A method and device for entering different modes based on unlocking password
A password and unlocking technology, which is applied in the field of entering different modes based on unlocking passwords, can solve problems such as reducing the reliability of unlocking passwords, and achieve the effect of improving security and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] figure 1 It is an implementation flowchart of the method for entering different modes based on the unlocking password provided by the embodiment of the present invention, and is described in detail as follows:
[0023] In step S101, it is detected whether an unlock event of the mobile terminal is received, and the unlock event includes an unlocked application program and an unlock password;
[0024] Wherein, the screen lighting event is used as a trigger condition, and the screen lighting event is monitored in the mobile terminal. When the screen lighting event occurs, the step of detecting whether an unlocking event of the mobile terminal is received is performed, so that the follow-up can quickly judge the Whether the unlock password is a pre-configured involuntary unlock password.
[0025] In step S102, when the unlocking event is received, it is judged whether the unlocking password is a pre-configured involuntary unlocking password;
[0026] When the unlocking ev...
Embodiment 2
[0035] figure 2 It is the implementation flowchart of the involuntary unlocking password and voluntary unlocking password of the configuration application program provided by the embodiment of the present invention, and is described in detail as follows:
[0036] In step S201, an application list is displayed, and the application list includes applications installed in the mobile terminal;
[0037] In this embodiment, a list of application programs is displayed on the interface of the mobile terminal, so that the user can perform selected operations.
[0038] In step S202, detect the application program specified by the user in the application program list;
[0039] In this embodiment, the application specified by the user in the application list includes, but not limited to, touch or key, and receives the user's specified result by detecting the user's specified operation.
[0040] In step S203, the involuntary unlocking password and the voluntary unlocking password input ...
Embodiment 3
[0045] The embodiment of the present invention describes step S104, when the unlock password is a pre-configured involuntary unlock password, control the application program to enter the abnormal mode, and perform abnormal operations, specifically:
[0046] When the unlocking password is a pre-configured involuntary unlocking password, control the application program to enter an abnormal mode, lock the information of the key directory of the application program, and send pre-stored alarm information to a preset alarm server.
[0047] The warning information includes distress information and mobile terminal stolen information.
[0048] In the mobile terminal, the user can set the alarm information as distress information, or set the alarm information as the stolen information of the mobile terminal.
[0049] In the embodiment of the present invention, when the user of the mobile terminal is in danger, he can send the pre-stored distress message to the preset alarm server by inp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


