CN108243417B - WIFI connection-based user permission determination method, mobile terminal and storage medium - Google Patents

WIFI connection-based user permission determination method, mobile terminal and storage medium Download PDF

Info

Publication number
CN108243417B
CN108243417B CN201711447550.8A CN201711447550A CN108243417B CN 108243417 B CN108243417 B CN 108243417B CN 201711447550 A CN201711447550 A CN 201711447550A CN 108243417 B CN108243417 B CN 108243417B
Authority
CN
China
Prior art keywords
mobile terminal
wireless network
user
operation instruction
target wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711447550.8A
Other languages
Chinese (zh)
Other versions
CN108243417A (en
Inventor
柏凤佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201711447550.8A priority Critical patent/CN108243417B/en
Publication of CN108243417A publication Critical patent/CN108243417A/en
Application granted granted Critical
Publication of CN108243417B publication Critical patent/CN108243417B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/36Reselection control by user or terminal equipment
    • H04W36/365Reselection control by user or terminal equipment by manual user interaction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a user permission determining method based on WIFI connection, which is applied to a mobile terminal and used for judging whether a connectable wireless network currently detected by the mobile terminal contains a target wireless network; under the condition that the wireless network which can be connected with the mobile terminal comprises a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network; receiving a first operation instruction sent by a user aiming at the mobile terminal; and when the first operation instruction belongs to the range of the preset authority operation list, determining that the user executes the first operation instruction. In addition, the embodiment of the invention also provides a mobile terminal and a storage medium. By applying the embodiment of the invention, the mobile terminal can be connected to the target wireless network forcibly and automatically when detecting the target wireless network, thereby realizing the separate operation of the mobile terminal.

Description

WIFI connection-based user permission determination method, mobile terminal and storage medium
Technical Field
The invention relates to the field of mobile terminals, in particular to a user permission determining method based on WIFI connection, a mobile terminal and a storage medium.
Background
Cell phones have become a vital tool for everyone to input, store and carry information. Due to the need of work, some workers may enter the office area to work with their own office tools, such as personal notebooks, handheld terminals, mobile phones, and the like.
In the prior art, office tools carried by individuals can be used at any time due to the fact that the office tools comprise game software, chat tools, information transmission tools and the like, and certain threats are caused to confidential information of companies. For example, employees are free to send confidential documents of companies, causing losses to the companies. If the employees are prohibited from carrying personal office tools, some materials for the employees to carry out shift work at home cannot be used in time, and the use of the users is inconvenient.
Disclosure of Invention
The invention mainly aims to provide a user authority determining method based on WIFI connection, a mobile terminal and a storage medium, which can be used for forcibly and automatically connecting to a target wireless network when the mobile terminal detects the target wireless network, and allowing a user to execute operation within a fixed preset authority operation list range, so that the aim of separate operation of the mobile terminal can be fulfilled, and the aim of uniformly managing own office tools of employees under the wireless network of a company can be fulfilled.
In order to achieve the above object, the present invention provides a method for determining user rights based on WIFI connection, which is applied to a mobile terminal, and the method includes:
judging whether a connectable wireless network currently detected by the mobile terminal comprises a target wireless network;
under the condition that the wireless networks which can be connected by the mobile terminal comprise a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network;
receiving a first operation instruction sent by a user aiming at the mobile terminal;
and when the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction.
In the foregoing solution, before the step of determining whether the wireless network currently detected by the mobile terminal includes the target wireless network, the method further includes:
judging whether the current wireless network connection is in a closed state;
and if so, opening the connection mode of the wireless network.
In the above scheme, the method further comprises:
receiving an operation instruction of the user for the wireless network, and judging whether the operation instruction for the wireless network is an operation instruction for closing WIFI connection;
and if so, refusing to execute the operation instruction for the wireless network.
In the above scheme, the method further comprises:
when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, receiving a second operation instruction of the user;
determining whether the user has the authority to execute the second operation instruction or not according to the preset authority operation list;
or the like, or, alternatively,
and locking a first operating system when the current WiFi connection of the mobile terminal is disconnected with the target wireless network.
In the above scheme, the method further comprises:
and fingerprint information of the user is collected and sent to an attendance system.
