Method and device for unlocking terminal

A technology for unlocking devices and terminals, applied in the fields of instruments, digital data authentication, electrical digital data processing, etc., can solve the problems of easy observation and identification, high cost, complicated terminal unlocking methods, etc., and meet the requirements of clear and simple unlocking steps and operation accuracy. The effect of low and low learning cost

Inactive Publication Date: 2017-05-10
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to propose a terminal unlocking method and device, aiming to solve the problem that the existing terminal unlocking methods are either complicated and easy to be observed and identified, or require special hardware support and cause high cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for unlocking terminal
  • Method and device for unlocking terminal
  • Method and device for unlocking terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] The first embodiment of the present invention provides a terminal unlocking method, such as image 3 As shown, including the following steps:

[0081] S101: Acquire several touch operations on the terminal screen in the screen rest state;

[0082] Stop screen, that is, the terminal is in a standby state where the screen is not lit. For example, when a specific start key is pressed, the screen can be lit, and some applications can be started in a non-unlocked state. In the rest screen state, the sensors of the terminal are still working, such as gravity sensors and pressure sensors, which provide technical conditions for unlocking the rest screen.

[0083] Monitor the user's touch operation when the terminal is on the screen. The touch operation includes the most basic single click, and may also include other touch operation actions, such as double-clicking, sliding, and sliding in a specific direction and a specific length. In the present invention, it is preferable to click...

Embodiment 2

[0093] The second embodiment of the present invention provides a terminal unlocking method, such as Figure 4 As shown, including the following steps:

[0094] S201: In the screen rest state, obtain a continuous touch point on the screen, divide the four quadrants of the screen with the horizontal and vertical coordinate lines of the continuous touch point, and obtain several touch operations in the four quadrants;

[0095] Compared with the first embodiment, this embodiment provides a new quadrant division method, such as Picture 10 As shown, the upper left vertex of the definition screen is the origin of coordinates (0,0), the upper right vertex coordinates (a,0), the lower left vertex coordinates are (0,b), the lower right vertex coordinates are (a,b), when the screen is on When there is a continuous touch point that lasts longer than the set time, it is assumed that the user wants to switch the terminal to the use state, then the coordinates (c, d) of the point are obtained, wh...

Embodiment 3

[0109] The third embodiment of the present invention provides a terminal unlocking method, such as Figure 5 As shown, including the following steps:

[0110] S301, preset the input sequence and quadrants of a number of touch operations in the four quadrants of the screen as the unlocking password;

[0111] When the touch operation password is preset, the terminal screen is the default four quadrants divided by the horizontal axis and the vertical axis where the midpoint of the diagonal is located. The user clicks on the quadrants in a certain order within the four quadrants according to their own wishes and chooses to save, then the inputted quadrants and sequence corresponding to the quadrants are used as the preset unlock password. This step can also be set in the technical solutions provided in the first and second embodiments.

[0112] S302. In the screen rest state, obtain the first touch point and the second touch point on the screen, and divide the four quadrants of the scre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for unlocking a terminal. The method comprises the steps that in a screen turn-off state, multiple touch operations on a terminal screen are acquired; the quadrant and input sequence of the touch operations are determined; whether the quadrant and input sequence of the touch operations are consistent with those of pre-stored code touch operations or not is judged, and if yes, unlocking is carried out. According to the method and device, an unlocking code can be correspondingly input at the fuzzy position of the terminal under the condition that the screen is not turned on, so that the code is input more easily, the imperceptibility of code input is good, and therefore the code safety is improved.

Description

Technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a method and device for unlocking a terminal. Background technique [0002] The mobile phone unlocking method has been updated from the previous pattern, number and password lock to the current fingerprint unlocking. The purpose has always been to ensure that the user can use the simplest password to unlock it, and at the same time, it is not discovered by other people what the password is through observation, so the pattern Unlocking also adds the option of hiding patterns. [0003] Currently, there are two main ways to optimize mobile phone unlocking: [0004] 1) Complicated passwords: such as mixed passwords with alphanumeric characters and multi-point connection pattern passwords; [0005] 2) Invisible password: such as fingerprint unlocking, pattern unlocking does not display the trace of the line; [0006] In the current popular unlocking methods, the steps of inputt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F3/0488
CPCG06F21/31G06F3/0488
Inventor 吉喆
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products