CN111159685A - User account management method and device, intelligent device and storage medium - Google Patents

User account management method and device, intelligent device and storage medium Download PDF

Info

Publication number
CN111159685A
CN111159685A CN201911300892.6A CN201911300892A CN111159685A CN 111159685 A CN111159685 A CN 111159685A CN 201911300892 A CN201911300892 A CN 201911300892A CN 111159685 A CN111159685 A CN 111159685A
Authority
CN
China
Prior art keywords
mode
user
key
hardware
user mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911300892.6A
Other languages
Chinese (zh)
Inventor
符兴富
熊友军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ubtech Robotics Corp
Original Assignee
Ubtech Robotics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ubtech Robotics Corp filed Critical Ubtech Robotics Corp
Priority to CN201911300892.6A priority Critical patent/CN111159685A/en
Publication of CN111159685A publication Critical patent/CN111159685A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application relates to the technical field of intelligent device control, and provides a user account management method and device, an intelligent device and a storage medium. The user account management method comprises the following steps: detecting a hardware device with a key; if the hardware equipment is detected to be connected, reading the secret key; entering a user mode matching the key when the key matches the stored key information; and keeping communication detection on the hardware equipment, and switching from the user mode to the visitor mode if the hardware equipment is detected to be disconnected. By adopting the user account management method, the login can be realized only by connecting the hardware key equipment with the intelligent equipment without complicated software operation. When the user leaves, the hardware key equipment is only needed to be taken away, the system can automatically switch the current system mode to the visitor mode, user information of the intelligent equipment can be effectively prevented from being leaked, and information safety is improved.

