WO2019144357A1 - Procédé de déverrouillage par contact d'urgence et entrée utilisateur, et terminal - Google Patents
Procédé de déverrouillage par contact d'urgence et entrée utilisateur, et terminal Download PDFInfo
- Publication number
- WO2019144357A1 WO2019144357A1 PCT/CN2018/074184 CN2018074184W WO2019144357A1 WO 2019144357 A1 WO2019144357 A1 WO 2019144357A1 CN 2018074184 W CN2018074184 W CN 2018074184W WO 2019144357 A1 WO2019144357 A1 WO 2019144357A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- interface
- information
- password
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Definitions
- the embodiment of the present invention relates to the field of communications technologies, and in particular, to an unlocking method and a terminal.
- the user can set a lock screen password for the mobile terminal and a password for opening some functions of the mobile terminal.
- the user may forget the password set in the mobile terminal, causing the mobile terminal to not be used normally.
- the mobile terminal can provide a fingerprint unlocking function.
- the mobile terminal does not support the fingerprint unlocking function, and only supports the password unlocking function input by the user.
- the mobile phone 100 shown in FIG. 1 is provided with a lock screen password and a fingerprint unlock password.
- the lock screen interface 101 shown in (a) of FIG. 1 is displayed, even if the user's finger touches the fingerprint key 102 of the mobile phone 100 and the correct fingerprint information is input, the mobile phone 100 cannot To unlock, the password interface 103 shown in (b) of FIG. 1 is displayed to prompt the user to enter a password to unlock.
- the mobile terminal cannot use the fingerprint unlocking function to unlock some functions in the mobile terminal or the mobile terminal, and the mobile terminal cannot be used normally.
- the embodiment of the present application provides an unlocking method and a terminal. Even if the user forgets the password, the terminal can be successfully unlocked under the premise of ensuring the information security in the terminal.
- the embodiment of the present application provides an unlocking method, where the first terminal displays a first interface that requires input of a first password to be unlocked; and then, the first terminal may receive the second terminal. After the information is verified, the first information is verified, for example, the source of the first information is verified; then, if the first information is verified, the first terminal may verify the second information after receiving the second information input by the user. When the second information verification is passed, the first terminal may display the unlocking interface after the first interface inputs the first password.
- the first terminal when the first terminal displays the first interface that requires the input of the first password to be unlocked, even if the user forgets the first password, if the first terminal receives the first information that can be verified by other terminals, After the first information is verified, the first terminal may also receive the second information that can be verified.
- the first terminal may also display the unlocking interface after the first interface inputs the first password, that is, the first terminal may be in the user. Successfully unlocked if you forget the first password.
- the first terminal needs to perform double verification of “verifying the first information” and “verifying the second information”, so that the information in the first terminal can be secured. That is to say, with this solution, even if the user forgets the password, the terminal can be successfully unlocked while ensuring the security of the information in the terminal.
- the first information received by the first terminal may be a first communication message received from the second terminal, where the first communication message includes the foregoing first information.
- the first communication message may be a voice call request, a instant communication message, or an email
- the first information is an account that initiates the first communication message.
- the method for the first terminal to verify the first information is: the first terminal verifies an account that initiates the first communication message.
- the first terminal may verify whether the account that initiated the first communication message is a preset account.
- the foregoing first information passing verification means that the account that initiates the first communication message is a preset account.
- the first communication message may be an instant messaging message or an email
- the first information includes an account that initiates the first communication message and a message content of the first communication message.
- the method for the first terminal to verify the first information is: the first terminal verifies the account that initiates the first communication message and the message content of the first communication message. For example, the first terminal may verify whether the account that initiates the first communication message is a preset account, and determine whether the message content of the first communication message is the preset message content.
- the first information passing the verification means that the account that initiates the first communication message is a preset account, and the message content of the first communication message is the preset message content.
- the first communication message may be an instant messaging message or an email
- the second information is at least one of fingerprint information, voice information, iris information, and face image information.
- the first terminal may start at least one of the first terminal using fingerprint information, sound information, iris information, and face image information, and the like.
- the function of unlocking (referred to as the second password) is such that the first terminal can switch from displaying the first interface to displaying the second interface in response to the second password input by the user.
- the first terminal may display a third interface for inputting the second information when the first information passes the verification; and then receive the second information input by the user at the third interface.
- the first communication message is a voice call request.
- the first terminal may display an incoming call alert interface or a voice call interface (ie, a fourth interface); if the first terminal displays the fourth interface, if the first information passes Verifying that the first terminal can receive and verify the second information input by the user (including at least one of digital information, fingerprint information, sound information, iris information, and face image information); if the second information passes verification, the first terminal The second interface may be displayed in response to the end of the voice communication, ie the first terminal may be successfully unlocked.
- the first terminal when the first information or the second information passes the verification, the first terminal may not display the second interface but display the fifth interface for resetting the password.
- the second interface is displayed.
- the first terminal displays the second interface when the second information passes the verification, and the first terminal displays the fifth interface including the reset password input box when the first information or the second information passes the verification; and receives the user.
- the first password is modified to the new first password, and the second interface is displayed.
- the first terminal may guide the user to reset the first password during the process of the second terminal assisting the first terminal to unlock; thus, when the user unlocks the first interface next time, the user may directly use the reset first password to unlock the first password. .
- the first terminal when the first terminal displays the first interface, if the user forgets the first password, the user may input a first operation to the first interface, so as to trigger the request second.
- the terminal assists the process of unlocking the first terminal.
- the first terminal may display a sixth interface including a plurality of account options in response to the first operation of the user at the first interface.
- the plurality of account options include an option of a contact corresponding to the preset account and an option of the other contact, if the first terminal receives the user's selection operation of the first option of the plurality of account options, and the first option corresponds to
- the account is a preset account
- the second communication message may be sent to the preset account to request the terminal corresponding to the preset account to send the first information to assist the first terminal to unlock.
- the second communication message is an instant messaging message or an email.
- the contact corresponding to the preset account is referred to as an emergency contact, and the emergency contact may be preset in the terminal.
- the first terminal may continue to display the sixth interface and issue the same.
- the first prompt information indicating that the account selection is incorrect and prompting the user to re-select the account.
- the first terminal is automatically selected after the first contact selected by the user (ie, the contact corresponding to the first option) is a preset emergency contact (ie, the user selects the correct emergency contact).
- Selecting an emergency contact by the user is a mechanism for authenticating the identity of the user.
- the preset emergency contact in the terminal is set by the owner, and other users do not know the emergency contact preset in the terminal; therefore, other users can be reduced by the user selecting the authentication mode of the emergency contact. The possibility of maliciously unlocking the terminal by the method of the embodiment of the present application.
- the manner in which the first terminal requests the second terminal to assist the unlocking may be performed by sending a prompt message to the user, in addition to the manner of automatically sending the second communication message requesting assistance.
- the first terminal may send the second prompt information in response to the second operation of the user in the first interface, where The second prompt information is used to indicate that the terminal corresponding to the preset account sends the first information to assist the first terminal to unlock.
- the manner in which the user contacts the terminal corresponding to the preset account to request the preset emergency contact to assist the first terminal to unlock may include: the user uses another terminal to make a call to the preset emergency contact; The user uses the other terminal to send the second communication message to the preset emergency contact by using the first communication application; the user currently requests the preset emergency contact: sending the first communication message to the first terminal through the second communication application or The first terminal makes a call, etc.
- the embodiment of the present application provides a terminal, which is the first terminal described in the foregoing first aspect and any possible design manner thereof, where the terminal includes: a display unit, a receiving unit, a verification unit, and Input unit.
- the display unit is configured to display a first interface that requires input of the first password to be unlocked.
- the receiving unit is configured to receive the first information sent by the second terminal.
- a verification unit configured to verify the first information received by the receiving unit.
- an input unit configured to receive the second information input by the user when the verification unit determines that the first information passes the verification.
- the verification unit is further configured to verify the second information received by the input unit.
- the display unit is further configured to display a second interface when the verification unit determines that the second information passes the verification, where the second interface is an unlocking interface after the first interface inputs the first password.
- the receiving unit is configured to receive a first communication message sent by the second terminal, where the first communication message includes first information, where the first communication message is a voice call request. And the instant message or the email, the first information includes an account that initiates the first communication message, and the verification unit is specifically configured to verify the account that initiates the first communication message.
- the receiving unit is configured to receive a first communication message sent by the second terminal, where the first communication message includes first information, where the first communication message is an instant message or an email, and the first information includes sending An account of the communication message and a message content of the first communication message; the verification unit is specifically configured to verify the account of the first communication message and the message content of the first communication message.
- the first communication message includes an instant messaging message or an email.
- the input unit is configured to display a third interface when the first information passes the verification, where the third interface is an interface for inputting the second information, where the second information includes fingerprint information, sound information, iris information, and face image information. At least one of receiving the second information input by the user on the third interface.
- the first communication message is a voice call request.
- the display unit is further configured to: after the receiving unit receives the first information sent by the second terminal, before the input unit receives the second information input by the user, displaying the fourth interface, where the fourth interface is an incoming call alert interface or a voice call interface.
- the input unit is configured to receive, when the first information passes the verification, the second information input by the user, where the second information includes digital information, fingerprint information, sound information, iris information, and At least one of the face image information. Wherein, if the second information passes the verification, the display unit displays the second interface in response to the end of the voice communication.
- the display unit is further configured to display a fifth interface when the second information passes verification, and the fifth interface includes a reset password input box.
- the input unit is further configured to receive a new password input by the user in the reset password input box displayed by the display unit, and modify the first password to a new first password.
- the display unit is further configured to display the second interface in response to the input unit inputting a new password in the reset password input box.
- the display unit is further configured to: after the displaying, by the receiving unit, the first information sent by the second terminal, in response to the user being in the first interface
- a sixth interface is displayed, and the sixth interface includes a plurality of account options.
- the input unit is further configured to receive a user selection operation of the first option of the plurality of account options.
- the terminal may further include: a sending unit.
- the sending unit is configured to: in response to the selecting operation received by the input unit, when the account corresponding to the first option is a preset account, send a second communication message to the account corresponding to the first option, where the second communication message includes an instant messaging message Or the e-mail, the second communication message is used to indicate that the terminal corresponding to the preset account sends the first information to assist the first terminal to unlock.
- the foregoing display unit is further configured to continue to display the sixth interface when the account corresponding to the first option is not the preset account.
- the terminal further includes: a prompting unit.
- the prompting unit is configured to send a first prompt message when the account corresponding to the first option is not a preset account, where the first prompt information is used to indicate an account selection error, and prompt the user to reselect the account.
- the prompting unit is further configured to: after the display unit displays the first interface, before the receiving unit receives the first information sent by the second terminal, in response to the user being in the first interface
- the second operation is to send a second prompt information, where the second prompt information is used to indicate that the terminal corresponding to the preset account sends the first information to assist the first terminal to unlock.
- the embodiment of the present application provides a terminal, which is the first terminal in the foregoing first aspect and any possible design manner thereof, where the terminal includes: a processor, a memory, a communication interface, and a display.
- a memory, a communication interface, and a display are coupled to the processor for storing computer program code, the computer program code comprising computer instructions comprising a nonvolatile storage medium, the display being used when the processor executes the computer instructions Displaying a first interface, the first interface is an interface that requires inputting a first password to unlock; a communication interface is configured to receive first information sent by the second terminal; and the processor is configured to verify the first information, and the first information is passed At the time of verification, the second information input by the user is received, and the second information is verified.
- the display is further configured to display a second interface when the second information passes the verification, where the second interface is the unlocking after the first interface inputs the first password. interface.
- the communication interface is further configured to receive a first communication message sent by the second terminal, where the first communication message includes first information, where the first communication message is a voice call request And an instant messaging message or an email, the first information includes an account that initiates the first communication message, and the processor is configured to verify an account that initiates the first communication message.
