CN104992091A - Method and apparatus for accessing terminal end - Google Patents

Method and apparatus for accessing terminal end Download PDF

Info

Publication number
CN104992091A
CN104992091A CN201510303257.9A CN201510303257A CN104992091A CN 104992091 A CN104992091 A CN 104992091A CN 201510303257 A CN201510303257 A CN 201510303257A CN 104992091 A CN104992091 A CN 104992091A
Authority
CN
China
Prior art keywords
information
visitor
fingerprint information
user fingerprints
permission mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510303257.9A
Other languages
Chinese (zh)
Other versions
CN104992091B (en
Inventor
李文昕
陈巧卓
朱印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510303257.9A priority Critical patent/CN104992091B/en
Publication of CN104992091A publication Critical patent/CN104992091A/en
Application granted granted Critical
Publication of CN104992091B publication Critical patent/CN104992091B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The public is about a method and an apparatus for accessing a terminal end, wherein the method comprises obtaining user fingerprint information detected by the terminal end; matching the user fingerprint information and a first pre-stored sample fingerprint information; and switching into a visitor access mode when the user fingerprint information is matched up with the first sample fingerprint information and the current access mode is different from the visitor access mode corresponded to the first sample fingerprint information. According to the embodiment of the public, the convenience of fingerprint identification is fully utilized to automatically identify fingerprints and the visitor access mode is automatically switched; access settings and the visitor access mode are no longer performed manually and the visitor access mode are automatically switched according to the fingerprint identification, so the efficiency of getting into the visitor access mode is improved while avoiding the awkwardness of switching mode face to face; and the experience of a user accessing the terminal end is improved.

