CN106446721A - Intelligent terminal access control method and device - Google Patents
Intelligent terminal access control method and device Download PDFInfo
- Publication number
- CN106446721A CN106446721A CN201610866813.8A CN201610866813A CN106446721A CN 106446721 A CN106446721 A CN 106446721A CN 201610866813 A CN201610866813 A CN 201610866813A CN 106446721 A CN106446721 A CN 106446721A
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- anything
- user
- attending
- unlocking manner
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention relates to an intelligent terminal access control method and device. The method comprises the following steps: after the fact that a user of an intelligent terminal enters a sleep state is monitored, a preset doppelganger system in the intelligent terminal is started; the doppelganger system is a virtual system environment which is divided from the intelligent terminal and independently operated in a user space; when a request for accessing to the intelligent terminal is received, the doppelganger system of the intelligent terminal is controlled to allow accessing, and accessing the other system spaces is forbidden. By adoption of the manner, when the doppelganger system is allowed to be accessed, the other system spaces are forbidden to be accessed, so that the leakage of the user privacies such as personal images, user address lists, contact information in social networks and various payment accounts bound with bank cards is avoided, and the using experience of the users is enhanced.
Description
Technical field
It relates to the access control method of intelligent terminal's technical field, more particularly to intelligent terminal and device.
Background technology
As the popularization of intelligent terminal is used, user can be carried out social activity, shopping, pay etc. by oneself intelligent terminal
Function, intelligent terminal's increasingly secret, based on this, the privacy information of a large number of users is contained on intelligent terminal, for example individual
Associated person information in people's secret image, user communication record, social networkies, all kinds of payment accounts of bank card etc. are bound,
How by technological means, all types of user privacy, always focus in intelligent terminal is protected.
Content of the invention
The embodiment of the present disclosure provides the access control method of intelligent terminal and device.The technical scheme is as follows:
According to the embodiment of the present disclosure in a first aspect, provide a kind of method of intelligent terminal's access control, including:
After the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal default attend to anything else be
System;The system of attending to anything else is the virtual system environment of the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be prohibited attending to anything else for the intelligent terminal
Other systems space is only accessed.
In one embodiment, the other users monitoring of equipment for being associated by the intelligent terminal determines whether user enters
Sleep state;The other users equipment includes:Various wearable devices or the sleep monitor equipment on bed.
In one embodiment, after the user for monitoring intelligent terminal enters sleep state, methods described also includes:
Detect that whether the current unlocking manner of the intelligent terminal is the unlocking manner of the default first kind;
If current unlocking manner is the unlocking manner of the first kind, control the current unlocking manner is updated to pre-
If Second Type unlocking manner;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or
By way of the other users equipment unblock that person is associated by intelligent terminal;The unlocking manner of the Second Type be except the first kind
Other kinds of unlocking manner outside type.
In one embodiment, the control user accesses the system of attending to anything else in intelligent terminal, also includes:
By the default application hides for being related to privacy of user data in the system of attending to anything else;Or
Privacy of user data will be related in the systematic difference program of attending to anything else be set to forbid accessing;Or
Double application programs that opens in the system of attending to anything else are hidden;Double application program for opening be in intelligent terminal
Attend to anything else system and the system of attending to anything else outside while the application program opened.
In one embodiment, methods described also includes:
After the user for monitoring intelligent terminal is changed into wake states from sleep state, control allows to access the intelligence
Terminal other systems space in addition to the system of attending to anything else.
According to the second aspect of the embodiment of the present disclosure, a kind of device of intelligent terminal's access control is provided, including:
Monitoring modular, whether the user for detecting intelligent terminal enters sleep state;
Attend to anything else starting module, for, after the user of the monitoring module monitors to intelligent terminal enters sleep state, opening
Move default system of attending to anything else in the intelligent terminal;The system of attending to anything else is the user's sky for dividing out from intelligent terminal
Between independent operating virtual system environment;
Access control module, for when the access request to intelligent terminal is received, control allows to access the intelligence
Terminal attend to anything else system and forbid access other systems space.