In the above scheme, the preset authority operation list at least does not include: the method comprises the following steps of using an external memory, using a SIM (subscriber identity module), intercepting current screen information of the mobile terminal and changing an operating system of the mobile terminal.
In the foregoing solution, the receiving a first operation instruction sent by a user for the mobile terminal includes:
receiving a first operation instruction sent by a user aiming at the first operation system of the mobile terminal
In the foregoing solution, the determining, according to the preset authority operation list, whether the user has the authority to execute the second operation instruction includes:
and determining whether the user has the authority for executing the second operation instruction in a second operation system according to the preset authority operation list.
In addition, in order to achieve the above object, the present invention provides a mobile terminal including a processor, and a memory connected to the processor through a communication bus; wherein the content of the first and second substances,
the memory is used for storing a user authority determining program based on WIFI connection;
the processor is configured to execute the user permission determination program based on the WIFI connection, so as to implement the following steps:
judging whether a connectable wireless network currently detected by the mobile terminal comprises a target wireless network;
under the condition that the wireless networks which can be connected by the mobile terminal comprise a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network;
receiving a first operation instruction sent by a user aiming at the mobile terminal;
and when the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction.
In the foregoing solution, the processor is configured to execute a user permission determination program based on WIFI connection, so as to implement the following steps:
judging whether the current wireless network connection is in a closed state;
and if so, opening the connection mode of the wireless network.
In the foregoing solution, the processor is configured to execute a user permission determination program based on WIFI connection, so as to implement the following steps:
receiving an operation instruction of the user for the wireless network, and judging whether the operation instruction for the wireless network is an operation instruction for closing WIFI connection;
and if so, refusing to execute the operation instruction for the wireless network.
In the foregoing solution, the processor is configured to execute a user permission determination program based on WIFI connection, so as to implement the following steps:
when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, receiving a second operation instruction of the user;
determining whether the user has the authority to execute the second operation instruction or not according to the preset authority operation list;
or the like, or, alternatively,
and locking a first operating system when the current WiFi connection of the mobile terminal is disconnected with the target wireless network.
In the foregoing solution, the processor is configured to execute a user permission determination program based on WIFI connection, so as to implement the following steps:
and fingerprint information of the user is collected and sent to an attendance system.
In the foregoing solution, the processor is configured to execute a user permission determination program based on WIFI connection, so as to implement the following steps:
the preset authority operation list at least does not comprise: the method comprises the following steps of using an external memory, using a SIM (subscriber identity module), intercepting current screen information of the mobile terminal and changing an operating system of the mobile terminal.
In the foregoing solution, the processor is configured to execute a user permission determination program based on WIFI connection, so as to implement the following steps:
receiving a first operation instruction sent by a user aiming at the first operation system of the mobile terminal
In the foregoing solution, the processor is configured to execute a user permission determination program based on WIFI connection, so as to implement the following steps:
and determining whether the user has the authority for executing the second operation instruction in a second operation system according to the preset authority operation list. .
To achieve the above object, the present invention proposes a storage medium storing one or more programs, the one or more programs being executable by one or more processors to cause the one or more processors to perform the steps of:
judging whether a connectable wireless network currently detected by the mobile terminal comprises a target wireless network;
under the condition that the wireless networks which can be connected by the mobile terminal comprise a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network;
receiving a first operation instruction sent by a user aiming at the mobile terminal;
and when the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction.
Therefore, compared with the prior art, the user right determining method based on the WIFI connection, the mobile terminal and the storage medium provided by the invention judge whether the connectable wireless network currently detected by the mobile terminal contains the target wireless network; under the condition that the wireless network which can be connected with the mobile terminal comprises a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network; and then when a first operation instruction sent by a user for the mobile terminal is received and the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction. Therefore, the problem that in the prior art, office tools carried by workers are lack of unified management, and loss possibly caused to companies is solved. Therefore, the embodiment provided by the invention can forcibly and automatically connect to the target wireless network when the mobile terminal detects the target wireless network, and allows the user to execute the operation within the range of the fixed preset authority operation list, thereby achieving the aim of separating the mobile terminal.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal in implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal shown in FIG. 1;
fig. 3 is an optional schematic flow chart of the method for determining user permissions based on WIFI connection according to the embodiment of the present invention;
fig. 4 is a schematic view of an optional application scenario of the method for determining user permissions based on WIFI connection according to the embodiment of the present invention;
fig. 5 is a schematic view of another optional application scenario of the method for determining user permission based on WIFI connection according to the embodiment of the present invention.
