Mobile terminal operation method and mobile terminal

A technology of mobile terminal and operation method, applied in the direction of instruments, digital data authentication, electronic digital data processing, etc., can solve the problem of making privacy public and achieve the effect of protecting privacy

Inactive Publication Date: 2017-02-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although some existing mobile phones require the unlock password of the lock screen to enter the desktop of the mobile phone, in many cases, the other party actively asks the user to unlock the mobile phone, which will also put the user in an embarrassing situation of making the privacy of the mobile phone public

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal operation method and mobile terminal
  • Mobile terminal operation method and mobile terminal
  • Mobile terminal operation method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Embodiments of the present invention provide a method for operating a mobile terminal and the mobile terminal, which are used to prevent others from viewing private data of a user in the mobile terminal.

[0061] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0062]The terms "comprising" and "having" and any variations thereof in the description and claims of the present inventi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention disclose a mobile terminal operation method and a mobile terminal. The operating system of the mobile terminal comprises a guest mode and a master mode. The method disclosed by the embodiments of the present invention comprises: receiving an operation to a lock screen interface of the mobile terminal; when it is determined that the operation is a first operation, entering the guest mode of the operating system of the mobile terminal; and when it is determined that the operation is a second operation, entering the master mode of the operating system of the mobile terminal, wherein the first operation is different from the second operation, and in the guest mode, preset data is not displayed in the operating system. According to the mobile terminal operation method and the mobile terminal disclosed by the embodiments of the present invention, that privacy data of a user is viewed in the mobile terminal by others can be avoided.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a method for operating a mobile terminal and the mobile terminal. Background technique [0002] But in the current Internet age, the relationship between mobile phones and users has become increasingly close. In life, mobile phones and people have formed an almost inseparable relationship. People will do all sorts of things with their phones. For example, users can access some social networking sites or APPs anytime and anywhere through their mobile phones; the photo album in the mobile phone can record the bits and pieces of people's lives, and so on. [0003] However, in the course of daily use, other people may need to borrow the user's mobile phone to use it, but the user does not want the information about personal privacy stored in the mobile phone to be seen by others, such as the information of contacts in the user's mobile phone, call information, etc....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/62
CPCG06F21/31G06F21/6245
Inventor 印缘李靖栾磊江平
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products