Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for unlocking locked operational equipment and operational equipment

A computing device, lock release technology, applied in computing, computer parts, instruments, etc., can solve problems such as security violations, time-consuming, incorrect key input of computing devices, etc.

Active Publication Date: 2012-12-12
HTC CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Many computing devices have adopted lock mechanism (lock mechanism) to prevent unauthorized use and / or accidental key input, and these locking mechanisms will need The user enters a password and / or manipulates an image (icon) in a screen form, but these steps need to be repeated and are extremely time-consuming
As a result, many users often choose not to lock these devices, which increases the chances of erroneous keystrokes on the computing device and leaves the computing device vulnerable to unauthorized use and / or malicious security. to infringe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for unlocking locked operational equipment and operational equipment
  • Method for unlocking locked operational equipment and operational equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Certain terms are used throughout the specification and described claims to refer to particular elements. Those skilled in the art should understand that hardware manufacturers may use different terms to refer to the same component. This description and the scope of the patent application described do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. The "comprising" mentioned throughout the specification and the stated claims is an open term, so it should be interpreted as "including but not limited to". In addition, the term "coupled" herein includes any direct and indirect electrical connection means. Therefore, if it is described that a first device is coupled to a second device, it means that the first device may be directly electrically connected to the second device, or indirectly electrically connected to the second device through other devices or connection mea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for unlocking a locked arithmetic device, which comprises the steps of: using the arithmetic device to obtain biometric characteristic information; determining whether the biometric characteristic information meets preset conditions; and unlocking the arithmetic device when the biometric characteristic information meets the preset conditions.

Description

technical field [0001] The invention provides a method for unlocking a locked computing device, especially a method for unlocking a locked computing device using biometric identification technology. Background technique [0002] Since computing devices have been widely used in daily life, especially the mobile computing devices that have become popular in recent years, protecting and ensuring the use of these devices and the data stored in them has gradually become an important issue. [0003] Many computing devices have adopted lock mechanism (lock mechanism) to prevent unauthorized use and / or accidental key input, and these locking mechanisms will need The user enters the password and / or operates the image (icon) in the screen form, but these steps need to be performed repeatedly and are extremely time-consuming. As a result, many users often choose not to lock these devices, which increases the chances of erroneous keystrokes on the computing device and leaves the comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/00
Inventor 林建良王景弘
Owner HTC CORP