Unlocking method and device
A technology for unlocking and locking the screen. It is applied in the fields of telephone communication, electrical components, and anti-eavesdropping circuits. It can solve the problems of complicated steps for users to answer, and achieve a high experience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] figure 1 It shows the principle diagram of the unlocking method in Embodiment 1 of the present invention, as shown in figure 1 As shown, the unlocking method includes the following steps:
[0026] Step 101. In the screen-locked state, monitor the first page of the terminal.
[0027] Step 102: When it is determined that the first page is the incoming call request page of the application to be unlocked, unlock the terminal screen and display the incoming call request page of the application to be unlocked on the terminal screen.
[0028] The unlocking method provided by the embodiment of the present application is applied to an electronic device or a mobile terminal. After the user completes the lock screen operation, the first page of the terminal is monitored in real time. The first page is the next layer page of the lock screen page of the terminal, namely The top-level page floating under the terminal lock screen interface. When the first page is the incoming call r...
Embodiment 2
[0057] Taking a mobile terminal as an example, the user has installed an instant messaging application, such as WeChat, in the mobile terminal. Among them, the application package name information of WeChat is com.tent.wechat; the call request page information is com.tent.wechat.PageActivity; the normal page information (such as the normal page information of the chat conversation) in the normal use state is, com.tent.wechat.NormalActivity.
[0058] figure 2 It shows a schematic flow diagram of unlocking in Embodiment 2 of the present application, as shown in figure 2 As shown, the specific processing flow of unlocking may include the following steps:
[0059] Step 201, establishing a data table of an application program to be unlocked.
[0060] When the application that needs to be smartly unlocked by the user is WeChat, the mobile terminal obtains the WeChat application package name information and incoming call request page information, and stores the WeChat applicatio...
Embodiment 3
[0079] Based on the same inventive concept, the embodiment of this application also provides a terminal device. Since the problem-solving principle of these devices is similar to an unlocking method, the implementation of these devices can refer to the implementation of the method, and the repetition will not be repeated.
[0080] Figure 4 It is a schematic structural diagram of a terminal device in Embodiment 3 of the present application.
[0081] like Figure 4 As shown, the terminal device 400 in Embodiment 3 of the present application includes:
[0082] Processor 401, memory 402, communication interface 403 and bus 404;
[0083] The processor 401, the memory 402 and the communication interface 403 are connected through the bus 404 and complete mutual communication;
[0084] The memory 402 stores executable program codes;
[0085]The processor 401 runs the program corresponding to the executable program code by reading the executable program code stored in the memory 4...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 