Unlock instant, AI-driven research and patent intelligence for your innovation.

An unlocking method and terminal

A terminal and unlocking technology, which is applied in a method of unlocking and in the field of terminals, can solve problems such as password leakage and peeking into passwords, and achieve the effect of improving security and avoiding single input

Inactive Publication Date: 2017-11-24
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In daily life, when unlocking the terminal, the mainstream uses different numbers for decryption. For example, Apple mobile phones often use 4-digit passwords. Therefore, the following situations will occur. When users enter the password, they need to find the correct number. Then input one by one, this method is easy for others to peek at the password, especially when the terminal screen is large, so it is easy to cause password leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An unlocking method and terminal
  • An unlocking method and terminal
  • An unlocking method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. . Based on the embodiments in the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the embodiments of the present invention.

[0058] In implementation, in the embodiment of the present invention, the terminal may include but not limited to: a notebook computer, a mobile phone, a tablet computer, a smart wearable device, and the like. The system of the terminal refers to the operating system of the device, which may include but not limited to: Android system, Symbian system, Windows system, IOS (a mobile operating system developed by Appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is an unlocking method, comprising: determining N sets of touch parameters of a user performing N touch operations on a touch screen of a terminal, N being a positive integer; matching the N sets of touch parameters with N sets of preset touch parameters; in the case that the matching of the N sets of touch parameters with the N sets of preset touch parameters is successful, performing an unlocking operation on the terminal. Also disclosed is a terminal. The N sets of touch parameters are matched with the N sets of preset touch parameters, and in the case that the matching is successful, unlocking is performed on the terminal. Multiple sets of touch parameters are used, thus avoiding a single input for digital unlocking, and thereby increasing the security of the terminal.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of electronic equipment, and in particular to an unlocking method and a terminal. Background technique [0002] With the development of science and technology, terminals (such as mobile phones, tablet computers, smart wearable devices, etc.) are becoming more and more popular, and at the same time, their functions are becoming more and more powerful. As more and more applications are carried by terminals for electronic portable devices, their security issues have also become a major indicator when users purchase terminals. [0003] In daily life, when unlocking the terminal, the mainstream uses different numbers for decryption. For example, Apple mobile phones often use 4-digit passwords. Therefore, the following situations will occur. When users enter the password, they need to find the correct number. Then input them one by one. In this way, it is easy for others to spy on the pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06F3/0488
CPCG06F3/04883G06F21/36G06F3/0488
Inventor 李建林李家达
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD