解锁界面,用户输入的认证信息通过认证后才能成功进入系统。In order to protect the security and payment security of the information in use, many terminal devices are equipped with relevant lock screens and unlocking programs. The lock screen and the unlocking program are run on the terminal screen, and the related unlocking interface is displayed. The authentication information input by the user is passed. After the certification, the system can be successfully entered.

在现有技术中,通常通信终端设备只能设置一个解锁界面以及对应的密码,当终端设备的拥有者在人身安全受到限制和威胁的情况下,可能会被迫说出密码或对终端设备进行解锁。当受侵害人被迫解锁终端设备后,侵害人就可以操作受侵害人的终端设备登陆支付应用程序进行转账等操作。目前终端设备采用的解锁方式有:数字密码、手势图案、滑动解锁等,这些解锁方式在终端设备的拥有者被迫对其终端设备进行解锁的情况下不能有效阻止不法者进行转账等操作。In the prior art, usually, the communication terminal device can only set one unlock interface and corresponding password. When the owner of the terminal device is restricted and threatened by personal safety, the terminal device may be forced to speak the password or perform the terminal device. Unlock. When the victim is forced to unlock the terminal device, the infringer can operate the terminal device of the victim to log in to the payment application to perform the transfer and other operations. At present, the unlocking methods adopted by the terminal device include: digital password, gesture pattern, sliding unlocking, etc., and these unlocking methods cannot effectively prevent the unscrupulous person from performing the transfer and the like when the owner of the terminal device is forced to unlock the terminal device.

发明内容Summary of the invention

本发明实施例提供了一种系统解锁的方法和设备,以期在终端设备拥有者被迫对其终端设备进行解锁的情况下保护其个人财产的安全。The embodiment of the invention provides a method and a device for unlocking a system, so as to protect the security of the personal property of the terminal device owner when it is forced to unlock the terminal device.

本发明实施例一方面提供了一种系统解锁的方法,包括:An embodiment of the present invention provides a method for unlocking a system, including:

终端设备在系统锁定状态下接收认证信息;The terminal device receives the authentication information in a system locked state;

所述终端设备使用预置的系统解锁认证信息对所述认证信息进行认证,若认证失败,则重新接收认证信息,并使用所述预置的系统解锁认证信息对重新接收的认证信息进行认证,直到认证通过;The terminal device uses the preset system unlocking authentication information to authenticate the authentication information. If the authentication fails, the authentication information is re-received, and the re-received authentication information is authenticated by using the preset system unlocking authentication information. Until the certification is passed;

所述终端设备统计认证失败次数,若所述认证失败次数小于第一阈值则进入第一系统,若所述认证失败次数大于第二阈值则进入第二系统;所述第二系统相比所述第一系统缺少支付类应用,所述第二阈值大于或等于所述第一阈值。The terminal device counts the number of authentication failures, and enters the first system if the number of authentication failures is less than the first threshold, and enters the second system if the number of authentication failures is greater than the second threshold; The first system lacks a payment class application, and the second threshold is greater than or equal to the first threshold.

在一个可选的实现方式中,所述终端设备在系统锁定状态下接收认证信息之前,所述方法还包括:In an optional implementation manner, before the terminal device receives the authentication information in the system locked state, the method further includes:

所述终端设备接收到解锁指令后显示认证界面。The terminal device displays an authentication interface after receiving the unlocking instruction.

在一个可选的实现方式中,若所述认证失败次数大于所述第二阈值则进入第二系统之前,所述方法还包括:In an optional implementation, if the number of authentication failures is greater than the second threshold, before the second system is entered, the method further includes:

所述终端设备冻结并隐藏所述支付类应用。The terminal device freezes and hides the payment application.

在一个可选的实现方式中,在认证失败之后,所述方法还包括:In an optional implementation manner, after the authentication fails, the method further includes:

输出提示信息,提示是否更换认证方式;Output a prompt message to prompt whether to replace the authentication method;

若接收到更换指令,则将当前使用的认证方式更换为所述更换指令所指定的认证方式,然后执行所述重新接收认证信息。If the replacement command is received, the currently used authentication mode is replaced with the authentication mode specified by the replacement instruction, and then the re-receiving authentication information is executed.

在一个可选的实现方式中,所述终端设备进入第二系统之后,所述方法还包括:In an optional implementation manner, after the terminal device enters the second system, the method further includes:

所述终端设备向预置的目标终端发送所述终端设备的位置信息和报警信息。The terminal device sends the location information and the alarm information of the terminal device to the preset target terminal.

相应地,本发明实施例还公开了一种终端设备,包括:Correspondingly, the embodiment of the invention further discloses a terminal device, including:

接收单元,设置为终端设备在系统锁定状态下,接收认证信息;在认证失败后,重新接收认证信息;The receiving unit is configured to receive the authentication information when the terminal device is in the system locked state; and re-receive the authentication information after the authentication fails;

认证单元,设置为使用预置的系统解锁认证信息对所述认证信息进行认证;An authentication unit configured to authenticate the authentication information by using preset system unlock authentication information;

统计单元,设置为统计认证失败次数;The statistical unit is set to count the number of failed authentication attempts.

执行单元,设置为若所述认证失败次数小于第一阈值则进入第一系统,若所述认证失败次数大于所述第二阈值则进入第二系统;所述第二系统相比所述第一系统缺少支付类应用,所述第二阈值大于或等于所述第一阈值;An execution unit, configured to enter the first system if the number of authentication failures is less than the first threshold, and enter the second system if the number of authentication failures is greater than the second threshold; The system lacks a payment application, and the second threshold is greater than or equal to the first threshold;

在一个可选的实现方式中,所述接收单元,还设置为接收解锁指令;所述设备还包括:In an optional implementation, the receiving unit is further configured to receive an unlocking instruction; the device further includes:

显示单元,设置为在所述接收单元接收到解锁指令之后显示认证界面。And a display unit configured to display an authentication interface after the receiving unit receives the unlocking instruction.

在一个可选的实现方式中,所述设备还包括:In an optional implementation manner, the device further includes:

应用控制单元,设置为若所述认证失败次数大于所述第二阈值则进入第二系统之前冻结并隐藏所述终端设备中的支付类应用。The application control unit is configured to freeze and hide the payment application in the terminal device before entering the second system if the number of authentication failures is greater than the second threshold.

在一个可选的实现方式中,所述设备还包括:In an optional implementation manner, the device further includes:

输出单元,设置为认证失败之后输出提示信息,提示是否更换认证方式;The output unit is configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode;

所述接收单元,还设置为接收更换指令;The receiving unit is further configured to receive a replacement instruction;

认证控制单元,设置为若所述接收单元接收到所述更换指令,则将当前使用的认证方式更换为所述更换指令所指定的认证方式;The authentication control unit is configured to: if the receiving unit receives the replacement instruction, replace the currently used authentication mode with the authentication mode specified by the replacement instruction;

所述接收单元,还设置为在当前使用的认证方式更换为所述更换指令所指定的认证方式之后,重新接收认证信息。The receiving unit is further configured to re-receive the authentication information after the currently used authentication mode is replaced with the authentication mode specified by the replacement instruction.

在一个可选的实现方式中,所述设备还包括:In an optional implementation manner, the device further includes:

定位单元,设置为定位所述终端设备的位置信息。a positioning unit configured to locate location information of the terminal device.

发送单元,设置为在所述终端设备进入第二系统之后,向预置的目标终端发送所述终端设备的位置信息和报警信息。The sending unit is configured to send the location information and the alarm information of the terminal device to the preset target terminal after the terminal device enters the second system.

可以看出,本实施例的方法提供了一种可以冻结并隐藏支付类应用的解锁方法。在终端设备拥有者被迫对其终端设备进行解锁的情况下通过简单的操作就可以冻结并隐藏支付类应用进而保护其个人财产的安全。It can be seen that the method of the embodiment provides an unlocking method that can freeze and hide the payment application. In the case where the terminal device owner is forced to unlock his terminal device, the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.

附图说明DRAWINGS

为了更清楚地说明本发明实施例中的技术方法,下面将对实施例中所需使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to more clearly illustrate the technical method in the embodiments of the present invention, the drawings to be used in the embodiments will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the present invention, Those skilled in the art can also obtain other drawings based on these drawings without any creative work.

图1是本发明实施例系统解锁方法的流程示意图;1 is a schematic flowchart of a system unlocking method according to an embodiment of the present invention;

图2为本发明实施例终端设备结构示意图;2 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图3为本发明实施例终端设备结构示意图;3 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图4为本发明实施例终端设备结构示意图;4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图5为本发明实施例终端设备结构示意图;FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图6为本发明实施例终端设备结构示意图;6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图7为本发明实施例终端设备结构示意图;FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图8为本发明实施例终端设备结构示意图。FIG. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.

具体实施方式detailed description

为了使本发明的目的、技术方法和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。The present invention will be further described in detail with reference to the accompanying drawings, in which FIG. . All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.

本发明实施例提供了一种系统解锁方法,如图1所示,包括:The embodiment of the invention provides a system unlocking method, as shown in FIG. 1 , including:

101:终端设备在系统锁定状态下接收认证信息;101: The terminal device receives the authentication information in a system locked state;

其中,终端设备例如可以是手机、平板电脑、笔记本电脑、掌上电脑等。The terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, or the like.

系统锁定状态是终端设备未解锁的状态,在该状态下终端设备通常处于待机状态。认证信息是解除终端设备的锁定状态所需的验证信息。认证信息可以是字符串、指纹、语音等中的一种或多种,它与终端设备解锁的认证方式相对应。认证方式例如可以是滑动解锁、指纹解锁、语音解锁等。例如终端设备的认证方式是指纹解锁,则对应的认证信息就是指纹。认证方式和对应的认证信息本发明实施例不作唯一性限定。The system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state. The authentication information is verification information required to release the locked state of the terminal device. The authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked. The authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like. For example, if the authentication mode of the terminal device is fingerprint unlocking, the corresponding authentication information is a fingerprint. The authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention.

终端设备在系统锁定状态下接收认证信息可以没有认证界面即手机处于黑屏状态。用户可以在终端设备处于黑屏状态的时候输入认证信息进行认证,例如在黑屏状态下通过指纹解锁。The terminal device receives the authentication information in the system locked state. The authentication device may have no authentication interface, that is, the mobile phone is in a black screen state. The user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.

102:上述终端设备使用预置的系统解锁认证信息对上述认证信息进行认证,若认证失败,则重新接收认证信息,并使用上述预置的系统解锁认证信息对重新接收的认证信息进行认证,直到认证通过。102: The terminal device authenticates the authentication information by using preset system unlocking authentication information, and if the authentication fails, re-receiving the authentication information, and authenticating the re-received authentication information by using the preset system unlocking authentication information, until Certification passed.

预置的系统解锁认证信息是在终端设备本地存储的认证信息,用于对用户输入的认证信息进行认证。认证信息可以是字符串、指纹、语音等中的一种或多种,它与终端设备解锁的认证方式相对应。本发明实施例并不重点关注如何进行认证,因此在此对此不作详述。若认证失败,用户需要重新输入认证信息,终端设备对重新接收的认证信息进行认证,认证失败一次用户需要重新输入一次,直到认证通过。若在认证成功前不再输入认证信息,则终端设备等待一定时间之后,进入待机状态。The preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authenticating the authentication information input by the user. The authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked. The embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.

103:上述终端设备统计认证失败次数,若上述认证失败次数小于第一阈值则进入第一系统,若上述认证失败次数大于第二阈值则进入第二系统;上述第二系统相比上述第一系统缺少支付类应用,上述第二阈值大于或等于上述第一阈值。103: The number of times the terminal device fails to be authenticated, and enters the first system if the number of the authentication failures is less than the first threshold, and enters the second system if the number of the authentication failures is greater than the second threshold; the second system is compared to the first system. In the absence of a payment application, the second threshold is greater than or equal to the first threshold.

第一系统是正常启动之后的系统,第二系统中的支付类应用处于冻结并隐藏的状态,也就是终端设备系统中的支付类应用是冻结的且在系统中找不到。The first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be found in the system.

支付类应用指的是支付宝、微信支付、手机银行等在通信终端设备上使用的应用程序。The payment application refers to an application used on a communication terminal device such as Alipay, WeChat payment, and mobile banking.

第一阈值例如可以是2、3、4、5、6等正整数,第二阈值例如可以是2、3、4、5、6、7等正整数。第二阈值大于或等于第一阈值,若第二阈值等于第一阈值,例如第一阈值和第二阈值都是3,如果认证失败次数小于3则进入第一系统,如果认证失败次数大于3则进入第二系统,如果认证失败次数等于3则不作限定,既可以进第一系统也可以进第二系统;若第二阈值大于第一阈值,例如第一阈值是3,第二阈值是4,如果认证失败次数小于3则进入第一系统,如果认证失败次数大于4则进入第二系统,如果认证失败次数是3或4时则不作限定,既可以进第一系统也可以进第二系统。The first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc., and the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7. The second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4. If the number of authentication failures is less than 3, the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the first system or the second system may be entered.

举例来说,当第一阈值和第二阈值都是3时,如果第4次认证成功,则进入第二系统,在此系统中可以看到并操作除支付类外的所有应用;如果第2次认证成功,则进入第一系统即正常启动系统。For example, when both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.

可以看出,本实施例提供了可以冻结并隐藏支付类应用的解锁方法。在终端设备拥有者被迫对其终端设备进行解锁的情况下通过简单的操作就可以冻结并隐藏支付类应用进而保护其个人财产的安全。It can be seen that the embodiment provides an unlocking method that can freeze and hide the payment application. In the case where the terminal device owner is forced to unlock his terminal device, the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.

为了进一步方便用户解锁终端设备和支持多种认证方式,本发明实施例在前实施例的基础上提供了另一种接收认证信息的方法,具体如下:在上述终端设备在系统锁定状态下接收认证信息之前,上述方法还包括:In order to further facilitate the user to unlock the terminal device and support multiple authentication modes, the embodiment of the present invention provides another method for receiving authentication information on the basis of the previous embodiment, which is specifically as follows: the terminal device receives the authentication in the system locked state. Before the information, the above methods also include:

上述终端设备接收到解锁指令后显示认证界面。After the terminal device receives the unlocking command, the authentication interface is displayed.

本发明实施例提供的接收认证信息的方法是为了方便用户解锁终端设备和支持多种认证方式。本发明实施例中的终端设备在接收到解锁指令后显示认证界面,认证界面可以有多种形式,例如可以是指纹解锁、图案解锁、语音解锁等。The method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes. The terminal device in the embodiment of the present invention displays the authentication interface after receiving the unlocking instruction. The authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.

举例来说,用户在终端设备的显示屏上显示出认证界面后,根据认证界面的情况输入相应的认证信息,若认证失败则重新输入认证信息。例如,用户点亮终端设备显示屏后,通过相应解锁操作,终端设备就可以显示出解锁界面,然后用户就可以输入相应认证信息进行认证。若认证成功之后,则进入相应系统;若认证不成功,重新输入认证信息进行认证。For example, after the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.

本发明实施例提供的接收认证信息的方法更加简单且支持多种认证方式。The method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.

本发明实施例在前述实施例基础上提供了配置安全系统的方法,具体如下:若上述认证失败次数大于上述第二阈值则进入第二系统之前,上述方法还包括:The method of the present invention provides a method for configuring a security system, which is as follows: Before the number of the authentication failures is greater than the second threshold, the method further includes:

上述终端设备冻结并隐藏上述支付类应用。The above terminal device freezes and hides the above payment type application.

上述第二系统就是配置后的安全系统,在第二系统中的支付类应用处于冻结并隐藏的状态,在第二系统中找不到支付类应用,因此就算终端设备解锁成功也不能进行转账等操作。The second system is the configured security system. The payment application in the second system is in a frozen and hidden state, and the payment application cannot be found in the second system. Therefore, even if the terminal device is successfully unlocked, the transfer cannot be performed. operating.

举例来说,如果用户的认证失败次数大于第二阈值,终端设备先将支付类应用冻结并隐藏起来,然后再进入认证成功后的第二系统。在实际的认证过程中,第二系统的配置过程即终端设备中支付类应用的冻结并隐藏的过程非常快,用户不会注意到这一过程。以手机为例,认证成功之后,如果手机统计的认证失败的次数大于第二阈值时,那么手机中的支付宝、手机银行、微信支付等支付类应用冻结并且在手机中是找不到的。For example, if the number of authentication failures of the user is greater than the second threshold, the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds. In the actual authentication process, the configuration process of the second system, that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not notice the process. Taking the mobile phone as an example, after the authentication is successful, if the number of authentication failures of the mobile phone statistics is greater than the second threshold, the payment application such as Alipay, mobile banking, WeChat payment, etc. in the mobile phone is frozen and cannot be found in the mobile phone.

本发明实施例提供的配置安全系统的方法十分隐蔽迅速并能有效阻止用户被迫解锁终端设备后的非法转账等操作。The method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.

本发明实施例在前实施例的基础上还提供了一种更换认证方式的方法,具体如下:在认证失败之后,上述方法还包括:The method of the present invention further provides a method for replacing the authentication mode, as follows: After the authentication fails, the method further includes:

输出提示信息,提示是否更换认证方式;Output a prompt message to prompt whether to replace the authentication method;

若接收到更换指令,则将当前使用的认证方式更换为上述更换指令所指定的认证方式,然后执行上述重新接收认证信息。If a replacement command is received, the currently used authentication method is replaced with the authentication method specified by the replacement instruction, and then the above re-accept authentication information is executed.

认证方式可以有多种,例如指纹解锁、图案解锁、语音解锁等。终端设备中可以设置多种认证方式,一方面用户如果忘记终端设备当前的认证信息还可以更换另外的认证方式;另一方面用户在被迫解锁终端设备的时候可以选择更容易认证失败的认证方式。对于本发明实施例来说,认证方式至关重要,如果终端设备只有一种认证方式且认证方式很难故意认证失败,本发明实施例的方法就失去了意义。例如,如果终端设备只有指纹解锁这一种认证方式并且指纹认证十分准确,用户在被迫解锁终端设备时很难使得认证失败的次数达到上述第二阈值。There are various authentication methods, such as fingerprint unlocking, pattern unlocking, and voice unlocking. A plurality of authentication modes can be set in the terminal device. On the other hand, if the user forgets the current authentication information of the terminal device, the user can also change another authentication mode. On the other hand, when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. . For the embodiment of the present invention, the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.

举例来说,终端设备中可以设置图案解锁、指纹解锁和语音解锁等三种认证方式,默认的认证方式是指纹解锁。若用户在安全的情况下,他可以选择使用指纹解锁也可以在认证失败后选择另外的认证方式;若用户在被迫解锁的情况下,他可以故意认证失败再选择容易故意认证失败的图案解锁方式。For example, three authentication modes, such as pattern unlocking, fingerprint unlocking, and voice unlocking, can be set in the terminal device. The default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or select another authentication method after the authentication fails; if the user is forced to unlock, he can deliberately fail the authentication and then select the pattern that is easy to deliberately failed to be unlocked. the way.

本发明实施例中认证失败的次数是累加的,认证失败次数是不同认证方式下认证失败次数的总和。这样更容易达到上述第二阈值,导致终端设备进入第二系统。In the embodiment of the present invention, the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.

本发明实施例提供的更换认证方式的方法,不仅丰富了认证方式,也提高了本发明实施例方法的实用价值。The method for replacing the authentication method provided by the embodiment of the present invention not only enriches the authentication mode, but also improves the practical value of the method of the embodiment of the present invention.

本发明实施例在前实施例的基础上还提供了一种报警方法,具体如下:上述终端设备进入第二系统之后,上述方法还包括:An embodiment of the present invention provides an alarm method, which is as follows: After the terminal device enters the second system, the method further includes:

上述终端设备向预置的目标终端发送上述终端设备的位置信息和报警信息。The terminal device sends the location information and the alarm information of the terminal device to the preset target terminal.

其中,预置的目标终端可以是用户预先设置的警察局等机构的终端设备也可以是其它终端设备。报警信息用来说明终端设备的用户处于危险之中且需要帮助。报警信息可以包括用户的身份信息、体征信息、相貌信息等。位置信息准确定位终端设备的位置。终端设备定时向预置的目标终端设备发送位置信息,不断通知预置的目标终端终端设备的位置信息。The preset target terminal may be a terminal device of a mechanism such as a police station preset by the user, or may be another terminal device. The alarm message is used to indicate that the user of the terminal device is in danger and needs help. The alarm information may include the user's identity information, physical information, appearance information, and the like. The location information accurately locates the location of the terminal device. The terminal device periodically sends location information to the preset target terminal device, and continuously notifies the location information of the preset target terminal device.

上述终端设备向预置的目标终端发送上述终端设备的位置信息和报警信息通过隐蔽的方式进行,终端设备并不显示相应信息。The terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.

本发明实施例提供的报警方法可以隐蔽的将终端设备的位置信息和报警信息发送给预置的目标终端,从而帮助受害者及时被解救。The alarm method provided by the embodiment of the invention can covertly transmit the location information and the alarm information of the terminal device to the preset target terminal, thereby helping the victim to be rescued in time.

本发明实施例还提供了一种终端设备,如图2所示,包括:The embodiment of the invention further provides a terminal device, as shown in FIG. 2, comprising:

接收单元201,设置为终端设备在系统锁定状态下,接收认证信息;在认证失败后,重新接收认证信息;The receiving unit 201 is configured to receive the authentication information when the terminal device is in the system locked state, and re-receive the authentication information after the authentication fails;

认证单元202,设置为使用预置的系统解锁认证信息对上述认证信息进行认证;The authentication unit 202 is configured to authenticate the foregoing authentication information by using preset system unlock authentication information;

统计单元203,设置为统计认证失败次数;The statistics unit 203 is configured to count the number of failed authentication attempts;

执行单元204,设置为若上述认证失败次数小于第一阈值则进入第一系统,若上述认证失败次数大于上述第二阈值则进入第二系统;上述第二系统相比上述第一系统缺少支付类应用,上述第二阈值大于或等于上述第一阈值。The executing unit 204 is configured to enter the first system if the number of authentication failures is less than the first threshold, and enter the second system if the number of authentication failures is greater than the second threshold; the second system lacks a payment class compared to the first system. The second threshold is greater than or equal to the first threshold.

其中,终端设备例如可以是手机、平板电脑、笔记本电脑、掌上电脑、MID等。The terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a MID, or the like.

系统锁定状态是终端设备未解锁的状态,在该状态下终端设备通常处于待机状态。认证信息是解除终端设备的锁定状态所需的验证信息。认证信息可以是字符串、指纹、语音等中的一种或多种,它与终端设备解锁的认证方式相对应。认证方式例如可以是滑动解锁、指纹解锁、语音解锁等。例如终端设备的认证方式是指纹解锁,则对应的认证信息就是指纹。认证方式和对应的认证信息本发明实施例不作唯一性限定。接收单元201设置为接收认证信息,认证信息可以是多种形式。The system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state. The authentication information is verification information required to release the locked state of the terminal device. The authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked. The authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like. For example, if the authentication mode of the terminal device is fingerprint unlocking, the corresponding authentication information is a fingerprint. The authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention. The receiving unit 201 is arranged to receive authentication information, which may be in various forms.

终端设备在系统锁定状态下接收认证信息可以没有认证界面即手机处于黑屏状态。用户可以在终端设备处于黑屏状态的时候输入认证信息进行认证,例如在黑屏状态下通过指纹解锁。The terminal device receives the authentication information in the system locked state. The authentication device may have no authentication interface, that is, the mobile phone is in a black screen state. The user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.

预置的系统解锁认证信息是在终端设备本地存储的认证信息,用于与用户输入的认证信息进行认证。认证信息可以是字符串、指纹、语音等中的一种或多种,它与终端设备解锁的认证方式相对应。认证单元202使用预置的系统解锁认证信息与上述认证信息进行认证。本发明实施例并不重点关注如何进行认证,因此在此对此不作详述。若认证失败,用户需要重新输入认证信息,终端设备对重新接收的认证信息进行认证,认证失败一次用户需要重新输入一次,直到认证通过。若在认证成功前不再输入认证信息,则终端设备等待一定时间之后,进入待机状态。The preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authentication with the authentication information input by the user. The authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked. The authentication unit 202 performs authentication using the preset system unlock authentication information and the above-described authentication information. The embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.

第一系统是正常启动之后的系统,第二系统中的支付类应用处于冻结并隐藏的状态,也就是终端设备系统中的支付类应用是冻结的且在系统中找不到。The first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be found in the system.

支付类应用指的是支付宝、微信支付、手机银行等在通信终端上使用的应用程序。The payment application refers to an application used on a communication terminal such as Alipay, WeChat payment, and mobile banking.

第一阈值例如可以是2、3、4、5、6等正整数,第二阈值例如可以是2、3、4、5、6、7等正整数。第二阈值大于或等于第一阈值,若第二阈值等于第一阈值,例如第一阈值和第二阈值都是3,如果认证失败次数小于3则进入第一系统,如果认证失败次数大于3则进入第二系统,如果认证失败次数等于3则不作限定,既可以进第一系统也可以进第二系统;若第二阈值大于第一阈值,例如第一阈值是3,第二阈值是4,如果认证失败次数小于3则进入第一系统,如果认证失败次数大于4则进入第二系统,如果认证失败次数是3或4时则不作限定,既可以进第一系统也可以进第二系统;The first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc., and the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7. The second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4. If the number of authentication failures is less than 3, the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the system may enter the first system or the second system.

举例来说,当第一阈值和第二阈值都是3时,如果第4次认证成功,则进入第二系统,在此系统中可以看到并操作除支付类外的所有应用;如果第2次认证成功,则进入第一系统即正常启动系统。For example, when both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.

可以看出,本实施例的方法提供了一种可以冻结并隐藏支付类应用的解锁方式。在移动终端拥有者被迫对其移动终端进行解锁的情况下通过简单的操作就可以冻结并隐藏支付类应用进而保护其个人财产的安全。It can be seen that the method of the embodiment provides an unlocking method that can freeze and hide the payment application. In the case where the mobile terminal owner is forced to unlock his mobile terminal, the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.

本发明实施例在前实施例的基础上还提供了另一种接收认证信息的方法,具体如下:进一步地,如图3所示,上述设备还包括:The embodiment of the present invention further provides another method for receiving the authentication information, which is specifically as follows. Further, as shown in FIG. 3, the device further includes:

所述接收单元,还设置为接收解锁指令;The receiving unit is further configured to receive an unlocking instruction;

显示单元301,设置为在上述接收单元接收到上述解锁指令之后显示认证界面。The display unit 301 is configured to display an authentication interface after the receiving unit receives the unlocking instruction.

本发明实施例提供的接收认证信息的方法是为了方便用户解锁终端设备和支持多种认证方式。本发明实施例中的终端设备在接收到指令后显示认证界面,认证界面可以有多种形式,例如可以是指纹解锁、图案解锁、语音解锁等。The method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes. The terminal device in the embodiment of the present invention displays the authentication interface after receiving the instruction, and the authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.

举例来说,用户在终端设备的显示屏上显示出认证界面后,根据认证界面的情况输入相应的认证信息,若认证失败则重新输入认证信息。例如,用户点亮终端设备显示屏后,通过相应解锁操作,终端设备就可以显示出解锁界面,然后用户就可以输入相应认证信息进行认证。若认证成功之后,则进入相应系统;若认证不成功,重新输入认证信息进行认证。For example, after the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.

本发明实施例提供的接收认证信息的方法更加简单且支持多种认证方式。The method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.

本发明实施例在前实施例的基础上还提供了一种配置安全系统的方法,具体如下:进一步地,如图4所示,上述终端设备还包括:The embodiment of the present invention further provides a method for configuring a security system, which is specifically as follows. Further, as shown in FIG. 4, the terminal device further includes:

冻结与隐藏单元单元401,设置为若上述认证失败次数大于上述第二阈值则进入第二系统之前冻结并隐藏上述终端设备中的支付类应用。The freeze and hide unit unit 401 is configured to freeze and hide the payment application in the terminal device before entering the second system if the number of authentication failures is greater than the second threshold.

上述第二系统就是配置的安全系统,在第二系统中的支付类应用处于冻结并隐藏的状态,在第二系统中找不到支付类应用,因此就算终端设备解锁成功也不能进行转账等操作。The second system is a configured security system. The payment application in the second system is in a frozen and hidden state, and the payment application cannot be found in the second system. Therefore, even if the terminal device is successfully unlocked, the transfer cannot be performed. .

举例来说,如果用户的认证失败次数大于第二阈值,终端设备先将支付类应用冻结并隐藏起来,然后再进入认证成功后的第二系统。在实际的认证过程中,第二系统的配置过程即终端设备中的支付类应用的冻结并隐藏的过程非常快,用户不会注意到这一过程。以手机为例,认证成功之后,如果手机统计的认证失败的次数大于第二阈值时,手机中的支付宝、手机银行、微信支付等支付类应用在手机中是找不到的。For example, if the number of authentication failures of the user is greater than the second threshold, the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds. In the actual authentication process, the configuration process of the second system, that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not notice the process. Taking the mobile phone as an example, after the authentication is successful, if the number of authentication failures of the mobile phone statistics is greater than the second threshold, the payment application such as Alipay, mobile banking, and WeChat payment in the mobile phone cannot be found in the mobile phone.

本发明实施例提供的配置安全系统的方法十分隐蔽迅速并能有效阻止用户被迫解锁终端设备后的非法转账等操作。The method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.

本发明实施例在前实施例的基础上还提供了一种更换认证方式的方法,具体如下:进一步地,如图5所示,上述设备还包括:The embodiment of the present invention further provides a method for replacing the authentication mode, which is specifically as follows. Further, as shown in FIG. 5, the device further includes:

输出单元501,设置为认证失败之后输出提示信息,提示是否更换认证方式;The output unit 501 is configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode;

所述接收单元201,还设置为接收更换指令;The receiving unit 201 is further configured to receive a replacement instruction;

更换单元502,设置为若接收到上述更换指令,则将当前使用的认证方式更换为上述更换指令所指定的认证方式;The replacing unit 502 is configured to replace the currently used authentication method with the authentication method specified by the replacement instruction, if the replacement command is received;

上述接收单元201,还设置为当前使用的认证方式更换为上述更换指令所指定的认证方式之后重新接收认证信息。The receiving unit 201 is further configured to re-receive the authentication information after the current authentication mode is replaced with the authentication mode specified by the replacement command.

认证方式可以有多种,例如指纹解锁、图案解锁、语音解锁等。终端设备中可以设置多种认证方式,一方面用户如果忘记终端设备当前的认证信息还可以更换另外的认证方式;另一方面用户在被迫解锁终端设备的时候可以选择更容易认证失败的认证方式。对于本发明实施例来说,认证方式至关重要,如果终端设备只有一种认证方式且认证方式很难故意认证失败,本发明实施例的方法就失去了意义。例如,如果终端设备只有指纹解锁这一种认证方式并且指纹认证十分准确,用户在被迫解锁终端设备时很难使得认证失败的次数达到上述第二阈值。There are various authentication methods, such as fingerprint unlocking, pattern unlocking, and voice unlocking. A plurality of authentication modes can be set in the terminal device. On the other hand, if the user forgets the current authentication information of the terminal device, the user can also change another authentication mode. On the other hand, when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. . For the embodiment of the present invention, the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.

举例来说,终端设备中可以设置图案解锁、指纹解锁和语音解锁等三种认证方式,默认的认证方式是指纹解锁。若用户在安全的情况下,他可以选择使用指纹解锁也可以在认证失败之后选择另外的认证方式;若用户在被迫解锁的情况下,他可以故意认证失败选择容易故意认证失败的图案解锁方式。For example, three authentication modes, such as pattern unlocking, fingerprint unlocking, and voice unlocking, can be set in the terminal device. The default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or select another authentication method after the authentication fails; if the user is forced to unlock, he can deliberately fail to select the pattern unlocking method that is easy to deliberately fail to authenticate. .

本发明实施例中认证失败的次数是累加的,认证失败次数是不同认证方式下认证失败次数的总和。这样更容易达到上述第二阈值,导致终端设备进入第二系统。In the embodiment of the present invention, the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.

