CN108521494A - Terminal control method and device, readable storage medium storing program for executing, terminal - Google Patents

Terminal control method and device, readable storage medium storing program for executing, terminal Download PDF

Info

Publication number
CN108521494A
CN108521494A CN201810316545.1A CN201810316545A CN108521494A CN 108521494 A CN108521494 A CN 108521494A CN 201810316545 A CN201810316545 A CN 201810316545A CN 108521494 A CN108521494 A CN 108521494A
Authority
CN
China
Prior art keywords
terminal
control instruction
mode
prompt message
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810316545.1A
Other languages
Chinese (zh)
Other versions
CN108521494B (en
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810316545.1A priority Critical patent/CN108521494B/en
Publication of CN108521494A publication Critical patent/CN108521494A/en
Application granted granted Critical
Publication of CN108521494B publication Critical patent/CN108521494B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

This application involves a kind of terminal control methods and device, computer readable storage medium, terminal, system, terminal control system.This method, including:Obtain the identity information of currently used person;When identity information and default identity information mismatch, prompt message is sent to the second terminal communicated with first terminal;Prompt message is used to indicate second terminal executes the operation for whether triggering control instruction;Receive the control instruction of second terminal feedback, it sets currently running user mode to guest mode according to control instruction, the control instruction that can be sent according to second terminal, it is very concealed that the user mode of first terminal is automatically set as guest mode, face of the owner user in the presence of interim user is not needed, relevant operation slave holotype is carried out on first terminal is switched to guest mode, to both avoid the embarrassment between friend, it is consulted by interim user without the privacy information on worry first terminal, improves user experience.