Description

User account management method and device, intelligent device and storage medium
Technical Field
The present application relates to the field of intelligent device control technologies, and in particular, to a method and an apparatus for managing a user account, an intelligent device, and a storage medium.
Background
Smart devices are products of technologies that combine computer, data processing, control theory, sensors, network communications, power electronics, and the like. With the continuous development of intelligent equipment products, many intelligent equipment can establish different accounts for users, different index conditions are established through the use habits of the users, private information such as browsing history traces, the use habits, playlists, memorandums, alarm clocks and the like of the users is stored on equipment terminals, and the users can conveniently acquire the information only by logging in the user accounts of the users. However, the smart device lacks an effective dynamic detection mechanism in the authentication of the user account, and can be permanently used only by completing one account login, which brings great hidden danger to the information security of the user.
Disclosure of Invention
In view of this, embodiments of the present application provide a method and an apparatus for managing a user account, an intelligent device, and a storage medium, which can effectively prevent user information of the intelligent device from being leaked, and improve information security.
A first aspect of an embodiment of the present application provides a method for managing a user account, including:
detecting a hardware device with a key;
detecting that the hardware equipment is connected, and reading the key;
entering a user mode matched with the secret key when the secret key is matched with the stored secret key information;
keeping the communication detection of the hardware device, detecting that the hardware device is disconnected, and switching from the user mode to the guest mode.
According to the embodiment of the application, the hardware key equipment is used as the basis of identity authentication, the authentication mechanism is changed from software login to hardware login, the method is more visual and convenient, complex software operation is not needed, and login can be realized only by connecting the hardware key equipment with the intelligent equipment. When the user leaves, the hardware key equipment is only needed to be taken away, the system can automatically switch the current system mode to the visitor mode, user information of the intelligent equipment can be effectively prevented from being leaked, and information safety is improved.
Further, the switching from the user mode to the guest mode may include:
determining a duration of the user mode hold;
and setting and starting a timer, and switching to a visitor mode from the user mode after the timing time of the timer reaches the time length.
In order to improve the flexibility of system mode switching, when the intelligent device switches the user mode to the visitor mode, the intelligent device may further set a user mode holding time length, and when the time length is reached, the system mode switching operation is executed.
Further, the determining the duration of the user mode hold may include:
acquiring attribute information of the user mode;
determining the time length of the user mode according to the attribute information;
or
Acquiring a first permission level of the user mode and a second permission level of the visitor mode;
calculating a level difference between the first permission level and the second permission level
And determining the time length of the user mode keeping according to the grade difference.
Further, after setting and starting the timer, before the timing time of the timer reaches the duration, the method may further include:
receiving an input software password instruction, and comparing the software password instruction with a preset password instruction of the user mode;
and resetting the timing time of the timer after the comparison is passed.
The user may also manually enter a software password command, such as a user account password, before the timed time is reached in order to extend the user mode usage time. When the password comparison is passed, the timing time of the timer can be reset and re-timed, so as to further improve the flexibility and the practicability of the operation.
Further, the switching from the user mode to the guest mode may include:
shooting an image in a designated area;
detecting a face image in the image;
and detecting no face image from the image, and switching from the user mode to the visitor mode.
When the system mode is switched from the user mode to the visitor mode, images in a designated area can be shot, whether the current user leaves or not can be further determined by detecting the face images, and therefore flexibility and accuracy of account switching operation are improved.
Further, after detecting the face image in the image, the method may further include:
detecting a face image from the image, and matching the detected face image with a pre-stored face image bound with the user mode;
and if the matching of the face image fails, switching the user mode to the visitor mode.
In order to further improve the security, the detected face image may be matched with a pre-stored face image bound to the user mode, so as to determine whether the user currently operating the intelligent device is a valid user of the user mode. If the face matching is successful, the current user is a legal user of the user mode, and the system mode is not switched temporarily. If the matching fails, the current user is possibly an illegal user, and the current system mode is immediately switched to the visitor mode at the moment so as to protect the information security of the legal user.
Further, after reading the key, the method may further include:
the key is not matched with all the created user accounts and is kept in a guest mode.
After reading the key, the smart device matches the key with each created user account, and if the key is not matched with all user accounts, the current system mode is maintained as the guest mode.
A second aspect of an embodiment of the present application provides a device for managing a user account, including:
the hardware equipment detection module is used for detecting hardware equipment with a secret key;
the key reading module is used for detecting that the hardware equipment is connected and reading the key;
the first mode switching module is used for entering a user mode matched with the secret key when the secret key is matched with the stored secret key information;
and the second mode switching module is used for keeping the communication detection of the hardware equipment, detecting that the hardware equipment is disconnected and switching the user mode to the visitor mode.
A third aspect of an embodiment of the present application provides an intelligent device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor, when executing the computer program, implements the steps of the method for managing a user account provided in the first aspect of an embodiment of the present application.
A fourth aspect of embodiments of the present application provides a computer-readable storage medium, which stores a computer program, and the computer program, when executed by a processor, implements the steps of the method for managing user accounts provided in the first aspect of embodiments of the present application.
A fifth aspect of the embodiments of the present application provides a computer program product, which, when running on an intelligent device, causes the intelligent device to execute the steps of the method for managing a user account according to the first aspect of the embodiments of the present application.
It is understood that the beneficial effects of the second aspect to the fifth aspect can be referred to the related description of the first aspect, and are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of a first embodiment of a method for managing a user account according to an embodiment of the present application;
fig. 2 is a flowchart of a second embodiment of a method for managing a user account according to an embodiment of the present application;
fig. 3 is a flowchart of a third embodiment of a method for managing a user account according to an embodiment of the present application;
fig. 4 is a block diagram of an embodiment of a user account management apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic diagram of an intelligent device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail. Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
The embodiment of the application provides a user account management method and device, intelligent equipment and a storage medium, which can effectively prevent user information of the intelligent equipment from being leaked and improve information security. It should be understood that the main subjects of the embodiments of the method of the present application are various types of intelligent devices, such as intelligent speakers, intelligent refrigerators, and intelligent televisions.
Referring to fig. 1, a method for managing a user account in an embodiment of the present application is shown, including:
101. detecting a hardware device with a key;
the execution subject of the embodiment of the application is various types of intelligent devices, for example, an intelligent sound box. After the intelligent device is started, a user account which is logged in by default is a visitor account, and at the moment, the system mode of the intelligent device is in the visitor mode, so that the intelligent device has the restrictive operation permission of a visitor user and cannot acquire the related private information of a normal user account. When the intelligent device is in a visitor working mode or in a user mode of a registered user, the hardware device with the key is detected. The hardware device can be various entity devices with keys corresponding to user accounts, such as an identification card, a mobile phone which has issued the keys, a USB-key, an intelligent identification decoration such as a key ring and the like. In addition, these hardware devices also have the capability of performing communication connection with the smart device, for example, the hardware devices can be connected with the smart device through a wired manner or a short-range wireless communication manner (bluetooth, NFC, etc.). Preferably, the smart device has a function module for wireless communication, such as an NFC reading device, and can be connected to the hardware device by NFC communication to read the key.
Taking the NFC communication mode as an example, according to different usage scenarios, the following different key issuing modes may be set:
(1) and issuing the secret key on the mobile phone with the NFC function in a mode of issuing a virtual NFC electronic card.
(2) The intelligent decoration piece with the NFC function is convenient for a user to carry, for example, a secret key is issued to an intelligent key ring.
(3) And issuing the secret key by issuing a virtual NFC electronic card on the intelligent bracelet with the NFC function.
102. Judging whether the hardware equipment is connected or not;
the intelligent device continuously detects whether the hardware device with the key is connected, if the hardware device is connected, step 103 is executed, otherwise, step 101 is executed.
103. Reading the key;
the smart device and the hardware device are connected, and the smart device reads the key carried by the hardware device.
104. Entering a user mode matching the key when the key matches the stored key information;
after reading the key, the intelligent device matches the key with the key information of each created user account, and finds out one user account successfully matched for logging in. At this time, the system mode of the device enters the user mode successfully matched with the key, that is, logs in to the user account successfully matched with the key. The system is in a user mode, has the operation authority of a normal user, and can acquire the private information of the user account, but cannot acquire the private information of other user accounts (namely other registered accounts which are not matched with the key).
Further, after reading the key, the method may further include:
if the key does not match all the created user accounts, the mode is kept as the visitor mode.
After reading the key, the smart device matches the key with each created user account, and if the key does not match with all user accounts, the current system mode is maintained as a guest mode (when the user account currently logged in is a guest account), or the current system mode is maintained as a certain user mode currently logged in (when the user account currently logged in is a certain registered user account). In addition, if another hardware device with a key is connected to the smart device at this time, the smart device may read the key of the newly accessed hardware device and switch the current system mode to the user mode matched with the key of the newly accessed hardware device.
105. Maintaining communication detection to the hardware device;
when the current system mode is in the user mode matched with the secret key, the intelligent device keeps the communication detection of the hardware device and continuously monitors the connection state of the hardware device.
106. Judging whether the hardware equipment is disconnected or not;
specifically, the smart device may continuously detect whether the hardware device is disconnected, and if it is detected that the hardware device is disconnected, execute step 107; if it is detected that the hardware device remains connected, the process returns to step 105, i.e. the user mode matching the key is maintained, and meanwhile, the connection state of the hardware device is continuously monitored.
107. Switching from the user mode to a guest mode.
