Mode switching method and system, and terminal

A mode switching and terminal technology, applied in the communication field, can solve problems such as conflicts and personal privacy exposure, and achieve the effects of protecting privacy, reducing risks, and improving user experience

Inactive Publication Date: 2016-05-04
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The more camouflage you set, the more camouflage prompts will pop up. In this way, in some cases, it is easy to cause conflicts with the actual state
For example, if a private call is disguised as an alarm clock, but there is no alarm clock when viewing the alarm clock, it is easy to be seen by people around as a private mode, which will lead to the exposure of personal privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mode switching method and system, and terminal
  • Mode switching method and system, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] see figure 1 , the first embodiment of the technical solution provides a mode switching method, including steps:

[0028] S101. Determine whether the current event to be processed is an event with a privacy attribute.

[0029] The event to be processed may be an event that the terminal currently needs to process. The events with privacy attributes include incoming calls or messages from private contacts, applications and files set as privacy attributes, and the like. For example, an incoming call from a private contact, or a text message or instant message sent by a private contact, or an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mode switching method. The method comprises: whether a current to-be-processed event is an event having a privacy attribute is determined; if so, a current user is shot automatically and a comparison image is obtained; and whether the comparison image information matches preset verified image information is determined; if so, the system enters a privacy mode and the to-be-processed event having the privacy attribute is displayed in a real mode to carry out processing; and if not, the to-be-processed event is displayed by using a disguising way in a common mode. In addition, the invention also provides a mode switching method and a terminal correspondingly. According to the invention, switching of a corresponding operation mode can be realized according to the situation whether a current user is an authorized user, so that the mode switching can be carried out conveniently. The privacy mode can be operated without any disguising under the circumstance that the authorized user is being carried out operation, thereby reducing the risk of privacy exposure.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a mode switching method, system and terminal. Background technique [0002] In order to protect the privacy of users, current Android mobile phones are usually provided with a normal mode and a private mode. When switching from normal mode to private mode, you need to enter a password to verify the user's identity before switching. [0003] In the prior art, when switching from the normal mode to the safe mode, the user usually needs to manually pull up the private mode entry, and then enter the password to enter the private mode, so that operations such as viewing private contacts or viewing private pictures can be performed in the private mode. However, the entrance of the switching mode and the switching operation process are easy to make others find that there is a private mode in your mobile phone, which arouses suspicion of others, which is not conduci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/72448H04M1/72484
Inventor 郭雄伟傅文治
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products