技术领域technical field
本发明涉及远程控制技术,更具体地说,涉及一种终端设备的远程控制方法和系统。The present invention relates to remote control technology, and more specifically, to a remote control method and system for terminal equipment.
背景技术Background technique
终端设备,例如电脑和手机,都需要在终端设备上进行操作才能实现锁屏以及解锁。若用户离开终端设备时忘记进行锁屏操作,在未达到终端设备自动锁屏的等待时间时,任何人都可以操作终端设备,这样就可能导致终端用户的信息泄露。当用户离开终端设备时已经将终端设备锁屏,或者终端设备完成了自动锁屏,若解锁密码泄露,他人也可以通过解锁密码在终端用户不知情的情况下登录、操作终端设备,无法保证终端设备的信息安全。Terminal devices, such as computers and mobile phones, need to be operated on the terminal device to realize locking and unlocking of the screen. If the user forgets to lock the screen when leaving the terminal device, anyone can operate the terminal device before the waiting time for the automatic screen lock of the terminal device is reached, which may lead to information leakage of the terminal user. When the user leaves the terminal device, the terminal device has been locked, or the terminal device has automatically locked the screen. If the unlock password is leaked, others can also log in and operate the terminal device through the unlock password without the knowledge of the terminal user. Device information security.
发明内容Contents of the invention
本发明针对现有的终端设备的锁屏及解锁方法,在用户离开终端设备时,无法保证终端设备的信息安全的缺陷,提供一种终端设备的远程控制方法和系统,能够在用户离开终端设备时,通过远程的方式控制终端设备锁屏,并在有人试图解锁终端设备时通知终端用户,若得到终端用户许可则解锁终端设备,有效地保护了终端设备的信息安全。The present invention aims at the defect that the existing terminal device lock screen and unlocking method cannot guarantee the information security of the terminal device when the user leaves the terminal device, and provides a remote control method and system for the terminal device, which can At the same time, the lock screen of the terminal device is controlled remotely, and the terminal user is notified when someone tries to unlock the terminal device, and the terminal device is unlocked if the terminal user's permission is obtained, which effectively protects the information security of the terminal device.
本发明解决其技术问题采用的技术方案是:提供一种终端设备的远程控制方法,包括以下步骤:The technical solution adopted by the present invention to solve the technical problem is to provide a remote control method for terminal equipment, comprising the following steps:
S1、通过控制终端向目标终端发送锁屏指令,以使所述目标终端锁屏;S1. Sending a screen lock instruction to the target terminal through the control terminal, so that the target terminal locks the screen;
S2、当所述目标终端接收到密码输入时,验证输入的密码;S2. When the target terminal receives a password input, verify the input password;
S3、当密码验证通过时,所述目标终端向所述控制终端发送解锁请求,并在接收到所述控制终端返回的确认指令后完成解锁。S3. When the password verification is passed, the target terminal sends an unlocking request to the control terminal, and completes unlocking after receiving a confirmation instruction returned by the control terminal.
优选地,步骤S1包括以下子步骤:Preferably, step S1 includes the following sub-steps:
S11、当接收到所述锁屏指令时,所述目标终端判断是否设置了解锁密码,若是则执行子步骤S12,否则执行子步骤S13;S11. When receiving the lock screen instruction, the target terminal judges whether an unlock password is set, and if so, executes substep S12, otherwise executes substep S13;
S12、所述目标终端完成锁屏;S12. The target terminal finishes locking the screen;
S13、所述目标终端向所述控制终端发送解锁密码设置请求,并将所述控制终端返回的密码作为解锁密码,完成锁屏。S13. The target terminal sends an unlock password setting request to the control terminal, and uses the password returned by the control terminal as the unlock password to complete the screen lock.
优选地,步骤S3包括以下子步骤:Preferably, step S3 includes the following sub-steps:
S31、当密码验证通过时,所述目标终端获取其操作人信息;S31. When the password verification is passed, the target terminal acquires its operator information;
S32、所述目标终端将所述操作人信息以及所述解锁请求发送到所述控制终端;S32. The target terminal sends the operator information and the unlock request to the control terminal;
S33、若接收到所述控制终端返回的确认指令,所述目标终端完成解锁;S33. If the confirmation instruction returned by the control terminal is received, the target terminal completes unlocking;
S34、若接收到所述控制终端返回的拒绝指令,所述目标终端维持锁屏。S34. If a rejection instruction returned by the control terminal is received, the target terminal keeps the screen locked.
优选地,本发明的终端设备的远程控制方法还包括以下步骤:Preferably, the remote control method of the terminal device of the present invention further includes the following steps:
S4、当密码未通过验证时,发送提示信息到所述控制终端。S4. When the password fails to pass the verification, send a prompt message to the control terminal.
优选地,步骤S4包括以下子步骤:Preferably, step S4 includes the following sub-steps:
S41、判断密码未通过验证的次数是否大于或者等于预设的阈值,若是则发送提示信息到所述控制终端。S41. Determine whether the number of times the password has not passed the verification is greater than or equal to a preset threshold, and if so, send a prompt message to the control terminal.
提供一种终端设备的远程控制系统,包括:A remote control system for terminal equipment is provided, including:
锁屏单元,用于接收控制终端向目标终端发送的锁屏指令,并在接收到所述锁屏指令时,锁屏所述目标终端;A screen lock unit, configured to receive a screen lock instruction sent from the control terminal to the target terminal, and when receiving the screen lock instruction, lock the screen of the target terminal;
密码验证单元,用于在所述目标终端接收到密码输入时,验证输入的密码;A password verification unit, configured to verify the input password when the target terminal receives a password input;
解锁单元,用于在密码验证通过时,通过所述目标终端向所述控制终端发送解锁请求,并在接收到所述控制终端返回的确认指令后完成解锁。The unlocking unit is configured to send an unlocking request to the control terminal through the target terminal when the password verification is passed, and complete unlocking after receiving a confirmation instruction returned by the control terminal.
优选地,所述锁屏单元包括:Preferably, the lock screen unit includes:
锁屏指令接收模块,用于接收控制终端向目标终端发送的锁屏指令;A screen lock command receiving module, configured to receive a screen lock command sent from the control terminal to the target terminal;
第一判断模块,用于在接收到所述锁屏指令时,判断所述目标终端是否设置了解锁密码;A first judging module, configured to judge whether an unlock password is set for the target terminal when receiving the screen lock instruction;
第一锁屏模块,用于在所述目标终端设置了解锁密码时,使所述目标终端完成锁屏;A first screen lock module, configured to enable the target terminal to complete the screen lock when an unlock password is set for the target terminal;
第二锁屏模块,用于在所述目标终端未设置解锁密码时,通过所述目标终端向所述控制终端发送解锁密码设置请求,并将所述控制终端返回的密码作为解锁密码,完成锁屏。The second lock screen module is used to send an unlock password setting request to the control terminal through the target terminal when the target terminal has not set an unlock password, and use the password returned by the control terminal as the unlock password to complete the lock Screen.
优选地,所述解锁单元包括:Preferably, the unlocking unit includes:
操作人信息获取模块,用于在密码验证通过时,获取所述目标终端的操作人信息;An operator information acquisition module, configured to acquire the operator information of the target terminal when the password verification is passed;
解锁请求模块,用于将所述操作人信息以及所述解锁请求发送到所述控制终端;an unlock request module, configured to send the operator information and the unlock request to the control terminal;
解锁模块,用于在接收到所述控制终端返回的确认指令时,使所述目标终端完成解锁;An unlocking module, configured to enable the target terminal to complete unlocking when receiving the confirmation instruction returned by the control terminal;
锁屏维持模块,用于在接收到所述控制终端返回的拒绝指令时,使所述目标终端维持锁屏。A lock screen maintaining module, configured to enable the target terminal to maintain the lock screen when receiving a rejection instruction returned by the control terminal.
优选地,本发明的终端设备的远程控制系统还包括:Preferably, the remote control system of the terminal equipment of the present invention further includes:
提示单元,用于在密码未通过验证时,发送提示信息到所述控制终端。A prompting unit, configured to send prompt information to the control terminal when the password fails the verification.
优选地,所述提示单元包括:Preferably, the prompt unit includes:
第二判断模块,用于判断密码未通过验证的次数是否大于或者等于预设的阈值;The second judging module is used to judge whether the number of times that the password has not passed the verification is greater than or equal to a preset threshold;
提示模块,用于在密码未通过验证的次数大于或者等于预设的阈值时,发送提示信息到所述控制终端。A prompting module, configured to send prompting information to the control terminal when the number of times the password fails verification is greater than or equal to a preset threshold.
本发明的终端设备的远程控制方法和系统具有以下有益效果:能够在用户离开目标终端时,通过控制终端远程控制目标终端锁屏,并在有人试图解锁目标终端时通知控制终端,在得到控制终端的确认指令后才能完成解锁目标终端,有效地保护了目标终端的信息安全。The remote control method and system for terminal equipment of the present invention have the following beneficial effects: when the user leaves the target terminal, the target terminal can be remotely controlled through the control terminal to lock the screen, and when someone tries to unlock the target terminal, the control terminal will be notified. The unlocking of the target terminal can only be completed after the confirmation command, which effectively protects the information security of the target terminal.
附图说明Description of drawings
图1为本发明的终端设备的远程控制方法第一实施例的流程图;FIG. 1 is a flowchart of a first embodiment of a remote control method for a terminal device according to the present invention;
图2为本发明的终端设备的远程控制方法第三实施例的流程图;FIG. 2 is a flow chart of a third embodiment of a remote control method for a terminal device according to the present invention;
图3为本发明的终端设备的远程控制系统第一实施例的功能框图;3 is a functional block diagram of the first embodiment of the remote control system of the terminal device of the present invention;
图4为本发明的终端设备的远程控制系统第二实施例中解锁单元的功能框图;4 is a functional block diagram of the unlocking unit in the second embodiment of the remote control system of the terminal device of the present invention;
图5为本发明的终端设备的远程控制系统第三实施例的功能框图。FIG. 5 is a functional block diagram of a third embodiment of the remote control system of a terminal device according to the present invention.
具体实施方式detailed description
为了解决现有的终端设备的锁屏及解锁方法,对于未设置锁屏的终端设备,在用户离开终端设备时,无法保证终端设备的信息安全的缺陷,以及对于设置了锁屏的终端设备,在用户离开终端设备后,在终端设备自动锁屏的等待时间内无法保证终端设备的信息安全的缺陷,提供一种终端设备的远程控制方法和系统,能够在用户离开终端设备时,通过远程的方式控制终端设备锁屏,并在有人试图解锁终端设备时通知终端用户,并在得到终端用户许可的情况下完成解锁终端设备,有效地保护了终端设备的信息安全。In order to solve the existing lock screen and unlocking methods of terminal equipment, for terminal equipment without a lock screen, when the user leaves the terminal equipment, the defect of information security of the terminal equipment cannot be guaranteed, and for terminal equipment with a lock screen, After the user leaves the terminal device, the information security of the terminal device cannot be guaranteed during the waiting time for the terminal device to automatically lock the screen. A remote control method and system for the terminal device are provided, which can be used when the user leaves the terminal device. The method controls the lock screen of the terminal device, and notifies the terminal user when someone tries to unlock the terminal device, and completes the unlocking of the terminal device with the permission of the terminal user, effectively protecting the information security of the terminal device.
以下结合附图和实施例对本发明做进一步的解释说明。The present invention will be further explained below in conjunction with the accompanying drawings and embodiments.
图1为本发明的终端设备的远程控制方法第一实施例的流程图,参见图1和图3,在本实施例中,终端设备的远程控制方法包括以下步骤:Fig. 1 is a flow chart of the first embodiment of the remote control method of the terminal device according to the present invention. Referring to Fig. 1 and Fig. 3, in this embodiment, the remote control method of the terminal device includes the following steps:
S1、通过控制终端100向目标终端200发送锁屏指令,以使目标终端200锁屏;S1. Send a screen lock instruction to the target terminal 200 through the control terminal 100, so that the target terminal 200 locks the screen;
S2、当目标终端200接收到密码输入时,验证输入的密码;S2. When the target terminal 200 receives a password input, verify the input password;
S3、当密码验证通过时,目标终端200向控制终端100发送解锁请求,并在接收到控制终端100返回的确认指令后完成解锁。S3. When the password verification is passed, the target terminal 200 sends an unlocking request to the control terminal 100, and completes unlocking after receiving a confirmation instruction returned by the control terminal 100.
在本实施例中,步骤S1包括以下子步骤:S10、通过控制终端100向目标终端200发送锁屏指令;S11、当接收到锁屏指令时,目标终端200判断其是否设置了解锁密码,若是则执行子步骤S12,若否则执行子步骤S13;S12、目标终端200完成锁屏;S13、目标终端200向控制终端100发送解锁密码设置请求,当接收到解锁密码设置请求时控制终端100向用户提示解锁密码设置界面,接收用户输入的密码,并将用户输入的密码发送到目标终端200,目标终端200将接收到的密码作为解锁密码,完成锁屏。In this embodiment, step S1 includes the following sub-steps: S10, send a screen lock instruction to the target terminal 200 through the control terminal 100; S11, when receiving the screen lock instruction, the target terminal 200 judges whether it has set an unlock password, if Then execute sub-step S12, if otherwise execute sub-step S13; S12, target terminal 200 finishes locking screen; S13, target terminal 200 sends unlock password setting request to control terminal 100, when receiving unlock password setting request, control terminal 100 sends user Prompt to unlock the password setting interface, receive the password input by the user, and send the password input by the user to the target terminal 200, and the target terminal 200 uses the received password as the unlock password to complete the screen lock.
在第一示例中,控制终端100可以是手机,目标终端200可以是电脑。电脑未完成锁屏可以分为两种情况,第一种为电脑未设置锁屏(未设置解锁密码),第二种为未达到电脑自动锁屏的等待时间(已设置解锁密码)。可以在手机和电脑中分别安装代理软件,通过代理软件将信息收发反馈机制置入手机和电脑,使手机和电脑实现通信。当电脑未完成锁屏时,用户离开电脑,用户可以通过手机端代理软件向电脑端代理软件发送锁屏指令。当电脑端代理软件接收到锁屏指令时,判断电脑是否设置了解锁密码,若是则属于第二种未完成锁屏的情况,此时电脑端代理软件将将立刻完成锁屏电脑。若判断出电脑未设置解锁密码,则表示属于第一种未完成锁屏的情况,此时电脑端代理软件将向手机端代理软件发送解锁密码设置请求。当手机端代理软件接收到解锁密码设置请求时,向手机用户提供解锁密码设置界面,使用户能够在该界面上输入密码,然后手机端代理软件将用户输入的密码发送到电脑端代理软件,电脑端代理软件将该密码作为解锁密码并完成锁屏电脑。控制终端100为电脑,目标终端200为手机的情况以此类推。In the first example, the control terminal 100 may be a mobile phone, and the target terminal 200 may be a computer. There are two situations in which the computer screen has not been locked. The first is that the computer has not been locked (the unlock password has not been set), and the second is that the waiting time for the computer to automatically lock the screen has not been reached (the unlock password has been set). The agent software can be installed in the mobile phone and the computer respectively, and the information sending and receiving feedback mechanism can be put into the mobile phone and the computer through the agent software, so that the mobile phone and the computer can communicate. When the computer has not finished locking the screen and the user leaves the computer, the user can send a screen-locking instruction to the computer-side agent software through the agent software on the mobile phone. When the computer terminal agent software receives the lock screen instruction, it is judged whether the computer has been provided with an unlock password, and if so, it belongs to the second situation that the screen lock has not been completed, and now the computer terminal agent software will immediately complete the screen lock computer. If it is judged that the computer has not set an unlock password, it means that it belongs to the first situation that the screen lock has not been completed. At this time, the agent software on the computer side will send an unlock password setting request to the agent software on the mobile phone side. When the mobile terminal agent software receives the unlock password setting request, it provides the mobile phone user with an unlock password setting interface so that the user can enter the password on the interface, and then the mobile terminal agent software sends the password entered by the user to the computer terminal agent software, and the computer The client agent software uses the password as the unlock password and completes the lock screen computer. The control terminal 100 is a computer, and the target terminal 200 is a mobile phone, and so on.
在第二示例中,控制终端100和目标终端200均为手机,可以在目标端手机中安装代理软件,识别控制端手机发送的信息,并向控制端手机反馈信息。例如,目标端手机的代理软件配备了指令表,指令表中特定的字符与操作功能对应存储,当接收到控制端手机发送的特定的字符时,目标端手机执行与之对应的操作功能的相应代码,从而实现相应的控制操作。目标端手机未完成锁屏可以分为两种情况,第一种为目标端手机未设置锁屏(未设置解锁密码),第二种为未达到目标端手机自动锁屏的等待时间(已设置解锁密码)。当目标端手机未完成锁屏时,用户离开目标端手机,用户可以通过控制端手机(例如其他用户的手机)向目标端手机发送锁屏指令以及该控制端手机的有效时间,锁屏指令为特定的字符,例如“spsj”,控制端手机的有效时间可以以“分”、“时”为单位,例如以“时”为单元时,控制端手机向目标端手机发送的信息为“spsj2”其中,“spsj”为锁屏指令,“2”表示该控制端手机的有效时间为2小时,在之后的2小时之内,目标端手机可以与该控制端手机交互。锁屏指令以及该控制端手机的有效时间可以以短信的方式发送。当目标端手机接收到短信时,目标端手机的代理软件识别短信内容,判断短信内容中是否包含与指令表中匹配的特定的字符,若是则表示接收到锁屏指令,接着目标端手机的代理软件判断目标端手机是否设置了解锁密码,若是则属于第二种未完成锁屏的情况,此时目标端手机的代理软件将立刻完成锁屏目标端手机。若判断出目标端手机未设置解锁密码,则表示属于第一种未完成锁屏的情况,此时目标端手机的代理软件将向控制端手机发送解锁密码设置请求,解锁密码设置请求可以以短信的方式发送,具体的,目标端手机的代理软件获取预先存储的密码设置提示信息,例如“请设置解锁密码”,并将获取的密码设置提示信息以短信的方式发送到控制端手机。用户以回复短信的方式向目标端手机返回解锁密码,回复的内容包括解锁密码设置指令和解锁密码,例如“jsma123456”,其中特定字符“jsma”为解锁密码的设置指令,“123456”为解码密码。当目标端手机接收到控制端手机回复的短信时,其代理软件识别出短信内容包括解锁密码设置指令和解锁密码,因此将短信中的密码设置为解锁密码,并完成锁屏目标端手机。In the second example, both the control terminal 100 and the target terminal 200 are mobile phones, and proxy software can be installed in the target mobile phone to identify information sent by the control terminal mobile phone and feed back information to the control terminal mobile phone. For example, the agent software of the target mobile phone is equipped with an instruction table, and the specific characters in the instruction table are stored correspondingly to the operation functions. code, so as to realize the corresponding control operation. The lock screen of the target mobile phone can be divided into two cases. The first is that the lock screen of the target mobile phone is not set (the unlock password is not set), and the second is that the waiting time for the automatic lock screen of the target mobile phone is not reached (set unlock password). When the target mobile phone has not finished locking the screen and the user leaves the target mobile phone, the user can send a lock screen command and the effective time of the control terminal mobile phone to the target mobile phone through the control terminal mobile phone (such as another user's mobile phone). The lock screen command is Specific characters, such as "spsj", the effective time of the control mobile phone can be in "minutes" and "hours". For example, when the unit is "hour", the information sent by the control mobile phone to the target mobile phone is "spsj2" Among them, "spsj" is the screen lock command, and "2" means that the valid time of the control terminal mobile phone is 2 hours, and within the next 2 hours, the target terminal mobile phone can interact with the control terminal mobile phone. The lock screen instruction and the effective time of the control terminal mobile phone can be sent in the form of a short message. When the target mobile phone receives a text message, the agent software of the target mobile phone recognizes the content of the text message, and judges whether the content of the text message contains specific characters matching the command table. The software judges whether the target mobile phone has been provided with an unlocking password, and if so, belongs to the second kind of unfinished situation of locking the screen. At this moment, the agent software of the target mobile phone will complete the locking of the target mobile phone at once. If it is judged that the target mobile phone has not set an unlock password, it means that it belongs to the first case of incomplete lock screen. At this time, the agent software of the target mobile phone will send an unlock password setting request to the control terminal mobile phone, and the unlock password setting request can be sent as a text message. Specifically, the proxy software of the target mobile phone obtains the pre-stored password setting prompt information, such as "please set the unlock password", and sends the obtained password setting prompt information to the control terminal mobile phone in the form of a text message. The user returns the unlock password to the target mobile phone by replying to the SMS, and the content of the reply includes the unlock password setting instruction and the unlock password, such as "jsma123456", in which the specific character "jsma" is the unlock password setting instruction, and "123456" is the decoding password . When the target mobile phone receives the text message replied by the control mobile phone, its proxy software recognizes that the content of the text message includes an unlock password setting instruction and an unlock password, so the password in the text message is set as the unlock password, and the screen lock of the target mobile phone is completed.
