Embodiment
Description below with reference to accompanying drawing is had the right the application defined in requirement and its equivalent for ease of Integrated UnderstandingVarious embodiments.These embodiments include various specific details in order to understand, but these be considered only as it is exemplary.CauseThis, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described hereThe scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structureDescription.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely canUnderstand and as one man understand the application.Therefore, for those skilled in the art, it is possible to understand that, there is provided to the various implementations of the applicationThe description of example is only the purpose to illustrate, rather than limitation appended claims and its application of Equivalent definitions.
Below in conjunction with the accompanying drawing in the application some embodiments, the technical scheme in the embodiment of the present application is carried out clearChu, it is fully described by, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are obtained all under the premise of creative work is not madeOther embodiment, belong to the scope of the application protection.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment, and it is not intended to be limiting the application." one " of singulative used in the embodiment of the present application and appended claims,"one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other implications.AlsoIt should be appreciated that term "and/or" used herein refer to and list items purposes comprising one or more mutually bindings it is any orIt is possible to combine.Expression " first ", " second ", " described the first " and " described the second " be used for modify respective element without examiningWorry order or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone,PC (PC, such as tablet personal computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-bookReader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality deviceAnd one or more of combinations in wearable device etc. (VR).According to some embodiments of the present application, the wearable deviceIncluding type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics clothesDress), decorated type (such as pad skin, tatoo or built in electronic device) etc. in one or more of combinations.The application'sIn some embodiments, the electronic equipment can be flexible, be not limited to the said equipment, or can be in above-mentioned various equipmentOne or more of combinations.In this application, term " user " may indicate that using the people of electronic equipment or using electronic equipmentEquipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides a kind of concealed unlocking method and system.For the ease of understanding the embodiment of the present application, withIt is lower that the embodiment of the present application is described in detail refer to the attached drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1Shown, Environment System 100 can include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be withIncluding bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physicsKey 117 etc..In some embodiments of the present application, electronic equipment 110 can omit one or more elements, or can enter oneStep includes one or more other elements.
Bus 111 can include circuit.The circuit can be with one or more element (examples in interconnection electronics 110Such as, bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and secondary or physical bond117).The circuit can also be realized between one or more elements in electronic equipment 110 communication (for example, obtain and/orSend data).
Processor 112 can include one or more coprocessors (Co-processor), application processor (AP,Application Processor) and communication processor (Communication Processor).As an example, processor112 can perform to the control of one or more elements of electronic equipment 110 and/or data processing (for example, the behaviour that communication is relatedMake).
Memory 113 can be with data storage.The data can include other with one or more of electronic equipment 110The related instruction of element or data.For example, the data can include the initial data of the before processing of processor 112, intermediate dataAnd/or the data after processing.Memory 113 can include impermanent memory memory and/or permanent memory memory.MakeFor example, memory 113 can store the iris information of user, historical information etc..
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrapInclude kernel, middleware, API (API, Application Programming Interface) and/or using journeySequence (or " application ").
At least a portion of the kernel, the middleware or the API can include operating system (OS,Operating System).As an example, the kernel can be controlled or managed for performing other programs (for example, middlePart, API and application program) in realize operation or function system resource (for example, bus 111, processor112nd, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, it is described shouldOne or more elements of electronic equipment 110 are accessed with DLL or the application program to control or management system resource.
The middleware can be as the intermediate layer of data transfer.The data transfer can allow API orApplication program is with the kernel communication exchanging data.As an example, the middleware can be handled from the application programOne or more task requests of acquisition.For example, the middleware can be to one or more application assigned electronic equipmentsThe priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one orMultiple tasks are asked.The API can be that the application program is used to control from the kernel or the middlewareThe interface of function is provided.The API can also include one or more interfaces or function (for example, instruction).It is describedFunction can be used for starting control, data channel control, security control, Control on Communication, document control, window control, text controlSystem, image procossing, information processing etc..
As an example, memory 113 can include Tee OS storages (Trusted Execution EnvironmentOperating System), cell phone system internal memory, mobile phone memory card etc..The TeeOS storages can be that safe storage is emptyBetween, for depositing security information (for example, iris information etc.).As an example, when electronic equipment is lost, the letter of TeeOS storagesBreath can not be cracked, so as to ensure the security of iris information.The cell phone system internal memory can include mobile phone running memoryWith mobile phone inoperative internal memory etc..The inoperative internal memory can be the ROM (Read Only Memory) of mobile phone.The mobile phone is depositedCard storage can include SD card (Secure Digital Memory Card), Micro SD cards, Mini SD cards, TF card (TransFlash Card), CF cards (Compact Flash Card), mmc card (MultiMedia Card), RS-MMC cards, M2 cards(Memory Stick Micro), MS cards etc..
Input/output module 114 can send what is inputted from user or external equipment to the other elements of electronic equipment 110Instruction or data.Input/output module 114 can also be defeated by the instruction of the other elements acquisition from electronic equipment 110 or dataGo out to user or external equipment.In certain embodiments, input/output module 114 can include input block, and user can lead toCross the input block input information or instruction.
