Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal unlocking method, terminal and auxiliary equipment

An auxiliary device and terminal technology, applied in the field of communication, can solve problems such as user loss, mobile phone data loss, mobile phone locking, etc., to achieve the effect of protecting data and improving user experience

Active Publication Date: 2015-09-02
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor found that there are at least the following problems in the prior art: in the existing unlocking methods, in order to prevent criminals from attempting to unlock through multiple attempts, the number of unlocking attempts of the mobile phone is generally only 3 times, and after 3 failed unlocking attempts, it will Make the mobile phone into a locked state; if the user forgets the password set by himself, there will also be 3 failed attempts to unlock, causing the mobile phone to be locked
If the mobile phone is locked due to the above two situations, the user can only use the mobile phone again by reinstalling the system or other extreme means, which will cause data loss in the mobile phone, bring unnecessary losses to the user, and greatly reduce the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal unlocking method, terminal and auxiliary equipment
  • Terminal unlocking method, terminal and auxiliary equipment
  • Terminal unlocking method, terminal and auxiliary equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] This embodiment provides a terminal unlocking method, such as figure 1 As shown, the method includes:

[0031] 101. The terminal generates a key file according to a password instruction, and the password instruction is generated according to a password set by a user.

[0032] Further, after the key file is generated according to the password instruction, it also includes: enabling the Bluetooth key acquisition function, and configuring the information of the auxiliary device, the information including the Bluetooth ID and MAC (Media Access) of the auxiliary device. Control, Media Access Control) address.

[0033] 102. After the terminal enters the deep lock state, the terminal sends the key file to the auxiliary device, so as to release the preliminary lock state according to the content of the key file.

[0034] Optionally, when the key file is sent to the auxiliary device, the deep locking state is changed to the preliminary locking state.

[0035] Optionally, befo...

Embodiment 2

[0039] This embodiment provides a terminal unlocking method, such as figure 2 As shown, the method includes:

[0040] 201. The auxiliary device turns on Bluetooth and searches for a terminal.

[0041] 202. After searching for a terminal, the auxiliary device sends a matching request to the terminal to perform matching with the terminal.

[0042] 203. After successfully matching with the terminal, the auxiliary device receives the key file sent by the terminal.

[0043] Wherein, the matching request includes the information of the auxiliary device, and the information includes the Bluetooth ID and the MAC address of the auxiliary device.

[0044] Compared with the prior art, in the embodiment of the present invention, the auxiliary device matches with the terminal through Bluetooth, receives the key file sent by the terminal after the matching is successful, and displays the content of the key file to help the user obtain the unlocking password, Then the unlocking of the te...

Embodiment 3

[0046] This embodiment provides a terminal unlocking method, such as image 3 As shown, the method includes:

[0047] 301. The terminal generates a key file according to a password instruction.

[0048] Wherein, the password indication is generated according to the password set by the user. When the user sets a password for the terminal, a password indication will be automatically generated. The password indication includes the password content set by the user, and the password content can be text or pattern, etc. .

[0049] 302. The terminal enables the Bluetooth key acquisition function, and configures information about the auxiliary device in the terminal.

[0050] Optionally, whether the function of obtaining the key by Bluetooth is enabled can be determined by the user. If the user chooses not to enable the function of obtaining the key by Bluetooth, it will be processed according to the process of the prior art. Wherein, the configured information about the auxiliary ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a terminal unlocking method, a terminal and auxiliary equipment, and relates to the technical field of communication. The method comprises the following steps of: generating a key file according to a password instruction, wherein the password instruction is generated according to a password set by a user; and after the terminal enters a deep locking state, transmitting the key file to the auxiliary equipment so as to release a primary locking state according to the contents of the key file. The invention is applied to the unlocking of the terminal.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a terminal unlocking method, terminal and auxiliary equipment. Background technique [0002] With the development of technology, the use of terminal devices such as mobile phones, pads, and computers is becoming more and more common, and people pay more and more attention to the protection of data security when using these terminal devices. The protection of data security is also an issue that equipment manufacturers must consider when producing products. Among the current data protection methods, taking mobile phones as an example, the encryption methods usually include text passwords and patterns. When we want to check the mobile phone, You need to enter the specified text password or draw the specified graphic on the screen with your finger to pass the verification. [0003] The inventor found that there are at least the following problems in the prior art: in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 成荣峰
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More