Reference numerals:
Figure BDA0001527859490000051
Figure BDA0001527859490000061
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, the present invention provides various embodiments of the method.
In order to solve the problem of the prior art, embodiments of the present invention provide a method for determining a user right based on a WIFI connection, a mobile terminal, and a storage medium, and a technical solution of the present invention is further described in detail with reference to the accompanying drawings and specific embodiments.
It should be noted that the mobile terminal may include at least one operating system, and an existing mobile terminal, for example, a mobile phone, may include two operating systems. For example, when a company network is connected, access to a work system/work domain is allowed, and after leaving an office area, the work system is locked.
An embodiment of the present invention provides a method for determining a user right based on a WIFI connection, which is applied to a mobile terminal, fig. 3 is a schematic view illustrating an optional process for determining a user right based on a WIFI connection according to an embodiment of the present invention, as shown in fig. 3, the method for determining a user right based on a WIFI connection includes the following steps:
step S310: and judging whether the connectable wireless network currently detected by the mobile terminal comprises a target wireless network.
It should be noted that, when the wireless network of the mobile terminal is turned on, the currently accessible wireless network may be detected all the time, and a list of the wireless networks is given, so that the user can select the connection of the wireless network.
It is to be understood that a target wireless network, which may be a wireless network of an enterprise, is provided in the mobile terminal. For example, when a user enters a company with his/her own mobile phone, the mobile terminal automatically searches to determine whether the currently detected connectable wireless networks include the company's wireless network, and if so, detects the target wireless network, otherwise, continuously enters the detection process of the target wireless network.
Illustratively, the wireless network name of enterprise a is a00123, and when the mobile terminal detects a wireless network with a wireless network name of a00123, it is considered that a target wireless network is detected, as shown in fig. 4. In addition, the name of the target wireless network may be one or multiple, for example, in order to enhance the coverage of the wireless network, the enterprise may set 5 wireless networks, set in the mobile terminal, and when any one of the five wireless networks is detected, it is considered that the connectable wireless network currently detected by the mobile terminal includes the target wireless network.
Therefore, the number of target wireless networks may be one or more, as long as detection of the target wireless networks can be achieved, and the embodiment of the present invention is not specifically limited herein.
Step S320: and switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network under the condition that the wireless network which can be connected by the mobile terminal comprises the target wireless network.
It should be noted that, when the mobile terminal detects that the currently connectable wireless network includes a target wireless network, if the current wireless connection already exists, the mobile terminal automatically disconnects the current wireless connection and automatically connects to the target wireless network; if the mobile terminal does not currently have a wireless connection, the mobile terminal can be directly connected with the target wireless network. Thereby achieving the purpose of accessing the target wireless network.
In the embodiment of the invention, the office tool brought by the staff of the enterprise is the mobile terminal, and the mobile terminal can detect the target wireless network when being in the range covered by the wireless network of the enterprise, so as to automatically connect to the target wireless network.
The process can be realized by setting in the mobile terminal in advance, and can also be realized by installing an application program or executing a script in the mobile terminal. For example, the application program communicates with the application program of the mobile terminal, so that the operating system controls the processes of automatically detecting the target wireless network and automatically switching or connecting to the target wireless network after detecting the target wireless network. The embodiments of the present invention are not limited herein.
Step S330: and receiving a first operation instruction sent by a user aiming at the mobile terminal.
In the embodiment of the invention, after the user is connected to the target wireless network, if the mobile terminal receives the operation instruction of the user, the operation instruction is used as the first operation instruction.
It is understood that the mobile terminal is located inside the enterprise, and in order to prevent the loss of the enterprise caused by the random sending, deletion or editing of the materials related to the enterprise in the mobile terminal, the limitation is performed by the operation request of the user.
Step S340: and when the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction.
In the embodiment of the invention, after the mobile terminal accesses the target network, in order to further determine whether the operation executed by the user will cause harm, whether the first operation instruction can be executed is further determined. And the judgment basis is a preset authority operation list.
It should be noted that, after the user accesses the target wireless network, an operation standard is set for any current operation of the mobile terminal, and in the case of the standard, the operation instruction is executed; otherwise, execution is not performed. The preset authority operation list in the embodiment of the invention is the operation standard.
