CN108521494B - Terminal control method and device, readable storage medium and terminal - Google Patents

Terminal control method and device, readable storage medium and terminal Download PDF

Info

Publication number
CN108521494B
CN108521494B CN201810316545.1A CN201810316545A CN108521494B CN 108521494 B CN108521494 B CN 108521494B CN 201810316545 A CN201810316545 A CN 201810316545A CN 108521494 B CN108521494 B CN 108521494B
Authority
CN
China
Prior art keywords
terminal
mode
user
information
control instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810316545.1A
Other languages
Chinese (zh)
Other versions
CN108521494A (en
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810316545.1A priority Critical patent/CN108521494B/en
Publication of CN108521494A publication Critical patent/CN108521494A/en
Application granted granted Critical
Publication of CN108521494B publication Critical patent/CN108521494B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

The application relates to a terminal control method and device, a computer readable storage medium, a terminal, a system and a terminal control system. The method comprises the following steps: acquiring identity information of a current user; when the identity information is not matched with the preset identity information, sending prompt information to a second terminal which communicates with the first terminal; the prompt message is used for indicating the second terminal to execute the operation of whether the control instruction is triggered or not; the control instruction fed back by the second terminal is received, the user mode running at present is set to be the visitor mode according to the control instruction, the user mode of the first terminal is set to be the visitor mode quite secretly according to the control instruction sent by the second terminal, the user mode of the first terminal is not needed to be set to be the visitor mode when an owner user is facing a temporary user, relevant operation is carried out on the first terminal, the host mode is switched to be the visitor mode, accordingly, embarrassment between the owner user and friends is avoided, the user does not need to worry that privacy information on the first terminal is consulted by the temporary user, and user experience is improved.

