The method of unlocking the touch screen of the terminals based on iOS has led Apple and some of the competition. The system that leads to the activity of the platform through a gestural command is one of the identifying signs of the mobile platform of the Cupertino firm since the beginning of capacitive touch terminals, back in 2007, and they have not been few complaints, reports and complaints that the Californian multinational has directed to several companies for using similar methods. Perhaps with a view to providing a little more originality, or perhaps to improve security, Apple I would bet on a new screen unlocking system that coexists with the gesture command and with the introduction of a password.
In this case, as we have learned through PhoneArena, in 2011 the Cupertino company patented a method that brings the customization of unlocking even closer, with a view that only the owner of the terminal "" or at least, to a great extent "" may be able to start the equipment. The idea is as follows. When we wanted to unlock the screen, the system would randomly choose an image from the contact list in the device memory, so that in order to access the next step, we would have to identify the name with which we have registered that contact through from a list of options.
Seen like this, it seems that the idea is quite effective in order to keep the phone locked against possible theft, although not in case we want to prevent some of the people close to the owner of the iPhonegossip the device, after unlocking. Most likely, only the owner of the phone can identify all of the stored contacts, so the security level is very high. Given this, perhaps the most problematic thing would be to use exactly the same entry with which the contact is stored, taking into account that sometimes the names under which these are registered may contain peculiarities that, to start this system, must be remembered by the owner of the terminal. In any case, when the various options are displayed on the screen, this problem would be overcome, although with this, the security option is limited.
However, in order to make the unlocking system even more restrictive and personalized, the patent registered by Apple extends to even more specific details. Thus, for example, the user could create patterns with varied images associated with codes. To illustrate this, just imagine several photographs of various objects: our car, a comb, the building where our cousin lives or a book in our library. Each of these objects would be linked with a four-digit code, so that when we were to unlock the screen, the terminal would randomly show one of those images, before which we would have to indicate the code that we had previously configured for each one of them..