Check patentability & draft patents in minutes with Patsnap Eureka AI!

Terminal use management method, device and mobile terminal based on non-owner user

A management method and non-owner technology, which is applied in the field of terminal use management methods, devices and mobile terminals based on non-owner users, and can solve terminal privacy issues and other issues

Active Publication Date: 2018-02-16
深圳大数信科技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above situation, in order to overcome the shortcomings of the existing technology, the embodiment of the present invention provides a terminal use management method, device and mobile terminal based on the non-owner user, which can effectively solve the problem that the non-owner user uses the owner user multiple times. The cumbersome problems caused by the need to repeatedly input the unlock password set by the owner user at the terminal, and the terminal privacy issues caused by the owner user having different confidentiality requirements for different borrowers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal use management method, device and mobile terminal based on non-owner user
  • Terminal use management method, device and mobile terminal based on non-owner user
  • Terminal use management method, device and mobile terminal based on non-owner user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Please refer to figure 1 , figure 1 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 1 of the present invention. Specifically, this embodiment provides a method for managing terminal use based on non-owner users, the method including the following steps:

[0046] Step 101. Record the personal information and the preset password input by the non-owner user and save it in the database, wherein the personal information and the preset password are correlated with each other.

[0047] In practical applications, when the non-owner user borrows the terminal of the owner user for the first time, he needs to enter the unlock password set by the owner user. After the unlocking is completed, the terminal will provide an input interface through which the non-owner user can Input the personal information and a preset password, wherein the personal information includes at least one of name, mobile phone number, WeChat ID,...

Embodiment 2

[0054] Please refer to figure 2 , figure 2 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 2 of the present invention. This embodiment is basically the same as Embodiment 1, the difference is that in this embodiment, the method further includes the following steps:

[0055] Step 201, the operation of the main user of the receiver classifies the attribute categories of the personal information, wherein the attributes include the first attribute and the second attribute;

[0056] Step 202: Establish an application program usage mechanism corresponding to the personal information according to the classification result of the attribute category.

[0057] Wherein, on the interface where the personal information is located in the terminal, there will be displayed the attribute classification function for the personal information, after enabling this function, two setting options will be displayed, namely the first att...

Embodiment 3

[0062] Please refer to image 3 , image 3 It is a schematic flowchart of a non-owner user-based terminal usage management method provided by Embodiment 3 of the present invention. This embodiment is basically the same as Embodiment 1, the difference is that in this embodiment, the method further includes the following steps:

[0063] Step 301, the operation of the main user of the receiver classifies the attribute categories of the personal information, wherein the attributes include the first attribute and the second attribute;

[0064] Step 302: Establish a terminal photo album usage mechanism corresponding to the personal information according to the classification result of the attribute category.

[0065] In this embodiment, the working principle of step 301 is the same as that of step 201 in the second embodiment, which will be described here.

[0066] In this embodiment, the establishment of the terminal photo album usage mechanism corresponding to the personal info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A terminal use management method, device and mobile terminal based on non-owner users, wherein the method includes: recording personal information and preset passwords input by non-owner users and saving them in a database, wherein the personal information is related to the The preset passwords are related to each other; the operation of the main user of the receiver retrieves the personal information from the database and sets its use authority, wherein the setting of use authority includes: allowing or denying the said personal information associated with the said personal information The preset password is used as the setting of the terminal unlocking password; according to the setting result of the personal information use authority, the preset password associated with it is processed, wherein the processing method is to use the preset password as the terminal unlocking password and Ignore the preset password.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a non-owner user-based terminal use management method, device and mobile terminal. Background technique [0002] With the development of society and the advancement of technology, mobile terminals have become an important part of people's lives. When people use the terminal, in order to achieve the effect of confidentiality, they usually lock the screen during standby, and users need to enter the unlock password to unlock it. , the unlock password is set by the owner himself. However, in some occasions, such as homes or gathering places, friends or family members will borrow the owner’s terminal to use it. When using it, it is necessary to ask the owner for the unlock password and enter it to complete the unlock before entering the terminal desktop. Since the unlock password is not It is set for non-owner users, so they are not familiar with the password. When the ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/62
Inventor 姜华
Owner 深圳大数信科技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More