本发明实施例提供的更换认证方式的方法,不仅丰富了认证方式,也提高了本发明实施例方法的实用价值。The method for replacing the authentication method provided by the embodiment of the present invention not only enriches the authentication mode, but also improves the practical value of the method of the embodiment of the present invention.

本发明实施例在前实施例的基础上提供了一种报警方法,具体如下:进一步地,如图6所示,上述设备还包括:The embodiment of the present invention provides an alarm method based on the foregoing embodiment, and is specifically as follows. Further, as shown in FIG. 6, the device further includes:

发送单元601,设置为上述终端设备进入第二系统之后,向预置的目标终端发送上述终端设备的位置信息和报警信息。The sending unit 601 is configured to send the location information and the alarm information of the terminal device to the preset target terminal after the terminal device enters the second system.

定位单元602,设置为定位上述终端设备的位置信息。The positioning unit 602 is configured to locate the location information of the terminal device.

其中,预置的目标终端可以是用户预设置的警察局的终端设备也可以是其它终端。报警信息用来说明终端设备的用户处于危险之中需要帮助,可以包括用户的身份信息、体征信息、相貌信息等。位置信息准确定位终端设备的位置。终端设备定时向预置的目标终端发送位置信息,不断通知预置的目标终端终端设备的位置信息。The preset target terminal may be a terminal device of a police station preset by the user or may be another terminal. The alarm information is used to indicate that the user of the terminal device is in danger and needs help, and may include the user's identity information, physical information, and appearance information. The location information accurately locates the location of the terminal device. The terminal device periodically sends the location information to the preset target terminal, and continuously notifies the location information of the preset target terminal terminal device.

上述终端设备向预置的目标终端发送上述终端设备的位置信息和报警信息通过隐蔽的方式进行,终端设备并不显示相应信息。The terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.

本发明实施例提供的报警方法可以隐蔽的将终端设备的位置信息和报警信息发送给预置的目标终端,帮助受害者及时脱离危险。The alarm method provided by the embodiment of the invention can covertly transmit the location information and the alarm information of the terminal device to the preset target terminal, thereby helping the victim to get out of danger in time.

本发明实施例还提供了一种终端设备,如图7所示,包括:处理器701以及存储器702、输入设备703、输出设备704;其中存储器702可以用于提供处理器701执行数据处理所需要的缓存和预置的系统解锁认证信息的本地缓存,还可以用于提供处理器701执行数据处理调用的数据以及获得的结果数据的存储空间;其中输入设备703用于在终端设备处于锁定状态下接收认证信息,还用于认证失败后重新接收认证信息和接收更改指令;输出设备704用于输出提示消息和认证界面,还用于向预置的目标终端发送上述终端设备的位置信息和报警信息。The embodiment of the present invention further provides a terminal device, as shown in FIG. 7, comprising: a processor 701 and a memory 702, an input device 703, and an output device 704; wherein the memory 702 can be used to provide the processor 701 for performing data processing. The cache and the local cache of the preset system unlock authentication information may also be used to provide a storage space for the processor 701 to execute the data processing call and the obtained result data; wherein the input device 703 is configured to be in the locked state of the terminal device Receiving the authentication information, and also for re-receiving the authentication information and receiving the change instruction after the authentication fails; the output device 704 is configured to output the prompt message and the authentication interface, and is further configured to send the location information and the alarm information of the terminal device to the preset target terminal. .

其中,上述处理器701,用于在终端设备处于锁定状态下,获取认证信息;使用预置的系统解锁认证信息对上述认证信息进行认证,若认证失败,则重新接收认证信息,并使用上述预置的系统解锁认证信息对重新接收的认证信息进行认证,直到认证通过;统计认证失败次数,若上述认证失败次数小于第一阈值则进入第一系统,若上述认证失败次数大于第二阈值则进入第二系统;上述第二系统相比上述第一系统缺少支付类应用,上述第二阈值大于或等于上述第一阈值。The processor 701 is configured to acquire authentication information when the terminal device is in a locked state, and use the preset system unlock authentication information to authenticate the authentication information, and if the authentication fails, re-receive the authentication information, and use the foregoing pre- The system unlocking authentication information is used to authenticate the re-accepted authentication information until the authentication is passed; if the number of authentication failures is less than the first threshold, the system enters the first system, and if the number of authentication failures is greater than the second threshold, the system enters The second system; the second system lacks a payment application compared to the first system, and the second threshold is greater than or equal to the first threshold.

其中,终端设备例如可以是手机、平板电脑、笔记本电脑、掌上电脑、MID等。The terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a MID, or the like.

系统锁定状态是终端设备未解锁的状态,在该状态下终端设备通常处于待机状态。认证信息是解除终端设备的锁定状态所需的验证信息。认证信息可以是字符串、指纹、语音等中的一种或多种,它与终端设备解锁的认证方式相对应。认证方式例如可以是滑动解锁、指纹解锁、语音解锁等。例如终端设备的认证方式是指纹解锁,则对应的认证信息就是指纹。认证方式和对应的认证信息本发明实施例不作唯一性限定。The system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state. The authentication information is verification information required to release the locked state of the terminal device. The authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked. The authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like. For example, if the authentication mode of the terminal device is fingerprint unlocking, the corresponding authentication information is a fingerprint. The authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention.

终端设备在系统锁定状态下接收认证信息可以没有认证界面即手机处于黑屏状态。用户可以在终端设备处于黑屏状态的时候输入认证信息进行认证,例如在黑屏状态下通过指纹解锁。The terminal device receives the authentication information in the system locked state. The authentication device may have no authentication interface, that is, the mobile phone is in a black screen state. The user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.

预置的系统解锁认证信息是在终端设备本地存储的认证信息,用于与用户输入的认证信息进行认证。认证信息可以是字符串、指纹、语音等中的一种或多种,它与终端设备解锁的认证方式相对应。本发明实施例并不重点关注如何进行认证,因此在此对此不作详述。若认证失败,用户需要重新输入认证信息,终端设备对重新接收的认证信息进行认证,认证失败一次用户需要重新输入一次,直到认证通过。若在认证成功前不再输入认证信息,则终端设备等待一定时间之后,进入待机状态。The preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authentication with the authentication information input by the user. The authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked. The embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.

第一系统是正常启动之后的系统,第二系统中的支付类应用处于冻结并隐藏的状态,也就是终端设备系统中的支付类应用是冻结的且在系统中看不到。The first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be seen in the system.

支付类应用指的是支付宝、微信支付、手机银行等在通信终端上使用的应用程序。The payment application refers to an application used on a communication terminal such as Alipay, WeChat payment, and mobile banking.

第一阈值例如可以是2、3、4、5、6等正整数,第二阈值例如可以是2、3、4、5、6、7等正整数。第二阈值大于或等于第一阈值,若第二阈值等于第一阈值,例如第一阈值和第二阈值都是3,如果认证失败次数小于3则进入第一系统,如果认证失败次数大于3则进入第二系统,如果认证失败次数等于3则不作限定,既可以进第一系统也可以进第二系统;若第二阈值大于第一阈值,例如第一阈值是3,第二阈值是4,如果认证失败次数小于3则进入第一系统,如果认证失败次数大于4则进入第二系统,如果认证失败次数是3或4时则不作限定,既可以进第一系统也可以进第二系统;The first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc., and the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7. The second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4. If the number of authentication failures is less than 3, the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the system may enter the first system or the second system.

举例来说,当第一阈值和第二阈值都是3时,如果第4次认证成功,则进入第二系统,在此系统中可以看到并操作除支付类外的所有应用;如果第2次认证成功,则进入第一系统即正常启动系统。For example, when both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.

可以看出,本实施例的方法提供了一种可以冻结并隐藏支付类应用的解锁方式。在终端设备拥有者被迫对其终端设备进行解锁的情况下通过简单的操作就可以冻结并隐藏支付类应用进而保护其个人财产的安全。It can be seen that the method of the embodiment provides an unlocking method that can freeze and hide the payment application. In the case where the terminal device owner is forced to unlock his terminal device, the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.

本发明实施例还进一步提供了一种接收认证信息的实现方法,具体如下:上述处理器701,还用于在上述接收单元接收到解锁指令之后显示认证界面。The embodiment of the present invention further provides an implementation method for receiving authentication information, which is specifically as follows: The processor 701 is further configured to display an authentication interface after the receiving unit receives the unlocking instruction.

本发明实施例提供的接收认证信息的方法是为了方便用户解锁终端设备和支持多种认证方式。本发明实施例中的终端设备在接收到指令后显示认证界面,认证界面可以有多种形式,例如可以是指纹解锁、图案解锁、语音解锁等。The method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes. The terminal device in the embodiment of the present invention displays the authentication interface after receiving the instruction, and the authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.

举例来说,用户在终端设备的显示屏上显示出认证界面后,根据认证界面的情况输入相应的认证信息,若认证失败则重新输入认证信息。例如,用户点亮终端设备显示屏后,通过相应解锁操作,终端设备就可以显示出解锁界面,然后用户就可以输入相应认证信息进行认证。若认证成功之后,则进入相应系统;若认证不成功,重新输入认证信息进行认证。For example, after the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.

本发明实施例提供的接收认证信息的方法更加简单且支持多种认证方式。The method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.

本发明实施例还提供了一种配置安全系统的方法,具体如下:上述处理器701,还用于若上述认证失败次数大于上述第二阈值则进入第二系统之前冻结并隐藏上述终端设备中的支付类应用。The embodiment of the present invention further provides a method for configuring a security system, where the processor 701 is further configured to freeze and hide the terminal device before entering the second system if the number of authentication failures is greater than the second threshold. Payment application.

上述第二系统就是配置的安全系统,在第二系统中的支付类应用处于冻结并隐藏的状态。在第二系统中找不到支付类应用,因此就算终端设备解锁成功也不能进行转账等操作。The second system described above is the configured security system, and the payment application in the second system is in a frozen and hidden state. The payment type application cannot be found in the second system, so even if the terminal device is successfully unlocked, operations such as transfer cannot be performed.

举例来说,如果用户的认证失败次数大于第二阈值,终端设备先将支付类应用冻结并隐藏起来,然后再进入认证成功后第二系统。在实际的认证过程中,第二系统的配置过程即终端设备中的支付类应用的冻结并隐藏的过程非常快,用户不会认为会有这一过程。以手机为例,认证成功之后,如果手机统计的认证失败的次数大于第二阈值时,手机中的支付宝、手机银行、微信支付等支付类应用在手机中是找不到的。For example, if the number of authentication failures of the user is greater than the second threshold, the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds. In the actual authentication process, the configuration process of the second system, that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not think that there is such a process. Taking the mobile phone as an example, after the authentication is successful, if the number of authentication failures of the mobile phone statistics is greater than the second threshold, the payment application such as Alipay, mobile banking, and WeChat payment in the mobile phone cannot be found in the mobile phone.

本发明实施例提供的配置安全系统的方法十分隐蔽迅速并能有效阻止用户被迫解锁终端设备后的非法转账等操作。The method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.

本发明实施例还提供了一种更换认证方式的方法,具体如下:上述处理器701,还用于认证失败之后输出提示信息,提示是否更换认证方式以及接收到更换指令后将当前使用的认证方式更换为上述更换指令所指定的认证方式并重新接收认证信息。The embodiment of the present invention further provides a method for replacing the authentication mode, which is specifically as follows: the processor 701 is further configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode and the current authentication mode after receiving the replacement command. Replace the authentication method specified by the above replacement command and re-accept the authentication information.

认证方式可以有多种,例如指纹解锁、图案解锁、语音解锁等。终端设备中可以设置多种认证方式,一方面用户如果忘记终端设备当前的认证信息还可以更换另外的认证方式;另一方面用户在被迫解锁终端设备的时候可以选择更容易认证失败的认证方式。对于本发明实施例来说,认证方式至关重要,如果终端设备只有一种认证方式且认证方式很难故意认证失败,本发明实施例的方法就失去了意义。例如,如果终端设备只有指纹解锁这一种认证方式并且指纹认证十分准确,用户在被迫解锁终端设备时很难使得认证失败的次数达到上述第二阈值。There are various authentication methods, such as fingerprint unlocking, pattern unlocking, and voice unlocking. A plurality of authentication modes can be set in the terminal device. On the other hand, if the user forgets the current authentication information of the terminal device, the user can also change another authentication mode. On the other hand, when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. . For the embodiment of the present invention, the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.

举例来说,终端设备中可以设置图案解锁、指纹解锁和语音解锁等三种认证方式,默认的认证方式是指纹解锁。若用户在安全的情况下,他可以选择使用指纹解锁也可以故意认证失败选择另外的认证方式;若用户在被迫解锁的情况下,他可以故意认证失败选择容易故意认证失败的图案解锁方式。For example, three authentication modes, such as pattern unlocking, fingerprint unlocking, and voice unlocking, can be set in the terminal device. The default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or deliberately fail to select another authentication method; if the user is forced to unlock, he can deliberately fail to select the pattern unlocking method that is easy to deliberately fail.

本发明实施例中认证失败的次数是累加的,认证失败次数是不同认证方式下认证失败次数的总和。这样更容易达到上述第二阈值,导致终端设备进入第二系统。In the embodiment of the present invention, the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.

本发明实施例提供的更换认证方式的方法,不仅丰富了认证方式,也提高了本发明方法的实用价值。The method for replacing the authentication method provided by the embodiment of the invention not only enriches the authentication mode, but also improves the practical value of the method of the invention.

本发明实施例还提供了一种报警方法,具体如下:上述处理器701,还用于在上述终端设备进入第二系统之后,向预置的目标终端发送上述终端设备的位置信息和报警信息。The embodiment of the present invention further provides an alarm method, which is specifically as follows: The processor 701 is further configured to: after the terminal device enters the second system, send the location information and the alarm information of the terminal device to the preset target terminal.

其中,预置的目标终端可以是用户预设置的警察局的终端设备也可以是其它终端。报警信息用来说明终端设备的用户处于危险之中需要帮助,可以包括用户的身份信息、体征信息、相貌信息等。位置信息准确定位终端设备的位置。终端设备定时向预置的目标终端发送位置信息,不断通知预置的目标终端终端设备的位置信息。The preset target terminal may be a terminal device of a police station preset by the user or may be another terminal. The alarm information is used to indicate that the user of the terminal device is in danger and needs help, and may include the user's identity information, physical information, and appearance information. The location information accurately locates the location of the terminal device. The terminal device periodically sends the location information to the preset target terminal, and continuously notifies the location information of the preset target terminal terminal device.

上述终端设备向预置的目标终端发送上述终端设备的位置信息和报警信息通过隐蔽的方式进行,终端设备并不显示相应信息。The terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.

本发明实施例提供的报警方法可以隐蔽的将终端设备的位置信息和报警信息发送给预置的目标终端,能够帮助受害者及时被解救。The alarm method provided by the embodiment of the invention can covertly the location information and the alarm information of the terminal device to the preset target terminal, which can help the victim to be rescued in time.

本发明实施例还提供了另一种终端设备,如图8所示,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该终端设备可以为包括手机、平板电脑、车载电脑等任意终端设备,以终端设备为手机为例。The embodiment of the present invention further provides another terminal device. As shown in FIG. 8 , for the convenience of description, only parts related to the embodiment of the present invention are shown. For details that are not disclosed, refer to the method of the embodiment of the present invention. section. The terminal device may be any terminal device including a mobile phone, a tablet computer, a vehicle-mounted computer, and the terminal device is used as a mobile phone as an example.

图8示出的是与本发明实施例提供的终端设备相关的手机的部分结构的框图。参考图8,手机包括:射频(Radio Frequency,RF)电路810、存储器820、输入单元830、显示单元840、传感器850、音频电路860、无线保真(wireless fidelity,WiFi)模块870、处理器880、以及电源890等部件。本领域技术人员可以理解,图8中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a terminal device provided by an embodiment of the present invention. Referring to FIG. 8, the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components. It will be understood by those skilled in the art that the structure of the handset shown in FIG. 8 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements.

下面结合图8对手机的各个构成部件进行具体的介绍:The following describes the components of the mobile phone in detail with reference to FIG. 8:

RF电路810可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器880处理;另外,将设计上行的数据发送给基站。通常,RF电路810包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路810还可以通过无线通信与网络和其它设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 810 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, it is processed by the processor 880. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.

存储器820可用于存储软件程序以及模块,处理器880通过运行存储在存储器820的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器820可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器820可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其它易失性固态存储器件。The memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820. The memory 820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.). Moreover, memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.

输入单元830可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元830可包括触控面板831以及其它输入设备832。其它输入设备832可用于接收输入的指纹、语音等信息。触控面板831,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板831上或在触控面板831附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板831可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器880,并能接收处理器880发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板831。除了触控面板831,输入单元830还可以包括其它输入设备832。具体地,其它输入设备832可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset. Specifically, the input unit 830 may include a touch panel 831 and other input devices 832. Other input devices 832 can be used to receive input fingerprints, voice, and the like. The touch panel 831, also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 831 or near the touch panel 831. Operation), and drive the corresponding connecting device according to a preset program. Optionally, the touch panel 831 can include two parts: a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information. The processor 880 is provided and can receive commands from the processor 880 and execute them. In addition, the touch panel 831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch panel 831, the input unit 830 may also include other input devices 832. In particular, other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.

显示单元840可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元840可包括显示面板841,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板841。进一步的,触控面板831可覆盖显示面板841,当触控面板831检测到在其上或附近的触摸操作后,传送给处理器880以确定触摸事件的类型,随后处理器880根据触摸事件的类型在显示面板841上提供相应的视觉输出。虽然在图8中,触控面板831与显示面板841是作为两个独立的部件来实现手机的输入和输出功能,但是在某些实施例中,可以将触控面板831与显示面板841集成而实现手机的输入和输出功能。The display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone. The display unit 840 can include a display panel 841. Alternatively, the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like. Further, the touch panel 831 can cover the display panel 841. When the touch panel 831 detects a touch operation thereon or nearby, the touch panel 831 transmits to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event. The type provides a corresponding visual output on display panel 841. Although in FIG. 8, the touch panel 831 and the display panel 841 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 831 can be integrated with the display panel 841. Realize the input and output functions of the phone.

手机还可包括至少一种传感器850,比如光传感器、运动传感器以及其它传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板841的亮度,接近传感器可在手机移动到耳边时,关闭显示面板841和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其它传感器,在此不再赘述。The handset may also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc. As for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.

音频电路860、扬声器861、传声器862可提供用户与手机之间的音频接口。音频电路860可将接收到的音频数据转换后的电信号,传输到扬声器861,由扬声器861转换为声音信号输出;另一方面,传声器862将收集的声音信号转换为电信号,由音频电路860接收后转换为音频数据,再将音频数据输出至处理器880处理后,经RF电路810以发送给比如另一手机,或者将音频数据输出至存储器820以便进一步处理。Audio circuitry 860, speaker 861, and microphone 862 provide an audio interface between the user and the handset. The audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then the audio data is output to the processor 880 for processing, sent to the mobile phone 810 via the RF circuit 810, or the audio data is output to the memory 820 for further processing.

WiFi属于短距离无线传输技术,手机通过WiFi模块870可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图8示出了WiFi模块870,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology, and the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access. Although FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.

处理器880是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器820内的软件程序和/或模块,以及调用存储在存储器820内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器880可包括一个或多个处理单元;优选的,处理器880可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器880中。The processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The phone's various functions and processing data, so that the overall monitoring of the phone. Optionally, the processor 880 may include one or more processing units; preferably, the processor 880 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like. The modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 880.

手机还包括给各个部件供电的电源890(比如电池),优选的,电源可以通过电源管理系统与处理器880逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The handset also includes a power source 890 (such as a battery) that supplies power to the various components. Preferably, the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.

尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.

前述实施例中,各步骤方法流程可以基于该终端设备的结构实现。其中传感器850或者触控面板831可以作为指纹采集设备使用。In the foregoing embodiment, each step method flow may be implemented based on the structure of the terminal device. The sensor 850 or the touch panel 831 can be used as a fingerprint collection device.

值得注意的是,上述指纹解锁控制设备实施例中,所包括的各个单元只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的具体名称也只是为了便于相互区分,并不用于限制本发明的保护范围。It should be noted that, in the foregoing embodiment of the fingerprint unlocking control device, each unit included is only divided according to functional logic, but is not limited to the above division, as long as the corresponding function can be implemented; The specific names are also for convenience of distinguishing from each other and are not intended to limit the scope of the present invention.

另外,本领域普通技术人员可以理解实现上述各方法实施例中的全部或部分步骤是可以通过程序来指令相关的硬件完成,相应的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。In addition, those skilled in the art can understand that all or part of the steps in implementing the foregoing method embodiments may be performed by a program to instruct related hardware, and the corresponding program may be stored in a computer readable storage medium. The storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

以上仅为本发明实施例较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明实施例揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。The above is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any one skilled in the art can easily think of changes within the technical scope disclosed by the embodiments of the present invention. Or, replacement, should be covered by the scope of the present invention. Therefore, the scope of protection of the present invention should be determined by the scope of the claims.

Claims (10)

一种系统解锁方法,其特征在于,包括:A system unlocking method, comprising: 终端设备在系统锁定状态下接收认证信息;The terminal device receives the authentication information in a system locked state; 所述终端设备使用预置的系统解锁认证信息对所述认证信息进行认证,若认证失败,则重新接收认证信息,并使用所述预置的系统解锁认证信息对重新接收的认证信息进行认证,直到认证通过;The terminal device uses the preset system unlocking authentication information to authenticate the authentication information. If the authentication fails, the authentication information is re-received, and the re-received authentication information is authenticated by using the preset system unlocking authentication information. Until the certification is passed; 所述终端设备统计认证失败次数,若所述认证失败次数小于第一阈值则进入第一系统,若所述认证失败次数大于第二阈值则进入第二系统;所述第二系统相比所述第一系统缺少支付类应用,所述第二阈值大于或等于所述第一阈值。The terminal device counts the number of authentication failures, and enters the first system if the number of authentication failures is less than the first threshold, and enters the second system if the number of authentication failures is greater than the second threshold; The first system lacks a payment class application, and the second threshold is greater than or equal to the first threshold. 根据权利要求1所述的方法,其特征在于,所述终端设备在系统锁定状态下接收认证信息之前,所述方法还包括:The method according to claim 1, wherein before the terminal device receives the authentication information in the system locked state, the method further includes: 所述终端设备接收到解锁指令后显示认证界面。The terminal device displays an authentication interface after receiving the unlocking instruction. 根据权利要求2所述的方法,其特征在于,若所述认证失败次数大于所述第二阈值则进入第二系统之前,所述方法还包括:The method according to claim 2, wherein, before the number of the authentication failures is greater than the second threshold, the method further comprises: 所述终端设备冻结并隐藏所述支付类应用。The terminal device freezes and hides the payment application. 根据权利要求1至3任意一项所述的方法,在认证失败之后,所述方法还包括:The method according to any one of claims 1 to 3, after the authentication fails, the method further comprises: 输出提示信息,提示是否更换认证方式;Output a prompt message to prompt whether to replace the authentication method; 若接收到更换指令,则将当前使用的认证方式更换为所述更换指令所指定的认证方式,然后执行所述重新接收认证信息。If the replacement command is received, the currently used authentication mode is replaced with the authentication mode specified by the replacement instruction, and then the re-receiving authentication information is executed. 根据权利要求1至3任意一项所述的方法,其特征在于,所述终端设备进入第二系统之后,所述方法还包括:The method according to any one of claims 1 to 3, wherein after the terminal device enters the second system, the method further includes: 所述终端设备向预置的目标终端发送所述终端设备的位置信息和报警信息。The terminal device sends the location information and the alarm information of the terminal device to the preset target terminal. 一种终端设备,其特征在于,包括:A terminal device, comprising: 接收单元,设置为终端设备在系统锁定状态下,接收认证信息;在认证失败后,重新接收认证信息;The receiving unit is configured to receive the authentication information when the terminal device is in the system locked state; and re-receive the authentication information after the authentication fails; 认证单元,设置为使用预置的系统解锁认证信息对所述认证信息进行认证;An authentication unit configured to authenticate the authentication information by using preset system unlock authentication information; 统计单元,设置为统计认证失败次数;The statistical unit is set to count the number of failed authentication attempts. 执行单元,设置为若所述认证失败次数小于第一阈值则进入第一系统,若所述认证失败次数大于所述第二阈值则进入第二系统;所述第二系统相比所述第一系统缺少支付类应用,所述第二阈值大于或等于所述第一阈值。An execution unit, configured to enter the first system if the number of authentication failures is less than the first threshold, and enter the second system if the number of authentication failures is greater than the second threshold; The system lacks a payment class application, and the second threshold is greater than or equal to the first threshold. 根据权利要求6所述的设备,其特征在于,The device according to claim 6 wherein: 所述接收单元,还设置为接收解锁指令;所述设备还包括:The receiving unit is further configured to receive an unlocking instruction; the device further includes: 显示单元,设置为在所述接收单元接收到所述解锁指令之后显示认证界面。a display unit configured to display an authentication interface after the receiving unit receives the unlocking instruction. 根据权利要求7所述的设备,其特征在于,所述设备还包括:The device according to claim 7, wherein the device further comprises: 应用控制单元,设置为若所述认证失败次数大于所述第二阈值则进入第二系统之前冻结并隐藏所述终端设备中的支付类应用。The application control unit is configured to freeze and hide the payment application in the terminal device before entering the second system if the number of authentication failures is greater than the second threshold. 根据权利要求7至8任意一项所述的设备,其特征在于,所述设备还包括:The device according to any one of claims 7 to 8, wherein the device further comprises: 输出单元,设置为认证失败之后,输出提示信息,提示是否更换认证方式;The output unit is configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode; 所述接收单元,还设置为接收更换指令;The receiving unit is further configured to receive a replacement instruction; 认证控制单元,设置为若所述接收单元接收到所述更换指令,则将当前使用的认证方式更换为所述更换指令所指定的认证方式;The authentication control unit is configured to: if the receiving unit receives the replacement instruction, replace the currently used authentication mode with the authentication mode specified by the replacement instruction; 所述接收单元,还设置为在当前使用的认证方式更换为所述更换指令所指定的认证方式之后,重新接收认证信息。The receiving unit is further configured to re-receive the authentication information after the currently used authentication mode is replaced with the authentication mode specified by the replacement instruction. 根据权利要求7至8任意一项所述的设备,其特征在于,所述设备还包括:The device according to any one of claims 7 to 8, wherein the device further comprises: 定位单元,设置为定位所述终端设备的位置信息。a positioning unit configured to locate location information of the terminal device. 发送单元,设置为在所述终端设备进入第二系统之后,向预置的目标终端发送所述终端设备的位置信息和报警信息。The sending unit is configured to send the location information and the alarm information of the terminal device to the preset target terminal after the terminal device enters the second system.
PCT/CN2016/100778 2016-08-24 2016-09-29 System unlocking method and device Ceased WO2018035930A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610718935.2A CN106327193B (en) 2016-08-24 2016-08-24 A kind of system unlocking method and equipment
CN201610718935.2 2016-08-24

Publications (1)

Publication Number Publication Date
WO2018035930A1 true WO2018035930A1 (en) 2018-03-01

Family

ID=57791098

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/100778 Ceased WO2018035930A1 (en) 2016-08-24 2016-09-29 System unlocking method and device

Country Status (2)

Country Link
CN (1) CN106327193B (en)
WO (1) WO2018035930A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020022737A1 (en) 2018-07-23 2020-01-30 Samsung Electronics Co., Ltd. Electronic apparatus and controlling method thereof

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108320391B (en) * 2017-01-18 2021-03-09 芜湖美的厨卫电器制造有限公司 Unlocking method and system of rental equipment and equipment thereof
CN110226164B (en) * 2017-01-22 2022-02-08 华为技术有限公司 A verification method, mobile terminal, device and system
CN107395889B (en) * 2017-07-28 2020-01-21 Oppo广东移动通信有限公司 Method and device for reducing power consumption of mobile terminal, storage medium and mobile terminal
CN111128138A (en) * 2020-03-30 2020-05-08 深圳市友杰智新科技有限公司 Voice wake-up method and device, computer equipment and storage medium
CN111814121B (en) * 2020-06-29 2021-08-31 江苏中州科技有限公司 Login authentication management system and method based on computer system
CN115393033A (en) * 2022-08-15 2022-11-25 中国工商银行股份有限公司 Bank card risk identification method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472952A (en) * 2002-06-26 2004-02-04 夏普株式会社 Function restriction removal method of electronic device and electronic device
CN101345967A (en) * 2008-08-15 2009-01-14 深圳华为通信技术有限公司 Function control method and embedded type terminal
CN104253818A (en) * 2011-12-13 2014-12-31 华为终端有限公司 Server and terminal authentication method, server, terminal
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472952A (en) * 2002-06-26 2004-02-04 夏普株式会社 Function restriction removal method of electronic device and electronic device
CN101345967A (en) * 2008-08-15 2009-01-14 深圳华为通信技术有限公司 Function control method and embedded type terminal
CN104253818A (en) * 2011-12-13 2014-12-31 华为终端有限公司 Server and terminal authentication method, server, terminal
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020022737A1 (en) 2018-07-23 2020-01-30 Samsung Electronics Co., Ltd. Electronic apparatus and controlling method thereof
KR20200010946A (en) * 2018-07-23 2020-01-31 삼성전자주식회사 Electronic apparatus and controlling method thereof
EP3776293A1 (en) 2018-07-23 2021-02-17 Samsung Electronics Co., Ltd. Electronic apparatus and controlling method thereof
EP3776293A4 (en) * 2018-07-23 2021-06-09 Samsung Electronics Co., Ltd. ELECTRONIC DEVICE AND ASSOCIATED CONTROL PROCEDURE
US11403378B2 (en) 2018-07-23 2022-08-02 Samsung Electronics Co., Ltd. Electronic apparatus and controlling method thereof
KR102520199B1 (en) * 2018-07-23 2023-04-11 삼성전자주식회사 Electronic apparatus and controlling method thereof

Also Published As

Publication number Publication date
CN106327193B (en) 2019-08-02
CN106327193A (en) 2017-01-11

Similar Documents

Publication Publication Date Title
WO2018035930A1 (en) System unlocking method and device
WO2014017858A1 (en) User terminal apparatus and control method thereof
WO2017164585A1 (en) Electronic device and control method thereof
WO2017067271A1 (en) Fingerprint recognition method, fingerprint recognition apparatus, and mobile terminal
WO2018072567A1 (en) Emergency call-for-help method and system based on fingerprint identification for mobile terminal, and mobile terminal
WO2012036324A1 (en) Mobile terminal and method for controlling operation thereof
WO2018018772A1 (en) Background process management method and terminal device
WO2013137503A1 (en) Unlock method using natural language processing and terminal for performing same
WO2016184330A1 (en) Screen unlocking method and device, and storage medium
WO2018093005A1 (en) Mobile terminal and method for controlling the same
WO2012016476A1 (en) Hand-held mobile terminal standby method, micro processor and cellular phone thereof
WO2017071330A1 (en) Data encryption and decryption method and encryption and decryption device
WO2018076879A1 (en) Data backup method and apparatus, storage medium, and terminal
EP2910045A1 (en) Device and method for transmitting electronic key thereof
WO2017071326A1 (en) Terminal control method, device and system
WO2017071324A1 (en) File-transmission encryption and decryption method and encryption and decryption device
WO2018171534A1 (en) Mobile terminal-based dual camera power supply control method, system and mobile terminal
WO2018018691A1 (en) Esim switching method and terminal device
WO2018076888A1 (en) Method, device and system for synchronizing data of mobile terminal, storage medium and mobile terminal
WO2019066521A1 (en) Electronic device and method of controlling electronic device
EP3475801A1 (en) Method of processing touch events and electronic device adapted thereto
WO2020155772A1 (en) Verification image sending method, synthesis method, device, storage medium, and terminal
WO2012053875A2 (en) Apparatus and system for transceiving data through fingerprint information
WO2014201915A1 (en) Software repair method and apparatus, and computer readable storage medium
WO2013182073A1 (en) Method and system for identifying file security and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16913950

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16913950

Country of ref document: EP

Kind code of ref document: A1