Mobile terminal safety control method and apparatus
A security control and mobile terminal technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of low security, mobile terminal information is easy to be stolen by others, etc., and achieve the effect of improving security
Active Publication Date: 2016-02-24
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
4 Cites 3 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The present invention discloses a mobile terminal safety control method and apparatus. The method comprises: when a safety control mode is opened, obtaining the distance between a mobile terminal and an intelligent wearable device; and determining whether the distance between the mobile terminal and the intelligent wearable device is greater than a preset distance, if yes, hiding a preset application in the mobile terminal, otherwise, displaying the preset application on the mobile terminal. According to the method and apparatus disclosed by the present invention, by setting the safety control mode on the mobile terminal and when the safety control mode is opened, the distance between the mobile terminal and the intelligent wearable device is obtained, and when when the distance is greater than the preset distance, a preset application in the mobile terminal is hidden, otherwise, the preset application is displayed on the mobile terminal. According to the method and apparatus disclosed by the present invention, the safety of the mobile terminal is improved, even if the mobile terminal is used by a person not familiar with the terminal, sensitive information such as personal data of a related user in the mobile terminal cannot be obtained.
Application Domain
Digital data protection
Technology Topic
Individual dataComputer science +2
Image
Examples
- Experimental program(4)
Example Embodiment
Example Embodiment
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Malicious website prompt method and router
Owner:TENCENT TECH (SHENZHEN) CO LTD +1
Method, device and system for sending and receiving scheduling user data information
Owner:HUAWEI TECH CO LTD
Credible virtual machine platform
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Intelligent door lock identity authentication method and system, readable storage medium and mobile terminal
Owner:深圳市小石安防科技有限公司
Multiple-factor detection system for aging condition of fuse and assessment method for aging condition
Owner:LINGAO NUCLEAR POWER +2
Classification and recommendation of technical efficacy words
- improve security
Method, device and system used for digesting security policy conflicts
Owner:CHINA TELECOM CORP LTD
Automatic charging system for electric automobile
Owner:WUHAN INSTITUTE OF TECHNOLOGY
Block chain system, and data storage method and apparatus
Owner:ADVANCED NEW TECH CO LTD
Pesticide micro-capsule granules and preparation method thereof
Owner:联合国南通农药剂型开发中心 +1