Method and device for terminal detection

A detection method and terminal technology, applied in the direction of digital data authentication, etc., can solve the problems of inability to know, indeterminability, etc.

Inactive Publication Date: 2015-11-25
XIAOMI INC
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the user cannot know whether someone has tried to open the terminal when the terminal is out of the user's line of sight. If the user terminal has not set an unlock password, the peeper can also completel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for terminal detection
  • Method and device for terminal detection
  • Method and device for terminal detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] The exemplary embodiments will be described in detail here, and examples thereof are shown in the accompanying drawings. When the following description refers to the accompanying drawings, unless otherwise indicated, the same numbers in different drawings represent the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present invention. Rather, they are merely examples of devices and methods consistent with some aspects of the present invention as detailed in the appended claims.

[0089] figure 1 It is a flowchart of a terminal detection method according to an exemplary embodiment, such as figure 1 As shown, the terminal detection method includes the following steps.

[0090] In step S101, when an unlocking operation is received in the locked state, the last unlocked recorded image of the current unlock is acquired.

[0091] Among them, the unlocking operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure relates to a method and a device for terminal detection. The method comprises that an unlocking record image previous to unlocking this time is acquired when an unlocking operation is received under a locked state, wherein the previous unlocking record image comprises an image of an operator who conducts the previous unlocking; and the previous unlocking record image is displayed. The previous unlocking record image stored locally is acquired by a terminal when the terminal is under the locked state if an operator inputs the unlocking operation into the terminal, wherein the previous unlocking record image contains the image of the operator who conducts the previous unlocking. The previous unlocking record image is displayed by the terminal, so the operator of the unlocking this time can master information of the operator who conducts the previous unlocking by browsing the previous unlocking record image. In this way, an owner of the terminal can determine whether other persons try to start the terminal when the terminal is separated from a visibility range of the owner.

Description

Technical field [0001] The present disclosure relates to the technical field of mobile equipment, and in particular to a terminal detection method and device. Background technique [0002] At present, with the widespread use of terminals such as mobile phones and tablet computers, more and more users install daily application software on the terminals, such as Alipay, mobile banking and other software, which brings great convenience to users. At the same time, because a variety of privacy-related software is installed on the terminal, users pay special attention to the security of private information in the terminal. [0003] Therefore, users often set an unlocking password for the terminal to avoid that when the terminal leaves the user's line of sight, a peeper who obtains the user terminal can turn on the terminal and browse the user's private information. However, the user cannot know whether anyone has ever tried to turn on the terminal when the terminal is out of the user’s ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 鲍协浩牛坤姜东亚
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products