Description

Terminal control method and device, readable storage medium storing program for executing, terminal
Technical field
This application involves field of terminal technology, more particularly to a kind of terminal control method and device, computer-readable deposit Storage media, terminal, terminal control system.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc. Different demands.
Currently, a variety of user modes can be arranged so that multiple users use same terminal, such as owner's pattern, visit in terminal Objective pattern etc..When owner user needs to set the user mode of terminal to guest mode, need owner user in the terminal It is upper to be operated accordingly, it could realize the setting of guest mode.If interim user station owner user by the side of when, by terminal User mode be set as guest mode, the operation is obvious, lofty, and user experience is low.
Invention content
A kind of terminal control method of the embodiment of the present application offer and device, computer readable storage medium, terminal, terminal control System processed, it may be possible to after terminal is lent other people uses, reconditely set terminal to guest mode, protect owner user Privacy, improve user experience.
In a first aspect, this application provides a kind of terminal control method, it is applied to first terminal, including:
When unlocking the first terminal, the identity information of currently used person is obtained;
When the identity information and default identity information mismatch, eventually to second communicated with the first terminal End sends prompt message;The prompt message is used to indicate the second terminal executes the operation for whether triggering control instruction;
The control instruction for receiving second terminal feedback, sets currently running user mode according to the control instruction It is set to guest mode.
Second aspect, this application provides a kind of terminal control methods, are applied to second terminal, including:
It receives the first terminal communicated with the second terminal and sends prompt message;The prompt message is according to The identity information of the currently used person of second terminal generates;
The operation of triggering control instruction is executed according to the prompt message, the control instruction user executes described first eventually End, which executes, sets currently running user mode to guest mode;
The control instruction is sent to the first terminal.
The third aspect, this application provides a kind of terminal control mechanisms, are applied to first terminal, including:
Acquisition module when for unlocking the first terminal, obtains the identity information of currently used person;
First sending module, for when the identity information and default identity information mismatch, to described first eventually The second terminal communicated is held to send prompt message;The prompt message is used to indicate whether the second terminal execution triggers The operation of control instruction;
Control module, the control instruction for receiving second terminal feedback, will currently be transported according to the control instruction Capable user mode is set as guest mode.
Fourth aspect, this application provides a kind of terminal control mechanisms, are applied to second terminal, including:
Receiving module sends prompt message for receiving the first terminal communicated with the second terminal;It is described to carry Show that information is generated according to the identity information of the currently used person of the second terminal;
Execution module, the operation for executing triggering control instruction according to the prompt message, the control instruction user It executes the first terminal execution and sets currently running user mode to guest mode;
Second sending module, for sending the control instruction to the first terminal.
5th aspect, this application provides a kind of computer readable storage mediums, are stored thereon with computer program, special Sign is that the computer program is realized when being executed by processor in the application first aspect and each embodiment of second aspect The step of the method.
6th aspect, this application provides a kind of terminal, including memory, processor and storage are on a memory and can be The computer program run on processor, the processor realize the application first aspect and the when executing the computer program The step of the method in the two each embodiments of aspect.
7th aspect, this application provides terminal control system, including first terminal and second terminal, the first terminals Including memory, processor and the computer program that can be run on a memory and on a processor is stored, the processor is held The step of the method in each embodiment of the application first aspect being realized when the row computer program;The second terminal Including memory, processor and the computer program that can be run on a memory and on a processor is stored, the processor is held The step of the method in each embodiment of the application second aspect being realized when the row computer program.
Terminal control method and device that the embodiment of the present application is provided, computer readable storage medium, terminal, terminal control System processed, when the identity information of the currently used person of first terminal is not default identity information, that is, working as when first terminal Preceding user is the casual user person in addition to owner, at this point it is possible to according to the control instruction that second terminal is sent, it is very concealed The user mode of first terminal is automatically set as guest mode, do not need face of the owner user in the presence of interim user, Relevant operation slave holotype is carried out on first terminal is switched to guest mode, to both avoid the embarrassment between friend, It is consulted by interim user without the privacy information on worry first terminal, improves user experience.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the application environment schematic diagram of terminal control method in one embodiment;
Fig. 2 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 3 is the flow chart of terminal control method in one embodiment;
Fig. 4 is to set currently running user mode to guest mode according to the control instruction in one embodiment Flow chart;
Fig. 5 is to mark corresponding preset strategy by currently running user's mould according to the security level in one embodiment Formula is set as the flow chart of guest mode;
Fig. 6 is the flow chart of terminal control method in another embodiment;
Fig. 7 is the operational flowchart for executing triggering control instruction in one embodiment according to the prompt message;
Fig. 8 is the flow chart of terminal control method in another embodiment;
Fig. 9 is the operational flowchart for executing triggering control instruction in another embodiment according to the prompt message;
Figure 10 is the flow chart of the terminal control method of another embodiment;
Figure 11 is the structure diagram of the terminal control mechanism of an embodiment;
Figure 12 is the structure diagram of the terminal control mechanism of another embodiment;
Figure 13 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements, But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.Citing comes It says, without departing from the scope of the invention, first terminal can be known as to second terminal, and similarly, it can be by second Terminal is known as first terminal.First terminal and second terminal both terminal, but it is not same terminal.
Fig. 1 is the application environment schematic diagram of terminal control method in one embodiment.As shown in Figure 1, the application environment packet The second terminal 120 for including first terminal 110 and being communicated with the first terminal 110.
Wherein there is first terminal the system of at least two user modes, at least two owner's patterns to belong to different uses Role.In the application, the operating system of first terminal provides the function of multi-user or multi-mode so that a terminal can open up Multiple patterns are used by multiple user time-sharings or a user uses under different situations into different user modes. Multiple patterns of the pattern of different user and same user by not distinguishing are collectively referred to as user mode in the application.When same When one user uses different user modes, it is also considered as it and uses role with different.Include but not limited to using situation:
First terminal has more than two users, each with opening a user for belonging to itself in systems per family Pattern, such as owner's pattern, guest mode etc.;One terminal only has there are one user, which opens in systems belongs to In the more than two user modes of itself, such as holotype and privacy mode;One terminal has more than two users, often It is a with opening a user mode for belonging to itself in systems per family, and wherein at least one user also additionally has one A one's own privacy mode.
Wherein, guest mode can be understood as owner user can be not desired to the file being seen, picture or video etc. setting Access rights are set, are given terminal under other people check in owner user, other people can not check file, picture with access rights Or video etc..Owner's pattern can be understood as owner user in using terminal, have the highest permission using the terminal.
Fig. 2 is the internal structure schematic diagram of first terminal in one embodiment.The first terminal includes passing through system bus Processor, memory and the display screen of connection.Wherein, the processor is for providing calculating and control ability, support entire first The operation of terminal.Memory for storing data, program, and/or instruction code etc., at least one computer is stored on memory Program, the computer program can be executed by processor, to realize the sound suitable for first terminal provided in the embodiment of the present application Frequency signal processing method.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non- Volatile storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database And computer program.A kind of Audio Signal Processing side provided for realizing above each embodiment is provided in the database The relevant data of method.The computer program can be performed by processor, for realizing what each embodiment of the application was provided A kind of acoustic signal processing method.Built-in storage is operating system, database and the computer journey in non-volatile memory medium Sequence provides the running environment of cache.Display screen can be touch screen, for example be capacitance plate or electrical screen, for showing first The interface information of terminal, display screen include bright screen state and screen state of going out.The first terminal can be mobile phone, tablet computer or Personal digital assistant or Wearable etc..
It will be understood by those skilled in the art that structure shown in Figure 2, is only tied with the relevant part of application scheme The block diagram of structure, does not constitute the restriction for the terminal 110 being applied thereon to application scheme, and specific terminal 110 can wrap It includes than more or fewer components as shown in the figure, either combine certain components or is arranged with different components.
Terminal control method in the present embodiment is carried out for running in the first terminal in Fig. 1 or second terminal It is described in description terminal.
Fig. 3 is the flow chart of terminal control method in one embodiment.Terminal control method in the present embodiment, with operation It is described on first terminal.Executive agent in the present embodiment is the first terminal in terminal namely the application, such as The terminals such as mobile phone, tablet computer, first terminal can be the terminals that the interim user in addition to owner user uses, can also The terminal used for owner user.Second terminal is the terminal that uses of owner user, second terminal can be with first terminal into The capable mobile phone bound, tablet computer, Wearable etc..
As shown in figure 3, terminal control method includes step 302 to step 306.
Step 302:Obtain the identity information of currently used person.
When needing first terminal lending interim user in addition to owner user in use, in order to ensure first terminal When interior privacy information is not peeped or revealed by interim user, need first terminal being switched to guest mode.If alternatively, working as Preceding interim user be the spouse of owner user, male/female friend, household or other know the user of first terminal unlocking pin When, currently used person can use first terminal at any time, at this time, it is also desirable to set the user mode of first terminal to visitor's mould Formula.
When first terminal unlocks, the identity information of currently used person is obtained.Wherein, identity information can be that fingerprint is believed At least one of breath, iris information, face information, voiceprint, ear line information.
Specifically, when first terminal is converted to unlocked state by screen lock state, solved at this point it is possible to obtain currently used person The biological information of authentication, such as finger print information, face information, voiceprint, iris information, ear are used for during lock At least one of line information.Believed according to the biological information of current acquisition and the default biological characteristic for being stored in first terminal When breath matching, the identity information of currently used person can also be obtained while unlock.If biological characteristic letter is not used when unlock Breath is verified, then can obtain iris information, the people of currently used person by the front camera of first terminal in unlock The information such as face information obtain the identity information of currently used person according to the characteristic information of the iris information of acquisition, face information.
Optionally, first terminal can also be actively unlocked in owner user, first terminal, which is lent interim user, to be used In the case of obtain the currently used person of second terminal identity information.At this point, when owner user is far from first terminal, Ke Yigen Identity acquisition instruction is sent to first terminal according to the second terminal that owner user uses, is referred to when first terminal receives identity acquisition When enabling, the information such as iris information, the face information of currently used person are obtained by the front camera of first terminal, according to acquisition Iris information, face information characteristic information obtain the identity information of currently used person, obtain first terminal currently used The identity information of person.
It should be noted that currently used person is the user that first terminal is being currently used, which can be owner User, or interim user user.
Step 304:When the identity information and default identity information mismatch, communicated to the first terminal Second terminal send prompt message.
Wherein, the identity information that identity information is owner user is preset.For example, when identity information is finger print information, machine Primary user can input the first finger print information in the fingerprint induction region on first terminal, and first finger print information user, which characterizes, to be used The information at family, can also user's unlock first terminal.Wherein, the first finger print information can be that one fingerprint of owner user is believed Breath, or the finger print information of two or more fingers of owner user.
If obtain the identity information of currently used person by finger print information in unlock, obtain in first terminal fingerprint sense It answers region to input the second finger print information, judges whether second finger print information matches with the first finger print information, if matching Think, the identity information of currently used person matches with default identity information, if the second finger print information and the first finger print information are not Matching, then it is assumed that the identity information of currently used person is mismatched with default identity information, at this point, being communicated to first terminal Second terminal send prompt message.The prompt message is used to indicate the second terminal executes the behaviour for whether triggering control instruction Make.Wherein, the second control instruction user indicates that first terminal executes and sets currently running user mode to guest mode.
Correspondingly, identity information can also be iris information, face information, voiceprint, ear line information etc., secondary, no An another citing repeats.
First terminal sends prompt message to the second terminal communicated with first terminal, and second terminal receives the prompt Information, and it is processed to determine whether that execution triggers the operation of control instruction accordingly according to the prompt message.When second terminal is held Gone triggering control instruction operation when, the control instruction of triggering is fed back into first terminal.
Step 306:The control instruction for receiving second terminal feedback, according to the control instruction by currently running use Family mode setting is guest mode.
First terminal receives the control instruction of second terminal feedback, according to the control instruction by currently running use Family mode setting is guest mode.No matter the user mode of current first terminal operation is owner's pattern or guest mode, all It can set first terminal to guest mode on backstage.
The above method, when the identity information of the currently used person of first terminal is not default identity information, that is, when the The currently used person of one terminal is the casual user person in addition to owner, at this point it is possible to be referred to according to the control that second terminal is sent It enables, it is very concealed that the user mode of first terminal is automatically set as guest mode, owner user is not needed in the presence of making temporarily The face of user, on first terminal carrying out relevant operation slave holotype is switched to guest mode, to both avoid and friend Between embarrassment, without worry first terminal on privacy information consulted by interim user.
In one embodiment, it before the identity information for obtaining currently used person, including determines and the first terminal The step of associated second terminal.
Specifically, before executing terminal control method, it is also necessary to determine associated with the first terminal described the Two terminals.Wherein, second terminal can be intelligent wearable devices, mobile phone, tablet computer, laptop or the platforms such as Intelligent bracelet Formula computer etc., does not limit herein.Wherein, be associated can be understood as first terminal and second terminal can by bluetooth, WiFi or mobile communications network etc. are attached and then realize communication, can determine second terminal by first terminal, can also First terminal is determined by second terminal.For example, can be added in the display interface of first terminal associated with first terminal Second terminal, while the operating mode of second terminal can also be set in the display interface of first terminal, wherein operating mode packet Include free schema and listening mode.
It should be noted that free schema is not carry out monitoring control to the associated first terminal of the second terminal, supervise It is that second terminal needs to carry out monitoring control to first terminal to listen pattern.Owner user can pass through the virtual key of second terminal Or physical button realizes the free switching between free schema and listening mode.
Fig. 4 is to set currently running user mode to visitor's mould according to the control instruction described in one embodiment The flow chart of formula.As shown in figure 4, described set currently running user mode to guest mode according to the control instruction, Including:
Step 402:It obtains and is currently marked in the security level of the application program of the first terminal front stage operation;The peace Level flag includes entirely:Shared label and privacy label;
The operation of one application program (Application, abbreviation APP) be typically by the operation of relevant multiple processes and It embodies.The process that foreground application is related to when running is foreground process, the process that background application is related to when running As background process.The corresponding application program of operation pages of the application program of the current display interface displaying of terminal is worked as terminal The application program of preceding operation, abbreviation foreground application.
Owner user can carry out safe class label to application program all in first terminal in advance.When first terminal connects When receiving the control instruction of second terminal transmission, obtain currently in the security level mark of the application program of first terminal front stage operation Note.Wherein, safe class label includes shared label and secret label.Application program with shared label can be it is open or Visitor's use is shared to, visitor has answering for shared label with all permissions for accessing the application program with shared label Can be the application programs such as calendar, clock, weather with program.Application program with secret label can be to be related to owner's privacy The application program of information, visitor do not have the permission for accessing the application program with secret label, such as with secret label Application program can be the application programs such as Alipay, bank, photograph album.
Step 404:Corresponding preset strategy is marked to set currently running user mode to according to the security level Guest mode.
According to the mapping relations between security level label and preset strategy, the security level label pair of foreground application is determined The preset strategy answered sets currently running user mode to guest mode according to determining preset strategy.Wherein, plan is preset Slightly include the first preset strategy and the second preset strategy.
Specifically, the first preset strategy is to keep the application program in the front stage operation of the first terminal, and rear Platform sets currently running user mode to guest mode.Second preset strategy is to obtain the privacy number of the application program According to being hidden to the private data, and currently running user mode is set to guest mode on backstage.
Fig. 5 is to mark corresponding preset strategy by currently running user's mould according to the security level in one embodiment Formula is set as the flow chart of guest mode.As shown in figure 5, marking corresponding preset strategy that will currently transport according to the security level Capable user mode is set as guest mode, including:
Step 502:Call the mapping relations between security level label and preset strategy.
Call the mapping relations being stored in advance in first terminal, wherein shared label corresponds to the first preset strategy;It is hidden Private label corresponds to the second preset strategy.
Step 504:It sets currently running user mode to guest mode according to the mapping relations.
It is corresponding pre- to determine that the security level in the application program of first terminal front stage operation marks according to the mapping relations If it is tactful, and then currently running user mode is set as by guest mode according to determining preset strategy.
Specifically, when the security level is labeled as shared label, keep the application program in the first terminal Front stage operation, and set currently running user mode to guest mode on backstage.For example, being transported on the foreground of first terminal Capable application program is calendar, and when the security level of the calendar is labeled as shared label, first terminal refers to according to the control of reception It enables and calendar is kept to be continued to run on the foreground of first terminal, meanwhile, on the backstage of terminal, will there is privacy label in first terminal The icon of application program be hidden, it is invisible to interim user, or the application program to being marked with privacy is hidden Private data are hidden, invisible to interim user, and then set first terminal to guest mode.
It sets the user mode of first terminal to guest mode according to the first preset strategy, keeps application program first The foreground of terminal continues to run with, and can keep that the dispaly state of current first terminal is constant as possible namely first terminal screen is aobvious What is shown is still the interface of the application program, it is possible to reduce currently used person discovers the possibility that first terminal enters guest mode Property, and then realize secret and set the user mode of first terminal to guest mode.
Specifically, when the security level is marked labeled as privacy, the private data of the application program is obtained, to institute It states private data to be hidden, and currently running user mode is set to guest mode on backstage.For example, in first terminal The application program of front stage operation be photograph album, when the security level of the photograph album is marked labeled as privacy, first terminal is according to reception Control instruction obtain the private data of the photograph album, the private data is hidden, meanwhile, on the backstage of terminal, by The icon of application program with privacy label in one terminal is hidden, invisible to interim user, or to hidden The private data of the application program of private label is hidden, invisible to interim user, and then first terminal is set as visiting Objective pattern.
Wherein, it should be noted that private data is that secret file, such as picture, contact person is arranged in owner's user preset Information (phone directory contact, timely communication class contact person etc.), video, audio, document, short message etc..
For example, currently used person is browsing the photograph album marked with privacy, at that time, what currently used person can not browse Picture with private data, but currently used other pictures of person's normal browsing are not influenced.If first terminal will be used on backstage Family mode setting is after guest mode, there is first terminal the icon of the application program of privacy label will be hidden.Currently make If user is after photograph album exits, just not with the permission for accessing the photograph album with privacy label.
It sets the user mode of first terminal to guest mode according to the second preset strategy, obtains the application program Private data is hidden the private data, rather than to closing the application program, it thus can be to avoid currently used Person sees that the application program is closed, and can perceive first terminal and enter guest mode, and then realizes concealed by first The user mode of terminal is set as guest mode.
Fig. 6 is the flow chart of terminal control method in another embodiment.As shown in fig. 6, terminal control method, is applied to Second terminal, wherein second terminal can be the intelligent wearable devices such as Intelligent bracelet, mobile phone, tablet computer, laptop or Desktop computer etc..Wherein, owner user has all permissions using second terminal.Terminal control method includes:
Step 602:It receives the first terminal communicated with the second terminal and sends prompt message;The prompt message It is generated according to the identity information of the currently used person of the second terminal.
Second terminal receives the prompt message that first terminal is sent.Wherein, the prompt message is according to the second terminal The identity information of currently used person generates.Specifically, when if the identity information of currently used person and default identity information mismatch, Prompt message is sent to second terminal.Wherein, the identity information that identity information is owner user is preset, identity information can be At least one of finger print information, iris information, face information, voiceprint, ear line information.
For example, when identity information is finger print information, owner user can be defeated in the fingerprint induction region on first terminal Enter the first finger print information, first finger print information user characterizes the information of user, can also user's unlock first terminal.If solving When obtaining the identity information of currently used person by finger print information when lock, obtains and input second in first terminal fingerprint induction region Finger print information, judges whether second finger print information matches with the first finger print information, thinks if matching, currently used person Identity information match with default identity information, if the second finger print information and the first finger print information mismatch, then it is assumed that current The identity information of user is mismatched with default identity information, at this point, sending prompt message to second terminal.Meanwhile second is whole End receives the prompt message that first terminal is sent.
Step 604:The operation of triggering control instruction is executed according to the prompt message, the control instruction is used to indicate institute It states first terminal execution and sets currently running user mode to guest mode.
Second terminal receives the prompt message sent from first terminal, and handles the prompt message of reception, to hold The operation of row triggering control instruction.Specifically, the operation of control instruction is triggered, it can be according to owner user to the prompt message It handles and triggers, it can be according to according to the current operating mode automatic trigger of second terminal.Wherein, the control instruction is for referring to Show that the first terminal executes and sets currently running user mode to guest mode.
Step 606:The control instruction is sent to the first terminal.
The control instruction is sent to second terminal by second terminal by default communications protocol.In this way, second terminal can be with The operation of triggering control instruction is executed according to the prompt message of reception, and then the control instruction is sent to first terminal, so that The currently running user mode of first terminal secret is automatically set as guest mode, does not need owner user and is used in the presence of interim The face of person, on first terminal carry out relevant operation slave holotype be switched to guest mode, to both avoid with friend it Between embarrassment, without worry first terminal on privacy information consulted by interim user.
Fig. 7 is the operational flowchart for executing triggering control instruction in one embodiment according to the prompt message.Such as Fig. 7 institutes Show, the operation of triggering control instruction is executed according to the prompt message, including:
Step 702:Show that simultaneously receiver primary user is to the trigger action of the prompt message.
The display interface of second terminal shows the prompt message that first terminal is sent.Such as the content of the prompt message is " whether being set as guest mode " shows the virtual push button of "Yes" and "No" simultaneously, in the display interface.When owner user needs When setting the user mode of first terminal to guest mode, the virtual key of "Yes" can be touched, when second terminal receives When owner user touches the virtual key of "Yes", then second terminal can triggering of the receiver primary user to the prompt message Operation.
It should be noted that trigger action can also be click, sliding, gesture control, acoustic control etc., it is not limited to above-mentioned distance Illustrate, certainly, the content of prompt message may be the form of other words, voice, the tinkle of bells, vibration, icon or picture It presents.
Step 704:The control instruction is generated according to the trigger action.
According to owner user to the trigger action of the prompt message, so that it may to generate the control instruction.For example, eventually second The display interface at end shows the virtual push button of " whether being set as guest mode " prompt message and "Yes" and "No".When owner uses When family touches the virtual key of "Yes", second terminal can generate the control instruction according to the trigger action of owner user.
Optionally, if owner user touches the virtual key of "No", second terminal would not touching according to owner user Hair operation generates the control instruction.
Fig. 8 is the flow chart of terminal control method in another embodiment.As shown in figure 8, terminal control method, is applied to Second terminal, including:
Step 802:Determine the second terminal associated with the first terminal.
It is associated can be understood as first terminal and second terminal can by bluetooth, WiFi or mobile communications network etc. into Row connects and then realizes communication, while can determine second terminal by first terminal, and the can also be determined by second terminal One terminal.
Step 804:Detect the distance between the first terminal and the second terminal information.
First terminal can be realized logical with second terminal by bluetooth, WiFi or mobile communications network etc. are attached Letter, and then wireless distance measuring method of penetrating can be based on and obtain the distance between first terminal and the second terminal information.If for example, When first terminal carries out Bluetooth communication with second terminal, second terminal can search for a certain range of first terminal, second terminal The signal strength values of first terminal can be sampled and be recorded in preset duration.By the signal strength values of acquisition bring into away from From in the model with signal strength, you can obtain the distance between first terminal and second terminal information, wherein distance and signal The module of intensity is:
PR (dBm)=A-10nlgr
In formula, PR indicates that the reception power of wireless signal, A indicate that second terminal receives first eventually when 1 meter of signal transmission is remote Power, the n of end signal indicate that signal propagation factor, r indicate the distance between the first terminal and second terminal.Based on above-mentioned Model can obtain the distance between first terminal and second terminal information.
Step 806:When the range information reaches preset value, the operating mode of the second terminal is set as monitoring Pattern.
Wherein, the operating mode of second terminal includes free schema and listening mode.Free schema is not to second terminal Associated first terminal carries out monitoring control, and listening mode is that second terminal needs to carry out monitoring control to first terminal.When When the range information of acquisition reaches preset value, it sets the operating mode of second terminal to listening mode automatically, that is, currently may be used To be controlled first terminal by second terminal.
Optionally, owner user can realize free schema and monitoring by the virtual key or physical button of second terminal Free switching between pattern.
Fig. 9 is the operational flowchart for executing triggering control instruction in another embodiment according to the prompt message.Such as Fig. 9 It is shown, the operation of triggering control instruction is executed according to the prompt message, including
Step 902:The operating mode of presently described second terminal is obtained according to the prompt message.
Step 904:When the operating mode is listening mode, the control instruction is formed.
When second terminal receives prompt message, the operating mode of current second terminal is obtained according to the prompt message, When the operating mode is listening mode, the operation of triggering control instruction is executed, the control instruction is formed.
Method in the present embodiment, second terminal can be performed automatically the operation of triggering control instruction, form the control Instruction, does not need owner user and manually selects, and can timely and effectively be instructed to first terminal feedback control.
Figure 10 is the flow chart of another embodiment terminal control method.As shown in figure 8, terminal control method, including:
Step 1002:First terminal obtains the identity information of currently used person.
Step 1004:First terminal sends prompt message to the second terminal communicated with the first terminal;It is described Prompt message is used to indicate the second terminal executes the operation for whether triggering control instruction.
Step 1002- steps 1004 are corresponded with step 302- steps 304 in above-described embodiment, here, repeating no more.
Step 1006:Second terminal receives the first terminal communicated with the second terminal and sends prompt message;Institute Prompt message is stated to be generated according to the identity information of the currently used person of the second terminal.
Step 1008:Second terminal executes the operation of triggering control instruction, the control instruction according to the prompt message User executes the first terminal execution and sets currently running user mode to guest mode.
Step 1010:Second terminal sends the control instruction to the first terminal.
Step 1006- steps 10010 are corresponded with step 602- steps 606 in above-described embodiment, here, no longer superfluous It states.
Step 1012:First terminal receives the control instruction of second terminal feedback, will be worked as according to the control instruction The user mode of preceding operation is set as guest mode.
Step 1012 is corresponded with step 306 in above-described embodiment, here, repeating no more.
Terminal control method in above-described embodiment, when the identity information of the currently used person of first terminal is not default body When part information, that is, when the currently used person of first terminal is the casual user person in addition to owner, at this point it is possible to according to the The control instruction that two terminals are sent, it is very concealed that the user mode of first terminal is automatically set as guest mode, it does not need Owner user is in the presence of the face of interim user, and progress relevant operation slave holotype is switched to guest mode on first terminal, To both avoid the embarrassment between friend, consulted by interim user without the privacy information on worry first terminal.
It should be understood that although each step in the flow chart of Fig. 1-10 is shown successively according to the instruction of arrow, Be these steps it is not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps There is no stringent sequences to limit for rapid execution, these steps can execute in other order.Moreover, in Fig. 1-10 at least A part of step may include that either these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps Quarter executes completion, but can execute at different times, the execution in these sub-steps or stage be sequentially also not necessarily according to Secondary progress, but can either the sub-step of other steps or at least part in stage in turn or replace with other steps Ground executes.
Figure 11 is the structure diagram of the terminal control mechanism of one embodiment of the application.Terminal control mechanism, including:
Acquisition module 1110 obtains the identity information of currently used person;
First sending module 1120, for when the identity information and default identity information mismatch, to described the The second terminal that one terminal is communicated sends prompt message;Whether the prompt message is used to indicate the second terminal execution Trigger the operation of control instruction;
Control module 1130, the control instruction for receiving second terminal feedback, will work as according to the control instruction The user mode of preceding operation is set as guest mode.
Above-mentioned terminal control mechanism is applied to first terminal, when the identity information of the currently used person of first terminal is not pre- If when identity information, that is, when the currently used person of first terminal is the casual user person in addition to owner, at this point it is possible to root It is very concealed that the user mode of first terminal is automatically set as guest mode according to the control instruction that second terminal is sent, no It needs owner user in the presence of the face of interim user, relevant operation slave holotype is carried out on first terminal and is switched to visitor's mould Formula is looked into without the privacy information on worry first terminal by interim user to both avoid the embarrassment between friend It reads.
Figure 12 is the structure diagram of the terminal control mechanism of one embodiment of the application.Terminal control mechanism, including:
Receiving module 1210 sends prompt message for receiving the first terminal communicated with the second terminal;Institute Prompt message is stated to be generated according to the identity information of the currently used person of the second terminal;
Execution module 1220, the operation for executing triggering control instruction according to the prompt message, the control instruction It is used to indicate the first terminal execution and sets currently running user mode to guest mode;
Second sending module 1230, for sending the control instruction to the first terminal.
Above-mentioned terminal control mechanism is applied to second terminal, and second terminal can execute triggering according to the prompt message of reception The operation of control instruction, and then the control instruction is sent to first terminal, so that the currently running use of first terminal secret Family pattern is automatically set as guest mode, does not need face of the owner user in the presence of interim user, phase is carried out on first terminal It closes operation slave holotype and is switched to guest mode, to both avoid the embarrassment between friend, eventually without worry first Privacy information on end is consulted by interim user.
Specific about terminal control mechanism limits the restriction that may refer to above for terminal control method, herein not It repeats again.Modules in above-mentioned terminal control mechanism can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the terminal control mechanism provided in the embodiment of the present application can be the shape of computer program Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal Or on the memory of server.When the computer program is executed by processor, terminal control described in the embodiment of the present application is realized The step of method processed.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors When so that the processor executes the step of terminal control method.
A kind of computer program product including instruction, when run on a computer so that computer executes terminal Control method.
The embodiment of the present application also provides a kind of terminal control system, including first terminal and second terminal;Described first eventually End, including memory, processor and storage are on a memory and the computer program that can run on a processor, feature exist In when the processor executes the computer program the step of realization terminal control method;The second terminal, including storage Device, processor and storage are on a memory and the computer program that can run on a processor, which is characterized in that the processor The step of terminal control method being realized when executing the computer program.
The embodiment of the present application also provides a kind of terminals.As shown in figure 13, for convenience of description, it illustrates only and the application The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Figure 13 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 13, hand Machine includes:Radio frequency (Radio Frequency, RF) circuit 1310, memory 1320, input unit 1330, display unit 1340, Sensor 1350, voicefrequency circuit 1360, Wireless Fidelity (wireless fidelity, WiFi) module 1370, processor 1380, And the equal components of power supply 1390.It will be understood by those skilled in the art that handset structure shown in Figure 13 is not constituted to mobile phone It limits, may include either combining certain components or different components arrangement than illustrating more or fewer components.
Wherein, RF circuits 1310 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station After downlink information receives, handled to processor 1380;The data of uplink can also be sent to base station.In general, RF circuits include But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 1310 can also be communicated with network and other equipment by radio communication.It is above-mentioned wireless Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, Short message service (Short Messaging Service, SMS) etc..
Memory 1320 can be used for storing software program and module, and processor 1380 is stored in memory by operation 1320 software program and module, to execute the various function application and terminal control of mobile phone.Memory 1320 can be led To include program storage area and data storage area, wherein program storage area can storage program area, needed at least one function Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;It data storage area can Storage uses created data (such as audio data, address list etc.) etc. according to mobile phone.In addition, memory 1320 can wrap High-speed random access memory is included, can also include nonvolatile memory, for example, at least disk memory, a flash memories Part or other volatile solid-state parts.
Input unit 1330 can be used for receiving the number or character information of input, and generates and set with the owner of mobile phone 1300 It sets and the related key signals of function control inputs.Specifically, input unit 1330 may include operation panel 1331 and other Input equipment 1332.Operation panel 1331, alternatively referred to as touch screen collect owner on it or neighbouring touch operation (are compared Such as owner is using finger, stylus any suitable object or attachment on operation panel 1331 or near operation panel 1331 Operation), and corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 1331 can Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection owner, and examine The signal that touch operation is brought is surveyed, touch controller is transmitted a signal to;Touch controller is received from touch detecting apparatus to be touched Information is touched, and is converted into contact coordinate, then gives processor 1380, and order that processor 1380 is sent can be received and added To execute.Furthermore, it is possible to realize operation panel using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves 1331.In addition to operation panel 1331, input unit 1330 can also include other input equipments 1332.Specifically, other are inputted Equipment 1332 can include but is not limited to one in physical keyboard, function key (such as volume control button, switch key etc.) etc. Kind is a variety of.
Display unit 1340 can be used for showing each of the information inputted by owner or the information for being supplied to owner and mobile phone Kind menu.Display unit 1340 may include display panel 1341.In one embodiment, liquid crystal display may be used (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, ) etc. OLED forms configure display panel 1341.In one embodiment, operation panel 1331 can cover display panel 1341, When operation panel 1331 detects on it or after neighbouring touch operation, processor 1380 is sent to determine touch event Type is followed by subsequent processing device 1380 and provides corresponding visual output on display panel 1341 according to the type of touch event.Although In fig. 13, operation panel 1331 and display panel 1341 are to realize the input and input of mobile phone as two independent components Function, but in some embodiments it is possible to operation panel 1331 and display panel 1341 are integrated and are realized the input of mobile phone And output function.
Mobile phone 1300 may also include at least one sensor 1350, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to ring The light and shade of border light adjusts the brightness of display panel 1341, and range sensor can close display when mobile phone is moved in one's ear Panel 1341 and/or backlight.Motion sensor may include acceleration transducer, can detect all directions by acceleration transducer The size of upper acceleration can detect that size and the direction of gravity when static, the application that can be used to identify mobile phone posture is (such as horizontal Vertical screen switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, Other sensors such as hygrometer, thermometer, infrared sensor etc..
Voicefrequency circuit 1360, loud speaker 1361 and microphone 1362 can provide the audio interface between owner and mobile phone.Sound The transformed electric signal of the audio data received can be transferred to loud speaker 1361 by frequency circuit 1360, by 1361 turns of loud speaker It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1362, by voicefrequency circuit Audio data is converted to after 1360 receptions, then by after the processing of audio data output processor 1380, can be sent out through RF circuits 1310 Another mobile phone is given, or audio data is exported to memory 1320 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help owner's transceiver electronics postal by WiFi module 1370 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet for owner and accesses.Although Figure 13 is shown WiFi module 1370, but it is understood that, and it is not belonging to must be configured into for mobile phone 1300, it can save as needed Slightly.
Processor 1380 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, By running or execute the software program and/or module that are stored in memory 1320, and calls and be stored in memory 1320 Interior data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment, Processor 1380 may include one or more processing units.In one embodiment, processor 1380 can integrate application processor And modem, wherein the main processing operation system of application processor, owner interface and application program etc.;Modem Main processing wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 1380.For example, The processor 1380 can integrate application processor and baseband processor, baseband processor with and the composable tune such as other peripheral chips Modulator-demodulator.Mobile phone 1300 further includes the power supply 1390 (such as battery) powered to all parts, it is preferred that power supply can pass through Power-supply management system and processor 1380 are logically contiguous, to realize management charging, electric discharge, Yi Jigong by power-supply management system The functions such as consumption management.
In one embodiment, mobile phone 1300 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory Realize above-mentioned described terminal control method.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (14)

1. a kind of terminal control method is applied to first terminal, which is characterized in that including:
Obtain the identity information of currently used person;
When the identity information and default identity information mismatch, to the second terminal hair communicated with the first terminal Send prompt message;The prompt message is used to indicate the second terminal executes the operation for whether triggering control instruction;
The control instruction for receiving second terminal feedback, sets currently running user mode to according to the control instruction Guest mode.
2. according to the method described in claim 1, it is characterized in that, before the identity information for obtaining currently used person, also wrap It includes:
Determine the second terminal associated with the first terminal.
3. according to the method described in claim 1, it is characterized in that, it is described according to the control instruction by currently running user Mode setting is guest mode, including:
It obtains and is currently marked in the security level of the application program of the first terminal front stage operation;The security level label packet It includes:Shared label and privacy label;
Corresponding preset strategy is marked to set currently running user mode to guest mode according to the security level.
4. according to the method described in claim 3, it is characterized in that, marking corresponding preset strategy will according to the security level Currently running user mode is set as guest mode, including:
Call the mapping relations between security level label and preset strategy;
It sets currently running user mode to guest mode according to the mapping relations, wherein
When the security level is labeled as shared label, keep the application program in the front stage operation of the first terminal, And set currently running user mode to guest mode on backstage;
When the security level is marked labeled as privacy, the private data of the application program is obtained, to the private data It is hidden, and currently running user mode is set to guest mode on backstage.
5. according to the method described in claim 1, it is characterized in that, the identity information includes finger print information, iris information, people At least one of face information, voiceprint, ear line information.
6. a kind of terminal control method, which is characterized in that it is applied to second terminal, including:
It receives the first terminal communicated with the second terminal and sends prompt message;The prompt message is according to described second The identity information of the currently used person of terminal generates;
The operation of triggering control instruction is executed according to the prompt message, the control instruction is used to indicate the first terminal and holds It is about to currently running user mode and is set as guest mode;
The control instruction is sent to the first terminal.
7. according to the method described in claim 6, it is characterized in that, described execute triggering control instruction according to the prompt message Operation, including:
Show that simultaneously receiver primary user is to the trigger action of the prompt message;
The control instruction is generated according to the trigger action.
8. according to the method described in claim 6, it is characterized in that, described receive first communicated with the second terminal Before terminal sends prompt message, further include:
Determine the second terminal associated with the first terminal;
Detect the distance between the first terminal and the second terminal information;
When the range information reaches preset value, it sets the operating mode of the second terminal to listening mode.
9. according to the method described in claim 8, it is characterized in that, described execute triggering control instruction according to the prompt message Operation, including:
The operating mode of presently described second terminal is obtained according to the prompt message;
When the operating mode is listening mode, the control instruction is formed.
10. a kind of terminal control mechanism is applied to first terminal, which is characterized in that including:
Acquisition module obtains the identity information of currently used person;
First sending module, for when the identity information and default identity information mismatch, to the first terminal into The second terminal of row communication sends prompt message;The prompt message is used to indicate whether the second terminal execution triggers control The operation of instruction;
Control module, the control instruction for receiving second terminal feedback, will be currently running according to the control instruction User mode is set as guest mode.
11. a kind of terminal control mechanism is applied to second terminal, which is characterized in that including:
Receiving module sends prompt message for receiving the first terminal communicated with the second terminal;The prompt letter Breath is generated according to the identity information of the currently used person of the second terminal;
Execution module, the operation for executing triggering control instruction according to the prompt message, the control instruction are used to indicate The first terminal, which executes, sets currently running user mode to guest mode;
Second sending module, for sending the control instruction to the first terminal.
12. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of any one of claim 1 to 9 the method is realized when being executed by processor.
13. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor Sequence, which is characterized in that the processor realizes any one of claim 1 to 9 the method when executing the computer program The step of.
14. a kind of terminal control system, which is characterized in that including first terminal and second terminal;
The first terminal, including memory, processor and storage are on a memory and the computer that can run on a processor Program, which is characterized in that the processor realizes any one of claim 1 to 5 side when executing the computer program The step of method;
The second terminal, including memory, processor and storage are on a memory and the computer that can run on a processor Program, which is characterized in that the processor realizes any one of claim 6 to 9 side when executing the computer program The step of method.
CN201810316545.1A 2018-04-10 2018-04-10 Terminal control method and device, readable storage medium and terminal Expired - Fee Related CN108521494B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810316545.1A CN108521494B (en) 2018-04-10 2018-04-10 Terminal control method and device, readable storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810316545.1A CN108521494B (en) 2018-04-10 2018-04-10 Terminal control method and device, readable storage medium and terminal

Publications (2)

Publication Number Publication Date
CN108521494A true CN108521494A (en) 2018-09-11
CN108521494B CN108521494B (en) 2020-04-14

Family

ID=63431920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810316545.1A Expired - Fee Related CN108521494B (en) 2018-04-10 2018-04-10 Terminal control method and device, readable storage medium and terminal

Country Status (1)

Country Link
CN (1) CN108521494B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800595A (en) * 2018-12-26 2019-05-24 全球能源互联网研究院有限公司 A kind of electric power data sharing method and system
CN109800602A (en) * 2019-01-25 2019-05-24 努比亚技术有限公司 Method for secret protection, mobile terminal and computer readable storage medium
CN110211583A (en) * 2019-05-31 2019-09-06 北京声赫科技有限公司 A kind of voice interactive method and interactive voice equipment based on intelligent line traffic control
CN110782588A (en) * 2019-10-11 2020-02-11 深圳巴斯巴科技发展有限公司 Information prompting method, server and readable storage medium
CN110941864A (en) * 2019-11-12 2020-03-31 维沃移动通信有限公司 Equipment loss prevention method and intelligent wearable equipment
CN111755011A (en) * 2019-03-11 2020-10-09 深圳市冠旭电子股份有限公司 Sound box control method, device, equipment and readable storage medium
CN112955857A (en) * 2019-11-28 2021-06-11 深圳市大疆创新科技有限公司 Networking control method, device and storage medium
WO2021213490A1 (en) * 2020-04-23 2021-10-28 华为技术有限公司 Identity verification method and apparatus and electronic device
CN114254359A (en) * 2021-12-22 2022-03-29 展讯通信(上海)有限公司 Initialization method, device, terminal and storage medium
CN114679511A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Operation control method and device and electronic equipment
CN114791999A (en) * 2022-04-25 2022-07-26 云丁网络技术(北京)有限公司 Information processing method and system of intelligent terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
CN104809780A (en) * 2015-04-24 2015-07-29 成都腾悦科技有限公司 Access control method based on fingerprint recognition and face recognition
CN106446648A (en) * 2016-08-30 2017-02-22 北京小米移动软件有限公司 Terminal control method and apparatus
CN107862190A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Based reminding method and Related product
EP2963521B1 (en) * 2014-06-30 2018-06-27 LG Electronics Inc. Mobile terminal and method for controlling external device using the same

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
EP2963521B1 (en) * 2014-06-30 2018-06-27 LG Electronics Inc. Mobile terminal and method for controlling external device using the same
CN104809780A (en) * 2015-04-24 2015-07-29 成都腾悦科技有限公司 Access control method based on fingerprint recognition and face recognition
CN106446648A (en) * 2016-08-30 2017-02-22 北京小米移动软件有限公司 Terminal control method and apparatus
CN107862190A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Based reminding method and Related product

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800595A (en) * 2018-12-26 2019-05-24 全球能源互联网研究院有限公司 A kind of electric power data sharing method and system
CN109800602B (en) * 2019-01-25 2023-05-16 北京掌汇天下科技有限公司 Privacy protection method, mobile terminal and computer readable storage medium
CN109800602A (en) * 2019-01-25 2019-05-24 努比亚技术有限公司 Method for secret protection, mobile terminal and computer readable storage medium
CN111755011A (en) * 2019-03-11 2020-10-09 深圳市冠旭电子股份有限公司 Sound box control method, device, equipment and readable storage medium
CN110211583A (en) * 2019-05-31 2019-09-06 北京声赫科技有限公司 A kind of voice interactive method and interactive voice equipment based on intelligent line traffic control
CN110211583B (en) * 2019-05-31 2021-07-16 北京声赫科技有限公司 Voice interaction method and voice interaction equipment based on intelligent line control
CN110782588A (en) * 2019-10-11 2020-02-11 深圳巴斯巴科技发展有限公司 Information prompting method, server and readable storage medium
CN110941864A (en) * 2019-11-12 2020-03-31 维沃移动通信有限公司 Equipment loss prevention method and intelligent wearable equipment
CN112955857A (en) * 2019-11-28 2021-06-11 深圳市大疆创新科技有限公司 Networking control method, device and storage medium
WO2021213490A1 (en) * 2020-04-23 2021-10-28 华为技术有限公司 Identity verification method and apparatus and electronic device
CN114679511A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Operation control method and device and electronic equipment
CN114254359A (en) * 2021-12-22 2022-03-29 展讯通信(上海)有限公司 Initialization method, device, terminal and storage medium
CN114791999A (en) * 2022-04-25 2022-07-26 云丁网络技术(北京)有限公司 Information processing method and system of intelligent terminal

Also Published As

Publication number Publication date
CN108521494B (en) 2020-04-14

Similar Documents

Publication Publication Date Title
CN108521494A (en) Terminal control method and device, readable storage medium storing program for executing, terminal
CN103473494B (en) A kind of run the method for application, device and terminal unit
CN106778175B (en) Interface locking method and device and terminal equipment
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN107924288A (en) Electronic equipment and its method for carrying out perform function using speech recognition
CN108563932B (en) Application control method and device, readable storage medium and terminal
CN106303004B (en) The way of recording, device and mobile terminal under screen lock state
CN107395880B (en) Information display method and device and terminal
CN107437009A (en) Authority control method and related product
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal
CN104915582A (en) Unlocking method and unlocking device
CN104217172B (en) Privacy content inspection method and device
CN108537037A (en) Privacy control method and device, computer readable storage medium, terminal
CN108573168A (en) Private space starts method and apparatus, storage medium, electronic equipment
CN108537027A (en) Resource allocation methods and device, terminal, computer readable storage medium
CN106878554A (en) A kind of theft preventing method of mobile terminal, device and mobile terminal
CN106980439A (en) The method and device of hiden application icon
CN107133507A (en) A kind of privacy services system access method, device and mobile terminal
CN109359452A (en) Mobile terminal and face recognition limit the method, apparatus of application function
CN108509788A (en) Information sharing method and device, computer readable storage medium, terminal
CN108513010A (en) Terminal unlock method, terminal and computer readable storage medium
CN110062929A (en) A kind of method, apparatus and terminal showing data
CN107480495A (en) The unlocking method and Related product of mobile terminal
CN109189397A (en) The method, apparatus of mobile terminal and intelligent display hiden application
CN108549804A (en) Mode switching method and device, computer readable storage medium, terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200414