In one embodiment, the monitoring modular, the other users monitoring of equipment for being associated by the intelligent terminal is true
Determine whether user enters sleep state;The other users equipment includes:Various wearable devices or the sleep on bed
Monitoring device.
In one embodiment, also include:
Unlocking manner detection module, for detecting whether the current unlocking manner of the intelligent terminal is the default first kind
Unlocking manner;
Unlocking manner update module, if being the unlocking manner of the first kind for current unlocking manner, controls institute
State the unlocking manner that current unlocking manner is updated to default Second Type;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or
By way of the other users equipment unblock that person is associated by intelligent terminal;The unlocking manner of the Second Type be except the first kind
Other kinds of unlocking manner outside type.
In one embodiment, the access control module, for be related to user hidden by default in the system of attending to anything else
The application hides of private data;Or be set to forbid by privacy of user data are related in the systematic difference program of attending to anything else
Access;Or double application programs that opens in the system of attending to anything else are hidden;Double application program for opening be at intelligent end
The application program that opens while outside attend to anything else system and the system of attending to anything else at end.
In one embodiment, the access control module, is additionally operable to arrive intelligent terminal's when the monitoring module monitors
User is changed into after wake states from sleep state, control allow to access the intelligent terminal in addition to the system of attending to anything else other
System space.
According to the third aspect of the embodiment of the present disclosure, a kind of device of intelligent terminal's access control is provided, including:
Processor;
For storing the memorizer of processor executable command;
Wherein, the processor is configured to:
After the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal default attend to anything else be
System;The system of attending to anything else is the virtual system environment of the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be prohibited attending to anything else for the intelligent terminal
Other systems space is only accessed.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:
Technique scheme, after the user for monitoring intelligent terminal enters sleep state, starts in the intelligent terminal
Default system of attending to anything else;The system of attending to anything else is the virtuality of the user's space independent operating for dividing out from intelligent terminal
System environmentss;When the access request to intelligent terminal is received, control allows the access intelligent terminal's to attend to anything else system simultaneously
Forbid accessing other systems space.Adopt in such a way, while system is attended to anything else in permission access, forbid accessing other systems
Space, it is to avoid such as personal secret image, user communication record, the associated person information in social networkies, bound bank card
The leakage of the privacy of user of all kinds of payment accounts etc., improves the experience of user.
It should be appreciated that above general description and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
Accompanying drawing herein is merged in description and constitutes the part of this specification, shows the enforcement for meeting the disclosure
Example, and be used for together with description explaining the principle of the disclosure.
Fig. 1 is the flow chart of the method for the intelligent terminal's access control according to an exemplary embodiment.
Fig. 2 is the flow chart of the method for the another intelligent terminal's access control according to an exemplary embodiment.
Fig. 3 is the flow chart of the method for the another intelligent terminal's access control according to an exemplary embodiment.
Fig. 4 is the flow chart of the illustration intelligent terminal's access control according to an exemplary embodiment.
Fig. 5 is a kind of block diagram of the device of the intelligent terminal's access control according to an exemplary embodiment.
Fig. 6 is that a kind of intelligent terminal comprising embodiment of the present disclosure offer according to an exemplary embodiment accesses control
The block diagram of the device of system.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by
The example of consistent apparatus and method in terms of some that described in detail in claims, the disclosure.
The technical scheme that the embodiment of the present disclosure is provided, after the user for monitoring intelligent terminal enters sleep state, starts
Default system of attending to anything else in the intelligent terminal;The system of attending to anything else is the user's space for dividing out from intelligent terminal
The virtual system environment of independent operating;When the access request to intelligent terminal is received, control allows to access the intelligence eventually
End attend to anything else system and forbid access other systems space.Adopt in such a way, while system is attended to anything else in permission access, prohibit
Only access other systems space, it is to avoid such as personal secret image, user communication record, the associated person information in social networkies,
The leakage of the privacy of user of all kinds of payment accounts of bank card etc. is bound, has improved the experience of user.