Display 115 can be with display content.The content can to user show all kinds (for example, text, image,Video, icon and/or symbol etc., or several combinations).Display 115 can include liquid crystal display (LCD, LiquidCrystal Display), light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode(OLED, Organic Light Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro ElectroMechanical Systems) display or electric paper display etc., or several combinations.Display 115 can include displayScreen, touch-screen etc..The display screen can show unlock interface.In certain embodiments, display 115 can be shown virtuallyKey.The touch-screen can obtain the input of the virtual key.Display 115 can be obtained by the touch-screen and inputted.InstituteTouch input, gesture input, action input, the input close to input, electronic pen or user's body part can be included by stating input(for example, hovering input).
Communication module 116 can configure the communication between equipment.In certain embodiments, network environment 100 can enter oneStep includes electronic equipment 140.As an example, the communication between the equipment can include electronic equipment 110 and other equipment (exampleSuch as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can pass through radio communication or cable modemLetter is connected to network 120, realizes and communicates with other equipment (for example, server 130 or electronic equipment 140).
The radio communication can include microwave communication and/or satellite communication etc..The radio communication can include honeycombCommunication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA(CDMA, Code Division Multiple Access), 3G (Third Generation) Moblie (3G, The 3rd GenerationTelecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G)), Long Term Evolution (LTE,Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), WCDMA(WCDMA, Wideband Code Division Multiple Access), UMTS (UMTS,Universal Mobile Telecommunications System), WiMAX (WiBro, WirelessBroadband) etc., or several combinations.According to some embodiments of the present application, the radio communication can include wireless localNet (WiFi, Wireless Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol(ZigBee), near-field communication (NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN,Body Area Network) etc., or several combinations.According to some embodiments of the present application, the wire communication can includeGLONASS (Glonass/GNSS, Global Navigation Satellite System), global positioning systemSystem (GPS, Global Position System), Beidou navigation satellite system or Galileo (European GPS)Deng.The wire communication can include USB (USB, Universal Serial Bus), high-definition media interface(HDMI, High-Definition Multimedia Interface), proposed standard 232 (RS-232, RecommendStandard 232), and/or plain old telephone service (POTS, Plain Old Telephone Service) etc. in oneKind, or several combinations.
Secondary or physical bond 117 can be used for user mutual.Secondary or physical bond 117 can include one or more entity keys.In some realitiesApply in example, user can be with the function of self-defined secondary or physical bond 117.As an example, secondary or physical bond 117 can send instruction.The instructionIt can include starting terminal unlocking instruction, the instruction of certification user profile etc..The certification user profile can include iris recognition,Recognition of face, Application on Voiceprint Recognition, fingerprint recognition, hand vein recognition etc., for example, the iris recognition can include writing during iris typingIris information of user etc. is read when the iris information of user, iris verification.
In certain embodiments, electronic equipment 110 may further include sensor.The sensor can be included but notIt is limited to light sensor, acoustic sensor, gas sensor, chemical sensor, voltage sensitive sensor, temp-sensitive sensor, fluid to passSensor, biology sensor, laser sensor, Hall sensor, intelligence sensor, position sensor etc., or several combinations.
In certain embodiments, electronic equipment 110 may further include infrared equipment, image capture device etc..AsExample, the infrared equipment can identify by infrared ray mode of delivery, and blink, watch the technical limit spacing eyes such as identification attentivelyInformation.For example, the infrared equipment is acted come certification user profile by gathering the blink of user.As an example, described imageCollecting device can include camera, iris device etc..The camera can realize the functions such as eyeball tracking.The iris dressAuthentication (for example, certification user profile) can be carried out using iris recognition technology by putting.The iris device can include rainbowFilm camera, the iris camera can obtain iris information, and the iris information can be stored in memory 113.
Network 120 can include communication network.The communication network can include computer network (for example, LAN(LAN, Local Area Network) or wide area network (WAN, Wide Area Network)), internet and/or telephone networkDeng, or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothesBusiness device 130, electronic equipment 140 etc.) send information.
Server 130 can be by the other equipment in the connection Environment System 100 of network 120 (for example, electronic equipment110th, electronic equipment 140 etc.).In certain embodiments, when electronic equipment 110 is lost, server 130 can pass through network120 send startup iris read write command to electronic equipment 110;When iris verification fails, server 130 can pass through network120 further lock electronic equipment 110.In certain embodiments, when user information authentication success, server 130 can be toElectronic equipment 110, which is sent, starts terminal unlocking instruction etc..In certain embodiments, server 130 can to multiple terminals (for example,Electronic equipment 110 and electronic equipment 140) send shared information.
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application,The part or all of operation performed in electronic equipment 110 can be in another equipment or multiple equipment (for example, electronic equipment 140And/or server 130) in perform.In certain embodiments, when electronic equipment 110 be automatically or in response to request perform it is a kind of orWhen multiple functions and/or service, electronic equipment 110 can ask other equipment (for example, electronic equipment 140 and/or server130) perform function and/or service are substituted.In certain embodiments, electronic equipment 110 is in addition to perform function or service, furtherPerform relative one or more functions.In certain embodiments, other equipment is (for example, electronic equipment 140 and/or clothesBusiness device 130) asked function or other related one or more functions can be performed, implementing result can be sent to electricitySub- equipment 110.Electronic equipment 110 can repeat result or further handle implementing result, to provide asked functionOr service.As an example, electronic equipment 110 can use cloud computing, distributed computing technology and/or client-server end to calculate meterCalculate etc., or several combinations.In certain embodiments, can be included according to the difference of cloud computing service property, the cloud computingPublic cloud, private clound and mixed cloud etc..In certain embodiments, when electronic equipment 110 is lost, electronic equipment 140 can be toElectronic equipment 110 sends positioning instruction, to obtain the positional information of electronic equipment 110.In certain embodiments, electronic equipment110 can establish with electronic equipment 140 and be connected, for example, shared information etc..