Therefore, under the condition that the first operation instruction is judged to belong to the preset authority operation list, the mobile terminal responds to the first operation instruction and allows the user to obtain a corresponding execution result, otherwise, a warning or prompting interface is sent to the user to remind the user that the current operation cannot be executed and is not in the preset authority operation list range.
Illustratively, the user performs the screen capturing operation of the currently displayed content, which is not within the scope of the preset authority operation list, so the mobile terminal sends a display interface to prompt the user that the current screen capturing operation is an illegal operation and is not allowed to be performed, as shown in fig. 5.
Compared with the prior art, the method for determining the user permission based on the WIFI connection provided by the embodiment of the invention judges whether the connectable wireless network currently detected by the mobile terminal contains a target wireless network; under the condition that the wireless network which can be connected with the mobile terminal comprises a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network; and then when a first operation instruction sent by a user for the mobile terminal is received and the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction. Therefore, the problem that in the prior art, office tools carried by workers are lack of unified management, and loss possibly caused to companies is solved. Therefore, the embodiment provided by the invention can forcibly and automatically connect to the target wireless network when the mobile terminal detects the target wireless network, and allows the user to execute the operation within the range of the fixed preset authority operation list, thereby achieving the aim of separating the mobile terminal.
In one implementation manner of the invention, before the step of judging whether the wireless network currently detected by the mobile terminal comprises a target wireless network, the method also comprises the steps of judging whether the current wireless network connection is in a closed state; and if so, opening the connection mode of the wireless network.
It should be noted that, in order to further prevent the mobile terminal carried by the user from entering the network area covered by the enterprise, on the premise that the wireless network is closed, the operation of automatically connecting to the target wireless network cannot be executed, and thus the operation authority cannot be limited. Therefore, the embodiment of the invention continuously judges whether the current wireless network is in the closed state, and if the current wireless network is closed, the connection mode of the wireless network is automatically opened, so that the connection of the wireless network is always in the opened mode.
In addition, an embodiment of the present invention further provides an embodiment for preventing a wireless network from being turned off, so as to avoid that the wireless network is turned off artificially after the wireless network is connected to a target wireless network, so that a mobile terminal cannot execute according to a preset authority operation list, where the method further includes: receiving an operation instruction of the user for the wireless network, and judging whether the operation instruction for the wireless network is an operation instruction for closing WIFI connection; and if so, refusing to execute the operation instruction for the wireless network.
It can be understood that, when the mobile terminal is located far away from the area where the target wireless network is located, the mobile terminal will be disconnected from the target mobile network, and in this case, the operation of the mobile terminal will be resumed, and the method adopted in the embodiment of the present invention further includes: when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, receiving a second operation instruction of the user; determining whether the user has the authority to execute the second operation instruction or not according to the preset authority operation list;
or when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, locking the first operating system. In the embodiment of the present invention, the preset authority operation list may be directly and automatically restored when the mobile terminal is not connected to the target wireless network, without determining whether the execution is possible or performing a part of the operation of the preset authority operation list according to the preset authority operation list.
In addition, the determining whether the user has the authority to execute the second operation instruction according to the preset authority operation list includes: and determining whether the user has the authority for executing the second operation instruction in a second operation system according to the preset authority operation list.
Therefore, in the embodiment of the present invention, the mobile terminal may include two operating systems, and when the mobile terminal is connected to the target wireless network, the mobile terminal executes in the first operating system, and when the mobile terminal is connected to the target wireless network, the mobile terminal executes the operation command in the second operating system, thereby implementing different operations of the two systems. When the company network is connected, the first operating system is allowed to be accessed, and the first operating system is locked after the company network leaves an office area; and under the working state, forbidding partial functions and applications of the mobile phone: and forbidding a screen capture function of the working system, forbidding an external SD card, binding the SIM card with the mobile phone, and forbidding the ROOT to reinstall the system. And the service application and the data private protocol can be encrypted under the first operating system, and the encryption path is invisible and cannot be leaked through the mobile phone terminal, so that the data security is further improved.
In addition, fingerprint attendance can be performed under the condition that the mobile terminal is accessed to the target wireless network, and the convenience and the rapidness of the fingerprint attendance are improved, so that the cost of attendance equipment is saved, and the efficiency of automatic office work is improved, and the specific mode is that the method further comprises the following steps: and fingerprint information of the user is collected and sent to an attendance system.
In an implementation manner of the present invention, the preset authority operation list at least includes: the method comprises the following steps of using an external memory, using a SIM (subscriber identity module), intercepting current screen information of the mobile terminal and changing an operating system of the mobile terminal. To ensure that the operation of the mobile terminal is secure in the operation mode of the current connection target wireless network.
Further, the present invention provides a mobile terminal, please continue to refer to fig. 1, where the mobile terminal 100 includes a flexible screen, a first camera and a second camera, the mobile terminal includes a processor 110, and a memory 109 connected to the processor 110 through a communication bus; wherein the content of the first and second substances,
the memory 109 is used for storing a user authority determining program based on the WIFI connection;
the processor 110 is configured to execute a user permission determination program based on the WIFI connection, so as to implement the following steps:
judging whether a connectable wireless network currently detected by the mobile terminal comprises a target wireless network;
under the condition that the wireless networks which can be connected by the mobile terminal comprise a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network;
receiving a first operation instruction sent by a user aiming at the mobile terminal;
and when the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction.
It should be noted that, when the wireless network of the mobile terminal is turned on, the currently accessible wireless network may be detected all the time, and a list of the wireless networks is given, so that the user can select the connection of the wireless network.
It is to be understood that a target wireless network, which may be a wireless network of an enterprise, is provided in the mobile terminal. For example, when a user enters a company with his/her own mobile phone, the mobile terminal automatically searches to determine whether the currently detected connectable wireless networks include the company's wireless network, and if so, detects the target wireless network, otherwise, continuously enters the detection process of the target wireless network.
Illustratively, the wireless network name of enterprise a is a00123, and when the mobile terminal detects a wireless network with a wireless network name of a00123, it is considered to detect a target wireless network. In addition, the name of the target wireless network may be one or multiple, for example, in order to enhance the coverage of the wireless network, the enterprise may set 5 wireless networks, set in the mobile terminal, and when any one of the five wireless networks is detected, it is considered that the connectable wireless network currently detected by the mobile terminal includes the target wireless network.
It should be noted that, when the mobile terminal detects that the currently connectable wireless network includes a target wireless network, if the current wireless connection already exists, the mobile terminal automatically disconnects the current wireless connection and automatically connects to the target wireless network; if the mobile terminal does not currently have a wireless connection, the mobile terminal can be directly connected with the target wireless network. Thereby achieving the purpose of accessing the target wireless network.
Therefore, the number of target wireless networks may be one or more, as long as detection of the target wireless networks can be achieved, and the embodiment of the present invention is not specifically limited herein.
In the embodiment of the invention, the office tool brought by the staff of the enterprise is the mobile terminal, and the mobile terminal can detect the target wireless network when being in the range covered by the wireless network of the enterprise, so as to automatically connect to the target wireless network.
The process can be realized by setting in the mobile terminal in advance, and can also be realized by installing an application program or executing a script in the mobile terminal. For example, the application program communicates with the application program of the mobile terminal, so that the operating system controls the processes of automatically detecting the target wireless network and automatically switching or connecting to the target wireless network after detecting the target wireless network. The embodiments of the present invention are not limited herein.
In the embodiment of the invention, after the user is connected to the target wireless network, if the mobile terminal receives the operation instruction of the user, the operation instruction is used as the first operation instruction.
It is understood that the mobile terminal is located inside the enterprise, and in order to prevent the loss of the enterprise caused by the random sending, deletion or editing of the materials related to the enterprise in the mobile terminal, the limitation is performed by the operation request of the user.
In the embodiment of the invention, after the mobile terminal accesses the target network, in order to further determine whether the operation executed by the user will cause harm, whether the first operation instruction can be executed is further determined. And the judgment basis is a preset authority operation list.
It should be noted that, after the user accesses the target wireless network, an operation standard is set for any current operation of the mobile terminal, and in the case of the standard, the operation instruction is executed; otherwise, execution is not performed. The preset authority operation list in the embodiment of the invention is the operation standard.
Therefore, under the condition that the first operation instruction is judged to belong to the preset authority operation list, the mobile terminal responds to the first operation instruction and allows the user to obtain a corresponding execution result, otherwise, a warning or prompting interface is sent to the user to remind the user that the current operation cannot be executed and is not in the preset authority operation list range.
Illustratively, the user performs the screen capturing operation of the currently displayed content, and the operation is not in the range of the preset authority operation list, so the mobile terminal sends a display interface to prompt the user that the current screen capturing operation is illegal and is not allowed to be performed.
Optionally, the processor 110 is configured to determine a program based on a user right of the WIFI connection, so as to implement the following steps:
judging whether the current wireless network connection is in a closed state;
and if so, opening the connection mode of the wireless network.
Optionally, the processor 110 is configured to determine a program based on a user right of the WIFI connection, so as to implement the following steps:
receiving an operation instruction of the user for the wireless network, and judging whether the operation instruction for the wireless network is an operation instruction for closing WIFI connection;
and if so, refusing to execute the operation instruction for the wireless network. .
Optionally, the processor 110 is configured to determine a program based on a user right of the WIFI connection, so as to implement the following steps:
when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, receiving a second operation instruction of the user;
determining whether the user has the authority to execute the second operation instruction or not according to the preset authority operation list;
or the like, or, alternatively,
and locking a first operating system when the current WiFi connection of the mobile terminal is disconnected with the target wireless network.
Optionally, the processor 110 is configured to determine a program based on a user right of the WIFI connection, so as to implement the following steps:
and fingerprint information of the user is collected and sent to an attendance system.
Optionally, the processor 110 is configured to determine a program based on a user right of the WIFI connection, so as to implement the following steps:
the preset authority operation list at least does not comprise: the method comprises the following steps of using an external memory, using a SIM (subscriber identity module), intercepting current screen information of the mobile terminal and changing an operating system of the mobile terminal.
Optionally, the processor 110 is configured to determine a program based on a user right of the WIFI connection, so as to implement the following steps:
and receiving a first operation instruction sent by a user aiming at the first operation system of the mobile terminal.
Optionally, the processor 110 is configured to determine a program based on a user right of the WIFI connection, so as to implement the following steps:
and determining whether the user has the authority for executing the second operation instruction in a second operation system according to the preset authority operation list.
Compared with the prior art, the mobile terminal provided by the embodiment of the invention judges whether the connectable wireless network currently detected by the mobile terminal comprises the target wireless network; under the condition that the wireless network which can be connected with the mobile terminal comprises a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network; and then when a first operation instruction sent by a user for the mobile terminal is received and the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction. Therefore, the problem that in the prior art, office tools carried by workers are lack of unified management, and loss possibly caused to companies is solved. Therefore, the embodiment provided by the invention can forcibly and automatically connect to the target wireless network when the mobile terminal detects the target wireless network, and allows the user to execute the operation within the range of the fixed preset authority operation list, thereby achieving the aim of separating the mobile terminal.
Further, the present invention also provides a storage medium storing one or more programs executable by one or more processors to implement the steps of:
judging whether a connectable wireless network currently detected by the mobile terminal comprises a target wireless network;
under the condition that the wireless networks which can be connected by the mobile terminal comprise a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network;
receiving a first operation instruction sent by a user aiming at the mobile terminal;
and when the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction.
Optionally, the one or more programs are further executable by the one or more processors to implement the steps of:
judging whether the current wireless network connection is in a closed state;
and if so, opening the connection mode of the wireless network.
Optionally, the one or more programs are further executable by the one or more processors to implement the steps of:
receiving an operation instruction of the user for the wireless network, and judging whether the operation instruction for the wireless network is an operation instruction for closing WIFI connection;
and if so, refusing to execute the operation instruction for the wireless network.
Optionally, the one or more programs are further executable by the one or more processors to implement the steps of:
when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, receiving a second operation instruction of the user;
determining whether the user has the authority to execute the second operation instruction or not according to the preset authority operation list;
or the like, or, alternatively,
and locking a first operating system when the current WiFi connection of the mobile terminal is disconnected with the target wireless network.
Optionally, the one or more programs are further executable by the one or more processors to implement the steps of:
and fingerprint information of the user is collected and sent to an attendance system.
Optionally, the one or more programs are further executable by the one or more processors to implement the steps of:
the preset authority operation list at least does not comprise: the method comprises the following steps of using an external memory, using a SIM (subscriber identity module), intercepting current screen information of the mobile terminal and changing an operating system of the mobile terminal.
Optionally, the one or more programs are further executable by the one or more processors to implement the steps of:
and receiving a first operation instruction sent by a user aiming at the first operation system of the mobile terminal.
Optionally, the one or more programs are further executable by the one or more processors to implement the steps of:
and determining whether the user has the authority for executing the second operation instruction in a second operation system according to the preset authority operation list.
Compared with the prior art, the storage medium provided by the embodiment of the invention judges whether the connectable wireless network currently detected by the mobile terminal comprises the target wireless network; under the condition that the wireless network which can be connected with the mobile terminal comprises a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network; and then when a first operation instruction sent by a user for the mobile terminal is received and the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction. Therefore, the problem that in the prior art, office tools carried by workers are lack of unified management, and loss possibly caused to companies is solved. Therefore, the embodiment provided by the invention can forcibly and automatically connect to the target wireless network when the mobile terminal detects the target wireless network, and allows the user to execute the operation within the range of the fixed preset authority operation list, thereby achieving the aim of separating the mobile terminal.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a mobile terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device, a robot, etc.) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (7)

1. A user permission determining method based on WIFI connection is applied to a mobile terminal, and is characterized by comprising the following steps:
judging whether a connectable wireless network currently detected by the mobile terminal comprises a target wireless network;
under the condition that the wireless networks which can be connected by the mobile terminal comprise a target wireless network, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network;
receiving an operation instruction of the user for the wireless network, and judging whether the operation instruction for the wireless network is an operation instruction for closing WIFI connection;
if yes, refusing to execute the operation instruction aiming at the wireless network;
receiving a first operation instruction sent by a user aiming at the mobile terminal;
when the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction;
when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, receiving a second operation instruction of the user;
determining whether the user has the authority to execute the second operation instruction in a second operation system according to the preset authority operation list;
or the like, or, alternatively,
when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, locking a first operating system;
the first operating system and the second operating system are two operating systems contained in the mobile terminal, when the mobile terminal is connected to a target wireless network, the first operating system executes an operating command, and when the mobile terminal is not connected to the target wireless network, a user executes the operating command in the second operating system.
2. The method of claim 1, wherein before the step of determining whether the wireless network currently detected by the mobile terminal includes a target wireless network, the method further comprises:
judging whether the current wireless network connection is in a closed state;
and if so, opening the connection mode of the wireless network.
3. The WIFI connection based user permission determination method of claim 1, wherein the method further comprises:
and fingerprint information of the user is collected and sent to an attendance system.
4. The WIFI connection-based user permission determination method according to claim 1, wherein the preset permission operation list at least includes: the method comprises the following steps of using an external memory, using a SIM (subscriber identity module), intercepting current screen information of the mobile terminal and changing an operating system of the mobile terminal.
5. The method for determining the user permission based on the WIFI connection according to claim 3, wherein the receiving a first operation instruction issued by a user for the mobile terminal includes:
and receiving a first operation instruction sent by a user aiming at the first operation system of the mobile terminal.
6. A mobile terminal, characterized in that the mobile terminal comprises a processor, and a memory connected to the processor by a communication bus; wherein the content of the first and second substances,
the memory is used for storing a user authority determining program based on WIFI connection;
the processor is configured to execute the user permission determination program based on the WIFI connection, so as to implement the following steps:
judging whether a wireless network currently detected by the mobile terminal contains a target wireless network;
if so, switching the current wireless connection of the wireless terminal to the communication connection of the target wireless network;
receiving an operation instruction of the user for the wireless network, and judging whether the operation instruction for the wireless network is an operation instruction for closing WIFI connection;
if yes, refusing to execute the operation instruction aiming at the wireless network;
receiving a first operation instruction sent by a user aiming at the mobile terminal;
when the first operation instruction belongs to the range of a preset authority operation list, determining that the user executes the first operation instruction;
when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, receiving a second operation instruction of the user;
determining whether the user has the authority to execute the second operation instruction in a second operation system according to the preset authority operation list;
or the like, or, alternatively,
when the current WiFi connection of the mobile terminal is disconnected with the target wireless network, locking a first operating system;
the first operating system and the second operating system are two operating systems contained in the mobile terminal, when the mobile terminal is connected to a target wireless network, the first operating system executes an operating command, and when the mobile terminal is not connected to the target wireless network, a user executes the operating command in the second operating system.