Fig. 1 is a kind of flow chart of the method for the intelligent terminal's access control according to an exemplary embodiment, such as Fig. 1
Shown, said method is used in terminal, comprises the following steps S101-S102:
In step S101, after the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal
Default system of attending to anything else;The system of attending to anything else is the virtuality of the user's space independent operating for dividing out from intelligent terminal
System environmentss.
In step s 102, when the access request to intelligent terminal is received, control allows to access the intelligent terminal
Attend to anything else system and forbid access other systems space.
The system of attending to anything else of above-mentioned intelligent terminal is referred to:Intelligent terminal's system of attending to anything else is personal private space, is not applied to
Other people use.Intelligent terminal system is divided into the virtual system environment of at least two independent operatings, and system of attending to anything else can be by difference
Access request, such as two different unlocking pins, enter two diverse desktops.Here all of application, i.e.,
The data of same application are made all to be entirely isolated, photograph album, desktop layouts, note, wechat etc. are all different, mutually do not do
Relate to;Data among systems of attending to anything else are mutually isolated, encryption storage.
After the user for monitoring intelligent terminal enters sleep state, judge default in intelligent terminal whether to attend to anything else system
(system of attending to anything else for initiating self before user's sleep) is had been started up, if not actuated, starts default system of attending to anything else.When receiving
During to the access request of intelligent terminal, then triggering this request has two kinds of situations, the unconscious maloperation of first user sends
Access request;Its two be in addition to the user other people send access request;When any of the above-described situation occurs, control is allowed
Above-mentioned two situations access intelligent terminal attend to anything else system and forbid access other systems space.
The said method of the embodiment of the present disclosure, is monitoring intelligent terminal user in the state of sleep, by received
Access request, control allows to access system to be forbidden accessing other system spaces attending to anything else for intelligent terminal, avoids so as to reach
The leakage of privacy of user, such as personal secret image, user communication record, the associated person information in social networkies, silver is bound
All kinds of payment accounts of row card etc., improve the experience of user.
In one embodiment, in step S101 monitor intelligent terminal user enter sleep state, be by intelligence
The other users equipment of energy terminal association, the said equipment is interacted powerful to realize by software support and data interaction, high in the clouds
Function, dormant detection signal can be transmitted into intelligent terminal, and also the forging in daily life can be recorded
Refining, diet real time data synchronized update arrives intelligent terminal etc..
Above-mentioned other users equipment includes various wearable devices, and such as Intelligent bracelet (is produced including wrist-watch and wrist strap etc.
Product), intelligent ring, intelligent necklace;Can also be other sleep monitor equipment, for example with foot wearing product (including footwear,
Wearable product on other lower limbs in socks or future), with the glasses of head-mount, the helmet, headband etc., and intelligent clothing, book
All kinds of non-mainstream product form such as bag, crutch, accessories;
Above-mentioned other users equipment can also be the sleep monitor equipment on bed, built-in sleep monitor sensing
Device, can be with comprehensive monitoring sleep quality.The embodiment of the present disclosure is not limited to this.
In one embodiment, after the user for monitoring intelligent terminal enters sleep state, with reference to shown in Fig. 2, above-mentioned
Method also includes:
S201, detect that whether the current unlocking manner of the intelligent terminal is the unlocking manner of the default first kind;
If the current unlocking manner of S202 is the unlocking manner of the first kind, control is by the current unlocking manner more
It is newly the unlocking manner of default Second Type;
In the present embodiment, the unlocking manner of the first kind is:
1. the unlocking manner related to user's own biological feature of intelligent terminal.Biological characteristic is exactly can be with unique identification
The distinctive biological characteristic of each individual, unlocking manner includes:Fingerprint recognition unblock, iris identification are unlocked, personal recognition is unlocked,
Recognition of face unblock, retina identification unblock etc..It can in addition contain be vocal print unblock and writing identification unblock etc..
