CN105912900B - A method of control mobile terminal - Google Patents

A method of control mobile terminal Download PDF

Info

Publication number
CN105912900B
CN105912900B CN201610203699.0A CN201610203699A CN105912900B CN 105912900 B CN105912900 B CN 105912900B CN 201610203699 A CN201610203699 A CN 201610203699A CN 105912900 B CN105912900 B CN 105912900B
Authority
CN
China
Prior art keywords
mobile terminal
user
face image
timer
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610203699.0A
Other languages
Chinese (zh)
Other versions
CN105912900A (en
Inventor
朱泗英
方桂芝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Xinghan Intelligent Information Technology Co., Ltd
Original Assignee
Shenzhen Zhihuishifang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhihuishifang Technology Co Ltd filed Critical Shenzhen Zhihuishifang Technology Co Ltd
Priority to CN201610203699.0A priority Critical patent/CN105912900B/en
Publication of CN105912900A publication Critical patent/CN105912900A/en
Application granted granted Critical
Publication of CN105912900B publication Critical patent/CN105912900B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The present invention discloses a kind of method for controlling mobile terminal, comprising steps of mobile terminal obtains user's face image in a state of use, timer, which is controlled, according to user's face image starts timing, timer arrival locks mobile terminal after using the time, the second mobile terminal is locked according to user's face image of acquisition with locking associated second mobile terminal of mobile terminal, timer unlocks mobile terminal and the second mobile terminal after reaching the waiting time.Due to obtaining user's face image, then the arrival of control timer uses the time then to lock mobile terminal; mobile terminal, which is restarted, can not all unlock mobile terminal; the timer arrival waiting time of only equal mobile terminals could unlock mobile terminal; it can allow people that mobile terminal can not be used continuously for a long time; eyes are protected, and mobile terminal is associated with the second mobile terminal, after mobile terminal locking; the second mobile terminal is locked, prevents user from changing a mobile terminal and continues to use.

Description

A method of control mobile terminal
Technical field
The present invention relates to field of electronic devices, more specifically, being related to a kind of method for controlling mobile terminal.
Background technique
Present smart phone is more more and more universal, and many people have dependence to mobile terminals such as smart phones, especially small Child contacts the mobile terminals such as smart phone very early, and the self-control of child is weaker, and in smart phone using non- Often abundant, child is easy addiction wherein, usually uses smart phone for a long time, causes the adverse consequences such as myopia.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of control mobile terminals reduced using the mobile terminal time Method.
The purpose of the present invention is achieved through the following technical solutions: a method of control mobile terminal, including step It is rapid:
Mobile terminal obtains user's face image in a state of use,
Timer, which is controlled, according to user's face image starts timing,
Timer is reached using locking mobile terminal after the time, with locking associated second mobile terminal of mobile terminal according to User's face image of acquisition locks the second mobile terminal,
Timer unlocks mobile terminal and the second mobile terminal after reaching the waiting time.
Further, user's face image is obtained after unlocking mobile terminal, it is identical as user's face image before, extend Waiting time.
Further, user's face image is obtained after unlocking mobile terminal, it is identical as user's face image before, shorten Use the time.
Further, user's face image is obtained after unlocking mobile terminal, it is identical as user's face image before, extend Waiting time and shortening use the time.
Further, controlling timer to start timed process according to user's face image includes in identification user's face image Pupil.
Further, controlling timer to start timed process according to user's face image includes that reference picture is stored in advance, The reference picture figure child image.
Further, controlling timer to start timed process according to user's face image includes sending user's face image To backstage, timer is controlled according to backstage return information and starts timing.
Further, mobile terminal includes that list memory described in list memory has feature list, mobile terminal to lock Determine the function other than the function or lock function list in feature list.
Due to obtaining user's face image, then the arrival of control timer uses the time then to lock mobile terminal to the present invention, moves Dynamic terminal, which is restarted, can not all unlock mobile terminal, and the timer arrival waiting time of only equal mobile terminals could unlock mobile whole End can allow people that mobile terminal can not be used continuously for a long time, protect eyes, can also be not desired to others and browse your mobile terminal letter Breath, using your mobile terminal function but it is bad refusal others' when use this function, can be effectively prevented others using you Mobile terminal protects privacy, and mobile terminal is associated with the second mobile terminal, after mobile terminal locking, the second mobile terminal Detection uses user, and the second mobile terminal is locked if still same user, prevents user from changing a mobile terminal and continues to use.
Detailed description of the invention
Fig. 1 is a kind of method schematic diagram of control mobile terminal of the embodiment of the present invention.
Specific embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing or method described as flow chart.Although operations are described as the processing of sequence by flow chart, therein to be permitted Multioperation can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of operations can be rearranged.When it The processing can be terminated when operation completion, it is also possible to have the additional step being not included in attached drawing.The processing It can correspond to method, function, regulation, subroutine, subprogram etc..
Alleged " computer equipment " within a context, also referred to as " computer ", referring to can be by running preset program or referring to Enable to execute numerical value and calculate and/or the intelligent electronic device of the predetermined process process such as logic calculation, may include processor with Memory executes the survival prestored in memory instruction by processor to execute predetermined process process, or by ASIC, The hardware such as FPGA, DSP execute predetermined process process, or are realized by said two devices combination.Computer equipment includes but unlimited In server, PC, laptop, tablet computer, smart phone etc..
The computer equipment includes user equipment and the network equipment.Wherein, the user equipment or client include but It is not limited to computer, smart phone, PDA etc.;The network equipment includes but is not limited to single network server, multiple network services The server group of device composition is consisting of a large number of computers or network servers based on cloud computing (Cloud Computing) Cloud, wherein cloud computing is one kind of distributed computing, a super virtual meter consisting of a loosely coupled set of computers Calculation machine.Wherein, the computer equipment can isolated operation realize the present invention, also can access network and by with its in network The present invention is realized in the interactive operation of his computer equipment.Wherein, network locating for the computer equipment includes but is not limited to Internet, wide area network, Metropolitan Area Network (MAN), local area network, VPN network etc.
It should be noted that the user equipment, client, the network equipment and network etc. are only for example, other are existing Or the computer equipment or network being likely to occur from now on are such as applicable to the present invention, should also be included in the scope of the present invention with It is interior, and be incorporated herein by reference.
Method (some of them are illustrated by process) discussed hereafter can be by hardware, software, firmware, centre Part, microcode, hardware description language or any combination thereof are implemented.Implement when with software, firmware, middleware or microcode When, program code or code segment to implement necessary task can be stored in machine or computer-readable medium and (for example deposit Storage media) in.Necessary task can be implemented in (one or more) processor.
Specific structure and function details disclosed herein are only representative, and are for describing the present invention show The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and be not interpreted as It is limited only by the embodiments set forth herein.
Although it should be understood that may have been used term " first ", " second " etc. herein to describe each unit, But these units should not be limited by these terms.The use of these items is only for by a unit and another unit It distinguishes.For example, without departing substantially from the range of exemplary embodiment, it is single that first unit can be referred to as second Member, and similarly second unit can be referred to as first unit.Term "and/or" used herein above include one of them or Any and all combinations of more listed associated items.
It should be understood that when a unit referred to as " connects " or when " coupled " to another unit, can directly connect Another unit is connect or be coupled to, or may exist temporary location.In contrast, " directly connect when a unit is referred to as Connect " or " direct-coupling " to another unit when, then temporary location is not present.It should explain in a comparable manner and be used to retouch State the relationship between unit other words (such as " between being in ... " compared to " between being directly in ... ", " and with ... it is adjacent Closely " compared to " with ... be directly adjacent to " etc.).
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless Context clearly refers else, otherwise singular used herein above "one", " one " also attempt to include plural number.Also answer When understanding, term " includes " and/or "comprising" used herein above provide stated feature, integer, step, operation, The presence of unit and/or component, and do not preclude the presence or addition of other one or more features, integer, step, operation, unit, Component and/or combination thereof.
It should further be mentioned that the function action being previously mentioned can be attached according to being different from some replace implementations The sequence indicated in figure occurs.For example, related function action is depended on, the two width figures shown in succession actually may be used Substantially simultaneously to execute or can execute in a reverse order sometimes.
The invention will be further described with preferred embodiment with reference to the accompanying drawing.
As shown in Figure 1, a kind of method for controlling mobile terminal, comprising steps of
Mobile terminal obtains user's face image in a state of use,
Timer, which is controlled, according to user's face image starts timing,
Timer is reached using locking mobile terminal after the time, with locking associated second mobile terminal of mobile terminal according to User's face image of acquisition locks the second mobile terminal,
Timer unlocks mobile terminal and the second mobile terminal after reaching the waiting time.
Due to obtaining user's face image, then the arrival of control timer uses the time then to lock mobile terminal, mobile terminal Mobile terminal can not all be unlocked by restarting, and the timer arrival waiting time of only equal mobile terminals could unlock mobile terminal, can To allow people that mobile terminal can not be used continuously for a long time, eyes are protected, others can also be not desired to and browse your information of mobile terminal, make With your mobile terminal function but bad refusal others' when use this function, others can be effectively prevented and uses your mobile end Privacy is protected at end, and mobile terminal is associated with the second mobile terminal, and after mobile terminal locking, the detection of the second mobile terminal makes With user, the second mobile terminal is locked if still same user, is prevented user from changing a mobile terminal and is continued to use.
Other mobile terminals of locking and the preset networking of mobile terminal, present family generally have multiple intelligent hands The mobile terminals such as machine, tablet computer, laptop, desktop computer with camera, these are all associated, and a locking is then It all locks, or one of locking, the camera of other mobile terminals obtains user's face image, if still same One user then locks the mobile terminal.Associated mode can be the modes such as Bluetooth transmission, network transmission, and network transmission includes WIFI, cable network, mobile communications network etc..
User's face image is obtained after unlocking mobile terminal, it is identical as user's face image before, extend the waiting time. Discovery or the same user after unlock, then when timer is reached using locking mobile terminal again after the time and extending waiting Between.
It is also possible that obtaining user's face image after unlock mobile terminal, identical as user's face image before, shortening makes Use the time.Discovery or the same user after unlock, then timer shortening locks mobile terminal after using the time again.
It is also possible that user's face image is obtained after unlock mobile terminal, then extension etc. identical as user's face image before The time is used to time and shortening.Discovery or the same user after unlock, then timer shortening locks again after using the time Mobile terminal, and extend the waiting time.
Controlling timer to start timed process according to user's face image includes the pupil identified in user's face image.It is logical Whether have pupil to judge user whether using mobile terminal, accuracy is high, avoids erroneous judgement if crossing identification user face image.
Controlling timer to start timed process according to user's face image includes that reference picture is stored in advance, described with reference to figure As figure child image.Reference picture is kept in advance, and the face image that front camera obtains compares to judge to be with reference picture It is no to lock mobile terminal, there is good specific aim, precision is high.Especially children's self-control is weaker, is easy immoderate Play game using mobile terminal, surf the Internet, see video etc..
Controlling timer to start timed process according to user's face image includes that user's face image is sent to backstage, root Start timing according to backstage return information control timer.It can also carry out judging whether it is children by Background control, such as cloud, Another acquisition for mobile terminal user's face image, parent or other people remotely controlled.
Mobile terminal includes that list memory described in list memory has feature list, mobile terminal locking feature list Function other than interior function or lock function list.
The function of locking when locking mobile terminal can be set in mobile terminal, reservation when locking mobile terminal also can be set Function, more humane and intelligentized control mobile terminal.
Mobile terminal includes the electronic equipment with camera and network such as mobile phone, tablet computer, laptop.
Mobile terminal to lock timing can obtain the modes solutions such as image unlock or the password unlock of other users by camera Except locking.
The above content is a further detailed description of the present invention in conjunction with specific preferred embodiments, and it cannot be said that Specific implementation of the invention is only limited to these instructions.For those of ordinary skill in the art to which the present invention belongs, exist Under the premise of not departing from present inventive concept, a number of simple deductions or replacements can also be made, all shall be regarded as belonging to of the invention Protection scope.

Claims (6)

1. a kind of method for controlling mobile terminal, which is characterized in that comprising steps of
Mobile terminal obtains user's face image in a state of use,
Timer, which is controlled, according to user's face image starts timing,
Timer is reached using mobile terminal is locked after the time, with locking associated second mobile terminal of mobile terminal according to acquisition User's face image lock the second mobile terminal,
Timer unlocks mobile terminal and the second mobile terminal after reaching the waiting time;
User's face image is reacquired after unlocking mobile terminal, if the user's face image reacquired and the use obtained before Family face image is identical, then extends the waiting time or shortening uses the time.
2. a kind of method for controlling mobile terminal according to claim 1, which is characterized in that obtained after unlock mobile terminal User's face image, it is identical as user's face image before, extend the waiting time and shortening uses the time.
3. a kind of method for controlling mobile terminal according to claim 1, which is characterized in that according to user's face image control It includes the pupil identified in user's face image that timer processed, which starts timed process,.
4. a kind of method for controlling mobile terminal according to claim 1, which is characterized in that according to user's face image control It includes that reference picture is stored in advance that timer processed, which starts timed process, and the reference picture is child image.
5. a kind of method for controlling mobile terminal according to claim 1, which is characterized in that according to user's face image control It includes that user's face image is sent to backstage that timer processed, which starts timed process, controls timer according to backstage return information and opens Beginning timing.
6. a kind of method for controlling mobile terminal according to claim 1, which is characterized in that mobile terminal includes that list is deposited Reservoir, the list memory have feature list, the function or lock function list in mobile terminal locking feature list with Outer function.
CN201610203699.0A 2016-04-01 2016-04-01 A method of control mobile terminal Active CN105912900B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610203699.0A CN105912900B (en) 2016-04-01 2016-04-01 A method of control mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610203699.0A CN105912900B (en) 2016-04-01 2016-04-01 A method of control mobile terminal

Publications (2)

Publication Number Publication Date
CN105912900A CN105912900A (en) 2016-08-31
CN105912900B true CN105912900B (en) 2019-01-01

Family

ID=56745471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610203699.0A Active CN105912900B (en) 2016-04-01 2016-04-01 A method of control mobile terminal

Country Status (1)

Country Link
CN (1) CN105912900B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254539B (en) * 2016-09-23 2019-12-06 捷开通讯(深圳)有限公司 Mobile equipment and time-use monitoring system and method based on biological feature recognition

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833410A (en) * 2012-08-23 2012-12-19 惠州Tcl移动通信有限公司 Method for controlling usage time of mobile phone
CN103473015A (en) * 2013-09-22 2013-12-25 广东欧珀移动通信有限公司 Anti-addiction method and terminal
CN103533179A (en) * 2013-10-29 2014-01-22 广东欧珀移动通信有限公司 Method and system for remotely controlling application programs of mobile phone
CN104200143A (en) * 2014-09-04 2014-12-10 广东欧珀移动通信有限公司 Method and system for inputting password into intelligent mobile terminal rapidly through wearable device
CN204069033U (en) * 2014-04-18 2014-12-31 安易讯科技(大连)有限公司 Mobile phone for pupil remote-control system
CN105120080A (en) * 2015-07-23 2015-12-02 Tcl移动通信科技(宁波)有限公司 Anti-addiction control method and system of mobile terminal, and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833410A (en) * 2012-08-23 2012-12-19 惠州Tcl移动通信有限公司 Method for controlling usage time of mobile phone
CN103473015A (en) * 2013-09-22 2013-12-25 广东欧珀移动通信有限公司 Anti-addiction method and terminal
CN103533179A (en) * 2013-10-29 2014-01-22 广东欧珀移动通信有限公司 Method and system for remotely controlling application programs of mobile phone
CN204069033U (en) * 2014-04-18 2014-12-31 安易讯科技(大连)有限公司 Mobile phone for pupil remote-control system
CN104200143A (en) * 2014-09-04 2014-12-10 广东欧珀移动通信有限公司 Method and system for inputting password into intelligent mobile terminal rapidly through wearable device
CN105120080A (en) * 2015-07-23 2015-12-02 Tcl移动通信科技(宁波)有限公司 Anti-addiction control method and system of mobile terminal, and mobile terminal

Also Published As

Publication number Publication date
CN105912900A (en) 2016-08-31

Similar Documents

Publication Publication Date Title
US10169564B2 (en) Variable image presentation for authenticating a user
CN104243479B (en) A kind of external equipment polyplant and method
US10110708B2 (en) Performing autocomplete of content
JP6475339B2 (en) Image sharing method and apparatus, and terminal device
CN105897430A (en) User management method and system for intelligent terminal
US20170308349A1 (en) Multi-screen sharing based application management method and device, and storage medium
CN103365922A (en) Method and device for associating images with personal information
CN104902080B (en) A kind of information interacting method and equipment
CN104870068B (en) A kind of method and router of access network
CN104349452B (en) A kind of method and system of locating cellphone
CN105897475B (en) A kind of remote configuring method and router of router
CN108830093A (en) Management method, server and the terminal device of terminal device operating right
US20170134364A1 (en) Note update method and device
CN107124632A (en) Intelligent television children lock system and locking means and unlocking method based on barcode scanning
US20130152164A1 (en) Taking Configuration Management Data and Change Business Process Data Into Account With Regard to Authorization and Authentication Rules
CN105912900B (en) A method of control mobile terminal
CN106127005A (en) The user management method of a kind of mobile terminal and system
CN106326478B (en) A kind of data processing method and device of instant communication software
CN105893824A (en) Method for controlling mobile terminal
US20150347776A1 (en) Methods and system for implementing a secure lock screen
CN106341379B (en) Information processing method, device and system
CN106970942A (en) A kind of method and terminal for relating to yellow content Initiative Defense
CN115174177B (en) Rights management method, device, electronic apparatus, storage medium, and program product
CN109361757A (en) A kind of data transmission method, device and computer readable storage medium
CN107688735B (en) Terminal control method and device, terminal and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191126

Address after: Room 10602, Building 1, Wangjing International Building, Fengcheng Sixth Road, Xi'an Economic and Technological Development Zone, Shaanxi 710000

Patentee after: Shaanxi one intellectual property operation Co., Ltd.

Address before: Taoyuan road Nanshan District Nantou street Shenzhen city Guangdong province 518000 No. 167 South Garden building seven floor No. M

Patentee before: SHENZHEN ZHIHUISHIFANG TECHNOLOGY CO., LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191220

Address after: No.220-319, 2f, science and technology innovation center, No.1 Xiankun Road, Jiangxinzhou, Jianye District, Nanjing, Jiangsu Province

Patentee after: Jiangsu Xinghan Intelligent Information Technology Co., Ltd

Address before: Room 10602, Building 1, Wangjing International Building, Fengcheng Sixth Road, Xi'an Economic and Technological Development Zone, Shaanxi 710000

Patentee before: Shaanxi one intellectual property operation Co., Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method of controlling mobile terminal

Effective date of registration: 20201028

Granted publication date: 20190101

Pledgee: Bank of Jiangsu Limited by Share Ltd. Nanjing Hexi Branch

Pledgor: Jiangsu Xinghan Intelligent Information Technology Co.,Ltd.

Registration number: Y2020980007298