Terminal use management method, device and mobile terminal based on non-owner user
A management method and non-owner technology, which is applied in the field of terminal use management methods, devices and mobile terminals based on non-owner users, and can solve terminal privacy issues and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] Please refer to figure 1 , figure 1 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 1 of the present invention. Specifically, this embodiment provides a method for managing terminal use based on non-owner users, the method including the following steps:
[0046] Step 101. Record the personal information and the preset password input by the non-owner user and save it in the database, wherein the personal information and the preset password are correlated with each other.
[0047] In practical applications, when the non-owner user borrows the terminal of the owner user for the first time, he needs to enter the unlock password set by the owner user. After the unlocking is completed, the terminal will provide an input interface through which the non-owner user can Input the personal information and a preset password, wherein the personal information includes at least one of name, mobile phone number, WeChat ID,...
Embodiment 2
[0054] Please refer to figure 2 , figure 2 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 2 of the present invention. This embodiment is basically the same as Embodiment 1, the difference is that in this embodiment, the method further includes the following steps:
[0055] Step 201, the operation of the main user of the receiver classifies the attribute categories of the personal information, wherein the attributes include the first attribute and the second attribute;
[0056] Step 202: Establish an application program usage mechanism corresponding to the personal information according to the classification result of the attribute category.
[0057] Wherein, on the interface where the personal information is located in the terminal, there will be displayed the attribute classification function for the personal information, after enabling this function, two setting options will be displayed, namely the first att...
Embodiment 3
[0062] Please refer to image 3 , image 3 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 3 of the present invention. This embodiment is basically the same as Embodiment 1, the difference is that in this embodiment, the method further includes the following steps:
[0063] Step 301, the operation of the main user of the receiver classifies the attribute categories of the personal information, wherein the attributes include the first attribute and the second attribute;
[0064] Step 302: Establish a terminal photo album usage mechanism corresponding to the personal information according to the classification result of the attribute category.
[0065] In this embodiment, the working principle of step 301 is the same as that of step 201 in the second embodiment, which will be described here.
[0066] In this embodiment, the establishment of the terminal photo album usage mechanism corresponding to the personal info...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