2. by way of the other users equipment unblock for being associated by intelligent terminal.The various of such as mistake mentioned above are worn
The equipment of wearing is unlocked, and will not be described here.
Intelligent terminal can adopt one or more combination in the unlocking manner of the above-mentioned first kind.
The unlocking manner of Second Type is the various existing unlocking manner in addition to the unlocking manner of the first kind, example
Such as character password, gesture password, pattern password etc..
In one embodiment, above-mentioned control user access in intelligent terminal attend to anything else system the step of, also include several
Situation:
The first:By the default application hides for being related to privacy of user data in the system of attending to anything else;To such as relate to
And private data has bound all kinds of payment account application hides of bank card, can also be user preset comprising privacy
Application hides, such as application program of social class etc..
Second:Privacy of user data will be related in the systematic difference program of attending to anything else be set to forbid accessing;Such as
All kinds of payment account application programs for having bound bank card can be accessed, but the data of the amount of money involved in application program are set to
Forbid access etc..
The third:Double application programs that opens in the system of attending to anything else are hidden;Double application program for opening be
The application program that opens while outside attend to anything else system and the system of attending to anything else of intelligent terminal.
Above-mentioned three kinds of situations can be selected by a kind of, two kinds of combinations or three kinds according to the privacy class that User Defined is arranged
Combination, the embodiment of the present disclosure is not limited to this.
In one embodiment, with reference to shown in Fig. 3, said method also includes:
S103, after the user for monitoring intelligent terminal is changed into wake states from sleep state, control allow access institute
State intelligent terminal other systems space in addition to the system of attending to anything else.
In step s 103, after monitoring that intelligent terminal user is changed into wake states by sleep state, it is believed that user
The intelligent terminal that can draw oneself up or understand that other people use intelligent terminal, allow to access intelligent terminal so as to control
Other systems space in addition to system of attending to anything else.
It is exemplified below, the flow process of the method for intelligent terminal's access control:
With reference to shown in Fig. 4, such as carrying Intelligent bracelet in the wrist of user A, intelligent terminal's phase of Intelligent bracelet and user A
Association, Intelligent bracelet can monitor the sleep state of user A.After monitoring that user A enters sleep state, default point is judged
Whether body system has been switched on, and does not such as open, then intelligent terminal opens and default attends to anything else system and screen locking is unlocked by fingerprint
Unblock or bracelet unblock, being changed to can only numeral unblock or gesture unblock.This when, intelligent terminal for reception to from other people,
The room-mate B of such as A clicks on the operation of unlocking screen equivalent to have issued access request, after B is unlocked by numeral, in intelligent terminal
Default system of attending to anything else has been starting state, B can be allowed to access and system forbid that accessing other is attending to anything else for intelligent terminal
System space.After user A revival is monitored, intelligent terminal thinks the intelligent terminal that A can draw oneself up, and now allows to access intelligence
Can terminal other systems space in addition to system of attending to anything else.Reference flowchart is as follows:
S401, start monitoring;
S402, whether enter sleep state;It is that S403 is then executed, otherwise executes S407;
S403, judge in intelligent terminal, whether default system of attending to anything else has been turned on;It is then S404 to be executed, otherwise executes
S406;
S404, receive the access request to intelligent terminal;Entered by numerical ciphers unblock;
S405, control allow access intelligent terminal attend to anything else system and forbid access other systems space;
Default system of attending to anything else in S406, startup intelligent terminal;
S407, control allow to access intelligent terminal other systems space in addition to system of attending to anything else;
In the present embodiment, intelligent terminal user is being monitored in the state of sleep, the access request for receiving is controlling
Allowing to access and system forbid accessing other system spaces attending to anything else for intelligent terminal, letting out for privacy of user is avoided so as to reach
Leakage, such as personal secret image, user communication record, the associated person information in social networkies, all kinds of payments of bank card are bound
Account etc., improves the experience of user.
Following for disclosure device embodiment, can be used for executing method of disclosure embodiment.
Fig. 5 is a kind of block diagram of the device of the intelligent terminal's access control according to an exemplary embodiment, the device
Can pass through software, hardware or both be implemented in combination with become some or all of of electronic equipment.As shown in figure 5, the dress
Put including:
Monitoring modular 51, whether the user for detecting intelligent terminal enters sleep state;
Starting module of attending to anything else 52, for the user of the monitoring module monitors to intelligent terminal enter sleep state after,
Start default system of attending to anything else in the intelligent terminal;The system of attending to anything else is the user for dividing out from intelligent terminal
The virtual system environment of space independent operating;
Access control module 53, for when the access request to intelligent terminal is received, control allows to access the intelligence
Can terminal attend to anything else system and forbid access other systems space.
In one embodiment, the monitoring modular 51, the other users monitoring of equipment for being associated by the intelligent terminal
Determine whether user enters sleep state;The other users equipment includes:Various wearable devices or sleeping on bed
Dormancy monitoring device.
In one embodiment, with reference to shown in Fig. 5, also include:
Unlocking manner detection module 54, for detecting whether the current unlocking manner of the intelligent terminal is the default first kind
The unlocking manner of type;
Unlocking manner update module 55, if being the unlocking manner of the first kind for current unlocking manner, control will
The current unlocking manner is updated to the unlocking manner of default Second Type;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or
By way of the other users equipment unblock that person is associated by intelligent terminal;The unlocking manner of the Second Type be except the first kind
Other kinds of unlocking manner outside type.
In one embodiment, the access control module 53, for being related to user by default in the system of attending to anything else
The application hides of private data;Or will be related in the systematic difference program of attending to anything else privacy of user data be set to prohibit
Only access;Or double application programs that opens in the system of attending to anything else are hidden;Double application program for opening be in intelligence
The application program that opens while outside attend to anything else system and the system of attending to anything else of terminal.
In one embodiment, the access control module 53, is additionally operable to when the monitoring module monitors are to intelligent terminal
User be changed into after wake states from sleep state, control allow to access the intelligent terminal in addition to the system of attending to anything else its
His system space.
The said apparatus of the embodiment of the present disclosure, are monitoring intelligent terminal user in the state of sleep, by received
Access request, control allows to access system to be forbidden accessing other system spaces attending to anything else for intelligent terminal, avoids so as to reach
The leakage of privacy of user, such as personal secret image, user communication record, the associated person information in social networkies, silver is bound
All kinds of payment accounts of row card etc., improve the experience of user.
According to the third aspect of the embodiment of the present disclosure, a kind of device of intelligent terminal's access control is provided, including:
Processor;
For storing the memorizer of processor executable command;
Wherein, processor is configured to:
After the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal default attend to anything else be
System;The system of attending to anything else is the virtual system environment of the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be prohibited attending to anything else for the intelligent terminal
Other systems space is only accessed.
With regard to the device in above-described embodiment, wherein modules execute the concrete mode of operation in relevant the method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 6 is a kind of block diagram of the device of the intelligent terminal's access control according to an exemplary embodiment, the device
Suitable for terminal unit.For example, device 1200 can be mobile phone, computer, digital broadcast terminal, messaging devices,
Game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
Device 1200 can include following one or more assemblies:Process assembly 1202, memorizer 1204, power supply module
1206, multimedia groupware 1208, audio-frequency assembly 1210, the interface 1212 of input/output (I/O), sensor cluster 1214, and
Communication component 1216.
The integrated operation of 1202 usual control device 1200 of process assembly, such as with display, call, data communication,
The associated operation of camera operation and record operation.Process assembly 1202 can include one or more processors 1220 to execute
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 1202 can include one or more moulds
Block, the interaction being easy between process assembly 1202 and other assemblies.For example, process assembly 1202 can include multi-media module,
To facilitate the interaction between multimedia groupware 1208 and process assembly 1202.