It should be noted that the description for Environment System 100 above, only for convenience of description, can not be this ShenIt please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system canEach element can be combined on the premise of without departing substantially from the principle, or forms subsystem and be connected with other elements,To implementing the various modifications and variations on the above method and systematic difference field progress form and details.For example, network environmentSystem 100 may further include database.In another example electronic equipment 110 can not include secondary or physical bond 117 etc..It is all suchThe deformation of class, within the protection domain of the application.
Fig. 2 is the exemplary cell block diagram that the functions of the equipments provided according to some embodiments of the present application configure.Such as Fig. 2 institutesShow, processor 112 can include processing module 200, and the processing module 200 can include acquiring unit 210, display unit220, determining unit 230, control unit 240, memory cell 250.
According to some embodiments of the present application, acquiring unit 210 can obtain information.In certain embodiments, the letterBreath can include but is not limited to text, picture, audio, video, action, gesture, sound, eyes (for example, iris information etc.), gasBreath, light etc., or several combinations.In certain embodiments, described information can include but is not limited to input information, system informationAnd/or communication information etc..As an example, acquiring unit 210 can pass through the touch of input/output module 114, display 115Screen, secondary or physical bond 117 and/or sensor obtain the input information of electronic equipment 110.The input information can include other equipment(for example, electronic equipment 140) and/or the input of user, for example, the input of key-press input, touch-control, gesture input, action input, remoteJourney input, transmission input, eyes input, sound input, breath input, light input etc., or several combinations.The input informationObtaining widget can include but is not limited to infrared equipment, image capture device, sensor etc., or several combinations.As showingExample, acquiring unit 210 can obtain iris information etc. by image capture device (for example, iris shooting is first-class).
In certain embodiments, acquiring unit 210 can obtain the communication information by network 120.The communication information canWith including application software information, signal of communication (for example, voice signal, vision signal etc.), short message etc..In some embodimentsIn, acquiring unit 210 can obtain system information by network 120, memory 113 and/or sensor.The system information canWith include but is not limited to the system mode of electronic equipment 110, presupposed information, memory 113 store information (for example, iris is recognizedDemonstrate,prove information etc.) etc., or several combinations.
In certain embodiments, described information can include instruction.The instruction includes user instruction and/or system commandDeng, or several combinations.The instruction can include triggering command, certification instruction, fill in instruction etc., or several combinations.InstituteCertification user profile can be included, start terminal unlocking instruction etc. by stating certification instruction.As an example, acquiring unit 210 can lead toCross secondary or physical bond 117 or virtual key obtains user and starts terminal unlocking instruction.
According to some embodiments of the present application, display unit 220 can be with display information.In certain embodiments, display is singleMember 220 can show unlock interface.The unlock interface can include numerical ciphers interface and connection track interface etc..At someIn embodiment, display unit 220 can show unlocking pin, for example, numerical ciphers, connection track etc..In certain embodiments,Display unit 220 can the concealed association password for showing unlocking pin, for example, showing the connection of numerical ciphers in translucent fashionNumeral that track, connection track connect etc..
According to some embodiments of the present application, determining unit 230 can determine information.In certain embodiments, it is it is determined that singleWhether member 230 can utilize the user profile that close guarantor's function determination acts implementer with electronic equipment stores consistent.The close guarantorFunction can include password identification and/or biological identification technology.The password identification can include user setting numerical ciphers,Sound password, gesture password, track password, touch-control password etc..The bio-identification can include iris recognition, recognition of face,Fingerprint recognition, Application on Voiceprint Recognition, hand vein recognition etc..In certain embodiments, determining unit 230 can determine unlocking manner.OneIn a little embodiments, determining unit 230 can determine whether the association password of unlocking pin and preset password are consistent etc..In some realitiesApply in example, determining unit 230 can determine whether new password and history password are consistent etc..
According to some embodiments of the present application, control unit 240 can be with control electronics.In certain embodiments, controlUnit 240 processed can lock electronic equipment, unblock electronic equipment and/or foundation or the communication connection for disconnecting electronic equipment.It is describedThe function of limitation electronic equipment can be included by locking electronic equipment.As an example, when determining unit 230 determines new password and historyWhen password is consistent, control unit 240 can lock electronic equipment, for example, the functions such as the touch screen of the electronic equipment, button are locked,Prevent action implementer from unlocking the electronic equipment.In certain embodiments, control unit 240 can be in locking electronic equipmentWhen, further send warning information.The warning information can prompt the potential safety hazard that user terminal has password leakage.OneIn a little embodiments, control unit 240 can unlock electronic equipment.For example, when determining unit 230 determines that the association of unlocking pin is closeWhen code is consistent with preset password, control unit 230 can release the locking of electronic equipment.
According to some embodiments of the present application, memory cell 250 can be with storage information.In certain embodiments, storage is singleMember 250 can store history password.As an example, when determining unit 230 determines the association password and preset password of unlocking pinWhen consistent, memory cell 250 can store the unlocking pin.In certain embodiments, memory cell 250 can store defaultHistory password in time range, for example, the preset time range can include one day, one week etc..As an example, when unblockWhen password storage exceedes preset time range, control unit 240 can delete the unlocking pin for exceeding preset time range.
It should be noted that described above for the unit in processing module 200, only for convenience of description, can not be thisApplication is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system,Unit may be combined on the premise of without departing substantially from the principle, or form submodule and connect with other unitsConnect, the various modifications and variations in form and details are carried out to the function of implementing above-mentioned module and unit.For example, processing module200 can not include display unit 220 or memory cell 250, and corresponding function is performed by display 115 or memory 113Deng.Such deformation, within the protection domain of the application.
Fig. 3 is the exemplary process diagram of the concealed unlocking method provided according to some embodiments of the present application.Such as Fig. 3 institutesShow, flow 300 can be realized by processing module 200.
301, the unlocking signal of terminal is obtained.Operation 301 can be realized by the acquiring unit 210 of processing module 200.In certain embodiments, acquiring unit 210 can obtain the unlocking signal of terminal by secondary or physical bond or virtual key.As an example,When lighting terminal screen by secondary or physical bond when user is in terminal blank screen, acquiring unit 210, which can obtain, described lights screenOperate the unlocking signal for terminal.In certain embodiments, the unlocking signal can include the start unlocking signal of terminal.
302, the first unlock interface is shown.Operation 302 can be realized by the display unit 220 of processing module 200.InstituteNumerical ciphers interface and connection track interface etc. can be included by stating unlock interface.In certain embodiments, display unit 220 can be withThe unlock interface during unblock of display terminal last time.In certain embodiments, if the unlock interface of terminal last time is close for numeralCode interface, display unit 220 can show the numerical ciphers interface as the first unlock interface.
303, judge whether to switch unlocking manner.Operation 303 can be real by the determining unit 230 of processing module 200It is existing.The unlocking manner can include numerical ciphers and unlock and connect track unblock etc..In certain embodiments, determining unit230 can determine whether to switch unlocking manner according to the selection of terminal user.
If not switching unlocking manner, into operation 304,304, the first unlocking manner is determined.Operation 304 can pass through placeThe determining unit 230 of reason module 200 is realized.In certain embodiments, when user directly inputs unlocking pin, determining unit230 can determine not switch unlocking manner, in first unlock interface, determine the first unlocking manner.In certain embodiments,When the first unlock interface is numerical ciphers interface, first unlocking manner can be that numerical ciphers unlock.
305, in first unlock interface, the association password of the first unlocking pin of checking.Operation 305 can pass through placeThe control unit 240 of reason module 200 is realized.In certain embodiments, control unit 240 can verify the pass of the first unlocking pinJoin password.The association password can include the connection track of numerical ciphers, numeral that connection track connects etc..In some implementationsIn example, when first unlock interface is numerical ciphers interface, first unlocking pin can be numerical ciphers, described theThe association password of one unlocking pin can be the connection track of the numerical ciphers.
If switching unlocking manner, into operation 306,306, the second unlocking manner is determined.Operation 306 can pass through processingThe determining unit 230 of module 200 is realized.In certain embodiments, determining unit 230 can be determined to switch to by predetermined registration operationSecond unlocking manner.The predetermined registration operation can include sliding screen, pressing secondary or physical bond, click on virtual key, shake the behaviour such as terminalMake.In certain embodiments, when first unlocking manner is that numerical ciphers unlock, second unlocking manner can be to connectThe mark that integrates with unlocks.
307, in the second unlock interface, the association password of the second unlocking pin of checking.Operation 307 can be by handling mouldThe control unit 240 of block 200 is realized.In certain embodiments, control unit 240 can verify that the association of the first unlocking pin is closeCode.The association password can include the connection track of numerical ciphers, numeral that connection track connects etc..In some embodimentsIn, second unlock interface can be connection track interface, and second unlocking pin can be to connect track, described secondThe association password of unlocking pin can be the numerical ciphers of the connection Track association.
It should be noted that the description for flow 300 above, only for convenience of description, can not be limited in the applicationWithin the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, may not carry on the backOn the premise of from the principle, each operation is combined, or forms sub-process and other operative combinations, in implementationState the various modifications and variations in flow and the function progress form and details of operation.For example, flow 300 can not perform operation304 or operation 306, can be directly entered operation 305 or operation 307 etc..Such deformation, the protection model in the applicationWithin enclosing.
Fig. 4 is the exemplary process diagram of the numerical ciphers unlocking method provided according to some embodiments of the present application.Such as Fig. 4Shown, flow 400 can be realized by processing module 200.The illustrative diagram of the numerical ciphers unlocking method, as Fig. 8,Shown in Fig. 9 and Figure 10.
401, the numerical ciphers for sequentially inputting terminal are obtained.Operation 401 can pass through the acquiring unit of processing module 200210 realize.In certain embodiments, acquiring unit 210 can obtain the numerical ciphers of user's input terminal by touch-screen.MakeFor example, user can sequentially input numerical ciphers according to connection track, unlock terminal.
402, the connection track of the numerical ciphers is determined.Operation 402 can pass through the determining unit of processing module 200230 realize.The connection track can be shown by display unit 220, for example, the concealed display in a manner of translucent.OneIn a little embodiments, the numerical ciphers that determining unit 230 can be sequentially input by being linked in sequence determine connection track.