Description

The method of access terminal and device
Technical field
The disclosure relates to communication technical field, particularly relates to method and the device of access terminal.
Background technology
Along with the development of electronics technology, terminal is generally applied, particularly mobile terminal, such as mobile phone, panel computer etc.Keeper can realize various application function by terminal, can store some important privacy contents in the terminal, such as photo, file etc. simultaneously.When other people use terminal, directly the terminal being in administrator right pattern is lent other people, the privacy content of lane terminal can be caused to be revealed.In correlation technique, can arrange interface at the front opening lending terminal, conduct interviews priority assignation, thus administrator right pattern is switched to visitor's permission mode.Wherein, administrator right pattern often has highest weight limit, can access terminal all the elements, and the access rights of visitor's permission mode are lower than administrator right pattern.But the efficiency that this switching enters visitor's permission mode is lower, and Consumer's Experience is poor.
Summary of the invention
Present disclose provides method and the device of access terminal, the efficiency entering visitor's permission mode with the switching solved in correlation technique is lower, the problem that Consumer's Experience is poor.
According to the first aspect of disclosure embodiment, provide a kind of method of access terminal, described method comprises:
Obtain the user fingerprints information that terminal detects;
Described user fingerprints information is mated with the first sample fingerprint information prestored;
When described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switch and enter described visitor's permission mode.
Optionally, described described user fingerprints information is mated with the first sample fingerprint information prestored before, also comprise:
Described user fingerprints information is mated with the second sample fingerprint information prestored;
When described user fingerprints information and described second sample fingerprint information matches, enter administrator right pattern;
When described user fingerprints information is not mated with described second sample fingerprint information, triggering execution is described mates described user fingerprints information with the first sample fingerprint information prestored.
Optionally, described method also comprises:
When described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding with described first sample fingerprint information is identical, switch and enter administrator right pattern.
Optionally, described method also comprises:
Receive priority assignation order;
Perform at least one priority assignation mode according to described priority assignation order, and generate described visitor's permission mode, wherein, described priority assignation mode comprises:
Application program to be placed is set to addressable state, and described the data cached of application program to be placed is set to hidden state;
The usable range of the Mobile data flow of terminal is set;
The accumulative duration of call of phone application or each duration of call are set;
Phone application is set and can not dials trunk call or international long-distance telephone;
Application program/file/file to be placed is set to inaccessible state;
Application program/file/file to be placed is set to may have access to and not allow change state;
Icon/file/the file of application program to be placed is set to hidden state.
Optionally, described when described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switching enters described visitor's permission mode, comprising:
In described first sample fingerprint information, search the target fingerprint information with described user fingerprints information matches, wherein, described first sample fingerprint information comprises multiple different target fingerprint information;
From the permission mode storehouse prestored, obtain the target visitor permission mode corresponding with the target fingerprint information of described coupling, wherein, in described permission mode storehouse, comprise the corresponding relation of target fingerprint information and visitor's permission mode;
When current entitlement pattern is different from described target visitor permission mode, current entitlement pattern is switched to described target visitor permission mode.
Optionally, described method also comprises:
When described user fingerprints information is not mated with described first sample fingerprint information and described user fingerprints information is complete finger print information, store described user fingerprints information, and enter dormant state;
When terminal is waken up and enters administrator right pattern, export the information frame whether the user fingerprints information of storage being set to described first sample fingerprint information;
According to the finger print information setting command that described information frame receives, the user fingerprints information stored is arranged.
According to the second aspect of disclosure embodiment, provide a kind of device of access terminal, described device comprises:
Information acquisition unit, for obtaining the user fingerprints information that terminal detects;
First matching unit, for mating described user fingerprints information with the first sample fingerprint information prestored;
First switch unit, for when described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switching enters described visitor's permission mode.
Optionally, described device also comprises:
Second matching unit, for mating described user fingerprints information with the second sample fingerprint information prestored;
Second switch unit, for when described user fingerprints information and described second sample fingerprint information matches, enters administrator right pattern;
Trigger element, for not mating with described second sample fingerprint information when described user fingerprints information, triggering execution is described mates described user fingerprints information with the first sample fingerprint information prestored.
Optionally, described device also comprises:
3rd switch unit, for when described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding with described first sample fingerprint information is identical, switching enters administrator right pattern.
Optionally, described device also comprises:
Order receiving element, for receiving priority assignation order;
Schema creation unit, for performing at least one priority assignation mode according to described priority assignation order, and generate described visitor's permission mode, wherein, described priority assignation mode comprises:
Application program to be placed is set to addressable state, and described the data cached of application program to be placed is set to hidden state;
The usable range of the Mobile data flow of terminal is set;
The accumulative duration of call of phone application or each duration of call are set;
Phone application is set and can not dials trunk call or international long-distance telephone;
Application program/file/file to be placed is set to inaccessible state;
Application program/file/file to be placed is set to may have access to and not allow change state;
Icon/file/the file of application program to be placed is set to hidden state.
Optionally, described first switch unit comprises:
Information searching subelement, for searching the target fingerprint information with described user fingerprints information matches in described first sample fingerprint information, wherein, described first sample fingerprint information comprises multiple different target fingerprint information;
Pattern acquiring subelement, for obtaining the target visitor permission mode corresponding with the target fingerprint information of described coupling from the permission mode storehouse prestored, wherein, comprises the corresponding relation of target fingerprint information and visitor's permission mode in described permission mode storehouse;
Pattern switches subelement, time different from described target visitor permission mode for current entitlement pattern, current entitlement pattern is switched to described target visitor permission mode.
Optionally, described device also comprises:
Dormant state enters unit, for when described user fingerprints information is not mated with described first sample fingerprint information and described user fingerprints information is complete finger print information, stores described user fingerprints information, and enters dormant state;
Tip element, during for being waken up when terminal and entering administrator right pattern, exports the information frame whether the user fingerprints information of storage being set to described first sample fingerprint information;
Setting unit, for the finger print information setting command received according to described information frame, is arranged the user fingerprints information stored.
According to the third aspect of disclosure embodiment, a kind of device of access terminal is provided, comprises:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Obtain the user fingerprints information that terminal detects;
Described user fingerprints information is mated with the first sample fingerprint information prestored;
When described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switch and enter described visitor's permission mode.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
The user fingerprints information that terminal detects can be obtained in the disclosure, then user fingerprints information is mated with the first sample fingerprint information prestored, the match is successful, and the current entitlement pattern visitor permission mode corresponding from the first sample fingerprint information different time, switch and enter visitor's permission mode.Therefore disclosure embodiment can make full use of the convenience of fingerprint recognition, automatically identifies fingerprint, and automatic switchover enters visitor's permission mode.Arrange owing to no longer manually conducting interviews and click and enter visitor's permission mode, but automatically enter visitor's permission mode according to fingerprint recognition, improve the efficiency entering visitor's permission mode, avoid the embarrassment that switch mode face to face brings simultaneously, improve user's access terminal and experience.
User fingerprints information can be mated with the second sample fingerprint information prestored by the disclosure, and when user fingerprints information and the second sample fingerprint information matches, no matter what pattern present mode is, directly enters administrator right pattern.When user fingerprints information is not mated with the second sample fingerprint information, then user fingerprints information is mated with the first sample fingerprint information.Due to the corresponding visitor's permission mode of the first sample fingerprint information, the corresponding keeper's permission mode of the second sample fingerprint information, therefore can enter corresponding permission mode by different finger print informations.
The disclosure can work as user fingerprints information and the first sample fingerprint information matches, and the current entitlement pattern visitor permission mode corresponding with the first sample fingerprint information identical time, switch and enter administrator right pattern, thus realize same fingerprint can switching back and forth between control and management person's permission mode and visitor's permission mode, improve switching efficiency.
The disclosure can also adopt different priority assignation modes to arrange different authorities, thus generates corresponding visitor's permission mode, realizes the variation of visitor's permission mode.
Different target fingerprint information can also be set to the first sample fingerprint information by the disclosure, namely the first sample fingerprint information comprises multiple different target fingerprint information, identical visitor's permission mode can be set for different target fingerprint information, also corresponding visitor's permission mode can be set for different target fingerprint information.Therefore, identical visitor's permission mode can be entered by different target fingerprint information, also can enter different visitor's permission mode by different target fingerprint information, realize managing efficiently visitor's permission mode.
The disclosure can also not to be mated with the first sample fingerprint information in user fingerprints information and user fingerprints information is complete finger print information time, user fingerprints information is stored, and point out keeper whether this user fingerprints information to be arranged when next time opens keeper's permission mode, realize managing new user fingerprints information, reduce typing fingerprinting operation.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows and meets embodiment of the present disclosure, and is used from instructions one and explains principle of the present disclosure.
Figure 1A is the process flow diagram of the method for a kind of access terminal of the disclosure according to an exemplary embodiment.
Figure 1B is a kind of permission configuration interface schematic diagram of the disclosure according to an exemplary embodiment.
Fig. 1 C is the another kind of permission configuration interface schematic diagram of the disclosure according to an exemplary embodiment.
Fig. 1 D is the schematic diagram that a kind of administrator right pattern of the disclosure according to an exemplary embodiment switches to visitor's permission mode.
Fig. 2 is the process flow diagram of the method for the another kind of access terminal of the disclosure according to an exemplary embodiment.
Fig. 3 A is the process flow diagram of the method for the another kind of access terminal of the disclosure according to an exemplary embodiment.
Fig. 3 B is that the one of the disclosure according to an exemplary embodiment unlocks authentication interface schematic diagram.
Fig. 4 is the process flow diagram of the method for the another kind of access terminal of the disclosure according to an exemplary embodiment.
Fig. 5 is the device block diagram of a kind of access terminal of the disclosure according to an exemplary embodiment.
Fig. 6 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment.
Fig. 7 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment.
Fig. 8 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment.
Fig. 9 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment.
Figure 10 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment.
Figure 11 is a structural representation of a kind of device block diagram for access terminal of the disclosure according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
The term used in the disclosure is only for the object describing specific embodiment, and the not intended to be limiting disclosure." one ", " described " and " being somebody's turn to do " of the singulative used in disclosure and the accompanying claims book is also intended to comprise most form, unless context clearly represents other implications.It is also understood that term "and/or" used herein refer to and comprise one or more project of listing be associated any or all may combine.
Term first, second, third, etc. may be adopted although should be appreciated that to describe various information in the disclosure, these information should not be limited to these terms.These terms are only used for the information of same type to be distinguished from each other out.Such as, when not departing from disclosure scope, the first information also can be called as the second information, and similarly, the second information also can be called as the first information.Depend on linguistic context, word as used in this " if " can be construed as into " ... time " or " when ... time " or " in response to determining ".
As shown in Figure 1A, Figure 1A is the process flow diagram of the method for a kind of access terminal of the disclosure according to an exemplary embodiment, and the method may be used for, in terminal, comprising the following steps:
In a step 101, the user fingerprints information that terminal detects is obtained.
The terminal related in disclosure embodiment can be the various intelligent terminals being integrated with fingerprint identification function, such as, and smart mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant) etc.The Fingerprint Identification Unit of terminal can be fingerprint sensor, and the mode gathering fingerprint can be multiple, such as, can comprise scratching formula and push type etc., gathers user fingerprints information in several ways.User is when using intelligent terminal, and the Fingerprint Identification Unit of intelligent terminal can gather user fingerprints information, and utilizes user fingerprints information to apply accordingly, such as, by user fingerprints information unlock terminal, carries out Alipay payment etc. by user fingerprints information.User fingerprints information in the disclosure can be not only the finger print information of terminal management person, also can be the finger print information of visitor.
When obtaining user fingerprints information, can the user fingerprints information that detects of Real-time Obtaining terminal, also when fingerprint identifier terminal collects user fingerprints information, the prompt command that Fingerprint Identification Unit sends can be received, obtain user fingerprints information; Can unblock verification process in obtain user fingerprints information, also can after unblock user in real finger print information.
In a step 102, user fingerprints information is mated with the first sample fingerprint information prestored.
Can prestore the first sample fingerprint information in the disclosure, this first sample fingerprint information is the particular fingerprint information for entering visitor's permission mode arranged in advance.Such as, the first sample fingerprint information can be the finger print information of terminal management person, then keeper can the switching of direct control authority pattern according to the finger of specifying.In order to avoid error hiding, can the fingerprint that be of little use of typing terminal management person.Such as, the conventional finger of keeper is thumb and forefinger, then the finger print information of the middle finger of keeper can be set to the first sample fingerprint information.When keeper utilizes middle finger to carry out fingerprint recognition, can realize switching from present mode entering visitor's permission mode.In addition, first sample fingerprint information also can be the finger print information of specific visitor, specific visitor can be the visitor that terminal management person's certification is passed through, the prior typing fingerprint of specific visitor in the terminal, then specific visitor is when using terminal, can directly enter visitor's permission mode according to finger print information matching result.
