CN106446721A - Intelligent terminal access control method and device - Google Patents

Intelligent terminal access control method and device Download PDF

Info

Publication number
CN106446721A
CN106446721A CN201610866813.8A CN201610866813A CN106446721A CN 106446721 A CN106446721 A CN 106446721A CN 201610866813 A CN201610866813 A CN 201610866813A CN 106446721 A CN106446721 A CN 106446721A
Authority
CN
China
Prior art keywords
intelligent terminal
anything
user
attending
unlocking manner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610866813.8A
Other languages
Chinese (zh)
Inventor
邹易兴
闫晓鹏
张旭华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610866813.8A priority Critical patent/CN106446721A/en
Publication of CN106446721A publication Critical patent/CN106446721A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to an intelligent terminal access control method and device. The method comprises the following steps: after the fact that a user of an intelligent terminal enters a sleep state is monitored, a preset doppelganger system in the intelligent terminal is started; the doppelganger system is a virtual system environment which is divided from the intelligent terminal and independently operated in a user space; when a request for accessing to the intelligent terminal is received, the doppelganger system of the intelligent terminal is controlled to allow accessing, and accessing the other system spaces is forbidden. By adoption of the manner, when the doppelganger system is allowed to be accessed, the other system spaces are forbidden to be accessed, so that the leakage of the user privacies such as personal images, user address lists, contact information in social networks and various payment accounts bound with bank cards is avoided, and the using experience of the users is enhanced.

Description

The access control method of intelligent terminal and device
Technical field
It relates to the access control method of intelligent terminal's technical field, more particularly to intelligent terminal and device.
Background technology
As the popularization of intelligent terminal is used, user can be carried out social activity, shopping, pay etc. by oneself intelligent terminal Function, intelligent terminal's increasingly secret, based on this, the privacy information of a large number of users is contained on intelligent terminal, for example individual Associated person information in people's secret image, user communication record, social networkies, all kinds of payment accounts of bank card etc. are bound, How by technological means, all types of user privacy, always focus in intelligent terminal is protected.
Content of the invention
The embodiment of the present disclosure provides the access control method of intelligent terminal and device.The technical scheme is as follows:
According to the embodiment of the present disclosure in a first aspect, provide a kind of method of intelligent terminal's access control, including:
After the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal default attend to anything else be System;The system of attending to anything else is the virtual system environment of the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be prohibited attending to anything else for the intelligent terminal Other systems space is only accessed.
In one embodiment, the other users monitoring of equipment for being associated by the intelligent terminal determines whether user enters Sleep state;The other users equipment includes:Various wearable devices or the sleep monitor equipment on bed.
In one embodiment, after the user for monitoring intelligent terminal enters sleep state, methods described also includes:
Detect that whether the current unlocking manner of the intelligent terminal is the unlocking manner of the default first kind;
If current unlocking manner is the unlocking manner of the first kind, control the current unlocking manner is updated to pre- If Second Type unlocking manner;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or By way of the other users equipment unblock that person is associated by intelligent terminal;The unlocking manner of the Second Type be except the first kind Other kinds of unlocking manner outside type.
In one embodiment, the control user accesses the system of attending to anything else in intelligent terminal, also includes:
By the default application hides for being related to privacy of user data in the system of attending to anything else;Or
Privacy of user data will be related in the systematic difference program of attending to anything else be set to forbid accessing;Or
Double application programs that opens in the system of attending to anything else are hidden;Double application program for opening be in intelligent terminal Attend to anything else system and the system of attending to anything else outside while the application program opened.
In one embodiment, methods described also includes:
After the user for monitoring intelligent terminal is changed into wake states from sleep state, control allows to access the intelligence Terminal other systems space in addition to the system of attending to anything else.
