Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of using mouse action to unlock desktop operation system screen

A technology of desktop operating system and mouse action, applied in the field of unlocking the screen of desktop operating system by mouse action, can solve the problems such as the trouble of unlocking the PC, the difficulty of remembering the password, and the difficulty of unlocking by gesture, so as to reduce the tedious operation and reduce the cost of use. Effect

Inactive Publication Date: 2017-05-31
ISOFT INFRASTRUCTURE SOFTWARE
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when this kind of unlocking technology is applied to PC computer terminals, there are many obstacles. First, most PCs are not equipped with touch screens, so gesture unlocking is difficult to achieve.
In addition, fingerprint recognition requires a dedicated fingerprint reader, which also requires additional configuration. A large number of PCs are not equipped with such devices.
[0005] Therefore, password unlocking is the unlocking method used by most PCs, but the password unlocking method is cumbersome, and the password is not easy to remember, and it is very troublesome to unlock the PC after it is lost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of using mouse action to unlock desktop operation system screen
  • Method of using mouse action to unlock desktop operation system screen
  • Method of using mouse action to unlock desktop operation system screen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] It should be noted that, in the case of no conflict, the following technical solutions and technical features can be combined with each other.

[0052] The specific embodiment of the present invention will be further described below in conjunction with accompanying drawing:

[0053] Such as image 3 As shown, a method for unlocking the screen of a desktop operating system by using a mouse action is applicable to a computer terminal with a desktop operating system, and the computer terminal is connected to a mouse; multiple standard movement trajectories are preset for the above-mentioned mouse, and each of the above-mentioned standard movement trajectories Associate a standard character respectively, and preset a comparison key composed of a plurality of the above-mentioned standard characters;

[0054] The above methods include:

[0055] Step S1, the above-mentioned computer terminal captures and records multiple actual movement tracks of the above-mentioned mouse du...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method of using mouse action to unlock a desktop operation system screen and is suitable for a computer terminal with a desktop operation system. The method comprises the steps that a plurality of standard moving trajectories are preset to a mouse and are associated with a standard character respectively; a comparison secret key made of a plurality of standard characters is preset; a computer terminal acquires and records a plurality of actual moving trajectories of the mouse when users move the mouse; the computer terminal treats the plurality of practical moving trajectories and acquires the standard character associated with each moving trajectory and an actual input secret key; the computer terminal compares the actual input secret key with the comparison secret key and judges whether the actual input secret key matches with the comparison secret key. The method has the advantages of reducing password input of a keyboard, lowering operation complexity, having no need to add extra devices and effectively decreasing usage costs.

Description

technical field [0001] The invention relates to the technical field of screen unlocking, in particular to a method for unlocking the screen of a desktop operating system by using a mouse action. Background technique [0002] Screen unlocking methods for mobile operating systems such as Android and IOS operating systems include PIN password input and gesture input. The connected points and the connection route (or connection sequence) between these points are the passwords required for unlocking the mobile terminal. Unlocking a mobile terminal with a mobile operating system through gestures is not only easy to remember but also convenient to operate. Such as figure 1 As shown, the unlock coordinate point is (0,0)(0,1)(1,1)(2,1)(2,2)(1,2), and the unlocking process compares the above sequence with the stored sequence , unlocked if correct. [0003] The screen unlocking methods of desktop operating systems such as windows and Linux operating systems include password unlocki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0487
CPCG06F3/0487
Inventor 张志高武校田黄建忠江水李祥凯
Owner ISOFT INFRASTRUCTURE SOFTWARE