403, judge to connect track and whether desired guiding trajectory is consistent.Operation 403 can pass through the determination of processing module 200Unit 230 is realized.In certain embodiments, determining unit 230 can not verify the numerical ciphers that user sequentially inputs, it is determined that singleMember 230 can verify the connection track of the numerical ciphers association, for example, the connection track of contrast numerical ciphers association and userDesired guiding trajectory it is whether consistent.
If inconsistent, into operation 404,404, invalid unblock is shown.Operation 404 can pass through processing module 200Display unit 220 is realized.In certain embodiments, display unit 220 can show invalid unblock, and control unit 240 can notPerform unblock operation.
If consistent, into operation 405,405, the terminal is unlocked.Operation 405 can pass through the control of processing module 200Unit 240 processed is realized.In certain embodiments, control unit 240 can perform the unblock operation of terminal.
406, the connection track numerical ciphers consistent with the desired guiding trajectory are stored.Operation 406 can pass through placeThe memory cell 250 of reason module 200 is realized.In certain embodiments, it is successfully digital close can to store unblock for memory cell 250Code.The numerical ciphers can be used for verifying whether password is compromised.In certain embodiments, memory cell 250 can storeThe successful numerical ciphers of unblock in preset time range, the preset time range can include one day, one week etc..As showingExample, control unit 240 can be deleted more than the successful numerical ciphers of the unblock of preset time range.
Fig. 5 is the exemplary process diagram of the checking numerical ciphers provided according to some embodiments of the present application.Such as Fig. 5 institutesShow, flow 500 can be realized by processing module 200.The illustrative diagram of the numerical ciphers unlocking method, such as Fig. 8, figureShown in 9 and Figure 10.
501, the new numerical ciphers for sequentially inputting terminal are obtained.Operation 501 can pass through the acquisition list of processing module 200Member 210 is realized.In certain embodiments, acquiring unit 210 can obtain the new number that user sequentially inputs terminal by touch-screenWord password.
502, the connection track of the storage historical figures password consistent with desired guiding trajectory is obtained.Operation 502 can pass throughAcquiring unit 210, the memory cell 250 of processing module 200 are realized.In certain embodiments, acquiring unit 210 can be from storageThe successful historical figures password of unblock of storage is obtained in unit 250.The connection track of the historical figures password and default railMark is consistent.
503, judge whether the new numerical ciphers and the historical figures password are consistent.Operation 503 can pass through placeThe determining unit 230 of reason module 200 is realized.In certain embodiments, determining unit 230 can be close by contrasting the new numeralCode determines whether unanimously with the historical figures password.In certain embodiments, determining unit 230 verifies the new numerical ciphersIt can be used for judging whether password is spied on and reveals with the uniformity of the historical figures password.
If inconsistent, into operation 504, the connection track of the checking new numerical ciphers.Operation 504 can pass through processingThe control unit 240 of module 200 is realized.In certain embodiments, control unit 240 can perform the checking new numerical ciphersConnection track.In certain embodiments, when numerical ciphers are not spied on and revealed, control unit 240 can perform terminalConcealed unlocking method, the concealed unlocking method can include not verifying the numerical ciphers directly inputted, verify that the numeral is closeWhether the association password and preset password of code are consistent.
If consistent, into operation 505, the terminal is locked.Operation 505 can pass through the control unit of processing module 200240 realize.When the new numerical ciphers are consistent with the historical figures password, user unlocks historical figures password during terminalIt may be spied on and be revealed, end message has potential safety hazard.In certain embodiments, control unit 240 can be with locking terminal.In certain embodiments, control unit 240 can further perform alarm sounds.In certain embodiments, terminal user according toThe numerical ciphers of desired guiding trajectory input can be random, when terminal inputs identical numerical ciphers again, can promptThe numerical ciphers of terminal are spied on and revealed.
According to some embodiments of the present application, flow 500 can first carry out operation 504, when the company of the new numerical ciphersIntegrate with mark and desired guiding trajectory it is inconsistent when, can further verify whether the new numerical ciphers and historical figures password consistent,To determine whether the terminal password is spied on and reveals.
According to some embodiments of the present application, when terminal is locked, flow 500 may further include certification user letterBreath.In certain embodiments, the certification user profile can be authenticated by biological identification technology.The bio-identification skillArt can include iris recognition, recognition of face, fingerprint recognition, Application on Voiceprint Recognition, hand vein recognition etc., or several combinations.Work as certificationDuring success, control unit 240 can release the locking of terminal, or unblock terminal.When the authentication fails, control unit 240 can be withPerform alarm sounds.
It should be noted that the description for flow 400, flow 500 above, only for convenience of description, can not be this ShenIt please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system canEach operation can be combined on the premise of without departing substantially from the principle, or forms sub-process and other operative combinations,The various modifications and variations in form and details are carried out to the function of implementing above-mentioned flow and operation.For example, flow 400 can be sameShi Zhihang operations 405 and operation 406 etc..In another example flow 500 may further include the operation such as certification user profile.Such asSuch deformation, within the protection domain of the application.
Fig. 6 is the exemplary process diagram of the connection track unlocking method provided according to some embodiments of the present application.Such as Fig. 6Shown, flow 600 can be realized by processing module 200.The illustrative diagram of the connection track unlocking method, such as schemes11st, shown in Figure 12, Figure 13 and Figure 14.
601, the connection track of input terminal is obtained.Operation 601 can pass through the acquiring unit 210 of processing module 200Realize.In certain embodiments, acquiring unit 210 can obtain the connection track of user's input terminal by touch-screen.OneIn a little embodiments, user can input connection track according to the order of numerical ciphers in terminal.
602, the numerical ciphers that the connection track is sequentially connected are determined.Operation 602 can pass through processing module 200Determining unit 230 is realized.The numerical ciphers can be shown by display unit 220, for example, concealed aobvious in a manner of translucentShow.In certain embodiments, the numeral that determining unit 230 can be linked in sequence by connecting track determines numerical ciphers.
603, judge whether numerical ciphers are consistent with preset password.Operation 603 can pass through the determination of processing module 200Unit 230 is realized.In certain embodiments, determining unit 230 can not verify connection track, verify the connection Track associationNumerical ciphers, for example, contrast connection Track association numerical ciphers and user preset password it is whether consistent.
If inconsistent, into operation 604,604, invalid unblock is shown.Operation 604 can pass through processing module 200Display unit 220 is realized.In certain embodiments, display unit 220 can show invalid unblock, and control unit 240 can notPerform unblock operation.
If consistent, into operation 605,605, the terminal is unlocked.Operation 605 can pass through the control of processing module 200Unit 240 processed is realized.In certain embodiments, control unit 240 can perform the unblock operation of terminal.
606, the numerical ciphers connection track consistent with the preset password is stored.Operation 606 can pass through placeThe memory cell 250 of reason module 200 is realized.In certain embodiments, memory cell 250 can store unblock successfully connection railMark.The connection track can be used for verifying whether track password is compromised.In certain embodiments, user is according to numerical ciphersThe connection track sequentially inputted can be random, when terminal inputs identical connection track again, the terminal passwordIt may be spied on and be revealed.In certain embodiments, memory cell 250 can store unblock in preset time range and successfully connectIntegrate with mark, and the preset time range can include one day, one week etc..As an example, control unit 240 can be deleted more than pre-If the unblock of time range successfully connects track.
Fig. 7 is the exemplary process diagram of the checking connection track provided according to some embodiments of the present application.Such as Fig. 7 institutesShow, flow 700 can be realized by processing module 200.It is described connection track unlocking method illustrative diagram, as Figure 11,Shown in Figure 12, Figure 13 and Figure 14.
701, the new connection track for sequentially inputting terminal is obtained.Operation 701 can pass through the acquisition list of processing module 200Member 210 is realized.In certain embodiments, acquiring unit 210 can obtain the new connection rail of user's input terminal by touch-screenMark.
702, the numerical ciphers of the storage history connection track consistent with preset password is obtained.Operation 702 can pass throughAcquiring unit 210, the memory cell 250 of processing module 200 are realized.In certain embodiments, acquiring unit 210 can be from storageThe successful history connection track of unblock of storage is obtained in unit 250.The numerical ciphers of history connection track connection with it is pre-If password is consistent.
703, judge whether the new connection track with the history is connected track consistent.Operation 703 can pass through placeThe determining unit 230 of reason module 200 is realized.In certain embodiments, determining unit 230 can be by contrasting the new connection railMark is connected track with the history and determined whether unanimously.In certain embodiments, determining unit 230 verifies the new connection trackThe uniformity that track is connected with the history can be used for judging whether password is spied on and reveals.
If inconsistent, into operation 704, the numerical ciphers of the checking new connection track.Operation 704 can pass through processingThe control unit 240 of module 200 is realized.In certain embodiments, control unit 240 can perform the checking new connection trackThe numerical ciphers of connection.In certain embodiments, when being revealed when connecting track and not spied on, control unit 240 can performTerminal secret unlocking method, the concealed unlocking method can include not verifying the connection track directly inputted, verify the companyIntegrate with mark association password and preset password it is whether consistent.
If consistent, into operation 705, the terminal is locked.Operation 705 can pass through the control unit of processing module 200240 realize.When the new connection track is consistent with history connection track, user unlocks history connection track during terminalIt may be spied on and be revealed, end message has potential safety hazard.In certain embodiments, control unit 240 can be with locking terminal.In certain embodiments, control unit 240 can further perform alarm sounds.In certain embodiments, terminal user according toThe connection track of preset password input can be random, when terminal inputs identical connection track again, can promptThe numerical ciphers of terminal are spied on and revealed.
According to some embodiments of the present application, flow 700 can first carry out operation 704, when the number of the new connection trackWhen word password and preset password are inconsistent, it can further verify whether the new connection track is connected track with history consistent,To determine whether the terminal password is spied on and reveals.
According to some embodiments of the present application, when terminal is locked, flow 700 may further include certification user letterBreath.In certain embodiments, the certification user profile can be authenticated by biological identification technology.The bio-identification skillArt can include iris recognition, recognition of face, fingerprint recognition, Application on Voiceprint Recognition, hand vein recognition etc., or several combinations.Work as certificationDuring success, control unit 240 can release the locking of terminal, or unblock terminal.When the authentication fails, control unit 240 can be withPerform alarm sounds.
It should be noted that the description for flow 600, flow 700 above, only for convenience of description, can not be this ShenIt please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system canEach operation can be combined on the premise of without departing substantially from the principle, or forms sub-process and other operative combinations,The various modifications and variations in form and details are carried out to the function of implementing above-mentioned flow and operation.For example, flow 600 can be sameShi Zhihang operations 605 and operation 606 etc..In another example flow 700 may further include the operation such as certification user profile.Such asSuch deformation, within the protection domain of the application.