The disclosure can be called the algorithm for recognizing fingerprint pre-set and user fingerprints information be mated with the first sample fingerprint information prestored.Fingerprint matching algorithm can be pre-set, for identifying fingerprint in terminal.These algorithms can be the other algorithms of existing various fingerprint matching in correlation technique, such as, can be the method based on minutiae point coordinate model coupling, based on the fingerprint image matching method of triangle coupling, or also can be the finger print matching method etc. based on local and global structure.Such as, the user fingerprints information obtained is carried out to the pre-service such as picture quality judgement, image enhaucament, finger-print region detection, fingerprint orientation and frequence estimation, image binaryzation, image thinning, then from pretreated image, obtain the crestal line data of fingerprint, and the characteristic point information needed for identifying that takes the fingerprint, the characteristic point information of extraction is mated one by one with the first sample fingerprint information prestored, determines whether identical fingerprints.It should be noted that, the detailed process of user fingerprints information and the first sample fingerprint information being carried out mating by fingerprint matching algorithm see the fingerprint matching process in correlation technique, no longer can repeat this disclosure embodiment.
In step 103, when user fingerprints information and the first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from the first sample fingerprint information is different, switch and enter visitor's permission mode.
Visitor's permission mode in the present embodiment can preset, and such as, some private file hidden, can also limit the use of some application programs, then in visitor's permission mode, user cannot check hidden file, and can only use application program specified right.Terminal management person (terminal owner) by the file of secret or application program being hidden, and limits the use of some application programs, thus reaches the object of protection privacy.
In the disclosure when user fingerprints information and the first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from the first sample fingerprint information is different, switch and enter the visitor's permission mode pre-set.Therefore disclosure embodiment can make full use of the convenience of fingerprint recognition, automatically identifies fingerprint, and automatically enters visitor's permission mode.Arrange owing to no longer manually conducting interviews and click and enter visitor's permission mode, but automatically enter visitor's permission mode according to fingerprint recognition, improve the efficiency entering visitor's permission mode, avoid the embarrassment switching permission mode face to face and bring simultaneously, improve user's access terminal and experience.
In an optional implementation, priority assignation order can be received; Perform at least one priority assignation mode according to priority assignation order, and generate visitor's permission mode.Priority assignation mode has a variety of, can carry out priority assignation in the following way:
Mode one: application program to be placed is set to addressable state, and the data cached of application program to be placed is set to hidden state.
Can comprise a lot of application program in terminal, terminal management person needs the application program arranged to be called application program to be placed.For the application program that some are special, the function of application program does not have privacy, but the data of application cache have privacy, therefore, this class application program can be set to addressable state, and the data cached of application program to be placed is set to hidden state.Wherein, hide data cached can be the data of buffer memory under present mode.Such as, visitor's permission mode is set under administrator right pattern, then the data of this application cache under administrator right pattern can be hidden.
Give an actual example explanation, and visitor can be allowed to use the function of camera application, but do not allow visitor to check the photo of buffer memory in camera application, then camera application can be set to addressable state, and the buffer memory photo of camera application is set to hidden state.And for example, when mobile phone uses to other people, can not be limited other people and call, but undesirably other people see message registration, then phone application can be set to addressable state, and message registration is hidden.And for example, for some specific user, allow access QQ application, but do not allow this visitor to check chat record, then QQ application can be set to addressable state, and the chat record that QQ applies is set to hidden state.
Mode two: the usable range that the Mobile data flow of terminal is set.
Mobile data flow is the data traffic produced by the mobile communication technology online such as GPRS, EDGE, TD-SCDMA, HSDPA, LTE or the value-added service of use related data.Some fast mobile terminal data traffic is limited, and when terminal being lent visitor and using, keeper can worry whether flow uses super problem.In order to solve this worry, can limit the usable range of Mobile data flow, such as, set a flow higher limit to mobile phone in visitor's permission mode, if mobile phone has exceeded the Mobile data flow higher limit of setting, mobile phone will be limited use traffic.
Mode three: the accumulative duration of call of phone application or each duration of call are set.
Under can arranging this visitor's permission mode, the duration that visitor calls at every turn, or the accumulative duration called, when exceeding setting duration, then restriction is called.
Mode four: phone application is set and can not dials trunk call or international long-distance telephone.
Owing to dialing trunk call or international long-distance telephone costly, under can arranging this visitor's permission mode, visitor can not dial trunk call, or can not dial international long-distance telephone.
Mode five: application program/file/file to be placed is set to inaccessible state.
Inaccessible state in the manner is that the icon of this application program/file/file is visible, but visitor's inaccessible, such as cannot open application program/file/file.Such as, some application program, file or file in terminal compare privacy, then these application programs, file or file can be set to inaccessible state.
Mode six: application program/file/file to be placed is set to may have access to and not allow change state.
Some application program/file/file can allow guest access, but does not allow it to change.Wherein, file may have access to and not allow the change state file that can be understood as in file to access but do not allow change.Such as, allow guest access mailbox, but do not allow visitor to utilize the mailbox of keeper to send out mail, then mailbox application can be set to may have access to and not allow change state.And for example, allow guest access note, but do not allow user to utilize the mobile phone of keeper to send short messages, then note application can be set to may have access to and not allow change state.And for example, allow the file in guest access certain file, but do not allow it to revise file in this file, then this file sandwiched can be set to and may have access to and not allow change state.And for example, allow guest access app store, but do not allow visitor's down load application, then app store application can be set to may have access to and not allow change state.
Mode seven: the icon/file/file of application program to be placed is set to hidden state.
Wherein, described hide refer in any display interface of terminal all hiding; When applying or file is in hidden state, representing that user cannot find the icon of this application or file at any display interface of terminal, also namely cannot obtain the entrance starting this object.Wherein, display interface can comprise desktop, interface of main menu, program installation directory interface, system folder interface etc.And when applying or file is in display state, represent that this application or file are in visible state in the display interface of terminal, in the display interface of terminal, show the icon of this application or file, when user clicks this application or file icon, this object can be started.
For priority assignation order, can at the permission configuration interface of administrator right pattern, receive priority assignation order, then according to priority assignation order, application programs and file carry out priority assignation, generate visitor's permission mode.Wherein, the order that the menu button that priority assignation order can be clicked on permission configuration interface for user triggers.Administrator right pattern is the pattern that terminal management person commonly uses, and often has highest weight limit in this pattern, and all application programs can be used, All Files is visible.The present embodiment presets visitor's permission mode of terminal under administrator right pattern, and under visitor's permission mode, the authority of only keeper's setting can use.
Wherein in an embodiment, as shown in Figure 1B, be a kind of permission configuration interface schematic diagram of the disclosure according to an exemplary embodiment.User can click the menu button arranged on interface, the application program of correspondence is set to hidden icons, display icon, inaccessible, may have access to and not allow to change, may have access to and hide the rights state such as data cached.The rights state of this application program can also be edited, such as newly-increased " forbidding dialing trunk call " rights state, deletion " inaccessible " rights state etc. by clicking the "+" button.Embodiment described in Figure 1B can be clicked the order that menu button triggers and carrys out switching state by receiving user, such as, user clicks icon button below, rights state is shown as " display icon ", then clicks icon button below, then rights state switches to " hidden icons ", click icon button below again, then rights state switches to " visitor's inaccessible ", and by that analogy, poll shows various rights state.
In another embodiment, when the order that the menu button after receiving user and clicking application program triggers, export the combobox that this application program is corresponding, prompting user selects corresponding rights state.Such as, as shown in Figure 1 C, be the another kind of permission configuration interface schematic diagram of the disclosure according to an exemplary embodiment.When OptionButton is below applied in click " micro-letter ", eject combobox, in combobox, following option can be had: hidden icons, display icon, permission are changed, do not allowed change, editing authority state etc.Other rights state can be set by " editing authority state ", the such as rights state such as newly-increased " display allows access ", " not allowing access ", " can not trunk call be dialed ", " may have access to and hide data cached ", delete " allowing change " rights state, concrete additions and deletions rights state can according to different application settings.The present embodiment is clicked order that menu button triggers and is realized rights state by receiving user and select.It should be noted that, the concrete mode that rights state is selected see the selection mode in correlation technique, no longer can also be repeated this disclosure embodiment.
As shown in figure ip, for a kind of administrator right pattern of the disclosure according to an exemplary embodiment switches to the schematic diagram of visitor's permission mode.Being administrator right pattern before switching, is visitor's permission mode after switching.In visitor's permission mode, the rights state of note application and secret file is set to " hidden icons ", photograph application is set to " may have access to and hide data cached state ", the rights state of micro-letter application, QQ application, mail applications can be set to " may have access to and not allow change state ", and the rights state of phone application is set to " can not dial trunk call ".When visitor utilizes the application of micro-letter to send out circle of friends, the prompting frame of " may have access to and not allow to change " can be exported.When visitor dials trunk call, the suggestion voice of " trunk call can not be dialed " can be exported.
In an optional implementation, in user fingerprints information and the first sample fingerprint information matches prestored, and the current entitlement pattern visitor permission mode corresponding with the first sample fingerprint information identical time, current entitlement pattern can be kept, do not switch.In this embodiment, visitor's permission mode of specifying can only be entered by the first sample fingerprint information, other permission mode can not be entered.
In another optional implementation, as shown in Figure 2, Fig. 2 is the process flow diagram of the method for the another kind of access terminal of the disclosure according to an exemplary embodiment, and the method may be used for, in terminal, comprising the following steps:
In step 201, the user fingerprints information that terminal detects is obtained.
In step 202., judge whether user fingerprints information mates with the first sample fingerprint information prestored, if coupling, enter step 203.
In step 203, judge that whether the current entitlement pattern visitor permission mode corresponding with the first sample fingerprint information be identical, if different, then enter step 204, if identical, then enter step 205.
In step 204, the switching of current entitlement pattern is entered visitor's permission mode.
In step 205, the switching of current entitlement pattern is entered administrator right pattern.
The first sample fingerprint information that the present embodiment provides can trigger visitor's permission mode and administrator right pattern switches back and forth, can improve the switching efficiency of visitor's permission mode and administrator right pattern.Therefore, the finger print information of the general typing keeper of the first sample fingerprint information in the present embodiment, or administrator authentication pass through can the fingerprint of the visitor of Access Management Access person's permission mode and visitor's permission mode back and forth.For the finger print information of general visitor, be not set to the first sample fingerprint information, avoid this visitor to automatically switch administrator right pattern.Such as, the middle finger of keeper is set to the first sample fingerprint information, then when there being visitor to use terminal, keeper presses fingerprint identifier terminal by middle finger, terminal switched from current administrator right pattern and enter visitor's permission mode, when visitor gains terminal, keeper can continue through middle finger pressing fingerprint identifier terminal, terminal is switched from current visitor's permission mode and enters administrator right pattern, improve the switching efficiency of two kinds of patterns.
As shown in Figure 3A, Fig. 3 A is the process flow diagram of the method for the another kind of access terminal of the disclosure according to an exemplary embodiment, and the method may be used for, in terminal, comprising the following steps:
In step 301, the user fingerprints information that terminal detects is obtained.
The terminal related in disclosure embodiment can be the various intelligent terminals being integrated with fingerprint identification function.Wherein, when obtaining the user fingerprints information that terminal detects, can in the following way:
Mode one: obtain user fingerprints information in unblock verification process.
The intelligent terminal being integrated with fingerprint identification function often can carry out unlocked by fingerprint.After lighting terminal screen, unblock authentication state can be entered.Wherein, the state of finger print identifying is carried out when unblock authentication state is terminal unlocking.As shown in Figure 3 B, for the one of the disclosure according to an exemplary embodiment unlocks authentication interface schematic diagram.Terminal can gather the user fingerprints information of user, and carries out certification to user fingerprints information, unlocks after authentication success to terminal.
The present embodiment can obtain the user fingerprints information unlocked in verification process: first judge whether terminal is in unblock authentication state.Judgment mode is a variety of, and such as, before unblock, terminal is often in dormant state, can light terminal screen by operating key.Such as, can light mobile phone screen by the major key (home key) of pressing mobile phone, now having unblock authorization prompt, then can be that terminal is in unblock authentication state by this condition adjudgement.When terminal is in unblock authentication state, obtains the user fingerprints information of the current collection of Fingerprint Identification Unit of terminal, namely can get the user fingerprints information of unlock user.This embodiment can when terminal be in unblock authentication state, obtain the user fingerprints information of the current collection of Fingerprint Identification Unit of terminal, realize first judging when unlocking user fingerprints information whether with the sample fingerprint information matches prestored, if with the second sample fingerprint information matches prestored, then unlock and enter administrator right pattern, if with the first sample fingerprint information matches prestored, then unlock and enter visitor's permission mode.Thus realize directly entering corresponding permission mode afterwards in unblock, improve the efficiency of access entitlements pattern, and save electricity.
Mode two: user in real finger print information after unblock.
Terminal is after unblock, and before locking, terminal display screen is in opening, also can be called terminal operating status.Terminal is can the terminal of Real-time Collection finger print information when terminal display screen is in opening.First the manner judges whether terminal display screen is in opening, when terminal display screen is in opening, utilize the Fingerprint Identification Unit of terminal can carry out fingerprint recognition in real time, then Fingerprint Identification Unit can Real-time Collection user fingerprints information, obtains the user fingerprints information that Fingerprint Identification Unit gathers.Even if the present embodiment can realize terminal display screen and be in opening, also in real time current administrator right pattern can be switched to visitor's permission mode, current visitor's permission mode switches to administrator right pattern, realizes real-time.
Further, can also the user fingerprints information obtained be judged, judge whether user fingerprints information belongs to abnormal finger print information, if so, then delete user fingerprints information, do not perform subsequent step 302 to 306.So-called abnormal finger print information, namely touches Fingerprint Identification Unit in use terminal procedures, but does not belong to the finger print information that Fingerprint Identification Unit will identify.Judge that the method for abnormal finger print information has a variety of, such as, can judge whether comprise characteristic point information in the information gathered, if do not comprise characteristic point information, abnormal finger print information can be thought, then by this user fingerprints information deletion, no longer carry out step 302.Also can judge that the pressing times of Fingerprint Identification Unit is whether in setting-up time threshold range, if not, also can think abnormal finger print information, then by this user fingerprints information deletion, no longer carry out step 302.Therefore, some abnormal finger print informations can be deleted, avoid the situation that false touch is touched.It should be noted that, determine whether see the abnormal fingerprint determination methods in correlation technique, no longer to repeat the method that the method for abnormal finger print information is not limited to the present embodiment and provides to this disclosure embodiment.
In step 302, judge user fingerprints information whether with the second sample fingerprint information matches prestored, when user fingerprints information and the second sample fingerprint information matches, enter step 303, when user fingerprints information is not mated with the second sample fingerprint information, enter step 304.
Wherein, described second sample fingerprint information can be the finger print information of first finger of terminal management person.Should be appreciated that the first finger first, not specific finger finger here, be also not limited to only have a finger, the first finger is here referring to of terminal management person's finger.First finger can be a finger, also can be multiple finger.First finger can be the conventional finger of keeper.Such as, the first finger can be the thumb or forefinger that are usually used in unlocking.This step object is the second sample fingerprint information to be set to the trigger condition entering administrator right pattern.
In step 303, administrator right pattern is entered.
User fingerprints information can be mated with the second sample fingerprint information prestored by the disclosure, when user fingerprints information and the second sample fingerprint information matches, no matter present mode is any pattern, directly enter administrator right pattern, thus improve the efficiency entering administrator right pattern.
In step 304, judge user fingerprints information whether with the first sample fingerprint information matches prestored, when user fingerprints information and the first sample fingerprint information matches, enter step 305.
Can prestore the first sample fingerprint information in the disclosure, this first sample fingerprint information is the particular fingerprint information for entering visitor's permission mode arranged in advance.
First sample fingerprint information can be the finger print information of the second finger of terminal management person, then keeper can directly control to enter visitor's permission mode.Wherein, should be appreciated that the not specific finger of second finger first finger here, be also not limited to only have a finger, second finger is here referring to of terminal management person's finger.Second finger can be a finger, also can be multiple finger.Second finger is different from aforesaid first finger, and object is to start different patterns.In order to avoid maloperation, second finger can be the finger that is of little use of keeper.Such as, the conventional finger of keeper is thumb and forefinger, then the finger print information of the middle finger of keeper can be set to the first sample fingerprint information.
First sample fingerprint information also can be the finger print information of specific visitor, specific visitor can be the visitor that terminal management person's certification is passed through, by in the fingerprint typing terminal of specific visitor, then specific visitor is when using terminal, directly can enter visitor's permission mode corresponding to the first sample fingerprint information according to finger print information matching result.
In step 305, judge that whether corresponding with the first sample fingerprint information current entitlement pattern visitor's permission mode be identical, if different, then enter step 306.
The object of this step is, when visitor's permission mode that current entitlement pattern is corresponding from the first sample fingerprint information is different, switch and enter visitor's permission mode corresponding to the first sample fingerprint information, thus realization switches visitor's permission mode that the first sample fingerprint information that enters is specified.
Within step 306, switching enters visitor's permission mode corresponding to the first sample fingerprint information.
User fingerprints information can be mated with the second sample fingerprint information prestored by the disclosure, and when user fingerprints information and the second sample fingerprint information matches, no matter what pattern present mode is, directly enters administrator right pattern.When user fingerprints information is not mated with the second sample fingerprint information, then user fingerprints information is mated with the first sample fingerprint information.Due to the corresponding visitor's permission mode of the first sample fingerprint information, the corresponding keeper's permission mode of the second sample fingerprint information, therefore can enter specified power pattern by different finger print informations.
Illustrate, the finger print information of the middle finger of keeper can be set to the first sample fingerprint information, the thumbprint information of keeper is set to the second sample fingerprint information.When keeper is by thumb press Fingerprint Identification Unit, terminal can unlock and directly enter administrator right pattern, normally uses to make keeper.Keeper has other people to use terminal when using terminal, then by the middle finger pressing Fingerprint Identification Unit of setting, current administrator right pattern is switched to visitor's permission mode by control terminal.When returning terminal, keeper can pass through thumb press Fingerprint Identification Unit, and control terminal enters administrator right pattern from current visitor's permission mode, thus realizes the quick switching of visitor's permission mode and administrator right pattern.
Consider in the present embodiment that keeper uses terminal frequency high, so can be set to first to judge user fingerprints information whether with the second sample fingerprint information matches, judge again when not mating user fingerprints information whether with the first sample fingerprint information matches, can judging efficiency be improved.
Wherein, should be appreciated that be first judge user fingerprints information whether with the second sample fingerprint information matches, judge again when not mating user fingerprints information whether with the first sample fingerprint information matches; Still first judge user fingerprints information whether with the first sample fingerprint information matches, judge again when not mating user fingerprints information whether with the second sample fingerprint information matches, be all the scheme that the disclosure is protected, concrete order can set according to demand.Be to be understood that equally; after first utilizing disclosure method to enter visitor's permission mode; recycling enters the scheme of administrator right pattern also in protection domain of the present disclosure with the fingerprint of the second sample fingerprint information matches; namely the fingerprint that the present embodiment can realize specifying enters corresponding permission mode; such as; the fingerprint mated with the first sample fingerprint triggers and enters visitor's permission mode, and the fingerprint mated with the second sample fingerprint triggers and enters administrator right pattern.
In an optional implementation, when user fingerprints information is not all mated with the first sample fingerprint information and the second sample fingerprint information, directly can carry out screen locking, also directly can enter visitor's permission mode of acquiescence.
As shown in Figure 4, Fig. 4 is the process flow diagram of the method for the another kind of access terminal of the disclosure according to an exemplary embodiment, and the method may be used for, in terminal, comprising the following steps:
In step 401, the user fingerprints information that terminal detects is obtained.
The terminal related in disclosure embodiment can be the various intelligent terminals being integrated with fingerprint identification function.Terminal user is when using intelligent terminal, and the Fingerprint Identification Unit of intelligent terminal understands the finger print information of acquisition terminal user, and utilizes finger print information to apply accordingly, such as, by finger print information unlock terminal, carries out Alipay payment etc. by finger print information.
During the user fingerprints information that acquisition terminal detects, can judge whether terminal is in unblock authentication state, when unblock authentication state is terminal unlocking, carry out the state of finger print identifying; When terminal is in unblock authentication state, the user fingerprints information that the Fingerprint Identification Unit obtaining terminal gathers.Also can judge whether terminal display screen is in opening; When terminal display screen is in opening, the user fingerprints information of the Fingerprint Identification Unit collection of Real-time Obtaining terminal.
In step 402, in the first sample fingerprint information, the target fingerprint information with user fingerprints information matches is searched.Wherein, the first sample fingerprint information comprises multiple different target fingerprint information.
Can prestore the first sample fingerprint information in the disclosure, this first sample fingerprint information is the particular fingerprint information for current entitlement pattern being switched to visitor's permission mode arranged in advance.The first sample fingerprint information that arranges can in the following way:
Mode one: the finger print information of terminal management person is set to the first sample fingerprint information.
Can the finger print information of typing terminal management person in advance in terminal, be set to the first sample fingerprint information.Such as, the finger print information of the second finger of typing terminal management person.Wherein, should be appreciated that second finger here does not refer in particular to a finger, can be multiple finger.Can comprise multiple different target fingerprint information owing to limiting the first sample fingerprint information in the present embodiment, then in the present embodiment, second finger can comprise the multiple finger of keeper.Cause in order to avoid during conventional finger manipulation terminal the maloperation entering visitor's permission mode, the finger that is of little use of terminal management person can be set to second finger.Such as, second finger can comprise middle finger, the third finger of the right hand, the middle finger of left hand, the third finger etc. of left hand of the right hand.
Further, first can obtain the fingerprint image of the second finger of terminal management person, then the fingerprint image of second finger be carried out pre-service.Such as, the pre-service such as picture quality judgement, image enhaucament, finger-print region detection, fingerprint orientation and frequence estimation, image binaryzation, image thinning are carried out to the fingerprint image of second finger.Then the characteristic point information taken the fingerprint from pretreated fingerprint image, is set to the first sample fingerprint information by characteristic point information, and stores the first sample fingerprint information.Owing to obtaining the fingerprint image of the difference finger of terminal management person, then can obtain the fingerprint image characteristic of correspondence dot information of different finger, be set to target fingerprint information, form the first sample fingerprint information.In this way, terminal management person can enter visitor's permission mode by the finger of specifying in advance.Such as, after terminal screen locking, when having other people to borrow terminal to use, can be unlocked by preassigned second finger (such as middle finger), and enter visitor's permission mode.Or when using terminal, when now having other people to borrow terminal, the Fingerprint Identification Unit that preassigned middle finger can be placed on terminal carries out fingerprint recognition, makes terminal at once be switched to visitor's permission mode from current entitlement pattern.
Mode two: the finger print information of specific visitor is set to the first sample fingerprint information.
Can the finger print information of typing visitor in advance in terminal, be set to the first sample fingerprint information.Specific visitor refers to the visitor by administrator authentication, and such as, specific visitor can be the friends and family etc. specified.Wherein, also can the finger print information of the multiple visitor of typing, or be the finger print information of multiclass visitor (visitor group).
Further, the fingerprint image of the visitor by administrator authentication can first be obtained; Then fingerprint image is carried out pre-service, the characteristic point information taken the fingerprint from pretreated fingerprint image, characteristic point information is set to the first sample fingerprint information, and store the first sample fingerprint information.Owing to obtaining the fingerprint image of different visitor's fingerprint, then can obtain the fingerprint image characteristic of correspondence dot information of different finger, be set to target fingerprint information, form the first sample fingerprint information, and store.And can in advance for different visitor or inhomogeneity visitor arrange corresponding visitor's permission mode, by visitor's permission mode of finger print information and correspondence thereof stored in visitor's permission mode storehouse.In this way, visitor can enter visitor's permission mode by the finger of specifying in advance.Such as, for the computing machine with fingerprint identification function, when starting shooting unblock, can identify the fingerprint of different visitor, start enters visitor's permission mode corresponding to fingerprint.
Mode three: simultaneously the finger print information of terminal management person and specific visitor is set to the first sample fingerprint information.
The first sample fingerprint information is all set to by keeper with by the fingerprint of the visitor of administrator authentication, then not only keeper can enter visitor's permission mode by the finger control terminal of specifying, and specific visitor also can enter visitor's permission mode by the finger control terminal of specifying in advance.
In the present embodiment, in the first sample fingerprint information, store multiple target fingerprint information, user fingerprints information is mated one by one with the target fingerprint information in the first sample fingerprint information, when the match is successful, the target fingerprint information of mating can be determined.
In step 403, from the permission mode storehouse prestored, obtain the target visitor permission mode corresponding with the target fingerprint information of coupling, wherein, in permission mode storehouse, comprise the corresponding relation of target fingerprint information and visitor's permission mode.
Permission mode storehouse can be prestored in terminal, in permission mode storehouse, comprise the corresponding relation of target fingerprint information and visitor's permission mode.Wherein, corresponding with target fingerprint information visitor's permission mode is called target visitor permission mode.
Because the first sample fingerprint information comprises multiple different target fingerprint information, therefore identical visitor's permission mode can be set for different target fingerprint information, also corresponding visitor's permission mode can be set for different target fingerprint information, then can enter identical visitor's permission mode by different target fingerprint information, also can enter different visitor's permission mode by different target fingerprint information, realize managing efficiently visitor's permission mode.
In step 404, when current entitlement pattern is different from target visitor permission mode, current entitlement pattern is switched to target visitor permission mode.
In an optional implementation, by the permission configuration interface of administrator right pattern, priority assignation order can be received.According to priority assignation order, for different visitors generates corresponding visitor's permission mode, the corresponding relation of target fingerprint information and visitor's permission mode is stored in permission mode storehouse; Or, according to priority assignation order, for different visitor all living creatures becomes corresponding visitor's permission mode, the corresponding relation of target fingerprint information and visitor's permission mode is stored in permission mode storehouse.
Wherein, visitor group is the same class visitor that the person of being managed presets, and same class visitor has identical visitor's permission mode.For corresponding relation, target fingerprint information and visitor's permission mode can be one-to-one relationships, also can be many-to-one relations.Such as, same visitor's permission mode can be entered by multiple fingers of keeper, to avoid the situation owing to specifying finger injuries or other reasons cannot enter visitor's permission mode.Target fingerprint information and visitor can be one-to-one relationships, also can the relation of one-to-many.Such as, same class visitor is divided into visitor group, when one of them visitor in this visitor group uses terminal, visitor's permission mode can be entered by the appointment finger control terminal of keeper.
Illustrate, visitor permission mode A can be entered for visitor A access by target fingerprint information 1; Visitor permission mode B can be entered for visitor group B access by target fingerprint information 2, visitor permission mode C can be entered by target fingerprint information 3 and target fingerprint information 4, access for visitor C.Then the corresponding relation of target fingerprint information and visitor's permission mode can as table 1:
Target fingerprint information 1 Visitor permission mode A
Target fingerprint information 2 Visitor permission mode B
Target fingerprint information 3 Visitor permission mode C
Target fingerprint information 4 Visitor permission mode C
…… ……
Table 1
Above-mentioned corresponding relation is stored in visitor's permission mode storehouse, thus the target visitor permission mode that the target fingerprint information that can obtain coupling according to the target fingerprint information of mating from the permission mode storehouse prestored is corresponding, and target approach visitor permission mode.
With the first sample fingerprint information for terminal management person's finger print information is illustrated.Such as, in advance for A visitor arranges visitor permission mode A, and set up the incidence relation of the middle finger finger print information of visitor permission mode A and keeper, and be stored in permission mode storehouse.In advance visitor permission mode B is set for B visitor group, and sets up the incidence relation of the finger print information of the third finger of visitor permission mode B and keeper and the finger print information of little finger of toe, and be stored in permission mode storehouse.Such as, corresponding relation can as table 2:
Middle finger finger print information Visitor permission mode A
Nameless finger print information Visitor permission mode B
Little finger of toe finger print information Visitor permission mode B
Table 2
When A visitor needs to use terminal, the Fingerprint Identification Unit that middle finger is placed on terminal by keeper identifies, identifies successfully, then enter visitor permission mode A.
With the first sample fingerprint information for visitor's finger print information is illustrated.Such as, because friend A is different with the relation of keeper with relative B, in advance for friend A arranges visitor permission mode A, and set up the incidence relation of visitor permission mode A and friend A finger print information, be stored in permission mode storehouse.In advance for relative B arranges visitor permission mode B, and set up the incidence relation of visitor permission mode B and relative B finger print information, be stored in permission mode storehouse.When the target fingerprint information of mating is the finger print information of friend A, then enter visitor permission mode A, when the target fingerprint information of mating is the finger print information of relative B, then enter visitor permission mode B.And for example, because friend A, B, C are a class visitor, relative D, E are a class visitor, then arrange identical visitor permission mode A for friend A, B, C, and for relative D, E arrange identical visitor permission mode B, corresponding relation can as table 3:
Target fingerprint information A Visitor permission mode A
Target fingerprint information B Visitor permission mode A
Target fingerprint information C Visitor permission mode A
Target fingerprint information D Visitor permission mode B
Target fingerprint information E Visitor permission mode B
Table 3
Such as, when the target fingerprint information of mating is the finger print information of friend B, then visitor permission mode A is entered.
In an optional implementation, when user fingerprints information is not mated with the first sample fingerprint information and user fingerprints information is complete finger print information, store user fingerprints information, and enter dormant state; When terminal is waken up and enters administrator right pattern, export the information frame whether the user fingerprints information of storage being set to the first sample fingerprint information; According to the finger print information setting command that information frame receives, the user fingerprints information stored is arranged.Such as, this user fingerprints information can be deleted according to finger print information processing command, also according to finger print information processing command, user fingerprints information can be set to the first sample fingerprint information.
As shown in Figure 5, Fig. 5 is the device block diagram of a kind of access terminal of the disclosure according to an exemplary embodiment, and described device comprises: information acquisition unit 510, first matching unit 520 and the first switch unit 530.
Wherein, information acquisition unit 510, is configured to the user fingerprints information that acquisition terminal detects;
First matching unit 520, is configured to described user fingerprints information to mate with the first sample fingerprint information prestored;
First switch unit 530, is configured to when described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switching enters described visitor's permission mode.
As seen from the above-described embodiment, the user fingerprints information that terminal detects can be obtained, then user fingerprints information is mated with the first sample fingerprint information prestored, the match is successful, and the current entitlement pattern visitor permission mode corresponding from the first sample fingerprint information different time, switch and enter visitor's permission mode.Therefore disclosure embodiment can make full use of the convenience of fingerprint recognition, automatically identifies fingerprint, and automatically carries out switching and enter visitor's permission mode.Arrange owing to no longer manually conducting interviews and click and enter visitor's permission mode, but automatically enter visitor's permission mode according to fingerprint recognition, improve the efficiency entering visitor's permission mode, avoid the embarrassment that switch mode face to face brings simultaneously, improve user's access terminal and experience.
As shown in Figure 6, Fig. 6 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment, this embodiment is on aforementioned basis embodiment illustrated in fig. 5, and described device also comprises: the second matching unit 540, second switch unit 550 and trigger element 560.
Wherein, the second matching unit 540, is configured to described user fingerprints information to mate with the second sample fingerprint information prestored;
Second switch unit 550, is configured to, when described user fingerprints information and described second sample fingerprint information matches, enter administrator right pattern;
Trigger element 560, be configured to not mate with described second sample fingerprint information when described user fingerprints information, triggering execution is described mates described user fingerprints information with the first sample fingerprint information prestored.
As seen from the above-described embodiment, user fingerprints information can be mated with the second sample fingerprint information prestored, when user fingerprints information and the second sample fingerprint information matches, no matter present mode is any pattern, directly enters administrator right pattern.When user fingerprints information is not mated with the second sample fingerprint information, then user fingerprints information is mated with the first sample fingerprint information.Due to the corresponding visitor's permission mode of the first sample fingerprint information, the corresponding keeper's permission mode of the second sample fingerprint information, therefore can enter specified power pattern by different finger print informations.
As shown in Figure 7, Fig. 7 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment, and this embodiment is on aforementioned basis embodiment illustrated in fig. 5, and described device also comprises: the 3rd switch unit 570.
Wherein, the 3rd switch unit 570, is configured to when described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding with described first sample fingerprint information is identical, switching enters administrator right pattern.
As seen from the above-described embodiment, user fingerprints information and the first sample fingerprint information matches can worked as, and the current entitlement pattern visitor permission mode corresponding with the first sample fingerprint information identical time, switch and enter administrator right pattern, thus realize same fingerprint can switching back and forth between control and management person's permission mode and visitor's permission mode, improve switching efficiency.
As shown in Figure 8, Fig. 8 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment, this embodiment is in earlier figures 5 on basis embodiment illustrated in fig. 7, and described device also comprises: order receiving element 580 and schema creation unit 590.
Wherein, order receiving element 580, is configured to receive priority assignation order;
Schema creation unit 590, be configured to perform at least one priority assignation mode according to described priority assignation order, and generate described visitor's permission mode, wherein, described priority assignation mode comprises:
Application program to be placed is set to addressable state, and described the data cached of application program to be placed is set to hidden state;
The usable range of the Mobile data flow of terminal is set;
The accumulative duration of call of phone application or each duration of call are set;
Phone application is set and can not dials trunk call or international long-distance telephone;
Application program/file/file to be placed is set to inaccessible state;
Application program/file/file to be placed is set to may have access to and not allow change state;
Icon/file/the file of application program to be placed is set to hidden state.
As seen from the above-described embodiment, can also adopt different priority assignation modes that different authorities is set, thus generate corresponding visitor's permission mode, realize the variation of visitor's permission mode.
As shown in Figure 9, Fig. 9 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment, and this embodiment is in earlier figures 5 on basis embodiment illustrated in fig. 7, and described first switch unit 530 comprises:
Information searching subelement 531, be configured to search the target fingerprint information with described user fingerprints information matches in described first sample fingerprint information, wherein, described first sample fingerprint information comprises multiple different target fingerprint information;
Pattern acquiring subelement 532, be configured to obtain the target visitor permission mode corresponding with the target fingerprint information of described coupling from the permission mode storehouse prestored, wherein, the corresponding relation of target fingerprint information and visitor's permission mode is comprised in described permission mode storehouse;
Pattern switch subelement 533, be configured to current entitlement pattern different from described target visitor permission mode time, current entitlement pattern is switched to described target visitor permission mode.
As seen from the above-described embodiment, different target fingerprint information can be set to the first sample fingerprint information, namely the first sample fingerprint information comprises multiple different target fingerprint information, identical visitor's permission mode can be set for different target fingerprint information, also corresponding visitor's permission mode can be set for different target fingerprint information.Therefore, identical visitor's permission mode can be entered by different target fingerprint information, also can enter different visitor's permission mode by different target fingerprint information, realize managing efficiently visitor's permission mode.
As shown in Figure 10, Figure 10 is the device block diagram of the another kind of access terminal of the disclosure according to an exemplary embodiment, this embodiment is in earlier figures 5 on basis embodiment illustrated in fig. 7, and described device also comprises: dormant state enters unit 610, Tip element 620 and setting unit 630.
Wherein, dormant state enters unit 610, is configured to, when described user fingerprints information is not mated with described first sample fingerprint information and described user fingerprints information is complete finger print information, store described user fingerprints information, and enter dormant state;
Tip element 620, is configured to when terminal is waken up and enters administrator right pattern, exports the information frame whether the user fingerprints information of storage being set to described first sample fingerprint information;
Setting unit 630, is configured to the finger print information setting command received according to described information frame, arranges the user fingerprints information stored.
As seen from the above-described embodiment, can not mate with the first sample fingerprint information in user fingerprints information and user fingerprints information is complete finger print information time, user fingerprints information is stored, and point out keeper whether this user fingerprints information to be arranged when next time opens keeper's permission mode, realize managing new user fingerprints information, reduce typing fingerprinting operation.
Accordingly, the disclosure also provides the device of another kind of access terminal, and described device includes processor; For the storer of storage of processor executable instruction; Wherein, described processor is configured to:
Obtain the user fingerprints information that terminal detects;
Described user fingerprints information is mated with the first sample fingerprint information prestored;
When described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switch and enter described visitor's permission mode.
In said apparatus, the implementation procedure of the function and efficacy of unit specifically refers to the implementation procedure of corresponding step in said method, does not repeat them here.
For device embodiment, because it corresponds essentially to embodiment of the method, so relevant part illustrates see the part of embodiment of the method.Device embodiment described above is only schematic, the wherein said unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of disclosure scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
As shown in figure 11, Figure 11 is a structural representation of a kind of device 1100 for access terminal of the disclosure according to an exemplary embodiment.Such as, device 1100 can be the mobile phone with routing function, computing machine, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Figure 11, device 1100 can comprise following one or more assembly: processing components 1102, storer 1104, power supply module 1106, multimedia groupware 1108, audio-frequency assembly 1110, the interface 1112 of I/O (I/O), sensor module 1114, and communications component 1116.
The integrated operation of the usual control device 1100 of processing components 1102, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 1102 can comprise one or more processor 1120 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 1102 can comprise one or more module, and what be convenient between processing components 1102 and other assemblies is mutual.Such as, processing components 1102 can comprise multi-media module, mutual with what facilitate between multimedia groupware 1108 and processing components 1102.
Storer 1104 is configured to store various types of data to be supported in the operation of device 1100.The example of these data comprises for any application program of operation on device 1100 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 1104 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that power supply module 1106 is device 1100 provide electric power.Power supply module 1106 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 1100 and be associated.
Multimedia groupware 1108 is included in the screen providing an output interface between described device 1100 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 1108 comprises a front-facing camera and/or post-positioned pick-up head.When device 1100 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 1110 is configured to export and/or input audio signal.Such as, audio-frequency assembly 1110 comprises a microphone (MIC), and when device 1100 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 1104 further or be sent via communications component 1116.In certain embodiments, audio-frequency assembly 1110 also comprises a loudspeaker, for output audio signal.
I/O interface 1112 is for providing interface between processing components 1102 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 1114 comprises one or more sensor, for providing the state estimation of various aspects for device 1100.Such as, sensor module 1114 can detect the opening/closing state of device 1100, the relative positioning of assembly, such as described assembly is display and the keypad of device 1100, the position of all right pick-up unit 1100 of sensor module 1114 or device 1100 assemblies changes, the presence or absence that user contacts with device 1100, the temperature variation of device 1100 orientation or acceleration/deceleration and device 1100.Sensor module 1114 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 1114 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 1114 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer, microwave remote sensor or temperature sensor.
Communications component 1116 is configured to the communication being convenient to wired or wireless mode between device 1100 and other equipment.Device 1100 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 1116 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communications component 1116 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1100 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 1104 of instruction, above-mentioned instruction can perform said method by the processor 1120 of device 1100.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of terminal, make terminal can perform a kind of method of access terminal, described method comprises: obtain the user fingerprints information that terminal detects; Described user fingerprints information is mated with the first sample fingerprint information prestored; When described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switch and enter described visitor's permission mode.
Those skilled in the art, at consideration instructions and after putting into practice invention disclosed herein, will easily expect other embodiment of the present disclosure.The disclosure is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (13)

1. a method for access terminal, is characterized in that, described method comprises:
Obtain the user fingerprints information that terminal detects;
Described user fingerprints information is mated with the first sample fingerprint information prestored;
When described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switch and enter described visitor's permission mode.
2. method according to claim 1, is characterized in that, described described user fingerprints information is mated with the first sample fingerprint information prestored before, also comprise:
Described user fingerprints information is mated with the second sample fingerprint information prestored;
When described user fingerprints information and described second sample fingerprint information matches, enter administrator right pattern;
When described user fingerprints information is not mated with described second sample fingerprint information, triggering execution is described mates described user fingerprints information with the first sample fingerprint information prestored.
3. method according to claim 1, is characterized in that, described method also comprises:
When described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding with described first sample fingerprint information is identical, switch and enter administrator right pattern.
4., according to the arbitrary described method of claims 1 to 3, it is characterized in that, described method also comprises:
Receive priority assignation order;
Perform at least one priority assignation mode according to described priority assignation order, and generate described visitor's permission mode, wherein, described priority assignation mode comprises:
Application program to be placed is set to addressable state, and described the data cached of application program to be placed is set to hidden state;
The usable range of the Mobile data flow of terminal is set;
The accumulative duration of call of phone application or each duration of call are set;
Phone application is set and can not dials trunk call or international long-distance telephone;
Application program/file/file to be placed is set to inaccessible state;
Application program/file/file to be placed is set to may have access to and not allow change state;
Icon/file/the file of application program to be placed is set to hidden state.
5. according to the arbitrary described method of claims 1 to 3, it is characterized in that, described when described user fingerprints information and described first sample fingerprint information matches, and the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information different time, switch and enter described visitor's permission mode, comprising:
In described first sample fingerprint information, search the target fingerprint information with described user fingerprints information matches, wherein, described first sample fingerprint information comprises multiple different target fingerprint information;
From the permission mode storehouse prestored, obtain the target visitor permission mode corresponding with the target fingerprint information of described coupling, wherein, in described permission mode storehouse, comprise the corresponding relation of target fingerprint information and visitor's permission mode;
When current entitlement pattern is different from described target visitor permission mode, current entitlement pattern is switched to described target visitor permission mode.
6., according to the arbitrary described method of claims 1 to 3, it is characterized in that, described method also comprises:
When described user fingerprints information is not mated with described first sample fingerprint information and described user fingerprints information is complete finger print information, store described user fingerprints information, and enter dormant state;
When terminal is waken up and enters administrator right pattern, export the information frame whether the user fingerprints information of storage being set to described first sample fingerprint information;
According to the finger print information setting command that described information frame receives, the user fingerprints information stored is arranged.
7. a device for access terminal, is characterized in that, described device comprises:
Information acquisition unit, for obtaining the user fingerprints information that terminal detects;
First matching unit, for mating described user fingerprints information with the first sample fingerprint information prestored;
First switch unit, for when described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switching enters described visitor's permission mode.
8. device according to claim 7, is characterized in that, described device also comprises:
Second matching unit, for mating described user fingerprints information with the second sample fingerprint information prestored;
Second switch unit, for when described user fingerprints information and described second sample fingerprint information matches, enters administrator right pattern;
Trigger element, for not mating with described second sample fingerprint information when described user fingerprints information, triggering execution is described mates described user fingerprints information with the first sample fingerprint information prestored.
9. device according to claim 7, is characterized in that, described device also comprises:
3rd switch unit, for when described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding with described first sample fingerprint information is identical, switching enters administrator right pattern.
10., according to the arbitrary described device of claim 7 to 9, it is characterized in that, described device also comprises:
Order receiving element, for receiving priority assignation order;
Schema creation unit, for performing at least one priority assignation mode according to described priority assignation order, and generate described visitor's permission mode, wherein, described priority assignation mode comprises:
Application program to be placed is set to addressable state, and described the data cached of application program to be placed is set to hidden state;
The usable range of the Mobile data flow of terminal is set;
The accumulative duration of call of phone application or each duration of call are set;
Phone application is set and can not dials trunk call or international long-distance telephone;
Application program/file/file to be placed is set to inaccessible state;
Application program/file/file to be placed is set to may have access to and not allow change state;
Icon/file/the file of application program to be placed is set to hidden state.
11. according to the arbitrary described device of claim 7 to 9, and it is characterized in that, described first switch unit comprises:
Information searching subelement, for searching the target fingerprint information with described user fingerprints information matches in described first sample fingerprint information, wherein, described first sample fingerprint information comprises multiple different target fingerprint information;
Pattern acquiring subelement, for obtaining the target visitor permission mode corresponding with the target fingerprint information of described coupling from the permission mode storehouse prestored, wherein, comprises the corresponding relation of target fingerprint information and visitor's permission mode in described permission mode storehouse;
Pattern switches subelement, time different from described target visitor permission mode for current entitlement pattern, current entitlement pattern is switched to described target visitor permission mode.
12. according to the arbitrary described device of claim 7 to 9, and it is characterized in that, described device also comprises:
Dormant state enters unit, for when described user fingerprints information is not mated with described first sample fingerprint information and described user fingerprints information is complete finger print information, stores described user fingerprints information, and enters dormant state;
Tip element, during for being waken up when terminal and entering administrator right pattern, exports the information frame whether the user fingerprints information of storage being set to described first sample fingerprint information;
Setting unit, for the finger print information setting command received according to described information frame, is arranged the user fingerprints information stored.
The device of 13. 1 kinds of access terminal, is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Obtain the user fingerprints information that terminal detects;
Described user fingerprints information is mated with the first sample fingerprint information prestored;
When described user fingerprints information and described first sample fingerprint information matches, and when the current entitlement pattern visitor permission mode corresponding from described first sample fingerprint information is different, switch and enter described visitor's permission mode.
CN201510303257.9A 2015-06-05 2015-06-05 Access the method, apparatus and storage medium of terminal Active CN104992091B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510303257.9A CN104992091B (en) 2015-06-05 2015-06-05 Access the method, apparatus and storage medium of terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510303257.9A CN104992091B (en) 2015-06-05 2015-06-05 Access the method, apparatus and storage medium of terminal

Publications (2)

Publication Number Publication Date
CN104992091A true CN104992091A (en) 2015-10-21
CN104992091B CN104992091B (en) 2019-03-01

Family

ID=54303904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510303257.9A Active CN104992091B (en) 2015-06-05 2015-06-05 Access the method, apparatus and storage medium of terminal

Country Status (1)

Country Link
CN (1) CN104992091B (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device
CN105808993A (en) * 2016-03-30 2016-07-27 广东欧珀移动通信有限公司 Unlocking method and related device
CN105809000A (en) * 2016-03-07 2016-07-27 联想(北京)有限公司 Information processing method and electronic device
CN105868648A (en) * 2016-03-28 2016-08-17 珠海格力电器股份有限公司 Mobile terminal and data processing method and device for visitor mode of mobile terminal
CN105893934A (en) * 2016-03-07 2016-08-24 北京集创北方科技股份有限公司 Fingerprint identification method and device and mobile terminal
CN106055941A (en) * 2016-05-24 2016-10-26 珠海市魅族科技有限公司 Terminal method and apparatus
CN106127070A (en) * 2016-06-21 2016-11-16 宇龙计算机通信科技(深圳)有限公司 A kind of method of data sharing, device and terminal
CN106209805A (en) * 2016-06-30 2016-12-07 广州云移信息科技有限公司 Login method based on biological characteristic, terminal and system
CN106446721A (en) * 2016-09-29 2017-02-22 北京小米移动软件有限公司 Intelligent terminal access control method and device
CN106503506A (en) * 2016-10-31 2017-03-15 维沃移动通信有限公司 A kind of method for information display and electronic equipment
CN106527660A (en) * 2016-10-31 2017-03-22 珠海市魅族科技有限公司 Electronic equipment driving method and related electronic equipment
CN106557678A (en) * 2016-11-09 2017-04-05 珠海格力电器股份有限公司 A kind of intelligent terminal's mode switching method and its device
CN106909821A (en) * 2017-01-20 2017-06-30 奇酷互联网络科技(深圳)有限公司 The control method of terminal, device and terminal device
CN107066891A (en) * 2017-05-10 2017-08-18 维沃移动通信有限公司 A kind of image pickup method and mobile terminal
WO2017185648A1 (en) * 2016-04-25 2017-11-02 乐视控股(北京)有限公司 Method and apparatus for protecting user information
CN107688425A (en) * 2017-05-05 2018-02-13 平安科技(深圳)有限公司 A kind of operating method into guest mode and a kind of mobile terminal
CN107786341A (en) * 2017-10-11 2018-03-09 广东欧珀移动通信有限公司 Certificate loading method and related product
CN107862190A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Based reminding method and Related product
CN108009412A (en) * 2017-12-26 2018-05-08 华勤通讯技术有限公司 Using the authorization method and electronic equipment of item
CN108509247A (en) * 2018-04-08 2018-09-07 深圳先搜科技有限公司 A kind of extremely simple mode implementation method, system and terminal device
TWI647584B (en) * 2016-04-12 2019-01-11 速博思股份有限公司 Method of enabling/disabling operating-authority of handheld device
CN109344585A (en) * 2018-10-09 2019-02-15 广州三星通信技术研究有限公司 The method and apparatus of the access right of automatic setting electric terminal
WO2019047104A1 (en) * 2017-09-07 2019-03-14 深圳传音通讯有限公司 Smart terminal-based usage state recording method and system
CN111182122A (en) * 2018-11-12 2020-05-19 奇酷互联网络科技(深圳)有限公司 Mode control method, intelligent terminal and device with storage function
WO2020156199A1 (en) * 2019-01-31 2020-08-06 Oppo广东移动通信有限公司 Application login method and device, terminal and storage medium
CN112115444A (en) * 2019-06-21 2020-12-22 华为技术有限公司 Unlocking method and electronic equipment
CN114254359A (en) * 2021-12-22 2022-03-29 展讯通信(上海)有限公司 Initialization method, device, terminal and storage medium
CN115906026A (en) * 2022-10-24 2023-04-04 广州汽车集团股份有限公司 Children mode control method and device, vehicle and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927004A (en) * 2014-04-01 2014-07-16 乐视致新电子科技(天津)有限公司 Mobile terminal and method for switching user interfaces
CN104572219A (en) * 2015-01-29 2015-04-29 广东欧珀移动通信有限公司 Photographing mode switching method and photographing mode switching device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927004A (en) * 2014-04-01 2014-07-16 乐视致新电子科技(天津)有限公司 Mobile terminal and method for switching user interfaces
CN104572219A (en) * 2015-01-29 2015-04-29 广东欧珀移动通信有限公司 Photographing mode switching method and photographing mode switching device