And detecting that the hardware device is disconnected, and switching the current system mode from the user mode to the visitor mode by the intelligent device at the moment. The hardware device is disconnected, which indicates that the user holding the hardware device leaves, and at this time, in order to protect the information security of the user, the intelligent device automatically completes the switching of the system mode and returns to the visitor mode.
To facilitate understanding, an example of a practical application scenario is: the intelligent sound box is in a visitor working mode after being started, and at the moment, the system continuously monitors hardware secret key equipment; the user A carries a mobile phone which has an NFC function and has issued the virtual electronic card key to the front of the intelligent sound box, the intelligent sound box is connected with the mobile phone in an NFC mode, the key is read, then the current user account is switched to the user A matched with the key, and the mobile phone is in a user working mode. And then, if the user A leaves and takes away the mobile phone, the connection between the intelligent sound box and the mobile phone is disconnected, and at the moment, the intelligent sound box can automatically switch the user account to be the visitor account and return to the visitor working mode, so that the information security of the user A is protected.
According to the embodiment of the application, the hardware key equipment is used as the basis of identity authentication, the authentication mechanism is changed from software login to hardware login, the method is more visual and convenient, complex software operation is not needed, and login can be realized only by connecting the hardware key equipment with the intelligent equipment. When the user leaves, the hardware key equipment is only needed to be taken away, the system can automatically switch the current system mode to the visitor mode, user information of the intelligent equipment can be effectively prevented from being leaked, and information safety is improved.
Referring to fig. 2, another method for managing a user account in the embodiment of the present application is shown, including:
201. detecting a hardware device with a key;
202. judging whether the hardware equipment is connected or not;
the intelligent device continuously detects whether the hardware device with the key is connected, if the hardware device is connected, step 203 is executed, otherwise, step 201 is executed.
203. Reading the key;
204. entering a user mode matching the key when the key matches the stored key information;
205. maintaining communication detection to the hardware device;
206. judging whether the hardware equipment is disconnected or not;
the intelligent device will continuously detect whether the hardware device is disconnected, if so, execute step 207; if it is detected that the hardware device remains connected, the process returns to step 204, i.e. the user mode matching the key is maintained, and meanwhile, the connection state of the hardware device is continuously monitored. The detailed description of step 201-206 can refer to step 101-106.
207. Determining a duration of the user mode hold;
in order to improve the flexibility of system mode switching, when the intelligent device switches the user mode to the visitor mode, the intelligent device may further set a user mode holding time length, and when the time length is reached, the system mode switching operation is executed. Within this duration, the user may still operate the smart device in this user mode. Specifically, the time duration may be a preset customizable time, or may be determined in the following one or two ways.
The first method is as follows:
(1) acquiring attribute information of the user mode;
(2) and determining the time length of the user mode according to the attribute information.
Different holding time lengths may be determined for the attribute information of the user mode, respectively. For example, for a main user who frequently logs in, the importance of information security is higher, and a shorter holding time can be set. For the secondary users with less login, the information security requirement is not high, and a longer holding time can be set.
The second method comprises the following steps:
(1) acquiring a first permission level of the user mode and a second permission level of the visitor mode;
(2) calculating a level difference between the first permission level and the second permission level;
(3) and determining the time length of the user mode keeping according to the grade difference.
Different user mode holding durations may also be determined for the permission levels of the user modes, respectively. For example, for users with higher authority level, the level difference between the authority level of the user and the authority level of the guest account is larger, which indicates that the information confidentiality requirements of the users are higher, so that a shorter holding time can be set. For users with lower authority level, the level difference between the authority level of the users and the authority level of the guest account is smaller, which indicates that the information confidentiality requirements of the users are lower, so that a longer holding time can be set.
208. And setting and starting a timer, and switching from the user mode to the visitor mode after the timing time of the timer reaches the time length.
After the duration of the user mode holding is determined, a timer is set and started, and the user mode is switched to the visitor mode after the timing time of the timer reaches the duration.
Further, after setting and starting the timer, before the timing time of the timer reaches the duration, the method may further include:
(1) if an input software password instruction is received, comparing the software password instruction with a preset password instruction of the user mode;
(2) and if the comparison is passed, resetting the timing time of the timer.
Before the timing time is reached, the user may also manually input a software password command, such as a password for the corresponding user account, in order to extend the usage time of the current user mode. When the password comparison is passed, the timing time of the timer can be reset and re-timed, so as to further improve the flexibility and the practicability of the operation.
According to the embodiment of the application, the hardware key equipment is used as the basis of identity authentication, the authentication mechanism is changed from software login to hardware login, the method is more visual and convenient, complex software operation is not needed, and login can be realized only by connecting the hardware key equipment with the intelligent equipment. When the user leaves, the hardware key equipment is only needed to be taken away, the system can automatically switch the current system mode to the visitor mode, user information of the intelligent equipment can be effectively prevented from being leaked, and information safety is improved. In addition, when the user mode is switched to the visitor mode, the holding time of the user mode can be set, so that the flexibility and the practicability of the system mode switching operation are further improved.
