Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal locking and unlocking method and terminal locking and unlocking system

A locking system and terminal technology, applied in electrical components, wireless communication, network data management, etc., can solve problems such as economic loss of cost users, complex security software, personal information leakage, etc.

Inactive Publication Date: 2013-12-18
SHENGLE INFORMATION TECH SHANGHAI
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, users often face the risk of losing these personal information in daily life. For example, once the mobile terminal is lost, other people can view and use the personal information in the mobile terminal, resulting in serious personal information leakage; Once the mobile terminal is lost, the mobile terminal will be used by others to make long-distance calls, surf the Internet, etc., and the large amount of expenses will cause economic losses to users
[0003] In order to solve this problem, there are many mobile terminal security software on the market, which can realize the backup and recovery function of personal information on the mobile terminal, but most of the existing security software are relatively complicated, and it is very inconvenient for users to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal locking and unlocking method and terminal locking and unlocking system
  • Terminal locking and unlocking method and terminal locking and unlocking system
  • Terminal locking and unlocking method and terminal locking and unlocking system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0105] The present invention provides a terminal locking method. The locking in this embodiment and subsequent embodiments refers to locking the protected terminal such as a mobile phone, that is, the user is not allowed to enter any operation interface of the protected terminal, and only the locked terminal is displayed. Prompt information, this embodiment specifically includes the following steps:

[0106] When the preset locking condition is met, the protected terminal is locked, so that when the locking condition is satisfied, the protected terminal is locked to protect the personal information therein.

[0107] Preferably, the locking condition is that the protected terminal does not have a SIM card installed; or the locking condition is that the replaced SIM card on the protected terminal is inconsistent with the initial SIM card; or the locking condition is that the protected terminal The protected terminal does not have an SD card installed; or the locking condition is...

Embodiment 2

[0120] The present invention provides a method for unlocking a terminal. Unlocking in this embodiment and subsequent embodiments refers to releasing the locked state of a protected terminal such as a mobile phone and entering a normal operation mode. This embodiment specifically includes the following steps:

[0121] The protected terminal is unlocked when the preset unlocking condition is met, so that when the unlocking condition is met, the user with unlocking authority can unlock the protected terminal.

[0122]Preferably, the unlocking condition is that the SIM card of the protected terminal is restored to the initial SIM card, or the unlocking condition is that the SD card of the protected terminal is restored to the initial SD card, or the unlocking condition is In order to receive a preset unlocking instruction from the security terminal, or the unlocking condition is to receive a preset unlocking password input by the user, the step of unlocking the protected terminal w...

Embodiment 3

[0128] Such as figure 1 As shown, the present invention provides a terminal locking and unlocking method. The locking in this embodiment and subsequent embodiments refers to locking the protected terminal such as a mobile phone, that is, the user is not allowed to enter any operation interface of the protected terminal, and only the protected terminal is displayed. The prompt message that the protected terminal has been locked; unlocking refers to releasing the locked state of the protected terminal such as a mobile phone and entering the normal operation mode. This embodiment specifically includes the following steps:

[0129] Step S11, lock the protected terminal when the preset locking condition is met, so that when the locking condition is satisfied, lock the protected terminal to protect the personal information therein;

[0130] Step S12, unlocking the protected terminal when the preset unlocking condition is met, so that when the unlocking condition is satisfied, the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a terminal locking and unlocking method and a terminal locking and unlocking system. The terminal locking and unlocking method includes locking a protected terminal when preset locking conditions are met, and unlocking the protected terminal when preset unlocking conditions are met. By the terminal locking and unlocking method and the terminal locking and unlocking system, complete safety protection can be provided to terminals, of various types, like mobile terminals.

Description

technical field [0001] The invention relates to a terminal locking method, a terminal unlocking method, a terminal locking and unlocking method and a system. Background technique [0002] With the popularity of mobile terminals, users will store a large amount of important personal information such as contact lists, call records, text messages, schedules, emails, photos, and application program access records in their mobile terminals. However, users often face the risk of losing these personal information in daily life. For example, once the mobile terminal is lost, other people can view and use the personal information in the mobile terminal, resulting in serious personal information leakage; Once the mobile terminal is lost, the mobile terminal will be used by others to make long-distance calls, surf the Internet, etc., and a large amount of expenses will cause economic losses to the user. [0003] In order to solve this problem, many mobile terminal security softwares h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W8/24H04W12/00H04W88/02H04W12/30
Inventor 赵真利
Owner SHENGLE INFORMATION TECH SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products