According to the second aspect of the embodiment of the present disclosure, a kind of device of intelligent terminal's access control is provided, including:
Monitoring modular, whether the user for detecting intelligent terminal enters sleep state;
Attend to anything else starting module, for, after the user of the monitoring module monitors to intelligent terminal enters sleep state, opening Move default system of attending to anything else in the intelligent terminal;The system of attending to anything else is the user's sky for dividing out from intelligent terminal Between independent operating virtual system environment;
Access control module, for when the access request to intelligent terminal is received, control allows to access the intelligence Terminal attend to anything else system and forbid access other systems space.
In one embodiment, the monitoring modular, the other users monitoring of equipment for being associated by the intelligent terminal is true Determine whether user enters sleep state;The other users equipment includes:Various wearable devices or the sleep on bed Monitoring device.
In one embodiment, also include:
Unlocking manner detection module, for detecting whether the current unlocking manner of the intelligent terminal is the default first kind Unlocking manner;
Unlocking manner update module, if being the unlocking manner of the first kind for current unlocking manner, controls institute State the unlocking manner that current unlocking manner is updated to default Second Type;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or By way of the other users equipment unblock that person is associated by intelligent terminal;The unlocking manner of the Second Type be except the first kind Other kinds of unlocking manner outside type.
In one embodiment, the access control module, for be related to user hidden by default in the system of attending to anything else The application hides of private data;Or be set to forbid by privacy of user data are related in the systematic difference program of attending to anything else Access;Or double application programs that opens in the system of attending to anything else are hidden;Double application program for opening be at intelligent end The application program that opens while outside attend to anything else system and the system of attending to anything else at end.
In one embodiment, the access control module, is additionally operable to arrive intelligent terminal's when the monitoring module monitors User is changed into after wake states from sleep state, control allow to access the intelligent terminal in addition to the system of attending to anything else other System space.
According to the third aspect of the embodiment of the present disclosure, a kind of device of intelligent terminal's access control is provided, including:
Processor;
For storing the memorizer of processor executable command;
Wherein, the processor is configured to:
After the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal default attend to anything else be System;The system of attending to anything else is the virtual system environment of the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be prohibited attending to anything else for the intelligent terminal Other systems space is only accessed.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:
Technique scheme, after the user for monitoring intelligent terminal enters sleep state, starts in the intelligent terminal Default system of attending to anything else;The system of attending to anything else is the virtuality of the user's space independent operating for dividing out from intelligent terminal System environmentss;When the access request to intelligent terminal is received, control allows the access intelligent terminal's to attend to anything else system simultaneously Forbid accessing other systems space.Adopt in such a way, while system is attended to anything else in permission access, forbid accessing other systems Space, it is to avoid such as personal secret image, user communication record, the associated person information in social networkies, bound bank card The leakage of the privacy of user of all kinds of payment accounts etc., improves the experience of user.
It should be appreciated that above general description and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
Accompanying drawing herein is merged in description and constitutes the part of this specification, shows the enforcement for meeting the disclosure Example, and be used for together with description explaining the principle of the disclosure.
Fig. 1 is the flow chart of the method for the intelligent terminal's access control according to an exemplary embodiment.
Fig. 2 is the flow chart of the method for the another intelligent terminal's access control according to an exemplary embodiment.
Fig. 3 is the flow chart of the method for the another intelligent terminal's access control according to an exemplary embodiment.
Fig. 4 is the flow chart of the illustration intelligent terminal's access control according to an exemplary embodiment.
Fig. 5 is a kind of block diagram of the device of the intelligent terminal's access control according to an exemplary embodiment.
Fig. 6 is that a kind of intelligent terminal comprising embodiment of the present disclosure offer according to an exemplary embodiment accesses control The block diagram of the device of system.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by The example of consistent apparatus and method in terms of some that described in detail in claims, the disclosure.
The technical scheme that the embodiment of the present disclosure is provided, after the user for monitoring intelligent terminal enters sleep state, starts Default system of attending to anything else in the intelligent terminal;The system of attending to anything else is the user's space for dividing out from intelligent terminal The virtual system environment of independent operating;When the access request to intelligent terminal is received, control allows to access the intelligence eventually End attend to anything else system and forbid access other systems space.Adopt in such a way, while system is attended to anything else in permission access, prohibit Only access other systems space, it is to avoid such as personal secret image, user communication record, the associated person information in social networkies, The leakage of the privacy of user of all kinds of payment accounts of bank card etc. is bound, has improved the experience of user.
Fig. 1 is a kind of flow chart of the method for the intelligent terminal's access control according to an exemplary embodiment, such as Fig. 1 Shown, said method is used in terminal, comprises the following steps S101-S102:
In step S101, after the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal Default system of attending to anything else;The system of attending to anything else is the virtuality of the user's space independent operating for dividing out from intelligent terminal System environmentss.
In step s 102, when the access request to intelligent terminal is received, control allows to access the intelligent terminal Attend to anything else system and forbid access other systems space.
The system of attending to anything else of above-mentioned intelligent terminal is referred to:Intelligent terminal's system of attending to anything else is personal private space, is not applied to Other people use.Intelligent terminal system is divided into the virtual system environment of at least two independent operatings, and system of attending to anything else can be by difference Access request, such as two different unlocking pins, enter two diverse desktops.Here all of application, i.e., The data of same application are made all to be entirely isolated, photograph album, desktop layouts, note, wechat etc. are all different, mutually do not do Relate to;Data among systems of attending to anything else are mutually isolated, encryption storage.
After the user for monitoring intelligent terminal enters sleep state, judge default in intelligent terminal whether to attend to anything else system (system of attending to anything else for initiating self before user's sleep) is had been started up, if not actuated, starts default system of attending to anything else.When receiving During to the access request of intelligent terminal, then triggering this request has two kinds of situations, the unconscious maloperation of first user sends Access request;Its two be in addition to the user other people send access request;When any of the above-described situation occurs, control is allowed Above-mentioned two situations access intelligent terminal attend to anything else system and forbid access other systems space.
The said method of the embodiment of the present disclosure, is monitoring intelligent terminal user in the state of sleep, by received Access request, control allows to access system to be forbidden accessing other system spaces attending to anything else for intelligent terminal, avoids so as to reach The leakage of privacy of user, such as personal secret image, user communication record, the associated person information in social networkies, silver is bound All kinds of payment accounts of row card etc., improve the experience of user.
In one embodiment, in step S101 monitor intelligent terminal user enter sleep state, be by intelligence The other users equipment of energy terminal association, the said equipment is interacted powerful to realize by software support and data interaction, high in the clouds Function, dormant detection signal can be transmitted into intelligent terminal, and also the forging in daily life can be recorded Refining, diet real time data synchronized update arrives intelligent terminal etc..
Above-mentioned other users equipment includes various wearable devices, and such as Intelligent bracelet (is produced including wrist-watch and wrist strap etc. Product), intelligent ring, intelligent necklace;Can also be other sleep monitor equipment, for example with foot wearing product (including footwear, Wearable product on other lower limbs in socks or future), with the glasses of head-mount, the helmet, headband etc., and intelligent clothing, book All kinds of non-mainstream product form such as bag, crutch, accessories;
Above-mentioned other users equipment can also be the sleep monitor equipment on bed, built-in sleep monitor sensing Device, can be with comprehensive monitoring sleep quality.The embodiment of the present disclosure is not limited to this.
In one embodiment, after the user for monitoring intelligent terminal enters sleep state, with reference to shown in Fig. 2, above-mentioned Method also includes:
S201, detect that whether the current unlocking manner of the intelligent terminal is the unlocking manner of the default first kind;
If the current unlocking manner of S202 is the unlocking manner of the first kind, control is by the current unlocking manner more It is newly the unlocking manner of default Second Type;
In the present embodiment, the unlocking manner of the first kind is:
1. the unlocking manner related to user's own biological feature of intelligent terminal.Biological characteristic is exactly can be with unique identification The distinctive biological characteristic of each individual, unlocking manner includes:Fingerprint recognition unblock, iris identification are unlocked, personal recognition is unlocked, Recognition of face unblock, retina identification unblock etc..It can in addition contain be vocal print unblock and writing identification unblock etc..
2. by way of the other users equipment unblock for being associated by intelligent terminal.The various of such as mistake mentioned above are worn The equipment of wearing is unlocked, and will not be described here.
Intelligent terminal can adopt one or more combination in the unlocking manner of the above-mentioned first kind.
The unlocking manner of Second Type is the various existing unlocking manner in addition to the unlocking manner of the first kind, example Such as character password, gesture password, pattern password etc..
In one embodiment, above-mentioned control user access in intelligent terminal attend to anything else system the step of, also include several Situation:
The first:By the default application hides for being related to privacy of user data in the system of attending to anything else;To such as relate to And private data has bound all kinds of payment account application hides of bank card, can also be user preset comprising privacy Application hides, such as application program of social class etc..
Second:Privacy of user data will be related in the systematic difference program of attending to anything else be set to forbid accessing;Such as All kinds of payment account application programs for having bound bank card can be accessed, but the data of the amount of money involved in application program are set to Forbid access etc..
The third:Double application programs that opens in the system of attending to anything else are hidden;Double application program for opening be The application program that opens while outside attend to anything else system and the system of attending to anything else of intelligent terminal.
Above-mentioned three kinds of situations can be selected by a kind of, two kinds of combinations or three kinds according to the privacy class that User Defined is arranged Combination, the embodiment of the present disclosure is not limited to this.
In one embodiment, with reference to shown in Fig. 3, said method also includes:
S103, after the user for monitoring intelligent terminal is changed into wake states from sleep state, control allow access institute State intelligent terminal other systems space in addition to the system of attending to anything else.
In step s 103, after monitoring that intelligent terminal user is changed into wake states by sleep state, it is believed that user The intelligent terminal that can draw oneself up or understand that other people use intelligent terminal, allow to access intelligent terminal so as to control Other systems space in addition to system of attending to anything else.
It is exemplified below, the flow process of the method for intelligent terminal's access control:
With reference to shown in Fig. 4, such as carrying Intelligent bracelet in the wrist of user A, intelligent terminal's phase of Intelligent bracelet and user A Association, Intelligent bracelet can monitor the sleep state of user A.After monitoring that user A enters sleep state, default point is judged Whether body system has been switched on, and does not such as open, then intelligent terminal opens and default attends to anything else system and screen locking is unlocked by fingerprint Unblock or bracelet unblock, being changed to can only numeral unblock or gesture unblock.This when, intelligent terminal for reception to from other people, The room-mate B of such as A clicks on the operation of unlocking screen equivalent to have issued access request, after B is unlocked by numeral, in intelligent terminal Default system of attending to anything else has been starting state, B can be allowed to access and system forbid that accessing other is attending to anything else for intelligent terminal System space.After user A revival is monitored, intelligent terminal thinks the intelligent terminal that A can draw oneself up, and now allows to access intelligence Can terminal other systems space in addition to system of attending to anything else.Reference flowchart is as follows:
S401, start monitoring;
S402, whether enter sleep state;It is that S403 is then executed, otherwise executes S407;
S403, judge in intelligent terminal, whether default system of attending to anything else has been turned on;It is then S404 to be executed, otherwise executes S406;
S404, receive the access request to intelligent terminal;Entered by numerical ciphers unblock;
S405, control allow access intelligent terminal attend to anything else system and forbid access other systems space;
Default system of attending to anything else in S406, startup intelligent terminal;
S407, control allow to access intelligent terminal other systems space in addition to system of attending to anything else;
In the present embodiment, intelligent terminal user is being monitored in the state of sleep, the access request for receiving is controlling Allowing to access and system forbid accessing other system spaces attending to anything else for intelligent terminal, letting out for privacy of user is avoided so as to reach Leakage, such as personal secret image, user communication record, the associated person information in social networkies, all kinds of payments of bank card are bound Account etc., improves the experience of user.
Following for disclosure device embodiment, can be used for executing method of disclosure embodiment.
Fig. 5 is a kind of block diagram of the device of the intelligent terminal's access control according to an exemplary embodiment, the device Can pass through software, hardware or both be implemented in combination with become some or all of of electronic equipment.As shown in figure 5, the dress Put including:
Monitoring modular 51, whether the user for detecting intelligent terminal enters sleep state;
Starting module of attending to anything else 52, for the user of the monitoring module monitors to intelligent terminal enter sleep state after, Start default system of attending to anything else in the intelligent terminal;The system of attending to anything else is the user for dividing out from intelligent terminal The virtual system environment of space independent operating;
Access control module 53, for when the access request to intelligent terminal is received, control allows to access the intelligence Can terminal attend to anything else system and forbid access other systems space.
In one embodiment, the monitoring modular 51, the other users monitoring of equipment for being associated by the intelligent terminal Determine whether user enters sleep state;The other users equipment includes:Various wearable devices or sleeping on bed Dormancy monitoring device.
In one embodiment, with reference to shown in Fig. 5, also include:
Unlocking manner detection module 54, for detecting whether the current unlocking manner of the intelligent terminal is the default first kind The unlocking manner of type;
Unlocking manner update module 55, if being the unlocking manner of the first kind for current unlocking manner, control will The current unlocking manner is updated to the unlocking manner of default Second Type;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or By way of the other users equipment unblock that person is associated by intelligent terminal;The unlocking manner of the Second Type be except the first kind Other kinds of unlocking manner outside type.
In one embodiment, the access control module 53, for being related to user by default in the system of attending to anything else The application hides of private data;Or will be related in the systematic difference program of attending to anything else privacy of user data be set to prohibit Only access;Or double application programs that opens in the system of attending to anything else are hidden;Double application program for opening be in intelligence The application program that opens while outside attend to anything else system and the system of attending to anything else of terminal.
In one embodiment, the access control module 53, is additionally operable to when the monitoring module monitors are to intelligent terminal User be changed into after wake states from sleep state, control allow to access the intelligent terminal in addition to the system of attending to anything else its His system space.
The said apparatus of the embodiment of the present disclosure, are monitoring intelligent terminal user in the state of sleep, by received Access request, control allows to access system to be forbidden accessing other system spaces attending to anything else for intelligent terminal, avoids so as to reach The leakage of privacy of user, such as personal secret image, user communication record, the associated person information in social networkies, silver is bound All kinds of payment accounts of row card etc., improve the experience of user.
According to the third aspect of the embodiment of the present disclosure, a kind of device of intelligent terminal's access control is provided, including:
Processor;
For storing the memorizer of processor executable command;
Wherein, processor is configured to:
After the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal default attend to anything else be System;The system of attending to anything else is the virtual system environment of the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be prohibited attending to anything else for the intelligent terminal Other systems space is only accessed.
With regard to the device in above-described embodiment, wherein modules execute the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 6 is a kind of block diagram of the device of the intelligent terminal's access control according to an exemplary embodiment, the device Suitable for terminal unit.For example, device 1200 can be mobile phone, computer, digital broadcast terminal, messaging devices, Game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
Device 1200 can include following one or more assemblies:Process assembly 1202, memorizer 1204, power supply module 1206, multimedia groupware 1208, audio-frequency assembly 1210, the interface 1212 of input/output (I/O), sensor cluster 1214, and Communication component 1216.
The integrated operation of 1202 usual control device 1200 of process assembly, such as with display, call, data communication, The associated operation of camera operation and record operation.Process assembly 1202 can include one or more processors 1220 to execute Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 1202 can include one or more moulds Block, the interaction being easy between process assembly 1202 and other assemblies.For example, process assembly 1202 can include multi-media module, To facilitate the interaction between multimedia groupware 1208 and process assembly 1202.
Memorizer 1204 is configured to store various types of data to support the operation in device 1200.These data Example include on device 1200 operate any application program or method order, contact data, telephone book data, Message, picture, video etc..Memorizer 1204 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 1206 provides electric power for the various assemblies of device 1200.Power supply module 1206 can include power management System, one or more power supplys, and other generate, manage and distribute, with for device 1200, the component that electric power is associated.
Multimedia groupware 1208 includes the screen of one output interface of offer between described device 1200 and user.? In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive the input signal from user.Touch panel includes that one or more touch passes Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip be dynamic The border of work, but also detect the persistent period related to the touch or slide and pressure.In certain embodiments, many Media component 1208 includes a front-facing camera and/or post-positioned pick-up head.When equipment 1200 is in operator scheme, mould is such as shot When formula or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each preposition shooting Head and post-positioned pick-up head can be the optical lens systems of a fixation or with focusing and optical zoom capabilities.
Audio-frequency assembly 1210 is configured to output and/or input audio signal.For example, audio-frequency assembly 1210 includes a wheat Gram wind (MIC), when device 1200 is in operator scheme, such as call model, logging mode and speech recognition mode, mike quilt It is configured to receive external audio signal.The audio signal for being received can be further stored in memorizer 1204 or via communication Component 1216 sends.In certain embodiments, audio-frequency assembly 1210 also includes a speaker, for exports audio signal.
I/O interface 1212 is to provide interface, above-mentioned peripheral interface module between process assembly 1202 and peripheral interface module Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and Locking press button.
Sensor cluster 1214 includes one or more sensors, and the state for providing various aspects for device 1200 is commented Estimate.For example, sensor cluster 1214 can detect/the closed mode of opening of device 1200, the such as relative localization of component, institute Display and keypad of the component for device 1200 is stated, sensor cluster 1214 can be with detection means 1200 or device 1,200 1 The position change of individual component, user is presence or absence of with what device 1200 was contacted, 1200 orientation of device or acceleration/deceleration and dress Put 1200 temperature change.Sensor cluster 1214 can include proximity transducer, be configured to without any physics The presence of object nearby is detected during contact.Sensor cluster 1214 can also include optical sensor, such as CMOS or ccd image sensing Device, for used in imaging applications.In certain embodiments, the sensor cluster 1214 can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 1216 is configured to facilitate the communication of wired or wireless way between device 1200 and other equipment.Dress Put 1200 and can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Exemplary at one In embodiment, communication component 1216 receives broadcast singal or the broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1216 also includes near-field communication (NFC) module, to promote short distance Communication.For example, in NFC module, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband can be based on (UWB) technology, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, device 1200 can be by one or more application specific integrated circuits (ASIC), numeral Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including ordering, example are additionally provided Such as include the memorizer 1204 of order, mentioned order can be executed by the processor 1220 of device 1200 to complete said method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the order in the storage medium is by the process of device 1200 When device is executed so that the method that device 1200 is able to carry out above-mentioned intelligent terminal's access control, methods described includes:
After the user for monitoring intelligent terminal enters sleep state, start in the intelligent terminal default attend to anything else be System;The system of attending to anything else is the virtual system environment of the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be prohibited attending to anything else for the intelligent terminal Other systems space is only accessed.
Those skilled in the art will readily occur to its of the disclosure after considering description and putting into practice disclosure disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments be considered only as exemplary, the true scope of the disclosure and spirit by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (11)

1. a kind of method of intelligent terminal's access control, it is characterised in that include:
After the user for monitoring intelligent terminal enters sleep state, start default system of attending to anything else in the intelligent terminal;Institute State the virtual system environment that system of attending to anything else is the user's space independence for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be forbidden visiting attending to anything else for the intelligent terminal Ask other systems space.
2. the method for claim 1, it is characterised in that the other users monitoring of equipment for being associated by the intelligent terminal Determine whether user enters sleep state;The other users equipment includes:Various wearable devices or sleeping on bed Dormancy monitoring device.
3. the method for claim 1, it is characterised in that after the user for monitoring intelligent terminal enters sleep state, Methods described also includes:
Detect that whether the current unlocking manner of the intelligent terminal is the unlocking manner of the default first kind;
If current unlocking manner is the unlocking manner of the first kind, control the current unlocking manner is updated to default The unlocking manner of Second Type;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or logical Cross the mode of the other users equipment unblock of intelligent terminal's association;The unlocking manner of the Second Type be except the first kind it Outer other kinds of unlocking manner.
4. the method as described in any one of claim 1-3, it is characterised in that the control user access in intelligent terminal point Body system, also includes:
By the default application hides for being related to privacy of user data in the system of attending to anything else;Or
Privacy of user data will be related in the systematic difference program of attending to anything else be set to forbid accessing;Or
Double application programs that opens in the system of attending to anything else are hidden;Double application program for opening is the institute in intelligent terminal The application program that opens while stating outside attend to anything else system and system of attending to anything else.
5. the method as described in any one of claim 1-3, it is characterised in that methods described also includes:
After the user for monitoring intelligent terminal is changed into wake states from sleep state, control allows to access the intelligent terminal Other systems space in addition to the system of attending to anything else.
6. a kind of device of intelligent terminal's access control, it is characterised in that include:
Monitoring modular, whether the user for detecting intelligent terminal enters sleep state;
Attend to anything else starting module, for, after the user of the monitoring module monitors to intelligent terminal enters sleep state, starting institute State default system of attending to anything else in intelligent terminal;The system of attending to anything else is that the user's space for dividing out from intelligent terminal is only The virtual system environment of vertical operation;
Access control module, for when the access request to intelligent terminal is received, control allows to access the intelligent terminal Attend to anything else system and forbid access other systems space.
7. device as claimed in claim 6, it is characterised in that the monitoring modular, associated by the intelligent terminal its His user equipment monitors determine whether user enters sleep state;The other users equipment includes:Various wearable devices or Sleep monitor equipment on bed.
8. device as claimed in claim 6, it is characterised in that also include:
Unlocking manner detection module, for detecting that whether the current unlocking manner of the intelligent terminal is the solution of the default first kind Lock mode;
Unlocking manner update module, if for current unlocking manner being the unlocking manner of the first kind, control will described ought Front unlocking manner is updated to the unlocking manner of default Second Type;
The unlocking manner of the first kind is:The unlocking manner related to user's own biological feature of intelligent terminal or logical Cross the mode of the other users equipment unblock of intelligent terminal's association;The unlocking manner of the Second Type be except the first kind it Outer other kinds of unlocking manner.
9. the device as described in any one of claim 6-8, it is characterised in that the access control module, for by described point The default application hides for being related to privacy of user data in body system;Or will relate in the systematic difference program of attending to anything else And privacy of user data are set to forbid accessing;Or double application programs that opens in the system of attending to anything else are hidden;Described Double application programs that opens are the application program that opens while outside attend to anything else described in intelligent terminal system and system of attending to anything else.
10. the device as described in any one of claim 6-8, it is characterised in that the access control module, is additionally operable to when described Monitoring module monitors are changed into after wake states to the user of intelligent terminal from sleep state, and control allows to access the intelligence eventually End other systems space in addition to the system of attending to anything else.
11. a kind of devices of intelligent terminal's access control, it is characterised in that include:
Processor;
For storing the memorizer of processor executable command;
Wherein, the processor is configured to:
After the user for monitoring intelligent terminal enters sleep state, start default system of attending to anything else in the intelligent terminal;Institute State the virtual system environment that system of attending to anything else is the user's space independent operating for dividing out from intelligent terminal;
When the access request to intelligent terminal is received, control allows to access system to be forbidden visiting attending to anything else for the intelligent terminal Ask other systems space.
CN201610866813.8A 2016-09-29 2016-09-29 Intelligent terminal access control method and device Pending CN106446721A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610866813.8A CN106446721A (en) 2016-09-29 2016-09-29 Intelligent terminal access control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610866813.8A CN106446721A (en) 2016-09-29 2016-09-29 Intelligent terminal access control method and device

Publications (1)

Publication Number Publication Date
CN106446721A true CN106446721A (en) 2017-02-22

Family

ID=58171362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610866813.8A Pending CN106446721A (en) 2016-09-29 2016-09-29 Intelligent terminal access control method and device

Country Status (1)

Country Link
CN (1) CN106446721A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391993A (en) * 2017-07-27 2017-11-24 深圳市泰衡诺科技有限公司 A kind of unlocked by fingerprint method and unlocked by fingerprint system based on intelligent terminal
CN107819933A (en) * 2017-10-11 2018-03-20 广东乐心医疗电子股份有限公司 Message mode adjusting method and device
CN113032849A (en) * 2021-03-29 2021-06-25 北京小米移动软件有限公司 Data protection method, device, terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850995A (en) * 2015-04-27 2015-08-19 小米科技有限责任公司 Operation executing method and device
CN104992091A (en) * 2015-06-05 2015-10-21 小米科技有限责任公司 Method and apparatus for accessing terminal end
CN105912954A (en) * 2016-05-16 2016-08-31 北京珠穆朗玛移动通信有限公司 Privacy information protection method and system suitable for mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850995A (en) * 2015-04-27 2015-08-19 小米科技有限责任公司 Operation executing method and device
CN104992091A (en) * 2015-06-05 2015-10-21 小米科技有限责任公司 Method and apparatus for accessing terminal end
CN105912954A (en) * 2016-05-16 2016-08-31 北京珠穆朗玛移动通信有限公司 Privacy information protection method and system suitable for mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391993A (en) * 2017-07-27 2017-11-24 深圳市泰衡诺科技有限公司 A kind of unlocked by fingerprint method and unlocked by fingerprint system based on intelligent terminal
CN107819933A (en) * 2017-10-11 2018-03-20 广东乐心医疗电子股份有限公司 Message mode adjusting method and device
CN113032849A (en) * 2021-03-29 2021-06-25 北京小米移动软件有限公司 Data protection method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
US10489769B2 (en) User device enabling access to payment information in response to mechanical input detection
CN104391635B (en) Solve the device and method of lock screen
CN106465458B (en) method and apparatus for providing notification
US9286482B1 (en) Privacy control based on user recognition
US9904774B2 (en) Method and device for locking file
US10198563B2 (en) Methods and apparatuses for controlling state of terminal screen
KR102001913B1 (en) Mobile Terminal and Operating Method for the Same
CN105975828B (en) Unlocking method and device
EP3239913A1 (en) Method and device for controlling information transmission, and smart terminal
CN112330875A (en) Facilitating transactions with user accounts using wireless devices
CN105678133A (en) Terminal unlocking method and device
US20170300260A1 (en) Method, device and computer-readable storage medium for data migration
US20220269800A1 (en) Privacy protection method for electronic device and electronic device
CN103970544B (en) Access vestige processing method and processing device
US20180239915A1 (en) Methods, apparatuses, and storage mediums for protecting information
CN106295294A (en) Method for controlling mobile terminal and device
CN106446721A (en) Intelligent terminal access control method and device
CN106789070A (en) The decryption method of data, device and terminal
EP3904969A1 (en) Information processing method, wearable electronic device, electronic device and storage medium
CN107371222A (en) Virtual card prohibited method and device
CN106385470A (en) Information push method and device
CN112437189A (en) Identity recognition method, device and medium
CN105760796A (en) Application security processing method and device
CN111079112B (en) Application control method, application control device and storage medium
CN110942426B (en) Image processing method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222