Everyone forgets their lock screen pattern at some point. Fortunately, Android provides a simple method to bypass the lock screen when you've forgotten your lock pattern so you can get back in and change it to something you'll actually remember. Here's how to do it on the Galaxy S3 and Galaxy S4, but the same process works on many other Samsung devices too. 

sicherheit schlossIf you've locked yourself out of your Galaxy, Android provides a simple way to let you back in. / © Gerd Altmann / pixelio.de Try, try, try again

Perhaps not surprisingly, once you use up your attempts to unlock your device it doesn't self-destruct or automatically wipe its contents. It simply prompts you to unlock it another way – with a backup PIN you would have already set up or with the Google account information on the device. Once you've used up your pattern attempts, you'll see a popup window telling you to wait to retry along with the bypass prompts at the bottom, so either use your PIN or enter your account details and sign in. Your Galaxy will unlock and you'll be taken to your lock screen options page!

Note: The bypass prompts only appear for a pattern lock. If you are using a password or PIN you just have to wait thirty seconds and retry. Thanks to @Philipp Junghannß for pointing this out!

AndroidPIT S4 Lockscreen Bypass 1When you first set a pattern lock you'll be prompted to add a backup PIN. / © AndroidPITAndroidPIT S4 Lockscreen Bypass 2If you try too many times you'll see bypass options at the bottom (left) and the popup message (right) to try again in 30 seconds. / © AndroidPITAndroidPIT S4 Lockscreen Bypass 3If you remember your PIN, use it (left) but if not, enter your Google account info (right). / © AndroidPITAndroidPIT S4 Lockscreen Bypass 4You will bypass the lock screen and be prompted to select a new one (left) which will then replace your old one on the lock screen (right) / © AndroidPIT

Have you ever locked yourself out of your smartphone? How long did it take you to remember your password?


View the original article here

loading...