Fig. 8 is the illustrative diagram of the numerical ciphers unlock interface provided according to some embodiments of the present application.Such as Fig. 8Shown, interface 810 can show numerical ciphers unlock interface.Keyboard interface 811 can show nine grids numeric keypad.At someIn embodiment, the nine grids numeric keypad can be updated with preset rules shows that random natural number is in point of nine grids in 0-9Cloth.As an example, the preset rules can include showing that any 9 natural numbers are in the distribution of nine grids, the 0-9 in 0-9In any 9 natural numbers can be with identical or different.When in the 0-9 any 9 natural numbers can with it is identical when, preset rules can be withFurther comprise that identical natural number at most occurs 2 times, or 4 different natural numbers etc. at least occur.Numerical ciphers frame 812 canTo show numerical ciphers that user sequentially inputs.In certain embodiments, interface 810 can not show numerical ciphers frame 812.NumberWord password box 812 can show numerical ciphers, or replaced and shown with additional character, or first show numerical ciphers again with additional characterDisplay is replaced, or is switched by handoff options and shows numerical ciphers or additional character.Connection track 813, which can be shown, to be sequentially inputNumerical ciphers connection track.In certain embodiments, interface 810 can not show that connection track 813, or concealed display connectIntegrate with mark 813.The concealed display can include translucent display, dotted line is shown.Prompting frame 814 can show desired guiding trajectorySet successfully or the successful schematic diagram of terminal unlocking.In certain embodiments, interface 810 can not display the prompt box 814.
In certain embodiments, when the numerical ciphers that user sequentially inputs terminal are 2-4-8-6, terminal can set instituteThe connection track 813 for stating numerical ciphers 2-4-8-6 is desired guiding trajectory.As an example, terminal can verify the numeral of user's inputWhether the connection track of password and desired guiding trajectory 813 are consistent.In certain embodiments, when user sequentially inputs the digital close of terminalCode is when being 2-4-8-6, does not verify the numerical ciphers of the 2-4-8-6 during terminal unlocking, can verify the company of the numerical ciphersIntegrate with mark 813.As an example, at interface 810, the connection track 813 of the numerical ciphers is pre- with user's input for verifyingIf whether track is consistent.
Fig. 9 is that the numerical ciphers provided according to some embodiments of the present application unlock successful illustrative diagram.Such as Fig. 9Shown, interface 820 can show numerical ciphers unlock interface.Keyboard interface 821 can show nine grids numeric keypad.At someIn embodiment, keyboard interface 821 can update distribution of 9 natural numbers different in 0-9 in nine grids, keyboard interface 821 withThe digital distribution of keyboard interface 811 shown in Fig. 8 is different.In certain embodiments, numerical ciphers frame 822 can show user according toThe numerical ciphers of secondary input terminal are 8-4-2-6, do not verify the numerical ciphers of the 8-4-2-6 during terminal unlocking, can verifyWhether the connection track 823 of the numerical ciphers of the 8-4-2-6 and desired guiding trajectory 813 of the user at interface 810 are consistent.Work as connectionWhen track 823 is consistent with desired guiding trajectory 813, prompting frame 824 can show the successful schematic diagram of unblock.In certain embodiments,Interface 820 can not display the prompt box 824, the control unit 240 of terminal can directly perform unblock operation.
Figure 10 is the illustrative diagram of the numerical ciphers unblock alarm provided according to some embodiments of the present application.Such as figureShown in 10, interface 830 can show numerical ciphers unlock interface.Keyboard interface 831 can show nine grids numeric keypad.KeyboardInterface 831 is identical with the digital distribution of the keyboard interface 821 in Fig. 9, for illustrating the scene of the invalid unblock of terminal.In some realitiesApply in example, numerical ciphers frame 832 can show that the numerical ciphers that user sequentially inputs terminal are 2-4-8-6, during terminal unlocking notThe numerical ciphers of the 2-4-8-6 are verified, can verify that the connection track 833 of the numerical ciphers of the 2-4-8-6 exists with userWhether the desired guiding trajectory 813 at interface 810 is consistent.When connect track 833 and desired guiding trajectory 813 it is inconsistent when, prompting frame 834 can be withShow the schematic diagram of invalid unblock.
In certain embodiments, the number when the numerical ciphers of 2-4-8-6 described in terminal authentication unlock successfully with interface 810When word password 2-4-8-6 is consistent, terminal can perform alarm sounds by control unit 240.For example, prompting frame 834 can showShow the schematic diagram of alarm sounds, revealed with reminding user terminal password to be spied on.In certain embodiments, other usersThe numerical ciphers spied in interface 810 are simultaneously unlocked terminal operation in interface 830, described in the terminal authentication in interface 810The association password (connection track 813) of numerical ciphers performs unblock operation;Keyboard interface 831 and the keyboard interface in interface 810811 digital distribution is different, and other users input identical numerical ciphers obtain different association password (connection track 833);Terminal can verify that connection track 833 is different from desired guiding trajectory 813, show invalid unblock;Terminal can also verify numerical ciphers2-4-8-6 is identical with unlocking successful numerical ciphers 2-4-8-6, carries out alarm sounds.
