KR20140139704A - User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof - Google Patents

User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof Download PDF

Info

Publication number
KR20140139704A
KR20140139704A KR1020130060048A KR20130060048A KR20140139704A KR 20140139704 A KR20140139704 A KR 20140139704A KR 1020130060048 A KR1020130060048 A KR 1020130060048A KR 20130060048 A KR20130060048 A KR 20130060048A KR 20140139704 A KR20140139704 A KR 20140139704A
Authority
KR
South Korea
Prior art keywords
user terminal
input
user
operation information
personal information
Prior art date
Application number
KR1020130060048A
Other languages
Korean (ko)
Inventor
류택규
Original Assignee
에스케이플래닛 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 에스케이플래닛 주식회사 filed Critical 에스케이플래닛 주식회사
Priority to KR1020130060048A priority Critical patent/KR20140139704A/en
Publication of KR20140139704A publication Critical patent/KR20140139704A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The present invention relates to a method for protecting personal information in a user terminal, a user terminal, a computer-readable recording medium and a transmission device and, more specifically, to a method for protecting personal information in a user terminal and an apparatus for performing the same. The method comprises: an input receiving step of receiving an input from a user in a lock mode or a personal information protection mode; a comparing step of comparing the received input with preset operation information; and a function executing step of executing a function corresponding to each of the preset operation information when the input matches the preset operation information.

Description

Technical Field [0001] The present invention relates to a personal information protection method for a user terminal, a user terminal, a recording medium readable by the computer, and a transmission device,

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a personal information protection method, a user terminal, a computer-readable recording medium, and a transmission apparatus of a user terminal, and more particularly, And a method for protecting personal information by executing different functions according to the information.

As smart devices such as smart phones and tablet PCs become more widespread, it is becoming more important to protect personal information and privacy. To this end, various methods for security of smart devices such as lock screen setting on smart device, unlocking technique such as pattern recognition, password input, or password mixed with zero / numeric digits without restriction are limited.

However, when another person uses a smart device or rents it, the owner of the smart device releases the lock and gives the smart device. In this case, various contents related to personal information and privacy in the smart device are exposed to others. To prevent this, it is too cumbersome to show or lend a smart device after hiding or deleting your personal information, and you can not recover the deleted contents.

In addition, when a smart device is commonly used, each user can not set an e-mail on the smart device or store the transmission / reception history of the message.

The following prior art 1 discloses a method and device for releasing a lock mode of a portable terminal. In order to easily release the lock mode, the lock is released according to a movement event or a key event according to a change in operation of the portable terminal. There is no disclosure about protecting information.

Korean Patent No. 0795750 (Published on 11.01.2008)

SUMMARY OF THE INVENTION The present invention has been made to solve the above-mentioned problems, and it is intended to protect personal information by changing environment setting of a user terminal according to a user's input.

The present invention is intended to protect personal information at the same time when unlocking the terminal even if the user does not operate the terminal separately to protect the personal information by changing the environment setting of the user terminal according to the method of releasing the lock mode.

An object of the present invention is to protect personal information by changing the environment setting of a user terminal by a predetermined operation when it is necessary to protect personal information even while using the terminal.

According to another aspect of the present invention, there is provided a personal information protection method for a user terminal, including: receiving an input from a user in a lock mode or a personal information protection mode; And a function executing step of executing a function corresponding to each operation information when the input and the operation information coincide with the predetermined operation information. At this time, the function execution step may include changing the environment setting of the user terminal according to each operation information.

In the embodiment of the present invention, the environment setting change may be performed by hiding or deleting the usage history of the user terminal, hiding or changing the application or widget displayed on the user terminal, Changing the setting information or changing the access right of the content or application stored in the user terminal.

Meanwhile, the present invention may further include a function setting step of setting operation information before the input receiving step and assigning a function to each operation information.

In another embodiment of the present invention, the input receiving step may receive an input from a user after receiving a lock mode deactivation command from the user, and in a state in which the user terminal is unlocked, After receiving a quick launch command to enter the privacy mode, an input may be received from the user.

The present invention includes a computer-readable recording medium on which a program for executing the personal information protection method of the user terminal described above is recorded, and includes a device for transmitting the program.

Meanwhile, a user terminal according to an embodiment of the present invention includes an input unit for receiving an input from a user in a lock mode or a private information protection mode of a user terminal, a comparison unit for comparing input of a user input through the input unit with predetermined operation information And an execution unit that executes a function corresponding to each piece of operation information when the comparison result of the comparison unit matches the comparison result of the comparison unit.

