User terminal unlocking method and device and user terminal

A user terminal, unlocking technology, applied in the direction of digital data authentication, etc., can solve the problem of single unlocking method, and achieve the effect of enriching unlocking methods and improving fun.

Active Publication Date: 2017-05-31
GUANGDONG XIAOTIANCAI TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the most common unlocking methods include password unlocking and sliding unlocking, etc., and the unlocking method is single

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User terminal unlocking method and device and user terminal
  • User terminal unlocking method and device and user terminal
  • User terminal unlocking method and device and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] see figure 1 , figure 1 It is a schematic flowchart of a method for unlocking a user terminal disclosed in an embodiment of the present invention. in, figure 1 The described method for unlocking a user terminal can be applied to user terminals such as smart phones (Android phones, iOS phones, etc.), smart watches, smart bracelets, tablet computers, handheld computers, and mobile Internet devices (Mobile Internet Devices, MIDs). The embodiments of the invention are not limited. Such as figure 1 As shown, the unlocking method of the user terminal may include the following operations:

[0068] 101. When the user terminal enters an unlock interface, the user terminal displays a virtual object to be operated on the unlock interface.

[0069] In the embodiment of the present invention, when the user terminal detects the user's unlock instruction for the user terminal in the locked state, the user terminal can output an unlock interface, and display the virtual object to ...

Embodiment 2

[0090] see figure 2 , figure 2It is a schematic flowchart of another method for unlocking a user terminal disclosed in an embodiment of the present invention. in, figure 2 The described method for unlocking a user terminal can be applied to user terminals such as smart phones (Android phones, iOS phones, etc.), smart watches, smart bracelets, tablet computers, handheld computers, and mobile Internet devices (Mobile Internet Devices, MIDs). The embodiments of the invention are not limited. Such as figure 2 As shown, the unlocking method of the user terminal may include the following operations:

[0091] 201. When the user terminal enters an unlock interface, the user terminal displays a virtual object to be operated and a preset action on the unlock interface.

[0092] In the embodiment of the present invention, the preset action is used to indicate that the virtual object needs to complete the preset expression, and the preset expression can be determined according to...

Embodiment 3

[0120] see Figure 4 , Figure 4 It is a schematic structural diagram of an unlocking device for a user terminal disclosed in an embodiment of the present invention. in, Figure 4 The described unlocking device 400 for a user terminal can be applied to user terminals such as smart phones (Android phones, iOS phones, etc.), smart watches, smart bracelets, tablet computers, palmtop computers, and mobile Internet devices (Mobile InternetDevices, MIDs), The embodiments of the present invention are not limited. Such as Figure 4 As shown, the unlocking device 400 of the user terminal may include a display unit 401, a detection unit 402, a control unit 403, a judging unit 404, and an unlocking unit 405, wherein:

[0121] The display unit 401 is used for displaying a virtual object to be operated on the unlocking interface when the user terminal enters the unlocking interface.

[0122] The detection unit 402 is configured to detect an operation instruction for the virtual object...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of intelligent terminals and discloses a user terminal unlocking method, a user terminal unlocking device and a user terminal. The method comprises the following steps: displaying a to-be-operated virtual object on an unlocking interface when the user terminal enters the unlocking interface, detecting an operating instruction aiming at the virtual object, controlling the virtual object to complete an action corresponding to the operating instruction according to the operating instruction, judging whether the action completed by the virtual object is matched with a preset action, and executing the unlocking operation aiming at the user terminal when the action completed by the virtual object is matched with the preset action. By implementing the user terminal unlocking method disclosed by the embodiment of the invention, the user terminal unlocking manners can be enriched.

Description

technical field [0001] The present invention relates to the technical field of intelligent terminals, in particular to a method and device for unlocking a user terminal, and a user terminal. Background technique [0002] Based on security considerations, most user terminals are equipped with security locks, and different security locks correspond to different unlocking methods, that is, when a user uses a locked user terminal, the user terminal needs to be unlocked through a corresponding unlocking method. At present, the most common unlocking methods include password unlocking and sliding unlocking, etc., and the unlocking method is single. Contents of the invention [0003] The embodiment of the present invention discloses a user terminal unlocking method and device, and a user terminal, which can enrich the unlocking methods of the user terminal. [0004] The first aspect of the embodiment of the present invention discloses a method for unlocking a user terminal, the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F21/32
CPCG06F21/32G06F21/36
Inventor 陈莎
Owner GUANGDONG XIAOTIANCAI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products