Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

New method and system for enhancing security of touchscreen unlock

IP.com Disclosure Number: IPCOM000235893D
Publication Date: 2014-Mar-28

Publishing Venue

The IP.com Prior Art Database

Abstract

The invention provides a method and system for enhanced security of unlocking touched screen devices. The current unlock pattern must be a continuous broken line with poor safety, it even could easily be seen from the unlocking traces on the screen and is easy to be cracked, which would lead to the disclosure of private information. This unlocking method has multiple start points, multiple end points, no directions and each point does not need to be closed physically, multiple points need to input at same time, which is a collection of multiple point sets and difficulty to replay.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 45% of the total text.

Page 01 of 11

New method and system for enhancing security of touchscreen unlock

BACKGROUND OF THE INVENTION:Along with the popularization of mobile terminal, there are many kinds of touchscreen unlock methods, the most common is: At least two pre-designed touch points; receiving unlock information from the

input of touch points; judge the consistency between the input sequence and preset sequence of touch points to determine unlock

or not. However, the unlock method above has the following disadvantage:

The unlock pattern must be a continuous broken line(see FIG. 1) with poor safety, it even could easily be seen from the unlocking traces on the screen and is easy to be cracked, which would lead to the disclosure of private information.

TECHNICAL FIELD: The present invention relates generally to mobile terminal application, and particularly to a method and system for enhancing security of touchscreen unlock.

SUMMARY OF THE INVENTION

Aiming at the disadvantage of the unlock method mentioned above, the invention provides a method and system for

enhancing security of touchscreen unlock.

According to one aspect of the present invention, providing a method for enhancing security of touchscreen unlock, which

contains such steps below:


1. Preset unlock patterns: After user choose a point set (choose one or more points at same time), wait a period of time for user to

1


Page 02 of 11

start input another point set. If there is no new input during the waiting time, it indicates that user has finished all the input point set.

Save all the point set inputted by user.


2. Unlock: When screen is locked, user inputs his point set unlock patterns: After user finishes inputting a set of points, wait some

time for user to start another set of points input. If there is no new input during the waiting time, it indicates that user has finished

all the inputs. Get all the point set(including their orders) inputted by the user, then judge the consistency between the input point

set sequences and the presented point set sequences of touch points to determine unlock or not .

According to another aspect of the present invention, providing a system for enhancing security of touchscreen unlock, which

contains such modules below:


1. Storing module: For storing all the discontinuous unlock point set presented by user;


2. Obtaining module: For obtaining all the discontinuous point set inputted by user when unlocks the screen;


3. Judging module: For Judging the consistency between the input point set sequences and preset set of points sequences of

touch points to determine unlock or not;


4. Executing module: According to the result of judging module, execute unlock or not.

Compared to current technology, the present invention "New method and system for enhancing security of touchscreen unlock"

2


Page 03 of 11

improves the safety of unlock of mobile terminal.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an example of renderings of the most common unlock method .

FIG. 2 is the f...