在其他示例中,控制终端100还可以是手机或者电脑,目标终端200可以是汽车上安装的导航装置。同理,在手机或者电脑、以及导航装置中分别安装代理软件,实现两者的通信。基于与第一、第二示例相同的原理,实现远程锁定汽车。这样,即使汽车被盗,也能够远程锁死汽车,使汽车无法开动。In other examples, the control terminal 100 may also be a mobile phone or a computer, and the target terminal 200 may be a navigation device installed on a car. Similarly, agent software is respectively installed in the mobile phone or computer, and the navigation device to realize the communication between the two. Based on the same principle as the first and second examples, the remote locking of the car is realized. In this way, even if the car is stolen, the car can be locked remotely so that the car cannot be started.
在本实施例的步骤S2中,当目标终端200接收到密码输入时,判断输入的密码与解锁密码是否匹配,若匹配则表示输入的密码验证成功,若不匹配则表示输入的密码验证失败。In step S2 of this embodiment, when the target terminal 200 receives the password input, it judges whether the input password matches the unlocking password. If they match, it means that the input password verification is successful; if they do not match, it means that the input password verification fails.
在本实施例的步骤S3中,当输入的密码验证成功时,目标终端200并非立即解锁,而是向控制终端100发送解锁请求,并在接收到控制终端100返回的确认指令后才进行解锁,若控制终端100返回的是拒绝指令,则无法解锁目标终端200,目标终端200将维持锁屏状态。这样,即使解锁密码外泄或者被破译,也需要得到目标终端用户的许可,才能解锁、登陆目标终端200进行操作,有效避免了目标终端200的信息外泄,有效保护了目标终端用户的信息安全。In step S3 of this embodiment, when the input password verification is successful, the target terminal 200 does not unlock immediately, but sends an unlock request to the control terminal 100, and unlocks only after receiving the confirmation instruction returned by the control terminal 100, If the control terminal 100 returns a rejection instruction, the target terminal 200 cannot be unlocked, and the target terminal 200 will remain in a locked screen state. In this way, even if the unlock password is leaked or deciphered, the permission of the target terminal user is required to unlock and log in to the target terminal 200 for operation, which effectively avoids information leakage of the target terminal 200 and effectively protects the information security of the target terminal user .
在第一示例中,控制终端100为手机,目标终端200为电脑。电脑完成锁屏后,有人试图解锁电脑,该操作人在密码栏中输入密码,电脑端代理软件对输入的密码进行验证,若验证不通过,则不进行任何操作,使电脑维持锁屏状态。若密码验证通过,电脑端代理软件则向手机端代理软件发送解锁请求,当手机端代理软件接收到解锁请求时,向手机端的用户提供一个交互界面,提示是否允许对电脑进行操作,例如提供内容为“是否允许对解锁电脑”的信息,以及一个确认选项,一个拒绝选项。若用户选择确认选项,手机端代理软件则向电脑端代理软件发送确认指令,若用户选择拒绝选项,手机端代理软件则向电脑端代理软件发送拒绝指令。手机端代理软件基于接收到的指令,来解锁手机或者维持锁屏。In the first example, the control terminal 100 is a mobile phone, and the target terminal 200 is a computer. After the computer screen is locked, someone tries to unlock the computer. The operator enters the password in the password field, and the agent software on the computer side verifies the entered password. If the verification fails, no operation is performed to keep the computer in the locked screen state. If the password verification is passed, the proxy software on the computer side sends an unlock request to the proxy software on the mobile phone side. When the proxy software on the mobile phone side receives the unlock request, it provides an interactive interface to the user on the mobile phone side, prompting whether to allow operations on the computer, such as providing content It is the information of "whether to allow to unlock the computer", and a confirmation option, a rejection option. If the user selects the confirm option, the agent software on the mobile phone sends a confirmation instruction to the agent software on the computer, and if the user selects the option to reject, the agent software on the mobile phone sends a reject instruction to the agent software on the computer. The mobile phone agent software unlocks the mobile phone or maintains the lock screen based on the received instructions.
在第二示例中,控制终端100和目标终端200均为手机,目标端手机完成锁屏后,有人试图解锁目标端手机,该操作人在密码栏中输入密码,目标端手机的代理软件对输入的密码进行验证,若验证不通过,则不进行任何操作,使目标端手机维持锁屏状态。若密码验证通过,目标端手机的代理软件判断是否存在处于有效时间内的控制端手机,例如,在进行解锁时,设置了一控制端手机的有效时间为2小时,当完成锁屏后,目标端手机的代理软件调用计数器进行计时,当密码验证通过时,将当前计时的时间量与有效时间相比较,若当前计时的时间量小于或者等于有效时间,则表示存在处于有效时间内的控制终端,目标端手机的代理软件将向该控制终端以短信的方式发送解锁请求。若当前计时的时间量大于有效时间,则表示不存在处于有效时间内的控制终端,目标端手机的代理软件可以直接解锁目标端手机,也可以进一步提供预先存储的问题让操作人答复,若回答正确则解锁目标端手机。当目标端手机的代理软件向处于有效时间内的控制终端发送解锁请求时,目标端手机的代理软件获取预先存储的解锁请求信息,例如“是否允许对解锁电脑,是则回复Y,否则回复N”,并将该解锁请求信息以短信的方式发送到处于有效时间内的控制端手机,若在有效时间内接收到控制端手机回复的短信内容为“Y”则表示接收到确认指令,回复的短信内容为“N”则表示接收到拒绝指令,目标端手机的代理软件根据接收到的指令来解锁目标端手机或者维持锁屏。In the second example, the control terminal 100 and the target terminal 200 are both mobile phones. After the target mobile phone is locked, someone tries to unlock the target mobile phone. The password is verified, if the verification fails, no operation is performed, and the target mobile phone remains locked. If the password verification is passed, the proxy software of the target mobile phone judges whether there is a control terminal mobile phone within the valid time. For example, when unlocking, set the valid time of a control terminal mobile phone to 2 hours. The proxy software of the terminal mobile phone calls the counter for timing. When the password verification is passed, the current counted time is compared with the valid time. If the current counted time is less than or equal to the valid time, it means that there is a control terminal within the valid time. , the agent software of the target mobile phone will send an unlock request to the control terminal in the form of a text message. If the current counted time is greater than the effective time, it means that there is no control terminal within the effective time, and the agent software of the target mobile phone can directly unlock the target mobile phone, and can further provide pre-stored questions for the operator to answer. If it is correct, the target phone will be unlocked. When the agent software of the target mobile phone sends an unlock request to the control terminal within the effective time, the agent software of the target mobile phone obtains the pre-stored unlock request information, such as "whether it is allowed to unlock the computer, and then reply Y, otherwise reply N ", and send the unlock request information to the mobile phone at the control terminal within the valid time in the form of a text message. If the content of the text message replied by the mobile phone at the control terminal is "Y" within the valid time, it means that the confirmation command has been received, and the reply If the text message content is "N", it means that the rejection instruction is received, and the proxy software of the target mobile phone unlocks the target mobile phone or maintains the lock screen according to the received instruction.
在其他示例中,控制终端100为手机或者电脑,目标终端200为汽车上安装的导航装置。同理,在手机或者电脑、以及导航装置中分别安装代理软件,实现两者的通信。基于与第一、第二示例相同的原理,当导航装置接收到密码输入,并且输入的密码验证通过后,会向处于有效时间内的手机或者电脑发送解锁请求,并在接收到确认指令后完成解锁汽车,若接收到拒绝指令则维持锁死汽车。对于汽车被盗的情况,用户通过手机或者电脑远程锁死汽车时,可以设置一较长的控制终端的有效时间,这样能够保证对汽车有效的远程控制。In other examples, the control terminal 100 is a mobile phone or a computer, and the target terminal 200 is a navigation device installed on a car. Similarly, agent software is respectively installed in the mobile phone or computer, and the navigation device to realize the communication between the two. Based on the same principle as the first and second examples, when the navigation device receives the password input and the input password is verified, it will send an unlock request to the mobile phone or computer within the valid time, and complete the unlocking after receiving the confirmation command. Unlock the car, and keep the car locked if a rejection command is received. For the stolen situation of the car, when the user locks the car remotely by mobile phone or computer, a longer effective time of the control terminal can be set, so that the effective remote control of the car can be guaranteed.