Referring to fig. 3, another method for managing a user account in the embodiment of the present application is shown, including:
301. detecting a hardware device with a key;
302. judging whether the hardware equipment is connected or not;
the intelligent device continuously detects whether the hardware device with the key is connected, if the hardware device is connected, step 303 is executed, otherwise, step 301 is executed.
303. Reading the key;
304. entering a user mode matching the key when the key matches the stored key information;
305. maintaining communication detection to the hardware device;
306. judging whether the hardware equipment is disconnected or not;
the intelligent device will continuously determine whether the hardware device is disconnected, and if it is detected that the hardware device is disconnected, step 307 is executed; if it is detected that the hardware device remains connected, the process returns to step 305, i.e. the user mode matching the key is maintained, and meanwhile, the connection state of the hardware device is continuously monitored. The detailed description of step 301-.
307. Shooting an image in a designated area;
before the intelligent device is switched from the user mode to the visitor mode, the intelligent device can shoot images in a designated area through a camera of the intelligent device, the designated area can be a user operation area in front of the intelligent device, and when the user operates the intelligent device, the user face images can be shot.
308. Detecting a face image in the image;
then, face detection is carried out on the shot images, and face images in the shot images are extracted.
309. Judging whether a face image is detected from the image;
it is determined whether a face image can be detected from the image, and if no face image can be detected, step 310 is executed, and if a face image is detected, step 307 is returned to. The human face image can not be detected, which indicates that the current user really leaves with the hardware key device, so the operation of switching the system mode can be executed. If the face image is detected, it indicates that the current user has not left, at this time, the reason that the hardware device is disconnected may be a device failure or a communication failure, and in order to ensure that the user operates the intelligent device normally, the system mode is not switched temporarily, so that the method returns to step 307, and continuously monitors whether the user leaves.
Further, after detecting the face image in the image, the method may further include:
(1) if a face image is detected from the image, matching the detected face image with a pre-stored face image bound with the user mode;
(2) and if the matching of the face image fails, switching the user mode to the visitor mode.
In order to further improve the security, the detected face image may be matched with a pre-stored face image bound to the user mode, so as to determine whether the user currently operating the intelligent device is a valid user of the user mode. If the matching of the face images fails, the current user is possibly an illegal user, and the current system mode is immediately switched to the visitor mode at the moment so as to protect the information security of the legal user.
310. Switching from the user mode to a guest mode.
The human face image can not be detected from the image, which indicates that the current user really leaves with the hardware key device, so that the current system mode can be switched from the user mode to the visitor mode to protect the information security of the user.
According to the embodiment of the application, the hardware key equipment is used as the basis of identity authentication, the authentication mechanism is changed from software login to hardware login, the method is more visual and convenient, complex software operation is not needed, and login can be realized only by connecting the hardware key equipment with the intelligent equipment. When the user leaves, the hardware key equipment is only needed to be taken away, the system can automatically switch the current system mode to the visitor mode, user information of the intelligent equipment can be effectively prevented from being leaked, and information safety is improved. In addition, when the current system mode is switched to the visitor mode, images in a designated area can be shot, whether the current user leaves or not can be further determined by detecting the face images, and the flexibility and the accuracy of the system mode switching operation can be improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
The above mainly describes a method for managing a user account, and a device for managing a user account will be described below.
Referring to fig. 4, an embodiment of a device for managing a user account in an embodiment of the present application includes:
a hardware device detection module 401, configured to detect a hardware device with a key;
a key reading module 402, configured to read the key if it is detected that the hardware device is connected;
a first mode switching module 403, configured to enter a user mode matching the key when the key matches the stored key information;
a second mode switching module 404, configured to keep detecting communication of the hardware device, and switch from the user mode to the guest mode if detecting that the hardware device is disconnected.
Further, the second mode switching module may include:
a holding duration determining unit, configured to determine a duration of the user mode holding;
and the first mode switching unit is used for setting and starting a timer, and when the timing time of the timer reaches the duration, the user mode is switched to the visitor mode.
Still further, the holding time period determination unit may include:
a user attribute obtaining subunit, configured to obtain attribute information of the user mode;
a first holding duration determining subunit, configured to determine, according to the attribute information, a duration for holding the user mode;
a user permission obtaining subunit, configured to obtain a first permission level of the user mode and a second permission level of the guest mode;
a permission difference calculation subunit, configured to calculate a level difference between the first permission level and the second permission level;
and the second keeping time length determining subunit is used for determining the time length of the user mode keeping according to the grade difference.
Further, the second mode switching module may further include:
the password instruction comparison unit is used for comparing the software password instruction with a preset password instruction of the user mode if the input software password instruction is received;
and the timing time resetting unit is used for resetting the timing time of the timer if the comparison is passed.
Further, the second mode switching module may include:
an image capturing unit configured to capture an image within a specified area;
the face image detection unit is used for detecting a face image in the image;
and the second mode switching unit is used for switching the user mode to the visitor mode if the face image cannot be detected from the image.
Further, the second mode switching module may further include:
the face image matching unit is used for matching the detected face image with a pre-stored face image bound with the user mode if the face image is detected from the image;
and the third mode switching unit is used for switching the user mode to the visitor mode if the matching of the face images fails.
Further, the device for managing the user account may further include:
and the system mode maintaining module is used for maintaining the system mode as a visitor mode if the secret key is not matched with all the established user accounts.
An embodiment of the present application further provides an intelligent device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of any one of the user account management methods shown in fig. 1 to 3 when executing the computer program.
An embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of any one of the methods for managing a user account shown in fig. 1 to 3.
The embodiment of the present application further provides a computer program product, which, when running on an intelligent device, causes the intelligent device to execute the steps of implementing any one of the user account management methods shown in fig. 1 to 3.
Fig. 5 is a schematic diagram of an intelligent device provided in an embodiment of the present application. As shown in fig. 5, the smart device 5 of this embodiment includes: a processor 50, a memory 51 and a computer program 52 stored in said memory 51 and executable on said processor 50. The processor 50, when executing the computer program 52, implements the steps of the above-described embodiments of the method for managing user accounts, such as the steps 101 to 107 shown in fig. 1. Alternatively, the processor 50, when executing the computer program 52, implements the functions of each module/unit in the above-mentioned device embodiments, for example, the functions of the modules 401 to 404 shown in fig. 4.
The computer program 52 may be divided into one or more modules/units, which are stored in the memory 51 and executed by the processor 50 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 52 in the smart device 5.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may be an internal storage unit of the intelligent device 5, such as a hard disk or a memory of the intelligent device 5. The memory 51 may also be an external storage device of the Smart device 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the Smart device 5. Further, the memory 51 may also include both an internal storage unit and an external storage device of the smart device 5. The memory 51 is used for storing the computer program and other programs and data required by the smart device. The memory 51 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. . Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A method for managing user accounts, comprising:
detecting a hardware device with a key;
if the hardware equipment is detected to be connected, reading the secret key;
entering a user mode matched with the secret key when the secret key is matched with the stored secret key information;
keeping the communication detection of the hardware device, detecting that the hardware device is disconnected, and switching from the user mode to the guest mode.
2. The method for managing a user account according to claim 1, wherein the switching from the user mode to the guest mode comprises:
determining a duration of the user mode hold;
and setting and starting a timer, and switching from the user mode to the visitor mode after the timing time of the timer reaches the time length.
3. The method of managing user accounts of claim 2, wherein the determining the length of time the user mode remains comprises:
acquiring attribute information of the user mode;
determining the time length of the user mode according to the attribute information;
or
Acquiring a first permission level of the user mode and a second permission level of the visitor mode;
calculating a level difference between the first permission level and the second permission level;
and determining the time length of the user mode keeping according to the grade difference.
4. The method for managing user accounts according to claim 2, wherein after setting and starting the timer, the timer reaches the time length before the timer, further comprising:
receiving an input software password instruction, and comparing the software password instruction with a preset password instruction of the user mode;
and resetting the timing time of the timer after the comparison is passed.
5. The method for managing a user account according to claim 1, wherein the switching from the user mode to the guest mode comprises:
shooting an image in a designated area;
detecting a face image in the image;
and if the face image cannot be detected from the image, switching from the user mode to the visitor mode.
6. The method for managing a user account according to claim 5, further comprising, after detecting the face image in the image:
detecting a face image from the image, and matching the detected face image with a pre-stored face image bound with the user mode;
and if the matching of the face image fails, switching the user mode to the visitor mode.
7. The method for managing a user account according to any one of claims 1 to 6, further comprising, after reading the key:
the key is not matched with all the created user accounts and is kept in a guest mode.
8. An apparatus for managing a user account, comprising:
the hardware equipment detection module is used for detecting hardware equipment with a secret key;
the key reading module is used for detecting that the hardware equipment is connected and reading the key;
the first mode switching module is used for matching the key with the stored key information and entering a user mode matched with the key;
and the second mode switching module is used for keeping the communication detection of the hardware equipment, detecting that the hardware equipment is disconnected and switching the user mode to the visitor mode.
9. Smart device comprising a memory, a processor and a computer program stored in said memory and executable on said processor, characterized in that said processor, when executing said computer program, carries out the steps of the method for managing user accounts according to any one of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method for managing user accounts according to any one of claims 1 to 7.
CN201911300892.6A 2019-12-17 2019-12-17 User account management method and device, intelligent device and storage medium Pending CN111159685A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911300892.6A CN111159685A (en) 2019-12-17 2019-12-17 User account management method and device, intelligent device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911300892.6A CN111159685A (en) 2019-12-17 2019-12-17 User account management method and device, intelligent device and storage medium