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device
CN105893934A (en) * 2016-03-07 2016-08-24 北京集创北方科技股份有限公司 Fingerprint identification method and device and mobile terminal
CN105809000A (en) * 2016-03-07 2016-07-27 联想(北京)有限公司 Information processing method and electronic device
US10482271B2 (en) 2016-03-07 2019-11-19 Lenovo (Beijing) Limited Methods and devices for displaying content
CN105868648B (en) * 2016-03-28 2019-06-04 珠海格力电器股份有限公司 Mobile terminal and data processing method and device for mobile terminal guest mode
CN105868648A (en) * 2016-03-28 2016-08-17 珠海格力电器股份有限公司 Mobile terminal and data processing method and device for visitor mode of mobile terminal
CN105808993A (en) * 2016-03-30 2016-07-27 广东欧珀移动通信有限公司 Unlocking method and related device
CN105808993B (en) * 2016-03-30 2017-11-07 广东欧珀移动通信有限公司 A kind of unlocking method and relevant apparatus
US10474801B2 (en) 2016-04-12 2019-11-12 Superc-Touch Corporation Method of enabling and disabling operating authority of handheld device
TWI647584B (en) * 2016-04-12 2019-01-11 速博思股份有限公司 Method of enabling/disabling operating-authority of handheld device
WO2017185648A1 (en) * 2016-04-25 2017-11-02 乐视控股(北京)有限公司 Method and apparatus for protecting user information
CN106055941A (en) * 2016-05-24 2016-10-26 珠海市魅族科技有限公司 Terminal method and apparatus
CN106127070A (en) * 2016-06-21 2016-11-16 宇龙计算机通信科技(深圳)有限公司 A kind of method of data sharing, device and terminal
CN106127070B (en) * 2016-06-21 2019-04-12 宇龙计算机通信科技(深圳)有限公司 A kind of method, apparatus and terminal of data sharing
CN106209805A (en) * 2016-06-30 2016-12-07 广州云移信息科技有限公司 Login method based on biological characteristic, terminal and system
CN106446721A (en) * 2016-09-29 2017-02-22 北京小米移动软件有限公司 Intelligent terminal access control method and device
CN106527660A (en) * 2016-10-31 2017-03-22 珠海市魅族科技有限公司 Electronic equipment driving method and related electronic equipment
CN106503506A (en) * 2016-10-31 2017-03-15 维沃移动通信有限公司 A kind of method for information display and electronic equipment
CN106527660B (en) * 2016-10-31 2019-11-08 珠海市魅族科技有限公司 The driving method and associated electronic device of electronic equipment
CN106503506B (en) * 2016-10-31 2019-08-20 维沃移动通信有限公司 A kind of information display method and electronic equipment
CN106557678A (en) * 2016-11-09 2017-04-05 珠海格力电器股份有限公司 A kind of intelligent terminal's mode switching method and its device
CN106557678B (en) * 2016-11-09 2019-07-26 珠海格力电器股份有限公司 A kind of intelligent terminal mode switching method and its device
CN106909821A (en) * 2017-01-20 2017-06-30 奇酷互联网络科技(深圳)有限公司 The control method of terminal, device and terminal device
WO2018201767A1 (en) * 2017-05-05 2018-11-08 平安科技(深圳)有限公司 Operating method for entering guest mode and mobile terminal
CN107688425A (en) * 2017-05-05 2018-02-13 平安科技(深圳)有限公司 A kind of operating method into guest mode and a kind of mobile terminal
CN107066891A (en) * 2017-05-10 2017-08-18 维沃移动通信有限公司 A kind of image pickup method and mobile terminal
CN107066891B (en) * 2017-05-10 2023-04-07 维沃移动通信有限公司 Shooting method and mobile terminal
WO2019047104A1 (en) * 2017-09-07 2019-03-14 深圳传音通讯有限公司 Smart terminal-based usage state recording method and system
CN107786341A (en) * 2017-10-11 2018-03-09 广东欧珀移动通信有限公司 Certificate loading method and related product
US10659599B2 (en) 2017-10-11 2020-05-19 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Certificate loading method and related product
CN107862190A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Based reminding method and Related product
CN108009412A (en) * 2017-12-26 2018-05-08 华勤通讯技术有限公司 Using the authorization method and electronic equipment of item
CN108509247A (en) * 2018-04-08 2018-09-07 深圳先搜科技有限公司 A kind of extremely simple mode implementation method, system and terminal device
CN109344585A (en) * 2018-10-09 2019-02-15 广州三星通信技术研究有限公司 The method and apparatus of the access right of automatic setting electric terminal
CN111182122A (en) * 2018-11-12 2020-05-19 奇酷互联网络科技(深圳)有限公司 Mode control method, intelligent terminal and device with storage function
WO2020156199A1 (en) * 2019-01-31 2020-08-06 Oppo广东移动通信有限公司 Application login method and device, terminal and storage medium
CN112115444A (en) * 2019-06-21 2020-12-22 华为技术有限公司 Unlocking method and electronic equipment
CN112115444B (en) * 2019-06-21 2022-08-26 华为技术有限公司 Unlocking method and electronic equipment
CN114254359A (en) * 2021-12-22 2022-03-29 展讯通信(上海)有限公司 Initialization method, device, terminal and storage medium
WO2023116739A1 (en) * 2021-12-22 2023-06-29 展讯通信(上海)有限公司 Initialization method and apparatus, terminal, and storage medium
CN115906026A (en) * 2022-10-24 2023-04-04 广州汽车集团股份有限公司 Children mode control method and device, vehicle and storage medium

Also Published As

Publication number Publication date
CN104992091B (en) 2019-03-01

Similar Documents

Publication Publication Date Title
CN104992091A (en) Method and apparatus for accessing terminal end
CN104866750B (en) Using startup method and apparatus
CN104765552B (en) Right management method and device
CN104008348B (en) application control method, device and terminal
CN104951682A (en) Privacy protection method and device
CN104794382A (en) Application starting method and device
CN104933351A (en) Information security processing method and information security processing device
CN104503688A (en) Intelligent hardware device control achieving method and device
CN104992092A (en) Method, device and system for fingerprint information verification
CN105549849A (en) Method and device for processing misoperation instruction
CN104391712B (en) Closedown method and device
CN105513179A (en) Unlocking method and device, as well as intelligent lock
CN104376273A (en) Data access control method and device
CN104378501A (en) Phone number naming method and device
CN107643818B (en) Function opening method and device
CN105335677A (en) Anti-theft method and device of mobile terminal
CN107798231A (en) Display methods, device, terminal and the storage medium of operation interface
CN107045604A (en) Information processing method and device
CN104899501A (en) Dialog list display method and device and terminal
CN107729764A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN108537096A (en) Reminding method, device and the electronic equipment of fingerprint collecting position
CN104965645A (en) Unlocking method and apparatus
CN106600768A (en) Intelligent door lock authentication method, device and terminal
CN106503516A (en) Terminal, unlocked by fingerprint method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant