Mobile terminal and starting-up method thereof

A mobile terminal and power-on password technology, which is applied in the field of communication, can solve problems such as the interruption of the boot process of legitimate users, and achieve the effect of ensuring unaffected, good privacy, and solving the interruption of the boot process

Active Publication Date: 2012-02-01
ZTE CORP
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem that the booting process of a mobile terminal is interrupted by a legitimate user due to an abnormal input of a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and starting-up method thereof
  • Mobile terminal and starting-up method thereof
  • Mobile terminal and starting-up method thereof

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0026] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention will be described in detail below with reference to the accompanying drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0027] The embodiment of the present invention considers that in order to enhance the security of starting up the existing mobile terminal, the user needs to enter the correct power-on password to complete the power-on process during the power-on process. The service provides a method for starting up a mobile terminal and the mobile terminal, wherein the mobile terminal here generally refers to a user equipment (UE, User Equipment) such as a mobile phone, and the technology will be described below.

[0028] figure 1 It is a flowchart of a booting method of a mobile terminal according to an embodiment of the present invention, such as figure 1 ...

Embodiment 1

[0042] In this embodiment, when the password protection is enabled by the user, the user is reminded when the password is turned on. In order to help the user avoid the problem that the mobile phone cannot be turned on normally due to forgetting to enter the password. In this embodiment, an alarm clock is used as an example for illustration, see figure 2 The schematic structural diagram of the mobile terminal shown, the mobile terminal includes the following modules:

[0043] 1. The setting module is used for the user to choose to enable and disable the password protection function, and the time S1 to activate the reminder function, and notify the UE of the user's choice.

[0044] 2. Timer T1, the user calculates the time from when the UE pops up the password input interface to when the user enters the password operation. If the time exceeds the preset time S1, a notification will be sent to the UE.

[0045] 3. Alarm clock module: When the user does not perform a password o...

Embodiment 2

[0063] At present, there are many password protection methods for mobile terminal equipment. This embodiment takes the most commonly used PIN code protection method as an example to introduce the power-on method of the mobile terminal (ie UE) based on setting the power-on password. The UE in this embodiment is set. the above figure 2 For each module shown, before the start-up method is performed, the user enters the setting module and selects the function of "requiring a PIN code when using a mobile phone" to be enabled; the setting option "set alarm clock reminder time" is S1. Then, the user enters the alarm clock module, sets the option "alarm clock ringing duration" as S3; sets "alarm clock re-ring time" as S2. After completing these settings, the boot process of the UE is as follows:

[0064] Step 1: the user turns on the UE when the UE is turned off. The UE executes the power-on process, and a PIN code input interface pops up. At the same time, the timer T1 starts tim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile terminal and a starting-up method thereof, wherein the starting-up method comprises the steps of: after receiving a starting-up command, reminding a user of inputting a starting-up password; reminding the user of inputting the starting-up password when the starting-up password is not passed within preset time; and receiving the starting-up password input by a user, after the starting-up password passes validation, starting-up. According to the invention, the problem of interrupted starting-up process of a legal user, caused by abnormal input of the starting-up password is solved, the privacy of the user can be ensured and protected, and the user businesses can be effectively protected from being influenced.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a method for starting up a mobile terminal and the mobile terminal. Background technique [0002] With the enhancement of self-information protection awareness of mobile communication terminal users, various protection functions related to mobile communication terminals are more and more widely used, and a PIN (Personal Identification Number, personal identification number) code is one of the commonly used ones. After the relevant protection function is enabled, the user needs to enter the preset password (also called the power-on password) every time to use the mobile terminal normally. In this way, the user's privacy will be well protected. , other users cannot open the mobile terminal because they do not have a power-on password, thereby protecting the privacy information of the user from being leaked. [0003] However, if the power-on password is input during the power-on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/673
CPCH04M1/673
Inventor 赵彦玲
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products