This application claims priority to Chinese Patent Application No. 201310262239.1 filed on Jun. 27, 2013 in the China Intellectual Property Office, the contents of which are incorporated by reference herein.
Embodiments of the present disclosure relate to unlocking technology, and particularly to an electronic device and an unlocking method.
Most electronic devices (for example, mobile phones) may be locked and unlocked by pressing a preset key or a combination of keys on keyboards of the electronic devices, or by implementing a slide operation on touch screens of the electronic devices. However, keys on the electronic device may wear because of frequent use of the preset key or combination of keys. The slide operation can easily be observed and stolen by others, and personal information of the electronic device may not be protected.
Implementations of the present disclosure will be described, by way of example only, with reference to the following drawings. The modules in the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Moreover, in the drawings, like reference numerals designate corresponding portions throughout the views.
The present disclosure, including the accompanying drawings, is illustrated by way of examples and not by way of limitation. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references can mean “at least one,” or “one or more. ”
In the present disclosure, “module,” refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a program language. In one embodiment, the program language can be Java, C, or assembly. One or more software instructions in the modules can be embedded in firmware, such as in an erasable programmable read only memory (EPROM). The modules described herein can be implemented as either software and/or hardware modules and can be stored in any type of non-transitory computer-readable media or storage medium. Non-limiting examples of a non-transitory computer-readable medium include CDs, DVDs, flash memory, and hard disk drives.
The at least one processor 11 executes one or more computerized codes and other applications of the electronic device 1 to provide functions of the unlocking system 10. The storage device 12 can be a memory of the electronic device 1 or an external storage card, such as a smart media card or a secure digital card. The touchscreen 13 can support multi-touch operations. In the embodiment, the multi-touch operations represent more than one touch point of contact with the touchscreen 13, such as simultaneously tapping, touching, pressing and sliding on the touchscreen 13 using one or more fingers.
In this embodiment, the unlocking system 10 includes a detection module 100, a confirmation module 101, a generation module 102, an unlocking module 103, and a prompt module 104. The modules 100-104 include computerized code in the form of one or more programs that are stored in the storage device 12. The computerized code includes instructions that are executed by the at least one processor 11 to provide functions of the unlocking system 10.
In block 201, the detection module 100 detects touch operations of presetting an unlocking password on the touchscreen 13 when the electronic device 1 is required to start presetting the unlocking password. The touch operations can be a combination of single point touches and/or multi-touches. In at least one embodiment, the single point touch includes one touch point, and the multi-touch includes one or more than one touch point.
In block 202, the confirmation module 101 confirms a number of touch points corresponding to each of the touch operations. For example,
In block 202, the generation module 102 generates the unlocking password by combining the confirmed numbers according to a touch sequence of the touch operations, and stores the unlocking password in the storage device 12. For example, according to the touch operations shown in
In one embodiment, a first icon can be displayed on the touchscreen 13 to start to preset the unlocking password. The first icon can be one or more virtual buttons. After the first icon is operated, the first icon can be hidden and a second icon can be displayed on the touchscreen 13. The second icon can be operated to finish an unlocking procedure. When the second icon is operated, the touch operations for presetting the unlocking password are determined to be finished. In other embodiments, one or more physical buttons can be predetermined to replace the first icon and the second icon to start presetting the unlocking password and finish presetting the unlocking password. Then no icon is needed to be displayed on the touchscreen 13.
In some embodiments, the first icon and the second icon can be the same icon. When the user starts to preset the unlocking password, the user can operate the first icon and execute the touch operations to preset the unlock password. When the first icon is operated again, the touch operations are determined to be finished.
In other embodiments, the touch operations can be determined to be finished when no more touch operation is detected in a preset time duration (for example, 5 seconds).
In block 400, the detection module 100 detects unlocking touch operations of unlocking the electronic device 1 on the touchscreen 13, when the electronic device 1 is locked. In the embodiment, when the first icon is detected to be operated, the detection module 100 can start to detect the unlocking touch operations. When the second icon is detected to be operated, the detection module 100 determines that the unlocking touch operations are finished.
In block 401, the confirmation module 101 confirms a number of touch points corresponding to each of the unlocking touch operations.
In block 402, the generation module 102 generates an input password according to the confirmed numbers of each of the unlocking touch operations and a touch sequence of the unlocking touch operations.
In block 403, the unlocking module 103 determines whether the input password matches the unlocking password stored in the storage device 12. For example, when the input password is identical to the unlocking password, the unlocking module 103 determines that the input password matches the unlocking password, and block 405 is implemented. If the input password is different from the unlocking password, the unlocking module 103 determines that the input password does not match the unlocking password, and block 404 is implemented.
In block 404, the prompt module 104 prompts the user of the electronic device 1 that the input password is wrong, and the procedure returns to block 400. In one embodiment, the prompt module 104 can display a prompt message on the touchscreen 13 or output an audio prompt using a speaker of the electronic device 1.
In block 405, the unlocking module 103 unlocks the electronic device 1, and the procedure ends.
In some embodiments, the detection module 100 can further confirm an unlocking time period of the touch operations of presetting the unlocking password, and the detection module 100 can detect a time period of the unlocking touch operations in block 400. If the detected time period is greater than the unlocking time period, block 404 is implemented. If the detected time period is less than or equal to the unlocking time period, block 401 is implemented.
In other embodiments, the detection module 100 can further confirm a preset touch times according to touch times of the touch operations of presetting the unlocking password, and the detection module 100 can detect touch times of the unlocking touch operations in block 400. If the detected touch times is identical to the preset touch times, block 401 is implemented. If the detected touch times is different from the preset touch times, block 404 is implemented.
All of the processes described above may be embodied in, and fully automated via, functional code modules executed by one or more general purpose processors such as the processor 11. The code modules may be stored in any type of non-transitory readable medium or other storage device such as the storage device 12. Some or all of the methods may alternatively be embodied in specialized hardware. Depending on the embodiment, the non- transitory readable medium can be a hard disk drive, a compact disc, a digital versatile disc, a tape drive, or other storage medium.
The described embodiments are merely examples of implementations, and have been set forth for a clear understanding of the principles of the present disclosure. Variations and modifications may be made without departing substantially from the spirit and principles of the present disclosure. All such modifications and variations are intended to be included within the scope of this disclosure and the described inventive embodiments, and the present disclosure is protected by the following claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2013102622391 | Jun 2013 | CN | national |