- the communication interface is further configured to receive a first communication message sent by the second terminal, where the first communication message includes first information, where the first communication message is an instant message or an email, and the first information includes sending the first message.
- the account of the communication message and the message content of the first communication message; the processor is further configured to verify the account number of the first communication message and the message content of the first communication message.
- the first communication message received by the communication interface includes an instant messaging message or an email.
- the display is further configured to display a third interface when the first information passes the verification, where the third interface is an interface for inputting the second information, where the second information includes fingerprint information, sound information, iris information, and face image information. at least one.
- the processor is further configured to receive second information input by the user on the third interface.
- the first communication message received by the communication interface is a voice call request.
- the display is further configured to: after the communication interface receives the first information sent by the second terminal, before receiving the second information input by the user, the processor displays a fourth interface, where the fourth interface is an incoming call alert interface or a voice call interface.
- the processor is further configured to: when the first information passes the verification, receive and verify the second information input by the user, where the second information includes digital information, fingerprint information, sound information, At least one of iris information and face image information. Wherein, if the second information passes verification, the display displays a second interface in response to the end of the voice communication.
- the foregoing display is further configured to display a fifth interface when the second information passes verification, and the fifth interface includes a reset password input box.
- the processor is further configured to receive a new password input by the user in the reset password input box, and modify the first password to a new first password.
- the display is further configured to display the second interface in response to the processor receiving a new password input by the user in the reset password input box.
- the foregoing display is further configured to: after the first interface is displayed, before the communication interface receives the first information sent by the second terminal, in response to the first user in the first interface Operation, displaying a sixth interface, the sixth interface includes multiple account options.
- the communication interface is further configured to: in response to the user selecting a first option of the plurality of account options, when the account corresponding to the first option is a preset account, send a second communication message to the account corresponding to the first option, where The second communication message includes an instant messaging message or an email, and the second communication message is used to indicate that the terminal corresponding to the preset account sends the first information to assist the first terminal to unlock.
- the foregoing display is further configured to: when the account corresponding to the first option is not a preset account, the first terminal continues to display the sixth interface.
- the processor is further configured to: when the account corresponding to the first option is not a preset account, issue the first prompt information, where the first prompt information is used to indicate an account selection error, and prompt the user to reselect the account.
- the processor is further configured to: after the display interface is the first interface, before the communication interface receives the first information sent by the second terminal, in response to the user being in the first interface
- the second operation is to send a second prompt information, where the second prompt information is used to indicate that the terminal corresponding to the preset account sends the first information to assist the first terminal to unlock.
- an embodiment of the present application provides a control device, where the control device includes a processor and a memory, where the memory is used to store computer program code, where the computer program code includes computer instructions, when the processor executes the computer instruction,
- the control device performs the unlocking method as in the first aspect and any of its possible designs.
- an embodiment of the present application provides a computer storage medium, where the computer storage medium includes computer instructions, when the computer instruction is run on a terminal, causing the terminal to perform the first aspect and any of the possible The method of designing the unlocking method.
- an embodiment of the present application provides a computer program product, when the computer program product is run on a computer, causing the computer to perform the unlocking method according to the first aspect and any possible design manner thereof.
- FIG. 1 is a schematic diagram 1 of a display interface of a terminal according to an embodiment of the present application.
- FIG. 2 is a schematic structural diagram of a hardware of a terminal according to an embodiment of the present disclosure
- FIG. 3 is a second schematic diagram of a display interface of a terminal according to an embodiment of the present application.
- FIG. 4 is a third schematic diagram of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 5 is a schematic diagram 4 of an example of a display interface of a terminal according to an embodiment of the present disclosure
- FIG. 6 is a schematic diagram 5 of an example of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 7 is a flowchart 1 of an unlocking method according to an embodiment of the present disclosure.
- FIG. 8 is a schematic diagram 6 of an example of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 9 is a schematic diagram 7 of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 10 is a schematic diagram 8 of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 11 is a flowchart 2 of an unlocking method according to an embodiment of the present disclosure.
- FIG. 12 is a schematic diagram 9 of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 13 is a schematic diagram 10 of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 14 is a flowchart 3 of an unlocking method according to an embodiment of the present disclosure.
- 15A is a schematic diagram 11 of an example of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 15B is a schematic diagram 12 of a display interface of a terminal according to an embodiment of the present application.
- 15C is a flowchart 4 of an unlocking method according to an embodiment of the present application.
- FIG. 16 is a flowchart 5 of an unlocking method according to an embodiment of the present disclosure.
- FIG. 16B is a flowchart 6 of an unlocking method according to an embodiment of the present disclosure.
- 16C is a flowchart 7 of an unlocking method according to an embodiment of the present application.
- FIG. 17 is a schematic diagram showing an example of a display interface of a terminal according to an embodiment of the present application.
- FIG. 18A is a flowchart 8 of an unlocking method according to an embodiment of the present disclosure.
- FIG. 18B is a flowchart IX of an unlocking method according to an embodiment of the present disclosure.
- FIG. 19 is a schematic diagram showing an example of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 20 is a schematic diagram of a display interface of a terminal according to an embodiment of the present application.
- FIG. 21 is a schematic diagram 16 of an example of a display interface of a terminal according to an embodiment of the present disclosure.
- FIG. 22 is a schematic diagram of a display interface of a terminal according to an embodiment of the present application.
- FIG. 23 is a schematic structural diagram 1 of a terminal structure according to an embodiment of the present disclosure.
- FIG. 24 is a second schematic structural diagram of a terminal according to an embodiment of the present disclosure.
- An unlocking method provided by the embodiment of the present application may be applied to the process of unlocking a terminal, and may be applied to an unlocking process in which the terminal is in a lock screen state, or in a process of unlocking a certain function in the terminal.
- the terminal (such as the first terminal) in the embodiment of the present application may be a portable computer (such as the mobile phone 100 shown in FIG. 1), a notebook computer, a personal computer (PC), a wearable electronic device (such as The smart watch), tablet computer, augmented reality (AR), virtual reality (VR) device, on-board computer, etc., the following embodiments do not specifically limit the specific form of the terminal.
- the mobile phone 100 is used as an example of the terminal.
- the mobile phone 100 may specifically include: a processor 201, a radio frequency (RF) circuit 202, a memory 203, a touch screen 204, a Bluetooth device 205, and one or more sensors 206.
- These components can communicate over one or more communication buses or signal lines (not shown in Figure 2). It will be understood by those skilled in the art that the hardware structure shown in FIG. 2 does not constitute a limitation to the mobile phone, and the mobile phone 100 may include more or less components than those illustrated, or some components may be combined, or different component arrangements.
- the processor 201 is a control center of the mobile phone 100, and connects various parts of the mobile phone 100 by using various interfaces and lines, and executes the mobile phone 100 by running or executing an application stored in the memory 203 and calling data stored in the memory 203. Various functions and processing data.
- processor 201 can include one or more processing units.
- the processor 201 may further include a fingerprint verification chip for verifying the collected fingerprint.
- the radio frequency circuit 202 can be used for receiving and transmitting wireless signals.
- the radio frequency circuit 202 can process the downlink data of the base station and then process it to the processor 201; in addition, transmit the data related to the uplink to the base station.
- radio frequency circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
- the radio frequency circuit 202 can also communicate with other devices through wireless communication.
- the wireless communication can use any communication standard or protocol including, but not limited to, global mobile communication systems, general packet radio services, code division multiple access, wideband code division multiple access, long term evolution, and the like.
- the memory 203 is used to store applications and data, and the processor 201 performs various functions and data processing of the mobile phone 100 by running applications and data stored in the memory 203.
- the memory 203 mainly includes a storage program area and a storage data area, wherein the storage program area can store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.); the storage data area can be stored according to the use of the mobile phone. Data created at 100 o'clock (such as audio data, phone book, etc.).
- the memory 203 may include a high speed random access memory (RAM), and may also include a nonvolatile memory such as a magnetic disk storage device, a flash memory device, or other volatile solid state storage device.
- the memory 203 can store various operating systems.
- the memory 203 may be independent and connected to the processor 201 via the communication bus; the memory 203 may also be integrated with the processor 201.
- the touch screen 204 may specifically include a touch panel 204-1 and a display 204-2.
- the touch panel 204-1 can collect touch events on or near the user of the mobile phone 100 (for example, the user uses any suitable object such as a finger, a stylus, or the like on the touch panel 204-1 or on the touch panel 204.
- the operation near -1), and the collected touch information is transmitted to other devices (for example, processor 201).
- the touch event of the user in the vicinity of the touch panel 204-1 may be referred to as a hovering touch; the hovering touch may mean that the user does not need to directly touch the touchpad in order to select, move or drag a target (eg, an icon, etc.) , and only the user is located near the device to perform the desired function.
- the touch panel 204-1 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
- a display (also referred to as display screen) 204-2 can be used to display information entered by the user or information provided to the user as well as various menus of the handset 100.
- the display 204-2 can be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
- the touchpad 204-1 can be overlaid on the display 204-2. When the touchpad 204-1 detects a touch event on or near it, the touchpad 204-1 transmits to the processor 201 to determine the type of touch event, followed by the processor. 201 may provide a corresponding visual output on display 204-2 depending on the type of touch event.
- the touch panel 204-1 and the display screen 204-2 function as two independent components to implement the input and output functions of the mobile phone 100, in some embodiments,
- the touchpad 204-1 is integrated with the display 204-2 to implement the input and output functions of the handset 100.
- the touch screen 204 is formed by stacking a plurality of layers of materials. In the embodiment of the present application, only the touch panel (layer) and the display screen (layer) are shown. The other layers are not described in the embodiment of the present application. .
- the touch panel 204-1 can be disposed on the front side of the mobile phone 100 in the form of a full-board
- the display screen 204-2 can also be disposed on the front side of the mobile phone 100 in the form of a full-board, so that the front side of the mobile phone can be borderless. Structure.
- the mobile phone 100 can also have a fingerprint recognition function.
- a fingerprint capture device (ie, fingerprint reader) 212 can be configured on the back of the handset 100 (eg, below the rear camera), or the fingerprint capture device 212 can be configured on the front of the handset 100 (eg, below the touch screen 204).
- the fingerprint collection device 212 can be configured in the touch screen 204 to implement the fingerprint recognition function, that is, the fingerprint collection device 212 can be integrated with the touch screen 204 to implement the fingerprint recognition function of the mobile phone 100.
- the fingerprint capture device 212 is disposed in the touch screen 204, may be part of the touch screen 204, or may be otherwise disposed in the touch screen 204.
- the main component of the fingerprint collection device 212 in the embodiment of the present application is a fingerprint sensor, which can employ any type of sensing technology, including but not limited to optical, capacitive, piezoelectric or ultrasonic sensing technologies.
- the mobile phone 100 can also include a Bluetooth device 205 for enabling data exchange between the handset 100 and other short-range devices (eg, mobile phones, smart watches, etc.).
- the Bluetooth device in the embodiment of the present application may be an integrated circuit or a Bluetooth chip or the like.
- the one or more sensors 206 described above include sensors for detecting a user's pressing operation on the side and a sliding operation of the user on the side.
- the one or more sensors 206 described above include, but are not limited to, the above-described sensors, for example, the one or more sensors 206 may also include light sensors, motion sensors, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display of the touch screen 204 according to the brightness of the ambient light, and the proximity sensor may turn off the power of the display when the mobile phone 100 moves to the ear.
- the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- the mobile phone 100 can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.
- the mobile phone 100 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, here Let me repeat.
- the WiFi device 207 is configured to provide the mobile phone 100 with network access complying with the WiFi related standard protocol, and the mobile phone 100 can access the WiFi hotspot through the WiFi device 207, thereby helping the user to send and receive emails, browse web pages, and access streaming media, etc. Users provide wireless broadband Internet access.
- the WiFi device 207 can also function as a WiFi wireless access point, and can provide WiFi network access for other devices.
- the positioning device 208 is configured to provide a geographic location for the mobile phone 100. It can be understood that the positioning device 208 can be specifically a receiver of a positioning system such as a Global Positioning System (GPS) or a Beidou satellite navigation system or a Russian GLONASS.
- GPS Global Positioning System
- Beidou satellite navigation system or a Russian GLONASS.
- the positioning device 208 After receiving the geographic location sent by the positioning system, the positioning device 208 sends the information to the processor 201 for processing, or sends the information to the memory 203 for storage.
- the positioning device 208 can also be a receiver of an Assisted Global Positioning System (AGPS).
- AGPS Assisted Global Positioning System
- the AGPS system assists the positioning device 208 in performing ranging and positioning services by acting as a secondary server.
- the secondary location server provides location assistance over a wireless communication network in communication with a location device 208 (i.e., a GPS receiver) of the device, such as handset 100.
- the positioning device 208 can also be a WiFi hotspot based positioning technology. Since each WiFi hotspot has a globally unique Media Access Control (MAC) address, the device can scan and collect the broadcast signal of the surrounding WiFi hotspot when the WiFi is turned on, so that the WiFi hotspot broadcast can be obtained. The MAC address is sent out; the device sends the data (such as the MAC address) capable of indicating the WiFi hotspot to the location server through the wireless communication network, and the location server retrieves the geographic location of each WiFi hotspot, and combines the strength of the WiFi broadcast signal. The geographic location of the device is calculated and sent to the location device 208 of the device.
- MAC Media Access Control
- the audio circuit 209, the speaker 213, and the microphone 214 can provide an audio interface between the user and the handset 100.
- the audio circuit 209 can transmit the converted electrical data of the received audio data to the speaker 213 for conversion to the sound signal output by the speaker 213; on the other hand, the microphone 214 converts the collected sound signal into an electrical signal by the audio circuit 209. After receiving, it is converted into audio data, and then the audio data is output to the RF circuit 202 for transmission to, for example, another mobile phone, or the audio data is output to the memory 203 for further processing.
- the peripheral interface 210 is used to provide various interfaces for external input/output devices (such as a keyboard, a mouse, an external display, an external memory, a subscriber identity module card, etc.). For example, it is connected to the mouse through a Universal Serial Bus (USB) interface, and is connected to a Subscriber Identification Module (SIM) card provided by the service provider through a metal contact on the card slot of the subscriber identity module. . Peripheral interface 210 can be used to couple the external input/output peripherals described above to processor 201 and memory 203.
- USB Universal Serial Bus
- SIM Subscriber Identification Module
- the mobile phone 100 can communicate with other devices in the device group through the peripheral interface 210.
- the peripheral interface 210 can receive display data sent by other devices for display, etc. No restrictions are imposed.
- the mobile phone 100 may further include a power supply device 211 (such as a battery and a power management chip) that supplies power to the various components.
- the battery may be logically connected to the processor 201 through the power management chip to manage charging, discharging, and power management through the power supply device 211. And other functions.
- the mobile phone 100 may further include a camera (front camera and/or rear camera), a flash, a micro projection device, a near field communication (NFC) device, and the like, and details are not described herein.
- a camera front camera and/or rear camera
- a flash a flash
- micro projection device a micro projection device
- NFC near field communication
- the method in the embodiment of the present application may be applied to a scenario in which the terminal unlocks when the user forgets to unlock the password (such as a digital password that is manually input by the user).
- a scenario in which the terminal unlocks when the user forgets to unlock the password such as a digital password that is manually input by the user.
- the terminal when the terminal (such as the mobile phone 100 shown in FIG. 1 or FIG. 2) is in the lock screen state, if the terminal is provided with a fingerprint lock, a sound lock, a digital code lock, and a face image lock (ie, face recognition)
- a fingerprint lock e.g., a fingerprint lock
- a sound lock e.g., a sound lock
- a digital code lock e.g., a digital code lock
- a face image lock ie, face recognition
- the terminal can respond to the user's correct fingerprint password, the correct voice password or the correct digital password, unlock the terminal and display the unlocked interface.
- the terminal when the terminal is in the lock screen state under the following scenarios (1) and scenario (2), the storage area of the fingerprint password and the voice password has been encrypted for information security reasons (ie, the terminal uses the fingerprint password and the voice password to unlock The function is turned off.
- the terminal can unlock the terminal in response to the digital password entered by the user. That is to say, when the terminal is in the lock screen state under the following scenarios (1) and scenario (2), even if the terminal receives the correct fingerprint password or the correct voice password input by the user, the terminal cannot be unlocked and displayed to be unlocked. After the interface.
- the function of unlocking the terminal using the fingerprint password and the voice password is turned off.
- the terminal When the user enters the correct numeric password (recorded as the first password) on the terminal, the above-mentioned "storage area of fingerprint password and voice password, face image password and iris password (recorded as second password)" will be allowed. Access, at this time the terminal is unlocked using the above second password unlocking function. Therefore, during the first unlocking process after the terminal is restarted, the terminal can unlock the terminal in response to the digital password input by the user when receiving the correct digital password.
- the mobile phone 100 shown in FIG. 1 is provided with a fingerprint lock as an example. It is assumed that the mobile phone 100 shown in (a) of FIG. 1 satisfies the condition of the scenario (1) of the above case 1, that is, the mobile phone 100 is restarted, and the mobile phone 100 has not been successfully unlocked after the restart.
- the mobile phone 100 displays the lock screen interface 101 shown in (a) of FIG.
- the mobile phone 100 can respond to the fingerprint password input by the user.
- the unlocked mobile phone displays the unlocked interface 106 as shown in (c) of FIG.
- the mobile phone 100 since the mobile phone 100 is restarted for the first time to unlock; therefore, when the user's finger touches the fingerprint sensor 102 of the mobile phone 100, the mobile phone 100 cannot be unlocked successfully, but requires the user to manually input the correct digital password to be successfully unlocked. That is, the mobile phone 100 can display the password input interface 103 shown in (b) of FIG.
- the password input interface 103 may include prompt information for prompting the user to input a password, such as the prompt message "Please input a power-on password after restarting" 104.
- the password forgot input button 103 shown in (b) of FIG. 1 may further include a “forgot password” button 105.
- the mobile phone 100 can assist the user in retrieving or resetting the lock screen password of the mobile phone 100 in response to the user's operation of the "forgot password” button 105.
- the scenario in which the multiple unlocking fails may include: a scenario in which multiple fingerprints fail to be unlocked, a scenario in which multiple passwords (such as a digital password) are unsuccessful, and a scenario in which multiple sound unlocking fails.
- the mobile phone 100 shown in FIG. 3 is provided with a fingerprint lock as an example. It is assumed that the mobile phone 100 shown in (a) of FIG. 3 meets the condition of the scenario (2) of the above-mentioned case 1, that is, the mobile phone 100 is in the lock screen state, and the mobile phone 100 displays the lock screen interface 101 shown in (a) of FIG. . Different from the lock screen state of the mobile phone 100 shown in (a) of FIG. 1, the lock screen state of the mobile phone 100 shown in (a) of FIG. 3 is not that the mobile phone 100 is restarted, and the mobile phone 100 is restarted after the restart. The lock screen state when it was not successfully unlocked. In this lock screen state, the mobile phone 100 can unlock the mobile phone 100 in response to any one of the correct digital password, correct fingerprint password or correct voice password input by the user, as shown in (c) of FIG. 1 . The interface 106 after unlocking.
- the mobile phone 100 uses the second above for information security reasons.
- the function to unlock the password will be temporarily turned off (such as inactive or locked).
- the above-mentioned "second password storage area" is allowed to access, and the terminal unlocks the function using the second password.
- the mobile phone 100 can determine the fingerprint information it has received and the entered fingerprint.
- the fingerprint password is different, and the password input interface 301 shown in (b) of FIG. 3 is displayed.
- the password input interface 301 includes prompt information for prompting a fingerprint error, such as the prompt information "Fingerprint error, try again" 302.
- the mobile phone 100 receives the error fingerprint information multiple times (such as M times, M ⁇ 2), the password input interface 303 shown in (c) of FIG. 3 is displayed.
- the password input interface 303 includes prompt information for prompting the mobile phone to fail to recognize the fingerprint.
- the prompt message “The mobile phone cannot recognize your fingerprint, please enter the password” 304.
- the password input interface 303 may further include a prompt message “M-th fingerprint input error” 305.
- the mobile phone 100 after the mobile phone 100 fails to perform the M-fingerprint unlocking, the mobile phone 100 can not only use the fingerprint password to unlock, but also can unlock using the voice password, and the mobile phone 100 can unlock the user in response to the correct digital password input by the user. success. In other embodiments, after the mobile phone 100 fails to perform the M digital password unlocking or the M voice password unlocking fails, the mobile phone 100 may not use the fingerprint password and the voice password lock, and the mobile phone 100 responds to the correct number input by the user. The password can be unlocked successfully.
- a terminal such as the mobile phone 100 shown in FIG. 2 manages a password (such as a digital password or the second password) in the terminal in response to a user's operation
- the terminal receives the information for security reasons.
- the password management function can be unlocked in response to the digital password input by the user, and the corresponding interface is displayed. That is to say, when the terminal is in the password or fingerprint management state under the following scenario (3), scenario (4) and scenario (5), even if the terminal receives the correct second password input by the user, the terminal cannot be unlocked and The interface after unlocking is displayed.
- the above terminal is the mobile phone 100 shown in FIG. 4 as an example.
- the mobile phone 100 can display the "fingerprint and password management" shown in (b) of FIG. 4 in response to the user's clicking operation on the "fingerprint and password management” option 402 in the setting interface 401 shown in (a) of FIG. Interface 403.
- the "Fingerprint and Password Management" interface 403 includes a "Fingerprint Management” option 404 and a "Password Management” option 405.
- the "fingerprint management” option 404 is used to add, modify or delete a fingerprint lock for the mobile phone 100.
- the "Password Management” option 405 is used to add, modify, or delete a password lock for the handset 100.
- the fingerprint lock and the password lock in the mobile phone 100 are maliciously modified; when the user clicks on (b) in FIG. After the "Password Management” option 405 or the "Fingerprint Management” option 404 is shown, the mobile phone 100 does not directly display the corresponding password or fingerprint management interface, but displays the password input interface 406 shown in (c) of FIG. The mobile phone 100 can display the corresponding password or fingerprint management interface in response to the user inputting the correct digital password in the password input interface 406 shown in (c) of FIG.
- the password forgot input button 406 shown in (c) of FIG. 4 may further include a “forgot password” button 407.
- the mobile phone 100 can acquire the lock screen password of the mobile phone 100 in response to the user's operation of the "forgot password” button 407.
- the part of the mobile phone may directly display the corresponding password or fingerprint management interface instead of displaying FIG.
- the password management interface 501 shown in (a) of FIG. 5 is displayed as an example in which the mobile phone 100 responds to the user's click operation of the "password management” option 405 shown in (b) of FIG.
- the password management interface 501 includes a "close password” selection 510 and a "change password” option 520.
- the password lock in the mobile phone 100 is maliciously turned off or modified; when the user clicks on "a) shown in Figure 5
- the mobile phone 100 does not directly display the interface for controlling the mobile phone 100 to close the password, but displays the password input interface 511 shown in (b) of FIG. 5; when the user clicks on (a) in FIG.
- the mobile phone 100 does not directly display the interface for controlling the change of the password of the mobile phone 100, but displays the password input interface 521 shown in (c) of FIG.
- the mobile phone 100 can display the control for turning off or modifying the mobile phone 100 in response to the user inputting the correct password in the password input interface 511 shown in (b) of FIG. 5 or the password input interface 521 shown in (c) in FIG. Password interface.
- the password forgot input button 511 shown in (b) of FIG. 5 may further include a “forgot password” button 512.
- the "forgot password” button 522 may also be included in the password input interface 521 shown in (c) of FIG.
- the mobile phone 100 can acquire the lock screen password of the mobile phone 100 in response to the user's operation of the "forgot password” button.
- the "WeChat Payment Management” interface 601 of the "WeChat” application in the mobile phone 100 includes a "Modify Payment Password” option 602 for modifying the WeChat payment surface and a "Fingerprint Payment” option 603 for turning on/off the fingerprint payment function.
- the WeChat payment password in the mobile phone 100 is maliciously modified, and the fingerprint payment function is maliciously turned on/off; when the user clicks on FIG. 6
- the "Modify Payment Password” option 602 or the “Fingerprint Payment” option 603 shown in (a) the mobile phone 100 does not directly display the corresponding password modification interface or directly activates the location fingerprint payment function, but displays the (b) in FIG.
- the password entry interface 604 is shown.
- the mobile phone 100 can display the corresponding password or fingerprint management interface in response to the user inputting the correct digital password in the password input interface 604 shown in (b) of FIG.
- scenario (1)-scenario (5) is an example of a scenario to which the unlocking method provided by the embodiment of the present application is applied, and the scenario applied by the unlocking method provided by the embodiment of the present application includes However, it is not limited to the above scene (1) - scene (5). Other scenarios to which the unlocking method is applied are not described herein.
- the executor of the unlocking method provided by the present application may be an unlocking device, and the unlocking device may be any one of the above-mentioned terminals (for example, the unlocking device may be the mobile phone 100 shown in FIG. 1); or the unlocking device may also be The central processing unit (English: Central Processing Unit, CPU for short) of the terminal, or a control module for executing the unlocking method in the terminal.
- the method for unlocking provided by the terminal is taken as an example to describe the unlocking method provided by the embodiment of the present application.
- the embodiment of the present application provides an unlocking method. As shown in FIG. 7, the unlocking method may include S701-S704:
- the first terminal displays a first interface, where the first interface is an interface that requires inputting a first password to be unlocked.
- the first interface may be the password input interface described in the above scenario (1)-scenario (5).
- the first interface may be the password input interface 103 shown in (b) of FIG. 1, the password input interface 301 shown in (b) of FIG. 3, and the password input interface shown in (c) of FIG. 3. 303, the password input interface 406 shown in (c) of FIG. 4, the password input interface 511 shown in (b) of FIG. 5, the password input interface 522 shown in (c) of FIG. 5, or FIG.
- the first interface is used to input a first password to unlock the first terminal.
- the password input interface 103 shown in (b) of FIG. 1 is used to input the lock screen password of the mobile phone 100 to unlock the mobile phone 100, so that the mobile phone 100 displays the (c) in FIG.
- the unlocked interface 106 is shown.
- the password input interface 301 shown in (b) of FIG. 3 is used to input the lock screen password of the mobile phone 100 to unlock the mobile phone 100, so that the mobile phone 100 displays the (c) shown in FIG.
- the unlocked interface 106 is used to input a first password to unlock the first terminal.
- the first interface is used to input the first password to unlock the first function in the first terminal.
- the first function in the first terminal may be a function of an embedded application (ie, a system application of the first terminal) installed in the first terminal.
- the embedded application is an application provided as part of the implementation of the first terminal (such as a mobile phone).
- the first function of the handset 100 may be a "fingerprint or password management" function in a "Settings” application (ie, an embedded application) of the handset 100.
- unlock password such as a lock screen password
- unlock password management such as a lock screen password
- the first function causes the mobile phone 100 to display a "fingerprint or password management" interface (such as the password management interface 501 shown in (a) of FIG. 5).
- the first function in the first terminal may be a function of a downloadable application installed in the first terminal.
- the downloadable application is an application that can provide its own Internet Protocol Multimedia Subsystem (IMS) connection, and the downloadable application can be pre-installed in the first terminal or can be downloaded by the user.
- IMS Internet Protocol Multimedia Subsystem
- the first function of the mobile phone 100 may be a function of "modify payment password" or "open fingerprint payment" in the "WeChat” application (ie, downloadable application) of the mobile phone 100.
- the password input interface 603 shown in (b) of FIG. 6 is used to input the payment password of the application "WeChat" in the mobile phone 100 to unlock the function of "modifying the payment password" in "WeChat". Or the function of "turning on fingerprint payment”.
- the first interface is an interface for inputting a first password to unlock a first terminal, or an interface for inputting a first password to unlock a first function in the first terminal.
- the unlocking method provided by the embodiment of the present application is exemplified by taking the first interface as (a) in FIG. 8 or (b) in FIG. 8 as an example.
- the first password described in S701 may be a digital password
- the second password in the embodiment of the present application may include a fingerprint password, a voice password, and a face image password (ie, a password corresponding to the face recognition technology). Any of the iris passwords. That is, the first interface may be an interface for inputting the first password to unlock the first terminal or unlocking the first function in the first terminal.
- the first password and the second password in the embodiment of the present application include, but are not limited to, the passwords listed above.
- the first password may also be a password consisting of at least two of numbers, special characters, and English letters.
- the second password may also be a password corresponding to the human eye recognition technology, and other first passwords and second passwords are not described herein.
- the method in the embodiment of the present application may further include S702:
- the first terminal displays a sixth interface, where the first interface includes a plurality of contact options, in response to the first operation of the user in the first interface.
- the first operation of the user in the first interface may be that the user inputs an incorrect password in the first interface N (N ⁇ 2, N ⁇ M), the wrong password may include an incorrect digital password, and an error. At least one of a fingerprint password and an incorrect voice password.
- the first terminal After the first terminal detects that the user inputs the wrong password N times on the first interface, the first terminal may display the sixth interface.
- the mobile phone 100 can display the sixth interface.
- the sixth interface may be the sixth interface 805 shown in (c) of FIG.
- N is greater than or equal to M in scene (2). That is, in the scenario (2), when the mobile phone 100 detects that the user inputs the wrong password (the wrong first password or the wrong second password) M times, the mobile phone 100 displays the password input interface shown in (c) of FIG. 3. 303, and turn off the function of the mobile phone 100 using the second password to unlock. Then, if the user continues to input the wrong password (the wrong first password or the wrong second password) to the mobile phone 100, when the mobile phone 100 detects that the user inputs the wrong password N times (that is, the mobile phone 100 detects the user inputting the wrong password M times) When the user NM times again enters the wrong password, the mobile phone 100 can display the sixth interface.
- the first interface may further include a “forgot password” button
- the first operation of the user in the first interface may be a user clicking operation on the “forgot password” button in the first interface.
- the first terminal may display the sixth interface in response to the user clicking the "forgot password” button in the first interface.
- the mobile phone 100 displays a password input interface (such as the first interface 803 described in (b) of FIG. 8).
- the "Forgot Password” button 804 is included.
- the mobile phone 100 can display the sixth interface in response to the user's click operation on the "forgot password” button 804.
- the sixth interface may be the sixth interface 805 shown in (c) of FIG.
- the sixth interface described above includes a plurality of contact options.
- the first terminal may automatically send an assistance request (ie, a second communication message) to the emergency contact of the first terminal in response to the user selecting a plurality of contact options in the sixth interface.
- the plurality of contact options include a contact option corresponding to P (P ⁇ 1) preset accounts (accounts of emergency contacts) preset in the terminal and contact options of K other contacts.
- Q (Q ⁇ P) emergency contacts can be preset in the first terminal.
- K (K ⁇ 1) other contacts may include a non-emergency contact and/or an unfamiliar contact, and the non-emergency contact includes some other contacts saved in the first terminal except the emergency contact. The strange contact is a stranger who is not saved in the terminal.
- the emergency contacts preset in the mobile phone 100 include Aaron and Michael, and the contacts in the mobile phone 100 are stored with Jordan, Lucy, and Alice.
- the following contact options 807 can be displayed in the sixth interface 805: "Aaron”, “Jordan”, “Lynda”, “Robert”, “Alice” , “Michael”, “Lucy” and “Kenny”.
- “Aaron” and “Michael” shown in (c) of FIG. 8 are contact options of the emergency contact of the mobile phone 100;
- “Jordan”, “Lucy” and “” shown in (c) of FIG. Alice” is a contact option for non-emergency contacts in the handset 100;
- “Lynda”, “Robert” and “Kenny” shown in (c) of Figure 8 are contact options for strange contacts.
- displaying the contact options of the non-emergency contact and/or the unfamiliar contact in the sixth interface may confuse the contact options of the multiple emergency contacts in the sixth interface to prevent other users from being malicious.
- the correct emergency contact can be easily selected to successfully unlock the first terminal or the first function in the first terminal.
- the sixth interface may further include prompt information, where the prompt information is used to prompt the user to select a contact option of the preset emergency contact from the plurality of contact options displayed by the sixth interface.
- the sixth interface 805 shown in FIG. 8(c) may further include a prompt message “Please select a preset P emergency contacts from the following contacts” 806.
- a "finish" button 808 may also be included in the sixth interface 805 shown in (c) of FIG.
- the sixth interface only needs to present a verification interface to the current user, such as a password, a pattern, a privacy issue, etc., and is not limited to selecting an emergency contact.
- the terminal may send a second communication message to the emergency contact to request emergency contact after the user selects the correct emergency contact in response to the user selecting the multiple contact options in the sixth interface.
- the person assists the terminal to unlock.
- the method in the embodiment of the present application may further include S703-S704:
- the first terminal determines, according to a selection operation of the multiple contact options in the sixth interface, whether the first contact is a preset emergency contact, where the first contact is a contact option selected by the user. Contact.
- the account corresponding to the first option is a preset account.
- the first terminal may send a first prompt message to the user to indicate an emergency contact selection error, and instruct the user to reselect the emergency contact.
- the foregoing “the first contact is not the emergency contact preset in the terminal” may specifically include: some of the first contacts are not the contacts of the Q emergency contacts, or the first contact All contacts in the person are not contacts in the above Q emergency contacts.
- the handset 100 can determine that the first contact selected by the user (Aaron and Robert) is not the default emergency contact.
- the user selects the contact options "Alice” and "Robert” shown in (c) of FIG. 8, since Alice and Robert (ie, the first contact) and the emergency contacts Aaron and Michael preset in the mobile phone 100 are completely Not the same; therefore, the handset 100 can determine that the first contact (Alice and Robert) selected by the user is not a preset emergency contact.
- the above prompt information may not indicate the emergency contact option included in the plurality of contact options displayed in the sixth interface (ie, the emergency contact The number of contact options) (ie P).
- the prompt information 806 shown in (c) of FIG. 8 may be replaced with "please select a preset emergency contact from the following contacts.”
- the terminal may also determine that the first contact is not the terminal. The default emergency contact in the middle.
- the manner in which the first terminal sends the first prompt information to the user may include: the first terminal displays an interface including the first prompt information; or the first terminal plays the first prompt by using a voice prompt manner. information.
- the first terminal is the mobile phone 100, and the mobile phone 100 displays an interface including the first prompt information as an example.
- the mobile phone 100 may display the display interface 901 shown in (a) of FIG.
- the display interface 901 includes a first prompt information "emergency contact error, please reselect the preset emergency contact" 902.
- the mobile phone 100 may also prompt the user for the number of times the user can reselect the emergency contact.
- the display interface 901 may further include a prompt message "You still have X selection opportunities" 903.
- the first terminal When the first terminal detects that the number of errors of the user selecting the preset emergency contact is higher than a preset number of thresholds (eg, X times, X ⁇ 2), the first terminal may be locked, that is, the first terminal does not respond to the user. Unlock the operation. In the embodiment of the present application, the first terminal may be temporarily locked, and the first terminal may respond to the unlocking operation of the user after a certain time (such as the Y time). For example, when the user selects the preset emergency contact's number of errors more than X times in the interface shown in (a) of FIG. 9, the mobile phone 100 can display the display interface 904 shown in (b) of FIG. The display interface 904 includes a prompt message "Your mobile phone has been locked, please try again after Y time.”
- a preset number of thresholds eg, X times, X ⁇ 2
- the first terminal may also issue an alarm prompt when detecting that the number of times the user selects the preset emergency contact is higher than the preset number of times threshold. If the other user maliciously unlocks the first terminal, the wrong contact may be selected because the emergency contact preset in the terminal is not known. At this time, the first terminal may issue an alarm prompt, so that the owner can discover in time. And stop the malicious behavior of the other users.
- the manner in which the first terminal sends an alarm prompt may include at least: the first terminal sends a flash signal; the first terminal sends a voice alert; and the first terminal automatically dials the preset terminal (such as other terminals associated with the first terminal). The first terminal sends a message to the preset terminal or sends the location information; the first terminal automatically captures a photo of the user who maliciously unlocks the first terminal, and sends the captured photo to the preset terminal.
- the first terminal proceeds to execute S704.
- the first contact may include one or more contacts, that is, the user may select one or more contact options from the plurality of contact options displayed by the sixth interface. There are pre-set Q emergency contacts in the first terminal.
- the “first contact is an emergency contact preset in the first terminal” may specifically include: the first contact is a contact among the Q emergency contacts.
- the emergency contacts preset in the mobile phone 100 include Aaron and Michael.
- the mobile phone 100 displays the display interface 1001 shown in (a) of FIG. 10, and the contact selected by the user at this time.
- the contact (ie, the first contact) corresponding to the options "Aaron” and “Michael” is an emergency contact preset in the mobile phone 100.
- the first terminal sends a second communication message to the first contact by using the first communication application, where the second communication message is used to indicate that the first contact assists the first terminal to unlock, and instructs the first contact to assist the first terminal to unlock.
- the first communication application in the embodiment of the present application may be any one of the communication applications installed in the first terminal.
- the first communication application is an embedded application installed in the first terminal and capable of communicating with other terminals (such as the second terminal), such as an information application, an email box, an iMessage, etc.; or, the first communication application is installed at the first A downloadable application in the terminal that can communicate with other terminals, such as WeChat, QQ, Alipay, and the like.
- the first communications application is running in the background of the first terminal, so that the first terminal may directly invoke the first contact when determining that the first contact is a preset emergency contact.
- a communication application sends a second communication message to the first contact; or the user logs in to the first communication application on the first terminal, and the first terminal stores the login information of the first communication application (such as an account number and Logging in to the password, so that the first terminal can start the first communication application when determining that the first contact is a preset emergency contact, and after starting the first communication application, using the first communication application to the first
- the contact sends a second communication message.
- the plurality of contact options displayed in the sixth interface are the contact options of the plurality of contacts in the first communication application on the terminal.
- the second communication message when the first communication application is an information application, the second communication message is a short message, and the plurality of contact options in the sixth interface correspond to multiple contacts in the “address book” of the terminal.
- the first communication application is an iMessage
- the second communication message is an iMessage message
- the plurality of contact options in the sixth interface correspond to multiple contacts in the “Contact Book” of the terminal.
- the first communication application is an e-mail address
- the second communication message is an e-mail
- the plurality of contact options in the sixth interface correspond to a plurality of contacts in the e-mail address.
- the first communication application is WeChat
- the second communication message is a WeChat message
- the plurality of contact options in the sixth interface correspond to a plurality of contacts in the address book of the WeChat.
- the manner in which the first contact assists the first terminal to unlock may include: the first contact sends a first communication message to the first terminal by using the second communication application, where the content of the first communication message is included in the foregoing In the second communication message.
- the second communication application may be any one of an application of an information application, an email address, an iMessage, a WeChat, a QQ, an Alipay, and the like.
- the second communication application is the same as the first communication application, or the second communication application is different from the first communication application.
- the first contact in the embodiment of the present application sends the first communication message to the first terminal by using the second communication application.
- the terminal that logs in the second account passes the second communication application.
- a terminal sends a first communication message.
- the second account is an account of the first contact in the second communication application
- the first account is an account corresponding to the first contact in the first communication application of the first terminal (such as a WeChat account, a QQ account, and an Alipay account). account number).
- the first communication application in the embodiment of the present application is the same as the second communication application, and the first account is the same as the second account.
- the first communication application and the second communication application are both WeChat, the first account and the second account are the same WeChat account; the first communication application and the second communication application are information applications, and the first account and the second account are the same. cellphone number.
- the first communication application in the embodiment of the present application is different from the second communication application, the first account is different from the second account, but the first account is associated with the second account.
- the first communication application is an information application
- the first account is the mobile phone number a; at this time, the second communication application may be WeChat, and the second account is a WeChat account with the mobile phone number a bound.
- the manner in which the first contact assists the first terminal to unlock may include: the first contact makes a call to the first terminal.
- the first contact in the embodiment of the present application to make a call to the first terminal specifically refers to: the communication number (such as a mobile phone number or a fixed phone number) is a terminal of the first number (such as the second terminal) dialing to the first terminal. phone.
- the first number is a communication number of the first contact saved in the address book of the first terminal.
- the first communication application is an example of WeChat.
- the owner of the mobile phone 100 is Aimee "Aimee”.
- the mobile phone 100 determines that the first contact selected by the user is a preset in the mobile phone 100.
- the emergency contact sends a second communication message to the mobile phone 200 of the contact Aaron and the mobile phone 300 of the contact Michael.
- the mobile phone 200 of the contact Aaron may display the WeChat chat interface 1002 shown in (b) of FIG.
- the contact person's mobile phone 300 receives the second message.
- the WeChat chat interface 1003 shown in (c) of FIG. 10 can be displayed in response to the user's operation.
- the second communication message “Hello is displayed in the WeChat chat interface of Aaron, Michael and Aimee, please send a message '996128' via WeChat or short message. Give it to me, or call me.”
- the first contact Aaron or Michael sends the first communication message "896128" to the handset 100 via WeChat or short message (ie the second communication application) or calls the handset 100.
- the content of the first communication message saved in the second communication message includes but not It is limited to "896128" in the above example.
- the content of the first communication message may be a message content that is randomly generated when the terminal sends the second communication message; or, the terminal may pre-save a plurality of message content, and the terminal may randomly collect multiple pre-saves when transmitting the second communication message.
- a message content is selected in the message content, and the selected message content is carried in the second communication message as the content of the first communication message.
- the content of the message may be any one of “kanji”, “string” or “combination of Chinese characters and character strings”.
- the above string may be composed of at least one of a number, an English letter, and other special characters (for example, a hash mark "#", an underscore "_”, and an asterisk "*", and the like.
- the preset account in the embodiment of the present application may be the user account associated with the other terminal (such as the second terminal).
- the first terminal may be associated with one or more other terminals through a user account (referred to as an associated account), and the first terminal and the one or more other terminals log in to the associated account, the one or more other terminals. It may be referred to as an associated terminal of the first terminal.
- the first terminal may send a second communication message to the associated terminal of the first terminal to request the associated terminal of the first terminal to assist the first terminal to unlock.
- the first terminal may further display, to prompt the user, that the first terminal has passed the first communication.
- the display interface of the application notification emergency contact to assist the user to perform password verification.
- the mobile phone 100 determines that the first contact selected by the user is in the mobile phone 100.
- the preset emergency contact the mobile phone 100 can display the display interface 1004 shown in (d) of FIG.
- the display interface 1004 includes a prompt message "already (via WeChat, short message or other instant messaging application) to notify the emergency contact to assist you in password verification!.
- the first terminal may display the first interface.
- the method in the embodiment of the present application may further include S901.
- the method in this embodiment may further include S901:
- the first terminal displays the first interface.
- the mobile phone 100 displays the display interface 1004 shown in (d) of FIG. 10 for more than a preset time (eg, 3 seconds, 5 seconds, or 6 seconds, etc.), the first interface may be displayed.
- the mobile phone 100 can display the first interface shown in (a) of FIG. 8 or (b) of FIG.
- the mobile phone 100 can directly display the first interface in response to the user's click operation on the "Done” button 808.
- the first terminal displays multiple contact options on the sixth interface, so that the user selects a preset emergency contact; the first contact selected by the first terminal is pre- After the set emergency contact (ie, the user selects the correct emergency contact), the second communication message is automatically sent to the first contact, requesting the first contact to assist the terminal to unlock; the first terminal selects the error multiple times in the user.
- the emergency terminal can lock the first terminal.
- the emergency contact selected by the user is a mechanism for authenticating the identity of the user.
- the preset emergency contact in the terminal is set by the owner, and other users do not know the emergency contact preset in the terminal; therefore, other users can be reduced by the user selecting the authentication mode of the emergency contact. The possibility of maliciously unlocking the terminal by the method of the embodiment of the present application.
- the first terminal sends a second prompt message in response to the second operation of the user on the first interface, where the second prompt information is used to indicate that the terminal corresponding to the preset account sends the first information to assist the first terminal to unlock.
- the user contacts the terminal corresponding to the preset account, that is, the terminal corresponding to the emergency contact preset in the first terminal, to request the preset emergency contact to assist the first terminal to unlock.
- the method may include: the user uses another terminal to make a call to the preset emergency contact; the user uses the other terminal to send the second communication message to the preset emergency contact through the first communication application; the user currently requests the preset emergency contact. Person: sending a first communication message to the first terminal or making a call to the first terminal or the like through the second communication application.
- the third prompt information indicates that “the preset emergency contact assists the first terminal to unlock the manner” may refer to “the manner in which the first contact assists the first terminal to unlock” in the first design manner, and “preset emergency contact” The manner in which the person assists the first terminal to unlock is not described herein.
- the manner in which the first terminal sends the second prompt information may include: the first terminal sends a voice prompt information indicating that the terminal corresponding to the preset account sends the first information to assist the first terminal to unlock; or the first terminal displays the The interface of the second prompt information; or the first terminal sends the second prompt information to the associated terminal of the first terminal.
- the first terminal is the mobile phone 100 as an example.
- the mobile phone 100 can display the display interface 1201 shown in FIG. 12, and the display interface 1201 includes a second prompt message "Please contact the emergency contact preset in the mobile phone 100, send a message '896128' or call the local machine to assist You unlock "1202.
- the first terminal may display the first interface.
- the method in the embodiment of the present application may further include the foregoing S901.
- the "OK" button 1203 may also be included in the display interface 1201 shown in FIG.
- the mobile phone 100 can display the first interface in response to a user's click operation (or a sliding operation, a double-click operation, a long-press operation, or the like) to any position on the display interface 1201 or the "OK" button 1203.
- the first interface may be displayed.
- the mobile phone 100 can display the first interface shown in (a) of FIG. 8 or (b) of FIG.
- the terminal may send the second prompt information in response to the second operation of the user on the first interface, to instruct the user to contact the preset emergency contact in the first terminal to assist the first terminal to unlock. Since the preset emergency contact in the first terminal is set by the owner, the other users do not know the emergency contact preset in the first terminal; therefore, when other users try to maliciously unlock the terminal by the method of the embodiment of the present application The possibility of maliciously unlocking the terminal by the method of the embodiment of the present application is reduced because the other user does not know the emergency contact preset in the terminal.
- the terminal may receive the first communication message sent by the first contact through the second communication application.
- the method in the embodiment of the present application may further include S1101:
- the first terminal receives the first information sent by the second terminal, and verifies the first information.
- the S1101 may specifically include S1101a:
- the first terminal receives the first communication message sent by the second terminal, and verifies the first communication message.
- the first communication message is a voice call request, and the first information includes an account that initiates the voice call request.
- the first communication message is an instant message, the first information includes an account for sending an instant message, or the first information includes an account for sending an instant message and a message content of the instant message.
