Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal use management method and device based on non-owner user and mobile terminal

A management method and a non-host technology, applied to devices and mobile terminals, based on the field of terminal usage management methods for non-host users, which can solve problems such as terminal privacy issues

Active Publication Date: 2015-08-12
深圳大数信科技术有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above situation, in order to overcome the shortcomings of the existing technology, the embodiment of the present invention provides a terminal use management method, device and mobile terminal based on the non-owner user, which can effectively solve the problem that the non-owner user uses the owner user multiple times. The cumbersome problems caused by the need to repeatedly input the unlock password set by the owner user at the terminal, and the terminal privacy issues caused by the owner user having different confidentiality requirements for different borrowers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal use management method and device based on non-owner user and mobile terminal
  • Terminal use management method and device based on non-owner user and mobile terminal
  • Terminal use management method and device based on non-owner user and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Please refer to figure 1 , figure 1 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 1 of the present invention. Specifically, this embodiment provides a method for managing terminal use based on non-owner users, the method including the following steps:

[0045] Step 101. Record the personal information and the preset password input by the non-owner user and save it in the database, wherein the personal information and the preset password are correlated with each other.

[0046] In practical applications, when the non-owner user borrows the terminal of the owner user for the first time, he needs to enter the unlock password set by the owner user. After the unlocking is completed, the terminal will provide an input interface through which the non-owner user can Input the personal information and a preset password, wherein the personal information includes at least one of name, mobile phone number, WeChat ID,...

Embodiment 2

[0053] Please refer to figure 2 , figure 2 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 2 of the present invention. This embodiment is basically the same as Embodiment 1, the difference is that in this embodiment, the method further includes the following steps:

[0054] Step 201, the operation of the main user of the receiver classifies the attribute categories of the personal information, wherein the attributes include the first attribute and the second attribute;

[0055] Step 202: Establish an application program usage mechanism corresponding to the personal information according to the classification result of the attribute category.

[0056] Wherein, on the interface where the personal information is located in the terminal, there will be displayed the attribute classification function for the personal information, after enabling this function, two setting options will be displayed, namely the first att...

Embodiment 3

[0061] Please refer to image 3 , image 3 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 3 of the present invention. This embodiment is basically the same as Embodiment 1, the difference is that in this embodiment, the method further includes the following steps:

[0062] Step 301, the operation of the main user of the receiver classifies the attribute categories of the personal information, wherein the attributes include the first attribute and the second attribute;

[0063] Step 302: Establish a terminal photo album usage mechanism corresponding to the personal information according to the classification result of the attribute category.

[0064] In this embodiment, the working principle of step 301 is the same as that of step 201 in the second embodiment, which will be described here.

[0065] In this embodiment, the establishment of the terminal photo album usage mechanism corresponding to the personal info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal use management method and device based on a non-owner user and a mobile terminal. The method comprises the following steps: recording personal information and a preset password input by the non-owner user and saving the personal information and the preset password in a database, wherein the personal information is correlated with the preset password; receiving the operation of an owner user, calling the personal information from the database and setting the use permission of the personal information, wherein setting of the use permission comprises: permitting or forbidding the setting of taking the preset password correlated with the personal information as a terminal unlocking sub-password; and processing the preset password correlated with the personal information according to the setting result of the personal information use permission, wherein the processing way is to take the preset password as the terminal unlocking sub-password and ignore the preset password.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a non-owner user-based terminal use management method, device and mobile terminal. Background technique [0002] With the development of society and the advancement of technology, mobile terminals have become an important part of people's lives. When people use the terminal, in order to achieve the effect of confidentiality, they usually lock the screen during standby, and users need to enter the unlock password to unlock it. , the unlock password is set by the owner himself. However, in some occasions, such as homes or gathering places, friends or family members will borrow the owner’s terminal to use it. When using it, it is necessary to ask the owner for the unlock password and enter it to complete the unlock before entering the terminal desktop. Since the unlock password is not It is set for non-owner users, so they are not familiar with the password. When the t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/62
Inventor 林俊佑葛传勇
Owner 深圳大数信科技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More