Unlock instant, AI-driven research and patent intelligence for your innovation.

An implicit unlocking method and system

An implicit and unlocking technology, applied in the field of unlocking, can solve problems such as easy leakage and cracking, and achieve the effect of improving security and ensuring data security

Active Publication Date: 2019-11-29
台州市吉吉知识产权运营有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide an implicit unlocking method and system to solve the problem that the existing smart mobile terminal unlocking methods are easy to crack and easy to leak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An implicit unlocking method and system
  • An implicit unlocking method and system
  • An implicit unlocking method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] This embodiment provides an implicit unlocking method, such as figure 1 As shown, the steps include:

[0044] S11: Obtain the touch operation of the target user;

[0045] S12: Determine whether the touch operation of the target user is consistent with the preset touch operation. If they are consistent, it is determined to be a valid touch, and the smart mobile terminal clears the screen; otherwise, it is determined to be an invalid touch;

[0046] S13: Obtain the track of the unlock pattern drawn by the target user on the screen of the emptied smart mobile terminal;

[0047] S14: Determine whether the trajectory of the unlocking pattern drawn by the target user is consistent with the preset trajectory of the unlocking pattern, if they are consistent, the unlocking is successful; otherwise, the unlocking fails, and the target user is prompted to draw the unlocking pattern again;

[0048] S15: After obtaining the unlocking pattern redrawn by the target user, determine w...

Embodiment 2

[0082] This embodiment also provides an implicit unlocking method, such as figure 1 As shown, the steps include:

[0083] S21: Obtain the number of touches and the interval between touches of the target user;

[0084] S22: Determine whether the number of touches of the target user is consistent with the preset number of touches, if they are consistent, continue to compare the touch interval of the target user with the preset touch interval; if they are not consistent, determine that the touch is invalid;

[0085] S23: Determine whether the touch interval time of the target user is within the preset time difference of the preset touch interval time, if the condition is satisfied, it is determined as a valid touch; if the condition is not satisfied, it is determined as an invalid touch.

[0086] S24: After it is determined that the touch is valid, obtain the trace of the unlocking pattern drawn by the target user on the cleared screen of the smart mobile terminal;

[0087] S25...

Embodiment 3

[0101] This embodiment also provides an implicit unlocking method, such as figure 1 As shown, the steps include:

[0102] S31: Obtain the touch position and touch pressing time of the target user;

[0103] S32: Determine whether the touch position of the target user is consistent with the preset touch position, if they are consistent, continue to compare the touch pressing time of the target user with the preset touch pressing time; if not, determine that the touch is invalid;

[0104] S33: Determine whether the touch pressing time of the target user is greater than the preset touch pressing time, if the touch pressing time of the target user is greater than the preset touch pressing time, it is determined as a valid touch; otherwise, it is determined as an invalid touch .

[0105] S34: After it is determined that the touch is valid, obtain the trace of the unlock pattern drawn by the target user on the cleared screen of the smart mobile terminal;

[0106] S35: Determine wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a concealed unlocking method and system. The concealed unlocking method and system is used for solving the problem existing intelligent terminal unlocking modes are easy to crack to result in breach. The method comprises obtaining a touch operation of a target user, and determining whether the touch operation of the target user is identical to a preset touch operation, if so, determining that the touch operation is valid touch and enabling an intelligent mobile terminal to clear the screen, and if not, determining that the touch operation is invalid touch; obtaining an unlocking pattern track drawn by the target user on the cleared screen of the intelligent mobile terminal; determining whether the unlocking pattern track drawn by the target user is identical to a preset unlocking pattern track, if so, determining unlocking success, and if not, determining unlocking failure. According to the concealed unlocking method and system, the unlocking manner is concealed and less prone to breaching, and through multi-step determination, security can be enhanced, and further data security of the intelligent mobile terminal can be well guaranteed.

Description

technical field [0001] The present invention relates to an unlocking method and system, in particular to an implicit unlocking method and system. Background technique [0002] With the development of science and technology, electronic technology products are becoming more and more intelligent. The scope of use of smart mobile terminals has spread all over the world. Smart mobile terminal refers to that, like a personal computer, it has an independent operating system and an independent operating space. Users can install programs provided by third-party service providers such as software, games, and navigation, and can realize wireless communication through mobile communication networks. General term for network access mobile terminal types. As the functions of smart mobile terminals become more and more abundant, the time and frequency of people operating smart mobile terminals are also increasing. In order to prevent misoperation in the dormant state and effectively prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06F3/0488
CPCG06F3/0488G06F21/36
Inventor 曹东伟
Owner 台州市吉吉知识产权运营有限公司