Here, the execution unit may change the environment setting of the user terminal according to the preset operation information. In the environment setting change, the usage history of the user terminal may be hidden or deleted, the application or widget displayed on the user terminal may be hidden, Changing the setting information of the user terminal according to the input of the terminal, and changing the access right of the content or application stored in the user terminal.

Meanwhile, the user terminal of the present invention may further include a function setting unit for setting operation information and assigning a function corresponding to each operation information.

In another embodiment of the user terminal of the present invention, the input unit may receive a lock mode release activation command from a user, receive an input from a user when the user terminal is activated, The unit may receive a quick launch command for entering the personal information protection mode from the user and receive an input from the user when the user terminal enters the personal information protection mode.

According to the present invention, since the execution environment of the user terminal can be changed according to the input of the user, personal information can be protected.

By changing the environment setting of the user terminal according to the method of releasing the lock mode, measures can be taken to protect the personal information at the same time of unlocking, without operating the terminal separately, and the user terminal can be operated quickly.

In addition, even if a plurality of users commonly use one user terminal, their personal information can be protected.

On the other hand, a method for protecting personal information can be executed as needed during use of the user terminal.

1 is a flowchart illustrating a method for protecting personal information of a user terminal according to an exemplary embodiment of the present invention.
FIG. 2 is a diagram illustrating an example of changing the history of use records according to an embodiment of the present invention for protecting personal information.
3 is a diagram illustrating an example of changing the arrangement of an application or a widget according to an embodiment of the present invention for protecting personal information.
4 is a diagram illustrating an example of changing setting information according to an embodiment of the present invention for protecting personal information.
FIG. 5 is a diagram illustrating an example of changing an access right according to an embodiment of the present invention for protecting personal information.
6 is a diagram showing an example of setting operation information and assigning functions in an embodiment of the present invention.
7 is a flowchart illustrating a method for protecting personal information of a user terminal according to another embodiment of the present invention.
8 and 9 are views for comparing personal information protection methods of a user terminal according to another embodiment of the present invention.
10 is a block diagram illustrating an internal configuration of a user terminal according to an embodiment of the present invention.

The foregoing and other objects, features, and advantages of the present invention will become more apparent from the following detailed description taken in conjunction with the accompanying drawings, in which: FIG.

1 is a flowchart illustrating a method for protecting personal information of a user terminal according to an exemplary embodiment of the present invention.

A personal information protection method of a user terminal according to the present invention includes an input receiving step of receiving an input from a user in a lock mode or a private information protection mode, a comparison step of comparing the received input with preset operation information, And executing a function corresponding to each piece of operation information when the pieces of information coincide with each other.

In the input receiving step, the user terminal releases the lock mode or receives input from the user to enter the personal information protected state in the personal information protection mode. The user can turn off the lock mode by using slide, pattern recognition, face recognition, numeric key password input, mixed alphanumeric password, or the like, or activate the user terminal in a state in which personal information protection is protected. The input method of the user is not limited to the above-described method, and the input method for changing the state of the user terminal is all included.

The input of the user received in the input receiving step is compared with the predetermined operation information in the comparison unit 120 in the user terminal. Operation information corresponding to a user's input is previously set in the user terminal. That is, the pattern type and the type of the password are variously set, and the user terminal is set to operate differently according to each pattern or the password (the operation information means pattern type, password, etc.).

Therefore, it receives the input from the user, compares it with predetermined operation information and judges whether or not they match. If they match, it goes to the next function execution step, and if not, returns to the first input reception step. At this time, a message such as "Password is different" or "Patterns do not match" is displayed on the user terminal so that the user can be informed that the input of the user does not match the predetermined operation information.

When the input received from the user coincides with predetermined operation information, a function corresponding to each operation information is executed (function execution step). Various functions matching the operation information may exist, and embodiments will be described later. It should be noted that the present invention is not limited to the embodiments described below, and it is preferable that the lock mode or the personal information protection mode of the user terminal is released according to the user input, and that different functions are set and executed.

In one embodiment of the present invention, the function execution step changes the environment setting of the user terminal according to each operation information. A function corresponding to the operation information may be executed to execute a specific application, or an emergency call may be used. In this embodiment, the environment setting of the user terminal is changed. It is possible to prevent a user from viewing or using private contents stored or displayed in the user terminal by changing the environment setting of the user terminal according to the operation information in order to protect the user's personal information or privacy.

In particular, the user's input is received in the lock mode or the private information protection mode and compared with the operation information, the environment setting can be changed at the same time as unlocking according to the type of the operation information. As a result, you can change your preferences quickly and accurately. To protect your privacy, unlock your device and protect your privacy by changing preferences, even if you do not have to do anything to hide or delete specific applications, messages, It becomes possible.

FIG. 2 is a diagram illustrating an example of changing the history of use records according to an embodiment of the present invention for protecting personal information.

The configuration change in the example shown in FIG. 2 hides or deletes the usage history of the user terminal according to the operation information. Referring to FIG. 2, it can be seen that different operation information is set on the left side of the figure on the top and the left side of the figure on the bottom side. Each operation information corresponds to a different function, and the right side of FIG. 2 shows an example in which different functions are executed.

2, the usage history of the user terminal is maintained (refer to the upper right corner of FIG. 2). The example shown at the top of FIG. 2 may be assumed to be input by the owner of the user terminal. If you use your terminal, you do not need to hide or erase your usage history, such as Internet usage history.

However, when it is necessary to protect the personal information, such as lending the terminal to another person, the operation information set differently from the top is inputted as in the example shown in the lower part of FIG. 2, when another pattern is input, the Internet usage record is deleted and the Internet usage history is not displayed. That is, the other person can not confirm which page the owner of the user terminal has accessed on the Internet, what content is used, and the like. 2 illustrates an example of the Internet usage history, it is possible to manipulate the record stored in the user terminal, such as application usage history, so that it can not be viewed by other users.

In addition, it is possible to hide or delete the usage history of the call log, the text message, the messenger service, and the like so as not to be exposed to other users.

FIG. 2 shows an example of inputting operation information by pattern recognition. As mentioned above, various input methods including numeric keypad, password, face recognition, slide, and the like can be used.

3 is a diagram illustrating an example of changing the arrangement of an application or a widget according to an embodiment of the present invention for protecting personal information.

The configuration change in the example shown in FIG. 3 hides or changes the application or widget displayed on the user terminal according to the operation information. Referring to FIG. 3, it can be seen that different operation information is set on the left side of the picture shown in the upper part and the picture on the lower part. Each operation information corresponds to a different function, and the right side of FIG. 3 shows an example in which different functions are executed.

When a pattern as shown at the upper left corner of FIG. 3 is input, widgets and applications of the kind preset by the user are displayed on the user terminal. In the example of Fig. 3, a weather widget, a facebook, a photo application, and the like are displayed. However, such an application or widget may contain owner's personal information or be exposed to others, or it may be that the user terminal's memory is excessively used during operation. Accordingly, when a user uses a user terminal, it is possible to hide the application and the widget, and to display only an application that can be used by others, or an application / widget that can be exposed even to others.

This example is shown at the bottom of Fig. According to the operation information, an application of a type different from that of the upper part of FIG. 3 is displayed, so that the owner of the user terminal can keep their own personal information and privacy.

4 is a diagram illustrating an example of changing setting information according to an embodiment of the present invention for protecting personal information.

The configuration change in the example shown in FIG. 4 changes setting information of the user terminal according to the input of the user terminal. 4, the user terminal is driven according to the same settings as the upper right of FIG. Font, screen brightness, whether the screen is rotated, whether the GPS is used, whether or not the power saving mode function is used, and the like, as well as various functions that can be set by the user in using the user terminal can be changed.

In the example shown in the lower part of FIG. 4, it is confirmed that the setting information of the user terminal is set differently as a pattern different from the example shown in the upper part is inputted.

By thus setting the user terminals differently according to the operation information, when one user terminal is shared by a plurality of users, the terminal can be optimally used for each user.

FIG. 5 is a diagram illustrating an example of changing an access right according to an embodiment of the present invention for protecting personal information.

The configuration change in the example shown in FIG. 5 is to change the access right of the content or application stored in the user terminal. Referring to FIG. 5, it can be seen that different operation information is set on the left side of the figure on the top and the left side of the figure on the bottom side. Each operation information corresponds to a different function, and the right side of FIG. 5 shows an example in which different functions are executed.

In the case of inputting the same pattern as the upper left corner of FIG. 5 and the lower left side pattern, the application included in the user terminal and whether the content is used or not is different. In the example above, you need to enter the password to view the picture, you can not use messaging, messenger, but you can use the Internet. The upper part of FIG. 5 can be viewed as a permission setting for protecting personal information. In the example shown in the lower part of FIG. 5, the photograph is not accessible but the message and the Internet are available, and the messenger is required to input the password. FIG. 5 is a detailed block diagram of an embodiment of the present invention. It is possible to set different rights for using each application and contents on a user terminal, various options such as a password can be used, a limited number of times can be used, You can set permissions by.