Memorizer 1204 is configured to store various types of data to support the operation in device 1200.These data
Example include on device 1200 operate any application program or method order, contact data, telephone book data,
Message, picture, video etc..Memorizer 1204 can by any kind of volatibility or non-volatile memory device or they
Combination is realized, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Power supply module 1206 provides electric power for the various assemblies of device 1200.Power supply module 1206 can include power management
System, one or more power supplys, and other generate, manage and distribute, with for device 1200, the component that electric power is associated.
Multimedia groupware 1208 includes the screen of one output interface of offer between described device 1200 and user.?
In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel,
Screen may be implemented as touch screen, to receive the input signal from user.Touch panel includes that one or more touch passes
Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip be dynamic
The border of work, but also detect the persistent period related to the touch or slide and pressure.In certain embodiments, many
Media component 1208 includes a front-facing camera and/or post-positioned pick-up head.When equipment 1200 is in operator scheme, mould is such as shot
When formula or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each preposition shooting
Head and post-positioned pick-up head can be the optical lens systems of a fixation or with focusing and optical zoom capabilities.
Audio-frequency assembly 1210 is configured to output and/or input audio signal.For example, audio-frequency assembly 1210 includes a wheat
Gram wind (MIC), when device 1200 is in operator scheme, such as call model, logging mode and speech recognition mode, mike quilt
It is configured to receive external audio signal.The audio signal for being received can be further stored in memorizer 1204 or via communication
Component 1216 sends.In certain embodiments, audio-frequency assembly 1210 also includes a speaker, for exports audio signal.
I/O interface 1212 is to provide interface, above-mentioned peripheral interface module between process assembly 1202 and peripheral interface module
Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and
Locking press button.
Sensor cluster 1214 includes one or more sensors, and the state for providing various aspects for device 1200 is commented
Estimate.For example, sensor cluster 1214 can detect/the closed mode of opening of device 1200, the such as relative localization of component, institute
Display and keypad of the component for device 1200 is stated, sensor cluster 1214 can be with detection means 1200 or device 1,200 1
The position change of individual component, user is presence or absence of with what device 1200 was contacted, 1200 orientation of device or acceleration/deceleration and dress
Put 1200 temperature change.Sensor cluster 1214 can include proximity transducer, be configured to without any physics
The presence of object nearby is detected during contact.Sensor cluster 1214 can also include optical sensor, such as CMOS or ccd image sensing
Device, for used in imaging applications.In certain embodiments, the sensor cluster 1214 can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 1216 is configured to facilitate the communication of wired or wireless way between device 1200 and other equipment.Dress
Put 1200 and can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Exemplary at one
In embodiment, communication component 1216 receives broadcast singal or the broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, the communication component 1216 also includes near-field communication (NFC) module, to promote short distance
Communication.For example, in NFC module, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband can be based on
(UWB) technology, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, device 1200 can be by one or more application specific integrated circuits (ASIC), numeral
Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including ordering, example are additionally provided
Such as include the memorizer 1204 of order, mentioned order can be executed by the processor 1220 of device 1200 to complete said method.Example
Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the order in the storage medium is by the process of device 1200
When device is executed so that the method that device 1200 is able to carry out above-mentioned intelligent terminal's access control, methods described includes:
After the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal default attend to anything else be
System;The system of attending to anything else is the virtual system environment of the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be prohibited attending to anything else for the intelligent terminal
Other systems space is only accessed.
Those skilled in the art will readily occur to its of the disclosure after considering description and putting into practice disclosure disclosed herein
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments be considered only as exemplary, the true scope of the disclosure and spirit by following
Claim is pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (11)
1. a kind of method of intelligent terminal's access control, it is characterised in that include:
After the user for monitoring intelligent terminal enters sleep state, start default system of attending to anything else in the intelligent terminal;Institute
State the virtual system environment that system of attending to anything else is the user's space independence for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be forbidden visiting attending to anything else for the intelligent terminal
Ask other systems space.
2. the method for claim 1, it is characterised in that the other users monitoring of equipment for being associated by the intelligent terminal
Determine whether user enters sleep state;The other users equipment includes:Various wearable devices or sleeping on bed
Dormancy monitoring device.
