CN108521494A - Terminal control method and device, readable storage medium storing program for executing, terminal - Google Patents
Terminal control method and device, readable storage medium storing program for executing, terminal Download PDFInfo
- Publication number
- CN108521494A CN108521494A CN201810316545.1A CN201810316545A CN108521494A CN 108521494 A CN108521494 A CN 108521494A CN 201810316545 A CN201810316545 A CN 201810316545A CN 108521494 A CN108521494 A CN 108521494A
- Authority
- CN
- China
- Prior art keywords
- terminal
- control instruction
- mode
- prompt message
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 63
- 230000015654 memory Effects 0.000 claims description 49
- 238000004590 computer program Methods 0.000 claims description 26
- 230000007246 mechanism Effects 0.000 claims description 15
- 230000006854 communication Effects 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 11
- 230000009471 action Effects 0.000 claims description 7
- 238000013507 mapping Methods 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 238000012545 processing Methods 0.000 description 8
- 238000012544 monitoring process Methods 0.000 description 7
- 238000010295 mobile communication Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 230000006698 induction Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q9/00—Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
Abstract
This application involves a kind of terminal control methods and device, computer readable storage medium, terminal, system, terminal control system.This method, including:Obtain the identity information of currently used person;When identity information and default identity information mismatch, prompt message is sent to the second terminal communicated with first terminal;Prompt message is used to indicate second terminal executes the operation for whether triggering control instruction;Receive the control instruction of second terminal feedback, it sets currently running user mode to guest mode according to control instruction, the control instruction that can be sent according to second terminal, it is very concealed that the user mode of first terminal is automatically set as guest mode, face of the owner user in the presence of interim user is not needed, relevant operation slave holotype is carried out on first terminal is switched to guest mode, to both avoid the embarrassment between friend, it is consulted by interim user without the privacy information on worry first terminal, improves user experience.
Description
Technical field
This application involves field of terminal technology, more particularly to a kind of terminal control method and device, computer-readable deposit
Storage media, terminal, terminal control system.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives
Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc.
Different demands.
Currently, a variety of user modes can be arranged so that multiple users use same terminal, such as owner's pattern, visit in terminal
Objective pattern etc..When owner user needs to set the user mode of terminal to guest mode, need owner user in the terminal
It is upper to be operated accordingly, it could realize the setting of guest mode.If interim user station owner user by the side of when, by terminal
User mode be set as guest mode, the operation is obvious, lofty, and user experience is low.
Invention content
A kind of terminal control method of the embodiment of the present application offer and device, computer readable storage medium, terminal, terminal control
System processed, it may be possible to after terminal is lent other people uses, reconditely set terminal to guest mode, protect owner user
Privacy, improve user experience.
In a first aspect, this application provides a kind of terminal control method, it is applied to first terminal, including:
When unlocking the first terminal, the identity information of currently used person is obtained;
When the identity information and default identity information mismatch, eventually to second communicated with the first terminal
End sends prompt message;The prompt message is used to indicate the second terminal executes the operation for whether triggering control instruction;
The control instruction for receiving second terminal feedback, sets currently running user mode according to the control instruction
It is set to guest mode.
Second aspect, this application provides a kind of terminal control methods, are applied to second terminal, including:
It receives the first terminal communicated with the second terminal and sends prompt message;The prompt message is according to
The identity information of the currently used person of second terminal generates;
The operation of triggering control instruction is executed according to the prompt message, the control instruction user executes described first eventually
End, which executes, sets currently running user mode to guest mode;
The control instruction is sent to the first terminal.
The third aspect, this application provides a kind of terminal control mechanisms, are applied to first terminal, including:
Acquisition module when for unlocking the first terminal, obtains the identity information of currently used person;
First sending module, for when the identity information and default identity information mismatch, to described first eventually
The second terminal communicated is held to send prompt message;The prompt message is used to indicate whether the second terminal execution triggers
The operation of control instruction;
Control module, the control instruction for receiving second terminal feedback, will currently be transported according to the control instruction
Capable user mode is set as guest mode.
Fourth aspect, this application provides a kind of terminal control mechanisms, are applied to second terminal, including:
Receiving module sends prompt message for receiving the first terminal communicated with the second terminal;It is described to carry
Show that information is generated according to the identity information of the currently used person of the second terminal;
Execution module, the operation for executing triggering control instruction according to the prompt message, the control instruction user
It executes the first terminal execution and sets currently running user mode to guest mode;
Second sending module, for sending the control instruction to the first terminal.
5th aspect, this application provides a kind of computer readable storage mediums, are stored thereon with computer program, special
Sign is that the computer program is realized when being executed by processor in the application first aspect and each embodiment of second aspect
The step of the method.
6th aspect, this application provides a kind of terminal, including memory, processor and storage are on a memory and can be
The computer program run on processor, the processor realize the application first aspect and the when executing the computer program
The step of the method in the two each embodiments of aspect.
7th aspect, this application provides terminal control system, including first terminal and second terminal, the first terminals
Including memory, processor and the computer program that can be run on a memory and on a processor is stored, the processor is held
The step of the method in each embodiment of the application first aspect being realized when the row computer program;The second terminal
Including memory, processor and the computer program that can be run on a memory and on a processor is stored, the processor is held
The step of the method in each embodiment of the application second aspect being realized when the row computer program.
Terminal control method and device that the embodiment of the present application is provided, computer readable storage medium, terminal, terminal control
System processed, when the identity information of the currently used person of first terminal is not default identity information, that is, working as when first terminal
Preceding user is the casual user person in addition to owner, at this point it is possible to according to the control instruction that second terminal is sent, it is very concealed
The user mode of first terminal is automatically set as guest mode, do not need face of the owner user in the presence of interim user,
Relevant operation slave holotype is carried out on first terminal is switched to guest mode, to both avoid the embarrassment between friend,
It is consulted by interim user without the privacy information on worry first terminal, improves user experience.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the application environment schematic diagram of terminal control method in one embodiment;
Fig. 2 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 3 is the flow chart of terminal control method in one embodiment;
Fig. 4 is to set currently running user mode to guest mode according to the control instruction in one embodiment
Flow chart;
Fig. 5 is to mark corresponding preset strategy by currently running user's mould according to the security level in one embodiment
Formula is set as the flow chart of guest mode;
Fig. 6 is the flow chart of terminal control method in another embodiment;
Fig. 7 is the operational flowchart for executing triggering control instruction in one embodiment according to the prompt message;
Fig. 8 is the flow chart of terminal control method in another embodiment;
Fig. 9 is the operational flowchart for executing triggering control instruction in another embodiment according to the prompt message;
Figure 10 is the flow chart of the terminal control method of another embodiment;
Figure 11 is the structure diagram of the terminal control mechanism of an embodiment;
Figure 12 is the structure diagram of the terminal control mechanism of another embodiment;
Figure 13 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements,
But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.Citing comes
It says, without departing from the scope of the invention, first terminal can be known as to second terminal, and similarly, it can be by second
Terminal is known as first terminal.First terminal and second terminal both terminal, but it is not same terminal.
Fig. 1 is the application environment schematic diagram of terminal control method in one embodiment.As shown in Figure 1, the application environment packet
The second terminal 120 for including first terminal 110 and being communicated with the first terminal 110.
Wherein there is first terminal the system of at least two user modes, at least two owner's patterns to belong to different uses
Role.In the application, the operating system of first terminal provides the function of multi-user or multi-mode so that a terminal can open up
Multiple patterns are used by multiple user time-sharings or a user uses under different situations into different user modes.
Multiple patterns of the pattern of different user and same user by not distinguishing are collectively referred to as user mode in the application.When same
When one user uses different user modes, it is also considered as it and uses role with different.Include but not limited to using situation:
First terminal has more than two users, each with opening a user for belonging to itself in systems per family
Pattern, such as owner's pattern, guest mode etc.;One terminal only has there are one user, which opens in systems belongs to
In the more than two user modes of itself, such as holotype and privacy mode;One terminal has more than two users, often
It is a with opening a user mode for belonging to itself in systems per family, and wherein at least one user also additionally has one
A one's own privacy mode.
Wherein, guest mode can be understood as owner user can be not desired to the file being seen, picture or video etc. setting
Access rights are set, are given terminal under other people check in owner user, other people can not check file, picture with access rights
Or video etc..Owner's pattern can be understood as owner user in using terminal, have the highest permission using the terminal.
Fig. 2 is the internal structure schematic diagram of first terminal in one embodiment.The first terminal includes passing through system bus
Processor, memory and the display screen of connection.Wherein, the processor is for providing calculating and control ability, support entire first
The operation of terminal.Memory for storing data, program, and/or instruction code etc., at least one computer is stored on memory
Program, the computer program can be executed by processor, to realize the sound suitable for first terminal provided in the embodiment of the present application
Frequency signal processing method.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non-
Volatile storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment
In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database
And computer program.A kind of Audio Signal Processing side provided for realizing above each embodiment is provided in the database
The relevant data of method.The computer program can be performed by processor, for realizing what each embodiment of the application was provided
A kind of acoustic signal processing method.Built-in storage is operating system, database and the computer journey in non-volatile memory medium
Sequence provides the running environment of cache.Display screen can be touch screen, for example be capacitance plate or electrical screen, for showing first
The interface information of terminal, display screen include bright screen state and screen state of going out.The first terminal can be mobile phone, tablet computer or
Personal digital assistant or Wearable etc..
It will be understood by those skilled in the art that structure shown in Figure 2, is only tied with the relevant part of application scheme
The block diagram of structure, does not constitute the restriction for the terminal 110 being applied thereon to application scheme, and specific terminal 110 can wrap
It includes than more or fewer components as shown in the figure, either combine certain components or is arranged with different components.
Terminal control method in the present embodiment is carried out for running in the first terminal in Fig. 1 or second terminal
It is described in description terminal.
Fig. 3 is the flow chart of terminal control method in one embodiment.Terminal control method in the present embodiment, with operation
It is described on first terminal.Executive agent in the present embodiment is the first terminal in terminal namely the application, such as
The terminals such as mobile phone, tablet computer, first terminal can be the terminals that the interim user in addition to owner user uses, can also
The terminal used for owner user.Second terminal is the terminal that uses of owner user, second terminal can be with first terminal into
The capable mobile phone bound, tablet computer, Wearable etc..
As shown in figure 3, terminal control method includes step 302 to step 306.
Step 302:Obtain the identity information of currently used person.
When needing first terminal lending interim user in addition to owner user in use, in order to ensure first terminal
When interior privacy information is not peeped or revealed by interim user, need first terminal being switched to guest mode.If alternatively, working as
Preceding interim user be the spouse of owner user, male/female friend, household or other know the user of first terminal unlocking pin
When, currently used person can use first terminal at any time, at this time, it is also desirable to set the user mode of first terminal to visitor's mould
Formula.
When first terminal unlocks, the identity information of currently used person is obtained.Wherein, identity information can be that fingerprint is believed
At least one of breath, iris information, face information, voiceprint, ear line information.
Specifically, when first terminal is converted to unlocked state by screen lock state, solved at this point it is possible to obtain currently used person
The biological information of authentication, such as finger print information, face information, voiceprint, iris information, ear are used for during lock
At least one of line information.Believed according to the biological information of current acquisition and the default biological characteristic for being stored in first terminal
When breath matching, the identity information of currently used person can also be obtained while unlock.If biological characteristic letter is not used when unlock
Breath is verified, then can obtain iris information, the people of currently used person by the front camera of first terminal in unlock
The information such as face information obtain the identity information of currently used person according to the characteristic information of the iris information of acquisition, face information.
Optionally, first terminal can also be actively unlocked in owner user, first terminal, which is lent interim user, to be used
In the case of obtain the currently used person of second terminal identity information.At this point, when owner user is far from first terminal, Ke Yigen
Identity acquisition instruction is sent to first terminal according to the second terminal that owner user uses, is referred to when first terminal receives identity acquisition
When enabling, the information such as iris information, the face information of currently used person are obtained by the front camera of first terminal, according to acquisition
Iris information, face information characteristic information obtain the identity information of currently used person, obtain first terminal currently used
The identity information of person.
It should be noted that currently used person is the user that first terminal is being currently used, which can be owner
User, or interim user user.
Step 304:When the identity information and default identity information mismatch, communicated to the first terminal
Second terminal send prompt message.
Wherein, the identity information that identity information is owner user is preset.For example, when identity information is finger print information, machine
Primary user can input the first finger print information in the fingerprint induction region on first terminal, and first finger print information user, which characterizes, to be used
The information at family, can also user's unlock first terminal.Wherein, the first finger print information can be that one fingerprint of owner user is believed
Breath, or the finger print information of two or more fingers of owner user.
