Touch screen mobile phone security protection method
A security protection, touch screen mobile phone technology, applied in the direction of telephone communication, electrical components, branch equipment, etc., to achieve the effect of solving the problem of mobile phone security protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Such as figure 1 Shown, a kind of touch screen mobile phone security protection method comprises the following steps:
[0033] (1) Detect whether a touch event occurs when the mobile phone is unlocked, if so, enter step (2), if not, then the mobile phone is normally on standby;
[0034] (2) Calculate the area size of the capacitance change of the touch screen;
[0035] (3) Determine whether the size of the touch area is within the preset range, if yes, the mobile phone is operating normally, if not, the mobile phone is operating normally and timing, and enter step (4) at the same time;
[0036] (4) After the timing is equal to the preset use time, the identity information will be verified again, and prompts and warnings will be given;
[0037] (5) Judging whether the identity verification is passed, if so, then return to step (1), if not, then enter step (6);
[0038] (6) Lock the screen of the mobile phone, and send a SMS reminder message to the preset mobile phone ...
Embodiment 2
[0042] On the basis of Embodiment 1, the way of identity information verification in the step (4) adopts the ways of fingerprint recognition and facial image recognition. The identity information is verified in a variety of ways to ensure the security of the mobile phone information again, and at the same time detect whether the mobile phone is misoperated inadvertently to prevent the mobile phone information from being deleted or leaked by mistake.
Embodiment 3
[0044] On the basis of embodiment 1, said step (3) judges whether the size of the touch area is within the preset range and the step further includes:
[0045] A. Call the user's preset touch area size;
[0046] B. Compare the preset value with the calculated value of the touch area size;
[0047] C. Determine whether it is within the preset parameter range, if yes, the mobile phone operates normally, and go to step D, if not, go to step E;
[0048] D. Judging whether it is within the preset timing time, if yes, suspend timing, if not, do not process;
[0049] E. Determine whether the timing has been started, if yes, accumulate the timing until the timing is equal to the preset usage time, if not, start timing until the timing is equal to the preset usage time.
[0050]During the use of the mobile phone, the touch process is monitored in real time. When the touch area is detected within the preset range during abnormal use, the timing is suspended. When the abnormal touch is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
