CN108268763A - terminal control method, device, storage medium and terminal - Google Patents
terminal control method, device, storage medium and terminal Download PDFInfo
- Publication number
- CN108268763A CN108268763A CN201810150261.XA CN201810150261A CN108268763A CN 108268763 A CN108268763 A CN 108268763A CN 201810150261 A CN201810150261 A CN 201810150261A CN 108268763 A CN108268763 A CN 108268763A
- Authority
- CN
- China
- Prior art keywords
- unlocking information
- information
- unlocking
- user
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the present application discloses a kind of terminal control method, device, storage medium and terminal, and this method includes:Unlocking information input by user is received first;Then judge whether the unlocking information is correct;If the last unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.The terminal control scheme provided in the embodiment of the present application can realize that user is entered by different passwords in different mode, improve the safety of user data.
Description
Technical field
The invention relates to mobile terminal applied technical field more particularly to terminal control method, device, storage Jie
Matter and terminal.
Background technology
With the development of electronic apparatus application technology, more and more application programs are mounted in mobile terminal.But it uses
When borrowing mobile phone to other people, other people can check all information in application at family, and secure user data is relatively low.
Invention content
The purpose of the embodiment of the present application is to provide a kind of terminal control method, device, storage medium and terminal, can improve
Secure user data.
In a first aspect, the embodiment of the present application provides a kind of terminal control method, including:
Receive unlocking information input by user;
Judge whether the unlocking information is correct;
If the unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.
Second aspect, the embodiment of the present application provide a kind of terminal control mechanism, including:
Receiving module, for receiving unlocking information input by user;
Judgment module, for judging whether the unlocking information that the receiving module receives is correct;
Handover module, if judging that the unlocking information is correct for the judgment module, into the unlocking information
Corresponding operational mode;
Unlocked state, for unlocking the terminal.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey
Sequence realizes the terminal control method as shown in first aspect when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of terminal, and including memory, processor and storage are on a memory
And the computer program that can be run in processor, the processor are realized when performing the computer program as shown in first aspect
Terminal control method.
The terminal control scheme provided in the embodiment of the present application, receives unlocking information input by user first;Secondly, judge
Whether the unlocking information is correct;Again, if the unlocking information is correct, into the corresponding operational mode of unlocking information,
Terminal is unlocked, can corresponding terminal be configured according to different unlocking informations, realize that user is entered not by different passwords
With the safety in pattern, improving user data.
Description of the drawings
Fig. 1 is a kind of flow diagram of terminal control method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another terminal control method provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another terminal control method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another terminal control method provided by the embodiments of the present application;
Fig. 5 is a kind of structure diagram of terminal control mechanism provided by the embodiments of the present application;
Fig. 6 is a kind of structure diagram of mobile terminal provided by the embodiments of the present application.
Specific embodiment
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is appreciated that
It is that specific embodiment described herein is used only for explaining the application rather than the restriction to the application.It further needs exist for illustrating
, part relevant with the application rather than entire infrastructure are illustrated only for ease of description, in attached drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although each step is described as the processing of sequence, many of which by flow chart
Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation
The processing can be terminated during completion, it is also possible to have the additional step being not included in attached drawing.The processing can be with
Corresponding to method, function, regulation, subroutine, subprogram etc..
With the development of electronic apparatus application technology, more and more application programs are mounted in mobile terminal.But it uses
When borrowing mobile phone to other people, other people can see all information in user mobile phone, lead to secure user data at family
Property is relatively low.And user, if carrying out the switching of different accounts, needs to jump to login circle when managing the multiple accounts of oneself
Face, and user name and password are inputted in log-in interface, then switch over.Therefore, it is traditional using different accounts and close
When code logs in different accounts, different accounts has different permissions, need to input in switch accounts different accounts and
Password.Therefore traditional operation is comparatively laborious, is unfavorable for being switched fast and secret protection.
The embodiment of the present application provides a kind of terminal control scheme, can be determined according to unlocking screen password input by user
The corresponding operating mode of password omits the step of user inputs user name, and realization is switched fast.Meanwhile the multiple unlocks of setting are close
Code, and the corresponding systematic parameter of each unlocking pin is configured, it realizes in non-owner in use, other users can not be seen
The data of whole primary users improve personal secrets.Concrete scheme is as follows:
Fig. 1 be terminal control provided by the embodiments of the present application flow diagram, this method for terminal by screen into
The situation of row unlock, this method can be performed by the mobile terminal with display screen, and wherein display screen can be touch screen, such as
Capacitive touch screen or voltage-type touch screen, the mobile terminal can be tablet computer, wearable device, laptop etc.,
This method specifically comprises the following steps:
Step 110 receives unlocking information input by user.
After mobile terminal locking, when user lights mobile terminal screen again, unlock interface is shown.User is on unlock circle
Unlocking information is inputted in face to be unlocked.The data format of unlocking information is related with unlock form.Optionally, user's input is received
Unlocked by fingerprint information, face unlocking information, iris unlocking information, at least one in gesture unlocking information and text unlocking information
It is a.
Unlocked by fingerprint information is obtained by fingerprint sensor, when the substance with texture such as finger is placed on fingerprint by user
When on sensor, fingerprint sensor obtains texture information, and sends this information to processor.It can be obtained by front camera
The facial image at family is taken, after analysis extraction characteristic point is carried out to facial image, obtains face unlocking information.Front camera is also
The iris unlocking information of user can be obtained, if extraction iris unlocking information, by screen display prompt focus point, when with
Front camera obtains iris unlocking information when focus point is watched at family.Gesture unlocking information can show that figure unlocks boundary for terminal
Face such as sets the unlock interface of 9 coordinate points, and user inputs the figure of connection coordinate points, by the corresponding coordinate points of the figure
Sequence is as gesture unlocking information.Text unlocking information is Arabic numerals sequence input by user, and the length of the sequence can be with
It is 4-8, preferably 6.It can be unlocked, can also be carried out by unlocking manner in one by a variety of unlocking manners simultaneously
Unlock.
Step 120 judges whether unlocking information is correct.
It, should according to the type search of unlocking information when obtaining unlocking information since the type of unlocking information is different
The corresponding unlocking pin of type.If unlocking information is matched with unlocking pin, judge that unlocking information is correct.
Optionally, user can be set is unlocked by a kind of unlocking manner, at this time after unlocking information is obtained, will be solved
Lock information is compared with default unlocking pin, judges that unlocking information is correct if matching.
If step 130, unlocking information are correct, into the corresponding operational mode of unlocking information, terminal is unlocked.If solution
Lock information mistake then returns and performs step 110.
Operational mode can be determined according to the setting of user, can also be set by system default.Optionally, operational mode packet
Personal pattern can also be included and borrow pattern by including operating mode and life pattern or operational mode.Operating mode and life
Pattern can be unlocked by different unlocking manners and can also be unlocked by identical unlocking manner.For example, operating mode is using close
Code unlocking information unlock, life pattern are unlocked using unlocked by fingerprint information.In another example operating mode and life pattern are using close
Code unlocking information unlock, corresponding unlocking pin is different with life pattern for the corresponding unlocking pin of operating mode.
Further, according to operational mode to the sensor of terminal, internetwork connection mode, memory space, using power
At least one of limit and data access are configured.
The corresponding terminal configuration of different operational modes is not quite similar.Wherein sensor includes acceleration transducer, photosensitive
Sensor, motion sensor and wireless signal sensors etc..The biography started in certain operational mode is included in the configuration of sensor
The sensor of sensor and disabling.
Internetwork connection mode includes wireless fidelity network (WIFI), Bluetooth signal, wireless near field communication (Near Field
Communication, NFC), infrared signal and mobile cellular network.Certain operation is included in the configuration of internetwork connection mode
Allow the internetwork connection mode of communication and the internetwork connection mode of disabling in pattern.
Memory space includes the capacity of workable memory space, and memory space includes buffer memory space.It is empty to storage
Between configuration be included in the size of the address area of workable memory space and memory space under certain operational mode.
Include the startup permission of application program using permission and call permission.To the configuration packet of application access right
It includes, the application that acquiescence in certain operational mode is shown in desktop, the i.e. bootable application of user is configured.
Data access includes the access of primary user's individual privacy data and the access of non-private data.Data access is set
It puts including the hiding display to the chat record of primary user, contact person and picture and the spy for forbidding calling primary user's selection
Determine contact person etc..
The terminal control method provided in the embodiment of the present application receives unlocking information input by user first;Secondly, judge
Whether the unlocking information is correct;Again, then terminal is unlocked into the corresponding operational mode of unlocking information, it can be according to difference
Unlocking information, corresponding terminal is configured.It, can after other users unlock relative to a unlocking pin is only set in the relevant technologies
Check that userspersonal information compares, the embodiment of the present application can realize that user is entered by different passwords in different mode,
And after the other users of non-master user are using the unlocking pin unlock of non-master user, terminal can shield primary user's personal information,
Improve the safety of user data.It is switched over, improved between multiple operational modes by unlocking pin meanwhile, it is capable to realize
Switch speed between each operational mode.
Fig. 2 be another terminal control method provided in this embodiment flow diagram, as above-described embodiment into
One step explanation, including:
Step 210 receives unlocking information input by user.
Step 220 obtains the corresponding password type of unlocking information.
The hardware module for receiving unlocking information is corresponding with password type, therefore, can determine according to hardware module mark close
Code type.For example, the unlocking information for passing through touch screen input is text unlocking information or gesture unlocking information.Pass through fingerprint sensing
The unlocking information that device obtains is finger print information.
Step 230 obtains the corresponding default unlocking pin of password type.
Read the pre-set default unlocking pin corresponding with password type of user.
Illustratively, the first finger print information of setting (such as left index finger) is the default unlocking pin of personal pattern.Setting the
Default unlocking pin of two finger print informations (such as right hand forefinger or left hand middle finger) as borrow pattern.Believe when obtaining unlocked by fingerprint
During breath, unlocking pin is preset with above-mentioned two respectively and be compared, judge whether matched unlocking pin.
Illustratively, setting first gesture unlocking information is the default unlocking pin of operating mode.First iris solution is set
Lock information is the default unlocking pin of life pattern.If the gesture unlocking information received and first gesture unlocking information
Match, it is determined that into operating mode.If the iris information obtained all is matched with the first iris unlocking information slash, it is determined that enters life
Pattern living.
Step 240 judges whether unlocking information matches with default unlocking pin.
If unlocking information is matched with default unlocking pin, step 250 is performed.If unlocking information and default unlock are close
Code mismatches, and performs step 270.
If step 250, unlocking information are matched with default unlocking pin, unlocking information is correct.If unlocking information with
Default unlocking pin mismatches, then unlocking information mistake.During unlocking information mistake, return and perform step 210.
If step 260, unlocking information are correct, into the corresponding operational mode of unlocking information, and terminal is unlocked.
Terminal control method provided in this embodiment can obtain the corresponding password type of unlocking information, and according to password
Type determines to preset unlocking pin accordingly, realize according to same type of unlocking information determine different operational modes and
Different operational modes is determined according to different types of unlocking information, improves ease for use.
Fig. 3 be another terminal control method provided in this embodiment flow diagram, as above-described embodiment into
One step illustrates that operational mode includes personal pattern and borrows pattern, and this method includes:
Step 310 receives unlocking information input by user.
Step 320 judges whether unlocking information is correct.
If step 330, unlocking information are correct, face information is obtained.
Face information can be the face characteristic information that must be beaten after being scanned to facial image.
Step 340 judges whether face information is primary user.
The face characteristic information of primary user is stored in advance.The face characteristic letter of active user is got in step 330
After breath, matched with the face characteristic information of pre-stored primary user.If successful match, active user is primary
Family.If it fails to match, active user is non-master user.
If step 350, face information are primary user, enter personal pattern.
If step 360, face information are non-master user, into borrow pattern, the personal data of primary user are hidden.
Further, shielding shows instant messaging chat message or shields the payment accounts and payment cipher of primary user.
When entering borrow pattern, the account in instant chat application and shopping application can be nullified, and then make non-master
Other people of user can not check the chat content of primary user, can not also be consumed using user account.
Step 370, unlock terminal.
The method of terminal control provided by the embodiments of the present application can be obtained when carrying out text unlock or unlocked by fingerprint
The face information of active user.Determined whether according to face information for primary user, and then non-master user is avoided to be solved using primary user
The security risk that lock cipher operation mobile terminal generates, further improves safety.
Fig. 4 be another terminal control method provided in this embodiment flow diagram, as above-described embodiment into
One step illustrates that operational mode includes personal pattern and borrows pattern, and this method includes:
Step 410 receives unlocking information input by user.
Step 420 judges whether unlocking information is correct.
If step 430, unlocking information are correct, if unlocking information is matched with working password, into operating mode,
Unlock terminal.
If step 440, unlocking information and life password match into life pattern, unlock terminal.
Wherein, operating mode is different using permission from life pattern.
For example, the startup of the applications such as Entertainment should be reduced during work, therefore the shielding display game in operating mode
Using the application icon of, entertainment applications and shopping application.Or display above application icon do not allow users to visit still or
Start above application.
In addition, setting operating mode is mute or vibrating mode, so that user is after mobile phone is unlocked, do not need to again to sound
Sound is configured.The setting of further sound can include the setting of the tinkle of bells sound size and ringing-type.
The application icon of game application, entertainment applications and shopping application can be shown in life pattern, and allows user
It accesses.
Terminal control method provided by the embodiments of the present application, can in operating mode and life pattern to application program with
And sound is configured, and realizes the mobile terminal that different operational modes are unlocked by different unlocking pins, simplifies user setting
Operation improves the service efficiency of mobile terminal.
Fig. 5 is a kind of structure diagram of terminal control mechanism provided by the embodiments of the present application.As shown in figure 5, the device
Including:Receiving module 510, judgment module 520, handover module 530 and unlocked state 540.
Receiving module 510, for receiving unlocking information input by user;
Judgment module 520, for judging whether the unlocking information that the receiving module 510 receives is correct;
Handover module 530, if judging that the unlocking information is correct for the judgment module 520, into the solution
The corresponding operational mode of lock information;
Unlocked state 540, for unlocking the terminal.
Further, judgment module 520 is used for:
Obtain the corresponding password type of the unlocking information;
Obtain the corresponding default unlocking pin of the password type;
Judge whether the unlocking information matches with the default unlocking pin;
If the unlocking information is matched with the default unlocking pin, the unlocking information is correct;
If the unlocking information is mismatched with the default unlocking pin, the unlocking information mistake.
Further, the operational mode includes personal pattern and borrows pattern, correspondingly, the handover module 530 is used
In:
Obtain face information;
Judge whether the face information is primary user;
If the face information is primary user, enter personal pattern;
If the face information is non-master user, into borrow pattern, the personal data of the primary user are hidden.
Further, the handover module 530 is used for:
Shielding shows the payment accounts and payment cipher of instant messaging chat message or the shielding primary user.
Further, the operational mode includes operating mode and life pattern, correspondingly, the handover module 530 is used
In:If the unlocking information is matched with working password, into operating mode;
If the unlocking information and life password match, into life pattern;The operating mode and the life
Pattern using permission difference.
Further, the handover module 530 is used for:
Obtain the configuration information of the corresponding operational mode of the unlocking information;
According to the configuration information to the sensor of terminal, internetwork connection mode, memory space, using permission sum number
It is configured according at least one of access.
Further, the receiving module 510 is used for:
Receive unlocked by fingerprint information input by user, face unlocking information, iris unlocking information, gesture unlocking information and text
At least one of this unlocking information.
The terminal control mechanism provided in the embodiment of the present application, first receiving module 510 receive unlock letter input by user
Breath;Secondly, judgment module 520 judges whether the unlocking information is correct;Again, if the judgment module 520 judge it is described
Unlocking information is correct, then handover module 530 enters the corresponding operational mode of the unlocking information, and unlocked state 540 unlocks described
Corresponding terminal can be configured according to different unlocking informations in terminal.Relative to only being set in the relevant technologies, a unlock is close
Code can check that userspersonal information compares after other users unlock, and it is different close that the embodiment of the present application can realize that user passes through
After code is entered in different mode, and the other users of non-master user are using the unlocking pin unlock of non-master user, terminal can be with
Primary user's personal information is shielded, improves the safety of user data.Meanwhile, it is capable to it realizes through unlocking pin in multiple operation moulds
It is switched between formula, improves the switch speed between each operational mode.
Above device can perform the method that the aforementioned all embodiments of the application are provided, and it is corresponding to have the execution above method
Function module and advantageous effect.The not technical detail of detailed description in the present embodiment, reference can be made to the aforementioned all implementations of the application
The method that example is provided.
Fig. 6 is the structure diagram of another terminal device provided by the embodiments of the present application.As shown in fig. 6, the terminal can
To include:Housing (not shown), memory 601, central processing unit (Central Processing Unit, CPU) 602
(also known as processor, hereinafter referred to as CPU), the computer program that is stored on memory 601 and can be run on processor 602,
Circuit board (not shown) and power circuit (not shown).The circuit board is placed in the space that the housing surrounds
Portion;The CPU602 and the memory 601 are arranged on the circuit board;The power circuit, for for the terminal
Each circuit or device power supply;The memory 601, for storing executable program code;The CPU602 is by reading
The executable program code that is stored in memory 601 is stated to run program corresponding with the executable program code.
The terminal further includes:Peripheral Interface 603, RF (Radio Frequency, radio frequency) circuit 605, voicefrequency circuit
606th, loud speaker 611, power management chip 608, input/output (I/O) subsystem 609, touch screen 612, other input/controls
Equipment 610 and outside port 604, these components are communicated by one or more communication bus or signal wire 607.
It should be understood that graphic terminal 600 is only an example of terminal, and terminal device 600 can be with
With than more or less components shown in figure, two or more components can be combined or can be had
Different component configurations.Various parts shown in figure can be including one or more signal processings and/or special integrated
Hardware, software including circuit are realized in the combination of hardware and software.
Below just a kind of terminal device provided in this embodiment be described in detail, the terminal device using smart mobile phone as
Example.
Memory 601, the memory 601 can be by access such as CPU602, Peripheral Interfaces 603, and the memory 601 can
To include high-speed random access memory, nonvolatile memory can also be included, such as one or more disk memory,
Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU602 and deposited by Peripheral Interface 603, the Peripheral Interface 603
Reservoir 601.
I/O subsystems 609, the I/O subsystems 609 can be by the input/output peripherals in equipment, such as touch screen 612
With other input/control devicess 610, it is connected to Peripheral Interface 603.I/O subsystems 609 can include 6091 He of display controller
For controlling one or more input controllers 6092 of other input/control devicess 610.Wherein, one or more input controls
Device 6092 processed receives electric signal from other input/control devicess 610 or sends electric signal to other input/control devicess 610,
Other input/control devicess 610 can include physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour
Vertical pole clicks idler wheel.What deserves to be explained is input controller 6092 can with it is following any one connect:Keyboard, infrared port,
The indicating equipment of USB interface and such as mouse.
Wherein, according to the operation principle of touch screen and transmission information medium classification, touch screen 612 can be resistance-type,
Capacitor induction type, infrared-type or surface acoustic wave type.Classify according to mounting means, touch screen 612 can be:It is external hanging type, built-in
Formula or monoblock type.Classify according to technical principle, touch screen 612 can be:Vector pressure sensing technology touch screen, resistive technologies are touched
Touch screen, capacitance technology touch screen, infrared technology touch screen or surface acoustic wave technique touch screen.
Touch screen 612, the touch screen 612 are the input interface and output interface between user terminal and user, can
User is shown to depending on output, visual output can include figure, text, icon, video etc..Optionally, touch screen 612 is by user
The electric signal (electric signal of such as contact surface) triggered on touch screen curtain, is sent to processor 602.
Display controller 6091 in I/O subsystems 609 receives electric signal from touch screen 612 or is sent out to touch screen 612
Electric signals.Touch screen 612 detects the contact on touch screen, and the contact detected is converted to and shown by display controller 6091
The interaction of user interface object on touch screen 612, that is, realize human-computer interaction, the user interface being shown on touch screen 612
Icon that object can be the icon of running game, be networked to corresponding network etc..What deserves to be explained is equipment can also include light
Mouse, light mouse are the extensions for not showing the touch sensitive surface visually exported or the touch sensitive surface formed by touch screen.
RF circuits 605 are mainly used for establishing the communication of intelligent sound box and wireless network (i.e. network side), realize intelligent sound box
Data receiver and transmission with wireless network.Such as transmitting-receiving short message, Email etc..
Voicefrequency circuit 606 is mainly used for receiving audio data from Peripheral Interface 603, which is converted to telecommunications
Number, and the electric signal is sent to loud speaker 611.
Loud speaker 611 for the voice signal for receiving intelligent sound box from wireless network by RF circuits 605, is reduced to
Sound simultaneously plays the sound to user.
Power management chip 608, the hardware for being connected by CPU602, I/O subsystem and Peripheral Interface are powered
And power management.
In the present embodiment, central processing unit 602 is used for:
Receive unlocking information input by user;
Judge whether the unlocking information is correct;
If the unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.
Further, it is described to judge whether the unlocking information is correct, including:
Obtain the corresponding password type of the unlocking information;
Obtain the corresponding default unlocking pin of the password type;
Judge whether the unlocking information matches with the default unlocking pin;
If the unlocking information is matched with the default unlocking pin, the unlocking information is correct;
If the unlocking information is mismatched with the default unlocking pin, the unlocking information mistake.
Further, the operational mode includes personal pattern and borrows pattern, correspondingly, described believe into the unlock
Corresponding operational mode is ceased, including:
Obtain face information;
Judge whether the face information is primary user;
If the face information is primary user, enter personal pattern;
If the face information is non-master user, into borrow pattern, the personal data of the primary user are hidden.
Further, the personal data for hiding the primary user, including:
Shielding shows the payment accounts and payment cipher of instant messaging chat message or the shielding primary user.
Further, the operational mode includes operating mode and life pattern, correspondingly, described obtain the unlock letter
Corresponding operational mode is ceased, including:
If the unlocking information is matched with working password, into operating mode;
If the unlocking information and life password match, into life pattern;The operating mode and the life
Pattern using permission difference.
Further, it is described to enter the corresponding operational mode of the unlocking information, including:
Obtain the configuration information of the corresponding operational mode of the unlocking information;
According to the configuration information to the sensor of terminal, internetwork connection mode, memory space, using permission sum number
It is configured according at least one of access.
Further, it is described to receive unlocking information input by user, including:
Receive unlocked by fingerprint information input by user, face unlocking information, iris unlocking information, gesture unlocking information and text
At least one of this unlocking information.
The embodiment of the present application also provides a kind of storage medium for including terminal device executable instruction, and the terminal device can
When being performed by terminal device processor for performing a kind of terminal control method, this method includes execute instruction:
Receive unlocking information input by user;
Judge whether the unlocking information is correct;
If the unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.
Further, it is described to judge whether the unlocking information is correct, including:
Obtain the corresponding password type of the unlocking information;
Obtain the corresponding default unlocking pin of the password type;
Judge whether the unlocking information matches with the default unlocking pin;
If the unlocking information is matched with the default unlocking pin, the unlocking information is correct;
If the unlocking information is mismatched with the default unlocking pin, the unlocking information mistake.
Further, the operational mode includes personal pattern and borrows pattern, correspondingly, described believe into the unlock
Corresponding operational mode is ceased, including:
Obtain face information;
Judge whether the face information is primary user;
If the face information is primary user, enter personal pattern;
If the face information is non-master user, into borrow pattern, the personal data of the primary user are hidden.
Further, the personal data for hiding the primary user, including:
Shielding shows the payment accounts and payment cipher of instant messaging chat message or the shielding primary user.
Further, the operational mode includes operating mode and life pattern, correspondingly, described obtain the unlock letter
Corresponding operational mode is ceased, including:
If the unlocking information is matched with working password, into operating mode;
If the unlocking information and life password match, into life pattern;The operating mode and the life
Pattern using permission difference.
Further, it is described to enter the corresponding operational mode of the unlocking information, including:
Obtain the configuration information of the corresponding operational mode of the unlocking information;
According to the configuration information to the sensor of terminal, internetwork connection mode, memory space, using permission sum number
It is configured according at least one of access.
Further, it is described to receive unlocking information input by user, including:
Receive unlocked by fingerprint information input by user, face unlocking information, iris unlocking information, gesture unlocking information and text
At least one of this unlocking information.
The arbitrary of one or more computer-readable media may be used in the computer storage media of the embodiment of the present application
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or
Device or arbitrary above combination.The more specific example (non exhaustive list) of computer readable storage medium includes:Tool
There are one or the electrical connections of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory
(ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-
ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage
Medium can be any tangible medium for including or storing program, which can be commanded execution system, device or device
Using or it is in connection.
Computer-readable signal media can include in a base band or as a carrier wave part propagation data-signal,
Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but it is unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By instruction execution system, device either device use or program in connection.
The program code included on computer-readable medium can be transmitted with any appropriate medium, including --- but it is unlimited
In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with one or more programming language or combinations come write for perform the application operation computer
Program code, programming language include object oriented program language-such as Java, Smalltalk, C++, also wrap
Include conventional procedural programming language-such as " C " language or similar programming language.Program code can be complete
Ground is performed, is partly performed on the user computer on the user computer, the software package independent as one performs, partly exists
Part performs or performs on a remote computer or server completely on the remote computer on subscriber computer.It is being related to
In the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (LAN) or wide area
Net (WAN)-be connected to subscriber computer or, it may be connected to outer computer (such as utilizes ISP
To pass through Internet connection).
Certainly, a kind of storage medium for including computer executable instructions that the embodiment of the present application is provided, computer
Operation is recommended in the application that executable instruction is not limited to the described above, and the application that the application any embodiment is provided can also be performed
Relevant operation in recommendation method.
Note that it above are only the preferred embodiment of the application and institute's application technology principle.It will be appreciated by those skilled in the art that
The application is not limited to specific embodiment described here, can carry out for a person skilled in the art it is various it is apparent variation,
The protection domain readjusted and substituted without departing from the application.Therefore, although being carried out by above example to the application
It is described in further detail, but the application is not limited only to above example, in the case where not departing from the application design, also
It can include other more equivalent embodiments, and scope of the present application is determined by scope of the appended claims.
Claims (10)
1. a kind of terminal control method, which is characterized in that including:
Receive unlocking information input by user;
Judge whether the unlocking information is correct;
If the unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.
2. terminal control method according to claim 1, which is characterized in that described to judge the unlocking information whether just
Really, including:
Obtain the corresponding password type of the unlocking information;
Obtain the corresponding default unlocking pin of the password type;
Judge whether the unlocking information matches with the default unlocking pin;
If the unlocking information is matched with the default unlocking pin, the unlocking information is correct;
If the unlocking information is mismatched with the default unlocking pin, the unlocking information mistake.
3. terminal control method according to claim 1, which is characterized in that the operational mode includes personal pattern and borrows
With pattern, correspondingly, described enter the corresponding operational mode of the unlocking information, including:
Obtain face information;
Judge whether the face information is primary user;
If the face information is primary user, enter personal pattern;
If the face information is non-master user, into borrow pattern, the personal data of the primary user are hidden.
4. terminal control method according to claim 3, which is characterized in that a number for hiding the primary user
According to, including:
Shielding shows the payment accounts and payment cipher of instant messaging chat message or the shielding primary user.
5. terminal control method according to claim 1, which is characterized in that the operational mode includes operating mode and life
Pattern living, correspondingly, described obtain the corresponding operational mode of the unlocking information, including:
If the unlocking information is matched with working password, into operating mode;
If the unlocking information and life password match, into life pattern;The operating mode and the life pattern
Using permission difference.
6. terminal control method according to claim 1, which is characterized in that described to enter the corresponding fortune of the unlocking information
Row pattern, including:
Obtain the configuration information of the corresponding operational mode of the unlocking information;
According to the configuration information to the sensor of terminal, internetwork connection mode, memory space, visit using permission and data
It at least one of asks and to be configured.
7. terminal control method according to claim 1, which is characterized in that it is described to receive unlocking information input by user,
Including:
Receive unlocked by fingerprint information input by user, face unlocking information, iris unlocking information, gesture unlocking information and text solution
At least one of lock information.
8. a kind of terminal control mechanism, which is characterized in that including:
Receiving module, for receiving unlocking information input by user;
Judgment module, for judging whether the unlocking information that the receiving module receives is correct;
Handover module if judging that the unlocking information is correct for the judgment module, enters the unlocking information and corresponds to
Operational mode;
Handover module unlocked state, for unlocking the terminal.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The terminal control method as described in any in claim 1-7 is realized during row.
10. a kind of terminal, including memory, processor and storage are on a memory and can be in the computer journey of processor operation
Sequence, which is characterized in that the processor realizes the terminal control as described in claim 1-7 is any when performing the computer program
Method processed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810150261.XA CN108268763A (en) | 2018-02-13 | 2018-02-13 | terminal control method, device, storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810150261.XA CN108268763A (en) | 2018-02-13 | 2018-02-13 | terminal control method, device, storage medium and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108268763A true CN108268763A (en) | 2018-07-10 |
Family
ID=62774237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810150261.XA Pending CN108268763A (en) | 2018-02-13 | 2018-02-13 | terminal control method, device, storage medium and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108268763A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614783A (en) * | 2018-12-20 | 2019-04-12 | 惠州Tcl移动通信有限公司 | Terminal safety protection method, device, mobile terminal and storage medium |
CN111143797A (en) * | 2019-12-27 | 2020-05-12 | 上海闻泰信息技术有限公司 | Unlocking method and device of terminal equipment, terminal equipment and storage medium |
CN111866272A (en) * | 2020-06-30 | 2020-10-30 | 维沃移动通信有限公司 | Control method and device of electronic equipment |
WO2021088272A1 (en) * | 2019-11-04 | 2021-05-14 | 深圳传音控股股份有限公司 | Application protection method, control device, and readable storage medium |
CN114840843A (en) * | 2019-05-24 | 2022-08-02 | 华为技术有限公司 | Login method of intelligent terminal and electronic equipment |
CN115206006A (en) * | 2022-06-23 | 2022-10-18 | 浙江骑客机器人科技有限公司 | Electric vehicle and unlocking method thereof |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN105025165A (en) * | 2015-07-06 | 2015-11-04 | 北京乐动卓越科技有限公司 | Interface unlocking method and system corresponding to multiple passwords |
CN105897430A (en) * | 2016-06-22 | 2016-08-24 | 浙江德景电子科技有限公司 | User management method and system for intelligent terminal |
CN106126999A (en) * | 2016-06-15 | 2016-11-16 | 维沃移动通信有限公司 | The unlocking method of a kind of Intelligent Recognition visitor and mobile terminal |
CN106372468A (en) * | 2015-07-21 | 2017-02-01 | 腾讯科技(深圳)有限公司 | Mobile terminal operation method and mobile terminal |
CN106506786A (en) * | 2016-12-27 | 2017-03-15 | 努比亚技术有限公司 | The terminal and method of protection user privacy information |
CN107679410A (en) * | 2017-09-07 | 2018-02-09 | 深圳支点电子智能科技有限公司 | Possess the mobile terminal and Related product of certain privacy protection function |
-
2018
- 2018-02-13 CN CN201810150261.XA patent/CN108268763A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN105025165A (en) * | 2015-07-06 | 2015-11-04 | 北京乐动卓越科技有限公司 | Interface unlocking method and system corresponding to multiple passwords |
CN106372468A (en) * | 2015-07-21 | 2017-02-01 | 腾讯科技(深圳)有限公司 | Mobile terminal operation method and mobile terminal |
CN106126999A (en) * | 2016-06-15 | 2016-11-16 | 维沃移动通信有限公司 | The unlocking method of a kind of Intelligent Recognition visitor and mobile terminal |
CN105897430A (en) * | 2016-06-22 | 2016-08-24 | 浙江德景电子科技有限公司 | User management method and system for intelligent terminal |
CN106506786A (en) * | 2016-12-27 | 2017-03-15 | 努比亚技术有限公司 | The terminal and method of protection user privacy information |
CN107679410A (en) * | 2017-09-07 | 2018-02-09 | 深圳支点电子智能科技有限公司 | Possess the mobile terminal and Related product of certain privacy protection function |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614783A (en) * | 2018-12-20 | 2019-04-12 | 惠州Tcl移动通信有限公司 | Terminal safety protection method, device, mobile terminal and storage medium |
CN114840843A (en) * | 2019-05-24 | 2022-08-02 | 华为技术有限公司 | Login method of intelligent terminal and electronic equipment |
CN114840843B (en) * | 2019-05-24 | 2022-11-11 | 华为技术有限公司 | Login method of intelligent terminal and electronic equipment |
WO2021088272A1 (en) * | 2019-11-04 | 2021-05-14 | 深圳传音控股股份有限公司 | Application protection method, control device, and readable storage medium |
CN111143797A (en) * | 2019-12-27 | 2020-05-12 | 上海闻泰信息技术有限公司 | Unlocking method and device of terminal equipment, terminal equipment and storage medium |
CN111143797B (en) * | 2019-12-27 | 2023-09-26 | 上海闻泰信息技术有限公司 | Unlocking method and device of terminal equipment, terminal equipment and storage medium |
CN111866272A (en) * | 2020-06-30 | 2020-10-30 | 维沃移动通信有限公司 | Control method and device of electronic equipment |
CN115206006A (en) * | 2022-06-23 | 2022-10-18 | 浙江骑客机器人科技有限公司 | Electric vehicle and unlocking method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108268763A (en) | terminal control method, device, storage medium and terminal | |
KR102406099B1 (en) | Electronic device and method for displaying information thereof | |
US10867149B2 (en) | User identification through an external device on a per touch basis on touch sensitive devices | |
KR102508947B1 (en) | Embedded authentication systems in an electronic device | |
CN108563933A (en) | Control method, device, storage medium and the mobile terminal of application program | |
US9692868B2 (en) | Mobile terminal and control method for the mobile terminal | |
KR102312336B1 (en) | Method for sharing data and apparatus thereof | |
US9626505B2 (en) | Method and apparatus for managing authentication | |
CN103699825A (en) | Display apparatus and method for operating the same | |
US9877192B2 (en) | Mobile terminal and method of controlling the same | |
KR20140079012A (en) | Mobile apparatus having function of face recognition with additional component | |
US10891397B2 (en) | User interface display method for terminal, and terminal | |
CN103442141A (en) | Method for having access to safe mode in one-touch mode | |
CN107704759A (en) | Control method, device, storage medium and the electronic equipment of sensitive operation | |
KR102335552B1 (en) | Cover device, and electronic device and method for identifying the same | |
CN109074171B (en) | Input method and electronic equipment | |
CN105701420B (en) | A kind of management method and terminal of user data | |
CN108171048A (en) | Password prompt method, apparatus, storage medium and terminal | |
CN108718271A (en) | Processing method, device, storage medium and the terminal of good friend's request | |
CN108475306B (en) | User interface for mobile device | |
CN109558243A (en) | Processing method, device, storage medium and the terminal of virtual data | |
CN108369618A (en) | A kind of fingerprint identification method and terminal device | |
CN110189137A (en) | Method, apparatus, equipment and the storage medium of brush face payment | |
EP3347854A1 (en) | User identification through an external device on a per touch basis on touch sensitive devices | |
CN106485136A (en) | The authority configuring method of application program, device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180710 |
|
RJ01 | Rejection of invention patent application after publication |