Figure 11 is the illustrative diagram of the connection track unlock interface provided according to some embodiments of the present application.Such as figureDescribed in 11, interface 910 can show connection track unlock interface.Keyboard interface 911 can show nine grids graphic keyboard.It is describedNine grids graphic keyboard concealed can show the distribution of random natural number in 0-9 in nine grids, and the concealed display can includeTranslucent display.The nine grids graphic keyboard can show that user is sequentially connected the track of figure, for example, connection track 912.In certain embodiments, when user inputs connection track 912 in terminal, terminal can set the number of the connection Track associationWord password 2-0-8-8 is preset password.As an example, terminal can verify the numerical ciphers of the connection Track association of user's inputIt is whether consistent with preset password.In certain embodiments, can during terminal unlocking when user inputs connection track 912 in terminalNot verify the connection track 912, the numerical ciphers 2-0-8-8 that the connection track 912 associates can be verified.As showingExample, at interface 910, the numerical ciphers 2-0-8-8 of the connection track 912 be used to verifying with the preset password of user whether oneCause.Prompting frame 913 can show that preset password is set successfully or the successful schematic diagram of terminal unlocking.In certain embodiments, boundaryFace 910 can not display the prompt box 913.
Figure 12 is that the connection track provided according to some embodiments of the present application unlocks successful illustrative diagram.Such as figureDescribed in 12, interface 920 can show connection track unlock interface.Keyboard interface 921 can show nine grids graphic keyboard.OneIn a little embodiments, connection track 922 can be inputted when user unlocks terminal according to numerical ciphers 2-0-8-8.Terminal can not be testedWhether card connection track 922, terminal can verify the numerical ciphers 2-0-8-8 for connecting the association of track 922 and preset passwordUnanimously.When the numerical ciphers for connecting the association of track 922 are consistent with preset password 2-0-8-8, prompting frame 923 can show unblockSuccessful schematic diagram.
Figure 13 is that the connection track provided according to some embodiments of the present application unlocks successful another exemplary schematic diagram.As described in Figure 13, interface 930 can show connection track unlock interface.Keyboard interface 931 can show nine grids graphic keyboard.In certain embodiments, connection track 932 can be inputted when user unlocks terminal according to numerical ciphers 2-0-8-8.Terminal can be withConnection track 932 is not verified, terminal can verify the numerical ciphers 2-0-8-8 and preset password that the connection track 932 associatesIt is whether consistent.When the numerical ciphers for connecting the association of track 932 are consistent with preset password 2-0-8-8, prompting frame 933 can be shownUnlock successful schematic diagram.In certain embodiments, the digital distribution phase of keyboard interface 931 and the keyboard interface 921 in Figure 12Together, connection track 932 is different from the connection track 922 in interface 920, the numerical ciphers 2-0-8- of different connection Track associations8 is identical, and terminal can not verify connection track, terminal can verify connection Track association numerical ciphers and preset password whetherUnanimously.
Figure 14 is the illustrative diagram of the connection track unblock alarm provided according to some embodiments of the present application.Such as figureDescribed in 14, interface 940 can show connection track unlock interface.Keyboard interface 941 can show nine grids graphic keyboard.KeyboardInterface 941 is identical with the digital distribution of the keyboard interface 921 in Figure 12, for illustrating the scene of the invalid unblock of terminal.At someIn embodiment, the nine grids graphical interfaces can show the connection track 942 of user's input terminal, do not test during terminal unlockingThe connection track 942 is demonstrate,proved, can verify the numerical ciphers 8-4-2-0 for connecting the association of track 942 with user at interface 910Preset password 2-0-8-8 it is whether consistent.When numerical ciphers 8-4-2-0 and preset password 2-0-8-8 are inconsistent, prompting frame943 can show the schematic diagram of invalid unblock.
In certain embodiments, terminal can verify that the connection track 942 unlocks connection rail when successfully with interface 910When mark 912 is consistent, terminal can perform alarm sounds by control unit 240.For example, prompting frame 943 can show that alarm carriesThe schematic diagram shown, revealed with reminding user terminal password to be spied on.In certain embodiments, other users spy on interfaceConnection track 912 in 910 is simultaneously unlocked terminal operation in interface 940, and rail is connected described in the terminal authentication in interface 910The association password (numerical ciphers 2-0-8-8) of mark 912 performs unblock operation;Keyboard interface 941 and the keyboard interface in interface 910911 digital distribution is different, and other users input identical connection track obtains different association password (numerical ciphers 8-4-2-0);Terminal can verify that numerical ciphers 8-4-2-0 is different from preset password 2-0-8-8, show invalid unblock;Terminal can also be testedCard connection track 942 is identical with unlocking successfully connection track 912, carries out alarm sounds.
In summary, according to the concealed unlocking method and system of the embodiment of the present application, by unlock interface, checking unblockThe association password of password, to ensure the security of releasing process, improve Consumer's Experience.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but canTo carry out various change.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended toNonexcludability includes, so that process, method, article or equipment including a series of elements not only will including thoseElement, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to includeIntrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded thatOther identical element also be present in process, method, article or equipment including the key element.
Finally, it is to be noted that, a series of above-mentioned processing are not only included with order described here in temporal sequenceThe processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be withTo be completed by the related hardware of computer program instructions, described program can be stored in a computer-readable recording medium,The program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc,CD, read-only storage (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM)Deng.
Above disclosed is only some preferred embodiments of the application, it is impossible to the right model of the application is limited with thisEnclose, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and will according to the application rightMade equivalent variations are sought, still falls within and invents covered scope.