CN103826012A - Mobile phone permission password setting method - Google Patents
Mobile phone permission password setting method Download PDFInfo
- Publication number
- CN103826012A CN103826012A CN201410087451.3A CN201410087451A CN103826012A CN 103826012 A CN103826012 A CN 103826012A CN 201410087451 A CN201410087451 A CN 201410087451A CN 103826012 A CN103826012 A CN 103826012A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- password
- rights
- solution screen
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention discloses a mobile phone permission password setting method comprising the steps that a mobile phone permission locking switch is added in mobile phone settings, and a special screen unlocking password for enabling a mobile phone to enter a permission limited state and a common screen unlocking password for enabling the mobile phone to enter a normal service state are configured; when the mobile phone permission locking switch is turned on, the mobile phone enters the permission limited state until the mobile phone enters a screen locking state; when the mobile phone is subjected to secondary screen unlocking, a screen unlocking password is needed to be input, and the mobile phone enters the permission limited state when the input screen unlocking password is the special screen unlocking password; the mobile phone enters the normal service state if the input screen unlocking password is a common screen unlocking password. Therefore, the mobile phone privacy of a user can be favorably protected, and the mobile phone permission password setting method is simple in operation step and more convenient to use.
Description
Technical field
The invention belongs to technical field of mobile terminals, particularly relate to a kind of cipher set-up method of mobile phone rights of using.
Background technology
Mobile phone has become one of our everyone important impedimenta, and it has our a lot of privacy, and therefore, how avoiding revealing mobile phone private becomes a very crucial problem; At present existing multiple mobile phone method for secret protection; the password that enters this application program for example can be set separately in the application program of need to be keep secret; but the method need to arrange multiple application programs, and all need to input password in the time of each use, operate too loaded down with trivial details.
Summary of the invention
The present invention, for addressing the above problem, provides a kind of cipher set-up method of mobile phone rights of using, and it not only can protect the individual privacy in mobile phone, and simple to operate, easy to use.
For achieving the above object, the technical solution used in the present invention is:
A cipher set-up method for mobile phone rights of using, is characterized in that, comprises the following steps:
10. at mobile phone, middle interpolation one mobile phone rights of using locking switch is set, and configures a particular solution screen password and that makes mobile phone enter rights of using its constrained state and make mobile phone enter the common solution screen password of normal operating condition;
20. in the time that described mobile phone rights of using locking switch is opened, and mobile phone enters rights of using its constrained state, until mobile phone enters screen lock state;
30. in the time again separating screen to mobile phone, need input to separate screen password;
If when the solution screen password of 40. inputs is particular solution screen password, mobile phone enters rights of using its constrained state; If when the solution of input screen password is common solution screen password, mobile phone enters normal operating condition.
Preferably, described mobile phone enters when rights of using its constrained state refers to each application program of opening mobile phone and can eject the dialog box that prompting application program surprisingly stops.
Preferably, in the time that mobile phone enters rights of using its constrained state, the title of the application program that system is opened automatic acquisition user and corresponding bag name thereof, and point out this application program of user surprisingly to stop.
Preferably, in the time that the solution screen password of input is particular solution screen password, cannot carry out the operation opening or closing of described mobile phone rights of using locking switch; In the time that the solution screen password of input is common solution screen password, can carry out the operation opening or closing of described mobile phone rights of using locking switch.
Preferably, in the time that the mobile phone rights of using locking switch to described carries out opening operation, need first input described common solution screen password, and described particular solution screen password is set; In the time that the mobile phone rights of using locking switch to described carries out shutoff operation, need first input described common solution screen password, the more described particular solution screen password of input.
Preferably, the setting of described particular solution screen password comprises input initial password and two steps of input validation password, and described confirmation password must be consistent with described initial password.
Preferably, described particular solution screen password can adopt pattern password, numerical ciphers, word password, scene password or gesture password.
Preferably, described common solution screen password can adopt pattern password, numerical ciphers, word password, scene password or gesture password.
The invention has the beneficial effects as follows:
The cipher set-up method of a kind of mobile phone rights of using of the present invention, it is by middle interpolation one mobile phone rights of using locking switch is set at mobile phone, and configures a particular solution screen password and that makes mobile phone enter rights of using its constrained state and make mobile phone enter the common solution screen password of normal operating condition; In the time that described mobile phone rights of using locking switch is opened, mobile phone enters rights of using its constrained state, until mobile phone enters screen lock state; In the time mobile phone being separated again to screen, need input to separate screen password, if when the solution of input screen password is particular solution screen password, mobile phone enters rights of using its constrained state; If when the solution of input screen password is common solution screen password, mobile phone enters normal operating condition, thereby user's mobile phone private can well be protected, and operating procedure is simple, uses more convenient.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms a part of the present invention, and schematic description and description of the present invention is used for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the general flow chart of the cipher set-up method of a kind of mobile phone rights of using of the present invention;
Fig. 2 is the view of mobile phone of the present invention while entering rights of using its constrained state.
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearer, clear, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
As shown in Figure 1, the cipher set-up method of a kind of mobile phone rights of using of the present invention, it comprises the following steps:
10. at mobile phone, middle interpolation one mobile phone rights of using locking switch is set, and configures a particular solution screen password and that makes mobile phone enter rights of using its constrained state and make mobile phone enter the common solution screen password of normal operating condition;
20. in the time that described mobile phone rights of using locking switch is opened, and mobile phone enters rights of using its constrained state, until mobile phone enters screen lock state;
30. in the time again separating screen to mobile phone, need input to separate screen password;
If when the solution screen password of 40. inputs is particular solution screen password, mobile phone enters rights of using its constrained state; If when the solution of input screen password is common solution screen password, mobile phone enters normal operating condition.
In the present embodiment, described mobile phone enters when rights of using its constrained state refers to each application program of opening mobile phone can eject the dialog box that prompting application program surprisingly stops, concrete, in the time that mobile phone enters rights of using its constrained state, the title of the application program that system is opened automatic acquisition user and corresponding bag name thereof, and point out this application program of user surprisingly to stop; For example, the accident that Figure 2 shows that micro-letter stops schematic diagram.
Shown in step 40, in the time that the solution screen password of input is particular solution screen password, cannot carry out the operation opening or closing of described mobile phone rights of using locking switch; In the time that the solution screen password of input is common solution screen password, can carry out the operation opening or closing of described mobile phone rights of using locking switch; And, in the time that the mobile phone rights of using locking switch to described carries out opening operation, need first input described common solution screen password, and described particular solution screen password is set; The setting of described particular solution screen password comprises input initial password and two steps of input validation password, and described confirmation password must be consistent with described initial password; In the time that the mobile phone rights of using locking switch to described carries out shutoff operation, need first input described common solution screen password, the more described particular solution screen password of input.
Above-mentioned particular solution screen password or common solution screen password all can adopt pattern password, numerical ciphers, word password, scene password or gesture password etc.
Above-mentioned explanation illustrates and has described the preferred embodiments of the present invention, as front, be to be understood that the present invention is not limited to disclosed form herein, should not regard the eliminating to other embodiment as, and can be used for various other combinations, modification and environment, and can, in invention contemplated scope herein, change by technology or the knowledge of above-mentioned instruction or association area.And the change that those skilled in the art carry out and variation do not depart from the spirit and scope of the present invention, all should be in the protection range of claims of the present invention.
Claims (8)
1. a cipher set-up method for mobile phone rights of using, is characterized in that, comprises the following steps:
10. at mobile phone, middle interpolation one mobile phone rights of using locking switch is set, and configures a particular solution screen password and that makes mobile phone enter rights of using its constrained state and make mobile phone enter the common solution screen password of normal operating condition;
20. in the time that described mobile phone rights of using locking switch is opened, and mobile phone enters rights of using its constrained state, until mobile phone enters screen lock state;
30. in the time again separating screen to mobile phone, need input to separate screen password;
If when the solution screen password of 40. inputs is particular solution screen password, mobile phone enters rights of using its constrained state; If when the solution of input screen password is common solution screen password, mobile phone enters normal operating condition.
2. the cipher set-up method of a kind of mobile phone rights of using according to claim 1, is characterized in that: described mobile phone enters when rights of using its constrained state refers to each application program of opening mobile phone can eject the dialog box that prompting application program surprisingly stops.
3. the cipher set-up method of a kind of mobile phone rights of using according to claim 2, it is characterized in that: in the time that mobile phone enters rights of using its constrained state, the title of the application program that system is opened automatic acquisition user and corresponding bag name thereof, and point out this application program of user surprisingly to stop.
4. the cipher set-up method of a kind of mobile phone rights of using according to claim 1, is characterized in that: in the time that the solution screen password of input is particular solution screen password, cannot carry out the operation opening or closing of described mobile phone rights of using locking switch; In the time that the solution screen password of input is common solution screen password, can carry out the operation opening or closing of described mobile phone rights of using locking switch.
5. the cipher set-up method of a kind of mobile phone rights of using according to claim 1, it is characterized in that: in the time that the mobile phone rights of using locking switch to described carries out opening operation, need first input described common solution screen password, and described particular solution screen password is set; In the time that the mobile phone rights of using locking switch to described carries out shutoff operation, need first input described common solution screen password, the more described particular solution screen password of input.
6. the cipher set-up method of a kind of mobile phone rights of using according to claim 5, it is characterized in that: the setting of described particular solution screen password comprises input initial password and two steps of input validation password, and described confirmation password must be consistent with described initial password.
7. according to the cipher set-up method of a kind of mobile phone rights of using described in any one in claim 1 to 6, it is characterized in that: described particular solution screen password can adopt pattern password, numerical ciphers, word password, scene password or gesture password.
8. according to the cipher set-up method of a kind of mobile phone rights of using described in any one in claim 1 to 6, it is characterized in that: described common solution screen password can adopt pattern password, numerical ciphers, word password, scene password or gesture password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410087451.3A CN103826012A (en) | 2014-03-11 | 2014-03-11 | Mobile phone permission password setting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410087451.3A CN103826012A (en) | 2014-03-11 | 2014-03-11 | Mobile phone permission password setting method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103826012A true CN103826012A (en) | 2014-05-28 |
Family
ID=50760829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410087451.3A Pending CN103826012A (en) | 2014-03-11 | 2014-03-11 | Mobile phone permission password setting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103826012A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016082415A1 (en) * | 2014-11-24 | 2016-06-02 | 中兴通讯股份有限公司 | Method, device, and computer storage medium for controlling terminal device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0560217A1 (en) * | 1992-03-12 | 1993-09-15 | Alcatel SEL Aktiengesellschaft | Method and device for check and attainment of authorization for access |
CN103108082A (en) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system |
CN103427990A (en) * | 2012-05-18 | 2013-12-04 | 华为终端有限公司 | Authority authentication method and terminal device |
-
2014
- 2014-03-11 CN CN201410087451.3A patent/CN103826012A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0560217A1 (en) * | 1992-03-12 | 1993-09-15 | Alcatel SEL Aktiengesellschaft | Method and device for check and attainment of authorization for access |
CN103427990A (en) * | 2012-05-18 | 2013-12-04 | 华为终端有限公司 | Authority authentication method and terminal device |
CN103108082A (en) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016082415A1 (en) * | 2014-11-24 | 2016-06-02 | 中兴通讯股份有限公司 | Method, device, and computer storage medium for controlling terminal device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2894584B1 (en) | Screen unlocking method, device and terminal | |
CN102509055B (en) | Mobile terminal and method for hiding programs of mobile terminal | |
CN103108082B (en) | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system | |
EP2955617B1 (en) | Method and device for unlocking screen, and terminal | |
JP6568355B2 (en) | Method and apparatus for mutual communication of accounts between apps | |
CN103488918B (en) | Intelligent terminal applies encryption method and device | |
WO2016015448A1 (en) | Multi-system entering method, apparatus and terminal | |
WO2014166280A1 (en) | Method of protecting privacy data of an application program and apparatus using the same | |
WO2014207581A3 (en) | Processing guest event in hypervisor-controlled system | |
CN102457619A (en) | Method for setting permission password for mobile phone | |
CN104091133A (en) | Method for protecting security of terminal, terminal and system | |
MX2017014635A (en) | Remote keyless entry message authentication. | |
CN103338445A (en) | File encryption and decryption method and system | |
CN103763091A (en) | Encrypting method, decrypting method, encrypting device and decrypting device of application program | |
CN103870007A (en) | Control method and control system for key combination of mobile terminal | |
CN103324874A (en) | Verification method and electronic device | |
CN103619014A (en) | Method and system preventing application data from leakage | |
CN104424427A (en) | Password authentication method and device | |
CN104239099A (en) | Mobile phone flushing control method | |
CN104182704A (en) | Safety strategy setting method, safety strategy setting device and terminal | |
CN102830920A (en) | Handheld equipment privacy protection method | |
CN103826012A (en) | Mobile phone permission password setting method | |
CN104239778B (en) | The ciphering startup method of application based on android system | |
CN104392158A (en) | Mobile terminal unlocking method and mobile terminal | |
CN105700814A (en) | Method and device for protecting application information and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140528 |