Description

Terminal control method and device, readable storage medium and terminal
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a terminal control method and apparatus, a computer-readable storage medium, a terminal, and a terminal control system.
Background
As terminal devices enter the intelligent era, mobile terminals such as mobile phones and communication tablets play more and more important roles in the life of people. Through various software applications, different requirements of people can be met in the aspects of social contact, shopping, entertainment, work, learning and the like.
Currently, a terminal may set a plurality of user modes for a plurality of users to use the same terminal, such as an owner mode, a visitor mode, and the like. When a host user needs to set a user mode of a terminal to a visitor mode, the host user needs to perform corresponding operations on the terminal to set the visitor mode. If the temporary user stands beside the main user, the user mode of the terminal is set to be the visitor mode, the operation is obvious and obtrusive, and the user experience is low.
Disclosure of Invention
The embodiment of the application provides a terminal control method and device, a computer readable storage medium, a terminal and a terminal control system, and the terminal can be set to be in a visitor mode in a secret manner after the terminal is lent to other people for use, so that privacy of a host user is protected, and user experience is improved.
In a first aspect, the present application provides a terminal control method, applied to a first terminal, including:
when the first terminal is unlocked, acquiring the identity information of the current user;
when the identity information is not matched with preset identity information, sending prompt information to a second terminal which communicates with the first terminal; the prompt message is used for indicating the second terminal to execute the operation of whether to trigger the control instruction;
and receiving the control instruction fed back by the second terminal, and setting the currently running user mode as the visitor mode according to the control instruction.
In a second aspect, the present application provides a terminal control method, applied to a second terminal, including:
receiving prompt information sent by a first terminal communicating with the second terminal; the prompt message is generated according to the identity information of the current user of the second terminal;
executing the operation of triggering a control instruction according to the prompt message, wherein the control instruction user executes the first terminal to set the currently running user mode as the visitor mode;
and sending the control instruction to the first terminal.
In a third aspect, the present application provides a terminal control apparatus, applied to a first terminal, including:
the acquisition module is used for acquiring the identity information of the current user when the first terminal is unlocked;
the first sending module is used for sending prompt information to a second terminal which communicates with the first terminal when the identity information is not matched with preset identity information; the prompt message is used for indicating the second terminal to execute the operation of whether to trigger the control instruction;
and the control module is used for receiving the control instruction fed back by the second terminal and setting the currently running user mode into the visitor mode according to the control instruction.
In a fourth aspect, the present application provides a terminal control apparatus, applied to a second terminal, including:
the receiving module is used for receiving prompt information sent by the first terminal which communicates with the second terminal; the prompt message is generated according to the identity information of the current user of the second terminal;
the execution module is used for executing the operation of triggering a control instruction according to the prompt message, and the control instruction user executes the first terminal to set the currently running user mode as the visitor mode;
and the second sending module is used for sending the control instruction to the first terminal.
In a fifth aspect, the present application provides a computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of the method in the embodiments of the first and second aspects of the present application.
In a sixth aspect, the present application provides a terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method in the embodiments of the first and second aspects when executing the computer program.
In a seventh aspect, the present application provides a terminal control system, including a first terminal and a second terminal, where the first terminal includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor executes the computer program to implement the steps of the method in the embodiments of the first aspect of the present application; the second terminal comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method in the embodiments of the second aspect of the present application when executing the computer program.
According to the terminal control method and device, the computer readable storage medium, the terminal and the terminal control system, when the identity information of the current user of the first terminal is not the preset identity information, namely, when the current user of the first terminal is a temporary user except the owner, at the moment, the user mode of the first terminal can be set to be the visitor mode quite secretly according to the control instruction sent by the second terminal, the owner user is not required to be the temporary user, the host user is not required to perform related operation on the first terminal, the host mode is switched to be the visitor mode, and therefore embarrassment between the first terminal and friends is avoided, the user does not need to worry that the privacy information on the first terminal is consulted by the temporary user, and user experience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of an application environment of a terminal control method in one embodiment;
fig. 2 is a schematic diagram of the internal structure of the terminal in one embodiment;
fig. 3 is a flowchart of a terminal control method in one embodiment;
FIG. 4 is a flow diagram illustrating setting a currently running user mode to a guest mode according to the control command in one embodiment;
FIG. 5 is a flowchart illustrating setting a currently running user mode to a guest mode according to a preset policy corresponding to the security level flag in one embodiment;
fig. 6 is a flowchart of a terminal control method in another embodiment;
FIG. 7 is a flowchart illustrating operation of executing a trigger control command according to the hint information in one embodiment;
fig. 8 is a flowchart of a terminal control method in another embodiment;
FIG. 9 is a flowchart illustrating operation of executing a trigger control command according to the hint information in another embodiment;
fig. 10 is a flowchart of a terminal control method of yet another embodiment;
fig. 11 is a block diagram of a terminal control device according to an embodiment;
fig. 12 is a block diagram showing a configuration of a terminal control apparatus according to another embodiment;
fig. 13 is a block diagram of a partial structure of a mobile phone related to a terminal according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, a first terminal may be termed a second terminal, and, similarly, a second terminal may be termed a first terminal, without departing from the scope of the present invention. The first terminal and the second terminal are both terminals, but they are not the same terminal.
Fig. 1 is a schematic diagram of an application environment of a terminal control method in an embodiment. As shown in fig. 1, the application environment includes a first terminal 110 and a second terminal 120 communicating with the first terminal 110.
The first terminal has a system of at least two user modes, and the at least two main modes belong to different use roles. In the application, the operating system of the first terminal provides a multi-user or multi-mode function, so that one terminal can open up a plurality of modes to be used by a plurality of users in a time-sharing manner, or one user enters different user modes to use under different situations. In the present application, a mode of a different user and a plurality of modes of the same user will be collectively referred to as a user mode without distinction. When the same user uses different user modes, they are also considered to have different usage roles. Usage scenarios include, but are not limited to:
the first terminal has more than two users, and each user develops a user mode belonging to the first terminal in the system, such as a main mode, a visitor mode and the like; one terminal only has one user, and the user opens up more than two user modes, such as a main mode and a privacy mode, which belong to the terminal in the system; one terminal has more than two users, each user opens up a user mode belonging to the terminal in the system, and at least one user additionally has a privacy mode belonging to the terminal.
The visitor mode can be understood as that the access authority can be set for files, pictures or videos which are not wanted to be seen by the host user, the host user hands the terminal to others to view the files, pictures or videos which have the access authority. The active mode may be understood as the mode in which an active user has the highest authority to use the terminal when using the terminal.
Fig. 2 is a schematic diagram of an internal structure of the first terminal in one embodiment. The first terminal includes a processor, a memory, and a display screen connected by a system bus. Wherein the processor is configured to provide computing and control capabilities to support the operation of the entire first terminal. The memory is used for storing data, programs, instruction codes and/or the like, and at least one computer program is stored on the memory, and the computer program can be executed by the processor to realize the audio signal processing method suitable for the first terminal provided by the embodiment of the application. The Memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random-Access-Memory (RAM). For example, in one embodiment, the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a database, and a computer program. The database stores data related to implementing an audio signal processing method provided in the above embodiments. The computer program can be executed by a processor for implementing an audio signal processing method provided by various embodiments of the present application. The internal memory provides a cached operating environment for the operating system, databases, and computer programs in the non-volatile storage medium. The display screen may be a touch screen, such as a capacitive screen or an electronic screen, and is used for displaying interface information of the first terminal, and the display screen includes a screen-on state and a screen-off state. The first terminal can be a mobile phone, a tablet computer or a personal digital assistant or a wearable device.
