Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for controlling mobile terminal

A mobile terminal and control method technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as user lockout and operation complexity, and achieve the effects of reducing complexity, ensuring security, and improving user experience

Active Publication Date: 2014-07-16
KENIU NETWORK TECH BEIJING
View PDF3 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The problem with related technologies is that in daily use, users will be repeatedly asked to verify passwords or gestures, which brings great operational complexity and can easily cause users to be locked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling mobile terminal
  • Method and device for controlling mobile terminal
  • Method and device for controlling mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0023] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for controlling a mobile terminal. The method includes acquiring at least one user behavior datum in the mobile terminal; determining at least one user identity corresponding to the user behavior data according to stored judgment rules; controlling the mobile terminal according to the user identities so that the mobile terminal can be in working modes corresponding to the user identities. The mobile terminal has various working modes, and different resources and / or different limits of authority are opened for the mobile terminal in the different working modes. The method and the device in an embodiment of the invention have the advantages that users can automatically acquire the user identities without inputting verification passwords or gestures, accordingly, the operational complexity can be greatly reduced, the problem that users are locked by selves can be solved, and the user experience can be improved.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a control method and device for a mobile terminal. Background technique [0002] When a mobile terminal (such as a smart phone, tablet computer, etc.) is stolen or temporarily lent to others, the user hopes that the private content / privacy application program on the mobile terminal will not be peeped by others. At present, in order to solve the above problems, in related technologies, mobile terminals provide users with application programs that lock private content / private application programs. When accessing private content / privacy applications, such applications will pop up an unlock box to determine whether they are the owner of the mobile terminal by verifying the password or gestures, so as to decide whether to allow access to private content / privacy applications. [0003] The problem with related technologies is that in daily use, the user will be repeate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31
CPCG06F21/316G06F21/1015
Inventor 徐鸣罗亚峰
Owner KENIU NETWORK TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products