Unlocking method, and mobile terminal

A mobile terminal, unlocking technology, applied in the field of communication, can solve the problems of insufficiency, lack of unlocking function, application depth mining, etc., and achieve the effect of increasing the probability of recovery

Inactive Publication Date: 2017-01-04
VIVO MOBILE COMM CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the existing unlocking function is limited to the unlocking operation, which cannot meet the relevant measures triggered by the unlocking failure and achieve the corresponding purpose, and lacks the deep mining of the unlocking function application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unlocking method, and mobile terminal
  • Unlocking method, and mobile terminal
  • Unlocking method, and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0021] An unlocking method provided by the present invention, such as figure 1 shown, including the following steps:

[0022] Step 101 receives an unlocking operation input by a user.

[0023] In this step, when the user starts the unlocking operation, the unlocking operation input by the user is received.

[0024] The unlocking operation may include password unlocking, pattern unlocking, fingerprint unlocking and other unlocking operation modes that are not limited.

[0025] Step 102: If the unlocking operation fails, and the cumulative number of times the unlocking operation fails is greater than or equal to a preset threshold, send a short message to the preset phone number.

[0026] In this step, on the premise that the unlocking operation fails, it is further judged whether the cumulative number of unsuccessful unlocking operations is greater than or equal to a preset threshold, so as to determine the identity characteristics of the current user of the mobile phone, so ...

no. 2 example

[0031] An unlocking method provided by the present invention, such as figure 2 shown, including the following steps:

[0032] Step 201, receiving an unlocking operation input by a user.

[0033] In this step, when the user starts the unlocking operation, the unlocking operation input by the user is received.

[0034] The unlocking operation may include password unlocking, pattern unlocking, fingerprint unlocking and other unlocking operation modes that are not limited.

[0035] Step 202, if the unlocking operation fails, and the cumulative number of times of the unlocking operation failure is greater than or equal to a preset threshold, send a short message to the preset phone number.

[0036] In this step, refer to Figure 2a , which specifically includes the following steps: Step 2021, verify whether the unlocking operation is successful; if the unlocking operation fails, send an unlocking operation failure signal. Specifically, after receiving the unlocking operation i...

no. 3 example

[0052] refer to image 3 , is a structural diagram of a mobile terminal according to an embodiment of the present invention, and the mobile terminal 300 includes:

[0053] The receiving module 301 is configured to receive an unlocking operation input by a user.

[0054] The judging module 302 is configured to receive the unlocking operation result of the receiving module 301 . If the unlocking operation fails, and the cumulative number of failed unlocking operations is greater than or equal to the preset threshold, send a short message to the preset phone number.

[0055] The sending module 303 is configured to send the location information of the mobile terminal to the preset contact after sending the short message to the preset phone number.

[0056] The mobile terminal according to the embodiment of the present invention receives the unlocking operation input by the user through the above-mentioned module, and judges that the current user is an illegal user if the unlocki...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides an unlocking method of a mobile terminal. Through analyzing characteristics of unlocking input failures of a mobile phone, the identity characteristic of a current user is judged; the current user is judged as a user, a friend of the user, a stranger or a thief, so as to judge whether the mobile phone is used illegally or not; and then, a short message is sent, and a mobile phone positioning function is started to help the user to retrieve the mobile phone. The method comprises the steps of: receiving an unlocking operation input by the user; if the unlocking operation fails and the cumulative number of times of the unlocking operation failures is not less than a preset threshold, sending the short message to a preset phone number; and sending position information of the mobile terminal to a preset contact person. The retrieval method provided by the invention is private; the illegal user is difficult to realize that the retrieving measure of the mobile phone is started; and thus, the possibility of retrieving the mobile phone is increased.

Description

technical field [0001] The present invention relates to the field of communications, and in particular, to an unlocking method and a mobile terminal. Background technique [0002] At present, most of the unlocking methods of mobile terminals, such as mobile phones, are to start the unlocking operation again after waiting for a period of time after the unlocking fails more than five times. The general mobile phone unlocking function is only used for unlocking, and lacks specific and effective analysis and judgment on the reasons when there are multiple unlocking operation failures, and implements corresponding measures. Therefore, the existing unlocking function is limited to the unlocking operation, cannot meet the relevant measures triggered by unlocking failure and achieve the corresponding purpose, and lacks in-depth exploration of the application of the unlocking function. SUMMARY OF THE INVENTION [0003] In order to solve the problems existing in the prior art, an e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04W4/02
CPCH04W4/02H04M1/72403
Inventor 柯声开
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products