Unlock instant, AI-driven research and patent intelligence for your innovation.

Touch screen mobile phone security protection method

A security protection, touch screen mobile phone technology, applied in the direction of telephone communication, electrical components, branch equipment, etc., to achieve the effect of solving the problem of mobile phone security protection

Inactive Publication Date: 2018-04-27
SICHUAN QIXING ELECTRONICS
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the deficiencies of the prior art and operation design, and provide a method with simple steps, easy to implement and capable of solving the safety protection of touch-screen mobile phones

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Touch screen mobile phone security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Such as figure 1 Shown, a kind of touch screen mobile phone security protection method comprises the following steps:

[0033] (1) Detect whether a touch event occurs when the mobile phone is unlocked, if so, enter step (2), if not, then the mobile phone is normally on standby;

[0034] (2) Calculate the area size of the capacitance change of the touch screen;

[0035] (3) Determine whether the size of the touch area is within the preset range, if yes, the mobile phone is operating normally, if not, the mobile phone is operating normally and timing, and enter step (4) at the same time;

[0036] (4) After the timing is equal to the preset use time, the identity information will be verified again, and prompts and warnings will be given;

[0037] (5) Judging whether the identity verification is passed, if so, then return to step (1), if not, then enter step (6);

[0038] (6) Lock the screen of the mobile phone, and send a SMS reminder message to the preset mobile phone ...

Embodiment 2

[0042] On the basis of Embodiment 1, the way of identity information verification in the step (4) adopts the ways of fingerprint recognition and facial image recognition. The identity information is verified in a variety of ways to ensure the security of the mobile phone information again, and at the same time detect whether the mobile phone is misoperated inadvertently to prevent the mobile phone information from being deleted or leaked by mistake.

Embodiment 3

[0044] On the basis of embodiment 1, said step (3) judges whether the size of the touch area is within the preset range and the step further includes:

[0045] A. Call the user's preset touch area size;

[0046] B. Compare the preset value with the calculated value of the touch area size;

[0047] C. Determine whether it is within the preset parameter range, if yes, the mobile phone operates normally, and go to step D, if not, go to step E;

[0048] D. Judging whether it is within the preset timing time, if yes, suspend timing, if not, do not process;

[0049] E. Determine whether the timing has been started, if yes, accumulate the timing until the timing is equal to the preset usage time, if not, start timing until the timing is equal to the preset usage time.

[0050]During the use of the mobile phone, the touch process is monitored in real time. When the touch area is detected within the preset range during abnormal use, the timing is suspended. When the abnormal touch is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a touch screen mobile phone security protection method. The touch screen mobile phone security protection method comprises the steps of: (1), detecting whether a touch event occurs or not in an unlocking condition of a mobile phone, and if so, entering the step (2); (2), calculating the area size of capacitance change of a touch screen; (3), judging whether the touch area size is in a pre-set range or not, and if not, entering the step (4); (4), waiting after the pre-set use time, performing identity information examination again, and giving a prompt and an alarm; (5),judging identity examination is passed or not, if so, returning to the step (1), and otherwise, entering the step (6); (6), locking the screen of the mobile phone, sending short message reminding information to a pre-set mobile phone number, simultaneously, switching an unlocking password, and prompting an input password; and (7), judging whether the input password is correct or not, if so, normally operating the mobile phone, returning to the step (2), if not, locking the screen of the mobile phone, and unlocking the mobile phone only by correctly answering a pre-set problem. Due to a software processing form, the mobile phone security protection problem in daily life can be solved.

Description

technical field [0001] The invention relates to a touch screen safety protection technology, in particular to a touch screen mobile phone safety protection method. Background technique [0002] At present, most mobile phones with touch screens use capacitive touch screens, which brings a new experience to users and has penetrated into life, work and study. , more and more children use adults' mobile phones for a long time to play games, watch TV, etc. without the knowledge of adults. At the same time, they may accidentally delete important information on the mobile phone or download software, which will cause inconvenience in the use of mobile phones and affect children's eyesight. , Delay learning, as long as the password of the mobile phone is remembered, the information security of the mobile phone will not be guaranteed, which will affect and inconvenience the user. Most of the existing mobile phone unlocking methods are password unlocking or fingerprint unlocking, whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725
CPCH04M1/72421H04M1/72448H04M1/72451H04M1/72463H04M1/72484
Inventor 江明泓
Owner SICHUAN QIXING ELECTRONICS