CN106487516A - A kind of method of the multi-user management of mobile terminal and its device - Google Patents
A kind of method of the multi-user management of mobile terminal and its device Download PDFInfo
- Publication number
- CN106487516A CN106487516A CN201610868512.9A CN201610868512A CN106487516A CN 106487516 A CN106487516 A CN 106487516A CN 201610868512 A CN201610868512 A CN 201610868512A CN 106487516 A CN106487516 A CN 106487516A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- mobile terminal
- phone users
- user
- user right
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Abstract
The embodiment of the present invention provides a kind of method of the multi-user management of mobile terminal and its device, is related to technical field of mobile terminals.Methods described, including:The mobile phone users are carried out with iris recognition, obtains the identity characteristic of the mobile phone users;The identity database that prestores of inquiry, obtains the corresponding user right of identity characteristic of the mobile phone users;Limit the mobile phone users to operate the mobile terminal in the range of the user right.The embodiment of the present invention provides different access rights, improves the security that mobile terminal is used according to iris recognition, the multiple users to mobile terminal.
Description
Technical field
The present embodiments relate to technical field of mobile terminals, more particularly to a kind of side of the multi-user management of mobile terminal
Method and its device.
Background technology
The mobile terminals such as mobile phone have become the carry-on essential items of people, and it helps people to link up with other people whenever and wherever possible.
Also, with intelligent mobile terminal technology develop, its no longer be people communication tool, but become people work,
Amusement, social maincenter.
But, mobile terminal usually departs from user at one's side, is such as obtained in order to play game, watch animated films by children, so as to
Children's vision is damaged, children are likely to affect the normal use of mobile phone users to the faulty operation of mobile terminal.
Therefore, how to mobile terminal multi-user becomes the technology of urgent need to resolve in prior art using being managed
Problem.
Content of the invention
In view of this, the embodiment of the present invention provides a kind of method of the multi-user management of mobile terminal and its device, its root
According to iris recognition, the multiple users to mobile terminal provide different access rights, improve the security that mobile terminal is used.
The embodiment of the present invention provides a kind of method of the multi-user management of mobile terminal, including:
The mobile phone users are carried out with iris recognition, obtains the identity characteristic of the mobile phone users;
The identity database that prestores of inquiry, obtains the corresponding user right of identity characteristic of the mobile phone users;
Limit the mobile phone users to operate the mobile terminal in the range of the user right.
In one specific embodiment of the present invention, the user right includes:User accesses the authority of each application program.
In one specific embodiment of the present invention, the user right also includes:User is operated to the mobile terminal
Duration limit, and/or open screen locking number of times limit.
In one specific embodiment of the present invention, the user also authority includes:
The operation duration of user is reset according to predetermined period, and/or opens screen locking number of times.
In one specific embodiment of the present invention, described to limit the mobile phone users right in the range of the user right
The mobile terminal carries out operation to be included:
As the mobile phone users are operated to the mobile terminal in the user right scope, then permit described
Mobile phone users are operated to the mobile terminal;
As described in the mobile phone users exceed, user right scope is operated to the mobile terminal, then carried
Show, and forbid that the mobile phone users are operated to the mobile terminal.
Corresponding said method, the present invention also provide a kind of device of the multi-user management of mobile terminal, including:
Identity obtains module, for the mobile phone users are carried out with iris recognition, obtains the mobile phone users
Identity characteristic;
Identity query module, for inquiring about the identity database for prestoring, obtains the identity characteristic of the mobile phone users
Corresponding user right;
Operational control module, for limiting the mobile phone users to described mobile whole in the range of the user right
End is operated.
In one specific embodiment of the present invention, the user right includes:User accesses the authority of each application program.
In one specific embodiment of the present invention, the user right also includes:User is operated to the mobile terminal
Duration limit, and/or open screen locking number of times limit.
In one specific embodiment of the present invention, the user right also includes:
The operation duration of user is reset according to predetermined period, and/or opens screen locking number of times.
In one specific embodiment of the present invention, the operational control module includes:
Operation licence units, for entering to the mobile terminal in the user right scope when the mobile phone users
Row operation, then permit that the mobile phone users are operated to the mobile terminal;
Attendant exclusion unit, for when the mobile phone users beyond the user right scope to the mobile terminal
Operated, then pointed out, and forbidden that the mobile phone users are operated to the mobile terminal.
From above technical scheme, the embodiment of the present invention obtains the mobile phone users using iris recognition technology
Identity characteristic, inquires about the identity database that prestores, obtains the corresponding user right of identity characteristic of the mobile phone users.This
Inventive embodiments limit the mobile phone users and the mobile terminal are operated in the range of the user right, it is to avoid
The mobile phone users such as children operate the inpairment of vision and maloperation that described mobile terminal causes beyond its user right.Cause
This, the embodiment of the present invention improves the safety in utilization of the mobile terminal, improves Consumer's Experience.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Accompanying drawing to be used needed for technology description is had to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments described in inventive embodiments, for those of ordinary skill in the art, can also obtain according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is the structural representation of the mobile terminal of embodiment of the present invention application;
Fig. 2 is a kind of flow chart of one embodiment of multi-user management method of mobile terminal of the present invention;
Fig. 3 is the flow chart of mono- embodiment of step S3 in a kind of multi-user management method of mobile terminal of the present invention;
Fig. 4 is a kind of structural representation of one embodiment of multi-user management device of mobile terminal of the present invention;
Fig. 5 be a kind of mobile terminal of the present invention multi-user management device in the structure of one embodiment of operational control module show
It is intended to;
Fig. 6 is the method flow diagram of multi-user management in one application scenarios of the embodiment of the present invention.
Specific embodiment
The embodiment of the present invention obtains the identity characteristic of the mobile phone users using iris recognition technology, and inquiry prestores
Identity database, obtains the corresponding user right of identity characteristic of the mobile phone users.The embodiment of the present invention limits described
Mobile phone users are operated to the mobile terminal in the range of the user right, it is to avoid the mobile terminal such as children is used
Inpairment of vision and maloperation that family is caused beyond its described mobile terminal of user right operation.Therefore, the embodiment of the present invention is improved
The safety in utilization of the mobile terminal, improves Consumer's Experience.
Certainly, the arbitrary technical scheme for implementing the embodiment of the present invention must be not necessarily required to while reaching above all excellent
Point.
In order that those skilled in the art more fully understand the technical scheme in the embodiment of the present invention, below in conjunction with the present invention
Accompanying drawing in embodiment, is clearly and completely described to the technical scheme in the embodiment of the present invention, it is clear that described reality
It is only a part of embodiment of the embodiment of the present invention to apply example, rather than whole embodiments.Based on the enforcement in the embodiment of the present invention
Example, the every other embodiment obtained by those of ordinary skill in the art, should all belong to the scope of embodiment of the present invention protection.
The embodiment of the present invention is further illustrated with reference to embodiment of the present invention accompanying drawing to implement.
The embodiment of the present invention provides a kind of method of the multi-user management of mobile terminal, and the mobile terminal can be intelligence
Mobile phone, PAD etc..
Referring to Fig. 1, the mobile terminal 1 is generally included:Main control chip 11, memory 12, input/output unit 13 and
Other hardware 14.The main control chip 11 controls each functional module, and memory 12 stores each application program data.
Referring to Fig. 2, methods described includes:
S1, the mobile phone users are carried out with iris recognition, obtain the identity characteristic of the mobile phone users.
Iris recognition technology is to carry out identification based on the iris in eyes, is applied to security device (such as gate inhibition etc.),
And have the place of highly confidential demand.
The eye structure of people is made up of the part such as sclera, iris, pupil crystalline lens, retina.Iris be positioned at black pupil
Annular formations between hole and white sclera, its include much interlaced spot, filament, coronal, striped, crypts etc.
Minutia.And iris is after prenatal development stage is formed, will be to maintain in whole life course constant.These are special
The uniqueness for determining iris feature is levied, while also determining the uniqueness of identification.Therefore, it can the iris of eyes is special
Levy the identification object as everyone.
Iris recognition is exactly to determine the identity of people by contrasting the similitude between iris image feature.Iris recognition
In general the process of technology includes following four steps:
1. iris image acquisition
The whole eye of people is shot using specific apparatus for making a video recording, and the image transmitting for photographing is known to iris
The image preprocessing software of other system.
2. Image semantic classification
Iris image to getting is handled as follows so as to meet the demand for extracting iris feature.
Iris Location:Determine inner circle, cylindrical and conic section position in the picture.Wherein, inner circle is iris and pupil
Border, the cylindrical border for iris and sclera, conic section are the border of iris and upper lower eyelid.
Iris image is normalized:By the iris size in image, the fixed dimension of identifying system setting is adjusted to.
Image enhaucament:For the image after normalization, brightness, contrast and smoothness etc. reason is carried out, is improved in image
The discrimination of iris information.
3. feature extraction
Characteristic point needed for iris recognition is extracted from iris image using specific algorithm, and which is encoded.
4. characteristic matching
The feature coding that feature extraction is obtained is mated one by one with the iris image feature coding in database, is judged whether
For identical iris, so as to reach the purpose of identification.
The embodiment of the present invention utilizes iris recognition technology, obtains the identity characteristic of the mobile phone users, reality of the present invention
Apply the identity that example characterizes the mobile phone users by the identity characteristic of the mobile phone users.
S2, the identity database that prestores of inquiry, obtain the corresponding user right of identity characteristic of the mobile phone users.
Mobile terminal described in the embodiment of the present invention can arrange the use of each user identity feature corresponding by input instruction
Family authority.
In the embodiment of the present invention one is implemented, the user right includes:User accesses the authority of each application program.
That is, described mobile terminal can arrange corresponding certain user's identity characteristic, and which has the authority for accessing application-specific.
For example, shown in table one.
Table one
For example, corresponding child user identity characteristic, its do not have user's power of operation Fishing game, Need For Speed game
Limit, it is impossible to carry out Fishing game, the operational control of Need For Speed game.
Specifically, the embodiment of the present invention can continue to use the multi-user operation pattern of Android primary, in child user space only
Show which has the application program of authority.
Implement the embodiment of the present invention is another, the user right also includes:User enters to the mobile terminal
The duration of row operation is limited, and/or opens the number of times restriction of screen locking.That is, described mobile terminal can arrange corresponding certain user
Identity characteristic, operates most long duration, and/or at most number of operations.
For example, shown in table two.
Table two
For example, corresponding child user identity characteristic, its do not have user's power of operation Fishing game, Need For Speed game
Limit, it is impossible to carry out Fishing game, the operational control of Need For Speed game.
Corresponding child user identity characteristic, its mobile terminal is carried out operational control most long when a length of 1 hour, most
Screen locking number of times is opened for 3 times more, adult is then limited with screen locking number of times is opened nothing duration.
In the embodiment of the present invention is further implemented, the user right also includes:
The operation duration of user is reset according to predetermined period, and/or opens screen locking number of times.
Specifically, the embodiment of the present invention can be arranged by predetermined period user can operate the gap periods time described
The most long duration of mobile terminal, and/or at most open screen locking number of times.
The predetermined period can be configured as needed by those skilled in the art, be such as set to 24 hours.Per
Interval 24 hours, by operation duration of the user to the mobile terminal, and/or opens screen locking number of times and is zeroed out.
As shown in Table 2, in 24 hours, child user the mobile terminal is carried out operational control most long when a length of 1
Hour, screen locking number of times is at most opened for 3 times, adult is then limited with screen locking number of times is opened nothing duration.
S3, the restriction mobile phone users are operated to the mobile terminal in the range of the user right.
After the embodiment of the present invention obtains the user right of the mobile phone users, the movement is limited according to the authority
Operation of the terminal use to the mobile terminal.
In the embodiment of the present invention is further implemented, referring to Fig. 3, step S3 also includes:
S31, as the mobile phone users are operated to the mobile terminal in the user right scope, then permit
The mobile phone users are operated to the mobile terminal.
S32, user right scope as described in the mobile phone users exceed are operated to the mobile terminal, then enter
Row prompting, and forbid that the mobile phone users are operated to the mobile terminal.
For example, child user is merely able to a length of 1 hour during the mobile terminal most long operational control at 24 hours, most
Screen locking number of times is opened for 3 times more.
The embodiment of the present invention limits the mobile phone users and the mobile terminal is entered in the range of the user right
Row operation, it is to avoid the mobile phone users such as children beyond its user right operate inpairment of vision that described mobile terminal causes and
Maloperation.Therefore, the embodiment of the present invention improves the safety in utilization of the mobile terminal, improves Consumer's Experience.
Corresponding to said method, the embodiment of the present invention provides a kind of device of the multi-user management of mobile terminal, the shifting
Dynamic terminal can be smart mobile phone, PAD etc..
Referring to Fig. 1, the mobile terminal 1 is generally included:Main control chip 11, memory 12, input/output unit 13 and
Other hardware 14.The main control chip 11 controls each functional module, and memory 12 stores each application program data.
Referring to Fig. 4, described device includes:
Identity obtains module 41, for the mobile phone users are carried out with iris recognition, obtains the mobile terminal and uses
The identity characteristic at family.
Identity query module 42, for inquiring about the identity database for prestoring, the identity for obtaining the mobile phone users is special
Levy corresponding user right.
Operational control module 43, for limiting the mobile phone users to the movement in the range of the user right
Terminal is operated.
Iris recognition technology is to carry out identification based on the iris in eyes, is applied to security device (such as gate inhibition etc.),
And have the place of highly confidential demand.
The eye structure of people is made up of the part such as sclera, iris, pupil crystalline lens, retina.Iris be positioned at black pupil
Annular formations between hole and white sclera, its include much interlaced spot, filament, coronal, striped, crypts etc.
Minutia.And iris is after prenatal development stage is formed, will be to maintain in whole life course constant.These are special
The uniqueness for determining iris feature is levied, while also determining the uniqueness of identification.Therefore, it can the iris of eyes is special
Levy the identification object as everyone.
Iris recognition is exactly to determine the identity of people by contrasting the similitude between iris image feature.Iris recognition
In general the process of technology includes following four steps:
1. iris image acquisition
The whole eye of people is shot using specific apparatus for making a video recording, and the image transmitting for photographing is known to iris
The image preprocessing software of other system.
2. Image semantic classification
Iris image to getting is handled as follows so as to meet the demand for extracting iris feature.
Iris Location:Determine inner circle, cylindrical and conic section position in the picture.Wherein, inner circle is iris and pupil
Border, the cylindrical border for iris and sclera, conic section are the border of iris and upper lower eyelid.
Iris image is normalized:By the iris size in image, the fixed dimension of identifying system setting is adjusted to.
Image enhaucament:For the image after normalization, brightness, contrast and smoothness etc. reason is carried out, is improved in image
The discrimination of iris information.
3. feature extraction
Characteristic point needed for iris recognition is extracted from iris image using specific algorithm, and which is encoded.
4. characteristic matching
The feature coding that feature extraction is obtained is mated one by one with the iris image feature coding in database, is judged whether
For identical iris, so as to reach the purpose of identification.
The embodiment of the present invention utilizes iris recognition technology, obtains the identity characteristic of the mobile phone users, reality of the present invention
Apply the identity that example characterizes the mobile phone users by the identity characteristic of the mobile phone users.
Mobile terminal described in the embodiment of the present invention can arrange the use of each user identity feature corresponding by input instruction
Family authority.
In the embodiment of the present invention one is implemented, the user right includes:User accesses the authority of each application program.
That is, described mobile terminal can arrange corresponding certain user's identity characteristic, and which has the authority for accessing application-specific.
For example, shown in table one.
Table one
For example, corresponding child user identity characteristic, its do not have user's power of operation Fishing game, Need For Speed game
Limit, it is impossible to carry out Fishing game, the operational control of Need For Speed game.
Specifically, the embodiment of the present invention can continue to use the multi-user operation pattern of Android primary, in child user space only
Show which has the application program of authority.
Implement the embodiment of the present invention is another, the user right also includes:User enters to the mobile terminal
The duration of row operation is limited, and/or opens the number of times restriction of screen locking.That is, described mobile terminal can arrange corresponding certain user
Identity characteristic, operates most long duration, and/or at most number of operations.
For example, shown in table two.
Table two
For example, corresponding child user identity characteristic, its do not have user's power of operation Fishing game, Need For Speed game
Limit, it is impossible to carry out Fishing game, the operational control of Need For Speed game.
Corresponding child user identity characteristic, its mobile terminal is carried out operational control most long when a length of 1 hour, most
Screen locking number of times is opened for 3 times more, adult is then limited with screen locking number of times is opened nothing duration.
In the embodiment of the present invention is further implemented, the user right also includes:
The operation duration of user is reset according to predetermined period, and/or opens screen locking number of times.
Specifically, the embodiment of the present invention can be arranged by predetermined period user can operate the gap periods time described
The most long duration of mobile terminal, and/or at most open screen locking number of times.
The predetermined period can be configured as needed by those skilled in the art, be such as set to 24 hours.Per
Interval 24 hours, by operation duration of the user to the mobile terminal, and/or opens screen locking number of times and is zeroed out.
As shown in Table 2, in 24 hours, child user the mobile terminal is carried out operational control most long when a length of 1
Hour, screen locking number of times is at most opened for 3 times, adult is then limited with screen locking number of times is opened nothing duration.
After the embodiment of the present invention obtains the user right of the mobile phone users, the movement is limited according to the authority
Operation of the terminal use to the mobile terminal.
In the embodiment of the present invention is further implemented, referring to Fig. 5, the operational control module 43 includes:
Operation licence units 431, for when the mobile phone users in the user right scope to described mobile whole
End is operated, then permit that the mobile phone users are operated to the mobile terminal.
Attendant exclusion unit 432, for when the mobile phone users beyond the user right scope to the movement
Terminal is operated, then pointed out, and forbids that the mobile phone users are operated to the mobile terminal.
For example, child user is merely able to a length of 1 hour during the mobile terminal most long operational control at 24 hours, most
Screen locking number of times is opened for 3 times more.
The embodiment of the present invention limits the mobile phone users and the mobile terminal is entered in the range of the user right
Row operation, it is to avoid the mobile phone users such as children beyond its user right operate inpairment of vision that described mobile terminal causes and
Maloperation.Therefore, the embodiment of the present invention improves the safety in utilization of the mobile terminal, improves Consumer's Experience.
Embodiment of the present invention realization is further illustrated below by one concrete application scene of the embodiment of the present invention.
The embodiment of the present invention is applied to a mobile phone, and the mobile phone is provided with iris recognition device.The iris recognition device passes through
Iris image acquisition, Image semantic classification, feature extraction, characteristic matching, can carry out identification based on the iris in eyes, obtain
The identity characteristic of cellphone subscriber.
Referring to Fig. 6, the method for the multi-user management of this application scene includes:
601st, iris recognition is carried out to cellphone subscriber, obtains the identity characteristic of the cellphone subscriber.
602nd, the identity database that prestores is inquired about, obtains the corresponding user right of identity characteristic of the cellphone subscriber.
The identity database for prestoring is as shown in Table 3.
Table three
The embodiment of the present invention in 24 hours, child user the mobile terminal is carried out operational control most long when a length of
1 hour, screen locking number of times is at most opened for 3 times, adult is then limited with screen locking number of times is opened nothing duration.
603rd, as the mobile phone users are operated to the mobile terminal in the user right scope, then allow
The mobile phone users are operated to the mobile terminal.
604th, as described in the mobile phone users exceed, user right scope is operated to the mobile terminal, then enter
Row prompting, and forbid that the mobile phone users are operated to the mobile terminal.
Child user is merely able to, to a length of 1 hour during the mobile terminal most long operational control at 24 hours, at most beat
Screen number of times of unlocking is 3 times.
The embodiment of the present invention limits the mobile phone users and the mobile terminal is entered in the range of the user right
Row operation, it is to avoid the mobile phone users such as children beyond its user right operate inpairment of vision that described mobile terminal causes and
Maloperation.Therefore, the embodiment of the present invention improves the safety in utilization of the mobile terminal, improves Consumer's Experience.
It will be understood by those skilled in the art that the embodiment of the embodiment of the present invention can be provided as method, device (equipment) or
Computer program.Therefore, the embodiment of the present invention using complete hardware embodiment, complete software embodiment or can be combined soft
The form of the embodiment of part and hardware aspect.And, the embodiment of the present invention can be adopted and wherein include calculating one or more
Computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, the optical memory of machine usable program code
Deng) form of the upper computer program that implements.
The embodiment of the present invention be with reference to method according to embodiments of the present invention, device (equipment) and computer program
Flow chart and/or block diagram are describing.It should be understood that can be by every in computer program instructions flowchart and/or block diagram
One flow process and/or the combination of square frame and flow chart and/or the flow process in block diagram and/or square frame.These computers can be provided
Programmed instruction is to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device
To produce a machine so that produce use by the instruction of computer or the computing device of other programmable data processing device
Dress in the function of realizing specifying in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames
Put.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing device with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory is produced to be included to refer to
Make the manufacture of device, the command device realize in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or
The function of specifying in multiple square frames.
These computer program instructions can be also loaded in computer or other programmable data processing device so that in meter
Series of operation steps is executed on calculation machine or other programmable devices to produce computer implemented process, so as in computer or
The instruction executed on other programmable devices is provided for realizing in one flow process of flow chart or multiple flow processs and/or block diagram one
The step of function of specifying in individual square frame or multiple square frames.
The preferred embodiment of the embodiment of the present invention is although had been described for, but those skilled in the art once know base
This creative concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to
Including preferred embodiment and fall into being had altered and changing for range of embodiment of the invention.Obviously, those skilled in the art
The spirit and scope of various changes and modification without deviating from the embodiment of the present invention can be carried out to the embodiment of the present invention.So, if
If these modifications of the embodiment of the present invention and modification belong within the scope of embodiment of the present invention claim and its equivalent technologies,
Then the embodiment of the present invention is also intended to comprising these changes and modification.
Claims (10)
1. a kind of method of the multi-user management of mobile terminal, it is characterised in that include:
The mobile phone users are carried out with iris recognition, obtains the identity characteristic of the mobile phone users;
The identity database that prestores of inquiry, obtains the corresponding user right of identity characteristic of the mobile phone users;
Limit the mobile phone users to operate the mobile terminal in the range of the user right.
2. method according to claim 1, it is characterised in that the user right includes:User accesses each application program
Authority.
3. method according to claim 1 and 2, it is characterised in that the user right also includes:User is to the movement
The duration operated by terminal is limited, and/or opens the number of times restriction of screen locking.
4. method according to claim 3, it is characterised in that the user right also includes:
The operation duration of user is reset according to predetermined period, and/or opens screen locking number of times.
5. method according to claim 1, it is characterised in that the restriction mobile phone users are weighed in the user
Operation is carried out to the mobile terminal in the range of limit includes:
As the mobile phone users are operated to the mobile terminal in the user right scope, then permit the movement
Terminal use is operated to the mobile terminal;
As described in the mobile phone users exceed, user right scope is operated to the mobile terminal, then pointed out,
And forbid that the mobile phone users are operated to the mobile terminal.
6. a kind of device of the multi-user management of mobile terminal, it is characterised in that include:
Identity obtains module, for the mobile phone users are carried out with iris recognition, obtains the body of the mobile phone users
Part feature;
Identity query module, for inquiring about the identity database for prestoring, the identity characteristic for obtaining the mobile phone users is corresponded to
User right;
Operational control module, enters to the mobile terminal in the range of the user right for limiting the mobile phone users
Row operation.
7. device according to claim 6, it is characterised in that the user right includes:User accesses each application program
Authority.
8. the device according to claim 6 or 7, it is characterised in that the user right also includes:User is to the movement
The duration operated by terminal is limited, and/or opens the number of times restriction of screen locking.
9. device according to claim 8, it is characterised in that the user right also includes:
The operation duration of user is reset according to predetermined period, and/or opens screen locking number of times.
10. device according to claim 6, it is characterised in that the operational control module includes:
Operation licence units, for grasping to the mobile terminal in the user right scope when the mobile phone users
Make, then permit that the mobile phone users are operated to the mobile terminal;
Attendant exclusion unit, for carrying out to the mobile terminal beyond the user right scope when the mobile phone users
Operation, then pointed out, and forbidden that the mobile phone users are operated to the mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610868512.9A CN106487516A (en) | 2016-09-29 | 2016-09-29 | A kind of method of the multi-user management of mobile terminal and its device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610868512.9A CN106487516A (en) | 2016-09-29 | 2016-09-29 | A kind of method of the multi-user management of mobile terminal and its device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106487516A true CN106487516A (en) | 2017-03-08 |
Family
ID=58268170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610868512.9A Pending CN106487516A (en) | 2016-09-29 | 2016-09-29 | A kind of method of the multi-user management of mobile terminal and its device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106487516A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609370A (en) * | 2017-08-29 | 2018-01-19 | 深圳怡化电脑股份有限公司 | A kind of identification system, method and its device |
CN107659719A (en) * | 2017-09-19 | 2018-02-02 | 上海爱优威软件开发有限公司 | A kind of Scene Simulation method, Scene Simulation system and terminal |
CN107733860A (en) * | 2017-09-04 | 2018-02-23 | 努比亚技术有限公司 | A kind of processing method of access request, device, family's Cloud Server and computer-readable recording medium |
CN108491709A (en) * | 2018-03-21 | 2018-09-04 | 百度在线网络技术(北京)有限公司 | The method and apparatus of permission for identification |
CN109670286A (en) * | 2018-11-28 | 2019-04-23 | 歌尔股份有限公司 | A kind of application control method and apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103177206A (en) * | 2013-02-21 | 2013-06-26 | 深圳市中兴移动通信有限公司 | Information privacy method and electronic terminal |
US20150206148A1 (en) * | 2012-07-26 | 2015-07-23 | Peter Cherry | System and method for fraud prevention |
CN105353958A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Terminal application control method and apparatus |
CN105574392A (en) * | 2015-06-30 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Display mode switching method and mobile terminal |
-
2016
- 2016-09-29 CN CN201610868512.9A patent/CN106487516A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150206148A1 (en) * | 2012-07-26 | 2015-07-23 | Peter Cherry | System and method for fraud prevention |
CN103177206A (en) * | 2013-02-21 | 2013-06-26 | 深圳市中兴移动通信有限公司 | Information privacy method and electronic terminal |
CN105574392A (en) * | 2015-06-30 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Display mode switching method and mobile terminal |
CN105353958A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Terminal application control method and apparatus |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609370A (en) * | 2017-08-29 | 2018-01-19 | 深圳怡化电脑股份有限公司 | A kind of identification system, method and its device |
CN107733860A (en) * | 2017-09-04 | 2018-02-23 | 努比亚技术有限公司 | A kind of processing method of access request, device, family's Cloud Server and computer-readable recording medium |
CN107659719A (en) * | 2017-09-19 | 2018-02-02 | 上海爱优威软件开发有限公司 | A kind of Scene Simulation method, Scene Simulation system and terminal |
CN108491709A (en) * | 2018-03-21 | 2018-09-04 | 百度在线网络技术(北京)有限公司 | The method and apparatus of permission for identification |
CN109670286A (en) * | 2018-11-28 | 2019-04-23 | 歌尔股份有限公司 | A kind of application control method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106487516A (en) | A kind of method of the multi-user management of mobile terminal and its device | |
CN107886032B (en) | Terminal device, smart phone, authentication method and system based on face recognition | |
US11295127B2 (en) | Electronic device, information processing method, and program | |
CN106557678B (en) | A kind of intelligent terminal mode switching method and its device | |
EP3163483B1 (en) | Mobile terminal user mode starting method and system based on iris identification | |
KR101710478B1 (en) | Mobile electric document system of multiple biometric | |
US11144661B2 (en) | User permission allocation method and device | |
KR101430348B1 (en) | Authentication apparatus, control method of authentication apparatus, control program, and recording medium | |
CN104899489A (en) | Information processing apparatus, information processing method, eyewear terminal, and authentication system | |
CN104899490A (en) | Terminal positioning method and user terminal | |
CN109756458A (en) | Identity identifying method and system | |
CN106096585A (en) | A kind of auth method and terminal | |
CN105897430A (en) | User management method and system for intelligent terminal | |
WO2018137595A1 (en) | Face recognition method | |
CN101379528A (en) | Face authentication device, face authentication method, and program | |
CN206162736U (en) | Access control system based on face recognition | |
CN106296950A (en) | A kind of gate control system based on recognition of face | |
CN107844742B (en) | Facial image glasses minimizing technology, device and storage medium | |
CN105549967A (en) | Myopia prevention method of intelligent electronic device | |
CN105956569A (en) | Finger vein identification based identity authentication platform | |
CN105320871A (en) | Screen unlocking method and screen unlocking apparatus | |
CN103927469A (en) | Dynamic password generation method based on iris information | |
CN111353404A (en) | Face recognition method, device and equipment | |
CN107169338A (en) | Unlocking method and device | |
CN105577886A (en) | Mobile terminal unlocking device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170308 |