Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Touch screen unlocking method, device and electronic equipment, display and mobile terminal

A technology for unlocking devices and touch screens, applied in instruments, electrical digital data processing, computing, etc., can solve the problems of limited combination, single mode, and low difficulty of decryption, so as to increase the difficulty of cracking, improve security, increase The effect of diversity

Active Publication Date: 2020-03-17
BANMA ZHIXING NETWORK HONGKONG CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This nine-square gesture cipher simply connects 9 fixed points to determine the encrypted gesture and the decrypted gesture. The combination relationship between these points is relatively limited, so there is not only the problem of single mode, but also the security problem due to the difficulty of decryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Touch screen unlocking method, device and electronic equipment, display and mobile terminal
  • Touch screen unlocking method, device and electronic equipment, display and mobile terminal
  • Touch screen unlocking method, device and electronic equipment, display and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0062] Example 1: Image encryption process with multiple faces

[0063] see Figure 3a and Figure 3b , showing a password image encryption process with multiple faces, which specifically includes the following four steps:

[0064] Step1: The user can select an existing picture in the device as the basis for the password lock. For a device with a camera function, the user can temporarily take a picture to obtain a picture. In this example, the user selects Figure 3a picture shown.

[0065] Step2: Determine whether the selected picture is suitable as a password picture. In this example, the automatic face detection method can be used to select the operation hotspot, and it can be judged that there are 6 faces in the picture, which meet the requirements for setting a password picture. from Figure 3a to Figure 3b , the outer frame of the face is detected by automatic face detection technology, and the content in the frame is the hot spot. The automatic face recognition he...

example 2

[0071] Example 2: Image encryption process with multiple scenes

[0072] see Figure 4a and Figure 4b , showing a password image encryption process with multiple scenes, which specifically includes the following four steps:

[0073] Step1: The user selects a picture, such as Figure 4a shown.

[0074] Step2: The picture has a variety of scenes, which meet the requirements.

[0075] Step3: Use the scene area segmentation technology to divide the image area into 5 parts, such as Figure 4b shown. For technical information on scene segmentation, refer to known technologies, for example, refer to the following papers:

[0076] [2] Zhuowen Tu, Xiangrong Chen, Alan L. Yuille, Song-Chun Zhu, "ImageParsing: Unifying Segmentation, Detection, and Recognition," International Journal of Computer Vision, Volume63, Number2, pp.113-140July2005

[0077] Step4: The user can define an encrypted gesture according to the segmentation result. For example, a user clicks: tree->beach->mountain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to control technology for an electronic device, and particularly discloses a touch screen unlocking method, a device and an electronic device, a touch display and a mobile terminal based on image analysis. The touch screen unlocking method includes the following steps: presenting a preset password image in a touch screen locked state, the password image including multiple hotspots used for setting an encryption gesture; detecting a touch event of the touch screen to obtain a decryption gesture relating to the hotspots; comparing the decryption gesture to the encryption gesture to determine whether the decryption gesture matches the encryption gesture; when the decryption gesture matches the encryption gesture, switching the touch screen into an unlocked state. The corresponding touch screen unlocked device, electronic device, touch display and mobile terminal can carry out gesture password unlocking on the password image set autonomously, and consequently have characteristics of various unlocked modes and higher safety.

Description

technical field [0001] The present application relates to the control technology of electronic equipment, and in particular, to a touch screen unlocking method, device and electronic device, touch display and mobile terminal based on gesture unlocking. Background technique [0002] In recent years, mobile devices (such as smart phones, tablet computers, etc.) have become more and more widely used, with more and more functions, and more and more private information stored by users, which puts forward higher performance requirements for mobile devices. Require. Current mobile devices generally use a touch screen as a display module and a user input device. In order to prevent user privacy from being stolen by others, a specific encryption and decryption tool is usually used to lock the screen or lock a specific application. When the lock conditions are met, the mobile device, touch screen, or applications running on the mobile device will be locked after the idle time has ela...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/0488
CPCG06F3/0488
Inventor 段炎彪楚汝峰
Owner BANMA ZHIXING NETWORK HONGKONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products