If obtain the identity information of currently used person by finger print information in unlock, obtain in first terminal fingerprint sense
It answers region to input the second finger print information, judges whether second finger print information matches with the first finger print information, if matching
Think, the identity information of currently used person matches with default identity information, if the second finger print information and the first finger print information are not
Matching, then it is assumed that the identity information of currently used person is mismatched with default identity information, at this point, being communicated to first terminal
Second terminal send prompt message.The prompt message is used to indicate the second terminal executes the behaviour for whether triggering control instruction
Make.Wherein, the second control instruction user indicates that first terminal executes and sets currently running user mode to guest mode.
Correspondingly, identity information can also be iris information, face information, voiceprint, ear line information etc., secondary, no
An another citing repeats.
First terminal sends prompt message to the second terminal communicated with first terminal, and second terminal receives the prompt
Information, and it is processed to determine whether that execution triggers the operation of control instruction accordingly according to the prompt message.When second terminal is held
Gone triggering control instruction operation when, the control instruction of triggering is fed back into first terminal.
Step 306:The control instruction for receiving second terminal feedback, according to the control instruction by currently running use
Family mode setting is guest mode.
First terminal receives the control instruction of second terminal feedback, according to the control instruction by currently running use
Family mode setting is guest mode.No matter the user mode of current first terminal operation is owner's pattern or guest mode, all
It can set first terminal to guest mode on backstage.
The above method, when the identity information of the currently used person of first terminal is not default identity information, that is, when the
The currently used person of one terminal is the casual user person in addition to owner, at this point it is possible to be referred to according to the control that second terminal is sent
It enables, it is very concealed that the user mode of first terminal is automatically set as guest mode, owner user is not needed in the presence of making temporarily
The face of user, on first terminal carrying out relevant operation slave holotype is switched to guest mode, to both avoid and friend
Between embarrassment, without worry first terminal on privacy information consulted by interim user.
In one embodiment, it before the identity information for obtaining currently used person, including determines and the first terminal
The step of associated second terminal.
Specifically, before executing terminal control method, it is also necessary to determine associated with the first terminal described the
Two terminals.Wherein, second terminal can be intelligent wearable devices, mobile phone, tablet computer, laptop or the platforms such as Intelligent bracelet
Formula computer etc., does not limit herein.Wherein, be associated can be understood as first terminal and second terminal can by bluetooth,
WiFi or mobile communications network etc. are attached and then realize communication, can determine second terminal by first terminal, can also
First terminal is determined by second terminal.For example, can be added in the display interface of first terminal associated with first terminal
Second terminal, while the operating mode of second terminal can also be set in the display interface of first terminal, wherein operating mode packet
Include free schema and listening mode.
It should be noted that free schema is not carry out monitoring control to the associated first terminal of the second terminal, supervise
It is that second terminal needs to carry out monitoring control to first terminal to listen pattern.Owner user can pass through the virtual key of second terminal
Or physical button realizes the free switching between free schema and listening mode.
Fig. 4 is to set currently running user mode to visitor's mould according to the control instruction described in one embodiment
The flow chart of formula.As shown in figure 4, described set currently running user mode to guest mode according to the control instruction,
Including:
Step 402:It obtains and is currently marked in the security level of the application program of the first terminal front stage operation;The peace
Level flag includes entirely:Shared label and privacy label;
The operation of one application program (Application, abbreviation APP) be typically by the operation of relevant multiple processes and
It embodies.The process that foreground application is related to when running is foreground process, the process that background application is related to when running
As background process.The corresponding application program of operation pages of the application program of the current display interface displaying of terminal is worked as terminal
The application program of preceding operation, abbreviation foreground application.
Owner user can carry out safe class label to application program all in first terminal in advance.When first terminal connects
When receiving the control instruction of second terminal transmission, obtain currently in the security level mark of the application program of first terminal front stage operation
Note.Wherein, safe class label includes shared label and secret label.Application program with shared label can be it is open or
Visitor's use is shared to, visitor has answering for shared label with all permissions for accessing the application program with shared label
Can be the application programs such as calendar, clock, weather with program.Application program with secret label can be to be related to owner's privacy
The application program of information, visitor do not have the permission for accessing the application program with secret label, such as with secret label
Application program can be the application programs such as Alipay, bank, photograph album.
Step 404:Corresponding preset strategy is marked to set currently running user mode to according to the security level
Guest mode.
According to the mapping relations between security level label and preset strategy, the security level label pair of foreground application is determined
The preset strategy answered sets currently running user mode to guest mode according to determining preset strategy.Wherein, plan is preset
Slightly include the first preset strategy and the second preset strategy.
Specifically, the first preset strategy is to keep the application program in the front stage operation of the first terminal, and rear
Platform sets currently running user mode to guest mode.Second preset strategy is to obtain the privacy number of the application program
According to being hidden to the private data, and currently running user mode is set to guest mode on backstage.
Fig. 5 is to mark corresponding preset strategy by currently running user's mould according to the security level in one embodiment
Formula is set as the flow chart of guest mode.As shown in figure 5, marking corresponding preset strategy that will currently transport according to the security level
Capable user mode is set as guest mode, including:
Step 502:Call the mapping relations between security level label and preset strategy.
Call the mapping relations being stored in advance in first terminal, wherein shared label corresponds to the first preset strategy;It is hidden
Private label corresponds to the second preset strategy.
Step 504:It sets currently running user mode to guest mode according to the mapping relations.
It is corresponding pre- to determine that the security level in the application program of first terminal front stage operation marks according to the mapping relations
If it is tactful, and then currently running user mode is set as by guest mode according to determining preset strategy.
Specifically, when the security level is labeled as shared label, keep the application program in the first terminal
Front stage operation, and set currently running user mode to guest mode on backstage.For example, being transported on the foreground of first terminal
Capable application program is calendar, and when the security level of the calendar is labeled as shared label, first terminal refers to according to the control of reception
It enables and calendar is kept to be continued to run on the foreground of first terminal, meanwhile, on the backstage of terminal, will there is privacy label in first terminal
The icon of application program be hidden, it is invisible to interim user, or the application program to being marked with privacy is hidden
Private data are hidden, invisible to interim user, and then set first terminal to guest mode.
It sets the user mode of first terminal to guest mode according to the first preset strategy, keeps application program first
The foreground of terminal continues to run with, and can keep that the dispaly state of current first terminal is constant as possible namely first terminal screen is aobvious
What is shown is still the interface of the application program, it is possible to reduce currently used person discovers the possibility that first terminal enters guest mode
Property, and then realize secret and set the user mode of first terminal to guest mode.
Specifically, when the security level is marked labeled as privacy, the private data of the application program is obtained, to institute
It states private data to be hidden, and currently running user mode is set to guest mode on backstage.For example, in first terminal
The application program of front stage operation be photograph album, when the security level of the photograph album is marked labeled as privacy, first terminal is according to reception
Control instruction obtain the private data of the photograph album, the private data is hidden, meanwhile, on the backstage of terminal, by
The icon of application program with privacy label in one terminal is hidden, invisible to interim user, or to hidden
The private data of the application program of private label is hidden, invisible to interim user, and then first terminal is set as visiting
Objective pattern.
Wherein, it should be noted that private data is that secret file, such as picture, contact person is arranged in owner's user preset
Information (phone directory contact, timely communication class contact person etc.), video, audio, document, short message etc..
For example, currently used person is browsing the photograph album marked with privacy, at that time, what currently used person can not browse
Picture with private data, but currently used other pictures of person's normal browsing are not influenced.If first terminal will be used on backstage
Family mode setting is after guest mode, there is first terminal the icon of the application program of privacy label will be hidden.Currently make
If user is after photograph album exits, just not with the permission for accessing the photograph album with privacy label.
It sets the user mode of first terminal to guest mode according to the second preset strategy, obtains the application program
Private data is hidden the private data, rather than to closing the application program, it thus can be to avoid currently used
Person sees that the application program is closed, and can perceive first terminal and enter guest mode, and then realizes concealed by first
The user mode of terminal is set as guest mode.
Fig. 6 is the flow chart of terminal control method in another embodiment.As shown in fig. 6, terminal control method, is applied to
Second terminal, wherein second terminal can be the intelligent wearable devices such as Intelligent bracelet, mobile phone, tablet computer, laptop or
Desktop computer etc..Wherein, owner user has all permissions using second terminal.Terminal control method includes:
Step 602:It receives the first terminal communicated with the second terminal and sends prompt message;The prompt message
It is generated according to the identity information of the currently used person of the second terminal.
Second terminal receives the prompt message that first terminal is sent.Wherein, the prompt message is according to the second terminal
The identity information of currently used person generates.Specifically, when if the identity information of currently used person and default identity information mismatch,
Prompt message is sent to second terminal.Wherein, the identity information that identity information is owner user is preset, identity information can be
At least one of finger print information, iris information, face information, voiceprint, ear line information.
For example, when identity information is finger print information, owner user can be defeated in the fingerprint induction region on first terminal
Enter the first finger print information, first finger print information user characterizes the information of user, can also user's unlock first terminal.If solving
When obtaining the identity information of currently used person by finger print information when lock, obtains and input second in first terminal fingerprint induction region
Finger print information, judges whether second finger print information matches with the first finger print information, thinks if matching, currently used person
Identity information match with default identity information, if the second finger print information and the first finger print information mismatch, then it is assumed that current
The identity information of user is mismatched with default identity information, at this point, sending prompt message to second terminal.Meanwhile second is whole
End receives the prompt message that first terminal is sent.
Step 604:The operation of triggering control instruction is executed according to the prompt message, the control instruction is used to indicate institute
It states first terminal execution and sets currently running user mode to guest mode.
Second terminal receives the prompt message sent from first terminal, and handles the prompt message of reception, to hold
The operation of row triggering control instruction.Specifically, the operation of control instruction is triggered, it can be according to owner user to the prompt message
It handles and triggers, it can be according to according to the current operating mode automatic trigger of second terminal.Wherein, the control instruction is for referring to
Show that the first terminal executes and sets currently running user mode to guest mode.
Step 606:The control instruction is sent to the first terminal.
The control instruction is sent to second terminal by second terminal by default communications protocol.In this way, second terminal can be with
The operation of triggering control instruction is executed according to the prompt message of reception, and then the control instruction is sent to first terminal, so that
The currently running user mode of first terminal secret is automatically set as guest mode, does not need owner user and is used in the presence of interim
The face of person, on first terminal carry out relevant operation slave holotype be switched to guest mode, to both avoid with friend it
Between embarrassment, without worry first terminal on privacy information consulted by interim user.
Fig. 7 is the operational flowchart for executing triggering control instruction in one embodiment according to the prompt message.Such as Fig. 7 institutes
Show, the operation of triggering control instruction is executed according to the prompt message, including:
Step 702:Show that simultaneously receiver primary user is to the trigger action of the prompt message.
The display interface of second terminal shows the prompt message that first terminal is sent.Such as the content of the prompt message is
" whether being set as guest mode " shows the virtual push button of "Yes" and "No" simultaneously, in the display interface.When owner user needs
When setting the user mode of first terminal to guest mode, the virtual key of "Yes" can be touched, when second terminal receives
When owner user touches the virtual key of "Yes", then second terminal can triggering of the receiver primary user to the prompt message
Operation.
It should be noted that trigger action can also be click, sliding, gesture control, acoustic control etc., it is not limited to above-mentioned distance
Illustrate, certainly, the content of prompt message may be the form of other words, voice, the tinkle of bells, vibration, icon or picture
It presents.
Step 704:The control instruction is generated according to the trigger action.
According to owner user to the trigger action of the prompt message, so that it may to generate the control instruction.For example, eventually second
The display interface at end shows the virtual push button of " whether being set as guest mode " prompt message and "Yes" and "No".When owner uses
When family touches the virtual key of "Yes", second terminal can generate the control instruction according to the trigger action of owner user.
Optionally, if owner user touches the virtual key of "No", second terminal would not touching according to owner user
Hair operation generates the control instruction.
Fig. 8 is the flow chart of terminal control method in another embodiment.As shown in figure 8, terminal control method, is applied to
Second terminal, including:
Step 802:Determine the second terminal associated with the first terminal.
It is associated can be understood as first terminal and second terminal can by bluetooth, WiFi or mobile communications network etc. into
Row connects and then realizes communication, while can determine second terminal by first terminal, and the can also be determined by second terminal
One terminal.
Step 804:Detect the distance between the first terminal and the second terminal information.
First terminal can be realized logical with second terminal by bluetooth, WiFi or mobile communications network etc. are attached
Letter, and then wireless distance measuring method of penetrating can be based on and obtain the distance between first terminal and the second terminal information.If for example,
When first terminal carries out Bluetooth communication with second terminal, second terminal can search for a certain range of first terminal, second terminal
The signal strength values of first terminal can be sampled and be recorded in preset duration.By the signal strength values of acquisition bring into away from
From in the model with signal strength, you can obtain the distance between first terminal and second terminal information, wherein distance and signal
The module of intensity is:
PR (dBm)=A-10nlgr
In formula, PR indicates that the reception power of wireless signal, A indicate that second terminal receives first eventually when 1 meter of signal transmission is remote
Power, the n of end signal indicate that signal propagation factor, r indicate the distance between the first terminal and second terminal.Based on above-mentioned
Model can obtain the distance between first terminal and second terminal information.
Step 806:When the range information reaches preset value, the operating mode of the second terminal is set as monitoring
Pattern.
Wherein, the operating mode of second terminal includes free schema and listening mode.Free schema is not to second terminal
Associated first terminal carries out monitoring control, and listening mode is that second terminal needs to carry out monitoring control to first terminal.When
When the range information of acquisition reaches preset value, it sets the operating mode of second terminal to listening mode automatically, that is, currently may be used
To be controlled first terminal by second terminal.
Optionally, owner user can realize free schema and monitoring by the virtual key or physical button of second terminal
Free switching between pattern.
Fig. 9 is the operational flowchart for executing triggering control instruction in another embodiment according to the prompt message.Such as Fig. 9
It is shown, the operation of triggering control instruction is executed according to the prompt message, including
Step 902:The operating mode of presently described second terminal is obtained according to the prompt message.
Step 904:When the operating mode is listening mode, the control instruction is formed.
When second terminal receives prompt message, the operating mode of current second terminal is obtained according to the prompt message,
When the operating mode is listening mode, the operation of triggering control instruction is executed, the control instruction is formed.
Method in the present embodiment, second terminal can be performed automatically the operation of triggering control instruction, form the control
Instruction, does not need owner user and manually selects, and can timely and effectively be instructed to first terminal feedback control.
Figure 10 is the flow chart of another embodiment terminal control method.As shown in figure 8, terminal control method, including:
Step 1002:First terminal obtains the identity information of currently used person.
Step 1004:First terminal sends prompt message to the second terminal communicated with the first terminal;It is described
Prompt message is used to indicate the second terminal executes the operation for whether triggering control instruction.
Step 1002- steps 1004 are corresponded with step 302- steps 304 in above-described embodiment, here, repeating no more.
Step 1006:Second terminal receives the first terminal communicated with the second terminal and sends prompt message;Institute
Prompt message is stated to be generated according to the identity information of the currently used person of the second terminal.
Step 1008:Second terminal executes the operation of triggering control instruction, the control instruction according to the prompt message
User executes the first terminal execution and sets currently running user mode to guest mode.
Step 1010:Second terminal sends the control instruction to the first terminal.
Step 1006- steps 10010 are corresponded with step 602- steps 606 in above-described embodiment, here, no longer superfluous
It states.
Step 1012:First terminal receives the control instruction of second terminal feedback, will be worked as according to the control instruction
The user mode of preceding operation is set as guest mode.
Step 1012 is corresponded with step 306 in above-described embodiment, here, repeating no more.
Terminal control method in above-described embodiment, when the identity information of the currently used person of first terminal is not default body
When part information, that is, when the currently used person of first terminal is the casual user person in addition to owner, at this point it is possible to according to the
The control instruction that two terminals are sent, it is very concealed that the user mode of first terminal is automatically set as guest mode, it does not need
Owner user is in the presence of the face of interim user, and progress relevant operation slave holotype is switched to guest mode on first terminal,
To both avoid the embarrassment between friend, consulted by interim user without the privacy information on worry first terminal.
It should be understood that although each step in the flow chart of Fig. 1-10 is shown successively according to the instruction of arrow,
Be these steps it is not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps
There is no stringent sequences to limit for rapid execution, these steps can execute in other order.Moreover, in Fig. 1-10 at least
A part of step may include that either these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps
Quarter executes completion, but can execute at different times, the execution in these sub-steps or stage be sequentially also not necessarily according to
Secondary progress, but can either the sub-step of other steps or at least part in stage in turn or replace with other steps
Ground executes.
Figure 11 is the structure diagram of the terminal control mechanism of one embodiment of the application.Terminal control mechanism, including:
Acquisition module 1110 obtains the identity information of currently used person;
First sending module 1120, for when the identity information and default identity information mismatch, to described the
The second terminal that one terminal is communicated sends prompt message;Whether the prompt message is used to indicate the second terminal execution
Trigger the operation of control instruction;
Control module 1130, the control instruction for receiving second terminal feedback, will work as according to the control instruction
The user mode of preceding operation is set as guest mode.
Above-mentioned terminal control mechanism is applied to first terminal, when the identity information of the currently used person of first terminal is not pre-
If when identity information, that is, when the currently used person of first terminal is the casual user person in addition to owner, at this point it is possible to root
It is very concealed that the user mode of first terminal is automatically set as guest mode according to the control instruction that second terminal is sent, no
It needs owner user in the presence of the face of interim user, relevant operation slave holotype is carried out on first terminal and is switched to visitor's mould
Formula is looked into without the privacy information on worry first terminal by interim user to both avoid the embarrassment between friend
It reads.
Figure 12 is the structure diagram of the terminal control mechanism of one embodiment of the application.Terminal control mechanism, including:
Receiving module 1210 sends prompt message for receiving the first terminal communicated with the second terminal;Institute
Prompt message is stated to be generated according to the identity information of the currently used person of the second terminal;
Execution module 1220, the operation for executing triggering control instruction according to the prompt message, the control instruction
It is used to indicate the first terminal execution and sets currently running user mode to guest mode;
Second sending module 1230, for sending the control instruction to the first terminal.
Above-mentioned terminal control mechanism is applied to second terminal, and second terminal can execute triggering according to the prompt message of reception
The operation of control instruction, and then the control instruction is sent to first terminal, so that the currently running use of first terminal secret
Family pattern is automatically set as guest mode, does not need face of the owner user in the presence of interim user, phase is carried out on first terminal
It closes operation slave holotype and is switched to guest mode, to both avoid the embarrassment between friend, eventually without worry first
Privacy information on end is consulted by interim user.
Specific about terminal control mechanism limits the restriction that may refer to above for terminal control method, herein not
It repeats again.Modules in above-mentioned terminal control mechanism can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the terminal control mechanism provided in the embodiment of the present application can be the shape of computer program
Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal
Or on the memory of server.When the computer program is executed by processor, terminal control described in the embodiment of the present application is realized
The step of method processed.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When so that the processor executes the step of terminal control method.
A kind of computer program product including instruction, when run on a computer so that computer executes terminal
Control method.
The embodiment of the present application also provides a kind of terminal control system, including first terminal and second terminal;Described first eventually
End, including memory, processor and storage are on a memory and the computer program that can run on a processor, feature exist
In when the processor executes the computer program the step of realization terminal control method;The second terminal, including storage
Device, processor and storage are on a memory and the computer program that can run on a processor, which is characterized in that the processor
The step of terminal control method being realized when executing the computer program.
The embodiment of the present application also provides a kind of terminals.As shown in figure 13, for convenience of description, it illustrates only and the application
The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be
Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of
Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Figure 13 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 13, hand
Machine includes:Radio frequency (Radio Frequency, RF) circuit 1310, memory 1320, input unit 1330, display unit 1340,
Sensor 1350, voicefrequency circuit 1360, Wireless Fidelity (wireless fidelity, WiFi) module 1370, processor 1380,
And the equal components of power supply 1390.It will be understood by those skilled in the art that handset structure shown in Figure 13 is not constituted to mobile phone
It limits, may include either combining certain components or different components arrangement than illustrating more or fewer components.
Wherein, RF circuits 1310 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station
After downlink information receives, handled to processor 1380;The data of uplink can also be sent to base station.In general, RF circuits include
But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier,
LNA), duplexer etc..In addition, RF circuits 1310 can also be communicated with network and other equipment by radio communication.It is above-mentioned wireless
Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of
Mobile communication, GSM), general packet radio service (General Packet Radio Service,
GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code
Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email,
Short message service (Short Messaging Service, SMS) etc..
Memory 1320 can be used for storing software program and module, and processor 1380 is stored in memory by operation
1320 software program and module, to execute the various function application and terminal control of mobile phone.Memory 1320 can be led
To include program storage area and data storage area, wherein program storage area can storage program area, needed at least one function
Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;It data storage area can
Storage uses created data (such as audio data, address list etc.) etc. according to mobile phone.In addition, memory 1320 can wrap
High-speed random access memory is included, can also include nonvolatile memory, for example, at least disk memory, a flash memories
Part or other volatile solid-state parts.
Input unit 1330 can be used for receiving the number or character information of input, and generates and set with the owner of mobile phone 1300
It sets and the related key signals of function control inputs.Specifically, input unit 1330 may include operation panel 1331 and other
Input equipment 1332.Operation panel 1331, alternatively referred to as touch screen collect owner on it or neighbouring touch operation (are compared
Such as owner is using finger, stylus any suitable object or attachment on operation panel 1331 or near operation panel 1331
Operation), and corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 1331 can
Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection owner, and examine
The signal that touch operation is brought is surveyed, touch controller is transmitted a signal to;Touch controller is received from touch detecting apparatus to be touched
Information is touched, and is converted into contact coordinate, then gives processor 1380, and order that processor 1380 is sent can be received and added
To execute.Furthermore, it is possible to realize operation panel using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
1331.In addition to operation panel 1331, input unit 1330 can also include other input equipments 1332.Specifically, other are inputted
Equipment 1332 can include but is not limited to one in physical keyboard, function key (such as volume control button, switch key etc.) etc.
Kind is a variety of.
Display unit 1340 can be used for showing each of the information inputted by owner or the information for being supplied to owner and mobile phone
Kind menu.Display unit 1340 may include display panel 1341.In one embodiment, liquid crystal display may be used
(Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode,
) etc. OLED forms configure display panel 1341.In one embodiment, operation panel 1331 can cover display panel 1341,
When operation panel 1331 detects on it or after neighbouring touch operation, processor 1380 is sent to determine touch event
Type is followed by subsequent processing device 1380 and provides corresponding visual output on display panel 1341 according to the type of touch event.Although
In fig. 13, operation panel 1331 and display panel 1341 are to realize the input and input of mobile phone as two independent components
Function, but in some embodiments it is possible to operation panel 1331 and display panel 1341 are integrated and are realized the input of mobile phone
And output function.
Mobile phone 1300 may also include at least one sensor 1350, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to ring
The light and shade of border light adjusts the brightness of display panel 1341, and range sensor can close display when mobile phone is moved in one's ear
Panel 1341 and/or backlight.Motion sensor may include acceleration transducer, can detect all directions by acceleration transducer
The size of upper acceleration can detect that size and the direction of gravity when static, the application that can be used to identify mobile phone posture is (such as horizontal
Vertical screen switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer,
Other sensors such as hygrometer, thermometer, infrared sensor etc..
Voicefrequency circuit 1360, loud speaker 1361 and microphone 1362 can provide the audio interface between owner and mobile phone.Sound
The transformed electric signal of the audio data received can be transferred to loud speaker 1361 by frequency circuit 1360, by 1361 turns of loud speaker
It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1362, by voicefrequency circuit
Audio data is converted to after 1360 receptions, then by after the processing of audio data output processor 1380, can be sent out through RF circuits 1310
Another mobile phone is given, or audio data is exported to memory 1320 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help owner's transceiver electronics postal by WiFi module 1370
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet for owner and accesses.Although Figure 13 is shown
WiFi module 1370, but it is understood that, and it is not belonging to must be configured into for mobile phone 1300, it can save as needed
Slightly.
Processor 1380 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone,
By running or execute the software program and/or module that are stored in memory 1320, and calls and be stored in memory 1320
Interior data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment,
Processor 1380 may include one or more processing units.In one embodiment, processor 1380 can integrate application processor
And modem, wherein the main processing operation system of application processor, owner interface and application program etc.;Modem
Main processing wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 1380.For example,
The processor 1380 can integrate application processor and baseband processor, baseband processor with and the composable tune such as other peripheral chips
Modulator-demodulator.Mobile phone 1300 further includes the power supply 1390 (such as battery) powered to all parts, it is preferred that power supply can pass through
Power-supply management system and processor 1380 are logically contiguous, to realize management charging, electric discharge, Yi Jigong by power-supply management system
The functions such as consumption management.
In one embodiment, mobile phone 1300 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory
Realize above-mentioned described terminal control method.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile
And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM),
Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access
Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as
It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced
SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention
Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (14)
1. a kind of terminal control method is applied to first terminal, which is characterized in that including:
Obtain the identity information of currently used person;
When the identity information and default identity information mismatch, to the second terminal hair communicated with the first terminal
Send prompt message;The prompt message is used to indicate the second terminal executes the operation for whether triggering control instruction;
The control instruction for receiving second terminal feedback, sets currently running user mode to according to the control instruction
Guest mode.
2. according to the method described in claim 1, it is characterized in that, before the identity information for obtaining currently used person, also wrap
It includes:
Determine the second terminal associated with the first terminal.
3. according to the method described in claim 1, it is characterized in that, it is described according to the control instruction by currently running user
Mode setting is guest mode, including:
It obtains and is currently marked in the security level of the application program of the first terminal front stage operation;The security level label packet
It includes:Shared label and privacy label;
Corresponding preset strategy is marked to set currently running user mode to guest mode according to the security level.
4. according to the method described in claim 3, it is characterized in that, marking corresponding preset strategy will according to the security level
Currently running user mode is set as guest mode, including:
Call the mapping relations between security level label and preset strategy;
It sets currently running user mode to guest mode according to the mapping relations, wherein
When the security level is labeled as shared label, keep the application program in the front stage operation of the first terminal,
And set currently running user mode to guest mode on backstage;
When the security level is marked labeled as privacy, the private data of the application program is obtained, to the private data
It is hidden, and currently running user mode is set to guest mode on backstage.
5. according to the method described in claim 1, it is characterized in that, the identity information includes finger print information, iris information, people
At least one of face information, voiceprint, ear line information.
6. a kind of terminal control method, which is characterized in that it is applied to second terminal, including:
It receives the first terminal communicated with the second terminal and sends prompt message;The prompt message is according to described second
The identity information of the currently used person of terminal generates;
The operation of triggering control instruction is executed according to the prompt message, the control instruction is used to indicate the first terminal and holds
It is about to currently running user mode and is set as guest mode;
The control instruction is sent to the first terminal.
7. according to the method described in claim 6, it is characterized in that, described execute triggering control instruction according to the prompt message
Operation, including:
Show that simultaneously receiver primary user is to the trigger action of the prompt message;
The control instruction is generated according to the trigger action.
8. according to the method described in claim 6, it is characterized in that, described receive first communicated with the second terminal
Before terminal sends prompt message, further include:
Determine the second terminal associated with the first terminal;
Detect the distance between the first terminal and the second terminal information;
When the range information reaches preset value, it sets the operating mode of the second terminal to listening mode.
9. according to the method described in claim 8, it is characterized in that, described execute triggering control instruction according to the prompt message
Operation, including:
The operating mode of presently described second terminal is obtained according to the prompt message;
When the operating mode is listening mode, the control instruction is formed.
10. a kind of terminal control mechanism is applied to first terminal, which is characterized in that including:
Acquisition module obtains the identity information of currently used person;
First sending module, for when the identity information and default identity information mismatch, to the first terminal into
The second terminal of row communication sends prompt message;The prompt message is used to indicate whether the second terminal execution triggers control
The operation of instruction;
Control module, the control instruction for receiving second terminal feedback, will be currently running according to the control instruction
User mode is set as guest mode.
11. a kind of terminal control mechanism is applied to second terminal, which is characterized in that including:
Receiving module sends prompt message for receiving the first terminal communicated with the second terminal;The prompt letter
Breath is generated according to the identity information of the currently used person of the second terminal;
Execution module, the operation for executing triggering control instruction according to the prompt message, the control instruction are used to indicate
The first terminal, which executes, sets currently running user mode to guest mode;
Second sending module, for sending the control instruction to the first terminal.
12. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of any one of claim 1 to 9 the method is realized when being executed by processor.
13. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor
Sequence, which is characterized in that the processor realizes any one of claim 1 to 9 the method when executing the computer program
The step of.
14. a kind of terminal control system, which is characterized in that including first terminal and second terminal;
The first terminal, including memory, processor and storage are on a memory and the computer that can run on a processor
Program, which is characterized in that the processor realizes any one of claim 1 to 5 side when executing the computer program
The step of method;
The second terminal, including memory, processor and storage are on a memory and the computer that can run on a processor
Program, which is characterized in that the processor realizes any one of claim 6 to 9 side when executing the computer program
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810316545.1A CN108521494B (en) | 2018-04-10 | 2018-04-10 | Terminal control method and device, readable storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810316545.1A CN108521494B (en) | 2018-04-10 | 2018-04-10 | Terminal control method and device, readable storage medium and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108521494A true CN108521494A (en) | 2018-09-11 |
CN108521494B CN108521494B (en) | 2020-04-14 |
Family
ID=63431920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810316545.1A Expired - Fee Related CN108521494B (en) | 2018-04-10 | 2018-04-10 | Terminal control method and device, readable storage medium and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108521494B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109800595A (en) * | 2018-12-26 | 2019-05-24 | 全球能源互联网研究院有限公司 | A kind of electric power data sharing method and system |
CN109800602A (en) * | 2019-01-25 | 2019-05-24 | 努比亚技术有限公司 | Method for secret protection, mobile terminal and computer readable storage medium |
CN110211583A (en) * | 2019-05-31 | 2019-09-06 | 北京声赫科技有限公司 | A kind of voice interactive method and interactive voice equipment based on intelligent line traffic control |
CN110782588A (en) * | 2019-10-11 | 2020-02-11 | 深圳巴斯巴科技发展有限公司 | Information prompting method, server and readable storage medium |
CN110941864A (en) * | 2019-11-12 | 2020-03-31 | 维沃移动通信有限公司 | Equipment loss prevention method and intelligent wearable equipment |
CN111755011A (en) * | 2019-03-11 | 2020-10-09 | 深圳市冠旭电子股份有限公司 | Sound box control method, device, equipment and readable storage medium |
CN112955857A (en) * | 2019-11-28 | 2021-06-11 | 深圳市大疆创新科技有限公司 | Networking control method, device and storage medium |
WO2021213490A1 (en) * | 2020-04-23 | 2021-10-28 | 华为技术有限公司 | Identity verification method and apparatus and electronic device |
CN114254359A (en) * | 2021-12-22 | 2022-03-29 | 展讯通信(上海)有限公司 | Initialization method, device, terminal and storage medium |
CN114679511A (en) * | 2020-12-24 | 2022-06-28 | 荣耀终端有限公司 | Operation control method and device and electronic equipment |
CN114791999A (en) * | 2022-04-25 | 2022-07-26 | 云丁网络技术(北京)有限公司 | Information processing method and system of intelligent terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577737A (en) * | 2012-08-07 | 2014-02-12 | 百度在线网络技术(北京)有限公司 | Mobile terminal and automatic authority adjusting method thereof |
CN104809780A (en) * | 2015-04-24 | 2015-07-29 | 成都腾悦科技有限公司 | Access control method based on fingerprint recognition and face recognition |
CN106446648A (en) * | 2016-08-30 | 2017-02-22 | 北京小米移动软件有限公司 | Terminal control method and apparatus |
CN107862190A (en) * | 2017-10-26 | 2018-03-30 | 广东欧珀移动通信有限公司 | Based reminding method and Related product |
EP2963521B1 (en) * | 2014-06-30 | 2018-06-27 | LG Electronics Inc. | Mobile terminal and method for controlling external device using the same |
-
2018
- 2018-04-10 CN CN201810316545.1A patent/CN108521494B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577737A (en) * | 2012-08-07 | 2014-02-12 | 百度在线网络技术(北京)有限公司 | Mobile terminal and automatic authority adjusting method thereof |
EP2963521B1 (en) * | 2014-06-30 | 2018-06-27 | LG Electronics Inc. | Mobile terminal and method for controlling external device using the same |
CN104809780A (en) * | 2015-04-24 | 2015-07-29 | 成都腾悦科技有限公司 | Access control method based on fingerprint recognition and face recognition |
CN106446648A (en) * | 2016-08-30 | 2017-02-22 | 北京小米移动软件有限公司 | Terminal control method and apparatus |
CN107862190A (en) * | 2017-10-26 | 2018-03-30 | 广东欧珀移动通信有限公司 | Based reminding method and Related product |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109800595A (en) * | 2018-12-26 | 2019-05-24 | 全球能源互联网研究院有限公司 | A kind of electric power data sharing method and system |
CN109800602B (en) * | 2019-01-25 | 2023-05-16 | 北京掌汇天下科技有限公司 | Privacy protection method, mobile terminal and computer readable storage medium |
CN109800602A (en) * | 2019-01-25 | 2019-05-24 | 努比亚技术有限公司 | Method for secret protection, mobile terminal and computer readable storage medium |
CN111755011A (en) * | 2019-03-11 | 2020-10-09 | 深圳市冠旭电子股份有限公司 | Sound box control method, device, equipment and readable storage medium |
CN110211583A (en) * | 2019-05-31 | 2019-09-06 | 北京声赫科技有限公司 | A kind of voice interactive method and interactive voice equipment based on intelligent line traffic control |
CN110211583B (en) * | 2019-05-31 | 2021-07-16 | 北京声赫科技有限公司 | Voice interaction method and voice interaction equipment based on intelligent line control |
CN110782588A (en) * | 2019-10-11 | 2020-02-11 | 深圳巴斯巴科技发展有限公司 | Information prompting method, server and readable storage medium |
CN110941864A (en) * | 2019-11-12 | 2020-03-31 | 维沃移动通信有限公司 | Equipment loss prevention method and intelligent wearable equipment |
CN112955857A (en) * | 2019-11-28 | 2021-06-11 | 深圳市大疆创新科技有限公司 | Networking control method, device and storage medium |
WO2021213490A1 (en) * | 2020-04-23 | 2021-10-28 | 华为技术有限公司 | Identity verification method and apparatus and electronic device |
CN114679511A (en) * | 2020-12-24 | 2022-06-28 | 荣耀终端有限公司 | Operation control method and device and electronic equipment |
CN114254359A (en) * | 2021-12-22 | 2022-03-29 | 展讯通信(上海)有限公司 | Initialization method, device, terminal and storage medium |
CN114791999A (en) * | 2022-04-25 | 2022-07-26 | 云丁网络技术(北京)有限公司 | Information processing method and system of intelligent terminal |
Also Published As
Publication number | Publication date |
---|---|
CN108521494B (en) | 2020-04-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108521494A (en) | Terminal control method and device, readable storage medium storing program for executing, terminal | |
CN103473494B (en) | A kind of run the method for application, device and terminal unit | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN108536783A (en) | Data processing method and device, terminal, computer readable storage medium | |
CN107924288A (en) | Electronic equipment and its method for carrying out perform function using speech recognition | |
CN108563932B (en) | Application control method and device, readable storage medium and terminal | |
CN106303004B (en) | The way of recording, device and mobile terminal under screen lock state | |
CN107395880B (en) | Information display method and device and terminal | |
CN107437009A (en) | Authority control method and related product | |
CN108537058A (en) | The polygonal color application method and device, computer readable storage medium, terminal of terminal | |
CN104915582A (en) | Unlocking method and unlocking device | |
CN104217172B (en) | Privacy content inspection method and device | |
CN108537037A (en) | Privacy control method and device, computer readable storage medium, terminal | |
CN108573168A (en) | Private space starts method and apparatus, storage medium, electronic equipment | |
CN108537027A (en) | Resource allocation methods and device, terminal, computer readable storage medium | |
CN106878554A (en) | A kind of theft preventing method of mobile terminal, device and mobile terminal | |
CN106980439A (en) | The method and device of hiden application icon | |
CN107133507A (en) | A kind of privacy services system access method, device and mobile terminal | |
CN109359452A (en) | Mobile terminal and face recognition limit the method, apparatus of application function | |
CN108509788A (en) | Information sharing method and device, computer readable storage medium, terminal | |
CN108513010A (en) | Terminal unlock method, terminal and computer readable storage medium | |
CN110062929A (en) | A kind of method, apparatus and terminal showing data | |
CN107480495A (en) | The unlocking method and Related product of mobile terminal | |
CN109189397A (en) | The method, apparatus of mobile terminal and intelligent display hiden application | |
CN108549804A (en) | Mode switching method and device, computer readable storage medium, terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200414 |