Multi-dimensional unlocking method for user equipment and user equipment

A user equipment, multi-dimensional technology, applied in branch office equipment, data processing input/output process, unauthorized/fraudulent call prevention, etc., can solve the problems of reducing the security of user equipment unlocking and leaking privacy, and achieve Improve unlocking security and protect personal information security

Active Publication Date: 2017-06-23
GUANGDONG XIAOTIANCAI TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practice, it is found that the current common unlocking methods for user devices include digital unlocking, graphic unlocking and other methods, but these unlocking methods are easily seen by nearby users during the unlocking process and leak privacy, thereby reducing the unlocking security of user devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-dimensional unlocking method for user equipment and user equipment
  • Multi-dimensional unlocking method for user equipment and user equipment
  • Multi-dimensional unlocking method for user equipment and user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] see figure 1 , figure 1 It is a schematic flowchart of a method for controlling user equipment disclosed in an embodiment of the present invention. like figure 1 As shown, the method for controlling the user equipment may include the following steps.

[0056] 101. The user equipment detects the unlock graphics to be verified input on the unlock interface of the user equipment and the node attributes of each node on the unlock interface of the unlock graphic path to be verified; wherein, the node attributes of each node include the node of the node The pressure value and the node dwell time of the node.

[0057] In the embodiment of the present invention, the user equipment may include but not limited to mobile phones, mobile tablets, notebook computers, personal digital assistants (Personal Digital Assistant, PDA), mobile Internet devices (Mobile Internet Device, MID) and other devices that can unlock the screen. Terminal equipment; Wherein, the operating system of ...

Embodiment 2

[0070] see figure 2 , figure 2 It is a schematic flowchart of another user equipment control method disclosed in the embodiment of the present invention. like figure 2 As shown, the method for controlling the user equipment may include the following steps.

[0071] 201. The user equipment detects the node attribute of each node on the unlocking interface of the unlocking figure to be verified inputted on the unlocking interface of the user equipment and the path of the unlocking figure to be verified; wherein, the node attribute of each node includes the node of the node The pressure value, the node dwell time of the node, and the included angle of the unlocking interface relative to the horizontal plane when the node is under force.

[0072]For example, the user equipment detects that the unlock pattern to be verified input by the user on the unlock interface of the user equipment is "L", and the node attributes of the four nodes on the unlock interface that the unlock ...

Embodiment 3

[0084] see image 3 , image 3 It is a schematic flowchart of another user equipment control method disclosed in the embodiment of the present invention. like image 3 As shown, the method for controlling the user equipment may include the following steps.

[0085] 301. The user equipment detects the unlock graphic to be verified input on the unlock interface of the user equipment and the node attributes of each node on the unlock interface of the unlock graphic path to be verified; wherein, the node attribute of each node includes the node of the node The pressure value, the node dwell time of the node, and the included angle of the unlocking interface relative to the horizontal plane when the node is under force.

[0086] For example, the user equipment detects that the unlock pattern to be verified input by the user on the unlock interface of the user equipment is "L", and the node attributes of the four nodes on the unlock interface that the unlock pattern "L" to be ver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a multi-dimensional unlocking method for user equipment and user equipment. The method comprises: detecting to-be-checked unlock pattern input on an unlocking interface by the user equipment and a node attribute of each node on the unlocking interface of the path of the to-be-checked unlock pattern, wherein the node attribute comprises a node pressure value and a node residence time; if it is checked that the to-be-checked unlock pattern is matched with the legal unlock pattern preset by the user equipment, determining whether there is a first target node in each node, wherein the node pressure value of the first target node is not contained in the unlock pressure range corresponding to the first target node, and the unlock pressure ranges corresponding to each node are different; if there is no first target node in each node, determining whether there is a second target node in each node, wherein the node residence time of the second target node is not contained in the unlock residence time range corresponding to the second target node, and the node residence time ranges corresponding to each node are different; and if there is no second target node in each node, performing the unlock operation on the user equipment. According to the method and user equipment disclosed by the present invention, the unlock security can be improved.

Description

technical field [0001] The present invention relates to the technical field of smart devices, in particular to a multi-dimensional unlocking method for user equipment and the user equipment. Background technique [0002] At present, with the rapid development of science and technology, human beings are increasingly inseparable from user equipment such as mobile phones and mobile tablets. In practical applications, user equipment including mobile phones is usually responsible for recording information in life or work in addition to communication. Therefore, more and more personal private information is recorded in user equipment. In order to protect the personal privacy information recorded by the user equipment, the user usually performs a screen lock operation on the user equipment, and only performs an unlock operation on the user equipment when the user equipment needs to be used. In practice, it is found that the current common unlocking methods for user devices include...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/83G06F3/041H04M1/67H04M1/725
CPCG06F3/0414G06F21/83H04M1/67H04M1/72463
Inventor 符莉
Owner GUANGDONG XIAOTIANCAI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products