Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An unlocking request response method, mobile terminal

A mobile terminal, request-response technology, applied in digital data authentication and other directions, can solve problems such as malicious unlocking, and achieve the effect of improving unlocking security

Active Publication Date: 2021-03-23
VIVO MOBILE COMM CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] An embodiment of the present invention provides an unlocking request response method to solve the problem of how to avoid malicious unlocking not performed according to the user's subjective will

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An unlocking request response method, mobile terminal
  • An unlocking request response method, mobile terminal
  • An unlocking request response method, mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] figure 2 It is a schematic flowchart of an unlocking request response method provided in Embodiment 1 of the present invention, see figure 2 , the method may specifically include the following steps:

[0037] Step 22. When an unlock request is detected, determine the detected grip data, wherein the grip data is used to describe and indicate that the main body of the grip operation on the mobile terminal is the mobile terminal;

[0038] In combination with the above application scenarios, it should be noted that the first implementation of step 22 may be:

[0039] When the mobile terminal is in the locked screen state, if the user places his face in the image collection area of ​​the camera of the mobile terminal, the camera collects the user's facial image (or facial feature data) and sends it to the mobile terminal in the form of an unlock request. processor. The processor uses the unlock request as a trigger condition to read the data currently collected by the g...

Embodiment 2

[0055] image 3 It is a schematic flowchart of an unlocking request response method provided in Embodiment 2 of the present invention, see image 3 , the method may specifically include the following steps:

[0056] Step 32, collect the gripping data of the user as a sample;

[0057] Step 34, judging whether the collection duration / number of times reaches the predetermined duration / number of times threshold

[0058] If yes, execute step 36; if not, execute step 32 again.

[0059] Step 36, train the collected gripping data and obtain reference data

[0060] Step 38. When an unlock request is detected, determine the detected grip data

[0061] Step 310, judging whether the gripping data matches the reference data

[0062] If yes, execute step 312; if no, end.

[0063] Step 312: Respond to the unlocking request.

[0064] It should be noted that steps 32 to 36 constitute the training phase of this embodiment, and steps 38 to 312 constitute the unlocking phase of this embodi...

Embodiment 3

[0148] Figure 6 is a schematic structural diagram of a mobile terminal provided in Embodiment 3 of the present invention, see Figure 6 , the mobile terminal may specifically include: a first determination module 61 and a response module 62, wherein,

[0149] The first determining module 61 is configured to determine the detected grip data when an unlock request is detected, wherein the grip data is used to represent a grip operation performed on the mobile terminal;

[0150] The response module 62 is configured to respond to the unlocking request when the holding data matches the preset data.

[0151] combine Figure 4a-Figure 4d , the first structure of the first determination module 61 includes:

[0152] A first acquiring unit, configured to acquire a predetermined parameter, the predetermined parameter including at least one predetermined characteristic parameter of the antenna of the mobile terminal; wherein, the antenna includes an antenna A41, an antenna B42, an ant...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unlocking request response method and a mobile terminal. The method comprises the steps of determining detected holding data when an unlocking request is detected, wherein the holding data is used for representing holding operation performed for the mobile terminal; and when the holding data is matched with preset data, making a response to the unlocking request. Beforethe mobile terminal makes a response to the unlocking request, the holding data of holding the mobile terminal is determined; the holding data is matched with reference data to determine whether a user holding the mobile terminal initiates the unlocking request or not; and if yes, the unlocking request is responded, so that the situation of malicious unlocking performed not based on subjective wishes of the user is avoided and the purpose of improving the unlocking security is achieved.

Description

technical field [0001] The present invention relates to the field of terminals, in particular to an unlocking request response method and a mobile terminal. Background technique [0002] With the development of mobile terminal unlocking and encryption technology and the continuous enrichment of application scenarios, biometric technology is gradually introduced into unlocking and encryption applications. From the initial password unlocking and pattern unlocking, to the later fingerprint recognition unlocking, iris recognition unlocking, and then to the current hottest facial recognition technology (Face ID), unlocking and encryption technologies have always focused on the two core demands of security and ease of use. in evolution. [0003] For facial recognition technology, its principle is: use the optical sensing system of the mobile terminal to collect the facial features of the user in advance, and store them in the storage unit of the terminal to form the user's facial...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45G06F21/32
CPCG06F21/32G06F21/45
Inventor 李文锦王柏钢
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products