7. A storage medium storing one or more programs, the one or more programs being executable by one or more processors to cause the one or more processors to perform the WIFI connection based user right determining steps of any of claims 1-5.
CN201711447550.8A 2017-12-27 2017-12-27 WIFI connection-based user permission determination method, mobile terminal and storage medium Active CN108243417B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711447550.8A CN108243417B (en) 2017-12-27 2017-12-27 WIFI connection-based user permission determination method, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711447550.8A CN108243417B (en) 2017-12-27 2017-12-27 WIFI connection-based user permission determination method, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN108243417A CN108243417A (en) 2018-07-03
CN108243417B true CN108243417B (en) 2021-07-20

Family

ID=62700601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711447550.8A Active CN108243417B (en) 2017-12-27 2017-12-27 WIFI connection-based user permission determination method, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN108243417B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329473B (en) * 2020-02-28 2023-02-17 深圳市万普拉斯科技有限公司 Method and device for accessing application program to Internet and user terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239140A (en) * 2014-09-01 2014-12-24 深圳市中兴移动通信有限公司 Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal
CN105227782A (en) * 2015-10-30 2016-01-06 维沃移动通信有限公司 A kind of changing method of mobile terminal operating system and mobile terminal
CN105608349A (en) * 2015-11-25 2016-05-25 东莞酷派软件技术有限公司 Terminal mode switching method and apparatus as well as terminal
CN107465662A (en) * 2017-07-04 2017-12-12 深信服科技股份有限公司 Mobile terminal policy management method, mobile terminal and computer-readable recording medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013179419A (en) * 2012-02-28 2013-09-09 Ricoh Co Ltd Network system, certificate management method, and certificate management program
CN104053154B (en) * 2014-06-16 2018-05-22 福建星网锐捷网络有限公司 A kind of wireless network access controlling method, device and access point apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239140A (en) * 2014-09-01 2014-12-24 深圳市中兴移动通信有限公司 Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal
CN105227782A (en) * 2015-10-30 2016-01-06 维沃移动通信有限公司 A kind of changing method of mobile terminal operating system and mobile terminal
CN105608349A (en) * 2015-11-25 2016-05-25 东莞酷派软件技术有限公司 Terminal mode switching method and apparatus as well as terminal
CN107465662A (en) * 2017-07-04 2017-12-12 深信服科技股份有限公司 Mobile terminal policy management method, mobile terminal and computer-readable recording medium

Also Published As

Publication number Publication date
CN108243417A (en) 2018-07-03

Similar Documents

Publication Publication Date Title
CN109151169B (en) Camera authority management method, mobile terminal and computer readable storage medium
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN107147656B (en) Method and system for establishing remote control and readable storage medium
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN107635234B (en) Wi-Fi control method, mobile terminal and computer-readable storage medium
CN107124718B (en) Data transmission method, mobile terminal and storage medium
CN108601062B (en) WiFi connection sharing method, terminal and computer storage medium
CN108958936B (en) Application program switching method, mobile terminal and computer readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN111427709B (en) Application program splitting control method, device and computer readable storage medium
CN107562343B (en) Interactive regulation and control method, equipment and computer readable storage medium
CN107220554B (en) File forwarding management method, corresponding system and terminal equipment
CN109977040B (en) File read-write permission control method, device, terminal and storage medium
CN110062106B (en) Calling method of application program, mobile terminal and storage medium
CN112770279B (en) Network sharing method, mobile terminal and computer readable storage medium
CN107395363B (en) Fingerprint sharing method and mobile terminal
CN107194217B (en) User data access control method, apparatus and computer-readable storage medium
CN106998553B (en) Equipment identity identification method, computer equipment and storage medium
CN107317804B (en) Private cloud encrypted data access method, terminal and storage medium
CN107340958B (en) Horizontal and vertical screen switching method and mobile terminal
CN107135498B (en) File sharing method and equipment
CN110413330B (en) Face unlocking initialization method, equipment and computer readable storage medium
CN112163194A (en) Authorization method of application permission, mobile terminal and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant