Touch screen unlocking method and device, electronic equipment, display and mobile terminal

A technology for unlocking devices and touch screens, applied in instruments, electrical digital data processing, computing, etc., can solve the problems of low decryption difficulty, limited combination relationship, and single mode, so as to increase the difficulty of decryption, increase diversity, and improve safety effect

Active Publication Date: 2015-11-25
BANMA ZHIXING NETWORK HONGKONG CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This nine-square gesture cipher simply connects 9 fixed points to determine the encrypted gesture and the decrypted gesture. The combination relationship between these points is relatively limited, so there is not only the problem of single mode, but also the security problem due to the difficulty of decryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Touch screen unlocking method and device, electronic equipment, display and mobile terminal
  • Touch screen unlocking method and device, electronic equipment, display and mobile terminal
  • Touch screen unlocking method and device, electronic equipment, display and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0062] Example 1: Image encryption process with multiple faces

[0063] see Figure 3a and Figure 3b , showing a password image encryption process with multiple faces, which specifically includes the following four steps:

[0064] Step1: The user can select an existing picture in the device as the basis for the password lock. For a device with a camera function, the user can temporarily take a picture to obtain a picture. In this example, the user selects Figure 3a picture shown.

[0065] Step2: Determine whether the selected picture is suitable as a password picture. In this example, the automatic face detection method can be used to select the operation hotspot, and it can be judged that there are 6 faces in the picture, which meet the requirements for setting a password picture. From Figure 3a to Figure 3b , the outer frame of the face is detected by automatic face detection technology, and the content in the frame is the hot spot. The automatic face recognition he...

example 2

[0071] Example 2: Image encryption process with multiple scenes

[0072] see Figure 4a and Figure 4b , showing the password picture encryption process with multiple scenes, which specifically includes the following four steps:

[0073] Step1: The user selects a picture, such as Figure 4a shown.

[0074] Step2: The picture has a variety of scenes, which meet the requirements.

[0075] Step3: Use the scene area segmentation technology to divide the image area into 5 parts, such as Figure 4b shown. For technical information on scene segmentation, refer to known technologies, for example, refer to the following papers:

[0076][2] ZhuowenTu, XiangrongChen, AlanL.Yuille, Song-ChunZhu, "ImageParsing: UnifyingSegmentation, Detection, and Recognition," International Journal of ComputerVision, Volume63, Number2, pp.113-140July2005

[0077] Step4: The user can define an encrypted gesture based on the segmentation result. For example, a user clicks: tree->beach->mountain to de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application relates to control technology for an electronic device, and particularly discloses a touch screen unlocking method, a device and an electronic device, a touch display and a mobile terminal based on image analysis. The touch screen unlocking method includes the following steps: presenting a preset password image in a touch screen locked state, the password image including multiple hotspots used for setting an encryption gesture; detecting a touch event of the touch screen to obtain a decryption gesture relating to the hotspots; comparing the decryption gesture to the encryption gesture to determine whether the decryption gesture matches the encryption gesture; when the decryption gesture matches the encryption gesture, switching the touch screen into an unlocked state. The corresponding touch screen unlocked device, electronic device, touch display and mobile terminal can carry out gesture password unlocking on the password image set autonomously, and consequently have characteristics of various unlocked modes and higher safety.

Description

technical field [0001] The present application relates to the control technology of electronic equipment, and in particular to a touch screen unlocking method and device based on gesture unlocking, electronic equipment, touch display and mobile terminal. Background technique [0002] In recent years, mobile devices (such as smart phones, tablet computers, etc.) have become more and more widely used, with more and more functions, and more and more private information stored by users, which puts higher demands on the performance of mobile devices. Require. Current mobile devices generally use touch screens as display modules and user input devices. In order to prevent user privacy from being stolen by others, specific encryption and decryption tools are usually used to lock the screen or lock specific applications. When the locking condition is met, the mobile device, touch screen or application running on the mobile device will be locked after the idle time has elapsed. Whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0488
CPCG06F3/0488
Inventor 段炎彪楚汝峰
Owner BANMA ZHIXING NETWORK HONGKONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products