Marco realized there was no magic file. The “Sony Xperia E5 F3311 lock remove file” searches were mostly people hoping for a shortcut that didn’t exist. The real solutions were either a factory reset or an advanced bootloader unlock + TWRP procedure—both of which required a PC and technical patience.

Two years later, his nephew needed a first phone. “Just for calls and Spotify,” his sister said. Marco remembered the E5. He retrieved it, ordered a cheap replacement screen, and spent an evening carefully swapping the LCD. When he powered it on, the new screen glowed with a familiar, yet unwelcome sight: the pattern lock screen.

And that’s the honest, informative story of the file that never was.

He stared at the 3x3 grid. He had no idea what pattern he’d set six years ago. He tried his birthday shape. Wrong. A ‘Z’ pattern. Wrong. After ten attempts, the phone locked him out for 30 seconds, then a minute, then an hour. The message was clear: Too many pattern attempts. Please try again in 119 minutes.

Then he found a cleaner path: a detailed XDA Developers thread. It explained a crucial fact: Not one that preserves your data, anyway. The lock screen data is stored in a protected system file called locksettings.db (or gatekeeper.pattern.key on older Androids). You cannot just delete it from a running phone.

The results were a digital minefield.

Insurtech Insights Europe 2026

Join us at Europe's largest insurtech conference at InterContinental London - The O2
on March 18-19th, uniting over 6,000 senior insurance professionals!