Supercharge Your Innovation With Domain-Expert AI Agents!

Mobile terminal unlocking method and device and mobile terminal

A mobile terminal and unlocking device technology, applied in the field of communication security, can solve problems such as low security, achieve the effect of improving security and improving user experience

Inactive Publication Date: 2016-11-09
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a mobile terminal unlocking method, device and mobile terminal, which solves the technical problem of low security in the prior art that only uses user fingerprints to unlock mobile terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal unlocking method and device and mobile terminal
  • Mobile terminal unlocking method and device and mobile terminal
  • Mobile terminal unlocking method and device and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] See figure 1 , figure 1 The flow chart of the mobile terminal unlocking method provided in this embodiment, the specific unlocking process is as follows:

[0046] S11. Obtain an unlocking pressure code and an image code to be verified.

[0047] Specifically, the pressure code generating device can convert the pressure value into a binary code, that is, generate binary pressure codes of different sizes according to the pressure value, and a pressure prompt will be given on the surface of the pressure code generating device so that the user can determine the pressure applied to the pressure code generating device. What is the pressure value of , so that the user can accurately obtain the binary pressure code when decrypting. Of course, the pressure value can also be converted into pressure codes of other bases by the pressure code generating device. Correspondingly, the unlocking pressure code can also be binary or other binary codes, and this embodiment uses the binar...

Embodiment 2

[0061] This embodiment further describes the mobile terminal unlocking method provided by the embodiment of the present invention based on the content of the first embodiment. See figure 2 , figure 2 It is a flow chart of the fingerprint information encryption method provided in this embodiment. In this embodiment, the mobile terminal is a mobile phone, the image information is fingerprint information, and the fingerprint code is extracted from the fingerprint information. The specific fingerprint information encryption process is as follows:

[0062] S21, collecting fingerprint information, and reading a standard pressure code.

[0063] Specifically, the fingerprint information is collected by a camera or by pressing, and a standard pressure code is read by a pressure code generating device. When reading the pressure code, the binary code can be read from the pressure code generating device through in-line or wireless transmission.

[0064] S22. Convert the collected f...

Embodiment 3

[0071] This embodiment further describes the mobile terminal unlocking method provided by the embodiment of the present invention based on the content of the first embodiment and the second embodiment. After the encryption of the fingerprint information in the second embodiment is completed, the fingerprint decryption process of this embodiment is executed. See image 3 , image 3 The flow chart of the fingerprint information decryption method provided in this embodiment, in this embodiment, the mobile terminal is also the fingerprint information, and the fingerprint code is extracted from the fingerprint information. The specific fingerprint information decryption process is as follows:

[0072] S31. Read the fingerprint code to be verified and the unlocking pressure code, and call the unlocking verification data.

[0073] Specifically, the unlocking verification data includes the verification parameters obtained by encrypting the standard image code with the standard pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal unlocking method and device and a mobile terminal. An unlocking pressure code and a to-be-verified image code are acquired, and unlocking verification data is called, wherein the unlocking verification data comprises verification parameters obtained after a standard pressure code is used for encrypting a standard image code, the unlocking verification data is decrypted through the unlocking pressure code to obtain decryption parameters, the to-be-verified image code is verified through the decryption parameters, if the to-be-verified image code passes verification, unlocking succeeds, or else, unlocking fails. According to the scheme, when the mobile terminal is unlocked, the mobile terminal can be unlocked only under the condition that the unlocking pressure code and the to-be-verified image code are both correct. Meanwhile, due to the fact that the encrypted verification parameters are messy codes and the pressure codes can be read in real time only when decryption is needed, even when a user losses image information, the user does not need to worry about leakage of personal information, and the safety of the personal information and use experience of the user are greatly improved.

Description

technical field [0001] The present invention relates to the technical field of communication security, in particular to a mobile terminal unlocking method, device and mobile terminal. Background technique [0002] At present, the leakage of important information after the mobile phone is lost has become a major hidden danger of personal information security, and the solution to information theft has become a hot spot. As a reliable biometric technology, fingerprint recognition technology has attracted people's attention. In the existing fingerprint identification technology, after the fingerprint information of the user is collected, the fingerprint information will not be further encrypted, and the fingerprint identification can be completed only through the unencrypted fingerprint information to unlock the mobile phone or mobile application, private space, etc., resulting in The security of personal information is still very low, and it is easy to cause serious leakage of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/36G06F21/46
CPCG06F21/31G06F21/36G06F21/46G06F2221/2133
Inventor 侯晓龙
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More