Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Touch screen terminal hidden unlocking method and system

A touch-screen terminal and unlocking technology, which is applied in the directions of instruments, digital data authentication, and electronic digital data processing, etc., can solve problems such as hazards and information loss, and achieve the effects of high fun, high safety performance, and simple operation

Active Publication Date: 2015-01-28
SUZHOU TIANPING ADVANCED DIGITAL TECH
View PDF12 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Now there is an unlocking method that is realized by clicking the touch screen terminal screen. Compared with other unlocking methods, this method hides the prompt at the unlocking point and is relatively safe; however, unauthorized users will always pass certain Unintentionally unlock the touch-screen terminal successfully, and enter some applications (such as information, address book, pictures, etc.) on the terminal that are easy to leak out, causing the harm of information loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Touch screen terminal hidden unlocking method and system
  • Touch screen terminal hidden unlocking method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, the present invention provides a hidden unlocking method for touch-screen terminals. In this embodiment, the above-mentioned hiding includes two meanings. Unlocking icons with crossed lines, other unlocking icons, etc.; secondly, after successful unlocking, some application icons that need to be kept secret are hidden to provide double confidentiality of information.

[0032] The hidden unlocking method of the touch screen terminal includes the following steps:

[0033] Step 1. Touch the switch key, the touch screen terminal lights up, displays the unlocking picture, and enters the waiting state for unlocking.

[0034] Step 2: The user clicks the set position on the unlock picture, and the number of clicks is the same as the number of unlocks set when customizing the lock screen, then enters the next step, and if the number of clicks is different from the number of unlocks set when customizing the lock screen, return To be unlocked.

[0035...

Embodiment 2

[0060] The difference between Embodiment 2 and Embodiment 1 is that for the method of hiding and unlocking the above-mentioned touch-screen terminal, the click position is arbitrary when clicking to unlock, as long as the number of clicks corresponds to the set number of times.

[0061] For example, the lock screen background pattern of the touch screen terminal is set as the background pattern of the whack-a-mole game, and the position where the hamster comes out is used as the click position, as long as the number of clicks corresponds to the set number of unlocking clicks, it can be unlocked. Because the position where the hamster comes out is random, so the click position for unlocking is also arbitrary, and the background pattern is in the form of animation. The hamster will re-drill into the hole as it hits, indicating that the click is successful, and it also greatly improves the unlocking process. of interest.

[0062] It is also possible to set any static pattern for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a touch screen terminal hidden unlocking method. The method includes the following steps: step 1, touching a switch button, turning on a screen of a touch screen terminal, displaying an unlocking picture, and entering a to-be-unlocked state; step 2, clicking a fixed position on the unlocking picture, wherein number of clicking times is identical with number of unlocking times set during screen locking customization; step 3, completing unlocking, wherein after entering a touch screen terminal interface when unlocking is completed, the interface only displays icons of a part of application programs, and icons of another part of application programs are hidden. A method for entering the hidden application program icons includes the following steps: step 1, clicking any position of a touch screen for one or several times to enable the hidden application program icons to appear on the screen; step 2, clicking the icons appearing on the screen to enter the application programs for other operations. Unlocking of a main screen and the hidden icons is realized mainly on the basis of the number of clicking times, so that the mode is high in safety, and interestingness for a user to operate the touch screen terminal is high.

Description

technical field [0001] The invention belongs to the security field of mobile terminal equipment, and in particular relates to a hidden unlocking method and system for a touch screen terminal. Background technique [0002] With the development of technology, mobile terminal devices with touch screens such as mobile phones and tablet computers are becoming more and more popular, and mobile terminal devices also bring explosive growth in the amount of information. The mobile terminal devices used by people often involve a large amount of personal privacy information. This information exists in the form of text, pictures, sounds, etc. Once leaked, the consequences will be disastrous. Due to the urgent need for information security, when the user terminates the use of the mobile device, he hopes to lock the terminal device in an encrypted manner, and the unlocking can only be done by the user himself or with the authorization of the user. [0003] Now there is an unlocking metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F3/0488G06F3/0481G06F21/31
CPCG06F3/04817G06F3/0488G06F21/36
Inventor 许伟刚
Owner SUZHOU TIANPING ADVANCED DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products