Unlock instant, AI-driven research and patent intelligence for your innovation.

An unlocking method and mobile terminal

A mobile terminal, unlocking technology, applied in the direction of digital data authentication, etc., can solve the problems of low security and easy leakage of unlocking passwords, and achieve the effect of avoiding leakage

Active Publication Date: 2020-01-10
VIVO MOBILE COMM CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an unlocking method and a mobile terminal, which are used to solve the technical problems of low security and easy disclosure of unlocking passwords in the prior art using a preset digital password or graphic password for unlocking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An unlocking method and mobile terminal
  • An unlocking method and mobile terminal
  • An unlocking method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0026] see figure 1 As shown, the embodiment of the present invention provides an unlocking method applied to a mobile terminal, including steps 101 to 104, which are described in detail as follows.

[0027] Step 101: Obtain the unlocking password input by the user.

[0028] In the embodiment of the present invention, the preset reference password in the mobile terminal is the mandatory unlocking password of the mobile terminal, and the mobile terminal can be unlocked as long as the reference password is input. The unlocking password capable of unlocking the mobile terminal is obtained by encrypting the reference password, and the unlocking method in the embodiment of the present invention is to use the correctly encrypted unlocking password to unlock the mobile terminal.

[0029] Among them, when unlocking the mobile terminal, if the mobile terminal user perceives that his environment is relatively safe, for example, when no outsiders are alone in the surrounding environment...

no. 2 example

[0053] see Figure 5 As shown, the embodiment of the present invention also provides a mobile terminal, and figure 1 Corresponding to the unlocking method shown, the mobile terminal includes an acquiring module 51, a first judging module 52, a second judging module 53 and a first unlocking module 54, which are described in detail as follows.

[0054] Wherein, the obtaining module 51 is configured to obtain the unlocking password input by the user.

[0055] In the embodiment of the present invention, the preset reference password in the mobile terminal is the mandatory unlocking password of the mobile terminal, and the mobile terminal can be unlocked as long as the reference password is input. The unlocking password capable of unlocking the mobile terminal is obtained by encrypting the reference password, and the unlocking method in the embodiment of the present invention is to use the correctly encrypted unlocking password to unlock the mobile terminal.

[0056] Among them, ...

no. 3 example

[0071] Figure 6 is a schematic structural diagram of the mobile terminal according to the third embodiment of the present invention. Figure 6 The illustrated mobile terminal 600 includes: at least one processor 601 , a memory 602 , at least one network interface 604 and a user interface 603 . Various components in the mobile terminal 600 are coupled together through a bus system 605 . It can be understood that the bus system 605 is used to realize connection and communication between these components. In addition to the data bus, the bus system 605 also includes a power bus, a control bus and a status signal bus. But for clarity, in Figure 6 The various buses are denoted bus system 605 in FIG.

[0072] Wherein, the user interface 603 may include a display, a keyboard or a pointing device (for example, a mouse, a trackball (trackball), a touch panel or a touch screen, and the like.

[0073] It can be understood that the memory 602 in the embodiment of the present invent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an unlocking method and a mobile terminal. The unlocking method comprises the following steps: acquiring an unlocking password input by a user, judging whether the unlocking password is the same as a last unlocking password obtained from the mobile terminal or not, judging whether the unlocking password contains standard password information of a preset password in the mobile terminal when the unlocking password is different from the last unlocking password, and unlocking when the unlocking password contains the standard password information. According to the invention, not only can the mobile terminal be unlocked by the unlocking password encrypted autonomously, but also other people watching the unlocking process of the mobile terminal by the user can be prevented from imitating the unlocking password and unlocking the mobile terminal, that is, unlocking password leakage is avoided.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to an unlocking method and a mobile terminal. Background technique [0002] With the development of terminal technology, great progress has been made in the unlocking methods of existing mobile terminals. Specifically, from the initial slide unlocking, digital password unlocking, to the current graphic password unlocking, and fingerprint unlocking, the security of the unlocking methods is constantly improving. To put it simply, the sliding unlocking method has basically no security at all, and the security of the fingerprint unlocking method is the strongest. However, the fingerprint unlocking method has high requirements on the hardware of the mobile terminal. Therefore, for most of the current mobile terminals, the commonly used unlocking methods are digital password unlocking and graphic password unlocking. [0003] Wherein, the digital password unlocking and the grap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 卞栋磊
Owner VIVO MOBILE COMM CO LTD