Those skilled in the art will appreciate that the configuration shown in fig. 2 is a block diagram of only a portion of the configuration associated with the present application and does not constitute a limitation on the terminal 110 to which the present application is applied, and that a particular terminal 110 may include more or less components than those shown, or combine certain components, or have a different arrangement of components.
The terminal control method in this embodiment is described by taking the first terminal or the second terminal in fig. 1 as an example to describe the terminal.
Fig. 3 is a flowchart of a terminal control method in one embodiment. The terminal control method in this embodiment is described by taking the operation on the first terminal as an example. The execution main body in this embodiment is a terminal, that is, a first terminal in this application, such as a mobile phone, a tablet computer, and the like, where the first terminal may be a terminal used by a temporary user other than an owner or a terminal used by the owner. The second terminal is a terminal used by the owner user, and the second terminal can be a mobile phone, a tablet computer, wearable equipment and the like bound with the first terminal.
As shown in fig. 3, the terminal control method includes steps 302 to 306.
Step 302: and acquiring the identity information of the current user.
When the first terminal needs to be lent to a temporary user except for the owner user, the first terminal needs to be switched to the visitor mode in order to ensure that the privacy information in the first terminal is not peeped or leaked by the temporary user. Or, if the current temporary user is a spouse, a boy/girl friend, a family or other user who knows the unlocking password of the first terminal, the current user may use the first terminal at any time, and at this time, the user mode of the first terminal also needs to be set to the visitor mode.
And when the first terminal is unlocked, acquiring the identity information of the current user. The identity information may be at least one of fingerprint information, iris information, face information, voiceprint information and ear print information.
Specifically, when the first terminal is switched from the screen locking state to the unlocking state, the biometric information used for identity verification in the unlocking process of the current user, such as at least one of fingerprint information, face information, voiceprint information, iris information and ear print information, can be acquired. When the current acquired biological characteristic information is matched with the preset biological characteristic information stored in the first terminal, the identity information of the current user can be acquired while unlocking. If the biometric information is not used for verification during unlocking, the information such as iris information, face information and the like of the current user can be acquired through the front-facing camera of the first terminal during unlocking, and the identity information of the current user can be acquired according to the acquired iris information and the feature information of the face information.
Optionally, the first terminal may be actively unlocked by the host user, and the identity information of the current user of the second terminal may be obtained when the first terminal is lent to the temporary user. At this time, when the master user is far away from the first terminal, an identity acquisition instruction can be sent to the first terminal according to the second terminal used by the master user, when the first terminal receives the identity acquisition instruction, information such as iris information and face information of the current user is acquired through the front camera of the first terminal, the identity information of the current user is acquired according to the acquired feature information of the iris information and the face information, and the identity information of the current user of the first terminal is acquired.
It should be noted that the current user is a user currently using the first terminal, and the user may be a set-top user or a temporary user.
Step 304: and when the identity information is not matched with the preset identity information, sending prompt information to a second terminal which communicates with the first terminal.
The preset identity information is identity information of the owner and the user. For example, when the identity information is fingerprint information, the owner user may input first fingerprint information in a fingerprint sensing area on the first terminal, where the first fingerprint information represents information of the user, and the user may also unlock the first terminal. The first fingerprint information may be fingerprint information of one of the owner users, or fingerprint information of two or more fingers of the owner user.
If when obtaining current user's identity information through fingerprint information when the unblock, acquire and input second fingerprint information in first terminal fingerprint induction zone, judge whether second fingerprint information matches with first fingerprint information, if match then think, current user's identity information and predetermine identity information phase-match, if second fingerprint information and first fingerprint information do not match, then think that current user's identity information and predetermine identity information mismatch, this moment, to carrying out the second terminal transmission prompt message of communication with first terminal. The prompt message is used for indicating the second terminal to execute the operation of triggering the control instruction. Wherein the second control instructs the user to instruct the first terminal to perform setting of the currently running user mode to the guest mode.
Correspondingly, the identity information may also be iris information, face information, voiceprint information, ear print information, and the like, which is not described in detail herein.
The first terminal sends prompt information to a second terminal which communicates with the first terminal, and the second terminal receives the prompt information and determines whether to execute the operation of triggering the control instruction according to corresponding processing of the prompt information. And when the second terminal executes the operation of triggering the control instruction, feeding the triggered control instruction back to the first terminal.
Step 306: and receiving the control instruction fed back by the second terminal, and setting the currently running user mode as the visitor mode according to the control instruction.
And the first terminal receives the control instruction fed back by the second terminal, and sets the currently running user mode as the visitor mode according to the control instruction. The first terminal may be set to the guest mode in the background regardless of whether the user mode currently being operated by the first terminal is the active mode or the guest mode.
According to the method, when the identity information of the current user of the first terminal is not the preset identity information, namely, when the current user of the first terminal is a temporary user except the owner, the user mode of the first terminal can be set to be the visitor mode quite secretly according to the control instruction sent by the second terminal, the owner user is not required to be the temporary user, the first terminal is switched from the master mode to the visitor mode in a related operation mode, and therefore embarrassment between friends is avoided, and the user does not need to worry about that the privacy information on the first terminal is looked up by the temporary user.
In one embodiment, before obtaining the identity information of the current user, a step of determining the second terminal associated with the first terminal is included.
In particular, the second terminal associated with the first terminal also needs to be determined before executing the terminal control method. The second terminal can be an intelligent wearable device such as an intelligent bracelet, a mobile phone, a tablet computer, a notebook computer or a desktop computer, and the like, and is not limited herein. The association may be understood as that the first terminal and the second terminal may be connected through bluetooth, WiFi, or a mobile communication network, and the like, so as to implement communication, and the second terminal may be determined by the first terminal, and the first terminal may also be determined by the second terminal. For example, a second terminal associated with a first terminal may be added to a display interface of the first terminal, and an operation mode of the second terminal may also be set on the display interface of the first terminal, where the operation mode includes a free mode and a listening mode.
It should be noted that, the free mode is that the first terminal associated with the second terminal is not subjected to monitoring control, and the monitoring mode is that the second terminal needs to perform monitoring control on the first terminal. The owner user can realize the free switching between the free mode and the monitoring mode through the virtual key or the physical key of the second terminal.
FIG. 4 is a flow diagram illustrating setting of a currently running user mode to guest mode according to the control command in one embodiment. As shown in fig. 4, the setting of the currently running user mode to the guest mode according to the control instruction includes:
step 402: acquiring a security level mark of an application program currently running in the foreground of the first terminal; the security level indicia comprises: a shared token and a privacy token;
