CN102075627A - Information prompting method and mobile terminal - Google Patents

Information prompting method and mobile terminal Download PDF

Info

Publication number
CN102075627A
CN102075627A CN2011100059016A CN201110005901A CN102075627A CN 102075627 A CN102075627 A CN 102075627A CN 2011100059016 A CN2011100059016 A CN 2011100059016A CN 201110005901 A CN201110005901 A CN 201110005901A CN 102075627 A CN102075627 A CN 102075627A
Authority
CN
China
Prior art keywords
user
portable terminal
current operation
information
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100059016A
Other languages
Chinese (zh)
Inventor
王冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN2011100059016A priority Critical patent/CN102075627A/en
Publication of CN102075627A publication Critical patent/CN102075627A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses an information prompting method and a mobile terminal, which relate to the technical field of communication and are invented for improving the user experience when users use the mobile terminal. The method comprises the following steps of: obtaining identity information of a current operation user of the mobile terminal; determining the validity of the identity of the current operation user according to the identity information; and storing the operation of the user on the mobile terminal when the illegal identity of the current operation user is determined, and prompting the operation to the legal users of the mobile terminal. The embodiment of the invention is mainly used in the mobile terminal.

Description

A kind of information cuing method and portable terminal
Technical field
The present invention relates to communication technical field, relate in particular to a kind of information cuing method and portable terminal.
Background technology
Along with the rise of intelligent mobile terminal, make that the privacy content in the portable terminal is more and more.For this reason, the user adopts cipher modes such as password usually, and these privacy contents are protected.
The privacy content that does not perhaps also have enough time in some unencrypted privacies to encrypt is easy to be got access to by the disabled user, though and the user can be beneficial to and can password be encrypted by some privacy content, in a single day but password is cracked by the disabled user, these privacy contents still can be got access to by the disabled user.But according to existing technical scheme, the user can't know that but the disabled user has got access to these this facts of privacy content.
Summary of the invention
The embodiment of the invention provides a kind of information cuing method and portable terminal, the user experience when using portable terminal with the raising user.
The embodiment of the invention adopts following technical scheme:
A kind of information cuing method comprises:
Obtain current operation user's identity information;
Determine the legitimacy of described current operation user identity according to described identity information;
When the identity of determining described current operation user is illegal, stores the operation of described user, and described operation indicating is given the validated user of described portable terminal portable terminal.
A kind of portable terminal comprises:
The identity information acquiring unit is used to obtain the current operation user's of portable terminal identity information;
Identity authenticating unit is used for determining according to the identity information that described identity information acquiring unit obtains the legitimacy of described current operation user identity;
Information process unit is used for storing the operation of described user to portable terminal, and described operation indicating being given the validated user of described portable terminal when described identity authenticating unit determines that described current operation user's identity is illegal.
The information cuing method of the embodiment of the invention and portable terminal, at first judge by the current operation user's that obtains identity information whether current operation user is validated user, then when the identity of determining described current operation user is illegal, store the operation of this current operation user, be prompted to the validated user of described portable terminal simultaneously portable terminal.By above technical scheme; the validated user of portable terminal can know accurately which information in the portable terminal illegally obtained by whom; thereby make this validated user can take corresponding protection or remedial measure, thereby improved the user experience the when user uses portable terminal.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention, the accompanying drawing of required use is done an introduction simply in will describing embodiment below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the embodiment of the invention one information cuing method;
Fig. 2 is the schematic diagram of the embodiment of the invention two portable terminals;
Fig. 3 is the schematic diagram of identity authenticating unit in the embodiment of the invention portable terminal;
Fig. 4 is the another schematic diagram of identity authenticating unit in the embodiment of the invention portable terminal;
Fig. 5 is the schematic diagram of information process unit in the embodiment of the invention portable terminal.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
As shown in Figure 1, the information cuing method of the embodiment of the invention one comprises:
Step 11, obtain current operation user's identity information.
In embodiments of the present invention, can trigger the current operation user's who obtains portable terminal identity information in the following way, as activating the pre-conditioned triggering of validated user of triggering, portable terminal, modes such as the validated user Remote triggering of portable terminal.
For example, after portable terminal is activated, get final product the identity information that triggering mobile terminals is obtained current operation user.
Again for example, the validated user of described portable terminal can be preset the condition that portable terminal obtains current operation user's identity information.As, in activating the process of portable terminal, require current operation user to import the activation unlocking pin, if the unlocking pin mistake of input, but then triggering mobile terminals is obtained the current user's of operation identity information.And for example, the validated user of described portable terminal can be arranged on mobile terminal standby after 15 minutes, and triggering mobile terminals is obtained current operation user's identity information.
Again for example, the validated user of described portable terminal can also obtain current operation user's identity information by the mode triggering mobile terminals of Remote triggering.For convenience of description, in this example, this portable terminal is called controlled terminal.As, the validated user of portable terminal can be by his an other portable terminal or other other users' portable terminal, send a short message to this controlled terminal, carry specific sign in this short message and be used to trigger the identity information that controlled terminal obtains current operation user to represent this short message.
Below just enumerate several triggerings and obtained the current operation user's of portable terminal the mode of identity information, in concrete the application, can be not limited to this.
Wherein said identity information can be face's information of described current operation user, finger print information, and perhaps other can identify other information of this current operation user's identity.
With described identity information is that face's information of described current operation user is example, can obtain face's information of described current operation user by the preposition camera of portable terminal.After portable terminal was activated, its preposition camera started automatically, obtained face's information of current operation user.The identity information that utilizes this mode to obtain can be stored as the form of photo or short-movie.
With described identity information is that described current operation user's finger print information is an example, can be at the casing of this portable terminal, and perhaps keyboard or touch-screen are provided with the fingerprint collecting unit.When current operation user operates this portable terminal, can utilize the fingerprint collecting unit of setting to gather described current operation user's finger print information.
Certainly, also can there be other mode to obtain described current operation user's identity information, just for example at this.
Step 12, determine the legitimacy of described current operation user identity according to described identity information.
When described identity information is described current operation user's face information, can with in described current operation user's face's information and the described portable terminal in advance face's information of the validated user of the described portable terminal of storage compare, if face's information of described current operation user and face's information inconsistency of described validated user, the identity of then determining described current operation user is illegal, otherwise determines that described current operation user's identity is legal.
If the validated user of described portable terminal is changed its face's information, need to change the face's information after this validated user of storing upgrades in portable terminal.During face information after this upgrades in storage, whether the user who needs to determine to carry out this operation be the validated user of this portable terminal.For example, when needs upgrade face's information, can point out the user who carries out this operation to input password, perhaps put question to, import answer by this user to this user.When the password of user input or answer are correct, allow this user to specify the operation of upgrading face's information, otherwise do not allow the user to carry out this operation, thereby further guarantee the fail safe of the content of storing in the portable terminal.
When described identity information is described current operation user's finger print information, can with in described current operation user's finger print information and the described portable terminal in advance the finger print information of the validated user of the described portable terminal of storage compare, if described current operation user's the finger print information and the finger print information of described validated user are inconsistent, the identity of then determining described current operation user is illegal, otherwise determines that described current operation user's identity is legal.
Step 13, when the identity of determining described current operation user is illegal, store the operation of described user, and described operation indicating given the validated user of described portable terminal portable terminal.
In this process, when the identity of determining described current operation user is illegal, described current operation user is stored as operation note the operation of described portable terminal, and described current operation user's identity information and described operation note generated daily record, and described daily record is prompted to the validated user of described portable terminal.
Wherein current operation user comprises operations such as the checking of various information in the portable terminal, editors the operation of portable terminal, to operations such as use of various application programs or the like.In the process that this current operation user operates portable terminal, the various operations of writing down this current operation user by the backstage of portable terminal, and it is stored as operation note.Wherein, described operation note can exist in the portable terminal, and the smart card that perhaps is stored in portable terminal is medium.
For example, the illegal current operation user of identity Monday on the 11st October in 2010 15:35 divide and checked that the e-mail applications acceptance of the bid is entitled as the mail of " the urgent prediction scheme of project ", therefore, can operation store as operation note.
In the daily record of this generation, be to utilize in the step 11 user's who obtains identity information and the operation note that obtains in this step generates, that is to say that the user's who stores in this daily record identity information and operation note are corresponding.
For example, described daily record can be following form: the disabled user of this portable terminal " 1 " (this user's who gets access in the step 11 photo or short-movie) Monday on the 11st October in 2010 15:35 divide and to have checked that the e-mail applications acceptance of the bid is entitled as the mail of " the urgent prediction scheme of project ".
After having generated above-mentioned daily record, daily record can be prompted to the validated user of described portable terminal.In the process that is prompted to described portable terminal validated user, portable terminal can utilize following several mode daily record to be prompted to the validated user of described portable terminal.
Mode one, this portable terminal can be set to definite current operation user to behind the validated user of portable terminal, again the validated user that this daily record is sent to portable terminal with form or other forms of multimedia message.
That is to say, after having generated daily record, in the process that is prompted to described portable terminal validated user, can determine at first whether the current operation user of described portable terminal is validated user, if not, then described daily record is prompted to the validated user of described portable terminal.If then do not offer the validated user of described portable terminal.Certainly, in this process, after the current operation user who determines described portable terminal is validated user, also this daily record can be prompted to the number of this portable terminal appointment.
In this way, can reduce the number of times that portable terminal sends daily record, thereby reduce the energy consumption of portable terminal.
Wherein, whether be in the process of validated user the current operation user who determines described portable terminal, also can be according to the mode of describing in step 11 and 12; Perhaps, can also be provided with, for example require current operation user to input password or, import answer by this user to this user's enquirement to the tabulation of the validated user of portable terminal.When the password of user input or answer are correct, determine that then the current operation user of portable terminal be the validated user of described portable terminal, otherwise, the disabled user that the current user of operation who determines portable terminal is described portable terminal.Perhaps, can also tabulate the relevant information of in this validated user tabulation, adding current operation user, for example this user's picture or photo etc. by the validated user that current operation user initiatively changes in the portable terminal.
Mode two, this portable terminal can be set to after having generated daily record, the portable terminal that this daily record is sent to this validated user appointment with form or other forms of multimedia message immediately, it for example can be this portable terminal itself, or in the portable terminal of specified other numbers of portable terminal, as portable terminal of another number of this validated user etc.
In this way, the validated user of portable terminal can obtain this daily record in the very first time, thereby which information in determining to move was illegally obtained by whom, thereby adopted remedial measures more timely, thereby had further improved the user experience the when user uses portable terminal.
Perhaps in concrete the application, also above-mentioned dual mode can be used in combination.
Certainly, the mode that other also can be arranged is prompted to the validated user of described portable terminal with daily record, at this just for example.
By above description as can be seen; the validated user of portable terminal can know accurately which information in the portable terminal illegally obtained by whom; thereby make this validated user can take corresponding protection or remedial measure, thereby improved the user experience the when user uses portable terminal.
As shown in Figure 2, the embodiment of the invention two portable terminals comprise: identity information acquiring unit 21 is used to obtain the current operation user's of portable terminal identity information; Identity authenticating unit 22 is used for determining according to the identity information that described identity information acquiring unit obtains the legitimacy of described current operation user identity; Information process unit 23 is used for storing the operation of described user to portable terminal, and described operation indicating being given the validated user of described portable terminal when described identity authenticating unit determines that described current operation user's identity is illegal.
Wherein, as the description among the method embodiment, described identity information can be face's information of described current operation user, finger print information, and perhaps other can identify other information of this current operation user's identity.Accordingly, described identity information acquiring unit 21 can specifically be used to obtain face's information of described current operation user, and perhaps described identity information acquiring unit 21 can specifically be used to gather described current operation user's finger print information.
Wherein, as shown in Figure 3, described identity authenticating unit 22 can comprise: first comparison module 221 is used for face's information of the validated user of described current operation user's face's information and the described portable terminal that described portable terminal is stored is in advance compared; First processing module 222, be used for when described first comparison module 221 is determined the face information inconsistency of described current operation users' face's information and described validated user, the identity of determining described current operation user is illegal, otherwise determines that described current operation user's identity is legal.
Perhaps, as shown in Figure 4, described identity authenticating unit 22 also can comprise: second comparison module 223 is used for the finger print information of the validated user of described current operation user's finger print information and the described portable terminal that described portable terminal is stored is in advance compared; Second processing module 224, be used for determining that when described second comparison module 223 finger print information of described current operation users' finger print information and described validated user is inconsistent, the identity of then determining described current operation user is illegal, otherwise determines that described current operation user's identity is legal.
Wherein, the operation principle of described identity authenticating unit can be with reference to the description among the preceding method embodiment.
As shown in Figure 5, described information process unit 23 can comprise: memory module 241 is used for when the identity of determining described current operation user is illegal described current operation user being stored as operation note the operation of described portable terminal; Daily record generation module 242 is used for described current operation user's identity information and described operation note are generated daily record; Sending module 243 is used for the log store module with described daily record generation module generation, is used for when the identity of determining described current operation user is illegal described current operation user being stored as operation note the operation of described portable terminal.
In addition, according to the difference that is provided with of the validated user of portable terminal, described sending module 243 can specifically be used for described daily record is sent to the portable terminal of described validated user appointment.Perhaps, as shown in Figure 5, described information process unit 24 also can comprise: judge module 244 is used to judge whether described current operation user is the validated user of described portable terminal.At this moment, the current operation user that described sending module 243 specifically is used for determining portable terminal at described judge module is prompted to described daily record the validated user of described portable terminal for behind the validated user of described portable terminal.
The operation principle of wherein said information process unit can be with reference to the description among the preceding method embodiment.
By above description as can be seen; utilize the terminal of the embodiment of the invention; its validated user can know accurately which information in the portable terminal illegally obtained by whom; thereby make this validated user can take corresponding protection or remedial measure, thereby improved the user experience the when user uses portable terminal.
One of ordinary skill in the art will appreciate that all or part of flow process that realizes in the foregoing description method, be to instruct relevant hardware to finish by computer program, described program can be stored in the computer read/write memory medium, this program can comprise the flow process as the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only storage memory body (Read-Only Memory, ROM) or at random store memory body (Random Access Memory, RAM) etc.
The above; only be the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of described claim.

