CN107038357A - User authority control method and mobile terminal - Google Patents
User authority control method and mobile terminal Download PDFInfo
- Publication number
- CN107038357A CN107038357A CN201710153916.4A CN201710153916A CN107038357A CN 107038357 A CN107038357 A CN 107038357A CN 201710153916 A CN201710153916 A CN 201710153916A CN 107038357 A CN107038357 A CN 107038357A
- Authority
- CN
- China
- Prior art keywords
- user
- mobile terminal
- intelligence system
- privacy
- intelligence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6045—Identity confirmation
Abstract
The embodiment of the invention discloses a kind of user authority control method and mobile terminal.Present invention method includes:When user unlocks mobile terminal screen, into intelligence system, user type is determined;If user type is primary user, primary user is allowed to use intelligence system, it is allowed to which primary user is switched to privacy system;If user type is from user, forbids from user using function set in advance in intelligence system in mobile terminal, forbid being switched to privacy system from user from intelligence system.The embodiment of the present invention can control mobile terminal owner and other users to the access right of this mobile terminal, it is ensured that the safety of privacy of user, data and property.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of user authority control method and mobile terminal.
Background technology
Application and function on mobile terminal (such as smart mobile phone) is more and more, meanwhile, its information included and virus
More and more, people are paid with it, bat secret photo, and the action of the secret such as chat is also more and more, brings therewith just
It is safety issue:Whether the bank card of user, which is not intended to, is brushed, and whether secret photo, which is not intended to, is seen, whether chat content is not intended to quilt
Other people see whether mobile phone is not intended to install or unloads APK (Android Package, Android installation kit) etc. by child
Deng.Protected although there now have been mobile phone screen locking encryption, in the unlocked state, in this case it is still possible to can allow parent
People, friend, child do a little maloperations.User does not unlock mobile phone, and the estrangement between relatives, friend is likely to result in again.
The content of the invention
The embodiments of the invention provide a kind of user authority control method and mobile terminal, mobile terminal can be controlled to possess
The access right of person and other users to this mobile terminal, it is ensured that the safety of privacy of user, data and property.
In a first aspect, the embodiments of the invention provide a kind of user authority control method, applied to mobile terminal, the shifting
Primary user provided with solution lock screen in dynamic terminal is with least one from user, and the mobile terminal includes privacy system and intelligence
System, this method includes:
When user unlocks mobile terminal screen, into intelligence system, user type is determined, the user type includes master
User and from user;
If the user type is primary user, the primary user is allowed to use the intelligence system, it is allowed to described primary
Family is switched to privacy system;
If the user type is from user, forbid using work(set in advance in intelligence system in mobile terminal from user
Can, forbid being switched to privacy system from user from intelligence system.
Further, it is described forbid from user use mobile terminal in intelligence system the step of function set in advance,
Including:
Forbid applying using the installation first in the intelligence system from user, or/and, forbid described from user's execution
Target in intelligence system is set.
Further, it is described forbid from user applied using mounted first in the intelligence system the step of, bag
Include:
The icon of first application is shown in the intelligence system desktop, if getting user clicks on first application
Icon click commands, be not responding to the click commands,
Or,
The icon of first application is hidden in the intelligence system desktop and described first each of application of shielding is fast opened
Flowing mode.
Further, it is described forbid from user from intelligence system be switched to privacy system the step of, including:
When getting the switching command that first is switched to privacy system from user from intelligence system, the switching is not responding to
Instruction;
If getting the finger print information of the primary user, in preset time, recover response and be switched to from intelligence system
The switching command of privacy system;
When the switching command that privacy system is switched to from intelligence system is received in the preset time, from intelligence system
It is switched to privacy system.
Further, methods described also includes:
If unlock mobile terminal enter intelligence system for second from user, described second from user using it is current not by
Use second is limited when applying, if getting the finger print information of the primary user, current second application is closed, forbids described
Second uses the second application from user.
Further, if unblock mobile terminal enter intelligence system be primary user, in intelligence system or privacy system
Show setting options of the mobile terminal from user's access right;
At the setting options interface from user right, if receiving the primary user changes the 3rd finger from user's access right
Order, the 3rd from access right of the user to mobile terminal described in modification target.
Second aspect, the embodiments of the invention provide a kind of mobile terminal, is provided with the master of solution lock screen in the mobile terminal
User is with least one from user, and the mobile terminal includes privacy system and intelligence system, and the mobile terminal includes:
User type determining unit, for when user unlocks mobile terminal screen, into intelligence system, determining user class
Type, the user type includes primary user and from user;
User right control unit, if being primary user for the user type, allows the primary user to use described
Intelligence system, it is allowed to which the primary user is switched to privacy system;If the user type makes described in from user, forbidding from user
With function set in advance in intelligence system in mobile terminal, forbid being switched to privacy system from user from intelligence system.
Further, the user right control unit specifically for:
Forbid applying using the installation first in the intelligence system from user, or/and, forbid described from user's execution
Target in intelligence system is set.
Further, the user right control unit specifically for:
When the intelligence system desktop shows the icon of first application, answered if getting user and clicking on described first
The click commands of icon, are not responding to the click commands,
Or,
The icon of first application is hidden in the intelligence system desktop and described first each of application of shielding is fast opened
Flowing mode.
Further, the user right control unit specifically for:
When getting the switching command that first is switched to privacy system from user from intelligence system, the switching is not responding to
Instruction;
If getting the finger print information of the primary user, in preset time, recover response and be switched to from intelligence system
The switching command of privacy system;
When the switching command that privacy system is switched to from intelligence system is received in the preset time, from intelligence system
It is switched to privacy system.
Further, the user right control unit is additionally operable to:
If unlock mobile terminal enter intelligence system for second from user, described second from user using it is current not by
Use second is limited when applying, if getting the finger print information of the primary user, current second application is closed, forbids described
Second uses the second application from user.
Further, it is characterised in that
Described device also includes:
Display unit, if for unlock mobile terminal enter intelligence system be primary user, in intelligence system or privacy
System shows setting options of the mobile terminal from user's access right;
The user right control unit is additionally operable at the setting options interface from user right, is repaiied if receiving the primary user
Change the 3rd instruction from user's access right, change the described 3rd from access right of the user to mobile terminal.
The different user for the multiple user types that can enter mobile terminal, different user are provided with the embodiment of the present invention
The user of type enters the authority difference that mobile terminal is assigned, and primary user can use intelligence system, it is allowed to which primary user is switched to
Privacy system, forbid from user use mobile terminal in function set in advance in intelligence system, forbid from user from intelligent system
System is switched to privacy system, so for a mobile terminal, can control mobile terminal owner and other users to this
The access right of mobile terminal, it is ensured that the safety of privacy of user, data and property.
Brief description of the drawings
Fig. 1 is one embodiment schematic diagram of user authority control method in the embodiment of the present invention;
Fig. 2 is one embodiment schematic diagram of step S3 in embodiment illustrated in fig. 1;
Fig. 3 is one embodiment schematic diagram of mobile terminal in the embodiment of the present invention;
Fig. 4 is one embodiment schematic diagram of mobile terminal in the embodiment of the present invention.
Embodiment
The (if present)s such as term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing
It is for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that the number so used
According to can exchange in the appropriate case, so as to the embodiments described herein can with except the content for illustrating or describing herein with
Outer order is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that the non-exclusive bag of covering
Contain, for example, the process, method, system, product or the equipment that contain series of steps or unit are not necessarily limited to what is clearly listed
Those steps or unit, but may include not listing clearly or intrinsic for these processes, method, product or equipment
Other steps or unit.
It is described below the embodiment of user authority control method in the embodiment of the present invention, the user authority control method is held
Row main body is mobile terminal, and the mobile terminal described in the embodiment of the present invention can be the intelligent mobile terminals such as mobile phone, flat board,
As technology develops, mobile terminal described in the present invention can also be it is following occur meet applied field of the embodiment of the present invention
The mobile terminal of scape, such as future newly touch screen mobile terminal occurs.
Referring to Fig. 1, being one embodiment of user authority control method in the embodiment of the present invention, this method is applied to move
Primary user provided with solution lock screen in dynamic terminal, the mobile terminal is with least one from user, and the mobile terminal includes privacy
System and intelligence system, this method include:
S1, when user unlock mobile terminal screen when, into intelligence system, determine user type;
Wherein, the user type includes primary user and from user, and primary user is the owner of mobile terminal.
If S2, user type are primary user, primary user is allowed to use intelligence system, it is allowed to which primary user is switched to privacy system
System;
If S3, user type are from user, forbid using work(set in advance in intelligence system in mobile terminal from user
Can, forbid being switched to privacy system from user from intelligence system.
The different user for the multiple user types that can enter mobile terminal, different user are provided with the embodiment of the present invention
The user of type enters the authority difference that mobile terminal is assigned, and primary user can use intelligence system, it is allowed to which primary user is switched to
Privacy system, forbid from user use mobile terminal in function set in advance in intelligence system, forbid from user from intelligent system
System is switched to privacy system, so for a mobile terminal, can control mobile terminal owner and other users to this
The access right of mobile terminal, it is ensured that the safety of privacy of user, data and property.
In the embodiment of the present invention, the mode of user's unblock mobile terminal screen of different user types can have a variety of, example
Such as, mobile terminal sets a variety of different gestures for unblock mobile terminal screen, multiple different passwords, multiple different user fingerprints
Deng, specifically, as mobile terminal be provided with for unblock mobile terminal screen a variety of different gestures, one of gesture for movement
The gesture set in terminal for primary user, it is the gesture set from user in mobile terminal that other gestures, which are, and for example mobile terminal
It is provided with multiple different passwords for unblock mobile terminal screen, it in mobile terminal is what primary user was set that one of password, which is,
Password, it is the password set from user in mobile terminal that other passwords, which are,.
So that mobile terminal sets multiple different user fingerprints for unblock mobile terminal screen as an example, further, this hair
In bright embodiment, be stored with the mobile terminal primary user's finger print information and it is described at least one believe from the fingerprint of user
Breath;Now, the step of above-mentioned determination user type, including:
If user is by primary user's unlocked by fingerprint mobile terminal, it is primary user to determine user type;
If user by this at least one from user one of them from user fingerprints unlock mobile terminal, determine user type
For from user.
Similarly, mobile terminal is unlocked by the gesture or password that are set for primary user, it may be determined that user type is primary
Family, mobile terminal is unlocked by the gesture to be set from user or password, it may be determined that user type is from user.
Further, it is above-mentioned forbid from user use mobile terminal in intelligence system the step of function set in advance,
It can include:
Forbid applying using the installation first in mobile terminal intelligence system from user, or/and, forbid performing from user
Target in mobile terminal intelligence system is set.
Wherein, it can be that primary user is pre- to forbid the first application used from user, forbid the target performed from user to set
First set, certainly, when primary user is not configured, forbids the first application used from user, forbid what is performed from user
It can also be that system default is set that target, which is set,.
So enter from user's unblock after mobile terminal intelligence system, set for the first application and target in mobile terminal
It can not be used or operation setting, improve the security of mobile terminal, it is to avoid the leakage of primary user's privacy information.
Optionally, it is above-mentioned forbid from user applied using mounted first in mobile terminal intelligence system the step of,
Can specifically there are two kinds of implementations:
(1) when mobile terminal intelligence system desktop shows the icon of the first application, answered if getting user and clicking on first
The click commands of icon, are not responding to the click commands.
When entering mobile terminal intelligence system from user's unblock, mobile terminal intelligence system desktop still shows all answer
Icon, if but user (due to being to unlock to enter from user, user here is actual as from user) clicks first
The icon of application, is now not responding to the click commands.It is preferred that, for the icon of the first application, darkening processing (example can be carried out
Such as it is processed into gray-scale map), so it can know which cannot be used using it from icon from user, or, to except first should
Other outside, using being highlighted, so can know which should from user workable for user with open-and-shut
With can use.
(2) icon of the first application and each quickly starting of the application of shielding first are hidden in mobile terminal intelligence system desktop
Mode.
In the embodiment of the present invention, the icon of the first application directly can also be hidden in mobile terminal intelligence system desktop, and
Each quickly starting mode (not showing the first application in global search result for example) of the application of shielding first, so from user
When unblock enters mobile terminal intelligence system desktop, the icon for the first application that those he can not use and various quickly starting sides
Formula is hidden or shielded, and first application can not be known from user, and then reaches the mesh for forbidding that the first application is used from user
's.
The implementation of mounted first application prohibitted the use of in mobile terminal intelligence system is described above is, together
Reason, forbids performing the target in mobile terminal intelligence system and sets, and on the one hand can also be shown in mobile terminal intelligence system
Target is set, if but get the operational order that user's performance objective is set, the operational order is not responding to (while can also be to mesh
Mark, which is set, carries out darkening processing), on the other hand can also vanishing target set, and shield each quickly starting mode of target setting
(such as display target is not set in global search result).
Further, in embodiments of the present invention, entering mobile terminal intelligence system from user's unblock, be prohibited from using
First application and when forbidding the performance objective to set, now, if getting the checking information of primary user, such as at default interface
(such as mobile terminal intelligence system desktop) gets the finger print information of primary user, then can (time can in the first preset time
Can be initially default value to be preset by primary user) in allow from user using first application and target set, for example,
Can be responded in the first preset time from user click on first apply, or performance objective set instruction, if first application and
Target is hidden before setting, then the first application hidden before showing and target are set, when the first preset time is reached, weight
It is new to recover to prohibit the use of the first application and forbid performance objective to set.
In the present embodiment, from user unblock enter mobile terminal intelligence system after, be initially can not use it is set in advance
What the first application and performance objective were set, but after the checking of primary user is got, can equivalent to the agreement for obtaining primary user
To use these disabled functions in the first preset time, after the first preset time is reached, recovery prohibits the use of these
Function, so can control other from user to mobile terminal intelligence system at any time as the primary user of mobile terminal owner
Access right.
Further, the situation of mobile terminal intelligence system is entered for being unlocked from user, when acquisition for mobile terminal to master
When the finger print information of user has unlocked partly or entirely function disabled before, if the mobile terminal to lock in the first preset time
Screen, now, after being unlocked again from user into mobile terminal, i.e., the partial function of the unblock can recover locking again again,
The function that lifts restrictions before thus is avoided that and primary user is forever authorized to some functions, only face, it is necessary to be prohibited from using again
When assign access right.If in the case where entering mobile terminal intelligence system from user's unblock, primary user needs to use completely
The intelligence system of function, now, primary user can be after manual screen lockings, then by the finger print information of primary user enter mobile terminal intelligence
Energy system, or, the option for setting all to use family instead in the terminal, when being switched to primary user, enters to primary user-identity
Row checking (such as primary user's fingerprint authentication), after being verified, be switched to primary user (switch back into from user with it is upper similar, behind
Repeat no more).
In the terminal storage primary user and at least one from the finger print information of user when, as shown in Fig. 2 above-mentioned steps
Forbid being switched to privacy system from user from intelligence system in S3, can include:
S31, when getting the switching command that first is switched to privacy system from user from intelligence system, be not responding to this and cut
Change instruction;
If S32, the finger print information for getting primary user, in preset time, recover response and be switched to from intelligence system
The switching command of privacy system;
S33, when receiving the switching command that privacy system is switched to from intelligence system in preset time, from intelligence system
It is switched to privacy system.
Now, the use with recovering the first application and target setting above is similar, and being switched to privacy system equally can profit
With the finger print information of primary user, recover the switching command that response is switched to privacy system from intelligence system, the preset time can be with
With above-mentioned first preset time at the same time, that is, to recover the use that the first application and target are set, with recovering influence switching
Instruction to privacy system is used with a verification mode checking, such as first after user enters mobile terminal, default
It is also extensive while the use of the first application and target setting is recovered if interface receives the finger print information of primary user's input
Complex response is switched to the switching command of privacy system from intelligence system, after the first preset time is reached, all forbids again.When
So, preset time can also be different from above-mentioned first preset time, that is, recover the use that the first application and target are set, with recovery
The instruction that influence is switched to privacy system is separately verified using verification mode.
In some embodiments of the invention, it is switched to from intelligence system after privacy system, side in the embodiment of the present invention
Method can also include:Forbid using function set in advance in privacy system in mobile terminal from user.Wherein, in privacy system
Function set in advance can also be the first application in privacy system, or the target in privacy system is set.Equally, these are prohibited
Function set in advance in the privacy system only used, in some embodiments of the invention, can also recover in some conditions,
Specific reset mode, is referred to reply the mode of the first application or object run in above-mentioned intelligence system, here is omitted.
Further, when unlocking mobile terminal screen from user, it is not limited for primary user in mobile terminal before
Some functions (as not by limitation use second application), primary user can also temporarily limited during user's use
System, i.e., method can also include in the embodiment of the present invention:
If unlock mobile terminal enter intelligence system for second from user, this second from user using not limited currently
Use second is made when applying, if getting the finger print information of primary user, current second application is closed, forbid this second from
Second applied using this at family.
It so after user again screen locking unblock, can recover that the state of the second application can be used again, can also
Proceed limitation.
In some embodiments of the invention, method can also include in the embodiment of the present invention:
It is mobile eventually in intelligence system or privacy system display if that unblock mobile terminal enters intelligence system is primary user
Hold the setting options from user's access right;
At the setting options interface from user right, if receiving the primary user changes the 3rd finger from user's access right
Order, changes the 3rd from access right of the user to mobile terminal.
Wherein, from user's access right can include mobile terminal intelligence system in can be used from user application, move
The setting that can be used from user in dynamic terminal intelligent system, the authority for being switched to from user from intelligence system privacy system, its
In, the application that can be used from user in mobile terminal intelligence system and it can be used from user in mobile terminal intelligence system
Set, the application and setting that can be selected in mobile terminal intelligence system can be shown successively in the way of list, primary user can
To select entirely, which part can also be selected as the access right from user in intelligence system.Further, from user from
When the authority that intelligence system is switched to privacy system is opened, can further include can from user in mobile terminal privacy system
With the application used, the subordinate's list for the setting that can be used from user in mobile terminal privacy system, primary user can enter one
Step sets the access right in privacy system from user.So in the embodiment of the present invention primary user be can in the terminal with
Shi Xiugai wants the access right from user of modification, accomplishes to adjust renewal at any time, has ensured the safety of primary user's private data.
In the embodiment of the present invention, first from user, second from user, the 3rd from user at least one among user
One, first from user, second from user, the 3rd can be identical two-by-two or all identical from user, can also it is all different (from
In the case that number of users is enough), it is not construed as limiting herein.
Below with a specifically used Sample Scenario, the embodiment of the present invention is described:
For example in one dual system mobile phone, including intelligence system and privacy system, intelligence system and privacy system include
Some common applications, such as UC browsers, QQ, wechat, Alipay, iqiyi.com, Taobao, king's honor, the mobile phone are primary
(parent) is possessed at family, and two are provided with the mobile phone can unlock the fingerprint into intelligence system:The finger of primary user (parent)
Line information, the finger print information from user (children), the two fingerprints, which can be unlocked, enters cell phone intelligent system, only function
Access right is different.
For entering cell phone intelligent system by parent's finger print information, institute is functional normally to be used, and is not limited, and for
Mobile phone is entered by children's finger print information, parent is provided with Alipay, wechat, Taobao etc. and prohibitted the use of using children, i.e., for
Enter the user of mobile phone by children's finger print information, click on Alipay, wechat, the application such as Taobao can not start (can also be direct
Hide these applications), if clicking on the application, by the way of being not responding to using ignoring instruction, at this point it is possible to point out children to be limited
System after the fingerprint authentication of parent, it is necessary to could use, if the Alipay that for example children click on, click Alipay points out to be limited,
Parent's fingerprint is needed to limit, now mobile phone is gone checking by children to parent, if after the fingerprint authentication of parent, children can face
When use Alipay application, now children can be the time set in advance using the time of Alipay, such as 2 minutes, or,
It is again introduced into and is limited again, it is necessary to which parent's fingerprint is unlocked again after mobile phone screen locking.
And king's honor for not limiting, children can click on and normally be actuated for game, now, if getting parent
Fingerprint, king's honor can equally be limited, exit king's honor, prohibit the use of, when children again tap on, i.e., do not rung
Should, or point out to be limited, need parent to verify.Disabling and solution limit for the privacy system in dual system, specifically can refer to above-mentioned
Embodiment, is no longer repeated herein.
The embodiment of mobile terminal in the embodiment of the present invention is described below.
Referring to Fig. 3, being to be provided with one embodiment schematic diagram of mobile terminal in the embodiment of the present invention, the mobile terminal
The primary user of solution lock screen is with least one from user, and the mobile terminal includes privacy system and intelligence system, and the movement is whole
End includes:
User type determining unit 301, for when user unlocks mobile terminal screen, into intelligence system, it is determined that with
Family type, the user type includes primary user and from user;
User right control unit 302, if being primary user for user type, allows primary user to use intelligence system,
Primary user is allowed to be switched to privacy system;If user type is from user, forbid using intelligence system in mobile terminal from user
In function set in advance, forbid being switched to privacy system from user from intelligence system.
Further, be stored with the mobile terminal primary user's finger print information and at least one from the finger print information of user;
The user type determining unit 301 specifically for:
If user is by primary user's unlocked by fingerprint mobile terminal, it is primary user to determine user type;
If user by least one from user one of them from user fingerprints unlock mobile terminal, determine that user type is
From user.
Further, the user right control unit 302 specifically for:
Forbid applying using the installation first in mobile terminal from user, or/and, forbid performing mobile terminal from user
In target set.
Further, the user right control unit 302 specifically for:
When mobile terminal shows the icon of the first application, if the click for getting the icon that user clicks on the first application refers to
Order, is not responding to the click commands,
Or,
The icon of the first application and each quickly starting mode of the application of shielding first are hidden in mobile terminal.
Further, user right control unit 302 specifically for:
When getting the switching command that first is switched to privacy system from user from intelligence system, it is not responding to the switching and refers to
Order;
If getting the finger print information of primary user, in preset time, recover response and be switched to privacy from intelligence system
The switching command of system;
When the switching command that privacy system is switched to from intelligence system is received in preset time, from intelligence system switching
To privacy system.
Further, the user right control unit 302 is additionally operable to:
If unlock mobile terminal enter intelligence system for second from user, second from user using not limited currently
When second used is applied, if getting the finger print information of primary user, current second application is closed, forbids this second from user
Use the second application.
Further, user right control unit 302 is specifically additionally operable to:
Be switched to from intelligence system after privacy system, forbid from user use mobile terminal in privacy system in advance
The function of setting.
Further, the device also includes:
Display unit 303, if for unlock mobile terminal enter intelligence system be primary user, in intelligence system or hidden
Private system shows setting options of the mobile terminal from user's access right;
The user right control unit 302 is additionally operable at the setting options interface from user right, if receiving the primary user
The 3rd instruction from user's access right is changed, the 3rd is changed from access right of the user to mobile terminal.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey
Sequence, the program includes the part or all of step of at least user authority control method described in the above method embodiment when performing
Suddenly.
It is apparent to those skilled in the art that, for convenience and simplicity of description, in the above-described embodiments,
Description to each embodiment all emphasizes particularly on different fields, and does not have the part being described in detail in some embodiment, may refer to other embodiment
Associated description.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some steps can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, involved action and module is not necessarily of the invention
It is necessary.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, such as multiple units or component
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or
The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces
Close or communicate to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used
When, it can be stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially
The part contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are to cause a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
Described above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before
Embodiment is stated the present invention is described in detail, it will be understood by those within the art that:It still can be to preceding
State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these
Modification is replaced, and the essence of appropriate technical solution is departed from the scope of various embodiments of the present invention technical scheme.
Claims (12)
1. provided with solution screen locking in a kind of user authority control method, it is characterised in that applied to mobile terminal, the mobile terminal
The primary user of curtain is with least one from user, and the mobile terminal includes privacy system and intelligence system, and methods described includes:
When user unlocks mobile terminal screen, into intelligence system, user type is determined, the user type includes primary user
With from user;
If the user type is primary user, the primary user is allowed to use the intelligence system, it is allowed to which the primary user cuts
Change to privacy system;
If the user type is from user, forbid from user using function set in advance in intelligence system in mobile terminal,
Forbid being switched to privacy system from user from intelligence system.
2. the method described in as requested 1, it is characterised in that it is described forbid from user use mobile terminal in intelligence system it is pre-
The step of function of first setting, including:
Forbid applying using the installation first in the intelligence system from user, or/and, forbid performing the intelligence from user
Target in system is set.
3. method according to claim 2, it is characterised in that it is described forbid from user use the intelligence system in
The step of first installed is applied, including:
The icon of first application is shown in the intelligence system desktop, if getting the figure that user clicks on first application
Target click commands, are not responding to the click commands,
Or,
The icon of first application and each quickly starting side of shielding first application are hidden in the intelligence system desktop
Formula.
4. according to the method described in claim 1, it is characterised in that described to forbid being switched to privacy system from user from intelligence system
The step of system, including:
When getting the switching command that first is switched to privacy system from user from intelligence system, it is not responding to the switching and refers to
Order;
If getting the finger print information of the primary user, in preset time, recover response and be switched to privacy from intelligence system
The switching command of system;
When the switching command that privacy system is switched to from intelligence system is received in the preset time, from intelligence system switching
To privacy system.
5. according to the method described in claim 1, it is characterised in that methods described also includes:
If unlock mobile terminal enter intelligence system for second from user, described second from user using not limited currently
When second used is applied, if getting the finger print information of the primary user, current second application is closed, forbids described second
The second application is used from user.
6. according to the method described in claim 1, methods described also includes:
If that unblock mobile terminal enters intelligence system is primary user, intelligence system or privacy system show mobile terminal from
The setting options of user's access right;
At the setting options interface from user right, if receiving the primary user changes the 3rd instruction from user's access right, repair
Change described in target the 3rd from access right of the user to mobile terminal.
7. a kind of mobile terminal, it is characterised in that primary user provided with solution lock screen in the mobile terminal and at least one from
User, the mobile terminal includes privacy system and intelligence system, and the mobile terminal includes:
User type determining unit, for when user unlocks mobile terminal screen, into intelligence system, determining user type,
The user type includes primary user and from user;
User right control unit, if being primary user for the user type, allows the primary user to use the intelligence
System, it is allowed to which the primary user is switched to privacy system;If the user type is from user, described used from user is forbidden to move
Function set in advance in intelligence system, forbids being switched to privacy system from user from intelligence system in dynamic terminal.
8. mobile terminal according to claim 7, it is characterised in that the user right control unit specifically for:
Forbid applying using the installation first in the intelligence system from user, or/and, forbid performing the intelligence from user
Target in system is set.
9. mobile terminal according to claim 8, it is characterised in that the user right control unit specifically for:
When the intelligence system desktop shows the icon of first application, if getting user clicks on first application
The click commands of icon, are not responding to the click commands,
Or,
The icon of first application and each quickly starting side of shielding first application are hidden in the intelligence system desktop
Formula.
10. mobile terminal according to claim 7, it is characterised in that the user right control unit specifically for:
When getting the switching command that first is switched to privacy system from user from intelligence system, it is not responding to the switching and refers to
Order;
If getting the finger print information of the primary user, in preset time, recover response and be switched to privacy from intelligence system
The switching command of system;
When the switching command that privacy system is switched to from intelligence system is received in the preset time, from intelligence system switching
To privacy system.
11. mobile terminal according to claim 7, it is characterised in that the user right control unit is additionally operable to:
If unlock mobile terminal enter intelligence system for second from user, described second from user using not limited currently
When second used is applied, if getting the finger print information of the primary user, current second application is closed, forbids described second
The second application is used from user.
12. mobile terminal according to claim 11, it is characterised in that
Described device also includes:
Display unit, if for unlock mobile terminal enter intelligence system be primary user, in intelligence system or privacy system
Show setting options of the mobile terminal from user's access right;
The user right control unit is additionally operable at the setting options interface from user right, if receiving primary user modification the
Three from the instruction of user's access right, and modification the described 3rd is from access right of the user to mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710153916.4A CN107038357A (en) | 2017-03-15 | 2017-03-15 | User authority control method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710153916.4A CN107038357A (en) | 2017-03-15 | 2017-03-15 | User authority control method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107038357A true CN107038357A (en) | 2017-08-11 |
Family
ID=59534807
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710153916.4A Pending CN107038357A (en) | 2017-03-15 | 2017-03-15 | User authority control method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107038357A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107526958A (en) * | 2017-08-30 | 2017-12-29 | 努比亚技术有限公司 | A kind of operating mode control method, terminal and computer-readable recording medium |
CN107563167A (en) * | 2017-08-29 | 2018-01-09 | 北京珠穆朗玛移动通信有限公司 | Fingerprint management method, mobile terminal and storage medium |
CN107609382A (en) * | 2017-10-12 | 2018-01-19 | 广东小天才科技有限公司 | A kind of locking means of terminal device, terminal device and storage medium |
CN107770378A (en) * | 2017-10-19 | 2018-03-06 | 佛山市章扬科技有限公司 | A kind of method based on finger print information unblock mobile phone |
CN108304108A (en) * | 2018-01-22 | 2018-07-20 | 维沃移动通信有限公司 | A kind of icon display method and mobile terminal of application program |
CN109344585A (en) * | 2018-10-09 | 2019-02-15 | 广州三星通信技术研究有限公司 | The method and apparatus of the access right of automatic setting electric terminal |
CN110321684A (en) * | 2018-03-31 | 2019-10-11 | 汇银宝网络技术股份有限公司 | A kind of information management-control method of the electronic equipment based on face recognition |
CN110417996A (en) * | 2019-07-19 | 2019-11-05 | 珠海格力电器股份有限公司 | A kind of method and terminal for protecting privacy information |
CN111487876A (en) * | 2019-01-28 | 2020-08-04 | 青岛海尔洗衣机有限公司 | Control method of household appliance |
WO2021218889A1 (en) * | 2020-04-27 | 2021-11-04 | Wai Hung Lee | Networking device with privacy protection |
CN113726955A (en) * | 2021-08-11 | 2021-11-30 | 珠海格力电器股份有限公司 | Terminal control method, terminal, device and storage medium thereof |
CN113986048A (en) * | 2021-12-27 | 2022-01-28 | 广州朗国电子科技股份有限公司 | Control method, device and storage medium for dual-system touch screen |
CN114090092A (en) * | 2021-11-29 | 2022-02-25 | 维沃移动通信有限公司 | Interaction method and device of electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916527A (en) * | 2013-01-09 | 2014-07-09 | 上海斐讯数据通信技术有限公司 | Method for achieving multi-user log-in mode and mobile terminal |
CN104284027A (en) * | 2014-10-29 | 2015-01-14 | 东莞宇龙通信科技有限公司 | Authority management method and authority management system for terminal |
CN104408383A (en) * | 2014-10-31 | 2015-03-11 | 东莞宇龙通信科技有限公司 | Private data processing system and method |
CN106250741A (en) * | 2016-07-22 | 2016-12-21 | 北京珠穆朗玛移动通信有限公司 | A kind of system switching method and mobile terminal |
-
2017
- 2017-03-15 CN CN201710153916.4A patent/CN107038357A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916527A (en) * | 2013-01-09 | 2014-07-09 | 上海斐讯数据通信技术有限公司 | Method for achieving multi-user log-in mode and mobile terminal |
CN104284027A (en) * | 2014-10-29 | 2015-01-14 | 东莞宇龙通信科技有限公司 | Authority management method and authority management system for terminal |
CN104408383A (en) * | 2014-10-31 | 2015-03-11 | 东莞宇龙通信科技有限公司 | Private data processing system and method |
CN106250741A (en) * | 2016-07-22 | 2016-12-21 | 北京珠穆朗玛移动通信有限公司 | A kind of system switching method and mobile terminal |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107563167A (en) * | 2017-08-29 | 2018-01-09 | 北京珠穆朗玛移动通信有限公司 | Fingerprint management method, mobile terminal and storage medium |
CN107526958A (en) * | 2017-08-30 | 2017-12-29 | 努比亚技术有限公司 | A kind of operating mode control method, terminal and computer-readable recording medium |
CN107609382B (en) * | 2017-10-12 | 2020-03-20 | 广东小天才科技有限公司 | Terminal device locking method, terminal device and storage medium |
CN107609382A (en) * | 2017-10-12 | 2018-01-19 | 广东小天才科技有限公司 | A kind of locking means of terminal device, terminal device and storage medium |
CN107770378A (en) * | 2017-10-19 | 2018-03-06 | 佛山市章扬科技有限公司 | A kind of method based on finger print information unblock mobile phone |
CN108304108B (en) * | 2018-01-22 | 2020-06-02 | 维沃移动通信有限公司 | Icon display method of application program and mobile terminal |
CN108304108A (en) * | 2018-01-22 | 2018-07-20 | 维沃移动通信有限公司 | A kind of icon display method and mobile terminal of application program |
CN110321684A (en) * | 2018-03-31 | 2019-10-11 | 汇银宝网络技术股份有限公司 | A kind of information management-control method of the electronic equipment based on face recognition |
CN109344585A (en) * | 2018-10-09 | 2019-02-15 | 广州三星通信技术研究有限公司 | The method and apparatus of the access right of automatic setting electric terminal |
CN111487876A (en) * | 2019-01-28 | 2020-08-04 | 青岛海尔洗衣机有限公司 | Control method of household appliance |
CN110417996A (en) * | 2019-07-19 | 2019-11-05 | 珠海格力电器股份有限公司 | A kind of method and terminal for protecting privacy information |
WO2021218889A1 (en) * | 2020-04-27 | 2021-11-04 | Wai Hung Lee | Networking device with privacy protection |
CN113726955A (en) * | 2021-08-11 | 2021-11-30 | 珠海格力电器股份有限公司 | Terminal control method, terminal, device and storage medium thereof |
CN114090092A (en) * | 2021-11-29 | 2022-02-25 | 维沃移动通信有限公司 | Interaction method and device of electronic equipment |
CN113986048A (en) * | 2021-12-27 | 2022-01-28 | 广州朗国电子科技股份有限公司 | Control method, device and storage medium for dual-system touch screen |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107038357A (en) | User authority control method and mobile terminal | |
CN105760737A (en) | Control method for applications and terminal | |
WO2016015448A1 (en) | Multi-system entering method, apparatus and terminal | |
CN106127077B (en) | A kind of method and terminal for protecting user privacy information | |
CN105930145A (en) | Information hiding method and mobile terminal | |
CN105897430A (en) | User management method and system for intelligent terminal | |
CN105678147B (en) | Touch operation method and device | |
US20140230026A1 (en) | Biometric-Based Access Control System Comprising a Near Field Communication Link | |
CN105809000A (en) | Information processing method and electronic device | |
CN105701420A (en) | Method for managing user data and terminal | |
CN108460256A (en) | Data guard method, mobile terminal and device | |
CN105094652A (en) | Touch screen unlocking method and device, electronic equipment, display and mobile terminal | |
CN108154017A (en) | A kind of method of password authentication and password validation system based on intelligent terminal | |
CN104376240A (en) | Method for processing information and electronic equipment | |
WO2015184894A2 (en) | Method and device for implementing multi-user login mode | |
CN106503506B (en) | A kind of information display method and electronic equipment | |
CN106407761B (en) | Unlocking method and unlocking device | |
US20130198836A1 (en) | Facial Recognition Streamlined Login | |
CN106778160A (en) | Data item display methods and device | |
WO2017105579A2 (en) | Interception-proof authentication and encryption system and method | |
US20200401679A1 (en) | Method and system for preventing unauthorized computer processing | |
US9473936B2 (en) | Method and device for protecting privacy information | |
CN107391987A (en) | Application guard method, device and electronic equipment based on living things feature recognition | |
CN104392158A (en) | Mobile terminal unlocking method and mobile terminal | |
CN105867792A (en) | Methods and apparatuses for unlocking touch screen and updating screen-locking interface of touch screen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170811 |