6 is a diagram showing an example of setting operation information and assigning functions in an embodiment of the present invention.

Referring to FIG. 1, operation information may be set prior to the input receiving step of the present invention, and a function may be assigned to each operation information so that a specific function can be executed according to the operation information.

The above-described function setting step can be performed not only when the personal information protection method is used for the first time on the user terminal, but also when changing the function setting while using the method of the present invention. That is, the operation information and the function corresponding thereto can be continuously changed, updated, and released. Accordingly, the method of the present invention can be applied variously according to the needs of the user.

In the example shown in FIG. 6, an example of inputting a pattern and setting a function according thereto is shown, but it is also possible to set a function and input a pattern later, and an additional procedure may be included between operation information and function setting. That is, the function setting step can match the operation information and the function regardless of the order.

On the other hand, in FIG. 6, only the content to turn on / off each function is displayed. However, it is also possible to determine which recording history is to be deleted for each function, what application to hide the widget or change the layout, how to set the setting information, The approach can be set to each detail, such as how to set it. Accordingly, appropriate functions can be assigned to each user.

Although the pattern recognition is used as an example of the operation information in Fig. 6, the operation information can be set in various other ways as described above.

FIG. 7 is a flowchart illustrating a method for protecting personal information of a user terminal according to another embodiment of the present invention, and FIGS. 8 and 9 illustrate an example of displaying the personal information on a user terminal according to each embodiment shown in FIG. 7 .

Each embodiment of the present invention is not applicable only when the screen of the user terminal is in the lock mode, but each embodiment can be executed for protecting personal information even while using the user terminal.

When the user terminal is in the lock mode (the left-hand side of FIG. 8), upon receiving the lock-mode-cancel activation command from the user (currently widely used method is a method of pressing a button located at the side of the smart device, ), The user terminal becomes a state in which the operation information can be received (shown in the center of FIG. 8). Then, the functions as shown in Figs. 2 to 5 are executed (right side in Fig. 8) according to the operation information inputted by the user.

Meanwhile, in the present invention, the method of the present invention for personal information protection can be applied even when the user terminal is not in the lock mode, that is, when the user uses the user terminal while the user is using the terminal.

9, when a user attempts to use the terminal while the user is using the terminal and the user does not wish to expose the personal information, a quick lunch for entering the personal information protection mode launch command. The quick launch command can be input in various ways. For example, an input method that can be implemented in a user terminal can be used, such as double-clicking a volume button or pressing and holding a home button. After entering the personal information protection mode by the quick launch command, the user terminal is displayed as shown in the center of FIG. 9, receives the input from the user, determines whether or not it corresponds to the operation information, . According to the present embodiment, the user can take measures to protect personal information at any time even while using the terminal.

Meanwhile, various embodiments of the personal information protection method of the user terminal of the present invention can be stored in a computer-readable recording medium containing a program for executing the personal information, and can be produced, used, transferred, rented, and imported.

In addition, devices such as a transmission device capable of transmitting and receiving such a program online, such as a server for downloading a program, are also included in the scope of the present invention, and the production, use, transfer, lending, Will also be viewed as infringing the present invention.

10 is a block diagram illustrating an internal configuration of a user terminal according to an embodiment of the present invention.

A user terminal of the present invention includes an input unit 100 for receiving an input from a user in a lock mode or a private information protection mode of a user terminal, a comparison unit 120 for comparing the input of the user input through the input unit 100 with predetermined operation information, And an execution unit (130) that executes a function corresponding to each piece of operation information when the comparison result of the comparison unit (120) and the comparison result coincide with each other. The detailed operation of each configuration has been described in the above example, so redundant description is omitted.

The execution unit 130 of the user terminal of the present invention changes the environment setting of the user terminal according to predetermined operation information. Examples of the environment setting change include hiding or deleting the usage history of the user terminal, Changing the layout of the application or widget displayed on the user terminal, changing the setting information of the user terminal according to the input of the user terminal, changing the access right of the content or application stored in the user terminal, have. Details of each configuration change have been described above.

Meanwhile, the user terminal of the present invention may further include a function setting unit 140 for setting operation information and allocating functions corresponding to the operation information.

The input unit 100 of the present invention may receive a lock mode release enable command from a user and receive an input from a user while the user terminal is activated. A quick launch command for entering the personal information protection mode from the user in a state in which the user terminal enters the personal information protection mode, and receive the input from the user in the state that the user terminal enters the personal information protection mode.

