Unlock instant, AI-driven research and patent intelligence for your innovation.

Unlocking method and terminal

A terminal and unlocking technology, applied to a method of unlocking and the field of terminals, can solve the problems of password leakage, peeping passwords, etc., to achieve the effect of improving security and avoiding single input

Active Publication Date: 2015-11-18
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In daily life, when unlocking the terminal, the mainstream uses different numbers for decryption. For example, Apple mobile phones often use 4-digit passwords. Therefore, the following situations will occur. When users enter the password, they need to find the correct number. Then input one by one, this method is easy for others to peek at the password, especially when the terminal screen is large, so it is easy to cause password leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unlocking method and terminal
  • Unlocking method and terminal
  • Unlocking method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. . Based on the embodiments in the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the embodiments of the present invention.

[0058] In implementation, in the embodiment of the present invention, the terminal may include but not limited to: a notebook computer, a mobile phone, a tablet computer, a smart wearable device, and the like. The system of the terminal refers to the operating system of the device, which may include but not limited to: Android system, Symbian system, Windows system, IOS (a mobile operating system developed by Appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses an unlocking method, comprising: determining N groups of touch parameters of N touch operations performed in a touch screen of a terminal by a user, wherein N is a positive integer; matching the N groups of touch parameters with N groups of preset touch parameters; and when successfully matching the N groups of touch parameters with the N groups of preset touch parameters, performing unlocking operation on the terminal. The embodiment of the invention further discloses the terminal. With the adoption of the embodiment of the invention, the N groups of touch parameters can be matched with the N groups of preset touch parameters, and when the matching is successful, the terminal is unlocked; and the multiple groups of touch parameters are adopted, so that single input of digital unlocking is avoided and the terminal security can be improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of electronic equipment, and in particular to an unlocking method and a terminal. Background technique [0002] With the development of science and technology, terminals (such as mobile phones, tablet computers, smart wearable devices, etc.) are becoming more and more popular, and at the same time, their functions are becoming more and more powerful. As more and more applications are carried by terminals for electronic portable devices, their security issues have also become a major indicator when users purchase terminals. [0003] In daily life, when unlocking the terminal, the mainstream uses different numbers for decryption. For example, Apple mobile phones often use 4-digit passwords. Therefore, the following situations will occur. When users enter the password, they need to find the correct number. Then input them one by one. In this way, it is easy for others to spy on the pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/36G06F3/0488
CPCG06F3/04883G06F21/36G06F3/0488
Inventor 李建林李家达
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD