WO2021078160A1 - Lock screen unlocking method and mobile terminal - Google Patents
Lock screen unlocking method and mobile terminal Download PDFInfo
- Publication number
- WO2021078160A1 WO2021078160A1 PCT/CN2020/122522 CN2020122522W WO2021078160A1 WO 2021078160 A1 WO2021078160 A1 WO 2021078160A1 CN 2020122522 W CN2020122522 W CN 2020122522W WO 2021078160 A1 WO2021078160 A1 WO 2021078160A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- lock screen
- mobile terminal
- unlocking
- lock
- screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
Definitions
- the embodiments of the present application relate to the field of electronic technology, and in particular, to a method for locking and unlocking a screen and a mobile terminal.
- the system lock screen is the lock screen of the mobile phone system itself, including secure lock screens (the screen can be locked and unlocked with patterns, numbers, gestures, and mixed passwords) and non-secure locks.
- Screen (such as magazine lock screen);
- third-party lock screen is a lock screen provided by a third-party application installed on the mobile phone (such as music lock screen, sports lock screen, dictionary lock screen, etc.), which is generally overlaid on the system lock screen.
- Users can set different lock screen methods and combinations according to their own needs. For example, users can set secure lock screen, non-secure lock screen, third-party lock screen at the same time, can also set secure lock screen and third-party lock screen, or set non-secure lock screen. Security lock screen and third-party lock screen, you can also set up only third-party lock screen.
- the current third-party lock screen can be overlaid on the system lock screen. For example, after opening a music application (app), lock the screen. After turning on the screen, you may find the lock screen of the music application and unlock the music application’s lock screen. After the screen is locked, the system lock screen can be unlocked further (if the system lock screen is set), the operation is more troublesome. At the same time, different third-party applications currently provide different third-party lock screens, and the unlocking methods are different. If there are multiple third-party lock screens, it will be very cumbersome to unlock.
- the embodiments of the present application provide a method for unlocking a lock screen and a mobile terminal, which can avoid cumbersome unlocking operations, improve unlocking efficiency, and improve user experience.
- an embodiment of the present application provides a method for unlocking a lock screen, including: a mobile terminal receives a first unlocking instruction to unlock a first lock screen, and the mobile terminal is provided with a first lock screen and a second lock screen provided by a first application.
- the second lock screen provided by the application; the mobile terminal unlocks the first lock screen and the second lock screen.
- the mobile terminal is provided with a first lock screen provided by the first application and a second lock screen provided by the second application, specifically: the mobile terminal creates a lock screen window stack; the mobile terminal recognizes whether there is a lock Screen; the mobile terminal adds the identified first lock screen and second lock screen to the lock screen window stack.
- the lock screen window stack is created by the mobile terminal through the WMS (Window Manager Service) service; the mobile terminal recognizes whether there is a lock screen, specifically: WMS service recognizes whether the window attribute of the application carries WindowManager. The flag of LayoutParams.FLAG_SHOW_WHEN_LOCKED.
- the unlocking manners of the first lock screen and the second lock screen are the same.
- the unlocking manners of the first lock screen and the second lock screen are different.
- the first lock screen is overlaid on the second lock screen.
- the second lock screen is overlaid on the first lock screen.
- the mobile terminal unlocks the first lock screen and the second lock screen, specifically: the mobile terminal removes the first lock screen and the second lock screen from the lock screen window stack through the WMS service.
- the method further includes: the mobile terminal enters the first application or displays the system desktop of the mobile terminal.
- the method further includes: the mobile terminal determines whether the first unlocking instruction comes from an authorized user.
- the mobile terminal collects the user's physiological characteristics and compares it with the pre-stored authorized user's physiological characteristics. If the verification is successful, it is determined that the authorized user issued it.
- the first unlocking instruction it is determined whether the first unlocking command comes from an authorized user, specifically: the mobile terminal collects the user's physiological characteristics and compares it with the pre-stored authorized user's physiological characteristics. If the verification is successful, it is determined that the authorized user issued it. The first unlocking instruction.
- judging whether the first unlocking instruction comes from an authorized user specifically: the mobile terminal detects the time and place when the first unlocking instruction is received, and compares it with the authorized user’s usage habits, and if it matches, then judge Is the first unlocking instruction issued by an authorized user.
- the method before the mobile terminal unlocks the first lock screen and the second lock screen, the method further includes: the mobile terminal detects one of the lock time of the first lock screen and the reception time of the first unlock instruction. Determine whether the time interval is within the preset time interval. .
- an embodiment of the present application provides a mobile terminal provided with a first lock screen provided by a first application and a second lock screen provided by a second application.
- the mobile terminal includes a receiving module and an unlocking module, wherein ,
- the receiving module is used for receiving a first unlocking instruction for unlocking the first lock screen, and the unlocking module is used for unlocking the first lock screen and the second lock screen.
- the unlocking manners of the first lock screen and the second lock screen are the same.
- the unlocking manners of the first lock screen and the second lock screen are different.
- the first lock screen is overlaid on the second lock screen.
- the second lock screen is overlaid on the first lock screen.
- the mobile terminal further includes a processing module configured to enter the first application or display the system desktop of the mobile terminal.
- the mobile terminal further includes a judgment module configured to judge whether the first unlocking instruction comes from an authorized user before the unlocking module unlocks the first lock screen and the second lock screen.
- the judgment module collects the user's physiological characteristics and compares it with the pre-stored authorized user's physiological characteristics. If the verification is successful, it is determined that the authorized user issued it. The first unlock instruction.
- judging whether the first unlocking instruction comes from an authorized user specifically: the judging module detects the time and place when the first unlocking instruction is received, comparing it with the authorized user’s usage habits, and if it matches, then judging It is the first unlocking instruction issued by an authorized user.
- the mobile terminal further includes a judgment module configured to: before the unlocking module unlocks the first lock screen and the second lock screen, detect the lock time of the first lock screen and receive the first lock screen. The time interval between the receiving time of the unlock command, and it is judged whether the time interval is within the preset time interval.
- embodiments of the present application provide a mobile terminal, which includes one or more processors, memory, and one or more programs; wherein, one or more programs are stored in the memory and configured to be One or more processors are executed, and one or more programs include instructions for executing the method according to the first aspect.
- an embodiment of the present application provides a storage medium for storing computer software instructions, and the computer software instructions are used to execute the method described in the first aspect.
- the embodiments of the present application provide a computer program product, which when the computer program product is run, causes the computer to execute the method described in the first aspect.
- FIG. 1A is a schematic diagram of a third-party lock screen provided by an embodiment of this application.
- FIG. 1B is a schematic diagram of another third-party lock screen provided by an embodiment of this application.
- FIG. 1C is a schematic diagram of another third-party lock screen provided by an embodiment of this application.
- FIG. 2 is a schematic structural diagram of a mobile terminal provided by an embodiment of this application.
- FIG. 3 is a schematic structural diagram of a mobile terminal operating system provided by an embodiment of this application.
- FIG. 4 is a flowchart of a method for locking and unlocking a screen provided by an embodiment of the application
- FIG. 5 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application
- FIG. 6 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application.
- FIG. 7 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application.
- FIG. 8 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application.
- FIG. 9 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application.
- FIG. 10 is a schematic diagram of a mobile terminal provided by an embodiment of this application.
- the mobile terminal described in this application may include mobile phones, tablet computers, wearable devices (for example, watches, bracelets, smart helmets, etc.), vehicle-mounted devices, smart home devices, augmented reality (AR)/virtual reality ( virtual reality (VR) equipment, notebook computers, ultra-mobile personal computers (UMPC), netbooks, personal digital assistants (personal digital assistants, PDAs), etc.
- AR augmented reality
- VR virtual reality
- UMPC ultra-mobile personal computers
- PDAs personal digital assistants
- Some embodiments of the present application take a mobile phone as an example, and it should be understood that these embodiments can also be applied to other types of mobile terminals.
- the application program (application, app) involved in this application may be referred to as an application, which is a software program that can realize one or more specific functions.
- an application which is a software program that can realize one or more specific functions.
- multiple applications can be installed in a mobile terminal, for example, sports applications, music applications, dictionary applications, and so on.
- the application may be an application that has been installed when the mobile terminal is shipped from the factory, or an application that the user downloads from the network or obtains from other electronic devices in the process of using the mobile terminal.
- Third-party applications usually refer to applications developed by non-mobile terminal manufacturers. For example, for Huawei For mobile phones, third-party applications can be applications developed by developers other than Huawei.
- the mobile terminal can be set with a lock screen, and the functions of the mobile terminal can be used normally after unlocking the set lock screen. Otherwise, it cannot be used or only a part of the functions can be used.
- a lock screen is set, when the phone screen is turned on, an unlock interface will be provided, and the user needs to enter a password to unlock before entering the user interface for normal operations.
- the mobile terminal can be set with a variety of lock screen methods, which can generally be divided into system lock screen and third-party lock screen.
- the system lock screen is the lock screen provided by the mobile terminal system itself
- the third-party lock screen is a third-party application installed on the mobile terminal. Provide the lock screen.
- the system lock screen can include security lock screen and non-secure lock screen.
- the so-called security lock screen can be pattern lock screen, digital lock screen, gesture lock screen, fingerprint lock screen, face lock screen, voiceprint unlock or hybrid Password lock screen (such as a combination of numbers and letters), has the ability to verify user identity, usually only users who know the password (authorized users) can unlock; non-secure lock screen, generally set for non-secure reasons such as beauty , Does not have the ability to verify user identity, and unauthorized users can also unlock it.
- the magazine lock screen is a common non-secure lock screen, which presents a wallpaper like a magazine cover on the phone screen. Every user, including authorized users and unauthorized users, can unlock the non-secure lock screen according to the unlock prompt.
- the unlocking method is generally relatively simple, such as tapping the screen, sliding the finger (which can be sliding left, sliding right, sliding up, sliding down, sliding diagonally, etc.).
- Users can set different lock screen methods and combinations according to their own needs. For example, users can set secure lock screen, non-secure lock screen, third-party lock screen at the same time, can also set secure lock screen and third-party lock screen, or set non-secure lock screen. Security lock screen and third-party lock screen, you can also set up only third-party lock screen.
- the third-party lock screen is generally overlaid on the system lock screen, that is, the system lock screen can only be unlocked after the third-party lock screen is unlocked.
- the unlocking method of the third-party application lock screen is relatively simple, such as tapping the screen, sliding your finger (which can be left, right, up, down, diagonally, etc.) to unlock.
- authorized users and non-users Authorized users can unlock the screen; it is understandable that the lock screen of some third-party applications requires a password. Only authorized users can unlock the screen.
- the unlocking method can be similar to the system security lock screen, such as unlocking with a pattern or password. Therefore, this application does not limit the unlocking method of the third-party lock screen.
- Third-party applications such as music applications, sports applications, dictionary applications, etc.
- the third-party lock screen provided by the music application shown in Figure 1A can display the music being played or previously played, including the music name, lyrics, music album cover, etc., and can also provide some function buttons, such as pause, play, and upload. One song, next song, volume, playback mode, favorite buttons, playback progress bar, etc., so as to facilitate user operations.
- the third-party lock screen provided by the sports application shown in Figure 1B can provide sports-related information, such as exercise duration, exercise distance, exercise type (running, car, swimming, etc.), heart rate, calories consumed by exercise, etc.
- buttons can also be provided, such as pause exercise, stop exercise, switch exercise type, etc.
- the third-party lock screen provided by the dictionary application shown in FIG. 1C can provide a word query input box, or sequentially play words, phonetic symbols, or paraphrases in the user's favorite word book.
- third-party lock screens have different unlocking methods. For example, some are swiping up to unlock, and some are enjoying swiping to unlock, which is cumbersome to operate and affects user experience.
- the mobile terminal in the embodiment of the present application may be a mobile phone 100.
- the embodiment is described in detail below by taking the mobile phone 100 as an example. It should be understood that the illustrated mobile phone 100 is only an example of a mobile terminal, and the mobile phone 100 may have more or fewer components than those shown in the figure, two or more components may be combined, or There are different component configurations.
- the mobile phone 100 may specifically include: a processor 101, a radio frequency (RF) circuit 102, a memory 103, a touch screen 104, a Bluetooth device 105, one or more sensors 106, a Wi-Fi device 107, a positioning device 108, Audio circuit 109, peripheral interface 110, power supply system 111 and other components. These components can communicate through one or more communication buses or signal lines (not shown in Figure 2).
- RF radio frequency
- the hardware structure shown in FIG. 2 does not constitute a limitation on the mobile phone, and the mobile phone 100 may include more or less components than those shown in the figure, or a combination of some components, or different component arrangements.
- the processor 101 is the control center of the mobile phone 100. It uses various interfaces and lines to connect to various parts of the mobile phone 100, and executes the operation of the mobile phone 100 by running or executing application programs stored in the memory 103 and calling data stored in the memory 103. Various functions and processing data.
- the processor 101 may include one or more processing units; for example, the processor 101 may be a Kirin 960 chip manufactured by Huawei Technologies Co., Ltd.
- the aforementioned processor 101 may further include a fingerprint verification chip for verifying the collected fingerprint.
- the radio frequency circuit 102 can be used to receive and send wireless signals during the process of sending and receiving information or talking.
- the radio frequency circuit 102 may receive the downlink data of the base station and send it to the processor 101 for processing; in addition, it may send the uplink data to the base station.
- the radio frequency circuit includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
- the radio frequency circuit 102 can also communicate with other devices through wireless communication.
- the wireless communication can use any communication standard or protocol, including but not limited to Global System for Mobile Communications, General Packet Radio Service, Code Division Multiple Access, Wideband Code Division Multiple Access, Long Term Evolution, Email, Short Message Service, etc.
- the memory 103 is used to store application programs and data, and the processor 101 executes various functions and data processing of the mobile phone 100 by running the application programs and data stored in the memory 103.
- the memory 103 mainly includes a storage program area and a storage data area.
- the storage program area can store the operating system and at least one application program required by at least one function (such as sound playback function, image playback function, etc.); the storage data area can store Data created at 100 o'clock (such as audio data, phone book, etc.).
- the memory 103 may include a high-speed random access memory, and may also include a non-volatile memory, such as a magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
- the memory 103 can store various operating systems, such as those developed by Apple Operating system, developed by Google Operating system, etc.
- the foregoing memory 103 may be independent and connected to the processor 101 through the foregoing communication bus; the memory 103 may also be integrated with the processor 101.
- the touch screen 104 may include a touch pad 104-1 and a display 104-2.
- the touchpad 104-1 can collect touch events on or near the user of the mobile phone 100 (for example, the user uses a finger, a stylus, or any other suitable object on the touchpad 104-1 or on the touchpad 104 -1), and send the collected touch information to other devices such as the processor 101.
- the user's touch event near the touchpad 104-1 can be called floating touch; floating touch can mean that the user does not need to directly touch the touchpad in order to select, move, or drag a target (such as an icon, etc.) , And only the user is located near the electronic device in order to perform the desired function.
- the touch panel 104-1 capable of hovering touch can be realized by capacitive, infrared light sensing, ultrasonic waves, and the like. In addition, multiple types such as resistive, capacitive, infrared, and surface acoustic wave can be used to implement the touch panel 104-1.
- the display also referred to as a display screen
- the display 104-2 can be used to display information input by the user or information provided to the user and various menus of the mobile phone 100.
- the display 104-2 can be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
- the touchpad 104-1 can cover the display 104-2. When the touchpad 104-1 detects a touch event on or near it, it transmits it to the processor 101 to determine the type of the touch event, and then the processor 101 can provide corresponding visual output on the display 104-2 according to the type of the touch event.
- the touchpad 104-1 and the display 104-2 are used as two independent components to realize the input and output functions of the mobile phone 100, but in some embodiments, the touchpad 104- 1 is integrated with the display screen 104-2 to realize the input and output functions of the mobile phone 100. It is understandable that the touch screen 104 is formed by stacking multiple layers of materials.
- the touchpad 104-1 may cover the display 104-2, and the size of the touchpad 104-1 is larger than the size of the display 104-2, so that the display 104- 2 It is completely covered under the touchpad 104-1, or the above-mentioned touchpad 104-1 can be configured on the front of the mobile phone 100 in the form of a full panel, that is, the user's touch on the front of the mobile phone 100 can be sensed by the mobile phone. You can achieve a full touch experience on the front of the phone.
- the touchpad 104-1 is configured on the front of the mobile phone 100 in the form of a full panel
- the display 104-2 can also be configured on the front of the mobile phone 100 in the form of a full panel, so that it is on the front of the mobile phone.
- a frameless structure can be realized.
- the mobile phone 100 may also have a fingerprint recognition function.
- the fingerprint collection device 112 can be configured in the touch screen 104 to realize the fingerprint recognition function, that is, the fingerprint collection device 112 can be integrated with the touch screen 104 to realize the fingerprint recognition function of the mobile phone 100.
- the fingerprint collection device 112 is configured in the touch screen 104, may be a part of the touch screen 104, or may be configured in the touch screen 104 in other ways.
- the fingerprint collection device 112 can also be implemented as a full-scale fingerprint collection device. Therefore, the touch screen 104 can be regarded as a panel that can perform fingerprint recognition at any position.
- the fingerprint collection device 112 can send the collected fingerprint to the processor 101, so that the processor 101 can process the fingerprint (for example, fingerprint verification, etc.).
- the main component of the fingerprint acquisition device 112 in the embodiment of the present application is a fingerprint sensor.
- the fingerprint sensor can use any type of sensing technology, including but not limited to optical, capacitive, piezoelectric or ultrasonic sensing technology.
- the mobile phone 100 may also include a Bluetooth device 105, which is used to implement data exchange between the mobile phone 100 and other short-distance electronic devices (such as mobile phones, smart watches, etc.).
- the Bluetooth device in the embodiment of the present application may be an integrated circuit or a Bluetooth chip or the like.
- the mobile phone 100 may also include at least one sensor 106, such as a light sensor, a motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, where the ambient light sensor can adjust the brightness of the display of the touch screen 104 according to the brightness of the ambient light, and the proximity sensor can turn off the power of the display when the mobile phone 100 is moved to the ear .
- the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when it is stationary.
- mobile phone posture applications such as horizontal and vertical screen switching, related Games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, percussion), etc.; as for the gyroscope, barometer, hygrometer, thermometer, infrared sensor and other sensors that can be configured in the mobile phone 100, here is not Go into details again.
- the Wi-Fi device 107 is used to provide the mobile phone 100 with network access in compliance with Wi-Fi related standard protocols.
- the mobile phone 100 can connect to the Wi-Fi access point through the Wi-Fi device 107 to help users send and receive emails, Browsing web pages and accessing streaming media, etc., it provides users with wireless broadband Internet access.
- the Wi-Fi device 107 can also serve as a Wi-Fi wireless access point, and can provide Wi-Fi network access for other electronic devices.
- the positioning device 108 is used to provide a geographic location for the mobile phone 100. It is understandable that the positioning device 108 may specifically be a receiver of a positioning system such as a Global Positioning System (GPS), Beidou satellite navigation system, or Russian GLONASS. After receiving the geographic location sent by the above-mentioned positioning system, the positioning device 108 sends the information to the processor 101 for processing, or sends the information to the memory 103 for storage. In some other embodiments, the positioning device 108 may also be a receiver of an assisted global satellite positioning system (AGPS). The AGPS system assists the positioning device 108 to complete ranging and positioning services by acting as an auxiliary server.
- AGPS assisted global satellite positioning system
- the auxiliary positioning server communicates with the positioning device 108 (ie GPS receiver) of the mobile phone 100 via a wireless communication network to provide positioning assistance.
- the positioning device 108 may also be a Wi-Fi access point-based positioning technology. Since every Wi-Fi access point has a globally unique MAC address, electronic devices can scan and collect the broadcast signals of surrounding Wi-Fi access points when Wi-Fi is turned on, so they can obtain Wi-Fi.
- the electronic device sends the data (such as MAC address) that can identify the Wi-Fi access point to the location server through the wireless communication network, and the location server retrieves each Wi-Fi access
- the geographic location of the entry point is combined with the strength of the Wi-Fi broadcast signal to calculate the geographic location of the electronic device and send it to the positioning device 108 of the electronic device.
- the audio circuit 109, the speaker 113, and the microphone 114 can provide an audio interface between the user and the mobile phone 100.
- the audio circuit 109 can transmit the electric signal after the conversion of the received audio data to the speaker 113, which is converted into a sound signal by the speaker 113 for output; on the other hand, the microphone 114 converts the collected sound signal into an electric signal, and the audio circuit 109 After being received, the audio data is converted into audio data, and then the audio data is output to the RF circuit 102 for transmission to, for example, another mobile phone, or the audio data is output to the memory 103 for further processing.
- the peripheral interface 110 is used to provide various interfaces for external input/output devices (such as a keyboard, a mouse, an external display, an external memory, a user identification module card, etc.). For example, it is connected to a mouse through a universal serial bus (USB) interface, and is connected to a subscriber identity module card (SIM) card provided by a telecommunication operator through a metal contact on a subscriber identity module card slot.
- SIM subscriber identity module card
- the peripheral interface 110 can be used to couple the aforementioned external input/output peripheral devices to the processor 101 and the memory 103.
- the mobile phone 100 can also include a power supply device 111 (such as a battery and a power management chip) for supplying power to various components.
- a power supply device 111 such as a battery and a power management chip
- the battery can be logically connected to the processor 101 through the power management chip, so that the power supply device 111 can manage charging, discharging, and power consumption management. And other functions.
- the mobile phone 100 may also include a camera (front camera and/or rear camera), a flash, a miniature projection device, a near field communication (NFC) device, etc., which will not be repeated here.
- a camera front camera and/or rear camera
- a flash a miniature projection device
- NFC near field communication
- Figure 3 is a run Schematic diagram of mobile phone operating system structure of operating system.
- the Android operating system architecture is divided into four layers, from high-level to bottom-level divided into application layer, application framework layer, function library layer and Linux kernel layer.
- the application layer is the top layer of the Android operating system architecture, including the core application software assembled by the Android operating system, such as email clients, text messages, calls, calendars, maps, browsers, contacts, etc.
- application software assembled by the Android operating system
- developers can write application software and install it to this layer.
- application programs are developed in Java language, which is completed by calling API (Application Programming Interface) provided by the application framework layer.
- the application framework layer (Application Framework) mainly provides developers with access to various APIs used by the application. Developers use the application framework layer to communicate with the underlying Android (such as the function library layer, the Linux kernel layer, etc.) Interactive and develop your own applications.
- the application framework layer is mainly a series of services and management systems of the Android operating system.
- the application framework layer mainly includes the following key services:
- Activity Manager (Activity Manager) is used to manage the application life cycle and provide common navigation rollback functions
- Content Providers are used to manage data sharing and access between different applications
- the Notification Manager is used to control the application to display prompt information (such as Alerts, Notifications, etc.) to the user in the status bar;
- Resource Manager Provides non-code resources (such as strings, graphics, and layout files, etc.) for use by application programs;
- Package Manager (Package Manager) is mainly used to manage the applications of the Android operating system
- View with a rich and extensible collection of views, can be used to build an application, which specifically includes a list (List), a grid (Grid), a text box (TextBox), a button (Button), and embeddable Web browser;
- the location manager (Location Manager) mainly allows applications to access the current geographic location of the mobile phone.
- the library layer (Libraries) is the support of the application framework and an important link between the application framework layer and the Linux kernel layer.
- the function library layer includes some function libraries compiled by the computer program C language or C++ language, these function libraries can be used by different components in the Android operating system, and they provide services for developers through the Android application framework.
- the function library includes the libc function library, which is specially customized for embedded Linux-based devices; the function library also includes the Android operating system multimedia library (Media Framework), which supports the playback and playback of audio/video in multiple encoding formats. Recording, while supporting still image files, as well as common audio/video encoding formats.
- the function library also includes the interface management library (Surface Manager), which is mainly responsible for managing access to the display system. It is specifically used to manage the interaction between display and access operations when multiple applications are executed. It is also responsible for 2D drawing and 3D. The drawing is displayed and synthesized.
- the function library layer also includes other function libraries for implementing various functions of Android operating system phones, such as: SGL (Scalable Graphics Library): 2D graphics and image processing engine based on XML (Extensible Markup Language) files; SSL (Secure Sockets Layer) ): Located between the TVP/IP protocol (TransmissionControlProtocol/InternetProtocol, Transmission Control Protocol/Internet Protocol) and various application layer protocols, providing support for data communication; OpenGL/ES: 3D effect support; SQLite: relational database engine ; Webkit: Web browser engine; FreeType: Bitmap and Vector font support; etc.
- SGL Scalable Graphics Library
- XML Extensible Markup Language
- SSL Secure Sockets Layer
- TVP/IP protocol TransmissionControlProtocol/InternetProtocol, Transmission Control Protocol/Internet Protocol
- OpenGL/ES 3D effect support
- SQLite relational database engine
- Webkit Web browser engine
- FreeType Bitmap and Vector font support
- Android Runtime is a running environment on the Android operating system, and a new virtual machine used by the Android operating system.
- AOT Address-Of-Time
- Android Runtime using AOT (Ahead-Of-Time) technology, when an application is installed for the first time, the bytecode of the application will be pre-compiled into machine code, making the program a real local application. After running it again, the compilation step is omitted, and the startup and execution will become faster.
- Android Runtime can also be replaced by Core Libraries and Dalvik Virtual Machine.
- the core function library provides most of the functions in the Java language API (Application Programming Interface), and provides an interface to the application framework layer to call the underlying library through the JNI (Java Native Interface) method. It also contains some core APIs of Android, such as android.os, android.net, android.media and so on.
- the Dalvik virtual machine uses a JIT (Just-in-Time) runtime compilation mechanism. Every time a process is started, the virtual machine needs to recompile the bytecode in the background, which will have a certain impact on the startup speed. Every Android application runs in an instance in a Dalvik virtual machine, and each Dalvik virtual machine instance is an independent process space.
- the Dalvik virtual machine is designed to efficiently run multiple virtual machines on one device.
- the executable file format of the Dalvik virtual machine is .dex.
- the dex format is a compression format designed for Dalvik, suitable for systems with limited memory and processor speed. What needs to be mentioned is that the Dalvik virtual machine relies on the Linux kernel to provide basic functions (threads, low-level memory management). It is understandable that Android Runtime and Dalvik belong to different types of virtual machines, and those skilled in the art can choose different forms of virtual machines in different situations.
- Android's core system services are all based on the Linux kernel.
- the Linux kernel also serves as an abstraction layer between the hardware and software stacks. This layer has many drivers related to mobile devices.
- the main drivers are: Display Driver: Linux-based Frame Buffer driver.
- Keyboard Driver Keyboard Driver (KeyBoard Driver): As the keyboard driver of the input device.
- Flash driver Flash Memory Driver
- MTD memory technology device
- Camera Driver A commonly used Linux-based v4l2 (Video for Linux) driver.
- Audio Driver A commonly used advanced Linux sound system driver based on ALSA (Advanced Linux Sound Architecture).
- Bluetooth Driver Wireless transmission technology based on IEEE 802.15.1 standard.
- WiFi Drive A driver based on the IEEE 802.11 standard.
- Binder (IPC) driver A special driver for Android that has a separate device node and provides the function of inter-process communication. Power Management: For example, battery power, etc.
- the WMS (Window Manager Service) service located in the application framework layer can be used to manage all windows, including the creation, deletion, and modification of windows, as well as the size, level, and focus position of the windows.
- the application adds and deletes windows in the Activity.
- the specific implementation is to call the addView() and removeView() functions of the WindowManager class, then call the related methods of the ViewRoot class, and then use the IPC to call the related methods in the WMS to complete the addition, Deletion process.
- WindowManager.LayoutParams is a nested class of WindowManager interface; it inherits from ViewGroup.LayoutParams; it is used to describe Window management strategy to WindowManager.
- the attribute parameters (layoutParams) of the window may include type (window type) and flag (processing parameters for the window).
- the type (type) of the window can be divided into Application Window, System Window, Sub Window. When a process applies for a Window from WMS, it needs to tell the system the type of window. For Window display, the higher the level, the more front the display.
- FLAG_KEEP_SCREEN_ON the screen is always on
- FLAG_SHOW_WHEN_LOCKED when the screen is locked, the page is displayed
- FLAG_DISMISS_KEYGUARD unlocks without a password
- FLAG_TURN_SCREEN_ON lights the screen
- FLAG_FULLSCREEN full screen, no status bar
- the window cannot be screenshotted
- FLAG_SCALED adjust the window as required by the user
- FLAG_DIM_BEHIND everything behind the window will be darkened; etc.
- this application can use the following methods to manage the lock screen window:
- WMS recognizes whether the window properties of the application carry the following flag: WindowManager.LayoutParams.FLAG_SHOW_WHEN_LOCKED. If there is this flag, it means that the window interface is a lock screen interface. This flag enables the window to be displayed on the lock screen when the screen is locked. It can be used with flags such as FLAG_KEEP_SCREEN_ON (keep the screen always on) and FLAG_DISMISS_KEYGUARD (unlock the screen).
- the window provided by the system or application is a lock screen window
- the system lock screen window can also be added to the lock screen window stack and managed together with the third-party lock screen. It is understandable that the lock screen managed in the lock screen window stack can still distinguish the system lock screen and the third-party lock screen.
- the lock screen window stack may only have the system lock screen, or only the third-party lock screen, or both the system lock screen and the third-party lock screen.
- the system After receiving the unlocking instruction, the system manages the multiple lock screen windows managed in the lock screen window stack, for example, unlocks according to a preset rule. If you want to unlock a certain lock screen, WMS can remove the corresponding lock screen window interface from the lock screen window stack.
- Figure 4 provides a method for unlocking the lock screen. The method includes the following steps:
- the mobile terminal receives a first unlocking instruction for unlocking the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application and a second lock screen provided by a second application.
- the first application and the second application are installed on the mobile terminal.
- the two applications may both be third-party applications, or both may be system applications, or one may be a third-party application and the other may be a system application. These two applications can be built in the mobile terminal when it leaves the factory, or can be installed by the user during use.
- the first application may provide the first lock screen.
- the music application provides a music lock screen interface as shown in FIG. 1A. When the screen of the mobile terminal is lit by the user, the music lock screen interface needs to be unlocked.
- the music lock screen interface may display an unlocking prompt, for example, slide the finger to the right to unlock; at this time, when the user's finger slides to the right on the screen, the music lock screen interface can be unlocked.
- the specific principle of unlocking depends on the settings of the operating system. For example, for a mobile phone with an Android system, the unlocking principle is as described above, which can be that WMS removes the music lock screen window interface from the lock screen window stack.
- the unlocking method of unlocking the first lock screen depends on the setting of the first application.
- the first application sets the unlocking instruction of the first lock screen to be unlocked by sliding the finger to the right.
- the user can also customize the unlocking method of the first lock screen.
- the user can change the default unlocking method of the first application, for example, set it to be unlocked by tapping with a finger.
- the unlocking method can include tapping the screen, swiping your fingers (which can be left, right, up, down, diagonally, etc.), and can also include using patterns, numbers, gestures, fingerprints, faces, Voiceprint or mixed password to unlock, you can also use physical or virtual keys and their combination to unlock, etc., there is no restriction here.
- the unlocking methods of the first lock screen and the second lock screen may be the same or different.
- the second application is a sports application
- the second lock screen provided is as shown in FIG. 1B
- the unlocking method is to slide the finger upwards.
- WMS can add the first lock screen and the second lock screen to the lock screen window stack one by one.
- the order of joining the lock screen window stack can be arranged according to the order of application startup or the order of the last operation.
- the mobile terminal may receive a user's first unlock instruction, and the first unlock instruction is used to unlock the first lock screen.
- the first unlocking instruction complies with the unlocking mode set by the first application.
- the first unlocking instruction may be that the user's finger slides to the right on the screen.
- the mobile terminal unlocks the first lock screen and the second lock screen.
- the mobile terminal After receiving the first unlocking instruction for unlocking the first lock screen, the mobile terminal unlocks the first lock screen and the second lock screen. It is worth noting that although the first unlocking instruction is for the first lock screen, it also unlocks the second lock screen. Although the unlocking manner of the second lock screen may be different from the unlocking manner of the first lock screen, the first unlock instruction can also unlock the second lock screen.
- the first unlock command can also unlock the second lock screen, that is, one unlock command unlocks two lock screen interfaces.
- the first lock screen can be overlaid on the second lock screen.
- the second lock screen is also unlocked; it can also be the second lock screen on top of the first lock screen.
- the user does not follow the unlocking method of the second lock screen, but sends an unlocking instruction according to the unlocking method of the first lock screen.
- the unlocking instruction "passes through” the second lock screen to unlock the first lock screen and unlock the second lock at the same time Screen.
- WMS removes the first lock screen and the second lock screen from the lock screen window stack.
- Figure 5 provides another method of unlocking the lock screen, including the following steps:
- the mobile terminal receives a first unlocking instruction to unlock the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application, a second lock screen provided by a second application, and a third lock screen provided by a third application .
- the third application may be a dictionary application, and the third lock screen may be as shown in FIG. 1C.
- the unlocking method of the third lock screen may be to unlock by sliding a finger to the left. It is understandable that the unlocking methods of the first lock screen, the second lock screen, and the third lock screen may be all the same, all different, or two of them are the same and the other is different.
- WMS can add the first lock screen, the second lock screen, and the third lock screen to the lock screen window stack one by one.
- the first lock screen may be overlaid on the second lock screen and the third lock screen.
- the mobile terminal unlocks the first lock screen, the second lock screen, and the third lock screen.
- the first unlocking instruction is for the first lock screen
- the second lock screen and the third lock screen can be unlocked at the same time.
- the system automatically unlocks the second lock screen and the third lock screen.
- WMS removes the first lock screen, the second lock screen, and the third lock screen from the lock screen window stack.
- the first lock screen may not be the top one, but under the second lock screen or the third lock screen.
- the first unlock command can "pass through" the top lock screen and unlock The first lock screen that is not on the top, the second lock screen and the third lock screen.
- Figure 6 provides another method for unlocking the lock screen, including the following steps:
- the mobile terminal receives a first unlocking instruction for unlocking the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application, a second lock screen provided by a second application, and a system lock screen provided by the system.
- the system lock screen may include a secure lock screen and a non-secure lock screen (such as a magazine lock screen), may only include a secure lock screen, or may only include a non-secure lock screen. There is no restriction on the up and down sequence of these lock screens.
- the mobile terminal unlocks the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen.
- the first unlocking instruction is for the first lock screen, the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen can be unlocked at the same time. That is, after the user unlocks the first lock screen, the system automatically unlocks the second lock screen and the non-secure lock screen in the system lock screen.
- WMS removes the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen from the lock screen window stack.
- the mobile terminal can be used normally.
- step 603 may be included: determining whether the system lock screen includes a security lock screen. If the security lock screen is included, unlock the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen; if the security lock screen is not included, unlock the first lock screen, the second lock screen, and the system lock Screen.
- Figure 7 provides another method of locking and unlocking the screen, including the following steps:
- the mobile terminal receives a second unlocking instruction for unlocking the system lock screen.
- the mobile terminal is provided with a first lock screen provided by a first application, a second lock screen provided by a second application, and a system lock screen provided by the system.
- the system lock screen may include a secure lock screen and a non-secure lock screen (such as a magazine lock screen), may only include a secure lock screen, or may only include a non-secure lock screen.
- a non-secure lock screen such as a magazine lock screen
- the system lock screen can be on the top or not on the top.
- the second unlocking instruction depends on the setting of the system. For example, when the unlocking method of the system lock screen is to enter a password to unlock, the second unlocking instruction is to enter a corresponding password.
- the mobile terminal unlocks the first lock screen, the second lock screen, and the system lock screen.
- the second unlocking instruction may "pass through” other lock screens on the system lock screen, unlocking the first lock screen and the second lock screen while unlocking the system lock screen.
- WMS removes the first lock screen, the second lock screen, and the system lock screen from the lock screen window stack.
- the system desktop After unlocking the first lock screen, the second lock screen, and the system lock screen, the system desktop can be displayed directly, and there is no restriction here.
- Figure 8 provides another method of locking and unlocking the screen, including the following steps:
- the mobile terminal receives a first unlocking instruction for unlocking the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application and a second lock screen provided by a second application.
- the mobile terminal judges whether the first unlocking instruction comes from an authorized user.
- An authorized user also called a legal user, is the owner of the mobile terminal with the authority to use it. By judging whether the first unlocking instruction comes from an authorized user, it can bring greater operational convenience to the authorized user. For unauthorized users, this quick unlocking method may not be provided.
- the mobile terminal may collect corresponding user physiological characteristics and compare them with pre-stored authorized user physiological characteristics. If the verification is successful, it means that the first unlocking instruction issued by the authorized user is indicated.
- the mobile terminal can record the history of authorized users to use the mobile terminal, and obtain the usage law of authorized users to use the mobile terminal through statistics (some user operation behaviors that do not conform to the usage law can be eliminated in the statistical process). For example, authorized users often use mobile terminals at home between 7:30-9:00 in the morning, and use mobile terminals at the company from 12:00-14:00 at noon. The mobile terminal can count the time and place of authorized users. Habits of the use of three dimensions. After receiving the first unlocking instruction, the mobile terminal can detect the time and place when the first unlocking instruction is received, and compare it with the authorized user's usage habits. If it meets the requirements, it means that the first unlocking instruction is more likely to be issued by the authorized user of.
- the first lock screen and the second lock screen are automatically unlocked, which improves the use experience of the authorized user.
- Figure 9 provides another method of locking and unlocking the screen, including the following steps:
- the mobile terminal receives a first unlocking instruction for unlocking the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application and a second lock screen provided by a second application.
- the mobile terminal detects the time interval between the lock time of the first screen lock and the reception time of receiving the first unlocking instruction, and determines whether the time interval is within a preset time interval.
- the time interval between two time points can be detected.
- the two time points include: (1) the lock time of the first screen lock to lock the mobile terminal on the system; (2) the mobile terminal The time when the first unlocking instruction was received. If the time interval between these two time points is within the preset time interval (for example, 1 minute), it means that the user has just used the mobile terminal.
- the mobile terminal automatically unlocks the first lock screen and the second lock screen, which is convenient for the user to use.
- This application also provides a method for unlocking the lock screen, including:
- the mobile terminal receives a first unlocking instruction for unlocking the first lock screen.
- the mobile terminal is provided with the first lock screen provided by the first application and the second lock screen provided by the second application; the mobile terminal unlocks the first lock screen and the second lock screen. Lock screen.
- the mobile terminal is provided with a first lock screen provided by the first application and a second lock screen provided by the second application, specifically: the mobile terminal creates a lock screen window stack; the mobile terminal recognizes whether there is a lock screen; the mobile terminal will The identified first lock screen and second lock screen are added to the lock screen window stack.
- the lock screen window stack is created by the mobile terminal through the WMS (Window Manager Service) service; the mobile terminal recognizes whether there is a lock screen, specifically: WMS service recognizes whether the window attribute of the application carries the flag of WindowManager.LayoutParams.FLAG_SHOW_WHEN_LOCKED .
- the unlocking method of the first lock screen and the second lock screen are the same.
- the unlocking methods of the first lock screen and the second lock screen are different.
- the first lock screen is overlaid on the second lock screen.
- the second lock screen is overlaid on the first lock screen.
- the mobile terminal unlocks the first lock screen and the second lock screen, specifically: the mobile terminal removes the first lock screen and the second lock screen from the lock screen window stack through the WMS service.
- the mobile terminal after the mobile terminal unlocks the first lock screen and the second lock screen, the mobile terminal enters the first application or displays the system desktop of the mobile terminal.
- the mobile terminal determines whether the first unlocking instruction comes from an authorized user.
- the mobile terminal determines whether the first unlocking instruction comes from an authorized user, specifically: the mobile terminal collects the user's physiological characteristics and compares it with the pre-stored authorized user's physiological characteristics, and if the verification is successful, it is determined that the authorization is issued by the authorized user.
- the first unlock instruction is a code that specifies whether the authorization is issued by the authorized user.
- the mobile terminal determines whether the first unlocking instruction comes from an authorized user, specifically: the mobile terminal detects the time and place when the first unlocking instruction is received, and compares it with the authorized user's usage habits, and if it matches, it is determined to be an authorized user The first unlocking instruction issued.
- the method further includes: the time interval between the mobile terminal detecting the lock time of the first lock screen and the receiving time of receiving the first unlocking instruction, and the judgment time Whether the interval is within the preset time interval.
- Figure 10 provides a mobile terminal provided with a first lock screen provided by a first application and a second lock screen provided by a second application.
- the mobile terminal includes a receiving module 1001 and an unlocking module 1002, wherein: receiving module 1001, used to receive a first unlocking instruction for unlocking the first lock screen; the unlocking module 1002, used to unlock the first lock screen and the second lock screen.
- the unlocking method of the first lock screen and the second lock screen are the same.
- the unlocking methods of the first lock screen and the second lock screen are different.
- the first lock screen is overlaid on the second lock screen.
- the second lock screen is overlaid on the first lock screen.
- the mobile terminal further includes a processing module, which is used to enter the first application or display the system desktop of the mobile terminal.
- the mobile terminal further includes a judgment module configured to judge whether the first unlocking instruction comes from an authorized user before the unlocking module unlocks the first lock screen and the second lock screen.
- the judging module collects the user's physiological characteristics and compares it with the pre-stored physiological characteristics of the authorized user. If the verification is successful, it is determined that it is the first issued by the authorized user. Unlock instruction.
- the judging module detects the time and place when the first unlocking instruction is received, comparing it with the authorized user’s usage habits, and if it matches, then judging yes The first unlocking instruction issued by an authorized user.
- the mobile terminal further includes a judging module, the judging module is configured to: before the unlocking module unlocks the first lock screen and the second lock screen, detect the lock time of the first lock screen and the receiving time of the first unlocking instruction. Determine whether the time interval is within the preset time interval.
- the mobile terminal includes one or more processors, a memory, and one or more programs; wherein, one or more programs are stored in the memory and configured to be configured by one or more Executed by a processor, the one or more programs include instructions, and the instructions are used to execute the methods described in FIGS. 4 to 9 above.
- the present application also provides a storage medium for storing computer software instructions, and the instructions are used to execute the methods described in FIGS. 4 to 9 above.
- This application also provides a computer program product, which when running the computer program product, causes the computer to execute the method described in FIGS. 4 to 9 above.
- the disclosed device and method can be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be divided. It can be combined or integrated into another device, or some features can be omitted or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate parts may or may not be physically separate.
- the parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium.
- the technical solutions of the embodiments of the present application are essentially or the part that contributes to the prior art, or all or part of the technical solutions can be embodied in the form of a software product, and the software product is stored in a storage medium. It includes several instructions to make a device (may be a single-chip microcomputer, a chip, etc.) or a processor (processor) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read only memory (read only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Theoretical Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Telephone Function (AREA)
Abstract
Description
本申请要求在2019年10月22日提交中国国家知识产权局、申请号为201911007620.7的中国专利申请的优先权,发明名称为“一种锁屏解锁的方法及移动终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application filed with the State Intellectual Property Office of China with application number 201911007620.7 on October 22, 2019, and the priority of the Chinese patent application with the title of “A method for unlocking the screen and a mobile terminal” Right, the entire contents of which are incorporated in this application by reference.
本申请实施例涉及电子技术领域,尤其涉及一种锁屏解锁的方法及移动终端。The embodiments of the present application relate to the field of electronic technology, and in particular, to a method for locking and unlocking a screen and a mobile terminal.
移动终端例如手机上会存在多种锁屏方式,系统锁屏是手机系统自身的锁屏,包括安全锁屏(可以用图案、数字、手势及混合密码等来锁屏和解锁)和非安全锁屏(例如杂志锁屏);第三方锁屏是安装在手机上的第三方应用提供的锁屏(例如音乐锁屏、运动锁屏、词典锁屏等),一般覆盖在系统锁屏之上。用户可以根据自身需求设置不同的锁屏方式及其组合,例如用户可以同时设置安全锁屏、非安全锁屏、第三方锁屏,也可以设置安全锁屏和第三方锁屏,也可以设置非安全锁屏和第三方锁屏,也可以只设置第三方锁屏。There are many ways to lock the screen on mobile terminals, such as mobile phones. The system lock screen is the lock screen of the mobile phone system itself, including secure lock screens (the screen can be locked and unlocked with patterns, numbers, gestures, and mixed passwords) and non-secure locks. Screen (such as magazine lock screen); third-party lock screen is a lock screen provided by a third-party application installed on the mobile phone (such as music lock screen, sports lock screen, dictionary lock screen, etc.), which is generally overlaid on the system lock screen. Users can set different lock screen methods and combinations according to their own needs. For example, users can set secure lock screen, non-secure lock screen, third-party lock screen at the same time, can also set secure lock screen and third-party lock screen, or set non-secure lock screen. Security lock screen and third-party lock screen, you can also set up only third-party lock screen.
当前的第三方锁屏可以覆盖在系统锁屏之上,例如打开音乐应用程序(app)后锁屏,点亮屏幕后可能会发现有该音乐应用程序的锁屏,解锁了该音乐应用程序的锁屏之后,才能进一步解锁系统锁屏(如果设置了系统锁屏的话),操作比较麻烦。同时,目前不同的第三方应用提供不同的第三方锁屏,解锁方式也不尽相同,如果有多个第三方锁屏,在解锁时会非常繁琐。The current third-party lock screen can be overlaid on the system lock screen. For example, after opening a music application (app), lock the screen. After turning on the screen, you may find the lock screen of the music application and unlock the music application’s lock screen. After the screen is locked, the system lock screen can be unlocked further (if the system lock screen is set), the operation is more troublesome. At the same time, different third-party applications currently provide different third-party lock screens, and the unlocking methods are different. If there are multiple third-party lock screens, it will be very cumbersome to unlock.
发明内容Summary of the invention
本申请实施例提供一种锁屏解锁的方法及移动终端,能够避免繁琐的解锁操作,提高解锁效率,改善用户体验。The embodiments of the present application provide a method for unlocking a lock screen and a mobile terminal, which can avoid cumbersome unlocking operations, improve unlocking efficiency, and improve user experience.
为达到上述目的,本申请实施例采用如下技术方案:To achieve the foregoing objectives, the following technical solutions are adopted in the embodiments of the present application:
第一方面,本申请实施例提供一种锁屏解锁的方法,包括:移动终端接收解锁第一锁屏的第一解锁指令,该移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏;该移动终端解锁第一锁屏和第二锁屏。通过自动解锁多个锁屏,提高了解锁效率。In a first aspect, an embodiment of the present application provides a method for unlocking a lock screen, including: a mobile terminal receives a first unlocking instruction to unlock a first lock screen, and the mobile terminal is provided with a first lock screen and a second lock screen provided by a first application. The second lock screen provided by the application; the mobile terminal unlocks the first lock screen and the second lock screen. By automatically unlocking multiple lock screens, the unlocking efficiency is improved.
在一种可能的实现方式中,移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏,具体为:移动终端创建锁屏窗口栈;移动终端识别是否存在锁屏;移动终端将识别到的第一锁屏和第二锁屏加入到锁屏窗口栈。In a possible implementation manner, the mobile terminal is provided with a first lock screen provided by the first application and a second lock screen provided by the second application, specifically: the mobile terminal creates a lock screen window stack; the mobile terminal recognizes whether there is a lock Screen; the mobile terminal adds the identified first lock screen and second lock screen to the lock screen window stack.
在一种可能的实现方式中,锁屏窗口栈是移动终端通过WMS(Window Manager Service)服务创建的;移动终端识别是否存在锁屏,具体为:WMS服务识别应用的窗口属性中是否携带WindowManager.LayoutParams.FLAG_SHOW_WHEN_LOCKED的flag.In a possible implementation, the lock screen window stack is created by the mobile terminal through the WMS (Window Manager Service) service; the mobile terminal recognizes whether there is a lock screen, specifically: WMS service recognizes whether the window attribute of the application carries WindowManager. The flag of LayoutParams.FLAG_SHOW_WHEN_LOCKED.
在一种可能的实现方式中,第一锁屏和第二锁屏的解锁方式相同。In a possible implementation manner, the unlocking manners of the first lock screen and the second lock screen are the same.
在一种可能的实现方式中,第一锁屏和第二锁屏的解锁方式不同。In a possible implementation manner, the unlocking manners of the first lock screen and the second lock screen are different.
在一种可能的实现方式中,第一锁屏覆盖在第二锁屏之上。In a possible implementation manner, the first lock screen is overlaid on the second lock screen.
在一种可能的实现方式中,第二锁屏覆盖在第一锁屏之上。In a possible implementation manner, the second lock screen is overlaid on the first lock screen.
在一种可能的实现方式中,移动终端解锁第一锁屏和第二锁屏,具体为:移动终端通过 WMS服务在锁屏窗口栈里移除第一锁屏和第二锁屏。In a possible implementation manner, the mobile terminal unlocks the first lock screen and the second lock screen, specifically: the mobile terminal removes the first lock screen and the second lock screen from the lock screen window stack through the WMS service.
在一种可能的实现方式中,在移动终端解锁第一锁屏和第二锁屏之后,该方法还包括:移动终端进入第一应用,或者显示移动终端的系统桌面。In a possible implementation manner, after the mobile terminal unlocks the first lock screen and the second lock screen, the method further includes: the mobile terminal enters the first application or displays the system desktop of the mobile terminal.
在一种可能的实现方式中,在移动终端解锁第一锁屏和第二锁屏之前,该方法还包括:移动终端判断第一解锁指令是否来自授权用户。In a possible implementation manner, before the mobile terminal unlocks the first lock screen and the second lock screen, the method further includes: the mobile terminal determines whether the first unlocking instruction comes from an authorized user.
在一种可能的实现方式中,判断第一解锁指令是否来自授权用户,具体为:移动终端采集用户生理特征,和预存的授权用户的生理特征进行对比,如果验证成功,则判断是授权用户发出的所述第一解锁指令。In a possible implementation, it is determined whether the first unlocking command comes from an authorized user, specifically: the mobile terminal collects the user's physiological characteristics and compares it with the pre-stored authorized user's physiological characteristics. If the verification is successful, it is determined that the authorized user issued it. The first unlocking instruction.
在一种可能的实现方式中,判断第一解锁指令是否来自授权用户,具体为:移动终端检测接收到第一解锁指令的时间和地点,和授权用户的使用习惯进行对比,如果符合,则判断是授权用户发出的所述第一解锁指令。In a possible implementation manner, judging whether the first unlocking instruction comes from an authorized user, specifically: the mobile terminal detects the time and place when the first unlocking instruction is received, and compares it with the authorized user’s usage habits, and if it matches, then judge Is the first unlocking instruction issued by an authorized user.
在一种可能的实现方式中,在移动终端解锁第一锁屏和第二锁屏之前,该方法还包括:移动终端检测第一锁屏的锁定时间和接收到第一解锁指令的接收时间之间的时间间隔,判断该时间间隔是否在预设时间间隔内。。In a possible implementation manner, before the mobile terminal unlocks the first lock screen and the second lock screen, the method further includes: the mobile terminal detects one of the lock time of the first lock screen and the reception time of the first unlock instruction. Determine whether the time interval is within the preset time interval. .
第二方面,本申请实施例提供一种移动终端,该移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏,该移动终端包括接收模块和解锁模块,其中,该接收模块用于接收解锁第一锁屏的第一解锁指令,该解锁模块用于解锁第一锁屏和第二锁屏。In a second aspect, an embodiment of the present application provides a mobile terminal provided with a first lock screen provided by a first application and a second lock screen provided by a second application. The mobile terminal includes a receiving module and an unlocking module, wherein , The receiving module is used for receiving a first unlocking instruction for unlocking the first lock screen, and the unlocking module is used for unlocking the first lock screen and the second lock screen.
在一种可能的实现方式中,第一锁屏和第二锁屏的解锁方式相同。In a possible implementation manner, the unlocking manners of the first lock screen and the second lock screen are the same.
在一种可能的实现方式中,第一锁屏和第二锁屏的解锁方式不同。In a possible implementation manner, the unlocking manners of the first lock screen and the second lock screen are different.
在一种可能的实现方式中,第一锁屏覆盖在第二锁屏之上。In a possible implementation manner, the first lock screen is overlaid on the second lock screen.
在一种可能的实现方式中,第二锁屏覆盖在第一锁屏之上。In a possible implementation manner, the second lock screen is overlaid on the first lock screen.
在一种可能的实现方式中,该移动终端还包括处理模块,该处理模块用于进入第一应用,或者显示移动终端的系统桌面。In a possible implementation manner, the mobile terminal further includes a processing module configured to enter the first application or display the system desktop of the mobile terminal.
在一种可能的实现方式中,该移动终端还包括判断模块,该判断模块用于在解锁模块解锁第一锁屏和第二锁屏之前,判断第一解锁指令是否来自授权用户。In a possible implementation manner, the mobile terminal further includes a judgment module configured to judge whether the first unlocking instruction comes from an authorized user before the unlocking module unlocks the first lock screen and the second lock screen.
在一种可能的实现方式中,判断第一解锁指令是否来自授权用户,具体为:判断模块采集用户生理特征,和预存的授权用户的生理特征进行对比,如果验证成功,则判断是授权用户发出的第一解锁指令。In a possible implementation, it is determined whether the first unlocking instruction comes from an authorized user, specifically: the judgment module collects the user's physiological characteristics and compares it with the pre-stored authorized user's physiological characteristics. If the verification is successful, it is determined that the authorized user issued it. The first unlock instruction.
在一种可能的实现方式中,判断第一解锁指令是否来自授权用户,具体为:判断模块检测接收到第一解锁指令的时间和地点,和授权用户的使用习惯进行对比,如果符合,则判断是授权用户发出的第一解锁指令。In a possible implementation, judging whether the first unlocking instruction comes from an authorized user, specifically: the judging module detects the time and place when the first unlocking instruction is received, comparing it with the authorized user’s usage habits, and if it matches, then judging It is the first unlocking instruction issued by an authorized user.
在一种可能的实现方式中,移动终端还包括判断模块,该判断模块用于:在解锁模块解锁第一锁屏和第二锁屏之前,检测第一锁屏的锁定时间和接收到第一解锁指令的接收时间之间的时间间隔,判断该时间间隔是否在预设时间间隔内。In a possible implementation manner, the mobile terminal further includes a judgment module configured to: before the unlocking module unlocks the first lock screen and the second lock screen, detect the lock time of the first lock screen and receive the first lock screen. The time interval between the receiving time of the unlock command, and it is judged whether the time interval is within the preset time interval.
第三方面,本申请实施例提供一种移动终端,该移动终端包括一个或多个处理器,存储器,一个或多个程序;其中,一个或多个程序被存储在存储器中并被配置为被一个或多个处理器执行,一个或多个程序包括指令,指令用于执行如第一方面所述的方法。In a third aspect, embodiments of the present application provide a mobile terminal, which includes one or more processors, memory, and one or more programs; wherein, one or more programs are stored in the memory and configured to be One or more processors are executed, and one or more programs include instructions for executing the method according to the first aspect.
第四方面,本申请实施例提供一种存储介质,用于存储计算机软件指令,计算机软件指令用于执行如第一方面所述的方法。In a fourth aspect, an embodiment of the present application provides a storage medium for storing computer software instructions, and the computer software instructions are used to execute the method described in the first aspect.
第五方面,本申请实施例提供一种计算机程序产品,当运行计算机程序产品时,使得计算机执行如第一方面所述的方法。In the fifth aspect, the embodiments of the present application provide a computer program product, which when the computer program product is run, causes the computer to execute the method described in the first aspect.
通过以上方案,可以实现快速解锁多个锁屏,提升用户体验。Through the above solution, multiple lock screens can be unlocked quickly and user experience can be improved.
图1A为本申请实施例提供的一种第三方锁屏的示意图;FIG. 1A is a schematic diagram of a third-party lock screen provided by an embodiment of this application;
图1B为本申请实施例提供的另一种第三方锁屏的示意图;FIG. 1B is a schematic diagram of another third-party lock screen provided by an embodiment of this application;
图1C为本申请实施例提供的另一种第三方锁屏的示意图;FIG. 1C is a schematic diagram of another third-party lock screen provided by an embodiment of this application;
图2为本申请实施例提供的一种移动终端的结构示意图;FIG. 2 is a schematic structural diagram of a mobile terminal provided by an embodiment of this application;
图3为本申请实施例提供的一种移动终端操作系统的结构示意图;FIG. 3 is a schematic structural diagram of a mobile terminal operating system provided by an embodiment of this application;
图4为本申请实施例提供的一种锁屏解锁的方法流程图;FIG. 4 is a flowchart of a method for locking and unlocking a screen provided by an embodiment of the application;
图5为本申请实施例提供的另一种锁屏解锁的方法流程图;FIG. 5 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application;
图6为本申请实施例提供的另一种锁屏解锁的方法流程图;FIG. 6 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application;
图7为本申请实施例提供的另一种锁屏解锁的方法流程图;FIG. 7 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application;
图8为本申请实施例提供的另一种锁屏解锁的方法流程图;FIG. 8 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application;
图9为本申请实施例提供的另一种锁屏解锁的方法流程图;FIG. 9 is a flowchart of another method for locking and unlocking a screen provided by an embodiment of the application;
图10为本申请实施例提供的一种移动终端的示意图。FIG. 10 is a schematic diagram of a mobile terminal provided by an embodiment of this application.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,在本申请实施例的描述中,“多个”是指两个或多于两个。The technical solutions in the embodiments of the present application will be described below in conjunction with the drawings in the embodiments of the present application. Among them, in the description of the embodiments of the present application, unless otherwise specified, "/" means or, for example, A/B can mean A or B; "and/or" in this document is only a description of related objects The association relationship of indicates that there can be three kinds of relationships, for example, A and/or B, which can indicate: A alone exists, A and B exist at the same time, and B exists alone. In addition, in the description of the embodiments of the present application, "plurality" refers to two or more than two.
本申请所述的移动终端可以包括诸如手机、平板电脑、可穿戴设备(例如,手表、手环、智能头盔等)、车载设备、智能家居设备、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本、个人数字助理(personal digital assistant,PDA)等。本申请一些实施例以手机为例,可以理解的是,这些实施例也可应用于其他类型的移动终端。The mobile terminal described in this application may include mobile phones, tablet computers, wearable devices (for example, watches, bracelets, smart helmets, etc.), vehicle-mounted devices, smart home devices, augmented reality (AR)/virtual reality ( virtual reality (VR) equipment, notebook computers, ultra-mobile personal computers (UMPC), netbooks, personal digital assistants (personal digital assistants, PDAs), etc. Some embodiments of the present application take a mobile phone as an example, and it should be understood that these embodiments can also be applied to other types of mobile terminals.
本申请涉及的应用程序(application,app),可以简称应用,为能够实现某项或多项特定功能的软件程序。通常,移动终端中可以安装多个应用,例如,运动类应用,音乐类应用,词典类应用等。可以理解的是,应用可以是移动终端出厂时已安装的应用,也可以是用户在使用移动终端的过程中从网络下载或从其他电子设备获取的应用。第三方应用通常是指非移动终端生产商开发的应用,例如对于华为 手机,第三方应用可以是除了华为以外的其他开发者开发的应用。 The application program (application, app) involved in this application may be referred to as an application, which is a software program that can realize one or more specific functions. Generally, multiple applications can be installed in a mobile terminal, for example, sports applications, music applications, dictionary applications, and so on. It is understandable that the application may be an application that has been installed when the mobile terminal is shipped from the factory, or an application that the user downloads from the network or obtains from other electronic devices in the process of using the mobile terminal. Third-party applications usually refer to applications developed by non-mobile terminal manufacturers. For example, for Huawei For mobile phones, third-party applications can be applications developed by developers other than Huawei.
出于安全、隐私或者美观的考虑,移动终端可以设置锁屏,解锁已设置的锁屏后才能正常使用移动终端的功能,否则无法使用或者只能使用一部分功能。例如,如果设置了锁屏,在点亮手机屏幕时,会提供一个解锁界面,需要用户输入密码解锁后才能进入用户使用界面进行正常操作。移动终端可以设置多种锁屏方式,通常可以分为系统锁屏和第三方锁屏,系统锁屏是移动终端系统自身提供的锁屏,第三方锁屏是安装在移动终端上的第三方应用提供的锁屏。其中,系统锁屏又可以包括安全锁屏和非安全锁屏,所谓安全锁屏,可以是图案锁屏、数字锁屏、手势锁屏、指纹锁屏、人脸锁屏、声纹解锁或者混合密码锁屏(例如数字和字母的组合),具有验证用户身份的能力,通常只有知道密码的用户(授权用户)才能解锁; 非安全锁屏,一般是为了美观等非安全原因而设置的锁屏,不具有验证用户身份的能力,非授权用户也可以解锁。例如杂志锁屏就是一种常见的非安全锁屏,在手机屏幕上呈现如同杂志封面般的壁纸,每个用户,包括授权用户和非授权用户,都可以根据解锁提示来解锁非安全锁屏,这种情况下的解锁方式一般都比较简单,例如点击屏幕、手指滑动(可以是左滑、右滑、上滑、下滑、斜着滑等)。用户可以根据自身需求设置不同的锁屏方式及其组合,例如用户可以同时设置安全锁屏、非安全锁屏、第三方锁屏,也可以设置安全锁屏和第三方锁屏,也可以设置非安全锁屏和第三方锁屏,也可以只设置第三方锁屏。For security, privacy, or aesthetic considerations, the mobile terminal can be set with a lock screen, and the functions of the mobile terminal can be used normally after unlocking the set lock screen. Otherwise, it cannot be used or only a part of the functions can be used. For example, if a lock screen is set, when the phone screen is turned on, an unlock interface will be provided, and the user needs to enter a password to unlock before entering the user interface for normal operations. The mobile terminal can be set with a variety of lock screen methods, which can generally be divided into system lock screen and third-party lock screen. The system lock screen is the lock screen provided by the mobile terminal system itself, and the third-party lock screen is a third-party application installed on the mobile terminal. Provide the lock screen. Among them, the system lock screen can include security lock screen and non-secure lock screen. The so-called security lock screen can be pattern lock screen, digital lock screen, gesture lock screen, fingerprint lock screen, face lock screen, voiceprint unlock or hybrid Password lock screen (such as a combination of numbers and letters), has the ability to verify user identity, usually only users who know the password (authorized users) can unlock; non-secure lock screen, generally set for non-secure reasons such as beauty , Does not have the ability to verify user identity, and unauthorized users can also unlock it. For example, the magazine lock screen is a common non-secure lock screen, which presents a wallpaper like a magazine cover on the phone screen. Every user, including authorized users and unauthorized users, can unlock the non-secure lock screen according to the unlock prompt. In this case, the unlocking method is generally relatively simple, such as tapping the screen, sliding the finger (which can be sliding left, sliding right, sliding up, sliding down, sliding diagonally, etc.). Users can set different lock screen methods and combinations according to their own needs. For example, users can set secure lock screen, non-secure lock screen, third-party lock screen at the same time, can also set secure lock screen and third-party lock screen, or set non-secure lock screen. Security lock screen and third-party lock screen, you can also set up only third-party lock screen.
第三方锁屏一般覆盖在系统锁屏上面,亦即,解锁了第三方锁屏后才能解锁系统锁屏。在一些情况下,第三方应用锁屏的解锁方式比较简单,例如点击屏幕、手指滑动(可以是左滑、右滑、上滑、下滑、斜着滑等)就可以解锁,通常授权用户和非授权用户都可以解锁;可以理解的是,有些第三方应用的锁屏需要设置密码,只有授权用户才能解锁,解锁方式可以类似于系统安全锁屏,例如用图案或者密码解锁。因此,本申请对于第三方锁屏的解锁方式不做限制。第三方应用,例如音乐应用、运动应用、词典应用等,可以提供锁屏界面。例如,图1A所示的音乐应用提供的第三方锁屏,可以显示正在播放或者之前播放的音乐,包括音乐名称、歌词、音乐专辑封面等,还可以提供一些功能按键,例如暂停,播放,上一曲,下一曲,音量,播放方式,收藏按钮,播放进度条等,从而方便用户的操作。又如,图1B所示的运动应用提供的第三方锁屏,可以提供运动相关的信息,例如运动时长,运动距离,运动类型(跑步、汽车、游泳等),心率,运动消耗的卡路里等,还可以提供一些功能按键,例如暂停运动、停止运动、切换运动类型等。又如,图1C所示的词典应用提供的第三方锁屏,可以提供单词查询输入框,或者依次播放用户收藏的单词本中的单词、音标或者释义等。The third-party lock screen is generally overlaid on the system lock screen, that is, the system lock screen can only be unlocked after the third-party lock screen is unlocked. In some cases, the unlocking method of the third-party application lock screen is relatively simple, such as tapping the screen, sliding your finger (which can be left, right, up, down, diagonally, etc.) to unlock. Usually authorized users and non-users Authorized users can unlock the screen; it is understandable that the lock screen of some third-party applications requires a password. Only authorized users can unlock the screen. The unlocking method can be similar to the system security lock screen, such as unlocking with a pattern or password. Therefore, this application does not limit the unlocking method of the third-party lock screen. Third-party applications, such as music applications, sports applications, dictionary applications, etc., can provide a lock screen interface. For example, the third-party lock screen provided by the music application shown in Figure 1A can display the music being played or previously played, including the music name, lyrics, music album cover, etc., and can also provide some function buttons, such as pause, play, and upload. One song, next song, volume, playback mode, favorite buttons, playback progress bar, etc., so as to facilitate user operations. For another example, the third-party lock screen provided by the sports application shown in Figure 1B can provide sports-related information, such as exercise duration, exercise distance, exercise type (running, car, swimming, etc.), heart rate, calories consumed by exercise, etc. Some function buttons can also be provided, such as pause exercise, stop exercise, switch exercise type, etc. For another example, the third-party lock screen provided by the dictionary application shown in FIG. 1C can provide a word query input box, or sequentially play words, phonetic symbols, or paraphrases in the user's favorite word book.
当前,如果有多个第三方应用提供多个第三方锁屏,需要依次解锁所有的第三方锁屏后,才能进行系统锁屏解锁(如果设置了系统锁屏的话),或者进入用户使用界面(如果没有设置系统锁屏的话)。而且,不同的第三方锁屏的解锁方式不一样,例如有的是向上滑动解锁,有的是享有滑动解锁,操作起来很繁琐,影响了用户体验。Currently, if there are multiple third-party applications that provide multiple third-party lock screens, you need to unlock all third-party lock screens in turn before you can unlock the system lock screen (if the system lock screen is set), or enter the user interface ( If the system lock screen is not set). Moreover, different third-party lock screens have different unlocking methods. For example, some are swiping up to unlock, and some are enjoying swiping to unlock, which is cumbersome to operate and affects user experience.
如图2所示,本申请实施例中的移动终端可以为手机100。下面以手机100为例对实施例进行具体说明。应该理解的是,图示手机100仅是移动终端的一个范例,并且手机100可以具有比图中所示出的更多的或者更少的部件,可以组合两个或更多的部件,或者可以具有不同的部件配置。As shown in FIG. 2, the mobile terminal in the embodiment of the present application may be a
如图2所示,手机100具体可以包括:处理器101、射频(RF)电路102、存储器103、触摸屏104、蓝牙装置105、一个或多个传感器106、Wi-Fi装置107、定位装置108、音频电路109、外设接口110以及电源系统111等部件。这些部件可通过一根或多根通信总线或信号线(图2中未示出)进行通信。本领域技术人员可以理解,图2中示出的硬件结构并不构成对手机的限定,手机100可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。As shown in FIG. 2, the
下面结合图2对手机100的各个部件进行具体的介绍:The components of the
处理器101是手机100的控制中心,利用各种接口和线路连接手机100的各个部分,通过运行或执行存储在存储器103内的应用程序,以及调用存储在存储器103内的数据,执行手机100的各种功能和处理数据。在一些实施例中,处理器101可包括一个或多个处理单元;举例来说,处理器101可以是华为技术有限公司制造的麒麟960芯片。在本申请一些实施例中,上述处理器101还可以包括指纹验证芯片,用于对采集到的指纹进行验证。The
射频电路102可用于在收发信息或通话过程中,无线信号的接收和发送。特别地,射频 电路102可以将基站的下行数据接收后,给处理器101处理;另外,将涉及上行的数据发送给基站。通常,射频电路包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频电路102还可以通过无线通信和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统、通用分组无线服务、码分多址、宽带码分多址、长期演进、电子邮件、短消息服务等。The
存储器103用于存储应用程序以及数据,处理器101通过运行存储在存储器103的应用程序以及数据,执行手机100的各种功能以及数据处理。存储器103主要包括存储程序区以及存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等);存储数据区可以存储根据使用手机100时所创建的数据(比如音频数据、电话本等)。此外,存储器103可以包括高速随机存取存储器,还可以包括非易失存储器,例如磁盘存储器件、闪存器件或其他易失性固态存储器件等。存储器103可以存储各种操作系统,例如,苹果公司所开发的
操作系统,谷歌公司所开发的
操作系统等。上述存储器103可以是独立的,通过上述通信总线与处理器101相连接;存储器103也可以和处理器101集成在一起。
The
触摸屏104可以包括触控板104-1和显示器104-2。其中,触控板104-1可采集手机100的用户在其上或附近的触摸事件(比如用户使用手指、触控笔等任何适合的物体在触控板104-1上或在触控板104-1附近的操作),并将采集到的触摸信息发送给其他器件例如处理器101。其中,用户在触控板104-1附近的触摸事件可以称之为悬浮触控;悬浮触控可以是指,用户无需为了选择、移动或拖动目标(例如图标等)而直接接触触控板,而只需用户位于电子设备附近以便执行所想要的功能。在悬浮触控的应用场景下,术语“触摸”、“接触”等不会暗示用于直接接触触摸屏,而是附近或接近的接触。能够进行悬浮触控的触控板104-1可以采用电容式、红外光感以及超声波等实现。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型来实现触控板104-1。显示器(也称为显示屏)104-2可用于显示由用户输入的信息或提供给用户的信息以及手机100的各种菜单。可以采用液晶显示器、有机发光二极管等形式来配置显示器104-2。触控板104-1可以覆盖在显示器104-2之上,当触控板104-1检测到在其上或附近的触摸事件后,传送给处理器101以确定触摸事件的类型,随后处理器101可以根据触摸事件的类型在显示器104-2上提供相应的视觉输出。虽然在图2中,触控板104-1与显示屏104-2是作为两个独立的部件来实现手机100的输入和输出功能,但是在某些实施例中,可以将触控板104-1与显示屏104-2集成而实现手机100的输入和输出功能。可以理解的是,触摸屏104是由多层的材料堆叠而成,本申请实施例中只展示出了触控板(层)和显示屏(层),其他层在本申请实施例中不予记载。另外,在本申请其他一些实施例中,触控板104-1可以覆盖在显示器104-2之上,并且触控板104-1的尺寸大于显示屏104-2的尺寸,使得显示屏104-2全部覆盖在触控板104-1下面,或者,上述触控板104-1可以以全面板的形式配置在手机100的正面,也即用户在手机100正面的触摸均能被手机感知,这样就可以实现手机正面的全触控体验。在其他一些实施例中,触控板104-1以全面板的形式配置在手机100的正面,显示屏104-2也可以以全面板的形式配置在手机100的正面,这样在手机的正面就能够实现无边框的结构。The
在本申请实施例中,手机100还可以具有指纹识别功能。例如,可以在触摸屏104中配置指纹采集器件112来实现指纹识别功能,即指纹采集器件112可以与触摸屏104集成在一起来实现手机100的指纹识别功能。在这种情况下,该指纹采集器件112配置在触摸屏104中,可以是触摸屏104的一部分,也可以以其他方式配置在触摸屏104中。另外,该指纹采 集器件112还可以被实现为全面板指纹采集器件。因此,可以把触摸屏104看成是任何位置都可以进行指纹识别的一个面板。该指纹采集器件112可以将采集到的指纹发送给处理器101,以便处理器101对该指纹进行处理(例如指纹验证等)。本申请实施例中的指纹采集器件112的主要部件是指纹传感器,该指纹传感器可以采用任何类型的感测技术,包括但不限于光学式、电容式、压电式或超声波传感技术等。In the embodiment of the present application, the
手机100还可以包括蓝牙装置105,用于实现手机100与其他短距离的电子设备(例如手机、智能手表等)之间的数据交换。本申请实施例中的蓝牙装置可以是集成电路或者蓝牙芯片等。The
手机100还可以包括至少一种传感器106,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节触摸屏104的显示器的亮度,接近传感器可在手机100移动到耳边时,关闭显示器的电源。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机100还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The
Wi-Fi装置107,用于为手机100提供遵循Wi-Fi相关标准协议的网络接入,手机100可以通过Wi-Fi装置107接入到Wi-Fi接入点,进而帮助用户收发电子邮件、浏览网页和访问流媒体等,它为用户提供了无线的宽带互联网访问。在其他一些实施例中,该Wi-Fi装置107也可以作为Wi-Fi无线接入点,可以为其他电子设备提供Wi-Fi网络接入。The Wi-
定位装置108,用于为手机100提供地理位置。可以理解的是,该定位装置108具体可以是全球定位系统(GPS)或北斗卫星导航系统、俄罗斯GLONASS等定位系统的接收器。定位装置108在接收到上述定位系统发送的地理位置后,将该信息发送给处理器101进行处理,或者发送给存储器103进行保存。在另外的一些实施例中,该定位装置108还可以是辅助全球卫星定位系统(AGPS)的接收器,AGPS系统通过作为辅助服务器来协助定位装置108完成测距和定位服务,在这种情况下,辅助定位服务器通过无线通信网络与电子设备例如手机100的定位装置108(即GPS接收器)通信而提供定位协助。在另外的一些实施例中,该定位装置108也可以是基于Wi-Fi接入点的定位技术。由于每一个Wi-Fi接入点都有一个全球唯一的MAC地址,电子设备在开启Wi-Fi的情况下即可扫描并收集周围的Wi-Fi接入点的广播信号,因此可以获取到Wi-Fi接入点广播出来的MAC地址;电子设备将这些能够标示Wi-Fi接入点的数据(例如MAC地址)通过无线通信网络发送给位置服务器,由位置服务器检索出每一个Wi-Fi接入点的地理位置,并结合Wi-Fi广播信号的强弱程度,计算出该电子设备的地理位置并发送到该电子设备的定位装置108中。The
音频电路109、扬声器113、麦克风114可提供用户与手机100之间的音频接口。音频电路109可将接收到的音频数据转换后的电信号,传输到扬声器113,由扬声器113转换为声音信号输出;另一方面,麦克风114将收集的声音信号转换为电信号,由音频电路109接收后转换为音频数据,再将音频数据输出至RF电路102以发送给比如另一手机,或者将音频数据输出至存储器103以便进一步处理。The
外设接口110,用于为外部的输入/输出设备(例如键盘、鼠标、外接显示器、外部存储器、用户识别模块卡等)提供各种接口。例如通过通用串行总线(USB)接口与鼠标连接,通过用户识别模块卡卡槽上的金属触点与电信运营商提供的用户识别模块卡(SIM)卡进行 连接。外设接口110可以被用来将上述外部的输入/输出外围设备耦接到处理器101和存储器103。The
手机100还可以包括给各个部件供电的电源装置111(比如电池和电源管理芯片),电池可以通过电源管理芯片与处理器101逻辑相连,从而通过电源装置111实现管理充电、放电、以及功耗管理等功能。The
尽管图2未示出,手机100还可以包括摄像头(前置摄像头和/或后置摄像头)、闪光灯、微型投影装置、近场通信(NFC)装置等,在此不再赘述。Although not shown in FIG. 2, the
图3是一种运行 操作系统的手机操作系统结构示意图。Android操作系统架构分为四层,从高层到底层分为应用程序层,应用程序框架层,函数库层和Linux内核层。 Figure 3 is a run Schematic diagram of mobile phone operating system structure of operating system. The Android operating system architecture is divided into four layers, from high-level to bottom-level divided into application layer, application framework layer, function library layer and Linux kernel layer.
1、应用程序层:1. Application layer:
应用程序层(Applications)是Android操作系统架构的最上一层,包括Android操作系统装配的核心应用软件,例如电子邮件客户端、短信、通话、日历、地图、浏览器、联系人等。当然,对于开发者来说,开发者可以编写应用软件并安装到该层。一般而言,应用程序都是使用Java语言开发,通过调用应用程序框架层所提供的API(Application Programming Interface)来完成。The application layer (Applications) is the top layer of the Android operating system architecture, including the core application software assembled by the Android operating system, such as email clients, text messages, calls, calendars, maps, browsers, contacts, etc. Of course, for developers, developers can write application software and install it to this layer. Generally speaking, application programs are developed in Java language, which is completed by calling API (Application Programming Interface) provided by the application framework layer.
2、应用程序框架层:2. Application framework layer:
应用程序框架层(Application Framework),主要是为开发者提供了可以访问应用程序所使用的各种API,开发者通过应用程序框架层来与Android底层(例如函数库层、Linux内核层等)进行交互,开发自己的应用。该应用程序框架层主要是Android操作系统的一系列的服务和管理系统。应用程序框架层主要包括如下关键服务:The application framework layer (Application Framework) mainly provides developers with access to various APIs used by the application. Developers use the application framework layer to communicate with the underlying Android (such as the function library layer, the Linux kernel layer, etc.) Interactive and develop your own applications. The application framework layer is mainly a series of services and management systems of the Android operating system. The application framework layer mainly includes the following key services:
活动管理器(Activity Manager)用来管理应用程序生命周期并提供常用的导航回退功能;Activity Manager (Activity Manager) is used to manage the application life cycle and provide common navigation rollback functions;
内容提供器(Content Providers),用来管理不同应用程序间的数据共享和访问;Content Providers are used to manage data sharing and access between different applications;
通知管理器(Notification Manager),用于控制应用程序在状态栏显示提示信息(例如警告(Alerts)、通知消息(Notifications)等)给用户;The Notification Manager is used to control the application to display prompt information (such as Alerts, Notifications, etc.) to the user in the status bar;
资源管理器(Resource Manager):提供非代码资源(如字符串、图形和布局文件(Layoutfile)等)供应用程序使用;Resource Manager: Provides non-code resources (such as strings, graphics, and layout files, etc.) for use by application programs;
包管理器(Package Manager)主要用于对Android操作系统的应用程序进行管理;Package Manager (Package Manager) is mainly used to manage the applications of the Android operating system;
视图(View),具有丰富的、可扩展的视图集合,可用于构建一个应用程序,它具体包括列表(List)、网格(Grid)、文本框(TextBox)、按钮(Button),以及可嵌入的网页浏览器;View, with a rich and extensible collection of views, can be used to build an application, which specifically includes a list (List), a grid (Grid), a text box (TextBox), a button (Button), and embeddable Web browser;
位置管理器(Location Manager),主要是让应用程序可以访问到手机当前的地理位置。The location manager (Location Manager) mainly allows applications to access the current geographic location of the mobile phone.
3、函数库层:3. Function library layer:
函数库层(Libraries)是应用程序框架的支撑,是连接应用程序框架层与Linux内核层的重要纽带。函数库层包括一些由计算机程序C语言或C++语言编译的函数库,这些函数库能被Android操作系统中的不同的组件使用,它们通过Android应用程序框架为开发者提供服务。具体地,函数库包括libc函数库,它是专门为基于embedded linux的设备定制的;函数库还包括Android操作系统多媒体库(Media Framework),该库支持多种编码格式的音频/视频的回放和录制,同时支持静态图像文件,以及常见的音频/视频编码格式。函数库还包括界面管理库(Surface Manager),主要负责管理针对显示系统的访问,具体用于在执行多个应用程序时候,负责管理显示与存取操作间的互动,另外也负责2D绘图与3D绘图进行显示合成。The library layer (Libraries) is the support of the application framework and an important link between the application framework layer and the Linux kernel layer. The function library layer includes some function libraries compiled by the computer program C language or C++ language, these function libraries can be used by different components in the Android operating system, and they provide services for developers through the Android application framework. Specifically, the function library includes the libc function library, which is specially customized for embedded Linux-based devices; the function library also includes the Android operating system multimedia library (Media Framework), which supports the playback and playback of audio/video in multiple encoding formats. Recording, while supporting still image files, as well as common audio/video encoding formats. The function library also includes the interface management library (Surface Manager), which is mainly responsible for managing access to the display system. It is specifically used to manage the interaction between display and access operations when multiple applications are executed. It is also responsible for 2D drawing and 3D. The drawing is displayed and synthesized.
函数库层中还包括其他的用于实现Android操作系统手机各个功能的函数库,例如:SGL(Scalable Graphics Library):基于XML(Extensible Markup Language)文件的2D图形图 像处理引擎;SSL(Secure Sockets Layer):位于TVP/IP协议(TransmissionControlProtocol/InternetProtocol,传输控制协议/互联网络协议)与各种应用层协议之间,为数据通讯提供支持;OpenGL/ES:3D效果的支持;SQLite:关系型数据库引擎;Webkit:Web浏览器引擎;FreeType:位图(Bitmap)及矢量(Vector)字体支持;等等。The function library layer also includes other function libraries for implementing various functions of Android operating system phones, such as: SGL (Scalable Graphics Library): 2D graphics and image processing engine based on XML (Extensible Markup Language) files; SSL (Secure Sockets Layer) ): Located between the TVP/IP protocol (TransmissionControlProtocol/InternetProtocol, Transmission Control Protocol/Internet Protocol) and various application layer protocols, providing support for data communication; OpenGL/ES: 3D effect support; SQLite: relational database engine ; Webkit: Web browser engine; FreeType: Bitmap and Vector font support; etc.
Android Runtime是一种在Android操作系统上的运行环境,是Android操作系统所使用的一种新的虚拟机。在Android Runtime中,采用AOT(Ahead-Of-Time)技术,应用程序在第一次安装的时候,该应用程序的字节码就会被预先编译成机器码,让程序成为真正的本地应用,之后再次运行,就省去了编译这一步骤,启动和执行都会变得更加快速。Android Runtime is a running environment on the Android operating system, and a new virtual machine used by the Android operating system. In Android Runtime, using AOT (Ahead-Of-Time) technology, when an application is installed for the first time, the bytecode of the application will be pre-compiled into machine code, making the program a real local application. After running it again, the compilation step is omitted, and the startup and execution will become faster.
在另外的一些情况下,Android Runtime也可以由核心函数库(Core Libraries)和Dalvik虚拟机(Dalvik Virtual Machine)代替。核心函数库提供了Java语言API(Application Programming Interface)中的大多数功能,主要通过JNI(Java Native Interface)的方式向应用程序框架层提供调用底层程序库的接口。同时也包含了Android的一些核心API,如android.os、android.net、android.media等等。Dalvik虚拟机使用一种JIT(Just-in-Time)的运行时编译的机制,每次启动一个进程都需要虚拟机在后台重新编译字节码,会对启动速度有一定的影响。每一个Android应用程序都运行在是一个Dalvik虚拟机中的实例中,每一个Dalvik虚拟机实例都是一个独立的进程空间。Dalvik虚拟机设计成在一个设备可以高效地运行多个虚拟机。Dalvik虚拟机可执行文件格式是.dex,dex格式是专为Dalvik设计的一种压缩格式,适合内存和处理器速度有限的系统。需要提出的是Dalvik虚拟机依赖于Linux内核提供基本功能(线程、底层内存管理)。可以理解的是,Android Runtime、Dalvik属于不同类型的虚拟机,本领域技术人员可以在不同情况下选用不同形式的虚拟机。In some other cases, Android Runtime can also be replaced by Core Libraries and Dalvik Virtual Machine. The core function library provides most of the functions in the Java language API (Application Programming Interface), and provides an interface to the application framework layer to call the underlying library through the JNI (Java Native Interface) method. It also contains some core APIs of Android, such as android.os, android.net, android.media and so on. The Dalvik virtual machine uses a JIT (Just-in-Time) runtime compilation mechanism. Every time a process is started, the virtual machine needs to recompile the bytecode in the background, which will have a certain impact on the startup speed. Every Android application runs in an instance in a Dalvik virtual machine, and each Dalvik virtual machine instance is an independent process space. The Dalvik virtual machine is designed to efficiently run multiple virtual machines on one device. The executable file format of the Dalvik virtual machine is .dex. The dex format is a compression format designed for Dalvik, suitable for systems with limited memory and processor speed. What needs to be mentioned is that the Dalvik virtual machine relies on the Linux kernel to provide basic functions (threads, low-level memory management). It is understandable that Android Runtime and Dalvik belong to different types of virtual machines, and those skilled in the art can choose different forms of virtual machines in different situations.
4、Linux内核层:4. Linux kernel layer:
Android的核心系统服务,如安全性、内存管理、进程管理、网络协议栈和驱动模型等都基于Linux内核。Linux内核同时也作为硬件和软件栈之间的抽象层。该层有许多与移动设备相关的驱动程序,主要的驱动有:显示驱动(Display Driver):基于Linux的帧缓冲(Frame Buffer)驱动。键盘驱动(KeyBoard Driver):作为输入设备的键盘驱动。Flash驱动(Flash Memory Driver):基于MTD(memory technology device内存技术设备)的Flash驱动程序。照相机驱动(Camera Driver):常用的基于Linux的v4l2(Video for Linux)驱动。音频驱动(Audio Driver):常用的基于ALSA(Advanced Linux Sound Architecture)的高级Linux声音体系驱动。蓝牙驱动(Bluetooth Driver):基于IEEE 802.15.1标准的无线传输技术。WiFi驱动(WiFi Drive):基于IEEE 802.11标准的驱动程序。Binder(IPC)驱动:Android的一个特殊的驱动程序,具有单独的设备节点,提供进程间通讯的功能。电源管理(Power Management):比如电池电量等。Android's core system services, such as security, memory management, process management, network protocol stack, and driver model, are all based on the Linux kernel. The Linux kernel also serves as an abstraction layer between the hardware and software stacks. This layer has many drivers related to mobile devices. The main drivers are: Display Driver: Linux-based Frame Buffer driver. Keyboard Driver (KeyBoard Driver): As the keyboard driver of the input device. Flash driver (Flash Memory Driver): Flash driver based on MTD (memory technology device). Camera Driver: A commonly used Linux-based v4l2 (Video for Linux) driver. Audio Driver: A commonly used advanced Linux sound system driver based on ALSA (Advanced Linux Sound Architecture). Bluetooth Driver: Wireless transmission technology based on IEEE 802.15.1 standard. WiFi Drive: A driver based on the IEEE 802.11 standard. Binder (IPC) driver: A special driver for Android that has a separate device node and provides the function of inter-process communication. Power Management: For example, battery power, etc.
在Android系统中,可以用位于应用程序框架层的WMS(Window Manager Service)服务来管理所有窗口,包括窗口的创建、删除和修改,以及窗口的大小、层级、焦点位置等。应用程序在Activity中添加、删除窗口,具体实现就是通过调用WindowManager类的addView()和removeView()函数完成,转而调用ViewRoot类的相关方法,然后通过IPC调用到WMS中的相关方法完成添加、删除过程。In the Android system, the WMS (Window Manager Service) service located in the application framework layer can be used to manage all windows, including the creation, deletion, and modification of windows, as well as the size, level, and focus position of the windows. The application adds and deletes windows in the Activity. The specific implementation is to call the addView() and removeView() functions of the WindowManager class, then call the related methods of the ViewRoot class, and then use the IPC to call the related methods in the WMS to complete the addition, Deletion process.
WindowManager.LayoutParams是WindowManager接口的嵌套类;它继承于ViewGroup.LayoutParams;它用于向WindowManager描述Window的管理策略。窗口的属性参数(layoutParams)可以包括type(窗口类型)和flag(对窗口的处理参数)。窗口的type(类型)可以分为Application Window,System Window,Sub Window.当某个进程向WMS申请一个Window的时候,需要告诉系统窗口的类型。对于Window的显示,层级越高,显示越前面。 常见的窗口的flag有:FLAG_KEEP_SCREEN_ON:屏幕常亮;FLAG_SHOW_WHEN_LOCKED:在锁屏的时候,显示该页面;FLAG_DISMISS_KEYGUARD:无密码时的解锁;FLAG_TURN_SCREEN_ON:把屏幕点亮;FLAG_FULLSCREEN:全屏,没有状态栏;FLAG_SECURE:窗口无法被截屏;FLAG_SCALED:按用户的要求调整窗口;FLAG_DIM_BEHIND:在窗口后面的东西,都将变暗;等等。WindowManager.LayoutParams is a nested class of WindowManager interface; it inherits from ViewGroup.LayoutParams; it is used to describe Window management strategy to WindowManager. The attribute parameters (layoutParams) of the window may include type (window type) and flag (processing parameters for the window). The type (type) of the window can be divided into Application Window, System Window, Sub Window. When a process applies for a Window from WMS, it needs to tell the system the type of window. For Window display, the higher the level, the more front the display. Common window flags are: FLAG_KEEP_SCREEN_ON: the screen is always on; FLAG_SHOW_WHEN_LOCKED: when the screen is locked, the page is displayed; FLAG_DISMISS_KEYGUARD: unlocks without a password; FLAG_TURN_SCREEN_ON: lights the screen; FLAG_FULLSCREEN: full screen, no status bar; The window cannot be screenshotted; FLAG_SCALED: adjust the window as required by the user; FLAG_DIM_BEHIND: everything behind the window will be darkened; etc.
为了达到快速解锁的目的,本申请可以用以下方法对锁屏窗口进行管理:In order to achieve the purpose of quick unlocking, this application can use the following methods to manage the lock screen window:
当每个应用启动时,WMS识别该应用的窗口属性中是否携带如下flag:WindowManager.LayoutParams.FLAG_SHOW_WHEN_LOCKED.如果有该flag,说明该窗口界面属于锁屏界面。这个flag能够让窗口在锁屏的时候,在锁屏之上显示。可以配合FLAG_KEEP_SCREEN_ON(保持屏幕常亮)和FLAG_DISMISS_KEYGUARD(解锁屏幕)等flag使用。When each application starts, WMS recognizes whether the window properties of the application carry the following flag: WindowManager.LayoutParams.FLAG_SHOW_WHEN_LOCKED. If there is this flag, it means that the window interface is a lock screen interface. This flag enables the window to be displayed on the lock screen when the screen is locked. It can be used with flags such as FLAG_KEEP_SCREEN_ON (keep the screen always on) and FLAG_DISMISS_KEYGUARD (unlock the screen).
例如,可以用如下代码给Activity的Window添加第三方锁屏窗口的属性:For example, you can use the following code to add the properties of a third-party lock screen window to the Activity Window:
在识别到系统或者应用提供的窗口为锁屏窗口后,可以在WMS中创建一个锁屏窗口栈,将识别到的锁屏窗口逐一加入到锁屏窗口栈里。例如,如果有多个第三方应用提供的多个第三方锁屏,可以把这些第三方锁屏都逐一加入到锁屏窗口栈里统一管理。同理,系统锁屏窗口也可以加入到该锁屏窗口栈里,和第三方锁屏一起管理。可以理解的是,在锁屏窗口栈里管理的锁屏界面仍然可以区分系统锁屏和第三方锁屏。该锁屏窗口栈里可以只有系统锁屏,也可以只有第三方锁屏,还可以既有系统锁屏也有第三方锁屏。After identifying that the window provided by the system or application is a lock screen window, you can create a lock screen window stack in WMS, and add the identified lock screen windows to the lock screen window stack one by one. For example, if there are multiple third-party lock screens provided by multiple third-party applications, you can add these third-party lock screens one by one to the lock screen window stack for unified management. In the same way, the system lock screen window can also be added to the lock screen window stack and managed together with the third-party lock screen. It is understandable that the lock screen managed in the lock screen window stack can still distinguish the system lock screen and the third-party lock screen. The lock screen window stack may only have the system lock screen, or only the third-party lock screen, or both the system lock screen and the third-party lock screen.
当接收到解锁指令后,系统对于锁屏窗口栈里管理的多个锁屏窗口进行管理,例如根据预设规则进行解锁。如果要对某个锁屏进行解锁,WMS在锁屏窗口栈里移除相应的锁屏窗口界面即可。After receiving the unlocking instruction, the system manages the multiple lock screen windows managed in the lock screen window stack, for example, unlocks according to a preset rule. If you want to unlock a certain lock screen, WMS can remove the corresponding lock screen window interface from the lock screen window stack.
图4提供了一种锁屏解锁的方法,该方法包括以下步骤:Figure 4 provides a method for unlocking the lock screen. The method includes the following steps:
401:移动终端接收解锁第一锁屏的第一解锁指令,该移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏。401: The mobile terminal receives a first unlocking instruction for unlocking the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application and a second lock screen provided by a second application.
移动终端上安装有第一应用和第二应用,这两个应用可以都是第三方应用,也可以都是系统应用,也可以一个是第三方应用一个是系统应用。这两个应用可以是移动终端出厂时自带的,也可以是用户在使用过程中安装的。第一应用可以提供第一锁屏,例如音乐应用提供如图1A所示的音乐锁屏界面,当移动终端的屏幕被用户点亮后,需要解锁该音乐锁屏界面。可选的,该音乐锁屏界面可以显示解锁的提示,例如手指右滑解锁;此时,当用户的手指在屏幕上向右滑动时,可以解锁该音乐锁屏界面。解锁的具体原理取决于操作系统的设置,例如对于Android系统的手机,解锁原理如上文所述,可以是WMS在锁屏窗口栈里移除该音乐锁屏窗口界面。The first application and the second application are installed on the mobile terminal. The two applications may both be third-party applications, or both may be system applications, or one may be a third-party application and the other may be a system application. These two applications can be built in the mobile terminal when it leaves the factory, or can be installed by the user during use. The first application may provide the first lock screen. For example, the music application provides a music lock screen interface as shown in FIG. 1A. When the screen of the mobile terminal is lit by the user, the music lock screen interface needs to be unlocked. Optionally, the music lock screen interface may display an unlocking prompt, for example, slide the finger to the right to unlock; at this time, when the user's finger slides to the right on the screen, the music lock screen interface can be unlocked. The specific principle of unlocking depends on the settings of the operating system. For example, for a mobile phone with an Android system, the unlocking principle is as described above, which can be that WMS removes the music lock screen window interface from the lock screen window stack.
可以理解的是,解锁第一锁屏的解锁方式取决于第一应用的设置。例如,第一应用设置第一锁屏的解锁指令为手指右滑解锁。可选的,用户也可以自定义设置第一锁屏的解锁方式,例如,用户可以对第一应用默认的解锁方式进行更改,比如设置为手指点击解锁。如前文所述,解锁方式既可以包括点击屏幕、手指滑动(可以是左滑、右滑、上滑、下滑、斜着滑等),也可以包括用图案、数字、手势、指纹、人脸、声纹或者混合密码来解锁,还可以使用实体或者虚拟按键及其组合来解锁,等等,此处不做限制。第一锁屏和第二锁屏的解锁方式可以相同,也可以不同。例如,第二应用是运动应用,提供的第二锁屏如图1B所示,解锁方式是向上滑动手指。对于Android系统的手机,可以是WMS在锁屏窗口栈里逐一加入第一锁屏和第二锁屏。加入的时间顺序不做限制,可以按应用启动的先后顺序,或者最后一次操作的先后顺序来排列加入锁屏窗口栈的顺序。针对已经设置的第一锁屏和第二锁屏,移动终端可以接收用户的第一解锁指令,该第一解锁指令用于解锁该第一锁屏。可以理解的是,该第一解锁指令符合第一应用设置的解锁方式。例如,对于上述的音乐锁屏,第一解锁指令可以是用户手指在屏幕上向右滑动。It is understandable that the unlocking method of unlocking the first lock screen depends on the setting of the first application. For example, the first application sets the unlocking instruction of the first lock screen to be unlocked by sliding the finger to the right. Optionally, the user can also customize the unlocking method of the first lock screen. For example, the user can change the default unlocking method of the first application, for example, set it to be unlocked by tapping with a finger. As mentioned earlier, the unlocking method can include tapping the screen, swiping your fingers (which can be left, right, up, down, diagonally, etc.), and can also include using patterns, numbers, gestures, fingerprints, faces, Voiceprint or mixed password to unlock, you can also use physical or virtual keys and their combination to unlock, etc., there is no restriction here. The unlocking methods of the first lock screen and the second lock screen may be the same or different. For example, the second application is a sports application, and the second lock screen provided is as shown in FIG. 1B, and the unlocking method is to slide the finger upwards. For mobile phones with Android system, WMS can add the first lock screen and the second lock screen to the lock screen window stack one by one. There is no restriction on the time sequence of joining. The order of joining the lock screen window stack can be arranged according to the order of application startup or the order of the last operation. For the first lock screen and the second lock screen that have been set, the mobile terminal may receive a user's first unlock instruction, and the first unlock instruction is used to unlock the first lock screen. It is understandable that the first unlocking instruction complies with the unlocking mode set by the first application. For example, for the aforementioned music lock screen, the first unlocking instruction may be that the user's finger slides to the right on the screen.
402:移动终端解锁第一锁屏和第二锁屏。402: The mobile terminal unlocks the first lock screen and the second lock screen.
在接收到解锁第一锁屏的第一解锁指令后,移动终端解锁第一锁屏和第二锁屏。值得注意的是,虽然该第一解锁指令是针对第一锁屏的,但同时解锁了第二锁屏。尽管该第二锁屏的解锁方式可能与第一锁屏的解锁方式不同,该第一解锁指令也可以解锁第二锁屏。当第二锁屏的解锁方式与第一锁屏的解锁方式相同时,该第一解锁指令也可以解锁第二锁屏,即一个解锁指令解锁了两个锁屏界面。可选的,第一锁屏可以覆盖在第二锁屏之上,此时解锁了第一锁屏后也解锁了第二锁屏;也可以是第二锁屏在第一锁屏之上,用户并不按第二锁屏的解锁方式,而是按照第一锁屏的解锁方式发出解锁指令,该解锁指令“穿过”第二锁屏解锁了第一锁屏,同时解锁了第二锁屏。在Android系统的手机上,可以是WMS在锁屏窗口栈里移除了第一锁屏和第二锁屏。After receiving the first unlocking instruction for unlocking the first lock screen, the mobile terminal unlocks the first lock screen and the second lock screen. It is worth noting that although the first unlocking instruction is for the first lock screen, it also unlocks the second lock screen. Although the unlocking manner of the second lock screen may be different from the unlocking manner of the first lock screen, the first unlock instruction can also unlock the second lock screen. When the unlocking method of the second lock screen is the same as the unlocking method of the first lock screen, the first unlock command can also unlock the second lock screen, that is, one unlock command unlocks two lock screen interfaces. Optionally, the first lock screen can be overlaid on the second lock screen. At this time, after the first lock screen is unlocked, the second lock screen is also unlocked; it can also be the second lock screen on top of the first lock screen. The user does not follow the unlocking method of the second lock screen, but sends an unlocking instruction according to the unlocking method of the first lock screen. The unlocking instruction "passes through" the second lock screen to unlock the first lock screen and unlock the second lock at the same time Screen. On Android phones, it can be that WMS removes the first lock screen and the second lock screen from the lock screen window stack.
在解锁第一锁屏和第二锁屏后,可以直接进入第一应用,或者显示系统桌面,此处不做限制。After unlocking the first lock screen and the second lock screen, you can directly enter the first application or display the system desktop. There is no restriction here.
通过上述方法,可以便捷的解锁多个第三方锁屏,而不需要用户逐一解锁每个第三方锁屏,提升了用户体验。Through the above method, multiple third-party lock screens can be easily unlocked without requiring the user to unlock each third-party lock screen one by one, which improves the user experience.
图5提供了另一种锁屏解锁的方法,包括以下步骤:Figure 5 provides another method of unlocking the lock screen, including the following steps:
501:移动终端接收解锁第一锁屏的第一解锁指令,该移动终端设置有第一应用提供的第一锁屏,第二应用提供的第二锁屏和第三应用提供的第三锁屏。501: The mobile terminal receives a first unlocking instruction to unlock the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application, a second lock screen provided by a second application, and a third lock screen provided by a third application .
例如,第三应用可以是词典应用,第三锁屏可以如图1C所示。该第三锁屏的解锁方式可以是向左滑动手指解锁。可以理解的是,第一锁屏、第二锁屏、第三锁屏的解锁方式可以全部相同、全部不同或者其中两个相同另外一个不同。对于Android系统的手机,可以是WMS在锁屏窗口栈里逐一加入第一锁屏、第二锁屏和第三锁屏。可选的,第一锁屏可以覆盖在第二锁屏和第三锁屏之上。For example, the third application may be a dictionary application, and the third lock screen may be as shown in FIG. 1C. The unlocking method of the third lock screen may be to unlock by sliding a finger to the left. It is understandable that the unlocking methods of the first lock screen, the second lock screen, and the third lock screen may be all the same, all different, or two of them are the same and the other is different. For mobile phones with Android system, WMS can add the first lock screen, the second lock screen, and the third lock screen to the lock screen window stack one by one. Optionally, the first lock screen may be overlaid on the second lock screen and the third lock screen.
502:移动终端解锁第一锁屏、第二锁屏和第三锁屏。502: The mobile terminal unlocks the first lock screen, the second lock screen, and the third lock screen.
虽然该第一解锁指令是针对第一锁屏的,但可以同时解锁第二锁屏、第三锁屏。也就是说,在用户解锁了第一锁屏后,系统自动解锁了第二锁屏和第三锁屏。在Android系统的手机上,可以是WMS在锁屏窗口栈里移除了第一锁屏、第二锁屏和第三锁屏。可选的,当第一锁屏在最上面时,用户解锁了第一锁屏后会自动解锁第二锁屏和第三锁屏。可以理解的是,第一锁屏也可以不是最上面的,而是在第二锁屏或者第三锁屏之下,此时第一解锁指令可以 “穿过”最上面的锁屏,而解锁不在最上面的第一锁屏,以及第二锁屏和第三锁屏。Although the first unlocking instruction is for the first lock screen, the second lock screen and the third lock screen can be unlocked at the same time. In other words, after the user unlocks the first lock screen, the system automatically unlocks the second lock screen and the third lock screen. On Android phones, it can be that WMS removes the first lock screen, the second lock screen, and the third lock screen from the lock screen window stack. Optionally, when the first lock screen is at the top, the user will automatically unlock the second lock screen and the third lock screen after unlocking the first lock screen. It is understandable that the first lock screen may not be the top one, but under the second lock screen or the third lock screen. At this time, the first unlock command can "pass through" the top lock screen and unlock The first lock screen that is not on the top, the second lock screen and the third lock screen.
在解锁第一锁屏、第二锁屏和第三锁屏后,可以直接进入第一应用,或者显示系统桌面,此处不做限制。After unlocking the first, second, and third lock screens, you can directly enter the first application or display the system desktop. There is no restriction here.
通过上述方法,可以便捷的解锁更多个第三方锁屏,而不需要用户逐一解锁每个第三方锁屏。Through the above method, more third-party lock screens can be easily unlocked without requiring the user to unlock each third-party lock screen one by one.
图6提供了另一种锁屏解锁的方法,包括以下步骤:Figure 6 provides another method for unlocking the lock screen, including the following steps:
601:移动终端接收解锁第一锁屏的第一解锁指令,该移动终端设置有第一应用提供的第一锁屏,第二应用提供的第二锁屏和系统提供的系统锁屏。601: The mobile terminal receives a first unlocking instruction for unlocking the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application, a second lock screen provided by a second application, and a system lock screen provided by the system.
其中,系统锁屏可以包括安全锁屏和非安全锁屏(如杂志锁屏),也可以只包括安全锁屏,也可以只包括非安全锁屏。对这些锁屏的上下顺序不做限制。Among them, the system lock screen may include a secure lock screen and a non-secure lock screen (such as a magazine lock screen), may only include a secure lock screen, or may only include a non-secure lock screen. There is no restriction on the up and down sequence of these lock screens.
602:移动终端解锁第一锁屏、第二锁屏、以及系统锁屏中的非安全锁屏。602: The mobile terminal unlocks the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen.
虽然该第一解锁指令是针对第一锁屏的,但可以同时解锁第一锁屏、第二锁屏、以及系统锁屏中的非安全锁屏。也就是说,在用户解锁了第一锁屏后,系统自动解锁了第二锁屏和系统锁屏中的非安全锁屏。在Android系统的手机上,可以是WMS在锁屏窗口栈里移除了第一锁屏、第二锁屏和系统锁屏中的非安全锁屏。Although the first unlocking instruction is for the first lock screen, the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen can be unlocked at the same time. That is, after the user unlocks the first lock screen, the system automatically unlocks the second lock screen and the non-secure lock screen in the system lock screen. On Android phones, it can be that WMS removes the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen from the lock screen window stack.
对于系统锁屏中的安全锁屏(如果存在的话),出于安全考虑,可以在解锁第一锁屏、第二锁屏、以及系统锁屏中的非安全锁屏后,要求用户解锁;用户成功解锁安全锁屏后,才能正常使用移动终端。当然,为了便捷的考虑,也可以在解锁第一锁屏、第二锁屏、以及系统锁屏中的非安全锁屏的同时,自动解锁安全锁屏。For the security lock screen in the system lock screen (if it exists), for security reasons, you can ask the user to unlock after unlocking the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen; users After successfully unlocking the security lock screen, the mobile terminal can be used normally. Of course, for the sake of convenience, it is also possible to automatically unlock the secure lock screen while unlocking the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen.
可选的,在步骤601之后、步骤602之前,可以包括步骤603:判断系统锁屏中是否包含安全锁屏。如果包含安全锁屏,则解锁第一锁屏、第二锁屏、以及系统锁屏中的非安全锁屏;如果不包含安全锁屏,则解锁第一锁屏、第二锁屏和系统锁屏。Optionally, after
在解锁第一锁屏、第二锁屏、以及系统锁屏中的非安全锁屏后,可以直接进入第一应用,或者显示系统桌面,此处不做限制。After unlocking the first lock screen, the second lock screen, and the non-secure lock screen in the system lock screen, you can directly enter the first application or display the system desktop, and there is no restriction here.
图7提供了另一种锁屏解锁的方法,包括以下步骤:Figure 7 provides another method of locking and unlocking the screen, including the following steps:
701:移动终端接收解锁系统锁屏的第二解锁指令,该移动终端设置有第一应用提供的第一锁屏,第二应用提供的第二锁屏和系统提供的系统锁屏。701: The mobile terminal receives a second unlocking instruction for unlocking the system lock screen. The mobile terminal is provided with a first lock screen provided by a first application, a second lock screen provided by a second application, and a system lock screen provided by the system.
其中,系统锁屏可以包括安全锁屏和非安全锁屏(如杂志锁屏),也可以只包括安全锁屏,也可以只包括非安全锁屏。对于第一锁屏、第二锁屏和系统锁屏的上下顺序不做限制。也就是说,系统锁屏可以在最上面,也可以不在最上面。第二解锁指令取决于系统的设定,例如当系统锁屏的解锁方式是输入密码解锁时,第二解锁指令就是输入相应的密码。Among them, the system lock screen may include a secure lock screen and a non-secure lock screen (such as a magazine lock screen), may only include a secure lock screen, or may only include a non-secure lock screen. There is no restriction on the up and down sequence of the first lock screen, the second lock screen, and the system lock screen. In other words, the system lock screen can be on the top or not on the top. The second unlocking instruction depends on the setting of the system. For example, when the unlocking method of the system lock screen is to enter a password to unlock, the second unlocking instruction is to enter a corresponding password.
702:移动终端解锁第一锁屏、第二锁屏和系统锁屏。702: The mobile terminal unlocks the first lock screen, the second lock screen, and the system lock screen.
可选的,当系统锁屏不在最上面时,第二解锁指令可以“穿过”系统锁屏上的其他锁屏,在解锁系统锁屏的同时解锁了第一锁屏和第二锁屏。在Android系统的手机上,可以是WMS在锁屏窗口栈里移除了第一锁屏、第二锁屏和系统锁屏。Optionally, when the system lock screen is not on the top, the second unlocking instruction may "pass through" other lock screens on the system lock screen, unlocking the first lock screen and the second lock screen while unlocking the system lock screen. On Android phones, it can be that WMS removes the first lock screen, the second lock screen, and the system lock screen from the lock screen window stack.
在解锁第一锁屏、第二锁屏和系统锁屏后,可以直接显示系统桌面,此处不做限制。After unlocking the first lock screen, the second lock screen, and the system lock screen, the system desktop can be displayed directly, and there is no restriction here.
图8提供了另一种锁屏解锁的方法,包括以下步骤:Figure 8 provides another method of locking and unlocking the screen, including the following steps:
801:移动终端接收解锁第一锁屏的第一解锁指令,该移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏。801: The mobile terminal receives a first unlocking instruction for unlocking the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application and a second lock screen provided by a second application.
802:移动终端判断所述第一解锁指令是否来自授权用户。802: The mobile terminal judges whether the first unlocking instruction comes from an authorized user.
授权用户,也可以叫做合法用户,是具有移动终端使用权限的机主本人。通过判断第一 解锁指令是否来自授权用户,可以给授权用户带来更大的操作便利。对于非授权用户,则可以不提供这一快速解锁的方法。An authorized user, also called a legal user, is the owner of the mobile terminal with the authority to use it. By judging whether the first unlocking instruction comes from an authorized user, it can bring greater operational convenience to the authorized user. For unauthorized users, this quick unlocking method may not be provided.
判断第一解锁指令是否来自授权用户的方法可以有多种,一种可用的方法可以是通过生理特征来验证。例如,可以通过指纹验证、人脸识别、虹膜识别、声纹验证等来验证是否是授权用户。可选的,移动终端可以采集相应的用户生理特征,和预存的授权用户生理特征进行对比,如果验证成功,则说明是授权用户发出的第一解锁指令。There may be multiple methods for judging whether the first unlocking instruction comes from an authorized user, and one available method may be verification through physiological characteristics. For example, fingerprint verification, face recognition, iris recognition, voiceprint verification, etc. can be used to verify whether the user is an authorized user. Optionally, the mobile terminal may collect corresponding user physiological characteristics and compare them with pre-stored authorized user physiological characteristics. If the verification is successful, it means that the first unlocking instruction issued by the authorized user is indicated.
可选的,也可以通过验证用户使用习惯来判断第一解锁指令是否来自授权用户。例如,移动终端可以记录授权用户使用移动终端的历史情况,通过统计得出授权用户使用移动终端的使用规律(在统计过程中可以剔除一些不符合使用规律的用户操作行为)。例如,授权用户常在早上7:30-9:00之间在家里使用移动终端,以及在中午12:00-14:00在公司使用移动终端,移动终端可以统计出授权用户在时间和地点两个维度的使用习惯。在接收到第一解锁指令后,移动终端可以检测接收到第一解锁指令的时间和地点,和授权用户的使用习惯进行对比,如果符合,则说明第一解锁指令有较大概率是授权用户发出的。Optionally, it is also possible to determine whether the first unlocking instruction comes from an authorized user by verifying the user's usage habits. For example, the mobile terminal can record the history of authorized users to use the mobile terminal, and obtain the usage law of authorized users to use the mobile terminal through statistics (some user operation behaviors that do not conform to the usage law can be eliminated in the statistical process). For example, authorized users often use mobile terminals at home between 7:30-9:00 in the morning, and use mobile terminals at the company from 12:00-14:00 at noon. The mobile terminal can count the time and place of authorized users. Habits of the use of three dimensions. After receiving the first unlocking instruction, the mobile terminal can detect the time and place when the first unlocking instruction is received, and compare it with the authorized user's usage habits. If it meets the requirements, it means that the first unlocking instruction is more likely to be issued by the authorized user of.
803:如果所述第一解锁指令来自授权用户,移动终端解锁第一锁屏和第二锁屏。803: If the first unlocking instruction comes from an authorized user, the mobile terminal unlocks the first lock screen and the second lock screen.
如果第一解锁指令来自授权用户,则自动解锁第一锁屏和第二锁屏,改善了授权用户的使用体验。If the first unlocking instruction comes from an authorized user, the first lock screen and the second lock screen are automatically unlocked, which improves the use experience of the authorized user.
图9提供了另一种锁屏解锁的方法,包括以下步骤:Figure 9 provides another method of locking and unlocking the screen, including the following steps:
901:移动终端接收解锁第一锁屏的第一解锁指令,该移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏。901: The mobile terminal receives a first unlocking instruction for unlocking the first lock screen, and the mobile terminal is provided with a first lock screen provided by a first application and a second lock screen provided by a second application.
902:移动终端检测所述第一锁屏的锁定时间和接收到所述第一解锁指令的接收时间之间的时间间隔,判断所述时间间隔是否在预设时间间隔内。902: The mobile terminal detects the time interval between the lock time of the first screen lock and the reception time of receiving the first unlocking instruction, and determines whether the time interval is within a preset time interval.
如果用户刚使用过移动终端,如果时隔不久再次使用移动终端,遇到多次解锁的情况用户体验会比较差;而且用户刚才使用过移动终端,是授权用户的可能性较大。所以对于刚才使用过移动终端这种情况,可以自动解锁多个锁屏以提升用户体验。为了判断是否刚才使用过移动终端,可以检测两个时间点之间的时间间隔,两个时间点包括:(1)第一锁屏施加在系统上锁定移动终端的锁定时间;(2)移动终端接收到第一解锁指令的接收时间。如果这两个时间点之间的时间间隔在预设时间间隔之内(比如1分钟),则说明用户刚才使用过移动终端。If the user has just used the mobile terminal, if the mobile terminal is used again after a short period of time, the user experience will be poor if it is unlocked multiple times; and the user has used the mobile terminal just now, it is more likely to be an authorized user. Therefore, in the case of using a mobile terminal just now, multiple lock screens can be automatically unlocked to improve user experience. In order to determine whether the mobile terminal has just been used, the time interval between two time points can be detected. The two time points include: (1) the lock time of the first screen lock to lock the mobile terminal on the system; (2) the mobile terminal The time when the first unlocking instruction was received. If the time interval between these two time points is within the preset time interval (for example, 1 minute), it means that the user has just used the mobile terminal.
903:如果所述时间间隔在预设时间间隔内,移动终端解锁第一锁屏和第二锁屏。903: If the time interval is within the preset time interval, the mobile terminal unlocks the first lock screen and the second lock screen.
如果在预设时间间隔之内,则说明用户刚才使用过移动终端,移动终端自动解锁第一锁屏和第二锁屏,方便用户的使用。If it is within the preset time interval, it means that the user has just used the mobile terminal, and the mobile terminal automatically unlocks the first lock screen and the second lock screen, which is convenient for the user to use.
本申请还提供一种锁屏解锁的方法,包括:This application also provides a method for unlocking the lock screen, including:
移动终端接收解锁第一锁屏的第一解锁指令,该移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏;该移动终端解锁第一锁屏和第二锁屏。The mobile terminal receives a first unlocking instruction for unlocking the first lock screen. The mobile terminal is provided with the first lock screen provided by the first application and the second lock screen provided by the second application; the mobile terminal unlocks the first lock screen and the second lock screen. Lock screen.
可选的,移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏,具体为:移动终端创建锁屏窗口栈;移动终端识别是否存在锁屏;移动终端将识别到的第一锁屏和第二锁屏加入到锁屏窗口栈。Optionally, the mobile terminal is provided with a first lock screen provided by the first application and a second lock screen provided by the second application, specifically: the mobile terminal creates a lock screen window stack; the mobile terminal recognizes whether there is a lock screen; the mobile terminal will The identified first lock screen and second lock screen are added to the lock screen window stack.
可选的,锁屏窗口栈是移动终端通过WMS(Window Manager Service)服务创建的;移动终端识别是否存在锁屏,具体为:WMS服务识别应用的窗口属性中是否携带WindowManager.LayoutParams.FLAG_SHOW_WHEN_LOCKED的flag.Optionally, the lock screen window stack is created by the mobile terminal through the WMS (Window Manager Service) service; the mobile terminal recognizes whether there is a lock screen, specifically: WMS service recognizes whether the window attribute of the application carries the flag of WindowManager.LayoutParams.FLAG_SHOW_WHEN_LOCKED .
可选的,第一锁屏和第二锁屏的解锁方式相同。Optionally, the unlocking method of the first lock screen and the second lock screen are the same.
可选的,第一锁屏和第二锁屏的解锁方式不同。Optionally, the unlocking methods of the first lock screen and the second lock screen are different.
可选的,第一锁屏覆盖在第二锁屏之上。Optionally, the first lock screen is overlaid on the second lock screen.
可选的,第二锁屏覆盖在第一锁屏之上。Optionally, the second lock screen is overlaid on the first lock screen.
可选的,移动终端解锁第一锁屏和第二锁屏,具体为:移动终端通过WMS服务在锁屏窗口栈里移除第一锁屏和第二锁屏。Optionally, the mobile terminal unlocks the first lock screen and the second lock screen, specifically: the mobile terminal removes the first lock screen and the second lock screen from the lock screen window stack through the WMS service.
可选的,在移动终端解锁第一锁屏和第二锁屏之后,移动终端进入第一应用,或者显示移动终端的系统桌面。Optionally, after the mobile terminal unlocks the first lock screen and the second lock screen, the mobile terminal enters the first application or displays the system desktop of the mobile terminal.
可选的,在移动终端解锁第一锁屏和第二锁屏之前,移动终端判断第一解锁指令是否来自授权用户。Optionally, before the mobile terminal unlocks the first lock screen and the second lock screen, the mobile terminal determines whether the first unlocking instruction comes from an authorized user.
可选的,移动终端判断第一解锁指令是否来自授权用户,具体为:移动终端采集用户生理特征,和预存的授权用户的生理特征进行对比,如果验证成功,则判断是授权用户发出的所述第一解锁指令。Optionally, the mobile terminal determines whether the first unlocking instruction comes from an authorized user, specifically: the mobile terminal collects the user's physiological characteristics and compares it with the pre-stored authorized user's physiological characteristics, and if the verification is successful, it is determined that the authorization is issued by the authorized user. The first unlock instruction.
可选的,移动终端判断第一解锁指令是否来自授权用户,具体为:移动终端检测接收到第一解锁指令的时间和地点,和授权用户的使用习惯进行对比,如果符合,则判断是授权用户发出的所述第一解锁指令。Optionally, the mobile terminal determines whether the first unlocking instruction comes from an authorized user, specifically: the mobile terminal detects the time and place when the first unlocking instruction is received, and compares it with the authorized user's usage habits, and if it matches, it is determined to be an authorized user The first unlocking instruction issued.
可选的,在移动终端解锁第一锁屏和第二锁屏之前,还包括:移动终端检测第一锁屏的锁定时间和接收到第一解锁指令的接收时间之间的时间间隔,判断时间间隔是否在预设时间间隔内。Optionally, before the mobile terminal unlocks the first lock screen and the second lock screen, the method further includes: the time interval between the mobile terminal detecting the lock time of the first lock screen and the receiving time of receiving the first unlocking instruction, and the judgment time Whether the interval is within the preset time interval.
图10提供了一种移动终端,该移动终端设置有第一应用提供的第一锁屏和第二应用提供的第二锁屏,该移动终端包括接收模块1001和解锁模块1002,其中:接收模块1001,用于接收解锁第一锁屏的第一解锁指令;解锁模块1002,用于解锁第一锁屏和第二锁屏。Figure 10 provides a mobile terminal provided with a first lock screen provided by a first application and a second lock screen provided by a second application. The mobile terminal includes a
可选的,第一锁屏和第二锁屏的解锁方式相同。Optionally, the unlocking method of the first lock screen and the second lock screen are the same.
可选的,第一锁屏和第二锁屏的解锁方式不同。Optionally, the unlocking methods of the first lock screen and the second lock screen are different.
可选的,第一锁屏覆盖在第二锁屏之上。Optionally, the first lock screen is overlaid on the second lock screen.
可选的,第二锁屏覆盖在第一锁屏之上。Optionally, the second lock screen is overlaid on the first lock screen.
可选的,移动终端还包括处理模块,处理模块用于:进入所述第一应用,或者显示移动终端的系统桌面。Optionally, the mobile terminal further includes a processing module, which is used to enter the first application or display the system desktop of the mobile terminal.
可选的,移动终端还包括判断模块,判断模块用于:在解锁模块解锁第一锁屏和第二锁屏之前,判断第一解锁指令是否来自授权用户。Optionally, the mobile terminal further includes a judgment module configured to judge whether the first unlocking instruction comes from an authorized user before the unlocking module unlocks the first lock screen and the second lock screen.
可选的,判断所述第一解锁指令是否来自授权用户,具体为:判断模块采集用户生理特征,和预存的授权用户的生理特征进行对比,如果验证成功,则判断是授权用户发出的第一解锁指令。Optionally, judging whether the first unlocking instruction comes from an authorized user is specifically: the judging module collects the user's physiological characteristics and compares it with the pre-stored physiological characteristics of the authorized user. If the verification is successful, it is determined that it is the first issued by the authorized user. Unlock instruction.
可选的,判断所述第一解锁指令是否来自授权用户,具体为:判断模块检测接收到所述第一解锁指令的时间和地点,和授权用户的使用习惯进行对比,如果符合,则判断是授权用户发出的第一解锁指令。Optionally, judging whether the first unlocking instruction comes from an authorized user, specifically: the judging module detects the time and place when the first unlocking instruction is received, comparing it with the authorized user’s usage habits, and if it matches, then judging yes The first unlocking instruction issued by an authorized user.
可选的,移动终端还包括判断模块,判断模块用于:在解锁模块解锁第一锁屏和第二锁屏之前,检测第一锁屏的锁定时间和接收到第一解锁指令的接收时间之间的时间间隔,判断时间间隔是否在预设时间间隔内。Optionally, the mobile terminal further includes a judging module, the judging module is configured to: before the unlocking module unlocks the first lock screen and the second lock screen, detect the lock time of the first lock screen and the receiving time of the first unlocking instruction. Determine whether the time interval is within the preset time interval.
本申请还提供另一种移动终端,所述移动终端包括一个或多个处理器,存储器,一个或多个程序;其中,一个或多个程序被存储在存储器中并被配置为被一个或多个处理器执行,这一个或多个程序包括指令,该指令用于执行上述图4-图9所述的方法。This application also provides another mobile terminal. The mobile terminal includes one or more processors, a memory, and one or more programs; wherein, one or more programs are stored in the memory and configured to be configured by one or more Executed by a processor, the one or more programs include instructions, and the instructions are used to execute the methods described in FIGS. 4 to 9 above.
本申请还提供一种存储介质,用于存储计算机软件指令,该指令用于执行上述图4-图9所述的方法。The present application also provides a storage medium for storing computer software instructions, and the instructions are used to execute the methods described in FIGS. 4 to 9 above.
本申请还提供一种计算机程序产品,当运行所述计算机程序产品时,使得计算机执行上述图4-图9所述的方法。This application also provides a computer program product, which when running the computer program product, causes the computer to execute the method described in FIGS. 4 to 9 above.
通过以上实施方式的描述,所属领域的技术人员可以了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。Through the description of the above embodiments, those skilled in the art can understand that for the convenience and conciseness of the description, only the division of the above-mentioned functional modules is used as an example for illustration. In practical applications, the above-mentioned functions can be assigned to different functions as required. The function module is completed, that is, the internal structure of the device is divided into different function modules to complete all or part of the functions described above.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed device and method can be implemented in other ways. For example, the device embodiments described above are merely illustrative. For example, the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be divided. It can be combined or integrated into another device, or some features can be omitted or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate parts may or may not be physically separate. The parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium. Based on this understanding, the technical solutions of the embodiments of the present application are essentially or the part that contributes to the prior art, or all or part of the technical solutions can be embodied in the form of a software product, and the software product is stored in a storage medium. It includes several instructions to make a device (may be a single-chip microcomputer, a chip, etc.) or a processor (processor) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read only memory (read only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes.
以上内容,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above content is only the specific implementation of this application, but the protection scope of this application is not limited to this. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in this application. Covered in the scope of protection of this application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.
Claims (26)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911007620.7A CN110995917A (en) | 2019-10-22 | 2019-10-22 | Method and mobile terminal for locking screen and unlocking |
| CN201911007620.7 | 2019-10-22 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2021078160A1 true WO2021078160A1 (en) | 2021-04-29 |
Family
ID=70082252
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2020/122522 Ceased WO2021078160A1 (en) | 2019-10-22 | 2020-10-21 | Lock screen unlocking method and mobile terminal |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN110995917A (en) |
| WO (1) | WO2021078160A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115113774A (en) * | 2022-06-28 | 2022-09-27 | 上海中汇亿达金融信息技术有限公司 | Screen locking and unlocking method and related device |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110995917A (en) * | 2019-10-22 | 2020-04-10 | 华为技术有限公司 | Method and mobile terminal for locking screen and unlocking |
| CN113973150B (en) | 2020-07-22 | 2023-03-10 | 华为技术有限公司 | A method for displaying a lock screen interface of an electronic device and the electronic device |
| CN113114840A (en) * | 2021-03-28 | 2021-07-13 | 武汉卡比特信息有限公司 | Power-saving screen locking method based on Android mobile phone interconnection |
| CN114020338B (en) * | 2021-10-29 | 2024-12-27 | 郑州阿帕斯数云信息科技有限公司 | Method and device for calling third-party lock screen service |
| CN119783075A (en) * | 2024-12-11 | 2025-04-08 | 上海小传科技有限公司 | Control method, intelligent terminal and storage medium |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110041102A1 (en) * | 2009-08-11 | 2011-02-17 | Jong Hwan Kim | Mobile terminal and method for controlling the same |
| TW201229813A (en) * | 2011-01-13 | 2012-07-16 | Htc Corp | Portable electronic device, and control method and computer program product of the same |
| CN103176714A (en) * | 2012-04-24 | 2013-06-26 | 微软公司 | Direct access to application from locked screen |
| EP2693359A2 (en) * | 2012-08-01 | 2014-02-05 | Samsung Electronics Co., Ltd | Mobile device, and method for releasing lock of the mobile device via handwriting recognition |
| CN106502489A (en) * | 2016-09-14 | 2017-03-15 | 深圳众思科技有限公司 | A kind of quick release simultaneously enters the method and device of application |
| CN110995917A (en) * | 2019-10-22 | 2020-04-10 | 华为技术有限公司 | Method and mobile terminal for locking screen and unlocking |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102214974B1 (en) * | 2013-08-29 | 2021-02-10 | 삼성전자주식회사 | Apparatus and method for fulfilling functions related to user input of note-taking pattern on lock screen |
| CN103744731A (en) * | 2014-02-14 | 2014-04-23 | 贝壳网际(北京)安全技术有限公司 | Screen locking interface shielding method and device |
| CN105389487B (en) * | 2015-11-11 | 2018-02-16 | 北京麒麟合盛网络技术有限公司 | A kind of method and device of third party's screen lock application message displaying |
| US10380826B2 (en) * | 2016-10-21 | 2019-08-13 | Disney Enterprises, Inc. | Systems and methods for unlocking user interface elements |
| CN106778176B (en) * | 2016-12-26 | 2020-07-07 | 努比亚技术有限公司 | Information processing method and mobile terminal |
| CN107643871A (en) * | 2017-10-13 | 2018-01-30 | 广东欧珀移动通信有限公司 | Screen display control method and device, storage medium and mobile terminal |
| CN108363915A (en) * | 2018-02-08 | 2018-08-03 | 广东欧珀移动通信有限公司 | unlocking method, mobile terminal and computer readable storage medium |
| CN109819114B (en) * | 2019-02-20 | 2021-11-30 | 北京市商汤科技开发有限公司 | Screen locking processing method and device, electronic equipment and storage medium |
| CN109889664A (en) * | 2019-02-26 | 2019-06-14 | 上海连尚网络科技有限公司 | It is a kind of for providing the method and apparatus of the locking screen interface of application on a user device |
-
2019
- 2019-10-22 CN CN201911007620.7A patent/CN110995917A/en active Pending
-
2020
- 2020-10-21 WO PCT/CN2020/122522 patent/WO2021078160A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110041102A1 (en) * | 2009-08-11 | 2011-02-17 | Jong Hwan Kim | Mobile terminal and method for controlling the same |
| TW201229813A (en) * | 2011-01-13 | 2012-07-16 | Htc Corp | Portable electronic device, and control method and computer program product of the same |
| CN103176714A (en) * | 2012-04-24 | 2013-06-26 | 微软公司 | Direct access to application from locked screen |
| EP2693359A2 (en) * | 2012-08-01 | 2014-02-05 | Samsung Electronics Co., Ltd | Mobile device, and method for releasing lock of the mobile device via handwriting recognition |
| CN106502489A (en) * | 2016-09-14 | 2017-03-15 | 深圳众思科技有限公司 | A kind of quick release simultaneously enters the method and device of application |
| CN110995917A (en) * | 2019-10-22 | 2020-04-10 | 华为技术有限公司 | Method and mobile terminal for locking screen and unlocking |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115113774A (en) * | 2022-06-28 | 2022-09-27 | 上海中汇亿达金融信息技术有限公司 | Screen locking and unlocking method and related device |
| CN115113774B (en) * | 2022-06-28 | 2023-10-24 | 上海中汇亿达金融信息技术有限公司 | Screen locking and unlocking method and related device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN110995917A (en) | 2020-04-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2021078160A1 (en) | Lock screen unlocking method and mobile terminal | |
| JP6997343B2 (en) | How to quickly open an application or application function, and a terminal | |
| CN101866299B (en) | Method and system for modifying the execution of a native application running on a portable electronic device | |
| US12032820B2 (en) | Fast data copying method and electronic device | |
| EP3454248B1 (en) | Application decryption method, terminal and non-transitory computer-readable storage medium | |
| WO2019178869A1 (en) | Method for opening esim card account, and terminal | |
| WO2019227450A1 (en) | Application function implementation method and electronic device | |
| CN110365721A (en) | A method, terminal device and system for triggering services based on user scene perception | |
| CN113018868B (en) | Cloud game login method, device and system | |
| CN113485627A (en) | Display method of application window and terminal | |
| WO2017193496A1 (en) | Application data processing method and apparatus, and terminal device | |
| CN111656347B (en) | Project display method and terminal | |
| US11991040B2 (en) | Network configuration method and device | |
| WO2017211205A1 (en) | Method and device for updating whitelist | |
| CN114610197A (en) | Display method and terminal during application quitting | |
| EP4187420A1 (en) | Resource management method, computing device, computing equipment, and readable storage medium | |
| WO2020006669A1 (en) | Icon switching method, method for displaying gui, and electronic device | |
| WO2021027772A1 (en) | Method for switching running of application and device | |
| CN108780400B (en) | Data processing method and electronic equipment | |
| CN116431138B (en) | Component template building method and device and form building method and device | |
| JP7319431B2 (en) | Application function implementation method and electronic device | |
| CN107851140B (en) | Method and device for generating password using pressure touch | |
| CN111656346B (en) | A display method and terminal | |
| CN115993993A (en) | Cold start method and related equipment | |
| CN117131533A (en) | Methods and electronic devices for opening files |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20879527 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20879527 Country of ref document: EP Kind code of ref document: A1 |