CN107038357A - User authority control method and mobile terminal - Google Patents

User authority control method and mobile terminal Download PDF

Info

Publication number
CN107038357A
CN107038357A CN201710153916.4A CN201710153916A CN107038357A CN 107038357 A CN107038357 A CN 107038357A CN 201710153916 A CN201710153916 A CN 201710153916A CN 107038357 A CN107038357 A CN 107038357A
Authority
CN
China
Prior art keywords
user
mobile terminal
intelligence system
privacy
intelligence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710153916.4A
Other languages
Chinese (zh)
Inventor
周佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Everest Mobile Communication Co Ltd
Original Assignee
Beijing Everest Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Everest Mobile Communication Co Ltd filed Critical Beijing Everest Mobile Communication Co Ltd
Priority to CN201710153916.4A priority Critical patent/CN107038357A/en
Publication of CN107038357A publication Critical patent/CN107038357A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6045Identity confirmation

Abstract

The embodiment of the invention discloses a kind of user authority control method and mobile terminal.Present invention method includes:When user unlocks mobile terminal screen, into intelligence system, user type is determined;If user type is primary user, primary user is allowed to use intelligence system, it is allowed to which primary user is switched to privacy system;If user type is from user, forbids from user using function set in advance in intelligence system in mobile terminal, forbid being switched to privacy system from user from intelligence system.The embodiment of the present invention can control mobile terminal owner and other users to the access right of this mobile terminal, it is ensured that the safety of privacy of user, data and property.

Description

User authority control method and mobile terminal
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of user authority control method and mobile terminal.
Background technology
Application and function on mobile terminal (such as smart mobile phone) is more and more, meanwhile, its information included and virus More and more, people are paid with it, bat secret photo, and the action of the secret such as chat is also more and more, brings therewith just It is safety issue:Whether the bank card of user, which is not intended to, is brushed, and whether secret photo, which is not intended to, is seen, whether chat content is not intended to quilt Other people see whether mobile phone is not intended to install or unloads APK (Android Package, Android installation kit) etc. by child Deng.Protected although there now have been mobile phone screen locking encryption, in the unlocked state, in this case it is still possible to can allow parent People, friend, child do a little maloperations.User does not unlock mobile phone, and the estrangement between relatives, friend is likely to result in again.
The content of the invention
The embodiments of the invention provide a kind of user authority control method and mobile terminal, mobile terminal can be controlled to possess The access right of person and other users to this mobile terminal, it is ensured that the safety of privacy of user, data and property.
In a first aspect, the embodiments of the invention provide a kind of user authority control method, applied to mobile terminal, the shifting Primary user provided with solution lock screen in dynamic terminal is with least one from user, and the mobile terminal includes privacy system and intelligence System, this method includes:
When user unlocks mobile terminal screen, into intelligence system, user type is determined, the user type includes master User and from user;
If the user type is primary user, the primary user is allowed to use the intelligence system, it is allowed to described primary Family is switched to privacy system;
If the user type is from user, forbid using work(set in advance in intelligence system in mobile terminal from user Can, forbid being switched to privacy system from user from intelligence system.
Further, it is described forbid from user use mobile terminal in intelligence system the step of function set in advance, Including:
Forbid applying using the installation first in the intelligence system from user, or/and, forbid described from user's execution Target in intelligence system is set.
Further, it is described forbid from user applied using mounted first in the intelligence system the step of, bag Include:
The icon of first application is shown in the intelligence system desktop, if getting user clicks on first application Icon click commands, be not responding to the click commands,
Or,
The icon of first application is hidden in the intelligence system desktop and described first each of application of shielding is fast opened Flowing mode.
Further, it is described forbid from user from intelligence system be switched to privacy system the step of, including:
When getting the switching command that first is switched to privacy system from user from intelligence system, the switching is not responding to Instruction;
If getting the finger print information of the primary user, in preset time, recover response and be switched to from intelligence system The switching command of privacy system;
When the switching command that privacy system is switched to from intelligence system is received in the preset time, from intelligence system It is switched to privacy system.
Further, methods described also includes:
If unlock mobile terminal enter intelligence system for second from user, described second from user using it is current not by Use second is limited when applying, if getting the finger print information of the primary user, current second application is closed, forbids described Second uses the second application from user.
Further, if unblock mobile terminal enter intelligence system be primary user, in intelligence system or privacy system Show setting options of the mobile terminal from user's access right;
At the setting options interface from user right, if receiving the primary user changes the 3rd finger from user's access right Order, the 3rd from access right of the user to mobile terminal described in modification target.
Second aspect, the embodiments of the invention provide a kind of mobile terminal, is provided with the master of solution lock screen in the mobile terminal User is with least one from user, and the mobile terminal includes privacy system and intelligence system, and the mobile terminal includes:
User type determining unit, for when user unlocks mobile terminal screen, into intelligence system, determining user class Type, the user type includes primary user and from user;
User right control unit, if being primary user for the user type, allows the primary user to use described Intelligence system, it is allowed to which the primary user is switched to privacy system;If the user type makes described in from user, forbidding from user With function set in advance in intelligence system in mobile terminal, forbid being switched to privacy system from user from intelligence system.
Further, the user right control unit specifically for:
Forbid applying using the installation first in the intelligence system from user, or/and, forbid described from user's execution Target in intelligence system is set.
Further, the user right control unit specifically for:
When the intelligence system desktop shows the icon of first application, answered if getting user and clicking on described first The click commands of icon, are not responding to the click commands,
Or,
The icon of first application is hidden in the intelligence system desktop and described first each of application of shielding is fast opened Flowing mode.
Further, the user right control unit specifically for:
When getting the switching command that first is switched to privacy system from user from intelligence system, the switching is not responding to Instruction;
If getting the finger print information of the primary user, in preset time, recover response and be switched to from intelligence system The switching command of privacy system;
When the switching command that privacy system is switched to from intelligence system is received in the preset time, from intelligence system It is switched to privacy system.
Further, the user right control unit is additionally operable to:
If unlock mobile terminal enter intelligence system for second from user, described second from user using it is current not by Use second is limited when applying, if getting the finger print information of the primary user, current second application is closed, forbids described Second uses the second application from user.
Further, it is characterised in that
Described device also includes:
Display unit, if for unlock mobile terminal enter intelligence system be primary user, in intelligence system or privacy System shows setting options of the mobile terminal from user's access right;
The user right control unit is additionally operable at the setting options interface from user right, is repaiied if receiving the primary user Change the 3rd instruction from user's access right, change the described 3rd from access right of the user to mobile terminal.
The different user for the multiple user types that can enter mobile terminal, different user are provided with the embodiment of the present invention The user of type enters the authority difference that mobile terminal is assigned, and primary user can use intelligence system, it is allowed to which primary user is switched to Privacy system, forbid from user use mobile terminal in function set in advance in intelligence system, forbid from user from intelligent system System is switched to privacy system, so for a mobile terminal, can control mobile terminal owner and other users to this The access right of mobile terminal, it is ensured that the safety of privacy of user, data and property.
Brief description of the drawings
Fig. 1 is one embodiment schematic diagram of user authority control method in the embodiment of the present invention;
Fig. 2 is one embodiment schematic diagram of step S3 in embodiment illustrated in fig. 1;
Fig. 3 is one embodiment schematic diagram of mobile terminal in the embodiment of the present invention;
Fig. 4 is one embodiment schematic diagram of mobile terminal in the embodiment of the present invention.
Embodiment
The (if present)s such as term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing It is for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that the number so used According to can exchange in the appropriate case, so as to the embodiments described herein can with except the content for illustrating or describing herein with Outer order is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that the non-exclusive bag of covering Contain, for example, the process, method, system, product or the equipment that contain series of steps or unit are not necessarily limited to what is clearly listed Those steps or unit, but may include not listing clearly or intrinsic for these processes, method, product or equipment Other steps or unit.
It is described below the embodiment of user authority control method in the embodiment of the present invention, the user authority control method is held Row main body is mobile terminal, and the mobile terminal described in the embodiment of the present invention can be the intelligent mobile terminals such as mobile phone, flat board, As technology develops, mobile terminal described in the present invention can also be it is following occur meet applied field of the embodiment of the present invention The mobile terminal of scape, such as future newly touch screen mobile terminal occurs.
Referring to Fig. 1, being one embodiment of user authority control method in the embodiment of the present invention, this method is applied to move Primary user provided with solution lock screen in dynamic terminal, the mobile terminal is with least one from user, and the mobile terminal includes privacy System and intelligence system, this method include:
S1, when user unlock mobile terminal screen when, into intelligence system, determine user type;
Wherein, the user type includes primary user and from user, and primary user is the owner of mobile terminal.
If S2, user type are primary user, primary user is allowed to use intelligence system, it is allowed to which primary user is switched to privacy system System;
If S3, user type are from user, forbid using work(set in advance in intelligence system in mobile terminal from user Can, forbid being switched to privacy system from user from intelligence system.
The different user for the multiple user types that can enter mobile terminal, different user are provided with the embodiment of the present invention The user of type enters the authority difference that mobile terminal is assigned, and primary user can use intelligence system, it is allowed to which primary user is switched to Privacy system, forbid from user use mobile terminal in function set in advance in intelligence system, forbid from user from intelligent system System is switched to privacy system, so for a mobile terminal, can control mobile terminal owner and other users to this The access right of mobile terminal, it is ensured that the safety of privacy of user, data and property.
In the embodiment of the present invention, the mode of user's unblock mobile terminal screen of different user types can have a variety of, example Such as, mobile terminal sets a variety of different gestures for unblock mobile terminal screen, multiple different passwords, multiple different user fingerprints Deng, specifically, as mobile terminal be provided with for unblock mobile terminal screen a variety of different gestures, one of gesture for movement The gesture set in terminal for primary user, it is the gesture set from user in mobile terminal that other gestures, which are, and for example mobile terminal It is provided with multiple different passwords for unblock mobile terminal screen, it in mobile terminal is what primary user was set that one of password, which is, Password, it is the password set from user in mobile terminal that other passwords, which are,.
So that mobile terminal sets multiple different user fingerprints for unblock mobile terminal screen as an example, further, this hair In bright embodiment, be stored with the mobile terminal primary user's finger print information and it is described at least one believe from the fingerprint of user Breath;Now, the step of above-mentioned determination user type, including:
If user is by primary user's unlocked by fingerprint mobile terminal, it is primary user to determine user type;
If user by this at least one from user one of them from user fingerprints unlock mobile terminal, determine user type For from user.
Similarly, mobile terminal is unlocked by the gesture or password that are set for primary user, it may be determined that user type is primary Family, mobile terminal is unlocked by the gesture to be set from user or password, it may be determined that user type is from user.
Further, it is above-mentioned forbid from user use mobile terminal in intelligence system the step of function set in advance, It can include:
Forbid applying using the installation first in mobile terminal intelligence system from user, or/and, forbid performing from user Target in mobile terminal intelligence system is set.
Wherein, it can be that primary user is pre- to forbid the first application used from user, forbid the target performed from user to set First set, certainly, when primary user is not configured, forbids the first application used from user, forbid what is performed from user It can also be that system default is set that target, which is set,.
So enter from user's unblock after mobile terminal intelligence system, set for the first application and target in mobile terminal It can not be used or operation setting, improve the security of mobile terminal, it is to avoid the leakage of primary user's privacy information.
Optionally, it is above-mentioned forbid from user applied using mounted first in mobile terminal intelligence system the step of, Can specifically there are two kinds of implementations:
(1) when mobile terminal intelligence system desktop shows the icon of the first application, answered if getting user and clicking on first The click commands of icon, are not responding to the click commands.
When entering mobile terminal intelligence system from user's unblock, mobile terminal intelligence system desktop still shows all answer Icon, if but user (due to being to unlock to enter from user, user here is actual as from user) clicks first The icon of application, is now not responding to the click commands.It is preferred that, for the icon of the first application, darkening processing (example can be carried out Such as it is processed into gray-scale map), so it can know which cannot be used using it from icon from user, or, to except first should Other outside, using being highlighted, so can know which should from user workable for user with open-and-shut With can use.
(2) icon of the first application and each quickly starting of the application of shielding first are hidden in mobile terminal intelligence system desktop Mode.
In the embodiment of the present invention, the icon of the first application directly can also be hidden in mobile terminal intelligence system desktop, and Each quickly starting mode (not showing the first application in global search result for example) of the application of shielding first, so from user When unblock enters mobile terminal intelligence system desktop, the icon for the first application that those he can not use and various quickly starting sides Formula is hidden or shielded, and first application can not be known from user, and then reaches the mesh for forbidding that the first application is used from user 's.
The implementation of mounted first application prohibitted the use of in mobile terminal intelligence system is described above is, together Reason, forbids performing the target in mobile terminal intelligence system and sets, and on the one hand can also be shown in mobile terminal intelligence system Target is set, if but get the operational order that user's performance objective is set, the operational order is not responding to (while can also be to mesh Mark, which is set, carries out darkening processing), on the other hand can also vanishing target set, and shield each quickly starting mode of target setting (such as display target is not set in global search result).
Further, in embodiments of the present invention, entering mobile terminal intelligence system from user's unblock, be prohibited from using First application and when forbidding the performance objective to set, now, if getting the checking information of primary user, such as at default interface (such as mobile terminal intelligence system desktop) gets the finger print information of primary user, then can (time can in the first preset time Can be initially default value to be preset by primary user) in allow from user using first application and target set, for example, Can be responded in the first preset time from user click on first apply, or performance objective set instruction, if first application and Target is hidden before setting, then the first application hidden before showing and target are set, when the first preset time is reached, weight It is new to recover to prohibit the use of the first application and forbid performance objective to set.
In the present embodiment, from user unblock enter mobile terminal intelligence system after, be initially can not use it is set in advance What the first application and performance objective were set, but after the checking of primary user is got, can equivalent to the agreement for obtaining primary user To use these disabled functions in the first preset time, after the first preset time is reached, recovery prohibits the use of these Function, so can control other from user to mobile terminal intelligence system at any time as the primary user of mobile terminal owner Access right.
Further, the situation of mobile terminal intelligence system is entered for being unlocked from user, when acquisition for mobile terminal to master When the finger print information of user has unlocked partly or entirely function disabled before, if the mobile terminal to lock in the first preset time Screen, now, after being unlocked again from user into mobile terminal, i.e., the partial function of the unblock can recover locking again again, The function that lifts restrictions before thus is avoided that and primary user is forever authorized to some functions, only face, it is necessary to be prohibited from using again When assign access right.If in the case where entering mobile terminal intelligence system from user's unblock, primary user needs to use completely The intelligence system of function, now, primary user can be after manual screen lockings, then by the finger print information of primary user enter mobile terminal intelligence Energy system, or, the option for setting all to use family instead in the terminal, when being switched to primary user, enters to primary user-identity Row checking (such as primary user's fingerprint authentication), after being verified, be switched to primary user (switch back into from user with it is upper similar, behind Repeat no more).
In the terminal storage primary user and at least one from the finger print information of user when, as shown in Fig. 2 above-mentioned steps Forbid being switched to privacy system from user from intelligence system in S3, can include:
S31, when getting the switching command that first is switched to privacy system from user from intelligence system, be not responding to this and cut Change instruction;
If S32, the finger print information for getting primary user, in preset time, recover response and be switched to from intelligence system The switching command of privacy system;
S33, when receiving the switching command that privacy system is switched to from intelligence system in preset time, from intelligence system It is switched to privacy system.
Now, the use with recovering the first application and target setting above is similar, and being switched to privacy system equally can profit With the finger print information of primary user, recover the switching command that response is switched to privacy system from intelligence system, the preset time can be with With above-mentioned first preset time at the same time, that is, to recover the use that the first application and target are set, with recovering influence switching Instruction to privacy system is used with a verification mode checking, such as first after user enters mobile terminal, default It is also extensive while the use of the first application and target setting is recovered if interface receives the finger print information of primary user's input Complex response is switched to the switching command of privacy system from intelligence system, after the first preset time is reached, all forbids again.When So, preset time can also be different from above-mentioned first preset time, that is, recover the use that the first application and target are set, with recovery The instruction that influence is switched to privacy system is separately verified using verification mode.
In some embodiments of the invention, it is switched to from intelligence system after privacy system, side in the embodiment of the present invention Method can also include:Forbid using function set in advance in privacy system in mobile terminal from user.Wherein, in privacy system Function set in advance can also be the first application in privacy system, or the target in privacy system is set.Equally, these are prohibited Function set in advance in the privacy system only used, in some embodiments of the invention, can also recover in some conditions, Specific reset mode, is referred to reply the mode of the first application or object run in above-mentioned intelligence system, here is omitted.
Further, when unlocking mobile terminal screen from user, it is not limited for primary user in mobile terminal before Some functions (as not by limitation use second application), primary user can also temporarily limited during user's use System, i.e., method can also include in the embodiment of the present invention:
If unlock mobile terminal enter intelligence system for second from user, this second from user using not limited currently Use second is made when applying, if getting the finger print information of primary user, current second application is closed, forbid this second from Second applied using this at family.
It so after user again screen locking unblock, can recover that the state of the second application can be used again, can also Proceed limitation.
In some embodiments of the invention, method can also include in the embodiment of the present invention:
It is mobile eventually in intelligence system or privacy system display if that unblock mobile terminal enters intelligence system is primary user Hold the setting options from user's access right;
At the setting options interface from user right, if receiving the primary user changes the 3rd finger from user's access right Order, changes the 3rd from access right of the user to mobile terminal.
Wherein, from user's access right can include mobile terminal intelligence system in can be used from user application, move The setting that can be used from user in dynamic terminal intelligent system, the authority for being switched to from user from intelligence system privacy system, its In, the application that can be used from user in mobile terminal intelligence system and it can be used from user in mobile terminal intelligence system Set, the application and setting that can be selected in mobile terminal intelligence system can be shown successively in the way of list, primary user can To select entirely, which part can also be selected as the access right from user in intelligence system.Further, from user from When the authority that intelligence system is switched to privacy system is opened, can further include can from user in mobile terminal privacy system With the application used, the subordinate's list for the setting that can be used from user in mobile terminal privacy system, primary user can enter one Step sets the access right in privacy system from user.So in the embodiment of the present invention primary user be can in the terminal with Shi Xiugai wants the access right from user of modification, accomplishes to adjust renewal at any time, has ensured the safety of primary user's private data.
In the embodiment of the present invention, first from user, second from user, the 3rd from user at least one among user One, first from user, second from user, the 3rd can be identical two-by-two or all identical from user, can also it is all different (from In the case that number of users is enough), it is not construed as limiting herein.
Below with a specifically used Sample Scenario, the embodiment of the present invention is described:
For example in one dual system mobile phone, including intelligence system and privacy system, intelligence system and privacy system include Some common applications, such as UC browsers, QQ, wechat, Alipay, iqiyi.com, Taobao, king's honor, the mobile phone are primary (parent) is possessed at family, and two are provided with the mobile phone can unlock the fingerprint into intelligence system:The finger of primary user (parent) Line information, the finger print information from user (children), the two fingerprints, which can be unlocked, enters cell phone intelligent system, only function Access right is different.
For entering cell phone intelligent system by parent's finger print information, institute is functional normally to be used, and is not limited, and for Mobile phone is entered by children's finger print information, parent is provided with Alipay, wechat, Taobao etc. and prohibitted the use of using children, i.e., for Enter the user of mobile phone by children's finger print information, click on Alipay, wechat, the application such as Taobao can not start (can also be direct Hide these applications), if clicking on the application, by the way of being not responding to using ignoring instruction, at this point it is possible to point out children to be limited System after the fingerprint authentication of parent, it is necessary to could use, if the Alipay that for example children click on, click Alipay points out to be limited, Parent's fingerprint is needed to limit, now mobile phone is gone checking by children to parent, if after the fingerprint authentication of parent, children can face When use Alipay application, now children can be the time set in advance using the time of Alipay, such as 2 minutes, or, It is again introduced into and is limited again, it is necessary to which parent's fingerprint is unlocked again after mobile phone screen locking.
And king's honor for not limiting, children can click on and normally be actuated for game, now, if getting parent Fingerprint, king's honor can equally be limited, exit king's honor, prohibit the use of, when children again tap on, i.e., do not rung Should, or point out to be limited, need parent to verify.Disabling and solution limit for the privacy system in dual system, specifically can refer to above-mentioned Embodiment, is no longer repeated herein.
The embodiment of mobile terminal in the embodiment of the present invention is described below.
Referring to Fig. 3, being to be provided with one embodiment schematic diagram of mobile terminal in the embodiment of the present invention, the mobile terminal The primary user of solution lock screen is with least one from user, and the mobile terminal includes privacy system and intelligence system, and the movement is whole End includes:
User type determining unit 301, for when user unlocks mobile terminal screen, into intelligence system, it is determined that with Family type, the user type includes primary user and from user;
User right control unit 302, if being primary user for user type, allows primary user to use intelligence system, Primary user is allowed to be switched to privacy system;If user type is from user, forbid using intelligence system in mobile terminal from user In function set in advance, forbid being switched to privacy system from user from intelligence system.
Further, be stored with the mobile terminal primary user's finger print information and at least one from the finger print information of user;
The user type determining unit 301 specifically for:
If user is by primary user's unlocked by fingerprint mobile terminal, it is primary user to determine user type;
If user by least one from user one of them from user fingerprints unlock mobile terminal, determine that user type is From user.
Further, the user right control unit 302 specifically for:
Forbid applying using the installation first in mobile terminal from user, or/and, forbid performing mobile terminal from user In target set.
Further, the user right control unit 302 specifically for:
When mobile terminal shows the icon of the first application, if the click for getting the icon that user clicks on the first application refers to Order, is not responding to the click commands,
Or,
The icon of the first application and each quickly starting mode of the application of shielding first are hidden in mobile terminal.
Further, user right control unit 302 specifically for:
When getting the switching command that first is switched to privacy system from user from intelligence system, it is not responding to the switching and refers to Order;
If getting the finger print information of primary user, in preset time, recover response and be switched to privacy from intelligence system The switching command of system;
When the switching command that privacy system is switched to from intelligence system is received in preset time, from intelligence system switching To privacy system.
Further, the user right control unit 302 is additionally operable to:
If unlock mobile terminal enter intelligence system for second from user, second from user using not limited currently When second used is applied, if getting the finger print information of primary user, current second application is closed, forbids this second from user Use the second application.
Further, user right control unit 302 is specifically additionally operable to:
Be switched to from intelligence system after privacy system, forbid from user use mobile terminal in privacy system in advance The function of setting.
Further, the device also includes:
Display unit 303, if for unlock mobile terminal enter intelligence system be primary user, in intelligence system or hidden Private system shows setting options of the mobile terminal from user's access right;
The user right control unit 302 is additionally operable at the setting options interface from user right, if receiving the primary user The 3rd instruction from user's access right is changed, the 3rd is changed from access right of the user to mobile terminal.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey Sequence, the program includes the part or all of step of at least user authority control method described in the above method embodiment when performing Suddenly.
It is apparent to those skilled in the art that, for convenience and simplicity of description, in the above-described embodiments, Description to each embodiment all emphasizes particularly on different fields, and does not have the part being described in detail in some embodiment, may refer to other embodiment Associated description.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some steps can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, involved action and module is not necessarily of the invention It is necessary.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, such as multiple units or component Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces Close or communicate to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, it can be stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially The part contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are to cause a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
Described above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Embodiment is stated the present invention is described in detail, it will be understood by those within the art that:It still can be to preceding State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these Modification is replaced, and the essence of appropriate technical solution is departed from the scope of various embodiments of the present invention technical scheme.

Claims (12)

1. provided with solution screen locking in a kind of user authority control method, it is characterised in that applied to mobile terminal, the mobile terminal The primary user of curtain is with least one from user, and the mobile terminal includes privacy system and intelligence system, and methods described includes:
When user unlocks mobile terminal screen, into intelligence system, user type is determined, the user type includes primary user With from user;
If the user type is primary user, the primary user is allowed to use the intelligence system, it is allowed to which the primary user cuts Change to privacy system;
If the user type is from user, forbid from user using function set in advance in intelligence system in mobile terminal, Forbid being switched to privacy system from user from intelligence system.
2. the method described in as requested 1, it is characterised in that it is described forbid from user use mobile terminal in intelligence system it is pre- The step of function of first setting, including:
Forbid applying using the installation first in the intelligence system from user, or/and, forbid performing the intelligence from user Target in system is set.
3. method according to claim 2, it is characterised in that it is described forbid from user use the intelligence system in The step of first installed is applied, including:
The icon of first application is shown in the intelligence system desktop, if getting the figure that user clicks on first application Target click commands, are not responding to the click commands,
Or,
The icon of first application and each quickly starting side of shielding first application are hidden in the intelligence system desktop Formula.
4. according to the method described in claim 1, it is characterised in that described to forbid being switched to privacy system from user from intelligence system The step of system, including:
When getting the switching command that first is switched to privacy system from user from intelligence system, it is not responding to the switching and refers to Order;
If getting the finger print information of the primary user, in preset time, recover response and be switched to privacy from intelligence system The switching command of system;
When the switching command that privacy system is switched to from intelligence system is received in the preset time, from intelligence system switching To privacy system.
5. according to the method described in claim 1, it is characterised in that methods described also includes:
If unlock mobile terminal enter intelligence system for second from user, described second from user using not limited currently When second used is applied, if getting the finger print information of the primary user, current second application is closed, forbids described second The second application is used from user.
6. according to the method described in claim 1, methods described also includes:
If that unblock mobile terminal enters intelligence system is primary user, intelligence system or privacy system show mobile terminal from The setting options of user's access right;
At the setting options interface from user right, if receiving the primary user changes the 3rd instruction from user's access right, repair Change described in target the 3rd from access right of the user to mobile terminal.
7. a kind of mobile terminal, it is characterised in that primary user provided with solution lock screen in the mobile terminal and at least one from User, the mobile terminal includes privacy system and intelligence system, and the mobile terminal includes:
User type determining unit, for when user unlocks mobile terminal screen, into intelligence system, determining user type, The user type includes primary user and from user;
User right control unit, if being primary user for the user type, allows the primary user to use the intelligence System, it is allowed to which the primary user is switched to privacy system;If the user type is from user, described used from user is forbidden to move Function set in advance in intelligence system, forbids being switched to privacy system from user from intelligence system in dynamic terminal.
8. mobile terminal according to claim 7, it is characterised in that the user right control unit specifically for:
Forbid applying using the installation first in the intelligence system from user, or/and, forbid performing the intelligence from user Target in system is set.
9. mobile terminal according to claim 8, it is characterised in that the user right control unit specifically for:
When the intelligence system desktop shows the icon of first application, if getting user clicks on first application The click commands of icon, are not responding to the click commands,
Or,
The icon of first application and each quickly starting side of shielding first application are hidden in the intelligence system desktop Formula.
10. mobile terminal according to claim 7, it is characterised in that the user right control unit specifically for:
When getting the switching command that first is switched to privacy system from user from intelligence system, it is not responding to the switching and refers to Order;
If getting the finger print information of the primary user, in preset time, recover response and be switched to privacy from intelligence system The switching command of system;
When the switching command that privacy system is switched to from intelligence system is received in the preset time, from intelligence system switching To privacy system.
11. mobile terminal according to claim 7, it is characterised in that the user right control unit is additionally operable to:
If unlock mobile terminal enter intelligence system for second from user, described second from user using not limited currently When second used is applied, if getting the finger print information of the primary user, current second application is closed, forbids described second The second application is used from user.
12. mobile terminal according to claim 11, it is characterised in that
Described device also includes:
Display unit, if for unlock mobile terminal enter intelligence system be primary user, in intelligence system or privacy system Show setting options of the mobile terminal from user's access right;
The user right control unit is additionally operable at the setting options interface from user right, if receiving primary user modification the Three from the instruction of user's access right, and modification the described 3rd is from access right of the user to mobile terminal.
CN201710153916.4A 2017-03-15 2017-03-15 User authority control method and mobile terminal Pending CN107038357A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710153916.4A CN107038357A (en) 2017-03-15 2017-03-15 User authority control method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710153916.4A CN107038357A (en) 2017-03-15 2017-03-15 User authority control method and mobile terminal

Publications (1)

Publication Number Publication Date
CN107038357A true CN107038357A (en) 2017-08-11

Family

ID=59534807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710153916.4A Pending CN107038357A (en) 2017-03-15 2017-03-15 User authority control method and mobile terminal

Country Status (1)

Country Link
CN (1) CN107038357A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107526958A (en) * 2017-08-30 2017-12-29 努比亚技术有限公司 A kind of operating mode control method, terminal and computer-readable recording medium
CN107563167A (en) * 2017-08-29 2018-01-09 北京珠穆朗玛移动通信有限公司 Fingerprint management method, mobile terminal and storage medium
CN107609382A (en) * 2017-10-12 2018-01-19 广东小天才科技有限公司 A kind of locking means of terminal device, terminal device and storage medium
CN107770378A (en) * 2017-10-19 2018-03-06 佛山市章扬科技有限公司 A kind of method based on finger print information unblock mobile phone
CN108304108A (en) * 2018-01-22 2018-07-20 维沃移动通信有限公司 A kind of icon display method and mobile terminal of application program
CN109344585A (en) * 2018-10-09 2019-02-15 广州三星通信技术研究有限公司 The method and apparatus of the access right of automatic setting electric terminal
CN110321684A (en) * 2018-03-31 2019-10-11 汇银宝网络技术股份有限公司 A kind of information management-control method of the electronic equipment based on face recognition
CN110417996A (en) * 2019-07-19 2019-11-05 珠海格力电器股份有限公司 A kind of method and terminal for protecting privacy information
CN111487876A (en) * 2019-01-28 2020-08-04 青岛海尔洗衣机有限公司 Control method of household appliance
WO2021218889A1 (en) * 2020-04-27 2021-11-04 Wai Hung Lee Networking device with privacy protection
CN113726955A (en) * 2021-08-11 2021-11-30 珠海格力电器股份有限公司 Terminal control method, terminal, device and storage medium thereof
CN113986048A (en) * 2021-12-27 2022-01-28 广州朗国电子科技股份有限公司 Control method, device and storage medium for dual-system touch screen
CN114090092A (en) * 2021-11-29 2022-02-25 维沃移动通信有限公司 Interaction method and device of electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916527A (en) * 2013-01-09 2014-07-09 上海斐讯数据通信技术有限公司 Method for achieving multi-user log-in mode and mobile terminal
CN104284027A (en) * 2014-10-29 2015-01-14 东莞宇龙通信科技有限公司 Authority management method and authority management system for terminal
CN104408383A (en) * 2014-10-31 2015-03-11 东莞宇龙通信科技有限公司 Private data processing system and method
CN106250741A (en) * 2016-07-22 2016-12-21 北京珠穆朗玛移动通信有限公司 A kind of system switching method and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916527A (en) * 2013-01-09 2014-07-09 上海斐讯数据通信技术有限公司 Method for achieving multi-user log-in mode and mobile terminal
CN104284027A (en) * 2014-10-29 2015-01-14 东莞宇龙通信科技有限公司 Authority management method and authority management system for terminal
CN104408383A (en) * 2014-10-31 2015-03-11 东莞宇龙通信科技有限公司 Private data processing system and method
CN106250741A (en) * 2016-07-22 2016-12-21 北京珠穆朗玛移动通信有限公司 A kind of system switching method and mobile terminal

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563167A (en) * 2017-08-29 2018-01-09 北京珠穆朗玛移动通信有限公司 Fingerprint management method, mobile terminal and storage medium
CN107526958A (en) * 2017-08-30 2017-12-29 努比亚技术有限公司 A kind of operating mode control method, terminal and computer-readable recording medium
CN107609382B (en) * 2017-10-12 2020-03-20 广东小天才科技有限公司 Terminal device locking method, terminal device and storage medium
CN107609382A (en) * 2017-10-12 2018-01-19 广东小天才科技有限公司 A kind of locking means of terminal device, terminal device and storage medium
CN107770378A (en) * 2017-10-19 2018-03-06 佛山市章扬科技有限公司 A kind of method based on finger print information unblock mobile phone
CN108304108B (en) * 2018-01-22 2020-06-02 维沃移动通信有限公司 Icon display method of application program and mobile terminal
CN108304108A (en) * 2018-01-22 2018-07-20 维沃移动通信有限公司 A kind of icon display method and mobile terminal of application program
CN110321684A (en) * 2018-03-31 2019-10-11 汇银宝网络技术股份有限公司 A kind of information management-control method of the electronic equipment based on face recognition
CN109344585A (en) * 2018-10-09 2019-02-15 广州三星通信技术研究有限公司 The method and apparatus of the access right of automatic setting electric terminal
CN111487876A (en) * 2019-01-28 2020-08-04 青岛海尔洗衣机有限公司 Control method of household appliance
CN110417996A (en) * 2019-07-19 2019-11-05 珠海格力电器股份有限公司 A kind of method and terminal for protecting privacy information
WO2021218889A1 (en) * 2020-04-27 2021-11-04 Wai Hung Lee Networking device with privacy protection
CN113726955A (en) * 2021-08-11 2021-11-30 珠海格力电器股份有限公司 Terminal control method, terminal, device and storage medium thereof
CN114090092A (en) * 2021-11-29 2022-02-25 维沃移动通信有限公司 Interaction method and device of electronic equipment
CN113986048A (en) * 2021-12-27 2022-01-28 广州朗国电子科技股份有限公司 Control method, device and storage medium for dual-system touch screen

Similar Documents

Publication Publication Date Title
CN107038357A (en) User authority control method and mobile terminal
CN105760737A (en) Control method for applications and terminal
WO2016015448A1 (en) Multi-system entering method, apparatus and terminal
CN106127077B (en) A kind of method and terminal for protecting user privacy information
CN105930145A (en) Information hiding method and mobile terminal
CN105897430A (en) User management method and system for intelligent terminal
CN105678147B (en) Touch operation method and device
US20140230026A1 (en) Biometric-Based Access Control System Comprising a Near Field Communication Link
CN105809000A (en) Information processing method and electronic device
CN105701420A (en) Method for managing user data and terminal
CN108460256A (en) Data guard method, mobile terminal and device
CN105094652A (en) Touch screen unlocking method and device, electronic equipment, display and mobile terminal
CN108154017A (en) A kind of method of password authentication and password validation system based on intelligent terminal
CN104376240A (en) Method for processing information and electronic equipment
WO2015184894A2 (en) Method and device for implementing multi-user login mode
CN106503506B (en) A kind of information display method and electronic equipment
CN106407761B (en) Unlocking method and unlocking device
US20130198836A1 (en) Facial Recognition Streamlined Login
CN106778160A (en) Data item display methods and device
WO2017105579A2 (en) Interception-proof authentication and encryption system and method
US20200401679A1 (en) Method and system for preventing unauthorized computer processing
US9473936B2 (en) Method and device for protecting privacy information
CN107391987A (en) Application guard method, device and electronic equipment based on living things feature recognition
CN104392158A (en) Mobile terminal unlocking method and mobile terminal
CN105867792A (en) Methods and apparatuses for unlocking touch screen and updating screen-locking interface of touch screen

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170811