the execution of an Application program (APP) is usually represented by the execution of a plurality of related processes. The process involved in the operation of the foreground application program is the foreground process, and the process involved in the operation of the background application program is the background process. The application program corresponding to the operation page of the application program displayed on the current display interface of the terminal is the application program currently running on the terminal, and is called foreground application for short.
The owner user will perform security level marking on all the application programs in the first terminal in advance. And when the first terminal receives a control instruction sent by the second terminal, acquiring the security level mark of the application program currently running in the foreground of the first terminal. Wherein the security level indicia includes a shared indicia and a private indicia. The application with the shared token may be published or shared for use by guests who have all rights to access the application with the shared token, and the application with the shared token may be a calendar, clock, weather, etc. application. The application with the privacy flag may be an application relating to owner privacy information, and the guest does not have access to the application with the privacy flag, e.g. the application with the privacy flag may be a pay-for-use, bank, photo album, etc. application.
Step 404: and setting the currently running user mode as the visitor mode according to a preset strategy corresponding to the security level mark.
And determining a preset strategy corresponding to the security level mark applied by the foreground according to the mapping relation between the security level mark and the preset strategy, and setting the currently running user mode as a visitor mode according to the determined preset strategy. The preset strategies comprise a first preset strategy and a second preset strategy.
Specifically, the first preset policy is to keep the application running in the foreground of the first terminal, and set the currently running user mode to the guest mode in the background. The second preset strategy is to acquire the private data of the application program, hide the private data, and set the currently running user mode as the visitor mode in the background.
FIG. 5 is a flowchart illustrating setting a currently running user mode to a guest mode according to a preset policy corresponding to the security level flag according to an embodiment. As shown in fig. 5, setting the currently running user mode to the guest mode according to the preset policy corresponding to the security level flag includes:
step 502: and calling a mapping relation between the security level mark and a preset strategy.
Calling a mapping relation pre-stored in a first terminal, wherein the sharing mark corresponds to a first preset strategy; the privacy token corresponds to a second preset policy.
Step 504: and setting the currently running user mode as the visitor mode according to the mapping relation.
And determining a preset strategy corresponding to the security level mark of the application program running in the foreground of the first terminal according to the mapping relation, and further setting the currently running user mode as the visitor mode according to the determined preset strategy.
Specifically, when the security level flag is a shared flag, the application program is kept running in the foreground of the first terminal, and the currently running user mode is set to the guest mode in the background. For example, when the application program running in the foreground of the first terminal is a calendar and the security level of the calendar is marked as a shared mark, the first terminal keeps the calendar to continue running in the foreground of the first terminal according to the received control instruction, and meanwhile, in the background of the terminal, the icon of the application program with the privacy mark in the first terminal is hidden, so that a temporary user cannot see the icon or privacy data of the application program with the privacy mark cannot see the application program, and the first terminal is set to be in a visitor mode.
The user mode of the first terminal is set to be the visitor mode according to the first preset strategy, the application program is kept to continuously run in the foreground of the first terminal, the current display state of the first terminal can be kept unchanged as much as possible, namely, the screen of the first terminal is still the interface of the application program, the possibility that the current user perceives that the first terminal enters the visitor mode can be reduced, and the user mode of the first terminal is set to be the visitor mode in a secret mode.
Specifically, when the security level is marked as a privacy mark, the private data of the application program is acquired, the private data is hidden, and the currently running user mode is set as the visitor mode in the background. For example, when an application program running in the foreground of the first terminal is an album, and the security level of the album is marked as a privacy mark, the first terminal acquires privacy data of the album according to a received control instruction, and hides the privacy data, and meanwhile, in the background of the terminal, the icon of the application program with the privacy mark in the first terminal is hidden and invisible for a temporary user, or the privacy data of the application program with the privacy mark is hidden and invisible for the temporary user, so that the first terminal is set to be in a visitor mode.
It should be noted that the private data is a private file preset by the host user, such as a picture, contact information (a phonebook contact, a contact in time communication, etc.), a video, an audio, a document, a short message, etc.
For example, the current user is browsing an album with a privacy flag, and at the time, the current user cannot browse pictures with privacy data, but does not influence the normal browsing of other pictures by the current user. If the first terminal sets the user mode to the guest mode in the background, the icon of the application program with the privacy mark of the first terminal is hidden. If the current user exits from the album, the current user does not have the right to access the album with the privacy marks.
The user mode of the first terminal is set to be the visitor mode according to the second preset strategy, the private data of the application program is obtained, and the private data is hidden instead of closing the application program, so that the situation that a current user sees that the application program is closed and can perceive that the first terminal enters the visitor mode can be avoided, and the user mode of the first terminal is set to be the visitor mode in a secret mode.
Fig. 6 is a flowchart of a terminal control method in another embodiment. As shown in fig. 6, the terminal control method is applied to a second terminal, where the second terminal may be an intelligent wearable device such as a smart band, a mobile phone, a tablet computer, a notebook computer, or a desktop computer. Wherein the owner user has all rights to use the second terminal. The terminal control method comprises the following steps:
step 602: receiving prompt information sent by a first terminal communicating with the second terminal; and the prompt message is generated according to the identity information of the current user of the second terminal.
And the second terminal receives the prompt message sent by the first terminal. And the prompt message is generated according to the identity information of the current user of the second terminal. Specifically, if the identity information of the current user is not matched with the preset identity information, the prompt message is sent to the second terminal. The preset identity information is identity information of the owner and the user, and the identity information can be at least one of fingerprint information, iris information, face information, voiceprint information and ear print information.
For example, when the identity information is fingerprint information, the owner user may input first fingerprint information in a fingerprint sensing area on the first terminal, where the first fingerprint information represents information of the user, and the user may also unlock the first terminal. If when obtaining current user's identity information through fingerprint information when the unblock, acquire and input second fingerprint information in first terminal fingerprint induction zone, judge whether second fingerprint information matches with first fingerprint information, if match then think, current user's identity information and predetermine identity information phase-match, if second fingerprint information and first fingerprint information do not match, then think that current user's identity information and predetermine identity information mismatch, this moment, send tip information to the second terminal. Meanwhile, the second terminal receives the prompt message sent by the first terminal.
Step 604: and executing the operation of triggering a control instruction according to the prompt message, wherein the control instruction is used for instructing the first terminal to execute the setting of the currently running user mode to be the visitor mode.
And the second terminal receives the prompt message sent from the first terminal and processes the received prompt message to execute the operation of triggering the control instruction. Specifically, the operation of triggering the control instruction may be triggered according to the processing of the host user on the prompt message, and may be automatically triggered according to the current working mode of the second terminal. Wherein the control instruction is used for instructing the first terminal to execute setting of a currently running user mode to a guest mode.
Step 606: and sending the control instruction to the first terminal.
And the second terminal sends the control instruction to the second terminal through a preset communication protocol. Therefore, the second terminal can execute the operation of triggering the control instruction according to the received prompt message and further send the control instruction to the first terminal, so that the user mode of the first terminal which is secret and runs at present is automatically set to be the visitor mode, the situation that an owner user is facing a temporary user is not needed, relevant operation is carried out on the first terminal and the host mode is switched to be the visitor mode from the host mode, and therefore embarrassment between the second terminal and friends is avoided, and the user does not need to worry about that privacy information on the first terminal is consulted by the temporary user.
FIG. 7 is a flowchart illustrating operation of executing a trigger control command according to the hint information in one embodiment. As shown in fig. 7, the operation of executing the trigger control instruction according to the prompt information includes:
step 702: and displaying and receiving the trigger operation of the host user on the prompt message.
And displaying the prompt message sent by the first terminal on a display interface of the second terminal. For example, the content of the prompt message is "set to guest mode", and virtual buttons of "yes" and "no" are displayed on the display interface. When the master user needs to set the user mode of the first terminal to the visitor mode, the yes virtual key can be touched, and when the second terminal receives the yes virtual key touched by the master user, the second terminal can receive the trigger operation of the master user on the prompt message.
It should be noted that the trigger operation may also be a click, a slide, a gesture control, a voice control, or the like, and is not limited to the above distance description, and the content of the prompt information may also be presented in the form of other words, voice, ring, vibration, icons, or pictures.
Step 704: and generating the control instruction according to the trigger operation.
The control instruction can be generated according to the trigger operation of the owner user to the prompt message. For example, a prompt of "whether to set to guest mode" and virtual buttons of "yes" and "no" are displayed on the display interface of the second terminal. When the main user touches the 'yes' virtual key, the second terminal can generate the control instruction according to the trigger operation of the main user.
Optionally, if the owner user touches the "no" virtual key, the second terminal may not generate the control instruction according to the trigger operation of the owner user.
Fig. 8 is a flowchart of a terminal control method in another embodiment. As shown in fig. 8, the terminal control method, applied to the second terminal, includes:
step 802: determining the second terminal associated with the first terminal.
The association can be understood as that the first terminal and the second terminal can be connected through bluetooth, WiFi or a mobile communication network, etc. to further implement communication, and meanwhile, the second terminal can be determined through the first terminal, and the first terminal can also be determined through the second terminal.
Step 804: and detecting distance information between the first terminal and the second terminal.
The first terminal and the second terminal can be connected through Bluetooth, WiFi or a mobile communication network and the like to further achieve communication, and further distance information between the first terminal and the second terminal can be obtained based on a wireless radio and distance measurement method. For example, if the first terminal performs bluetooth communication with the second terminal, the second terminal may search for the first terminal within a certain range, and the second terminal may sample and record the signal strength value of the first terminal within a preset time period. The obtained signal intensity value is brought into a model of distance and signal intensity, so that distance information between the first terminal and the second terminal can be obtained, wherein the distance and signal intensity module is as follows:
PR(dBm)=A-10·nlgr
in the formula, PR represents the received power of a wireless signal, a represents the power of a second terminal receiving a signal of a first terminal when the signal is transmitted 1 m away, n represents a signal propagation factor, and r represents the distance between the first terminal and the second terminal. The distance information between the first terminal and the second terminal can be obtained based on the model.
Step 806: and when the distance information reaches a preset value, setting the working mode of the second terminal to be a monitoring mode.
The working mode of the second terminal comprises a free mode and a monitoring mode. The free mode is that the first terminal associated with the second terminal is not monitored and controlled, and the monitoring mode is that the second terminal needs to monitor and control the first terminal. When the acquired distance information reaches a preset value, the working mode of the second terminal is automatically set to be a monitoring mode, that is, the first terminal can be controlled by the second terminal currently.
Optionally, the owner user may implement free switching between the free mode and the monitoring mode through a virtual key or a physical key of the second terminal.
FIG. 9 is a flowchart illustrating operation of executing a trigger control command according to the hint information in another embodiment. As shown in FIG. 9, the operation of triggering the control command is performed according to the prompt message, which includes
Step 902: and acquiring the current working mode of the second terminal according to the prompt message.
Step 904: and when the working mode is a monitoring mode, forming the control instruction.
And when the second terminal receives the prompt message, acquiring the current working mode of the second terminal according to the prompt message, and when the working mode is a monitoring mode, executing the operation of triggering the control instruction to form the control instruction.
According to the method in the embodiment, the second terminal can automatically execute the operation of triggering the control instruction to form the control instruction, manual selection by an owner and a user is not needed, and the control instruction can be timely and effectively fed back to the first terminal.
Fig. 10 is a flowchart of a terminal control method according to another embodiment. As shown in fig. 8, the terminal control method includes:
step 1002: the first terminal acquires identity information of a current user.
Step 1004: a first terminal sends prompt information to a second terminal which communicates with the first terminal; the prompt message is used for indicating the second terminal to execute the operation of whether the control instruction is triggered.
Steps 1002 to 1004 correspond to steps 302 to 304 in the above embodiment one to one, and are not described herein again.
Step 1006: the second terminal receives prompt information sent by the first terminal which communicates with the second terminal; and the prompt message is generated according to the identity information of the current user of the second terminal.
Step 1008: and the second terminal executes the operation of triggering a control instruction according to the prompt message, and the control instruction user executes the first terminal to set the currently running user mode as the visitor mode.
Step 1010: and the second terminal sends the control instruction to the first terminal.
Step 1006-step 10010 correspond to step 602-step 606 in the above embodiments one to one, and are not described herein again.
Step 1012: and the first terminal receives the control instruction fed back by the second terminal, and sets the currently running user mode as the visitor mode according to the control instruction.
Step 1012 corresponds to step 306 in the above embodiments, and is not described herein again.
In the terminal control method in the above embodiment, when the identity information of the current user of the first terminal is not the preset identity information, that is, when the current user of the first terminal is a temporary user other than the owner, at this time, the user mode of the first terminal can be set to the visitor mode quite secretly according to the control instruction sent by the second terminal, and it is not necessary for the owner user to be in the face of the temporary user, and the relevant operation is performed on the first terminal to switch from the master mode to the visitor mode, thereby avoiding embarrassment with friends, and also not worrying about that the privacy information on the first terminal is looked up by the temporary user.
It should be understood that although the various steps in the flow charts of fig. 1-10 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-10 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
Fig. 11 is a block diagram of a terminal control device according to an embodiment of the present application. A terminal control device comprising:
an obtaining module 1110, configured to obtain identity information of a current user;
a first sending module 1120, configured to send a prompt message to a second terminal in communication with the first terminal when the identity information is not matched with preset identity information; the prompt message is used for indicating the second terminal to execute the operation of whether to trigger the control instruction;
the control module 1130 is configured to receive the control instruction fed back by the second terminal, and set the currently running user mode to the visitor mode according to the control instruction.
The terminal control device is applied to the first terminal, when the identity information of the current user of the first terminal is not the preset identity information, namely, when the current user of the first terminal is a temporary user except the owner, at the moment, the control command sent by the second terminal can be used for quite secretly automatically setting the user mode of the first terminal into the visitor mode, the owner user is not required to be the face of the temporary user, the master mode of the slave machine is switched into the visitor mode through relevant operation on the first terminal, and therefore embarrassment between friends is avoided, and the privacy information on the first terminal is not required to be consulted by the temporary user.
Fig. 12 is a block diagram of a terminal control device according to an embodiment of the present application. A terminal control device comprising:
a receiving module 1210, configured to receive a prompt message sent by a first terminal in communication with the second terminal; the prompt message is generated according to the identity information of the current user of the second terminal;
an executing module 1220, configured to execute an operation of triggering a control instruction according to the prompt message, where the control instruction is used to instruct the first terminal to perform setting of a currently running user mode to a guest mode;
a second sending module 1230, configured to send the control instruction to the first terminal.
The terminal control device is applied to the second terminal, the second terminal can execute the operation of triggering the control instruction according to the received prompt message, and then the control instruction is sent to the first terminal, so that the user mode of the hidden current operation of the first terminal is automatically set to be the visitor mode, the owner user is not required to be in the face of a temporary user, the relevant operation is switched from the host mode to the visitor mode on the first terminal, and therefore embarrassment between the owner and a friend is avoided, and the user does not need to worry about that the privacy information on the first terminal is consulted by the temporary user.
For specific limitations of the terminal control device, reference may be made to the above limitations of the terminal control method, which are not described herein again. The respective modules in the terminal control device described above may be implemented wholly or partially by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The implementation of each module in the terminal control device provided in the embodiments of the present application may be in the form of a computer program. The computer program may be run on a terminal or a server. The program modules constituted by the computer program may be stored on the memory of the terminal or the server. The computer program, when executed by a processor, implements the steps of the terminal control method described in the embodiments of the present application.
The embodiment of the application also provides a computer readable storage medium. One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the steps of a terminal control method.
A computer program product containing instructions which, when run on a computer, cause the computer to perform a terminal control method.
The embodiment of the application also provides a terminal control system, which comprises a first terminal and a second terminal; the first terminal comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and is characterized in that the processor realizes the steps of the terminal control method when executing the computer program; the second terminal comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and is characterized in that the steps of the terminal control method are realized when the processor executes the computer program.
The embodiment of the application also provides a terminal. As shown in fig. 13, for convenience of explanation, only the parts related to the embodiments of the present application are shown, and details of the technology are not disclosed, please refer to the method part of the embodiments of the present application. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of sales), a vehicle-mounted computer, a wearable device, and so on, taking the terminal as the mobile phone as an example:
fig. 13 is a block diagram of a partial structure of a mobile phone related to a terminal according to an embodiment of the present application. Referring to fig. 13, the handset includes: radio Frequency (RF) circuitry 1310, memory 1320, input unit 1330, display unit 1340, sensor 1350, audio circuitry 1360, wireless fidelity (WiFi) module 1370, processor 1380, and power supply 1390. Those skilled in the art will appreciate that the handset configuration shown in fig. 13 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The RF circuit 1310 may be used for receiving and transmitting signals during information transmission and reception or during a call, and may receive downlink information from a base station and then process the received downlink information to the processor 1380; the uplink data may also be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 1310 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE)), e-mail, Short Messaging Service (SMS), and the like.
The memory 1320 may be used to store software programs and modules, and the processor 1380 executes various functional applications and terminal control of the cellular phone by operating the software programs and modules stored in the memory 1320. The memory 1320 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as an application program for a sound playing function, an application program for an image playing function, and the like), and the like; the data storage area may store data (such as audio data, an address book, etc.) created according to the use of the mobile phone, and the like. Further, the memory 1320 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 1330 may be used to receive input numeric or character information and generate key signal inputs related to the owner settings and function controls of the cellular phone 1300. Specifically, the input unit 1330 may include an operation panel 1331 and other input devices 1332. The operation panel 1331, which may also be referred to as a touch screen, may collect touch operations by the owner on or near the operation panel 1331 (e.g., operations by the owner on or near the operation panel 1331 using any suitable object or attachment, such as a finger, a stylus, etc.), and drive the corresponding connection device according to a preset program. In one embodiment, the operation panel 1331 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of the owner, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 1380, where the touch controller can receive and execute commands sent by the processor 1380. In addition, the operation panel 1331 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 1330 may include other input devices 1332 in addition to the operation panel 1331. In particular, other input devices 1332 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), and the like.
The display unit 1340 may be used to display information input by or provided to the owner and various menus of the cellular phone. The display unit 1340 may include a display panel 1341. In one embodiment, the Display panel 1341 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment, the operation panel 1331 can cover the display panel 1341, and when the operation panel 1331 detects a touch operation on or near the operation panel 1331, the touch operation can be transmitted to the processor 1380 to determine the type of the touch event, and then the processor 1380 can provide a corresponding visual output on the display panel 1341 according to the type of the touch event. Although in fig. 13, the operation panel 1331 and the display panel 1341 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the operation panel 1331 and the display panel 1341 may be integrated to implement the input and output functions of the mobile phone.
The cell phone 1300 may also include at least one sensor 1350, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 1341 according to the brightness of ambient light, and a distance sensor that turns off the display panel 1341 and/or the backlight when the mobile phone is moved to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the magnitude of acceleration in each direction, the magnitude and the direction of gravity can be detected when the mobile phone is static, and the motion sensor can be used for identifying the application of the gesture of the mobile phone (such as horizontal and vertical screen switching), the vibration identification related functions (such as pedometer and knocking) and the like; the mobile phone may be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor.
The audio circuit 1360, speaker 1361, and microphone 1362 may provide an audio interface between the host and the handset. The audio circuit 1360 may transmit the electrical signal converted from the received audio data to the speaker 1361, and the electrical signal is converted into a sound signal by the speaker 1361 and output; on the other hand, the microphone 1362 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 1360, and then outputs the audio data to the processor 1380 for processing, and then the audio data can be transmitted to another mobile phone through the RF circuit 1310, or the audio data can be output to the memory 1320 for subsequent processing.
WiFi belongs to short distance wireless transmission technology, and the cell-phone can help owner send and receive email, browse the webpage and visit streaming media etc. through WiFi module 1370, and it provides wireless broadband internet access for owner. Although fig. 13 shows a WiFi module 1370, it is to be understood that it does not belong to the essential components of the handset 1300 and may be omitted as needed.
The processor 1380 is a control center of the mobile phone, connects various parts of the entire mobile phone using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 1320 and calling data stored in the memory 1320, thereby performing an overall interception of the mobile phone. In one embodiment, processor 1380 may include one or more processing units. In one embodiment, the processor 1380 may integrate an application processor and a modem, wherein the application processor primarily handles operating systems, main machine interfaces, application programs, and the like; the modem handles primarily wireless communications. It is to be appreciated that the modem need not be integrated within the processor 1380. For example, the processor 1380 may integrate an applications processor with a baseband processor, which may, among other things, constitute a modem with other peripheral chips. The handset 1300 also includes a power supply 1390 (e.g., a battery) to supply power to the various components, which may preferably be logically connected to the processor 1380 via a power management system to manage charging, discharging, and power consumption management functions via the power management system.
In one embodiment, the cell phone 1300 may also include a camera, a bluetooth module, and the like.
In the embodiment of the present application, the processor included in the mobile phone implements the terminal control method described above when executing the computer program stored on the memory.
Any reference to memory, storage, database, or other medium used herein may include non-volatile and/or volatile memory. Suitable non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (12)

1. A terminal control method is applied to a first terminal, and is characterized by comprising the following steps:
acquiring identity information of a current user;
when the identity information is not matched with preset identity information, sending prompt information to a second terminal which communicates with the first terminal; the prompt message is used for indicating the second terminal to execute the operation of whether to trigger the control instruction;
receiving the control instruction fed back by the second terminal, and setting the currently running user mode as a visitor mode according to the control instruction; wherein the content of the first and second substances,
the setting the currently running user mode to the guest mode according to the control instruction comprises:
acquiring a security level mark of an application program currently running in the foreground of the first terminal; the security level indicia comprises: a shared token and a privacy token;
and setting the currently running user mode as the visitor mode according to a preset strategy corresponding to the security level mark.
2. The method of claim 1, wherein before obtaining the identity information of the current user, further comprising:
determining the second terminal associated with the first terminal.
3. The method of claim 2, wherein setting the currently running user mode to the guest mode according to the preset policy corresponding to the security level flag comprises:
calling a mapping relation between the security level mark and a preset strategy;
setting a currently running user mode to a guest mode according to the mapping relationship, wherein,
when the security level mark is a sharing mark, keeping the application program running in the foreground of the first terminal, and setting the currently running user mode to be a visitor mode in the background;
and when the security level mark is a privacy mark, acquiring privacy data of the application program, hiding the privacy data, and setting a currently running user mode as a visitor mode in a background.
4. The method of claim 1, wherein the identity information comprises at least one of fingerprint information, iris information, face information, voiceprint information, and ear print information.
5. A terminal control method is applied to a second terminal, and the working mode of the second terminal comprises a free mode and a monitoring mode; the method comprises the following steps:
receiving prompt information sent by a first terminal communicating with the second terminal; the prompt message is generated according to the identity information of the current user of the second terminal;
acquiring the current working mode of the second terminal according to the prompt message, and executing the operation of triggering a control instruction when the working mode is the monitoring mode, wherein the control instruction is used for indicating the first terminal to execute the operation of setting the currently running user mode as a visitor mode;
and sending the control instruction to the first terminal.
6. The method of claim 5, wherein the performing the operation of triggering the control instruction according to the hint information comprises:
displaying and receiving trigger operation of the host user on the prompt message;
and generating the control instruction according to the trigger operation.
7. The method of claim 5, wherein before receiving the prompt from the first terminal communicating with the second terminal, the method further comprises:
determining the second terminal associated with the first terminal;
detecting distance information between the first terminal and the second terminal;
and when the distance information reaches a preset value, setting the working mode of the second terminal to be a monitoring mode.
8. A terminal control device applied to a first terminal is characterized by comprising:
the acquisition module acquires the identity information of the current user;
the first sending module is used for sending prompt information to a second terminal which communicates with the first terminal when the identity information is not matched with preset identity information; the prompt message is used for indicating the second terminal to execute the operation of whether to trigger the control instruction;
the control module is used for receiving the control instruction fed back by the second terminal and acquiring a security level mark of an application program currently running in the foreground of the first terminal; the security level indicia comprises: a shared token and a privacy token; and setting the currently running user mode as the visitor mode according to a preset strategy corresponding to the security level mark.
9. A terminal control device is applied to a second terminal, and is characterized in that the working mode of the second terminal comprises a free mode and a monitoring mode; the terminal control device includes:
the receiving module is used for receiving prompt information sent by the first terminal which communicates with the second terminal; the prompt message is generated according to the identity information of the current user of the second terminal;
the execution module is used for acquiring the current working mode of the second terminal according to the prompt message, and when the working mode is the monitoring mode, executing the operation of triggering a control instruction, wherein the control instruction is used for indicating the first terminal to execute the setting of the currently running user mode to be the visitor mode;
and the second sending module is used for sending the control instruction to the first terminal.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
11. A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 7 are implemented by the processor when executing the computer program.
12. A terminal control system is characterized by comprising a first terminal and a second terminal;
the first terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any one of claims 1 to 4 when executing the computer program;
the second terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the method according to any of claims 5 to 7 are implemented when the computer program is executed by the processor.
CN201810316545.1A 2018-04-10 2018-04-10 Terminal control method and device, readable storage medium and terminal Expired - Fee Related CN108521494B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810316545.1A CN108521494B (en) 2018-04-10 2018-04-10 Terminal control method and device, readable storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810316545.1A CN108521494B (en) 2018-04-10 2018-04-10 Terminal control method and device, readable storage medium and terminal

Publications (2)

Publication Number Publication Date
CN108521494A CN108521494A (en) 2018-09-11
CN108521494B true CN108521494B (en) 2020-04-14

Family

ID=63431920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810316545.1A Expired - Fee Related CN108521494B (en) 2018-04-10 2018-04-10 Terminal control method and device, readable storage medium and terminal

Country Status (1)

Country Link
CN (1) CN108521494B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800595A (en) * 2018-12-26 2019-05-24 全球能源互联网研究院有限公司 A kind of electric power data sharing method and system
CN109800602B (en) * 2019-01-25 2023-05-16 北京掌汇天下科技有限公司 Privacy protection method, mobile terminal and computer readable storage medium
CN111755011A (en) * 2019-03-11 2020-10-09 深圳市冠旭电子股份有限公司 Sound box control method, device, equipment and readable storage medium
CN110211583B (en) * 2019-05-31 2021-07-16 北京声赫科技有限公司 Voice interaction method and voice interaction equipment based on intelligent line control
CN110782588B (en) * 2019-10-11 2022-01-25 深圳巴斯巴科技发展有限公司 Information prompting method, server and readable storage medium
CN110941864A (en) * 2019-11-12 2020-03-31 维沃移动通信有限公司 Equipment loss prevention method and intelligent wearable equipment
WO2021102856A1 (en) * 2019-11-28 2021-06-03 深圳市大疆创新科技有限公司 Networking control method and device, and storage medium
CN113643707A (en) * 2020-04-23 2021-11-12 华为技术有限公司 Identity verification method and device and electronic equipment
CN114679511A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Operation control method and device and electronic equipment
CN114254359A (en) * 2021-12-22 2022-03-29 展讯通信(上海)有限公司 Initialization method, device, terminal and storage medium
CN114791999A (en) * 2022-04-25 2022-07-26 云丁网络技术(北京)有限公司 Information processing method and system of intelligent terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
KR102254886B1 (en) * 2014-06-30 2021-05-24 엘지전자 주식회사 Mobile terminal and method for controlling external device using the same
CN104809780A (en) * 2015-04-24 2015-07-29 成都腾悦科技有限公司 Access control method based on fingerprint recognition and face recognition
CN106446648A (en) * 2016-08-30 2017-02-22 北京小米移动软件有限公司 Terminal control method and apparatus
CN107862190B (en) * 2017-10-26 2020-01-14 Oppo广东移动通信有限公司 Reminding method and related product

Also Published As

Publication number Publication date
CN108521494A (en) 2018-09-11

Similar Documents

Publication Publication Date Title
CN108521494B (en) Terminal control method and device, readable storage medium and terminal
US11269981B2 (en) Information displaying method for terminal device and terminal device
CN108616652B (en) Data protection method and device, terminal and computer readable storage medium
CN108563932B (en) Application control method and device, readable storage medium and terminal
CN106778175B (en) Interface locking method and device and terminal equipment
CN109716854B (en) Connection establishing method, device, system and medium
CN107395880B (en) Information display method and device and terminal
CN108875394B (en) Electronic device and application program control method
JP2015534405A (en) Terminal lock release processing method, apparatus, terminal apparatus, program, and recording medium
KR20150050732A (en) Method for performing authentication using biometrics information and portable electronic device supporting the same
WO2019196702A1 (en) Private space starting method and apparatus, and storage medium and electronic device
CN106548144B (en) Iris information processing method and device and mobile terminal
CN108629171B (en) Unread message processing method and terminal
CN109062634B (en) Application starting method and mobile terminal
CN110456911B (en) Electronic equipment control method and device, electronic equipment and readable storage medium
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
CN108509788B (en) Information sharing method and device, computer readable storage medium and terminal
CN108632454B (en) Information processing method and device, computer readable storage medium and terminal
TW201826158A (en) Method, Device and Terminal for Displaying Data
CN108549804B (en) Mode switching method and device, computer readable storage medium and terminal
US20190080152A1 (en) Method for collecting facial information and related products
CN108900692B (en) Screen display method and device, electronic equipment and computer readable storage medium
US11461509B2 (en) Screen control method and terminal
CN111124537A (en) Application starting method and electronic equipment
CN108549823B (en) Multi-role using method and device of terminal and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200414

CF01 Termination of patent right due to non-payment of annual fee