在本发明的终端设备的远程控制方法的第一实施例中,能够在用户离开目标终端时,通过控制终端远程控制目标终端完成锁屏,并在有人试图解锁目标终端时通知控制终端,在得到控制终端的确认指令后才能完成解锁目标终端,有效地保护了目标终端的信息安全。In the first embodiment of the remote control method of the terminal device of the present invention, when the user leaves the target terminal, the target terminal can be remotely controlled through the control terminal to complete the lock screen, and the control terminal is notified when someone tries to unlock the target terminal. The target terminal can only be unlocked after the confirmation command of the control terminal, which effectively protects the information security of the target terminal.
在本发明的终端设备的远程控制方法第二实施例中,与终端设备的远程控制方法第一实施例的区别在于,步骤S3包括以下子步骤:S31、当密码验证通过时,目标终端200获取其操作人信息;S32、目标终端200将操作人信息以及解锁请求发送到控制终端100;S33、若接收到控制终端100返回的确认指令,目标终端200完成解锁;S34、若接收到控制终端100返回的拒绝指令,目标终端200维持锁屏。In the second embodiment of the remote control method for terminal equipment of the present invention, the difference from the first embodiment of the remote control method for terminal equipment is that step S3 includes the following sub-steps: S31. When the password verification is passed, the target terminal 200 acquires Its operator information; S32, the target terminal 200 sends the operator information and the unlocking request to the control terminal 100; S33, if the confirmation instruction returned by the control terminal 100 is received, the target terminal 200 completes the unlocking; S34, if the control terminal 100 receives For the rejected instruction returned, the target terminal 200 keeps the screen locked.
在本实施例中,当操作人输入的密码通过验证后,目标终端200先获取操作人的信息,操作人信息包括操作人身份信息和/或图像信息。具体的,在子步骤S31中,当密码验证通过后,目标终端200提供一身份信息采集界面,要求操作人根据界面提示输入身份信息,身份信息可以包括操作人姓名、登陆理由等等。和/或目标终端200调用摄像装置,获取操作人当前的图像。在子步骤S32中,在完成操作人身份信息和/或图像信息的采集后,目标终端200将上述操作人信息与解锁请求一同发送到控制终端100,其中操作人信息可以帮助目标终端用户判断是否允许该操作人解锁目标终端200。在子步骤S33和S34中,控制终端100将操作人信息以及解锁请求进行显示,并接收用户输入的相应指令,并将该指令返回目标终端200,使目标终端200完成解锁或者维持锁屏。In this embodiment, after the password input by the operator passes the verification, the target terminal 200 first obtains the information of the operator, and the operator information includes operator identity information and/or image information. Specifically, in sub-step S31, after the password verification is passed, the target terminal 200 provides an identity information collection interface, requiring the operator to input identity information according to the interface prompts. The identity information may include the operator's name, reason for logging in, and so on. And/or the target terminal 200 invokes the camera device to obtain the current image of the operator. In sub-step S32, after completing the collection of the operator's identity information and/or image information, the target terminal 200 sends the above-mentioned operator information together with the unlock request to the control terminal 100, wherein the operator information can help the target terminal user determine whether to The operator is allowed to unlock the target terminal 200 . In sub-steps S33 and S34, the control terminal 100 displays the operator information and the unlock request, receives the corresponding instruction input by the user, and returns the instruction to the target terminal 200, so that the target terminal 200 completes the unlocking or maintains the lock screen.
在本发明的终端设备的远程控制方法的第二实施例中,通过控制终端远程控制目标终端完成锁屏后,在有人试图解锁目标终端,并且输入了正确的解锁密码后,获取该操作人的身份信息和/或图像信息,将上述获取的信息与解锁请求一同发送到控制终端,操作人的身份信息和/或图像信息有助于目标终端用户判断是否允许该操作人解锁目标终端,目标终端在接收到控制终端的确认指令后才能完成解锁目标终端,有效地保护了目标终端的信息安全。In the second embodiment of the terminal device remote control method of the present invention, after the target terminal is remotely controlled by the control terminal and the screen is locked, and someone tries to unlock the target terminal and enters the correct unlock password, the operator's ID is obtained. Identity information and/or image information, the above-mentioned obtained information is sent to the control terminal together with the unlock request, the operator’s identity information and/or image information will help the target terminal user to determine whether the operator is allowed to unlock the target terminal, the target terminal The unlocking of the target terminal can only be completed after receiving the confirmation command from the control terminal, which effectively protects the information security of the target terminal.
图2为本发明的终端设备的远程控制方法第三实施例的流程图,如图2所示,在本实施例中,终端设备的远程控制方法包括以下步骤:FIG. 2 is a flow chart of a third embodiment of the remote control method of a terminal device according to the present invention. As shown in FIG. 2, in this embodiment, the remote control method of a terminal device includes the following steps:
S1、通过控制终端100向目标终端200发送锁屏指令,以使目标终端200锁屏;S1. Send a screen lock instruction to the target terminal 200 through the control terminal 100, so that the target terminal 200 locks the screen;
S2、当目标终端200接收到密码输入时,验证输入的密码;S2. When the target terminal 200 receives a password input, verify the input password;
S3、当密码验证通过时,目标终端200向控制终端100发送解锁请求,并在接收到控制终端100返回的确认指令后完成解锁;S3. When the password verification is passed, the target terminal 200 sends an unlock request to the control terminal 100, and completes unlocking after receiving the confirmation instruction returned by the control terminal 100;
S4、当密码未通过验证时,发送提示信息到控制终端100。S4. Send a prompt message to the control terminal 100 when the password fails to pass the verification.
本实施例与本发明的终端设备的远程控制方法第一实施例的区别在于,当操作人输入的密码验证失败时,目标终端200将发送提示信息到控制终端100以通知目标终端用户。具体的,目标终端200将每次密码验证失败的记录保存在特定的文件夹下,以便目标终端用户查看,记录包括验证失败的时间信息。进一步,目标终端200还可以对密码验证失败的次数进行计数,当密码验证失败的次数大于或者等于一预设的阈值时,目标终端200将发送提示信息到控制终端100。其中,提示信息可以包括以下信息中的一种或者多种:预先存储的信息,例如“有人试图登陆”;存储在特定文件夹下的密码验证失败的记录;当前操作人的图像信息。当密码验证失败的次数大于或者等于阈值时,目标终端200获取预先存储的信息,和/或获取存储在特定文件夹下的密码验证失败的记录,和/或调用摄像装置获取当前操作人的图像信息,并将预先存储的信息、和/或存储在特定文件夹下的密码验证失败的记录、和/或当前操作人的图像信息发送到控制终端100。例如,可以将阈值设为3次,当密码验证的次数大于或者等于3次时,发送提示信息到控制终端100。在其他实施例中,在每次密码验证之后,目标终端200将调用摄像装置获取当前操作人的图像信息,将密码验证失败的记录与获取的操作人图像信息对应存储在特定的文件夹下。The difference between this embodiment and the first embodiment of the terminal device remote control method of the present invention is that when the verification of the password input by the operator fails, the target terminal 200 will send a prompt message to the control terminal 100 to notify the target terminal user. Specifically, the target terminal 200 saves a record of each password verification failure in a specific folder for the target terminal user to view, and the record includes time information of the verification failure. Further, the target terminal 200 can also count the number of password verification failures, and when the number of password verification failures is greater than or equal to a preset threshold, the target terminal 200 will send a prompt message to the control terminal 100 . Wherein, the prompt information may include one or more of the following information: pre-stored information, such as "someone is trying to log in"; password verification failure records stored in a specific folder; image information of the current operator. When the number of password verification failures is greater than or equal to the threshold, the target terminal 200 obtains pre-stored information, and/or obtains records of password verification failures stored in a specific folder, and/or invokes a camera to obtain an image of the current operator information, and pre-stored information, and/or records of password verification failures stored in a specific folder, and/or image information of the current operator are sent to the control terminal 100. For example, the threshold may be set to 3 times, and when the number of times of password verification is greater than or equal to 3 times, a prompt message is sent to the control terminal 100 . In other embodiments, after each password verification, the target terminal 200 will invoke the camera device to obtain the image information of the current operator, and store the record of password verification failure and the obtained operator image information in a specific folder correspondingly.
在本发明的终端设备的远程控制方法的第三实施例中,目标终端能够记录在目标终端被远程锁屏期间,试图登陆目标终端失败的信息,并在试图登陆目标终端失败的次数(即密码验证失败的次数)大于或者等于阈值时,通知控制终端,以便通知目标终端用户。In the third embodiment of the remote control method of the terminal device of the present invention, the target terminal can record the information that the target terminal fails to log in during the period when the target terminal is remotely locked, and the number of failed attempts to log in to the target terminal (that is, the password When the number of verification failures) is greater than or equal to the threshold, the control terminal is notified, so as to notify the target terminal user.
图3为本发明的终端设备的远程控制系统300第一实施例的功能框图,如图3所示,在本实施例中,远程控制系统300包括通信连接的控制终端100和目标终端200。其中,在目标终端200可以是手机、电脑、或者汽车导航装置等终端设备,控制终端100可以是手机或者电脑。在目标终端200上安装了代理软件来实现控制终端100对目标终端200的远程控制。具体的,目标终端200上安装的代理软件包括以下功能模块:FIG. 3 is a functional block diagram of a first embodiment of a remote control system 300 for a terminal device according to the present invention. As shown in FIG. Wherein, the target terminal 200 may be a terminal device such as a mobile phone, a computer, or a car navigation device, and the control terminal 100 may be a mobile phone or a computer. Agent software is installed on the target terminal 200 to realize the remote control of the target terminal 200 by the control terminal 100 . Specifically, the agent software installed on the target terminal 200 includes the following functional modules:
锁屏单元210,用于接收控制终端100向目标终端200发送的锁屏指令,并在接收到锁屏指令时,锁屏目标终端200;The screen lock unit 210 is configured to receive a screen lock instruction sent from the control terminal 100 to the target terminal 200, and when receiving the screen lock instruction, lock the screen of the target terminal 200;
密码验证单元220,用于在目标终端200接收到密码输入时,验证输入的密码;A password verification unit 220, configured to verify the input password when the target terminal 200 receives the password input;
解锁单元230,用于在密码验证通过时,通过目标终端200向控制终端100发送解锁请求,并在接收到控制终端100返回的确认指令后完成解锁。The unlocking unit 230 is configured to send an unlocking request to the control terminal 100 through the target terminal 200 when the password verification is passed, and complete unlocking after receiving a confirmation instruction returned by the control terminal 100 .
在本实施例中,锁屏单元210包括:In this embodiment, the lock screen unit 210 includes:
锁屏指令接收模块211,用于接收控制终端100向目标终端200发送的锁屏指令;A screen lock instruction receiving module 211, configured to receive a screen lock instruction sent from the control terminal 100 to the target terminal 200;
第一判断模块212,用于在接收到锁屏指令时,判断目标终端200是否设置了解锁密码;The first judging module 212 is used for judging whether the target terminal 200 has set an unlock password when receiving the screen lock instruction;
第一锁屏模块213,用于在目标终端200设置了解锁密码时,使目标终端200完成锁屏;The first screen lock module 213 is configured to enable the target terminal 200 to complete the screen lock when the target terminal 200 is provided with an unlock password;
第二锁屏模块214,用于在目标终端200未设置解锁密码时,通过目标终端200向控制终端100发送解锁密码设置请求,并将控制终端100返回的密码作为解锁密码,完成锁屏。The second lock screen module 214 is used to send an unlock password setting request to the control terminal 100 through the target terminal 200 when the target terminal 200 does not set an unlock password, and use the password returned by the control terminal 100 as the unlock password to complete the lock screen.
在第一示例中,控制终端100可以是手机,目标终端200可以是电脑。电脑未完成锁屏可以分为两种情况,第一种为电脑未设置锁屏(未设置解锁密码),第二种为未达到电脑自动锁屏的等待时间(已设置解锁密码)。此时,在手机和电脑中都安装了代理软件,通过代理软件将信息收发反馈机制置入手机和电脑,使手机和电脑实现通信。当电脑未完成锁屏时,用户离开电脑,用户可以通过手机端代理软件向电脑端代理软件发送锁屏指令。当电脑端代理软件的锁屏指令接收模块211接收锁屏指令,然后通过第一判断模块212判断电脑是否设置了解锁密码,若是则属于第二种未完成锁屏的情况,此时电脑端代理软件的第一锁屏模块213将将立刻完成锁屏电脑。若判断出电脑未设置解锁密码,则表示属于第一种未完成锁屏的情况,此时电脑端代理软件的第二锁屏模块214将向手机端代理软件发送解锁密码设置请求。当手机端代理软件接收到解锁密码设置请求时,向手机用户提供解锁密码设置界面,使用户能够在该界面上输入密码,然后手机端代理软件将用户输入的密码发送到电脑端代理软件,电脑端代理软件的第二锁屏模块214将该密码作为解锁密码并完成锁屏电脑。控制终端100为电脑,目标终端200为手机的情况以此类推。In the first example, the control terminal 100 may be a mobile phone, and the target terminal 200 may be a computer. There are two situations in which the computer screen has not been locked. The first is that the computer has not been locked (the unlock password has not been set), and the second is that the waiting time for the computer to automatically lock the screen has not been reached (the unlock password has been set). At this time, agent software is installed in both the mobile phone and the computer, and the information sending and receiving feedback mechanism is put into the mobile phone and the computer through the agent software, so that the mobile phone and the computer can communicate. When the computer has not finished locking the screen and the user leaves the computer, the user can send a screen-locking instruction to the computer-side agent software through the agent software on the mobile phone. When the lock screen instruction receiving module 211 of the computer agent software receives the lock screen instruction, and then judges whether the computer has an unlock password through the first judging module 212, if so, it belongs to the second kind of unfinished lock screen situation. The first screen lock module 213 of the software will complete the screen lock immediately. If it is judged that the unlocking password is not set in the computer, it means that it belongs to the first kind of unfinished lock screen situation. At this time, the second lock screen module 214 of the computer terminal agent software will send an unlock password setting request to the mobile phone terminal agent software. When the mobile terminal agent software receives the unlock password setting request, it provides the mobile phone user with an unlock password setting interface so that the user can enter the password on the interface, and then the mobile terminal agent software sends the password entered by the user to the computer terminal agent software, and the computer The second lock screen module 214 of the terminal agent software uses the password as the unlock password and completes the lock screen computer. The control terminal 100 is a computer, and the target terminal 200 is a mobile phone, and so on.
在第二示例中,控制终端100和目标终端200均为手机,此时只需在目标端手机中安装代理软件,识别控制端手机发送的信息,并向控制端手机反馈信息。例如,目标端手机的代理软件配备了指令表,指令表中特定的字符与操作功能对应存储,当接收到控制端手机发送的特定的字符时,目标端手机执行与之对应的操作功能的相应代码,从而实现相应的控制操作。目标端手机未完成锁屏可以分为两种情况,第一种为目标端手机未设置锁屏(未设置解锁密码),第二种为未达到目标端手机自动锁屏的等待时间(已设置解锁密码)。当目标端手机未完成锁屏时,用户离开目标端手机,用户可以通过控制端手机(例如其他用户的手机)向目标端手机发送锁屏指令以及该控制端手机的有效时间,锁屏指令为特定的字符,例如“spsj”,控制端手机的有效时间可以以“分”、“时”为单位,例如以“时”为单元时,控制端手机向目标端手机发送的信息为“spsj2”其中,“spsj”为锁屏指令,“2”表示该控制端手机的有效时间为2小时,在之后的2小时之内,目标端手机可以与该控制端手机交互。锁屏指令以及该控制端手机的有效时间可以以短信的方式发送。当目标端手机的代理软件的锁屏指令接收模块211接收到短信时,识别短信内容,判断短信内容中是否包含与指令表中匹配的特定的字符,若是则表示接收到锁屏指令,接着目标端手机的代理软件的第一判断模块212判断目标端手机是否设置了解锁密码,若是则属于第二种未完成锁屏的情况,此时目标端手机的代理软件的第一锁屏模块213将立刻完成锁屏目标端手机。若判断出目标端手机未设置解锁密码,则表示属于第一种未完成锁屏的情况,此时目标端手机的代理软件的第二锁屏模块214将向控制端手机发送解锁密码设置请求,解锁密码设置请求可以以短信的方式发送,具体的,目标端手机的代理软件的第二锁屏模块214获取预先存储的密码设置提示信息,例如“请设置解锁密码”,并将获取的密码设置提示信息以短信的方式发送到控制端手机。用户以回复短信的方式向目标端手机返回解锁密码,回复的内容包括解锁密码设置指令和解锁密码,例如“jsma123456”,其中特定字符“jsma”为解锁密码的设置指令,“123456”为解码密码。当目标端手机接收到控制端手机回复的短信时,其代理软件的第二锁屏模块214识别出短信内容包括解锁密码设置指令和解锁密码,因此将短信中的密码设置为解锁密码,并完成锁屏目标端手机。In the second example, both the control terminal 100 and the target terminal 200 are mobile phones. At this time, only the agent software needs to be installed in the target mobile phone to identify the information sent by the control terminal mobile phone and feed back the information to the control terminal mobile phone. For example, the agent software of the target mobile phone is equipped with an instruction table, and the specific characters in the instruction table are stored correspondingly to the operation functions. code, so as to realize the corresponding control operation. The lock screen of the target mobile phone can be divided into two cases. The first is that the lock screen of the target mobile phone is not set (the unlock password is not set), and the second is that the waiting time for the automatic lock screen of the target mobile phone is not reached (set unlock password). When the target mobile phone has not finished locking the screen and the user leaves the target mobile phone, the user can send a lock screen command and the effective time of the control terminal mobile phone to the target mobile phone through the control terminal mobile phone (such as another user's mobile phone). The lock screen command is Specific characters, such as "spsj", the effective time of the control mobile phone can be in "minutes" and "hours". For example, when the unit is "hour", the information sent by the control mobile phone to the target mobile phone is "spsj2" Among them, "spsj" is the screen lock command, and "2" means that the valid time of the control terminal mobile phone is 2 hours, and within the next 2 hours, the target terminal mobile phone can interact with the control terminal mobile phone. The lock screen instruction and the effective time of the control terminal mobile phone can be sent in the form of a short message. When the lock screen instruction receiving module 211 of the proxy software of the target mobile phone receives the note, identify the content of the note, and judge whether the content of the note contains a specific character matched with the command table, if so, it means that the lock screen instruction is received, and then the target The first judging module 212 of the agent software of the end mobile phone judges whether the target end mobile phone has been provided with an unlock password, and if so, belongs to the second kind of unfinished situation of locking the screen, and now the first lock screen module 213 of the agent software of the target end mobile phone will Immediately complete the lock screen target phone. If it is judged that the target terminal mobile phone is not provided with an unlock password, it means that it belongs to the situation of the first kind of incomplete lock screen, and now the second lock screen module 214 of the agent software of the target terminal mobile phone will send an unlock password setting request to the control terminal mobile phone, The unlocking password setting request can be sent in the form of a text message. Specifically, the second lock screen module 214 of the proxy software of the target mobile phone obtains the pre-stored password setting prompt information, such as "please set the unlocking password", and sets the acquired password The prompt information is sent to the mobile phone of the control terminal in the form of a text message. The user returns the unlock password to the target mobile phone by replying to the SMS, and the content of the reply includes the unlock password setting instruction and the unlock password, such as "jsma123456", in which the specific character "jsma" is the unlock password setting instruction, and "123456" is the decoding password . When the target mobile phone received the short message that the control terminal mobile phone replied, the second lock screen module 214 of its agent software recognized that the short message content included an unlock password setting instruction and an unlock password, so the password in the short message was set as the unlock password, and completed Lock the screen of the target phone.
在其他示例中,控制终端100还可以是手机或者电脑,目标终端200可以是汽车上安装的导航装置。同理,在手机或者电脑、以及导航装置中分别安装代理软件,实现两者的通信。基于与第一、第二示例相同的原理,实现远程锁定汽车。这样,即使汽车被盗,也能够远程锁死汽车,使汽车无法开动。In other examples, the control terminal 100 may also be a mobile phone or a computer, and the target terminal 200 may be a navigation device installed on a car. Similarly, agent software is respectively installed in the mobile phone or computer, and the navigation device to realize the communication between the two. Based on the same principle as the first and second examples, the remote locking of the car is realized. In this way, even if the car is stolen, the car can be locked remotely so that the car cannot be started.
在本实施例的密码验证单元220,当目标终端200接收到密码输入时,判断输入的密码与解锁密码是否匹配,若匹配则表示输入的密码验证成功,若不匹配则表示输入的密码验证失败。In the password verification unit 220 of this embodiment, when the target terminal 200 receives the password input, it is judged whether the input password matches the unlocking password, if it matches, it means that the input password verification is successful, if it does not match, it means that the input password verification fails .
在本实施例的解锁单元230在输入的密码验证成功时,并非立即解锁目标终端200,而是向控制终端100发送解锁请求,并在接收到控制终端100返回的确认指令后才进行解锁,若控制终端100返回的是拒绝指令,则无法解锁目标终端200,目标终端200将维持锁屏状态。这样,即使解锁密码外泄或者被破译,也需要得到目标终端用户的许可,才能解锁、登陆目标终端200进行操作,有效避免了目标终端200的信息外泄,有效保护了目标终端用户的信息安全。When the unlocking unit 230 of this embodiment is successfully verified by the input password, it does not immediately unlock the target terminal 200, but sends an unlock request to the control terminal 100, and unlocks after receiving the confirmation instruction returned by the control terminal 100. If If the control terminal 100 returns a rejection instruction, the target terminal 200 cannot be unlocked, and the target terminal 200 will remain in a locked screen state. In this way, even if the unlock password is leaked or deciphered, the permission of the target terminal user is required to unlock and log in to the target terminal 200 for operation, which effectively avoids information leakage of the target terminal 200 and effectively protects the information security of the target terminal user .
在第一示例中,控制终端100为手机,目标终端200为电脑。电脑完成锁屏后,有人试图解锁电脑,该操作人在密码栏中输入密码,电脑端代理软件的密码验证单元220对输入的密码进行验证,若验证不通过,则不进行任何操作,使电脑维持锁屏状态。若密码验证通过,电脑端代理软件解锁单元230则向手机端代理软件发送解锁请求,当手机端代理软件的接收到解锁请求时,向手机端的用户提供一个交互界面,提示是否允许对电脑进行操作,例如提供内容为“是否允许对解锁电脑”的信息,以及一个确认选项,一个拒绝选项。若用户选择确认选项,手机端代理软件则向电脑端代理软件发送确认指令,若用户选择拒绝选项,手机端代理软件则向电脑端代理软件发送拒绝指令。手机端代理软件的解锁单元230基于接收到的指令,来解锁手机或者维持锁屏。In the first example, the control terminal 100 is a mobile phone, and the target terminal 200 is a computer. After the computer has finished locking the screen, someone tries to unlock the computer. The operator inputs the password in the password column, and the password verification unit 220 of the agent software on the computer side verifies the entered password. If the verification fails, no operation is performed to make the computer Keep the screen locked. If the password verification is passed, the computer terminal agent software unlocking unit 230 then sends an unlock request to the mobile terminal agent software, and when the mobile terminal agent software receives the unlock request, an interactive interface is provided to the user at the mobile terminal, prompting whether to allow the computer to be operated , such as providing the information of "whether to allow the user to unlock the computer", as well as a confirmation option and a rejection option. If the user selects the confirm option, the agent software on the mobile phone sends a confirmation instruction to the agent software on the computer, and if the user selects the option to reject, the agent software on the mobile phone sends a reject instruction to the agent software on the computer. The unlocking unit 230 of the mobile phone agent software unlocks the mobile phone or keeps the screen locked based on the received instruction.
在第二示例中,控制终端100和目标终端200均为手机,目标端手机完成锁屏后,有人试图解锁目标端手机,该操作人在密码栏中输入密码,目标端手机的代理软件的密码验证单元220对输入的密码进行验证,若验证不通过,则不进行任何操作,使目标端手机维持锁屏状态。若密码验证通过,目标端手机的代理软件的解锁单元230判断是否存在处于有效时间内的控制端手机,例如,在进行解锁时,设置了一控制端手机的有效时间为2小时,当完成锁屏后,目标端手机的代理软件调用计数器进行计时,当密码验证通过时,将当前计时的时间量与有效时间相比较,若当前计时的时间量小于或者等于有效时间,则表示存在处于有效时间内的控制终端,目标端手机的代理软件的解锁单元230将向该控制终端以短信的方式发送解锁请求。若当前计时的时间量大于有效时间,则表示不存在处于有效时间内的控制终端,目标端手机的代理软件的解锁单元230可以直接解锁目标端手机,也可以进一步提供预先存储的问题让操作人答复,若回答正确则解锁目标端手机。当目标端手机的代理软件的解锁单元230向处于有效时间内的控制终端发送解锁请求时,目标端手机的代理软件的解锁单元230获取预先存储的解锁请求信息,例如“是否允许对解锁电脑,是则回复Y,否则回复N”,并将该解锁请求信息以短信的方式发送到处于有效时间内的控制端手机,若在有效时间内接收到控制端手机回复的短信内容为“Y”则表示接收到确认指令,回复的短信内容为“N”则表示接收到拒绝指令,目标端手机的代理软件的解锁单元230根据接收到的指令来解锁目标端手机或者维持锁屏。In the second example, the control terminal 100 and the target terminal 200 are both mobile phones. After the target mobile phone is locked, someone tries to unlock the target mobile phone. The verification unit 220 verifies the input password, and if the verification fails, no operation is performed to keep the target mobile phone in a locked screen state. If the password verification is passed, the unlocking unit 230 of the agent software of the target mobile phone judges whether there is a control terminal mobile phone within the valid time, for example, when unlocking, the valid time of a control terminal mobile phone is set to be 2 hours, when the lock is completed After the screen, the agent software of the target mobile phone invokes the counter for timing. When the password verification is passed, the current counted time is compared with the valid time. If the current counted time is less than or equal to the valid time, it means that there is a valid time. In the control terminal, the unlocking unit 230 of the agent software of the target mobile phone will send an unlock request to the control terminal in the form of a short message. If the amount of time currently counted is greater than the effective time, it means that there is no control terminal in the effective time, and the unlocking unit 230 of the agent software of the target mobile phone can directly unlock the target mobile phone, and can further provide pre-stored questions to let the operator Reply, if the answer is correct, the target mobile phone will be unlocked. When the unlocking unit 230 of the agent software of the target mobile phone sends an unlock request to the control terminal within the effective time, the unlocking unit 230 of the agent software of the target mobile phone obtains the unlock request information stored in advance, such as "whether to allow the unlocking of the computer, If yes, reply Y, otherwise reply N", and send the unlock request information to the mobile phone at the control terminal in the form of a short message, if the content of the short message replied by the mobile phone at the control terminal is "Y" within the valid time, then Indicates that a confirmation instruction has been received, and the content of the reply message being "N" indicates that a rejection instruction has been received, and the unlocking unit 230 of the proxy software of the target mobile phone unlocks the target mobile phone or maintains the lock screen according to the received instruction.
在其他示例中,控制终端100为手机或者电脑,目标终端200为汽车上安装的导航装置。同理,在手机或者电脑、以及导航装置中分别安装代理软件,实现两者的通信。基于与第一、第二示例相同的原理,当导航装置的代理软件接收到密码输入,并且输入的密码验证通过后,会向处于有效时间内的手机或者电脑发送解锁请求,并在接收到确认指令后完成解锁汽车,若接收到拒绝指令则维持锁死汽车。对于汽车被盗的情况,用户通过手机或者电脑远程锁死汽车时,可以设置一较长的控制终端的有效时间,这样能够保证对汽车有效的远程控制。In other examples, the control terminal 100 is a mobile phone or a computer, and the target terminal 200 is a navigation device installed on a car. Similarly, agent software is respectively installed in the mobile phone or computer, and the navigation device to realize the communication between the two. Based on the same principle as the first and second examples, when the proxy software of the navigation device receives the password input and the input password is verified, it will send an unlock request to the mobile phone or computer within the valid time, and when the confirmation is received Unlock the car after the instruction is completed, and if the rejection instruction is received, the car will remain locked. For the stolen situation of the car, when the user locks the car remotely by mobile phone or computer, a longer effective time of the control terminal can be set, so that the effective remote control of the car can be guaranteed.
