Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User terminal access right control method and user terminal

A technology of access rights and user terminals, applied in the electronic field, can solve problems such as low controllability of user terminals, mistakenly deleting important information, seeing personal private information, etc., to improve security issues and user experience, and improve controllability Effect

Active Publication Date: 2016-03-30
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a friend borrows a user terminal, or a child plays with a user terminal, they may inadvertently see personal privacy information or delete important information by mistake, which makes the controllability of the user terminal low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User terminal access right control method and user terminal
  • User terminal access right control method and user terminal
  • User terminal access right control method and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] The embodiment of the present invention discloses a method for controlling the access authority of a user terminal and the user terminal, which can obtain the corresponding access authority according to the detected biometric information, and determine the executable item corresponding to the access authority, so that the user terminal can execute The operation corresponding to the item can be executed, so that the controllability of the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention disclose a user terminal access right control method and a user terminal. The method comprises: detecting biometric information input for the user terminal; determining whether the biometric information matches with preset biometric information; if the biometric information matches with the preset biometric information, acquiring access rights corresponding to the preset biometric information, wherein the access rights corresponding to different preset biometric information are different; determining executable items corresponding to the access rights; and when receiving an executive instruction for a target executable item in the executable items, executing the target executable item in response to the executive instruction. By implementing the embodiments of the present invention, the corresponding access rights can be acquired according to the input biometric information, thereby improving the controllability of of the user terminal.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a method for controlling the access authority of a user terminal and the user terminal. Background technique [0002] Currently, user terminals such as smart phones and tablet computers have increasingly rich functions, and people rely more and more on them. In the process of using, the user often stores some important information and / or personal privacy information in the user terminal (for example, using the user terminal to make network payment to store the user's account information, etc.), followed by Security issues. It is found in practical applications that most users will protect the user terminal by locking the screen, however, once unlocked, all content in the user terminal can still be accessed. When a friend borrows the user terminal, or a child plays with the user terminal, they may inadvertently see personal private information or delete important inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/6209
Inventor 朱忠磊陈景远
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products