Screen unlocking method, data access control method and security control device

A technology for screen unlocking and sensitive data, applied in the security field, can solve problems such as easy security problems, and achieve the effect of improving security and realizing personalized processing

Active Publication Date: 2013-09-11
BEIJING SAMSUNG TELECOM R&D CENT +1
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Compared with face recognition unlocking, signature unlocking can be trained, and users can input various symbols, unlike face recognition where there is only one sample sample, which is prone to security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Screen unlocking method, data access control method and security control device
  • Screen unlocking method, data access control method and security control device
  • Screen unlocking method, data access control method and security control device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical means and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0063] The basic idea of ​​the present invention is to use pre-stored signature information to control screen unlocking or data access.

[0064] Specifically, in the present invention, firstly, the signature features input by the user are collected, and the signature is registered for subsequent screen unlocking or data access control; then, when the screen unlocking is required, the user is prompted to input the signature, and the user's current signature is collected. The input signature feature is compared with the registered signature information, and if the comparison result is consistent, the screen is unlocked or the corresponding data access is allowed; otherwise, the screen is not unlocked or the corresponding data access is not allowed. It can be seen from...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a screen unlocking method and a data access control method. The data access control method comprises the following steps: collecting signature characteristics input by a user in advance, structuring signature essential information corresponding to a collection environment and storing the information; and when screening unlocking or access of limited sensitive data or application is required, collecting a current signature characteristic input by the user, extracting stored signature essential information correspondingly to a current collection environment according to the collection environment, comparing the current input signature characteristic with the extracted signature essential information to perform screen unlocking or allow the sensitive data or the application to be accessed if the comparison is identical, and otherwise, not performing screen unlocking or refusing accessing the sensitive data or the application. According to the invention, screen unlocking is realized, and personalized treatment on control of the data access is achieved, and the safety is improved.

Description

technical field [0001] The invention relates to security technology in a communication system, in particular to a screen unlocking and data access control method and a security control device. Background technique [0002] Handheld devices have penetrated into all aspects of people's lives, and the portability of their operations has been well known by the public. In the process of using the devices, many applications have gradually added the user's personality elements, biometrics, etc. For example, the most common unlocking of handheld devices has a variety of unlocking methods, including pattern unlocking, track unlocking, and fingerprint unlocking. Our unlocking will use the signature signature of the user of the handheld device to unlock. [0003] The unlocking methods in the prior art are nothing more than two types of hardware and software. The hardware method can be unlocked by various methods such as handheld devices or peripherals, and the software method has grap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0481G06F3/0484G06K9/64
Inventor 任文杰王刚柳浩全奉杰
Owner BEIJING SAMSUNG TELECOM R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products