Check patentability & draft patents in minutes with Patsnap Eureka AI!

Unlocking method and device

A technology of unlocking and unlocking mode, applied in the direction of digital data authentication, etc., can solve the problems of user privacy leakage, security risks, fingerprint information is easy to be copied, etc., to achieve the effect of protecting user privacy and enhancing security

Inactive Publication Date: 2017-03-15
TRULY OPTO ELECTRONICS
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, because fingerprint information is easy to be copied, illegal personnel can also perform unlocking operations on terminals or applications by using copied fingerprints, which may easily lead to leakage of user privacy and potential security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unlocking method and device
  • Unlocking method and device
  • Unlocking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] see figure 1 As shown, it is an implementation flowchart of an unlocking method provided by an embodiment of the present invention, and the method may include the following steps:

[0042] S110: Receive a user's trigger instruction for unlocking the target.

[0043] Wherein, the target is a terminal or an application.

[0044] In practical applications, for security reasons, a terminal or an applicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unlocking method. The method comprises the following steps that a trigger instruction of a user for unlocking a target is received, wherein the target is a terminal or application; the strength level of a user for pressing a preset recognition zone is determined; according to the strength level, whether an unlocking operation is executed on the target or not is determined. According to the technical scheme, due to the fact that using habits of different users are different, a difference of pressure for pressing the recognition zone is large, the strength level of the pressure particularly used by the user having unlocking permission is not likely to be known by other illegal users, whether the unlocking operation is executed on the target or not is determined according to the strength level, the security of the target is enhanced, and the user privacy is effectively protected. The invention further discloses an unlocking device which has a corresponding technical effect.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to an unlocking method and device. Background technique [0002] With the advancement of science and technology, fingerprint recognition technology has been more and more widely used, especially in terminal unlocking and application unlocking. [0003] By collecting and identifying the user's fingerprint information, comparing it with the pre-obtained reference fingerprint information, if it is determined that the two match, it can be determined that the user is a legitimate user, and the terminal or application can be unlocked, so that the user can lock the terminal Or use it for further operations. [0004] However, because fingerprint information is easy to be copied, illegal personnel can also perform unlocking operations on terminals or applications by using copied fingerprints, which may easily lead to leakage of user privacy and potential security risks. Contents...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 卢红黄鹤何会楼许新杰李建华
Owner TRULY OPTO ELECTRONICS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More