Multilevel locking and multilevel unlocking method for mobile device
A mobile device unlocking technology, applied in the direction of instruments, electronic digital data processing, digital data authentication, etc., can solve the problems of multi-level locking and unlocking that are not applicable to mobile devices, and achieve the effect of protecting data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0023] Example 1
[0024] A multi-level locking and multi-level unlocking method for mobile devices, the specific steps include:
[0025] (1) Multi-level lock: Reserve a module for the user to preset the lock method in the system settings of the mobile device. The user presets the lock level of the system, the system-level password, the startup password of each application and the A list of applications that require an activation password under each lock level is saved in the system file. Different lock levels correspond to different system-level passwords and a list of applications that require activation passwords; among them, system-level passwords include power-on passwords and Screen lock password, power-on password refers to the password that the user needs to enter when turning on or restarting the mobile device; lock screen password refers to the password that the user needs to enter when unlocking the screen of the mobile device; the system of the mobile device automatical...
Example Embodiment
[0033] Example 2
[0034] According to a multi-level locking and multi-level unlocking method for mobile devices described in Embodiment 1, the difference is that in step (1), the system's locking level includes primary locking, secondary locking, Three-level lock and four-level lock, when the first level is locked, when the user enters the power-on password or lock screen password to enter the system, all applications on the mobile device do not need to use the startup password, so that all applications can be accessed and viewed at any time All materials; when the second level is locked, when the user enters the power-on password or the lock screen password, some applications on the mobile device need to use the startup password, and some applications do not need to use the startup password, which can protect the data of more private applications; When locked, when the user enters the power-on password or lock screen password, all applications on the mobile device need to use t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap