Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal control method and device

A mobile terminal and user technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as user lockout and operational complexity, and achieve the effect of reducing complexity, ensuring security, and improving user experience.

Active Publication Date: 2017-11-07
KENIU NETWORK TECH BEIJING
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The problem with related technologies is that in daily use, users will be repeatedly asked to verify passwords or gestures, which brings great operational complexity and can easily cause users to be locked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal control method and device
  • Mobile terminal control method and device
  • Mobile terminal control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0023] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a control method and device for a mobile terminal. The method includes: acquiring at least one user behavior data in a mobile terminal; determining a user identity corresponding to at least one user behavior data according to a pre-stored judgment rule; and controlling the mobile terminal to enter a working mode corresponding to the user identity according to the user identity, wherein the mobile The terminal has multiple working modes, and the mobile terminal opens different resources and / or different permissions in different working modes. The method of the embodiment of the present invention can automatically obtain the user identity without the user inputting a verification password or gesture, which greatly reduces the complexity of the operation, avoids the problem that the user is locked by himself, and improves the user experience.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a control method and device for a mobile terminal. Background technique [0002] When a mobile terminal (such as a smart phone, tablet computer, etc.) is stolen or temporarily lent to others, the user hopes that the private content / privacy application program on the mobile terminal will not be peeped by others. At present, in order to solve the above problems, in related technologies, mobile terminals provide users with application programs that lock private content / private application programs. When accessing private content / privacy applications, such applications will pop up an unlock box to determine whether they are the owner of the mobile terminal by verifying the password or gestures, so as to decide whether to allow access to private content / privacy applications. [0003] The problem with related technologies is that in daily use, the user will be repeate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/316G06F21/1015
Inventor 徐鸣罗亚峰
Owner KENIU NETWORK TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products