Method for managing access of multiple visitors to mobile terminal

A technology for accessing mobile terminals and management methods, applied in branch equipment, electrical components, security devices, etc., can solve problems such as the inability to meet user sharing needs, meet the needs of sharing mobile phone information, enhance user experience, and protect privacy. Effect

Inactive Publication Date: 2012-10-03
SHENZHEN SANG FEI CONSUMER COMM CO LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing technology, the password of the mobile phone only plays a role when the mobile phone is turned on. When the user turns on the mobile phone, all the information can be seen at a glance, which cannot meet the needs of the user to share part of the information in the mobile phone with others.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for managing access of multiple visitors to mobile terminal
  • Method for managing access of multiple visitors to mobile terminal
  • Method for managing access of multiple visitors to mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Such as figure 1 As shown, in an embodiment of a method for managing a multi-visitor access mobile terminal of the present invention, the method includes the following steps:

[0023] S1. Turn on the mobile phone and enter the visitor mode selection interface; S2. Through the preset authentication and identification method, the authentication and identification method can be set to Facebook, gesture or password. Such as figure 2 As shown, if it is set to facebook mode, the system determines whether to allow to enter the master mode by judging the comparison result between the input facebook information and the prestored facebook information; if the input facebook information is the same as the prestored facebook information, Then go to step S3 and enter the master mode; if not the same, turn back to the guest mode selection interface; the system counts the number of errors entered by the user, and when the number of errors entered by the user is greater than the numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for managing the access of multiple visitors to a mobile terminal. The method comprises the following steps of: starting a mobile phone, and entering a visitor mode selection interface; allowing a preset authentication identification mode; entering a host mode; setting an authentication identification mode and authority for the visitors; making a visitor get through the preset authentication identification mode; and displaying functions and interfaces within the access authority of the visitor. According to the method, the privacy of personal mobile phone information can be effectively protected, and the demand of a user on sharing the mobile phone information with others can be met, so that the functions of the mobile phone are enhanced, and the user experience is improved.

Description

technical field [0001] The present invention relates to the field of mobile communication, and more specifically, relates to a management method for multi-visitor access to a mobile terminal. Background technique [0002] In recent years, with the continuous development of mobile communication technology, people rely more and more on mobile phones. Many important personal information will be stored in mobile phones, such as photos, videos and some files. [0003] Privacy is also increasing. But the mobile phone is a very good tool for communicating with others. Sometimes, it is necessary to share some information in the mobile phone with friends. But in the prior art, the password of the mobile phone only plays a role when the mobile phone is turned on. When the user turns on the mobile phone, all the information can be seen at a glance, which cannot satisfy the user's need to share part of the information in the mobile phone with others. Contents of the invention [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04W12/06
Inventor 何明桂殷建飞李胜军王勇欧
Owner SHENZHEN SANG FEI CONSUMER COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products