Terminal device control method and device
A technology of terminal equipment and control methods, applied in the direction of digital data authentication, etc., can solve problems affecting user experience, peeping secretly, and having to be seen by others, so as to benefit user experience, improve information security and privacy protection sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] This embodiment proposes a smart phone visitor control method, which can collect user face information in real time, monitor whether the current user is the owner himself and whether other people are peeping when the owner uses the mobile phone, and turn on / off the visitor in time according to the detection results. control functions without being easily noticed by anyone other than the owner.
[0070] In this embodiment, there are 2 states in the mobile phone: an unrestricted state and a restricted state, wherein:
[0071] When the visitor control function of the mobile phone is disabled, the mobile phone has only one state: unlimited state;
[0072] When the visitor control function of the mobile phone is enabled, the mobile phone can switch between the unrestricted state and the restricted state.
[0073] In this embodiment, when the mobile phone is in the unrestricted state, the user's operations on the mobile phone are not restricted; when the mobile phone is in t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 