Unlocking method applied to terminal and terminal

A terminal and unlocking technology, applied in the field of communication, can solve the problems of leakage of the owner's mobile phone password and theft of personal information of the mobile phone owner, and achieve the effect of ensuring security.

Active Publication Date: 2016-09-28
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the owner uses the mobile phone unlocking scheme based on the unlocking password, if the owner enters the password and is peeped by others, the owner's mobile phone password will be leaked, which may lead to the theft of the mobile phone owner's personal information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unlocking method applied to terminal and terminal
  • Unlocking method applied to terminal and terminal
  • Unlocking method applied to terminal and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Embodiments of the present invention provide an unlocking method applied to a terminal and a terminal, which are used to increase the security of unlocking a mobile phone and reduce the probability of unlocking a pattern password by a user other than a terminal holder.

[0056] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0057] In people's life, the use of terminals is becomi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose an unlocking method applied to a terminal and the terminal. The unlocking method is used for improving the security of terminal unlocking. The method provided by the embodiment of the invention comprises the steps of acquiring X current sampling points along a current track of an unlocking pattern input by a terminal user, and obtaining coordinates of the X current sampling points; expanding the X current sampling points into N expanded sampling points by adopting an interpolation method according to the coordinates of the X current sampling points, and obtaining coordinates of the N expanded sampling points; calculating and obtaining an actual deviation D of the current track of the unlocking pattern input by the user relative to a reference track of the unlocking pattern by adopting a distance calculation method according to the coordinates of the N expanded sampling points and the coordinates of the N reference sampling points; and unlocking the terminal when a ratio of the actual deviation D to a reference deviation DM is less than or equal to a deviation value R.

Description

technical field [0001] The present invention relates to the communication field, in particular to an unlocking method applied to a terminal and the terminal. Background technique [0002] With the development of science and technology, mobile phones, as a kind of communication equipment, have become more and more powerful. With the advantage of being able to consult information anytime and anywhere, mobile phones have gradually become an important means for people to obtain information. [0003] Nowadays, the use of mobile phones is becoming more and more popular. In order to prevent the mobile phone from being abused by people other than the owner, causing the privacy of the owner to leak, the mobile phone allows the owner to set the authentication method when the phone is unlocked. For example, to set the unlock password, you can Input through the virtual keyboard or through graphics; other methods such as fingerprint unlocking can also be set. [0004] However, when the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F3/0484
CPCG06F3/04847G06F21/36
Inventor 尹瀚
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products