Claims (10)

1. an information cuing method is characterized in that, comprising:
Obtain current operation user's identity information;
Determine the legitimacy of described current operation user identity according to described identity information;
When the identity of determining described current operation user is illegal, stores the operation of described user, and described operation indicating is given the validated user of described portable terminal portable terminal.
2. information cuing method according to claim 1 is characterized in that, the described identity information that obtains current operation user comprises:
Utilize the preposition camera of described portable terminal to obtain face's information of described current operation user; Or utilize described portable terminal to gather described current operation user's finger print information;
Describedly determine that according to described identity information the legitimacy of described current operation user identity comprises:
With in described current operation user's face's information and the described portable terminal in advance face's information of the validated user of the described portable terminal of storage compare, if face's information of described current operation user and face's information inconsistency of described validated user, the identity of determining described current operation user is illegal, otherwise determines that described current operation user's identity is legal; Or
With in described current operation user's finger print information and the described portable terminal in advance the finger print information of the validated user of the described portable terminal of storage compare, if described current operation user's the finger print information and the finger print information of described validated user are inconsistent, the identity of determining described current operation user is illegal, otherwise determines that described current operation user's identity is legal.
3. information cuing method according to claim 1 is characterized in that, when described identity as definite described current operation user is illegal, stores the operation of described user to portable terminal, and comprises to the validated user of described portable terminal described operation indicating:
When the identity of determining described current operation user is illegal, described current operation user is stored as operation note the operation of described portable terminal;
Described current operation user's identity information and described operation note are generated daily record, and described daily record is prompted to the validated user of described portable terminal.
4. according to claim information cuing method according to claim 3, it is characterized in that described identity information and described operation note with described current operation user generates daily record, and the validated user that described daily record is prompted to described portable terminal comprised:
Described current operation user's identity information and described operation note are generated daily record, described daily record is sent in the portable terminal of described validated user appointment; And/or
Described current operation user's identity information and described operation note are generated daily record, and after the current operation user who determines portable terminal is the validated user of described portable terminal, described daily record is prompted to the validated user of described portable terminal.
5. a portable terminal is characterized in that, comprising:
The identity information acquiring unit is used to obtain the current operation user's of portable terminal identity information;
Identity authenticating unit is used for determining according to the identity information that described identity information acquiring unit obtains the legitimacy of described current operation user identity;
Information process unit is used for storing the operation of described user to portable terminal, and described operation indicating being given the validated user of described portable terminal when described identity authenticating unit determines that described current operation user's identity is illegal.
6. portable terminal according to claim 5 is characterized in that,
The finger print information that described identity information acquiring unit specifically is used to obtain face's information of described current operation user or specifically is used to gather described current operation user.
7. portable terminal according to claim 6 is characterized in that, described identity authenticating unit comprises:
First comparison module is used for face's information of the validated user of described current operation user's face's information and the described portable terminal that described portable terminal is stored is in advance compared; First processing module, be used for when described first comparison module is determined the face information inconsistency of described current operation user's face's information and described validated user, the identity of determining described current operation user is illegal, otherwise determines that described current operation user's identity is legal;
Perhaps described identity authenticating unit comprises:
Second comparison module is used for the finger print information of the validated user of described current operation user's finger print information and the described portable terminal that described portable terminal is stored is in advance compared; Second processing module, be used for determining that when described second comparison module finger print information of described current operation user's finger print information and described validated user is inconsistent, the identity of then determining described current operation user is illegal, otherwise determines that described current operation user's identity is legal.
8. according to the arbitrary described portable terminal of claim 5-7, it is characterized in that described information process unit comprises:
Memory module is used for when the identity of determining described current operation user is illegal described current operation user being stored as operation note the operation of described portable terminal;
The daily record generation module is used for described current operation user's identity information and described operation note are generated daily record;
Sending module is used for the daily record that described daily record generation module generates is prompted to the validated user of described portable terminal.
9. portable terminal according to claim 8 is characterized in that described sending module specifically is used for described daily record is sent to the portable terminal of described validated user appointment.
10. portable terminal according to claim 8 is characterized in that, described information process unit also comprises:
Judge module is used to judge whether described current operation user is the validated user of described portable terminal;
The current operation user that described sending module specifically is used for determining portable terminal at described judge module is prompted to described daily record the validated user of described portable terminal for behind the validated user of described portable terminal.
CN2011100059016A 2011-01-12 2011-01-12 Information prompting method and mobile terminal Pending CN102075627A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100059016A CN102075627A (en) 2011-01-12 2011-01-12 Information prompting method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100059016A CN102075627A (en) 2011-01-12 2011-01-12 Information prompting method and mobile terminal

Publications (1)

Publication Number Publication Date
CN102075627A true CN102075627A (en) 2011-05-25

Family

ID=44033964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100059016A Pending CN102075627A (en) 2011-01-12 2011-01-12 Information prompting method and mobile terminal

Country Status (1)

Country Link
CN (1) CN102075627A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932540A (en) * 2012-10-24 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal and stealing prevention method thereof
CN103064589A (en) * 2013-01-30 2013-04-24 广东欧珀移动通信有限公司 Mobile terminal operation record display method and mobile terminal
CN103269399A (en) * 2013-05-07 2013-08-28 深圳市中兴移动通信有限公司 Processing method for movable terminal information and movable terminal
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN103870378A (en) * 2012-12-12 2014-06-18 腾讯科技(武汉)有限公司 Monitoring method for terminal device and terminal device
CN104750635A (en) * 2013-12-27 2015-07-01 联想(北京)有限公司 Data processing method and electronic device
CN105094664A (en) * 2015-06-10 2015-11-25 小米科技有限责任公司 Terminal device privacy protection method and apparatus
CN107483723A (en) * 2017-07-31 2017-12-15 广东欧珀移动通信有限公司 Mobile terminal and its operation process recording method, computer-readable recording medium
US9940448B2 (en) 2013-09-26 2018-04-10 Xiaomi Inc. Unlock processing method and device
CN108052822A (en) * 2017-12-08 2018-05-18 北京小米移动软件有限公司 Terminal control method, apparatus and system
CN108429810A (en) * 2018-03-15 2018-08-21 广东小天才科技有限公司 Remote control method and system based on family education equipment
CN109598141A (en) * 2018-11-30 2019-04-09 维沃移动通信有限公司 A kind of browsing method, device and mobile terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984400A (en) * 2005-12-15 2007-06-20 乐金电子(中国)研究开发中心有限公司 Mobile terminal and its safety monitoring method
CN101412393A (en) * 2008-11-25 2009-04-22 深圳市同洲电子股份有限公司 Theftproof method, apparatus and system for automobile

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984400A (en) * 2005-12-15 2007-06-20 乐金电子(中国)研究开发中心有限公司 Mobile terminal and its safety monitoring method
CN101412393A (en) * 2008-11-25 2009-04-22 深圳市同洲电子股份有限公司 Theftproof method, apparatus and system for automobile

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932540A (en) * 2012-10-24 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal and stealing prevention method thereof
CN103870378A (en) * 2012-12-12 2014-06-18 腾讯科技(武汉)有限公司 Monitoring method for terminal device and terminal device
CN103064589A (en) * 2013-01-30 2013-04-24 广东欧珀移动通信有限公司 Mobile terminal operation record display method and mobile terminal
CN103269399A (en) * 2013-05-07 2013-08-28 深圳市中兴移动通信有限公司 Processing method for movable terminal information and movable terminal
CN103488924B (en) * 2013-09-26 2017-03-08 小米科技有限责任公司 A kind of unlocking processing method of terminal, device and equipment
WO2015043193A1 (en) * 2013-09-26 2015-04-02 小米科技有限责任公司 Unlocking processing method, apparatus and device for terminal
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
US9940448B2 (en) 2013-09-26 2018-04-10 Xiaomi Inc. Unlock processing method and device
CN104750635A (en) * 2013-12-27 2015-07-01 联想(北京)有限公司 Data processing method and electronic device
CN105094664A (en) * 2015-06-10 2015-11-25 小米科技有限责任公司 Terminal device privacy protection method and apparatus
CN107483723A (en) * 2017-07-31 2017-12-15 广东欧珀移动通信有限公司 Mobile terminal and its operation process recording method, computer-readable recording medium
CN108052822A (en) * 2017-12-08 2018-05-18 北京小米移动软件有限公司 Terminal control method, apparatus and system
CN108052822B (en) * 2017-12-08 2021-05-04 北京小米移动软件有限公司 Terminal control method, device and system
CN108429810A (en) * 2018-03-15 2018-08-21 广东小天才科技有限公司 Remote control method and system based on family education equipment
CN108429810B (en) * 2018-03-15 2021-06-25 广东小天才科技有限公司 Remote control method and system based on family education equipment
CN109598141A (en) * 2018-11-30 2019-04-09 维沃移动通信有限公司 A kind of browsing method, device and mobile terminal

Similar Documents

Publication Publication Date Title
CN102075627A (en) Information prompting method and mobile terminal
CN105681328B (en) The method, apparatus and electronic equipment of controlling electronic devices
US8880027B1 (en) Authenticating to a computing device with a near-field communications card
EP2579141B1 (en) Method and device for unlocking operating system
CN103077341B (en) A kind of application program unlock method and device
EP1669836A1 (en) User authentication by combining speaker verification and reverse turing test
EP3468134A1 (en) Method and device for identity authentication
CN101296457A (en) Screen operation method and device
US20130340057A1 (en) Image Facilitated Password Generation User Authentication And Password Recovery
CN101770552B (en) Method for clearing computer password, computer and system for clearing computer password
CN104375836A (en) Method and device for showing lock screen window
CN104184701A (en) Third-party application log-in method, device and terminal
CN103516518A (en) Safety verification method and device
CN104954534B (en) Control method, device and the corresponding communication terminal of communication terminal
EP2618264A1 (en) Method for clearing computer data and computer
CN103310139A (en) Input validation method and input validation device
CN103390123A (en) User authentication method, user authentication device and intelligent terminal
CN102368230A (en) Mobile memory and access control method thereof as well as system
CN103324874A (en) Verification method and electronic device
CN108604268B (en) A kind of voice unlocking method and terminal of terminal
CN104363589A (en) Identity authentication method, device and terminal
CN112907788A (en) Door lock control method and device, door lock and storage medium
CN105005721A (en) Computer authorization starting control system and method based on computer starting key
CN109582238B (en) Hard disk binding and matching method and system, electronic equipment and storage medium
CN109088872A (en) Application method, device, electronic equipment and the medium of cloud platform with service life

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110525