Multi-user management method of electronic equipment

A technology of electronic equipment and management methods, applied in branch equipment, telephone communication, electrical components, etc., can solve problems such as obvious forms of protection, information stored on mobile phones cannot be viewed by them, and achieve the effect of protecting privacy information.

Inactive Publication Date: 2012-12-19
HUAQIN TECH CO LTD
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this multi-user management method can also achieve the purpose of protecting the owner's private information, the form of protection is too obvious. When others know that the owner's private information is under protection, it will a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user management method of electronic equipment
  • Multi-user management method of electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0010] Example one

[0011] Such as figure 1 As shown, the method for multi-user management of electronic equipment provided in this embodiment performs authentication according to the characters input by the user, and includes steps S1 for creation management and S2 steps for operation execution;

[0012] The steps of S1 for creating management include:

[0013] S111 Create permission groups for applications or files; for example, create three permission groups for FILE, namely: GROUP11, GROUP12, and GROUP13;

[0014] S112 sets the function items included in the authority group; those skilled in the art can understand that the mobile phone applications and files include multiple function items. For example, operations on the file include the following functions: view function FUNC11, edit function FUNC12, new function FUNC13 There are 4 function items in total with the delete function FUNC14. This step sets the authority group GROUP11 to include the new function FUNC13 and the ...

Example Embodiment

[0033] Example two

[0034] Such as figure 2 As shown, the method for multi-user management of electronic equipment provided in this embodiment performs authentication according to an operation mode, and includes steps S1 for creation management and S2 steps for operation execution;

[0035] The step of S1 for creating management includes:

[0036] S211 Create permission groups for applications or files; for example, create three permission groups for SMS application APP, namely: GROUP21 and GROUP22;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-user management method of electronic equipment. The multi-user management method comprises the following steps of: Step 1, creating management, and Step 2, executing an operation, wherein the Step 1 comprises the following steps of: Step 111, creating permission groups of application programs or files; Step 112, setting functional items comprised by the permission groups; and Step 113, setting authentication information corresponding to the permission groups, wherein the authentication information is a code generated by computation according to characters input by a user or a code generated by conversion according to the operation of a user. The multi-user management method of the electronic equipment disclosed by the invention can carry out authentication and permission management in a way of inputting the characters by the user or in a way of operating by the user, so that other users rather than an owner of a mobile phone can use the mobile phone normally but cannot perceive private information that is protected, in this way, the private information of the owner is protected without being perceived.

Description

technical field [0001] The invention relates to electronic communication technology, in particular to information management technology of electronic equipment. Background technique [0002] With the continuous advancement of technology, mobile phones have become a necessity in people's daily life, and a large amount of user information, including personal privacy information, is often stored in the mobile phone. The ensuing problem is that if the mobile phone is viewed by others, personal privacy will be leaked. In the prior art, the method of setting a power-on password is used to prevent others from using the mobile phone, so as to prevent information leakage in the mobile phone. In the prior art, there are still some mobile phones that can provide multi-user management, and support that different users can see different content and use different applications, thereby achieving the purpose of protecting privacy. However, this kind of multi-user management needs to input...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/667
Inventor 伞磊
Owner HUAQIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products