Terminal unlocking method, terminal and auxiliary equipment
An auxiliary device and terminal technology, applied in the field of communication, can solve problems such as user loss, mobile phone data loss, mobile phone locking, etc., to achieve the effect of protecting data and improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] This embodiment provides a terminal unlocking method, such as figure 1 As shown, the method includes:
[0031] 101. The terminal generates a key file according to a password instruction, and the password instruction is generated according to a password set by a user.
[0032] Further, after the key file is generated according to the password instruction, it also includes: enabling the Bluetooth key acquisition function, and configuring the information of the auxiliary device, the information including the Bluetooth ID and MAC (Media Access) of the auxiliary device. Control, Media Access Control) address.
[0033] 102. After the terminal enters the deep lock state, the terminal sends the key file to the auxiliary device, so as to release the preliminary lock state according to the content of the key file.
[0034] Optionally, when the key file is sent to the auxiliary device, the deep locking state is changed to the preliminary locking state.
[0035] Optionally, befo...
Embodiment 2
[0039] This embodiment provides a terminal unlocking method, such as figure 2 As shown, the method includes:
[0040] 201. The auxiliary device turns on Bluetooth and searches for a terminal.
[0041] 202. After searching for a terminal, the auxiliary device sends a matching request to the terminal to perform matching with the terminal.
[0042] 203. After successfully matching with the terminal, the auxiliary device receives the key file sent by the terminal.
[0043] Wherein, the matching request includes the information of the auxiliary device, and the information includes the Bluetooth ID and the MAC address of the auxiliary device.
[0044] Compared with the prior art, in the embodiment of the present invention, the auxiliary device matches with the terminal through Bluetooth, receives the key file sent by the terminal after the matching is successful, and displays the content of the key file to help the user obtain the unlocking password, Then the unlocking of the te...
Embodiment 3
[0046] This embodiment provides a terminal unlocking method, such as image 3 As shown, the method includes:
[0047] 301. The terminal generates a key file according to a password instruction.
[0048] Wherein, the password indication is generated according to the password set by the user. When the user sets a password for the terminal, a password indication will be automatically generated. The password indication includes the password content set by the user, and the password content can be text or pattern, etc. .
[0049] 302. The terminal enables the Bluetooth key acquisition function, and configures information about the auxiliary device in the terminal.
[0050] Optionally, whether the function of obtaining the key by Bluetooth is enabled can be determined by the user. If the user chooses not to enable the function of obtaining the key by Bluetooth, it will be processed according to the process of the prior art. Wherein, the configured information about the auxiliary ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