Publications (1)

Publication Number Publication Date
CN111159685A true CN111159685A (en) 2020-05-15

Family

ID=70557589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911300892.6A Pending CN111159685A (en) 2019-12-17 2019-12-17 User account management method and device, intelligent device and storage medium

Country Status (1)

Country Link
CN (1) CN111159685A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651005A (en) * 2020-12-03 2021-04-13 一汽奔腾轿车有限公司 Vehicle-mounted self-adaptive multi-account system and use method thereof
CN116244757A (en) * 2023-03-15 2023-06-09 武汉天楚云计算有限公司 Computer equipment monitoring alarm method
CN116868740A (en) * 2023-06-30 2023-10-13 广东环境保护工程职业学院 Plant maintenance method, device, system and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932518A (en) * 2012-10-30 2013-02-13 广东欧珀移动通信有限公司 User login/switching method and system, and mobile terminal
CN104036195A (en) * 2013-03-07 2014-09-10 联想(北京)有限公司 Information processing method and device
CN104951709A (en) * 2015-06-19 2015-09-30 深圳天珑无线科技有限公司 Switching method and system for access mode and intelligent ring and intelligent terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932518A (en) * 2012-10-30 2013-02-13 广东欧珀移动通信有限公司 User login/switching method and system, and mobile terminal
CN104036195A (en) * 2013-03-07 2014-09-10 联想(北京)有限公司 Information processing method and device
CN104951709A (en) * 2015-06-19 2015-09-30 深圳天珑无线科技有限公司 Switching method and system for access mode and intelligent ring and intelligent terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651005A (en) * 2020-12-03 2021-04-13 一汽奔腾轿车有限公司 Vehicle-mounted self-adaptive multi-account system and use method thereof
CN116244757A (en) * 2023-03-15 2023-06-09 武汉天楚云计算有限公司 Computer equipment monitoring alarm method
CN116868740A (en) * 2023-06-30 2023-10-13 广东环境保护工程职业学院 Plant maintenance method, device, system and medium

Similar Documents

Publication Publication Date Title
US11914693B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
CN111159685A (en) User account management method and device, intelligent device and storage medium
US8121359B2 (en) Fingerprint identification system and method of an electronic device
CN103907328A (en) Mobile device-based authentication
CN108076426A (en) Terminal tracing method, apparatus, storage medium and terminal device
CN107832595B (en) Locking method and related equipment
CN104933351A (en) Information security processing method and information security processing device
EP3403211B1 (en) User interface for a mobile device
CN106797561A (en) A kind of identity identifying method and wearable device
EP3403210B1 (en) User interface for a mobile device
CN105554908A (en) Method, master device, slave device and system for achieving code scanning automatic bluetooth connection
CN104021358A (en) Anti-theft control method and device for mobile terminal
CN205788363U (en) A kind of multiple authentication Gate-ban Monitoring System of Home House
US20200012774A1 (en) Enabling access to data
CN104937602B (en) Privacy protection method and electronic equipment
CN106934264A (en) A kind of intelligent unlocking method, device and lock device
CN112699354A (en) User authority management method and terminal equipment
CN105721506B (en) Method, device and system for account number theft prevention
WO2018165341A1 (en) Contact information display method and device, and information display method and device
CA2994476A1 (en) Systems and methods for secure authentication for access control, home control, and alarm systems
CN108024018B (en) Anti-theft and anti-loss mobile phone system, identity recognition firmware and application thereof
CN105786418B (en) Information processing method and electronic equipment
CN112364673A (en) Information verification method, terminal equipment, NFC verification device and system
CN111985305A (en) Screen peeping prevention method and device and terminal equipment
JP6772870B2 (en) Fraud detection program, fraud detection method and fraud detection device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200515

RJ01 Rejection of invention patent application after publication