在本发明的终端设备的远程控制系统的第一实施例中,能够在用户离开目标终端时,通过控制终端远程控制目标终端完成锁屏,并在有人试图解锁目标终端时通知控制终端,在得到控制终端的确认指令后才能完成解锁目标终端,有效地保护了目标终端的信息安全。In the first embodiment of the remote control system for terminal equipment of the present invention, when the user leaves the target terminal, the target terminal can be remotely controlled through the control terminal to complete the lock screen, and the control terminal is notified when someone tries to unlock the target terminal. The target terminal can only be unlocked after the confirmation command of the control terminal, which effectively protects the information security of the target terminal.
在本发明的终端设备的远程控制系统300第二实施例中,与终端设备的远程控制系统300第一实施例的区别在于,如图4所示,在本实施例中,解锁单元230包括:The difference between the second embodiment of the terminal device remote control system 300 of the present invention and the first embodiment of the terminal device remote control system 300 is that, as shown in FIG. 4 , in this embodiment, the unlocking unit 230 includes:
操作人信息获取模块231,用于在密码验证通过时,获取所述目标终端200的操作人信息;An operator information acquisition module 231, configured to acquire the operator information of the target terminal 200 when the password verification is passed;
解锁请求模块232,用于将操作人信息以及所述解锁请求发送到控制终端100;An unlock request module 232, configured to send the operator information and the unlock request to the control terminal 100;
解锁模块233,用于在接收到控制终端100返回的确认指令时,使目标终端200完成解锁;The unlocking module 233 is configured to enable the target terminal 200 to complete unlocking when receiving the confirmation instruction returned by the control terminal 100;
锁屏维持模块234,用于在接收到控制终端100返回的拒绝指令时,使目标终端200维持锁屏。The lock screen maintaining module 234 is configured to make the target terminal 200 maintain the lock screen when receiving the rejection instruction returned by the control terminal 100 .
在本实施例中,当操作人输入的密码通过验证后,目标终端200代理软件的操作人信息获取模块231先获取操作人的信息,操作人信息包括操作人身份信息和/或图像信息。具体的,当密码验证通过后,操作人信息获取模块231提供一身份信息采集界面,要求操作人根据界面提示输入身份信息,身份信息可以包括操作人姓名、登陆理由等等。和/或操作人信息获取模块231调用摄像装置,获取操作人当前的图像。在完成操作人身份信息和/或图像信息的采集后,解锁请求模块232将上述操作人信息与解锁请求一同发送到控制终端100,其中操作人信息可以帮助目标终端用户判断是否允许该操作人解锁目标终端200。控制终端100将操作人信息以及解锁请求进行显示,并接收用户输入的相应指令,并将该指令返回目标终端200,若控制终端100返回的确认指令,则通过解锁模块233使目标终端200完成解锁,若控制终端100返回的拒绝指令,则通过锁屏维持模块234使目标终端200维持锁屏。In this embodiment, after the password input by the operator is verified, the operator information acquisition module 231 of the proxy software of the target terminal 200 first acquires the operator's information, and the operator information includes the operator's identity information and/or image information. Specifically, when the password verification is passed, the operator information acquisition module 231 provides an identity information collection interface, requiring the operator to input identity information according to the interface prompts. The identity information may include the operator's name, login reason, and the like. And/or the operator information acquiring module 231 invokes the camera device to acquire the current image of the operator. After completing the collection of the operator's identity information and/or image information, the unlocking request module 232 sends the above-mentioned operator's information together with the unlocking request to the control terminal 100, wherein the operator's information can help the target terminal user determine whether to allow the operator to unlock target terminal 200. The control terminal 100 displays the operator information and the unlocking request, and receives the corresponding instruction input by the user, and returns the instruction to the target terminal 200. If the control terminal 100 returns a confirmation instruction, the unlocking module 233 enables the target terminal 200 to complete the unlocking. , if the control terminal 100 returns a rejection instruction, the target terminal 200 is made to maintain the lock screen through the lock screen maintenance module 234 .
在本发明的终端设备的远程控制系统的第二实施例中,通过控制终端远程控制目标终端完成锁屏后,在有人试图解锁目标终端,并且输入了正确的解锁密码后,获取该操作人的身份信息和/或图像信息,将上述获取的信息与解锁请求一同发送到控制终端,操作人的身份信息和/或图像信息有助于目标终端用户判断是否允许该操作人解锁目标终端,目标终端在接收到控制终端的确认指令后才能完成解锁目标终端,有效地保护了目标终端的信息安全。In the second embodiment of the remote control system for terminal equipment of the present invention, after the target terminal is remotely controlled by the control terminal and the screen is locked, and someone tries to unlock the target terminal and enters the correct unlock password, the operator's ID is obtained. Identity information and/or image information, the above-mentioned obtained information is sent to the control terminal together with the unlock request, the operator’s identity information and/or image information will help the target terminal user to determine whether the operator is allowed to unlock the target terminal, the target terminal The unlocking of the target terminal can only be completed after receiving the confirmation command from the control terminal, which effectively protects the information security of the target terminal.
图5为本发明的终端设备的远程控制系统300第三实施例的功能框图,如图5所示,在本实施例中,终端设备的远程控制系统300包括:FIG. 5 is a functional block diagram of a third embodiment of a remote control system 300 for a terminal device according to the present invention. As shown in FIG. 5 , in this embodiment, the remote control system 300 for a terminal device includes:
锁屏单元210,用于接收控制终端100向目标终端200发送的锁屏指令,并在接收到锁屏指令时,锁屏目标终端200;The screen lock unit 210 is configured to receive a screen lock instruction sent from the control terminal 100 to the target terminal 200, and when receiving the screen lock instruction, lock the screen of the target terminal 200;
密码验证单元220,用于在目标终端200接收到密码输入时,验证输入的密码;A password verification unit 220, configured to verify the input password when the target terminal 200 receives the password input;
解锁单元230,用于在密码验证通过时,通过目标终端200向控制终端100发送解锁请求,并在接收到控制终端100返回的确认指令后完成解锁;The unlocking unit 230 is configured to send an unlock request to the control terminal 100 through the target terminal 200 when the password verification is passed, and complete unlocking after receiving the confirmation instruction returned by the control terminal 100;
提示单元240,用于在密码未通过验证时,发送提示信息到所述控制终端100。The prompt unit 240 is configured to send prompt information to the control terminal 100 when the password fails to pass the verification.
本实施例与本发明的终端设备的远程控制系统300第一实施例的区别在于,当操作人输入的密码验证失败时,目标终端200代理软件的提示单元240将发送提示信息到控制终端100以通知目标终端用户。The difference between this embodiment and the first embodiment of the terminal device remote control system 300 of the present invention is that when the password input by the operator fails to be verified, the prompt unit 240 of the agent software of the target terminal 200 will send a prompt message to the control terminal 100 to Notify target end users.
具体的,提示单元240包括:Specifically, the prompt unit 240 includes:
第二判断模块241,用于判断密码未通过验证的次数是否大于或者等于预设的阈值;The second judging module 241 is used to judge whether the number of times that the password fails to pass the verification is greater than or equal to a preset threshold;
提示模块242,用于在密码未通过验证的次数是否大于或者等于预设的阈值时,发送提示信息到控制终端100。The prompting module 242 is configured to send prompting information to the control terminal 100 when the number of password failures is greater than or equal to a preset threshold.
提示模块242将每次密码验证失败的记录保存在特定的文件夹下,以便目标终端用户查看,记录包括验证失败的时间信息。进一步,第二判断模块241还可以对密码验证失败的次数进行计数,当密码验证失败的次数大于或者等于一预设的阈值时,提示模块242将发送提示信息到控制终端100。其中,提示信息可以包括以下信息中的一种或者多种:预先存储的信息,例如“有人试图登陆”;存储在特定文件夹下的密码验证失败的记录;当前操作人的图像信息。当密码验证失败的次数大于或者等于阈值时,提示模块242获取预先存储的信息,和/或获取存储在特定文件夹下的密码验证失败的记录,和/或调用摄像装置获取当前操作人的图像信息,并将预先存储的信息、和/或存储在特定文件夹下的密码验证失败的记录、和/或当前操作人的图像信息发送到控制终端100。在其他实施例中,在每次密码验证之后,提示模块242将调用摄像装置获取当前操作人的图像信息,将密码验证失败的记录与获取的操作人图像信息对应存储在特定的文件夹下。The prompting module 242 saves the record of each failed password verification in a specific folder, so that the target terminal user can view, and the record includes the time information of the failed verification. Furthermore, the second judging module 241 can also count the number of password verification failures, and when the number of password verification failures is greater than or equal to a preset threshold, the prompt module 242 will send a prompt message to the control terminal 100 . Wherein, the prompt information may include one or more of the following information: pre-stored information, such as "someone is trying to log in"; password verification failure records stored in a specific folder; image information of the current operator. When the number of password verification failures is greater than or equal to the threshold, the prompt module 242 obtains pre-stored information, and/or obtains records of password verification failures stored in a specific folder, and/or invokes a camera to obtain an image of the current operator information, and pre-stored information, and/or records of password verification failures stored in a specific folder, and/or image information of the current operator are sent to the control terminal 100. In other embodiments, after each password verification, the prompting module 242 will call the camera to obtain the image information of the current operator, and store the record of password verification failure and the obtained operator image information in a specific folder correspondingly.
在本发明的终端设备的远程控制系统的第三实施例中,目标终端能够记录在目标终端被远程锁屏期间,试图登陆目标终端失败的信息,并在试图登陆目标终端失败的次数(即密码验证失败的次数)大于或者等于阈值时,通知控制终端,以便通知目标终端用户。In the third embodiment of the remote control system of the terminal device of the present invention, the target terminal can record the information that the target terminal fails to log in during the period when the target terminal is remotely locked, and the number of failed attempts to log in to the target terminal (that is, the password When the number of verification failures) is greater than or equal to the threshold, the control terminal is notified, so as to notify the target terminal user.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的权利要求范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. For those skilled in the art, the present invention may have various modifications and changes. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included within the scope of the claims of the present invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410030918.0ACN103728894B (en) | 2014-01-22 | 2014-01-22 | The long-range control method of a kind of terminal unit and system |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410030918.0ACN103728894B (en) | 2014-01-22 | 2014-01-22 | The long-range control method of a kind of terminal unit and system |
| Publication Number | Publication Date |
|---|---|
| CN103728894A CN103728894A (en) | 2014-04-16 |
| CN103728894Btrue CN103728894B (en) | 2016-06-29 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410030918.0AActiveCN103728894B (en) | 2014-01-22 | 2014-01-22 | The long-range control method of a kind of terminal unit and system |
| Country | Link |
|---|---|
| CN (1) | CN103728894B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3617860A4 (en)* | 2017-06-16 | 2020-08-12 | Huawei Technologies Co., Ltd. | SCREEN LOCKING METHOD AND DEVICE |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105094506B (en)* | 2014-05-09 | 2019-02-26 | 阿里巴巴集团控股有限公司 | Method, intelligent terminal and the operating platform of the solution lock screen of intelligent terminal |
| CN105100173B (en)* | 2014-05-23 | 2018-12-25 | 中国电信股份有限公司 | Screen locking and unlocking screen method, screen management system and equipment |
| CN104268453B (en)* | 2014-09-24 | 2018-01-19 | 可牛网络技术(北京)有限公司 | A kind of terminal device application security management method, device and terminal |
| CN104463024A (en)* | 2014-12-19 | 2015-03-25 | 上海斐讯数据通信技术有限公司 | Notification system and method for wake-up of computer |
| CN104966012B (en)* | 2015-06-16 | 2017-10-17 | 广东欧珀移动通信有限公司 | One kind solution lock control method and mobile terminal |
| CN105844125A (en)* | 2015-07-08 | 2016-08-10 | 广东维沃软件技术有限公司 | A method and device for unlocking a terminal |
| CN105243317A (en)* | 2015-10-27 | 2016-01-13 | 上海斐讯数据通信技术有限公司 | Electronic device and decryption method therefor |
| CN105404805A (en)* | 2015-11-19 | 2016-03-16 | 小米科技有限责任公司 | Verification method and apparatus |
| CN105631250A (en)* | 2015-12-18 | 2016-06-01 | 北京奇虎科技有限公司 | Method and device for obtaining image information of users illegally accessing to application programs |
| CN105893808A (en)* | 2016-04-01 | 2016-08-24 | 乐视控股(北京)有限公司 | Method and device for locking screen of mobile terminal |
| CN106066763B (en)* | 2016-05-25 | 2020-11-13 | 北京小米移动软件有限公司 | Terminal unlocking method and device |
| CN106210264A (en)* | 2016-06-21 | 2016-12-07 | 焦建成 | Communicating terminal is lost guard method and has the communicating terminal losing defencive function |
| CN105897773A (en)* | 2016-06-24 | 2016-08-24 | 焦建成 | Communication terminal loss protection method |
| CN106650356B (en)* | 2016-12-13 | 2019-09-06 | 曙光信息产业(北京)有限公司 | Lock screen system under BIOS set interface |
| CN107179840A (en)* | 2017-05-25 | 2017-09-19 | 上海传英信息技术有限公司 | Controller and its control method |
| CN108702414B (en)* | 2017-06-16 | 2021-04-09 | 华为技术有限公司 | A screen locking method, device and computer-readable storage medium |
| CN108491700A (en)* | 2018-03-20 | 2018-09-04 | 北京小米移动软件有限公司 | Intelligent terminal control method, device and computer readable storage medium |
| CN108616641A (en)* | 2018-04-28 | 2018-10-02 | 四川斐讯信息技术有限公司 | A kind of the unlocking screen method and intelligent interactive system of mobile terminal |
| CN110753118A (en)* | 2019-10-24 | 2020-02-04 | 东北大学秦皇岛分校 | Remote computer starting unlocking and file transmission system and method based on network |
| CN111857514A (en)* | 2020-07-20 | 2020-10-30 | 百度在线网络技术(北京)有限公司 | Device control method, device, electronic device and storage medium |
| CN112422745B (en)* | 2020-09-29 | 2021-12-24 | 四川领歌智谷科技有限公司 | Method for unlocking mobile phone, computer and mobile phone |
| CN116193020B (en)* | 2023-04-27 | 2023-08-11 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1901443A (en)* | 2006-07-12 | 2007-01-24 | 北京飞天诚信科技有限公司 | Remote de-locking method of information safety device |
| CN101166085A (en)* | 2007-09-24 | 2008-04-23 | 北京飞天诚信科技有限公司 | Remote unlocking method and system |
| CN102063602A (en)* | 2010-12-28 | 2011-05-18 | 中兴通讯股份有限公司 | Method and terminal for locking and unlocking terminal screen based on RFID (Radio Frequency Identification) |
| CN102594997A (en)* | 2012-04-05 | 2012-07-18 | 何乙诚 | Method for remotely controlling computer by using mobile phone |
| CN102930188A (en)* | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | Screen unlocking method and device as well as terminal |
| CN103392328A (en)* | 2012-12-21 | 2013-11-13 | 华为技术有限公司 | Communication terminal work remote control server and method and communication terminal |
| WO2013170800A1 (en)* | 2012-09-11 | 2013-11-21 | 中兴通讯股份有限公司 | Communication system, display control device, mobile terminal and display status control method therefor |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1901443A (en)* | 2006-07-12 | 2007-01-24 | 北京飞天诚信科技有限公司 | Remote de-locking method of information safety device |
| CN101166085A (en)* | 2007-09-24 | 2008-04-23 | 北京飞天诚信科技有限公司 | Remote unlocking method and system |
| CN102063602A (en)* | 2010-12-28 | 2011-05-18 | 中兴通讯股份有限公司 | Method and terminal for locking and unlocking terminal screen based on RFID (Radio Frequency Identification) |
| CN102594997A (en)* | 2012-04-05 | 2012-07-18 | 何乙诚 | Method for remotely controlling computer by using mobile phone |
| WO2013170800A1 (en)* | 2012-09-11 | 2013-11-21 | 中兴通讯股份有限公司 | Communication system, display control device, mobile terminal and display status control method therefor |
| CN102930188A (en)* | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | Screen unlocking method and device as well as terminal |
| CN103392328A (en)* | 2012-12-21 | 2013-11-13 | 华为技术有限公司 | Communication terminal work remote control server and method and communication terminal |
| Title |
|---|
| 丢手机不再可怕寻找丢失的手机;江于超;《电脑迷》;20130901(第9期);第54-56页* |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3617860A4 (en)* | 2017-06-16 | 2020-08-12 | Huawei Technologies Co., Ltd. | SCREEN LOCKING METHOD AND DEVICE |
| EP4478233A3 (en)* | 2017-06-16 | 2025-02-26 | Huawei Technologies Co., Ltd. | Screen locking method and apparatus |
| Publication number | Publication date |
|---|---|
| CN103728894A (en) | 2014-04-16 |
| Publication | Publication Date | Title |
|---|---|---|
| CN103728894B (en) | The long-range control method of a kind of terminal unit and system | |
| US10362613B2 (en) | Pairing management method, recording medium, and terminal apparatus | |
| US10812485B1 (en) | Wearable device-based user authentication | |
| US8151328B1 (en) | Accessing secure network areas by utilizing mobile-device authentication | |
| KR101583741B1 (en) | Two-Factor Authentication Systems and Methods | |
| CN105024986B (en) | The methods, devices and systems that account number logs in | |
| US11823007B2 (en) | Obtaining device posture of a third party managed device | |
| CN104243458B (en) | A kind of safe online game login method and system | |
| CN103413072A (en) | Application program protection method and device | |
| CN107241329B (en) | Account login processing method and device | |
| US12164612B2 (en) | Biometric authenticated content | |
| CN102722427A (en) | Data information backup method and data information backup system | |
| WO2017166689A1 (en) | Privacy protection method and device | |
| CN109496443B (en) | Mobile authentication method and system therefor | |
| CN104104671B (en) | Establish the unified dynamic authorization code system of business entity's account | |
| WO2016206090A1 (en) | Two-factor authentication method, device and apparatus | |
| CN107978033A (en) | A kind of smart lock exchange method | |
| WO2018006318A1 (en) | Method and system for using intelligent entrance guard on basis of mobile terminal | |
| KR101294805B1 (en) | 2-channel authentication method and system based on authentication application | |
| CN103177203A (en) | Computer login management system | |
| CN112887922A (en) | Message sending method and electronic equipment | |
| WO2018006326A1 (en) | Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password | |
| WO2017113719A1 (en) | Remote mobile terminal locking method and system | |
| CN105787400A (en) | Safety protection method and system based on mobile terminal | |
| CN105072084A (en) | Method for building data connection between mobile terminal and external equipment |
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CP01 | Change in the name or title of a patent holder | Address after:Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after:GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. Address before:Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before:GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. | |
| CP01 | Change in the name or title of a patent holder |