Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unlocking method and unlocking device

An unlocking device and unlocking technology, applied in the direction of digital data authentication, etc., can solve the problems of user privacy leakage, mobile terminal security and privacy cannot be taken into account, etc., to achieve the effect of improving privacy

Active Publication Date: 2015-09-16
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the mobile phone is unlocked, anyone can use all the functions of the mobile phone, and view the user data stored in the mobile phone, etc., resulting in leakage of user privacy
In the prior art, there is a problem that the security and privacy of mobile terminals cannot be balanced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unlocking method and unlocking device
  • Unlocking method and unlocking device
  • Unlocking method and unlocking device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, "module" and "component" may be used mixedly.

[0045] Mobile terminals may be implemented in various forms. For example, terminals described in the present invention may include devices such as mobile phones, smart phones, notebook computers, digital broadcast receivers, PDAs (Personal Digital Assistants), PADs (Tablet Computers), PMPs (Portable Multimedia Players), navigation devices, etc. mobile terminals and fixed terminals such as digital TVs, desktop c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unlocking method. The unlocking method comprises the following steps: when a mobile terminal is in a locked state and an unlocking request is detected, acquiring at least one verification parameter carried by the unlocking request; performing verification operation on the acquired at least one verification parameter; and when the verification on the at least one verification parameter is successful, exiting from a locked state and operating in a preset permission mode. The invention further discloses an unlocking device. By virtue of the unlocking method and the unlocking terminal, the mobile terminal is capable of improving the privacy on the premise of meeting the safety.

Description

technical field [0001] The present invention relates to the technical field of intelligent terminals, in particular to an unlocking method and device. Background technique [0002] With the rapid development of intelligent terminal technology, the popularity of mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (Personal Digital Assistants), PADs (Tablet Computers), PMPs (Portable Multimedia Players) and navigation devices is increasing. higher. At present, in order to ensure the security of the mobile terminal, the screen and / or the keyboard of the mobile terminal are usually locked when it is not in operation. The user needs to perform an unlocking operation according to a preset method, so that the mobile terminal can be used normally only after the mobile terminal exits the locked state. Take the mobile phone as an example. As we all know, when the mobile phone does not receive user operations within a certain period of time, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32
CPCG06F21/31G06F21/32
Inventor 申世安沈闯
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products