- the first communication message is an email, the first information includes an account number for sending the email, or the first information includes an account number for sending the email and the email content of the email.
- S1102 The first terminal displays the second interface when the first information passes the verification.
- the first communication message is a voice call request
- the first information includes an account that initiates a voice call request.
- the first terminal verifies that the first communication message is: the first terminal verifies whether the account that initiated the voice call request is the preset account, that is, the first terminal verifies whether the voice call request is initiated by the preset emergency contact.
- the first information verification pass means that the voice call request is initiated by the preset emergency contact.
- the first communication message is an instant messaging message
- the first information includes an account that sends the instant messaging message.
- the first terminal verifies that the first communication message includes: the first terminal verifies whether the account that sends the instant messaging message is the preset account, that is, the first terminal verifies whether the instant messaging message is sent by the preset emergency contact.
- the first information verification pass means that the instant messaging message is sent by the preset emergency contact.
- the first information in the second case further includes the message content of the instant messaging message;
- the first terminal verifying the first communication message includes: determining, by the first terminal, whether the account that sends the instant messaging message is the preset account, And verifying whether the message content of the instant messaging message is the message content indicated by the second communication message.
- the first information verification means that the instant messaging message is sent by the preset emergency contact, and the message content of the instant messaging message is the message content indicated by the second communication message.
- the first communication message is an email
- the first information includes an account for sending an email.
- the first terminal verifies the first communication message, and the first terminal verifies whether the account that sends the email is the preset account, that is, the first terminal verifies whether the email is sent by the preset emergency contact.
- the first information verification pass means that the email is sent by the preset emergency contact.
- the first information in the second case further includes the email content of the email;
- the first terminal verifying the first communication message includes: determining, by the first terminal, whether the account that sends the email is the preset account, and verifying Whether the mail content of the above email is the mail content indicated by the second communication message.
- the first information verification pass means that the email is sent by the preset emergency contact, and the email content of the email is the mail content indicated by the second communication message.
- the first interface described in the mobile phone 100 of the terminal, S701 is the lock screen interface of the mobile phone 100, that is, the unlock password described in S701 is the lock screen password of the mobile phone 100, and the first contact (the mobile phone 100)
- the default emergency contact) is Michael
- the second communication application is WeChat
- the first communication message is "896128" as an example.
- the mobile phone 100 receives the first communication message "896128" sent by Michael via WeChat, and displays an interface 1301 that receives the first communication message "896128.”
- the mobile phone 100 unlocks the mobile phone 100 and displays the desktop 1303 of the mobile phone 100 shown in (c) of FIG. 13 in response to receiving "896128" sent by Michael via WeChat.
- the terminal may display a dynamic interface for inputting an unlock password in the first interface.
- the mobile phone 100 receives the first communication message "896128" sent by Michael via WeChat.
- the mobile phone 100 can input the unlocking password in the first interface in response to receiving the "896128" sent by Michael through the WeChat, that is, displaying the dynamic interface 1302 inputting the unlocking password in the first interface shown in (b) of FIG. 13 and unlocking The mobile phone 100; then the desktop 1303 of the mobile phone 100 shown in (c) of FIG. 13 is displayed.
- the mobile phone 100 can display the preset time (such as 3 seconds, 5 seconds, or 2 seconds, etc.) of the dynamic interface 1302 shown in (b) of FIG. 13 , and then display the mobile phone 100 shown in (c) of FIG. 13 .
- the first terminal responds to the first operation or the second operation of the user in the first interface (eg, the user inputs a password error N times in the first interface or the user clicks the “forgot password” button in the first interface)
- the "retrieve password status flag” may be set in the first terminal to mark that the first terminal is currently in the state of retrieving a password.
- the first terminal may set a "Retrieve Password Status Flag" in a register in the first terminal.
- this register can be a flag register, also known as a Program Status Word (PSW).
- PSW Program Status Word
- S1101-S1102 may include S1401-S1404:
- S1401 The first terminal receives the first information sent by the second terminal by using the second communications application.
- S1402 The first terminal determines whether a “retrieve password status flag” is set in the first terminal.
- the first terminal may receive the first communication message sent by the second terminal through the second communication application, regardless of whether the first password is set in the first terminal, but the first terminal sets When the "recover password status flag" is used, the first terminal needs to verify the first information.
- the "retrieve password status flag" is not set in the first terminal, even if the first terminal receives the first information (such as the first communication message) sent by the first contact, The first terminal or the first function is not unlocked in response to receiving the first communication message. For example, after the mobile phone 100 performs the above-mentioned S701-S702, S703-S704 (optional) and S1101-S1102 to successfully unlock, the "retrieve password status flag" set in the mobile phone 100 is cleared.
- the mobile phone 100 receives the "896128" sent by another emergency contact Aaron through the WeChat, and does not respond to the receipt of the "896128 sent by Aaron via WeChat. ", unlock the phone 100.
- the first terminal verifies the first communication message.
- the method for the first terminal to verify the first communication message includes S1403;
- the first terminal determines whether the first information is a first communication message sent by a first contact (preset emergency contact) selected by the user.
- the first terminal may first determine whether the first information is a message sent by a first contact (preset emergency contact) selected by the user; and when the first information is a message sent by the first contact selected by the user. And determining whether the first information is the first communication message, that is, whether the content of the message indicated by the second communication message is carried in the first information.
- the first terminal may first determine whether the first information is the first communication message, that is, whether the first information carries the message content indicated by the second communication message; and the first information carries the second communication message. When the content of the message is indicated, it is determined whether the first information is a message sent by the first contact (preset emergency contact) selected by the user.
- the first information is the first communication message sent by the first contact selected by the user, proceed to S1404 and S1405; when the first information is not the message sent by the first contact selected by the user, or the first When the information is not the first communication message, the first information is processed according to a normal process in which the terminal processes the first information.
- S1404 The first terminal unlocks the first function of the first terminal or the first terminal.
- the first terminal automatically unlocks in response to receiving the first communication message sent by the first contact by the second communication application, on the premise that the first terminal is configured with the “retrieve password status flag”.
- the first function of the first terminal or the first terminal can be successfully unlocked.
- the first terminal in response to receiving the first communication message sent by the first contact by the second communication application, to unlock the first terminal or the first function, may include: the first terminal displays the first Receiving, by the first interface, the first communication message sent by the first contact by the second communication application, the first interface or the first function is unlocked by the first interface or the preset time period in which the second prompt information is sent. That is, if the first terminal receives the first interface or the preset time period after the second prompt information is sent, the first terminal receives the first communication message sent by the first contact through the second communication application. (And, even if the terminal sets the "Retrieve Password Status Flag"), the first terminal does not unlock the first terminal or the first function.
- the terminal may also guide the user to modify the unlock password in response to receiving the first communication message sent by the emergency contact through the second communication application.
- S1102 shown in FIG. 7 or FIG. 11 includes S1501-S1502.
- S1102 shown in FIG. 7 includes S1501-S1502:
- the first terminal displays a fifth interface when the first information passes verification, and the fifth interface includes a reset password input box.
- the mobile phone 100 receives the "896128" sent by Michael via WeChat in response to (a) in FIG. 13, and may display the fifth interface 1501 shown in (a) of FIG. 15A, which is included in the fifth interface 1501.
- the password input box 1503 is reset.
- the first terminal receives a new password input by the user in the reset password input box, and modifies the first password to a new first password, and displays the second interface.
- the mobile phone 100 can respond to the new password input by the user, and the mobile phone 100 The unlock password is modified to a new password input by the user, and the second interface 1506 shown in (c) of FIG. 15A is displayed.
- the first terminal may display the second interface in response to a return operation of the user at the fifth interface.
- the return operation may be a preset gesture input by the user in the fifth interface or a click operation of a blank position in the fifth interface.
- the fifth interface 1501 displayed by the mobile phone 100 includes a "return" button 1502, which may be a user's click operation on the "return” button 1502; the mobile phone 100 responds to the user.
- the click operation of the "return” button 1502 displays the second interface 1506 shown in (c) of Fig. 15A.
- the fifth interface in the embodiment of the present application may further include an original password input box that has input the original unlock password.
- the fifth interface 1507 displayed by the mobile phone 100 further includes an original password input box 1508 in which the original unlock password has been input.
- the first terminal may trigger the first terminal to request the emergency contact to assist the first terminal to reset the password, when the first terminal displays the lock screen interface or unlocks the first function of the first terminal.
- the first terminal when the first terminal is in the unlocked state, when displaying the desktop or the application interface, the first terminal may send the second communication message to the emergency contact of the first terminal in response to the operation of the user; then, the first terminal may Receiving the first information sent by the second terminal, and displaying the fifth interface when the first information passes the verification; finally, the first terminal may receive the new password input by the user in the reset password input box, and unlock the first terminal.
- the password or the unlock password of the first function is changed to the new password.
- the first terminal when the first terminal is in the unlocked state and the desktop or the application interface is displayed, if the first terminal receives the first information sent by the second terminal, the first information may be verified; when the first information passes the verification, The fifth interface is displayed; then, the new password input by the user in the reset password input box is received, and the unlock password of the first terminal or the unlock password of the first function is modified to a new password.
- the user using the first terminal may notify the emergency contact to send the first information to the first terminal by other means, such as verbal notification.
- the first terminal cannot display the second interface when the first information passes the verification; the first terminal may further receive the user input. Second information; the second interface can be displayed when both the first information and the second information are verified.
- the method in the embodiment of the present application may include S701, S1101, and S1601-S1602 shown in FIG. 7 or FIG. That is, in the embodiment of the present application, the foregoing S702-S704 and S801 are optional, and the first terminal may not execute S702-S704 and S801. That is, as shown in FIG. 16A, the embodiment of the present application provides an unlocking method, where the unlocking method includes S701, S1101, and S1601-S1602:
- S1601 The first terminal receives the second information input by the user when the first information passes the verification, and verifies the second information.
- the second information when the first communication message includes an instant messaging message or an email, the second information includes at least one of fingerprint information, sound information, iris information, and face image information; when the first communication message is a voice call request, The second information includes at least one of digital information, fingerprint information, sound information, iris information, and face image information.
- the first terminal displays a second interface when the second information passes the verification, and the second interface is an unlocking interface after the first interface inputs the first password.
- the first terminal needs to display the unlocking interface after the first interface inputs the first password when both the first information and the second information are verified.
- the dual verification mode of verifying the first information and the second information can improve the security of the first terminal.
- the first terminal may not display the second interface when the second information passes the verification, but display a password reset interface (ie, the fifth interface) that prompts the user to modify the password.
- a password reset interface ie, the fifth interface
- the above S1602 may include: S1501a and the above S1502:
- the first terminal displays a fifth interface when the second information passes verification, and the fifth interface includes a reset password input box.
- the first terminal unlocks the first terminal by using a second password (such as a fingerprint password, a face image password, a voice password, etc.) or
- the function of the first function is turned off, and the first terminal can only decrypt the first terminal or the first function of the first terminal in response to the first password (such as a digital password) input by the user.
- the first terminal receives the first information sent by the second terminal, where the first terminal receives the first message sent by the second terminal.
- a communication message the first communication message including an instant message or an email.
- the first terminal may enable the first terminal to unlock the terminal or the function of the first function by using at least one of the fingerprint information, the sound information, the iris information, and the face image information.
- the first terminal may not display the second interface first; instead, the function of the terminal to unlock the terminal or the first function by using the second password is opened, and the second terminal is displayed for inputting the second The third interface of information.
- the above S1601-S1602 may include S1701-S1703:
- the first terminal displays a third interface when the first information passes the verification, where the third interface is an interface for inputting the second information, where the second information includes at least the fingerprint information, the sound information, the iris information, and the face image information.
- the third interface is an interface for inputting the second information, where the second information includes at least the fingerprint information, the sound information, the iris information, and the face image information.
- the first terminal may enable the function of unlocking the terminal or the first function by using at least one of the fingerprint information, the sound information, the iris information, and the face image information, and the display is used to input the fingerprint information, A third interface of at least one of sound information, iris information, face image information, and the like.
- the first terminal receives the second information input by the user on the third interface, and verifies the second information.
- S1703 The first terminal displays the second interface when the second information passes the verification.
- the second information is fingerprint information as an example.
- the second information passing verification means that the fingerprint information entered in the third interface is the same as the pre-stored fingerprint password.
- the first terminal is the mobile phone 100
- the first interface described in S701 is the lock screen interface of the mobile phone 100
- the unlock password is the unlock password of the mobile phone 100
- the first contact (the preset of the mobile phone 100)
- the emergency contact) is Michael
- the second communication application is WeChat
- the first communication message is "896128”
- the second information is fingerprint information as an example.
- the display interface 1701 shown in (a) of FIG. 17 is displayed.
- the mobile phone 100 In response to receiving "896128" sent by Michael via WeChat, the mobile phone 100 turns on the function of the mobile phone 100 to unlock the mobile phone 100 using the fingerprint password, and displays the third interface 1702 of the mobile phone 100 shown in (b) of FIG.
- the third interface 1702 includes a prompt message "Please enter a password or enter a fingerprint” 1703 for prompting the user to input digital information or fingerprint information.
- the user can unlock the mobile phone 100 using the fingerprint information even if the user forgets to unlock the digital password of the mobile phone 100.
- the mobile phone 100 unlocks the mobile phone 100 and displays FIG. 17 in response to the correct fingerprint information entered by the user at the fingerprint sensor 102 of the mobile phone 100.
- the first terminal may also unlock the first function of the first terminal or the first terminal in response to the digital information (ie, digital password) input by the user on the third interface, and display the second interface.
- the mobile phone 100 can also receive the digital password input by the user in the third interface shown in (b) of FIG. 17 or (c) in FIG. 17, unlocking the mobile phone 100 and displaying the display shown in (d) of FIG. The desktop of the mobile phone 100 (ie, the second interface).
- S1702-S1703 For the specific implementation method of S1702-S1703, refer to S1401-S1405. The difference is that the S1401 can be replaced by the first terminal receiving the second information input by the user, and the S1403 can be replaced by the first terminal determining whether the second information is a pre-stored password.
- the first terminal may open the terminal in response to receiving the first communication message sent by the first contact by the second communication application on the premise that the terminal sets the “recover password status flag”.
- the second password (such as fingerprint information) unlocks the function of the first terminal.
- the first terminal can successfully unlock in response to the second password input by the user.
- the foregoing S1702-S1703 may include: the first terminal starts a function of unlocking the terminal by using the second password by using the second terminal within a preset time period from the first information passing the verification; in the preset time period, If the first terminal receives the second information input by the user on the third interface, the second information is verified, and when the second information is verified, the second interface is displayed. After the preset time period, the first terminal turns off the function of the first terminal to unlock the terminal by using the second password.
- the first terminal receives the first information sent by the second terminal, where the first terminal receives the first communication message sent by the second terminal, where The first communication message is a voice call request, and the first information includes an account number that initiates a voice call request.
- the first terminal may not unlock the first terminal or the first function first; but the fourth interface (the call alert interface or the voice)
- the call interface receives the second information input by the user; if the second information passes the verification, the first terminal unlocks the first terminal or the first function in response to the end of the voice communication.
- the method in the embodiment of the present application further includes S1801, the S1601 includes S1802, and the S1602 includes S1803:
- the first terminal displays a fourth interface, and the fourth interface is an incoming call alert interface or a voice call interface.
- the first terminal receives and verifies the second information input by the user when the first information passes the verification in the process of displaying the fourth interface by the first terminal.
- the second information includes at least one of digital information, fingerprint information, sound information, iris information, and face image information.
- the first terminal displays the second interface in response to the end of the voice communication.
- the second information is fingerprint information as an example.
- the second information passing verification means that the fingerprint information entered in the third interface is the same as the pre-stored fingerprint password.
- the first terminal may perform S1501-S1502 in response to the end of the voice communication, which is not described in this embodiment of the present application.
- the first terminal is the mobile phone 100
- the first interface described in S701 is the lock screen interface of the mobile phone 100
- the first contact (the default emergency contact of the mobile phone 100) is Michael.
- the mobile phone 100 can display the call interface 1901 shown in (a) of FIG. 19, and the call interface 1901 is the mobile phone 100 and Michael (ie, the first contact).
- the mobile phone 300 performs an interface for voice communication.
- the second information is digital information (such as the preset password "369").
- the mobile phone 100 can respond to the user's click operation on the "dial keyboard” option 1902 in the call interface 1901 shown in (a) of FIG. Displaying the display interface 1903 shown in (b) of FIG.
- the mobile phone 100 displays the display interface 1904 shown in (c) of FIG. 19 in response to the number "3" input by the user on the display interface 1903;
- the mobile phone 100 displays the display interface 1905 shown in (d) of FIG. 19 in response to the number "6" input by the user on the display interface 1903; finally, the mobile phone 100 responds to the number "9" input by the user on the display interface 1905,
- the mobile phone 100 can be unlocked, and after the voice call ends, the second interface 1906 shown in (e) of FIG. 19, that is, the desktop of the mobile phone 100 is displayed.
- the fourth interface may also be an incoming call alert interface.
- receiving and verifying the second information input by the user may include: the first terminal is displaying the fourth interface.
- the first terminal is used to unlock at least one of the fingerprint information, the sound information, the iris information, and the face image information, and receives the fingerprint information, the sound information, and the iris input by the user.
- Information or face image information then verify fingerprint information, sound information, iris information, or face image information input by the user.
- the first terminal is the mobile phone 100
- the first interface described in S701 is the lock screen interface of the mobile phone 100.
- the first contact (the default emergency contact of the mobile phone 100) is Michael
- the second information is the fingerprint. Information is an example.
- the mobile phone 100 receives the voice call request initiated by Michael, and displays the call alert interface 2001 (ie, the fourth interface) shown in (a) of FIG. 20, when the first information (ie, the voice call request) passes the verification, the mobile phone 100 is turned on.
- the mobile phone 100 uses the function of unlocking fingerprint information. As shown in (b) of FIG. 20, the mobile phone 100 receives the fingerprint information input by the user, and then the mobile phone 100 verifies the fingerprint information input by the user. Finally, if the fingerprint information is verified, the mobile phone 100 ends in response to the voice call (eg, the user hangs up)
- the phone 100 can unlock the mobile phone 100 and display the second interface 2002 shown in (c) of FIG.
- the first terminal may set a “recover password status flag” in the first terminal, in response to the first operation or the second operation of the user in the first interface, to mark that the first terminal is currently located. retrieve the password status. After the S1803 is successfully unlocked, the "Retrieve Password Status Flag" set in the terminal is cleared.
- the first terminal may answer a voice call request and display the fourth interface regardless of whether the first terminal is provided with a “recover password status flag”; however, when the first terminal is set to “find When the password is returned to the password, the first terminal needs to further determine whether the voice call request is a voice call request initiated by the first contact; therefore, after the first terminal answers a voice call request and displays the fourth interface, It can be determined first whether the "recovery password status flag" is set in the terminal.
- the “retrieve password status flag” is not set in the first terminal, even if the first terminal receives the second information input by the user during the process of displaying the fourth interface, And the second information passes the verification, and the first terminal or the first function is not unlocked.
- the first terminal receives and verifies the second information input by the user, in the process that the first terminal displays the fourth interface, on the premise that the first terminal sets the “retrieve password status flag”.
- the first function of the first terminal or the second terminal is unlocked. Thus, even if the user forgets the password, the first terminal can be successfully unlocked.
- the emergency contact in the embodiment of the present application may be preset by the user in the first terminal.
- the first terminal guides the user to set an emergency contact when the user sets a password, such as a lock screen password of the terminal.
- a password such as a lock screen password of the terminal.
- the method in the embodiment of the present application may further include S2101-S2102:
- the first terminal displays an emergency contact setting interface in response to the user setting an unlock password for the first terminal.
- the first terminal may display the emergency contact setting interface in response to the user setting an unlocking password for the first terminal.
- the emergency contact setting interface includes a contact information input box for inputting information of the emergency contact.
- the emergency contact information includes the emergency contact's mobile number or name.
- the mobile phone 100 displays FIG. 21 in response to the user's click operation on the "Add Password” option.
- the emergency contact setting interface 2104 includes a contact information input box 2105 for inputting information of the emergency contact.
- S2102 The first terminal saves information of the emergency contact input by the user in response to the information of the emergency contact input by the user on the emergency contact setting interface.
- the mobile phone 100 can receive the mobile phone number or contact name entered by the user in the input box 2006, and then obtain and save the information of the contact from the address book of the mobile phone 100; or, the mobile phone 100 can add the contact to the contact in response to the user.
- the click operation of the button 2107 displays a contact list in the address book of the mobile phone 100 for the user to select.
- the emergency contact setting interface 2104 may further include an “add emergency contact” option.
- the handset 100 can set up multiple emergency contacts in the handset 100 in response to the user's operation of the "Add Emergency Contact” option.
- the “Settings” application of the first terminal may include an “Emergency Contact” option.
- the "Emergency Contact” option 2201 is included in the setting interface 2201 as shown in (a) of FIG.
- the "Emergency Contact” option 2202 may also be included in the "Password Management Interface” of the first terminal.
- the "password management interface" 2101 in which the mobile phone 100 has not yet set an unlock password may further include an "emergency contact” option; as shown in (b) of FIG. 22, the mobile phone
- the “Emergency Contact” option 2204 may also be included in the "Password Management Interface” 2203 in which the unlock password has been set.
- the first terminal may display the emergency contact setting interface described above in response to a user clicking on the "emergency contact” option.
- the "Password Management Interface” 2101 in which the mobile phone 100 has not yet set an unlock password may further include an "Emergency Contact” option.
- the mobile phone 100 can display the emergency contact setting interface 2104 shown in (d) of FIG. 21 in response to the user's click operation on the "emergency contact” option.
- the first terminal is attempted to use the method provided in this embodiment to unlock the first terminal, and the first terminal responds to the user's click operation on the “emergency contact” option.
- the password input interface may be displayed first; the first terminal displays the emergency contact setting interface after receiving the correct password input by the user on the password input interface.
- the mobile phone 100 responds to the user's click operation on the "emergency contact” option 2202, or as shown in (b) of FIG. 22, the mobile phone 100 responds to the user's "emergency”.
- the click operation of the contact "option 2204" may display the password input interface 2205 shown in (c) of FIG. 22; subsequently, the mobile phone 100 may display the image 22 in response to the user inputting the correct password in the password input interface 2205.
- the emergency contact setting interface 2206 shown in (d).
- the specific content and interface form of the emergency contact setting interface described in this embodiment of the present application includes, but is not limited to, the emergency contact setting interface 2206 shown in (d) of FIG. 22, and the emergency contact setting interface.
- Other interface forms The embodiments of the present application are not described herein again.
- the first terminal may receive and save an emergency contact set by the user. In this way, even if the user forgets to unlock the password, the first terminal may perform the method in the embodiment of the present application, requesting the user to preset the emergency contact in the first terminal to assist the first terminal to unlock.
- the first terminal and the second terminal and the like described above include hardware structures and/or software modules corresponding to each function.
- the embodiments of the present application can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the embodiments of the present application.
- the embodiment of the present application may perform the division of the function module on the terminal according to the foregoing method example.
- each function module may be divided according to each function, or two or more functions may be integrated into one processing module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present application is schematic, and is only a logical function division, and the actual implementation may have another division manner.
- the embodiment of the present application provides a terminal 2300.
- the terminal 2300 includes a display unit 2301, a receiving unit 2302, a verification unit 2303, and an input unit 2304.
- the display unit 2301 is configured to support the terminal 2300 to perform the operations of “displaying the second interface” in S701, S702, S901, S1102, S1501, and S1502 in the foregoing method embodiment, S1602, S1501a, S1701, S1703, S1801, and S1803. , S2101, and/or other processes for the techniques described herein.
- the receiving unit 2302 is configured to support the terminal 2300 to perform the operation of “receiving the first information” in S1101 in the foregoing method embodiment, the operation of “receiving the first communication message” in S1101a, and/or used in the technology described herein. Other processes, S1401.
- the verification unit 2303 is configured to support the terminal 2300 to perform the operations of "verifying the first information” in S101, S1101, and the operation of "validating the first communication message" in S1101a, S1402, S1403, S1405, S1601. The operations of "verifying the second information” in S1702 and S1802, and/or other processes for the techniques described herein.
- the input unit 2304 is configured to support the terminal 2300 to perform the operation of “receiving a new password input by the user” in S1502 in the foregoing method embodiment, and the operation of “receiving the second information input by the user” in S1601, S1702, and S1802, and/ Or other processes for the techniques described herein.
- the terminal 2300 further includes an unlocking unit.
- the unlocking unit is configured to unlock the terminal 2300, so that the terminal 2300 is switched from displaying the first interface to displaying the second interface.
- the unlocking unit is configured to support the terminal 2300 to perform S1404 in the above method embodiment, and/or other processes for the techniques described herein.
- the terminal 2300 further includes a sending unit.
- the sending unit is configured to support the terminal 2300 to perform S704 in the foregoing method embodiments, and/or other processes for the techniques described herein.
- the terminal 2300 further includes a prompting unit.
- the prompting unit is configured to prompt the first prompt information and the second prompt information.
- the prompting unit is configured to support the terminal 2300 to execute S801 in the above method embodiment, and/or other processes for the techniques described herein.
- the terminal 2300 further includes: a storage unit.
- the storage unit is for supporting the terminal 2300 to perform S2102 in the above method embodiments, and/or other processes for the techniques described herein.
- the above-mentioned prompting unit, unlocking unit, verification unit 2303, and input unit 2304 and the like may be integrated into one processing module, and the receiving unit 2302 and the transmitting unit may be an RF circuit of the terminal 2300, a WiFi module, or
- the storage unit may be a storage module of the terminal, and the display unit 2301 may be a display module such as a display (touch screen).
- FIG. 24 is a schematic diagram showing a possible structure of a terminal involved in the above embodiment.
- the terminal 2400 includes a processing module 2401, a storage module 2402, a display module 2403, and a communication module 2404.
- the processing module 2401 is configured to perform control management on the terminal 2400.
- the display module 2403 is configured to display an image generated by the processing module 2401.
- the storage module 2402 is configured to save the program code and data of the terminal 2400.
- the communication module 2404 is for communicating with other devices. For example, the communication module 2404 is used to receive or send a message or an electronic business card to other devices.
- the processing module 2401 may be a processor or a controller, and may be, for example, a CPU, a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), and field programmable. Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
- the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
- the communication module 2404 can be a transceiver, a transceiver circuit, a communication interface, or the like.
- the storage module 2402 can be a memory.
- the processing module 2401 is a processor (such as the processor 201 shown in FIG. 2)
- the communication module 2404 is a radio frequency circuit (such as the radio frequency circuit 202 shown in FIG. 2)
- the storage module 2402 is a memory (such as the memory shown in FIG. 2).
- the display module 2403 is a touch screen (including the touch panel 204-1 and the display panel 204-2 shown in FIG. 2, the device provided by the present application may be the mobile phone 100 shown in FIG. 2.
- the communication module is The 2404 may include not only a radio frequency circuit but also a WiFi module and a Bluetooth module.
- the communication modules such as the radio frequency circuit, the WiFi module, and the Bluetooth module may be collectively referred to as a communication interface, wherein the processor, the communication interface, the touch screen, and the memory may be coupled via a bus. together.
- the embodiment of the present application further provides a control device, including a processor and a memory, where the memory is used to store computer program code, where the computer program code includes computer instructions, when the processor executes the computer instruction,
- a control device including a processor and a memory
- the memory is used to store computer program code
- the computer program code includes computer instructions, when the processor executes the computer instruction
- the embodiment of the present application further provides a computer storage medium, where the computer program code is stored, and when the processor executes the computer program code, the device executes FIG. 7, FIG. 11, FIG. 14, FIG.
- the method steps in any of the figures 16A, 16B, 16C, 18A and 18B implement the method of the above embodiment.
- the embodiment of the present application further provides a computer program product, when the computer program product is run on a computer, causing the computer to execute FIG. 7, FIG. 11, FIG. 14, FIG. 15C, FIG. 16A, FIG. 16B, FIG. 16C, FIG.
- the method in the above embodiments is implemented with the associated method steps in any of the Figures 18B.
- the terminal 2300 and the terminal 2400, the computer storage medium or the computer program product provided by the application are all used to perform the corresponding methods provided above. Therefore, the beneficial effects that can be achieved can be referred to the corresponding ones provided above. The beneficial effects in the method are not described here.
- the disclosed system, apparatus, and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the modules or units is only a logical function division.
- there may be another division manner for example, multiple units or components may be used. Combinations can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, i.e., may be located in one place, or may be distributed over multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) or processor to perform all or part of the steps of the methods described in various embodiments of the present application.
- the foregoing storage medium includes: a flash memory, a mobile hard disk, a read only memory, a random access memory, a magnetic disk, or an optical disk, and the like, which can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
La présente invention concerne, selon des modes de réalisation, le domaine technique des communications et propose un procédé de déverrouillage par un contact d'urgence et une entrée utilisateur, et un terminal. Même si un utilisateur oublie le mot de passe, un terminal peut être déverrouillé avec succès tout en garantissant la sécurité des informations dans le terminal. La solution spécifique comprend : lorsqu'un terminal affiche une interface qui nécessite l'entrée d'un mot de passe, si le terminal reçoit des informations qui sont envoyées à partir d'autres terminaux et peuvent réussir la vérification (les informations envoyées à partir du terminal d'un contact d'urgence peuvent réussir la vérification), et le terminal reçoit également d'autres informations qui sont entrées par l'utilisateur et peuvent réussir la vérification, le terminal peut afficher, après que le mot de passe est entré dans ladite interface, une interface de déverrouillage même si un utilisateur oublie le mot de passe, c'est-à-dire, le terminal peut être déverrouillé avec succès si l'utilisateur oublie le mot de passe.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2018/074184 WO2019144357A1 (fr) | 2018-01-25 | 2018-01-25 | Procédé de déverrouillage par contact d'urgence et entrée utilisateur, et terminal |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2018/074184 WO2019144357A1 (fr) | 2018-01-25 | 2018-01-25 | Procédé de déverrouillage par contact d'urgence et entrée utilisateur, et terminal |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019144357A1 true WO2019144357A1 (fr) | 2019-08-01 |
Family
ID=67394524
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/074184 Ceased WO2019144357A1 (fr) | 2018-01-25 | 2018-01-25 | Procédé de déverrouillage par contact d'urgence et entrée utilisateur, et terminal |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2019144357A1 (fr) |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011080613A1 (fr) * | 2009-12-28 | 2011-07-07 | Nokia Corporation | Procédé et appareil pour l'interaction avec un utilisateur tandis que le dispositif est verrouillé |
| CN102930188A (zh) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | 屏幕解锁的方法、装置及终端 |
| CN105227749A (zh) * | 2014-06-20 | 2016-01-06 | 鸿富锦精密工业(深圳)有限公司 | 屏幕解锁方法及系统 |
| CN105844125A (zh) * | 2015-07-08 | 2016-08-10 | 广东维沃软件技术有限公司 | 一种终端解锁的方法和装置 |
| CN106548052A (zh) * | 2016-11-22 | 2017-03-29 | 上海斐讯数据通信技术有限公司 | 一种移动终端解锁方法和系统 |
| CN107318055A (zh) * | 2017-08-16 | 2017-11-03 | 广东小天才科技有限公司 | 一种移动终端的屏幕解锁方法及装置 |
| CN107370602A (zh) * | 2016-05-13 | 2017-11-21 | 中兴通讯股份有限公司 | 一种用户终端的解密方法及系统 |
-
2018
- 2018-01-25 WO PCT/CN2018/074184 patent/WO2019144357A1/fr not_active Ceased
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011080613A1 (fr) * | 2009-12-28 | 2011-07-07 | Nokia Corporation | Procédé et appareil pour l'interaction avec un utilisateur tandis que le dispositif est verrouillé |
| CN102930188A (zh) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | 屏幕解锁的方法、装置及终端 |
| CN105227749A (zh) * | 2014-06-20 | 2016-01-06 | 鸿富锦精密工业(深圳)有限公司 | 屏幕解锁方法及系统 |
| CN105844125A (zh) * | 2015-07-08 | 2016-08-10 | 广东维沃软件技术有限公司 | 一种终端解锁的方法和装置 |
| CN107370602A (zh) * | 2016-05-13 | 2017-11-21 | 中兴通讯股份有限公司 | 一种用户终端的解密方法及系统 |
| CN106548052A (zh) * | 2016-11-22 | 2017-03-29 | 上海斐讯数据通信技术有限公司 | 一种移动终端解锁方法和系统 |
| CN107318055A (zh) * | 2017-08-16 | 2017-11-03 | 广东小天才科技有限公司 | 一种移动终端的屏幕解锁方法及装置 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6997343B2 (ja) | アプリケーションまたはアプリケーション機能を迅速に開くための方法、および端末 | |
| US11886695B2 (en) | Notification processing method and electronic device | |
| KR102249413B1 (ko) | 이미지 공유 방법 및 전자 디바이스 | |
| US11109191B2 (en) | Method for displaying current geographical location on emergency call screen and terminal | |
| CN108702414B (zh) | 一种屏幕锁定方法、装置及计算机可读存储介质 | |
| CN109155750B (zh) | 一种通信方法及设备 | |
| JP2015534405A (ja) | 端末のロック解除処理方法、装置、端末装置、プログラム、及び記録媒体 | |
| WO2018032661A1 (fr) | Procédé d'affichage d'informations pour un dispositif terminal et dispositif terminal | |
| WO2019227488A1 (fr) | Procédé de visualisation de contenu d'informations, et terminal | |
| US9892249B2 (en) | Methods and devices for authorizing operation | |
| CN113157368B (zh) | 一种屏幕锁定方法及装置 | |
| EP3699789A1 (fr) | Procédé et dispositif de vérification de sécurité et terminal mobile | |
| CN111656347B (zh) | 一种项目的显示方法及终端 | |
| US20190180257A1 (en) | Mobile terminal and method for controlling same | |
| EP3531675A1 (fr) | Procédé et dispositif d'échange d'informations | |
| WO2018049893A1 (fr) | Procédé de transmission de données, et dispositif terminal | |
| CN108537058A (zh) | 终端的多角色使用方法和装置、计算机可读存储介质、终端 | |
| US20220215680A1 (en) | Note information display method, note information sending method, and electronic device | |
| WO2017193645A1 (fr) | Procédé et appareil destinés à afficher des données, et terminal | |
| WO2019090702A1 (fr) | Procédé et dispositif de protection de sécurité de terminal | |
| US10372895B2 (en) | Apparatus and method for providing a security environment | |
| CN111656346B (zh) | 一种显示方法及终端 | |
| WO2019144357A1 (fr) | Procédé de déverrouillage par contact d'urgence et entrée utilisateur, et terminal | |
| CN111475067A (zh) | 消息指示方法及电子设备 | |
| CN107888761A (zh) | 用户名修改方法、装置、移动终端和可读存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18902805 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18902805 Country of ref document: EP Kind code of ref document: A1 |