Thus, those skilled in the art will appreciate that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. It is therefore to be understood that the embodiments described above are to be considered in all respects only as illustrative and not restrictive. The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.

100 user terminal 110 input unit
120 comparison unit 130 execution unit
140 Function setting section

Claims (16)

An input receiving step of receiving input from a user in a lock mode or a privacy mode;
A comparison step of comparing the received input with predetermined operation information; And
A function executing step of executing a function corresponding to each operation information when the input coincides with the predetermined operation information;
Lt; / RTI >
Wherein the function execution step changes an environment setting of the user terminal according to each operation information.
The method of claim 1,
Wherein the usage history of the user terminal is hidden or deleted.
The method of claim 1,
A method for protecting personal information of a user terminal that hides or changes an application or a widget displayed on a user terminal
The method of claim 1,
And changing the setting information of the user terminal according to the input of the user terminal.
The method of claim 1,
Wherein the access right of the content or the application stored in the user terminal is changed.
The method of claim 1, wherein, prior to the input receiving step,
A function setting step of setting operation information and assigning a function to each operation information;
A method for protecting personal information of a user terminal
The method of claim 1, wherein the input receiving step comprises:
And receiving an input from a user after receiving a lock mode cancel activation command from the user.
The method of claim 1, wherein the input receiving step comprises:
The method comprising: receiving a quick launch command for entering a user terminal from a user into a personal information protection mode in a state in which a user terminal is unlocked, and receiving an input from a user; How to protect
A computer-readable recording medium having recorded thereon a program for executing a personal information protection method of a user terminal according to any one of claims 1 to 8. An apparatus for transmitting a program for executing a personal information protection method of a user terminal according to any one of claims 1 to 8 An input unit for receiving an input from a user in a lock mode or a privacy mode of the user terminal;
A comparing unit comparing the input of the user inputted through the input unit with predetermined operation information; And
An execution unit that executes a function corresponding to each operation information when the comparison result of the comparison unit is coincident;
Lt; / RTI >
Wherein the execution unit changes the environment setting of the user terminal according to the preset operation information.
12. The method of claim 11,
Wherein the usage history of the user terminal is hidden or deleted.
12. The method of claim 11,
Wherein the application or widget displayed on the user terminal is hidden or the layout is changed.
12. The method of claim 11,
And changing the setting information of the user terminal according to the input of the user terminal.
12. The method of claim 11,
And changing the access right of the content or application stored in the user terminal.
The system according to claim 11, further comprising a function setting unit for setting operation information and assigning a function corresponding to each operation information,
KR1020130060048A 2013-05-28 2013-05-28 User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof KR20140139704A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020130060048A KR20140139704A (en) 2013-05-28 2013-05-28 User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020130060048A KR20140139704A (en) 2013-05-28 2013-05-28 User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof

Publications (1)

Publication Number Publication Date
KR20140139704A true KR20140139704A (en) 2014-12-08

Family

ID=52457852

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020130060048A KR20140139704A (en) 2013-05-28 2013-05-28 User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof

Country Status (1)

Country Link
KR (1) KR20140139704A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529248A (en) * 2016-10-20 2017-03-22 广东小天才科技有限公司 Unlocking method and device of user terminal, and user terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529248A (en) * 2016-10-20 2017-03-22 广东小天才科技有限公司 Unlocking method and device of user terminal, and user terminal

Similar Documents

Publication Publication Date Title
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US10318764B2 (en) Method and apparatus for differentiated access control
CN103902862A (en) Mobile device management method and device and mobile device
US9443072B2 (en) Methods and devices for granting access to and enabling passcode protection for a file
CN110663041B (en) System and method for providing a user account through which a user can operate a computing device
EP2883184B1 (en) Accessing contact records in a device with multiple operation perimeters
EP3367286A1 (en) Methods, apparatuses, computer program and recording medium for protecting information
KR20120066894A (en) Method for protecting private information of mobile terminal
KR20140093556A (en) Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof
JP5831412B2 (en) Information sharing system, shared terminal, and shared control program
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
WO2023160640A1 (en) Application identifier control method and apparatus
KR20140139704A (en) User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof
US20140047564A1 (en) Managing contact records in a device with multiple operation perimeters
CN114675897B (en) Application program starting method and related device
WO2017031903A1 (en) File processing method and apparatus for electronic device
EP2660748A1 (en) Method and system for managing password
CN115964744A (en) Display method and device and electronic equipment
Jadhav et al. Design of Lock Based Authentication System for Android Smartphone user.

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application