3. the method for claim 1, it is characterised in that after the user for monitoring intelligent terminal enters sleep state,
Methods described also includes:
Detect that whether the current unlocking manner of the intelligent terminal is the unlocking manner of the default first kind;
If current unlocking manner is the unlocking manner of the first kind, control the current unlocking manner is updated to default
The unlocking manner of Second Type;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or logical
Cross the mode of the other users equipment unblock of intelligent terminal's association;The unlocking manner of the Second Type be except the first kind it
Outer other kinds of unlocking manner.
4. the method as described in any one of claim 1-3, it is characterised in that the control user access in intelligent terminal point
Body system, also includes:
By the default application hides for being related to privacy of user data in the system of attending to anything else;Or
Privacy of user data will be related in the systematic difference program of attending to anything else be set to forbid accessing;Or
Double application programs that opens in the system of attending to anything else are hidden;Double application program for opening is the institute in intelligent terminal
The application program that opens while stating outside attend to anything else system and system of attending to anything else.
5. the method as described in any one of claim 1-3, it is characterised in that methods described also includes:
After the user for monitoring intelligent terminal is changed into wake states from sleep state, control allows to access the intelligent terminal
Other systems space in addition to the system of attending to anything else.
6. a kind of device of intelligent terminal's access control, it is characterised in that include:
Monitoring modular, whether the user for detecting intelligent terminal enters sleep state;
Attend to anything else starting module, for, after the user of the monitoring module monitors to intelligent terminal enters sleep state, starting institute
State default system of attending to anything else in intelligent terminal;The system of attending to anything else is that the user's space for dividing out from intelligent terminal is only
The virtual system environment of vertical operation;
Access control module, for when the access request to intelligent terminal is received, control allows to access the intelligent terminal
Attend to anything else system and forbid access other systems space.
7. device as claimed in claim 6, it is characterised in that the monitoring modular, associated by the intelligent terminal its
His user equipment monitors determine whether user enters sleep state;The other users equipment includes:Various wearable devices or
Sleep monitor equipment on bed.
8. device as claimed in claim 6, it is characterised in that also include:
Unlocking manner detection module, for detecting that whether the current unlocking manner of the intelligent terminal is the solution of the default first kind
Lock mode;
Unlocking manner update module, if for current unlocking manner being the unlocking manner of the first kind, control will described ought
Front unlocking manner is updated to the unlocking manner of default Second Type;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or logical
Cross the mode of the other users equipment unblock of intelligent terminal's association;The unlocking manner of the Second Type be except the first kind it
Outer other kinds of unlocking manner.
9. the device as described in any one of claim 6-8, it is characterised in that the access control module, for by described point
The default application hides for being related to privacy of user data in body system;Or will relate in the systematic difference program of attending to anything else
And privacy of user data are set to forbid accessing;Or double application programs that opens in the system of attending to anything else are hidden;Described
Double application programs that opens are the application program that opens while outside attend to anything else described in intelligent terminal system and system of attending to anything else.
10. the device as described in any one of claim 6-8, it is characterised in that the access control module, is additionally operable to when described
Monitoring module monitors are changed into after wake states to the user of intelligent terminal from sleep state, and control allows to access the intelligence eventually
End other systems space in addition to the system of attending to anything else.
11. a kind of devices of intelligent terminal's access control, it is characterised in that include:
Processor;
For storing the memorizer of processor executable command;
Wherein, the processor is configured to:
After the user for monitoring intelligent terminal enters sleep state, start default system of attending to anything else in the intelligent terminal;Institute
State the virtual system environment that system of attending to anything else is the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be forbidden visiting attending to anything else for the intelligent terminal
Ask other systems space.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610866813.8A CN106446721A (en) | 2016-09-29 | 2016-09-29 | Intelligent terminal access control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610866813.8A CN106446721A (en) | 2016-09-29 | 2016-09-29 | Intelligent terminal access control method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106446721A true CN106446721A (en) | 2017-02-22 |
Family
ID=58171362
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610866813.8A Pending CN106446721A (en) | 2016-09-29 | 2016-09-29 | Intelligent terminal access control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106446721A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391993A (en) * | 2017-07-27 | 2017-11-24 | 深圳市泰衡诺科技有限公司 | A kind of unlocked by fingerprint method and unlocked by fingerprint system based on intelligent terminal |
CN107819933A (en) * | 2017-10-11 | 2018-03-20 | 广东乐心医疗电子股份有限公司 | Message mode adjusting method and device |
CN113032849A (en) * | 2021-03-29 | 2021-06-25 | 北京小米移动软件有限公司 | Data protection method, device, terminal and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104850995A (en) * | 2015-04-27 | 2015-08-19 | 小米科技有限责任公司 | Operation executing method and device |
CN104992091A (en) * | 2015-06-05 | 2015-10-21 | 小米科技有限责任公司 | Method and apparatus for accessing terminal end |
CN105912954A (en) * | 2016-05-16 | 2016-08-31 | 北京珠穆朗玛移动通信有限公司 | Privacy information protection method and system suitable for mobile terminal |
-
2016
- 2016-09-29 CN CN201610866813.8A patent/CN106446721A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104850995A (en) * | 2015-04-27 | 2015-08-19 | 小米科技有限责任公司 | Operation executing method and device |
CN104992091A (en) * | 2015-06-05 | 2015-10-21 | 小米科技有限责任公司 | Method and apparatus for accessing terminal end |
CN105912954A (en) * | 2016-05-16 | 2016-08-31 | 北京珠穆朗玛移动通信有限公司 | Privacy information protection method and system suitable for mobile terminal |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391993A (en) * | 2017-07-27 | 2017-11-24 | 深圳市泰衡诺科技有限公司 | A kind of unlocked by fingerprint method and unlocked by fingerprint system based on intelligent terminal |
CN107819933A (en) * | 2017-10-11 | 2018-03-20 | 广东乐心医疗电子股份有限公司 | Message mode adjusting method and device |
CN113032849A (en) * | 2021-03-29 | 2021-06-25 | 北京小米移动软件有限公司 | Data protection method, device, terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10489769B2 (en) | User device enabling access to payment information in response to mechanical input detection | |
CN104391635B (en) | Solve the device and method of lock screen | |
CN106465458B (en) | method and apparatus for providing notification | |
US9286482B1 (en) | Privacy control based on user recognition | |
US9904774B2 (en) | Method and device for locking file | |
US10198563B2 (en) | Methods and apparatuses for controlling state of terminal screen | |
KR102001913B1 (en) | Mobile Terminal and Operating Method for the Same | |
CN105975828B (en) | Unlocking method and device | |
EP3239913A1 (en) | Method and device for controlling information transmission, and smart terminal | |
CN112330875A (en) | Facilitating transactions with user accounts using wireless devices | |
CN105678133A (en) | Terminal unlocking method and device | |
US20170300260A1 (en) | Method, device and computer-readable storage medium for data migration | |
US20220269800A1 (en) | Privacy protection method for electronic device and electronic device | |
CN103970544B (en) | Access vestige processing method and processing device | |
US20180239915A1 (en) | Methods, apparatuses, and storage mediums for protecting information | |
CN106295294A (en) | Method for controlling mobile terminal and device | |
CN106446721A (en) | Intelligent terminal access control method and device | |
CN106789070A (en) | The decryption method of data, device and terminal | |
EP3904969A1 (en) | Information processing method, wearable electronic device, electronic device and storage medium | |
CN107371222A (en) | Virtual card prohibited method and device | |
CN106385470A (en) | Information push method and device | |
CN112437189A (en) | Identity recognition method, device and medium | |
CN105760796A (en) | Application security processing method and device | |
CN111079112B (en) | Application control method, application control device and storage medium | |
CN110942426B (en) | Image processing method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |