CN108268763A - terminal control method, device, storage medium and terminal - Google Patents

terminal control method, device, storage medium and terminal Download PDF

Info

Publication number
CN108268763A
CN108268763A CN201810150261.XA CN201810150261A CN108268763A CN 108268763 A CN108268763 A CN 108268763A CN 201810150261 A CN201810150261 A CN 201810150261A CN 108268763 A CN108268763 A CN 108268763A
Authority
CN
China
Prior art keywords
unlocking information
information
unlocking
user
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810150261.XA
Other languages
Chinese (zh)
Inventor
陆智弘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810150261.XA priority Critical patent/CN108268763A/en
Publication of CN108268763A publication Critical patent/CN108268763A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the present application discloses a kind of terminal control method, device, storage medium and terminal, and this method includes:Unlocking information input by user is received first;Then judge whether the unlocking information is correct;If the last unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.The terminal control scheme provided in the embodiment of the present application can realize that user is entered by different passwords in different mode, improve the safety of user data.

Description

Terminal control method, device, storage medium and terminal
Technical field
The invention relates to mobile terminal applied technical field more particularly to terminal control method, device, storage Jie Matter and terminal.
Background technology
With the development of electronic apparatus application technology, more and more application programs are mounted in mobile terminal.But it uses When borrowing mobile phone to other people, other people can check all information in application at family, and secure user data is relatively low.
Invention content
The purpose of the embodiment of the present application is to provide a kind of terminal control method, device, storage medium and terminal, can improve Secure user data.
In a first aspect, the embodiment of the present application provides a kind of terminal control method, including:
Receive unlocking information input by user;
Judge whether the unlocking information is correct;
If the unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.
Second aspect, the embodiment of the present application provide a kind of terminal control mechanism, including:
Receiving module, for receiving unlocking information input by user;
Judgment module, for judging whether the unlocking information that the receiving module receives is correct;
Handover module, if judging that the unlocking information is correct for the judgment module, into the unlocking information Corresponding operational mode;
Unlocked state, for unlocking the terminal.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence realizes the terminal control method as shown in first aspect when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of terminal, and including memory, processor and storage are on a memory And the computer program that can be run in processor, the processor are realized when performing the computer program as shown in first aspect Terminal control method.
The terminal control scheme provided in the embodiment of the present application, receives unlocking information input by user first;Secondly, judge Whether the unlocking information is correct;Again, if the unlocking information is correct, into the corresponding operational mode of unlocking information, Terminal is unlocked, can corresponding terminal be configured according to different unlocking informations, realize that user is entered not by different passwords With the safety in pattern, improving user data.
Description of the drawings
Fig. 1 is a kind of flow diagram of terminal control method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another terminal control method provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another terminal control method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another terminal control method provided by the embodiments of the present application;
Fig. 5 is a kind of structure diagram of terminal control mechanism provided by the embodiments of the present application;
Fig. 6 is a kind of structure diagram of mobile terminal provided by the embodiments of the present application.
Specific embodiment
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is appreciated that It is that specific embodiment described herein is used only for explaining the application rather than the restriction to the application.It further needs exist for illustrating , part relevant with the application rather than entire infrastructure are illustrated only for ease of description, in attached drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing described as flow chart or method.Although each step is described as the processing of sequence, many of which by flow chart Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation The processing can be terminated during completion, it is also possible to have the additional step being not included in attached drawing.The processing can be with Corresponding to method, function, regulation, subroutine, subprogram etc..
With the development of electronic apparatus application technology, more and more application programs are mounted in mobile terminal.But it uses When borrowing mobile phone to other people, other people can see all information in user mobile phone, lead to secure user data at family Property is relatively low.And user, if carrying out the switching of different accounts, needs to jump to login circle when managing the multiple accounts of oneself Face, and user name and password are inputted in log-in interface, then switch over.Therefore, it is traditional using different accounts and close When code logs in different accounts, different accounts has different permissions, need to input in switch accounts different accounts and Password.Therefore traditional operation is comparatively laborious, is unfavorable for being switched fast and secret protection.
The embodiment of the present application provides a kind of terminal control scheme, can be determined according to unlocking screen password input by user The corresponding operating mode of password omits the step of user inputs user name, and realization is switched fast.Meanwhile the multiple unlocks of setting are close Code, and the corresponding systematic parameter of each unlocking pin is configured, it realizes in non-owner in use, other users can not be seen The data of whole primary users improve personal secrets.Concrete scheme is as follows:
Fig. 1 be terminal control provided by the embodiments of the present application flow diagram, this method for terminal by screen into The situation of row unlock, this method can be performed by the mobile terminal with display screen, and wherein display screen can be touch screen, such as Capacitive touch screen or voltage-type touch screen, the mobile terminal can be tablet computer, wearable device, laptop etc., This method specifically comprises the following steps:
Step 110 receives unlocking information input by user.
After mobile terminal locking, when user lights mobile terminal screen again, unlock interface is shown.User is on unlock circle Unlocking information is inputted in face to be unlocked.The data format of unlocking information is related with unlock form.Optionally, user's input is received Unlocked by fingerprint information, face unlocking information, iris unlocking information, at least one in gesture unlocking information and text unlocking information It is a.
Unlocked by fingerprint information is obtained by fingerprint sensor, when the substance with texture such as finger is placed on fingerprint by user When on sensor, fingerprint sensor obtains texture information, and sends this information to processor.It can be obtained by front camera The facial image at family is taken, after analysis extraction characteristic point is carried out to facial image, obtains face unlocking information.Front camera is also The iris unlocking information of user can be obtained, if extraction iris unlocking information, by screen display prompt focus point, when with Front camera obtains iris unlocking information when focus point is watched at family.Gesture unlocking information can show that figure unlocks boundary for terminal Face such as sets the unlock interface of 9 coordinate points, and user inputs the figure of connection coordinate points, by the corresponding coordinate points of the figure Sequence is as gesture unlocking information.Text unlocking information is Arabic numerals sequence input by user, and the length of the sequence can be with It is 4-8, preferably 6.It can be unlocked, can also be carried out by unlocking manner in one by a variety of unlocking manners simultaneously Unlock.
Step 120 judges whether unlocking information is correct.
It, should according to the type search of unlocking information when obtaining unlocking information since the type of unlocking information is different The corresponding unlocking pin of type.If unlocking information is matched with unlocking pin, judge that unlocking information is correct.
Optionally, user can be set is unlocked by a kind of unlocking manner, at this time after unlocking information is obtained, will be solved Lock information is compared with default unlocking pin, judges that unlocking information is correct if matching.
If step 130, unlocking information are correct, into the corresponding operational mode of unlocking information, terminal is unlocked.If solution Lock information mistake then returns and performs step 110.
Operational mode can be determined according to the setting of user, can also be set by system default.Optionally, operational mode packet Personal pattern can also be included and borrow pattern by including operating mode and life pattern or operational mode.Operating mode and life Pattern can be unlocked by different unlocking manners and can also be unlocked by identical unlocking manner.For example, operating mode is using close Code unlocking information unlock, life pattern are unlocked using unlocked by fingerprint information.In another example operating mode and life pattern are using close Code unlocking information unlock, corresponding unlocking pin is different with life pattern for the corresponding unlocking pin of operating mode.
Further, according to operational mode to the sensor of terminal, internetwork connection mode, memory space, using power At least one of limit and data access are configured.
The corresponding terminal configuration of different operational modes is not quite similar.Wherein sensor includes acceleration transducer, photosensitive Sensor, motion sensor and wireless signal sensors etc..The biography started in certain operational mode is included in the configuration of sensor The sensor of sensor and disabling.
Internetwork connection mode includes wireless fidelity network (WIFI), Bluetooth signal, wireless near field communication (Near Field Communication, NFC), infrared signal and mobile cellular network.Certain operation is included in the configuration of internetwork connection mode Allow the internetwork connection mode of communication and the internetwork connection mode of disabling in pattern.
Memory space includes the capacity of workable memory space, and memory space includes buffer memory space.It is empty to storage Between configuration be included in the size of the address area of workable memory space and memory space under certain operational mode.
Include the startup permission of application program using permission and call permission.To the configuration packet of application access right It includes, the application that acquiescence in certain operational mode is shown in desktop, the i.e. bootable application of user is configured.
Data access includes the access of primary user's individual privacy data and the access of non-private data.Data access is set It puts including the hiding display to the chat record of primary user, contact person and picture and the spy for forbidding calling primary user's selection Determine contact person etc..
The terminal control method provided in the embodiment of the present application receives unlocking information input by user first;Secondly, judge Whether the unlocking information is correct;Again, then terminal is unlocked into the corresponding operational mode of unlocking information, it can be according to difference Unlocking information, corresponding terminal is configured.It, can after other users unlock relative to a unlocking pin is only set in the relevant technologies Check that userspersonal information compares, the embodiment of the present application can realize that user is entered by different passwords in different mode, And after the other users of non-master user are using the unlocking pin unlock of non-master user, terminal can shield primary user's personal information, Improve the safety of user data.It is switched over, improved between multiple operational modes by unlocking pin meanwhile, it is capable to realize Switch speed between each operational mode.
Fig. 2 be another terminal control method provided in this embodiment flow diagram, as above-described embodiment into One step explanation, including:
Step 210 receives unlocking information input by user.
Step 220 obtains the corresponding password type of unlocking information.
The hardware module for receiving unlocking information is corresponding with password type, therefore, can determine according to hardware module mark close Code type.For example, the unlocking information for passing through touch screen input is text unlocking information or gesture unlocking information.Pass through fingerprint sensing The unlocking information that device obtains is finger print information.
Step 230 obtains the corresponding default unlocking pin of password type.
Read the pre-set default unlocking pin corresponding with password type of user.
Illustratively, the first finger print information of setting (such as left index finger) is the default unlocking pin of personal pattern.Setting the Default unlocking pin of two finger print informations (such as right hand forefinger or left hand middle finger) as borrow pattern.Believe when obtaining unlocked by fingerprint During breath, unlocking pin is preset with above-mentioned two respectively and be compared, judge whether matched unlocking pin.
Illustratively, setting first gesture unlocking information is the default unlocking pin of operating mode.First iris solution is set Lock information is the default unlocking pin of life pattern.If the gesture unlocking information received and first gesture unlocking information Match, it is determined that into operating mode.If the iris information obtained all is matched with the first iris unlocking information slash, it is determined that enters life Pattern living.
Step 240 judges whether unlocking information matches with default unlocking pin.
If unlocking information is matched with default unlocking pin, step 250 is performed.If unlocking information and default unlock are close Code mismatches, and performs step 270.
If step 250, unlocking information are matched with default unlocking pin, unlocking information is correct.If unlocking information with Default unlocking pin mismatches, then unlocking information mistake.During unlocking information mistake, return and perform step 210.
If step 260, unlocking information are correct, into the corresponding operational mode of unlocking information, and terminal is unlocked.
Terminal control method provided in this embodiment can obtain the corresponding password type of unlocking information, and according to password Type determines to preset unlocking pin accordingly, realize according to same type of unlocking information determine different operational modes and Different operational modes is determined according to different types of unlocking information, improves ease for use.
Fig. 3 be another terminal control method provided in this embodiment flow diagram, as above-described embodiment into One step illustrates that operational mode includes personal pattern and borrows pattern, and this method includes:
Step 310 receives unlocking information input by user.
Step 320 judges whether unlocking information is correct.
If step 330, unlocking information are correct, face information is obtained.
Face information can be the face characteristic information that must be beaten after being scanned to facial image.
Step 340 judges whether face information is primary user.
The face characteristic information of primary user is stored in advance.The face characteristic letter of active user is got in step 330 After breath, matched with the face characteristic information of pre-stored primary user.If successful match, active user is primary Family.If it fails to match, active user is non-master user.
If step 350, face information are primary user, enter personal pattern.
If step 360, face information are non-master user, into borrow pattern, the personal data of primary user are hidden.
Further, shielding shows instant messaging chat message or shields the payment accounts and payment cipher of primary user.
When entering borrow pattern, the account in instant chat application and shopping application can be nullified, and then make non-master Other people of user can not check the chat content of primary user, can not also be consumed using user account.
Step 370, unlock terminal.
The method of terminal control provided by the embodiments of the present application can be obtained when carrying out text unlock or unlocked by fingerprint The face information of active user.Determined whether according to face information for primary user, and then non-master user is avoided to be solved using primary user The security risk that lock cipher operation mobile terminal generates, further improves safety.
Fig. 4 be another terminal control method provided in this embodiment flow diagram, as above-described embodiment into One step illustrates that operational mode includes personal pattern and borrows pattern, and this method includes:
Step 410 receives unlocking information input by user.
Step 420 judges whether unlocking information is correct.
If step 430, unlocking information are correct, if unlocking information is matched with working password, into operating mode, Unlock terminal.
If step 440, unlocking information and life password match into life pattern, unlock terminal.
Wherein, operating mode is different using permission from life pattern.
For example, the startup of the applications such as Entertainment should be reduced during work, therefore the shielding display game in operating mode Using the application icon of, entertainment applications and shopping application.Or display above application icon do not allow users to visit still or Start above application.
In addition, setting operating mode is mute or vibrating mode, so that user is after mobile phone is unlocked, do not need to again to sound Sound is configured.The setting of further sound can include the setting of the tinkle of bells sound size and ringing-type.
The application icon of game application, entertainment applications and shopping application can be shown in life pattern, and allows user It accesses.
Terminal control method provided by the embodiments of the present application, can in operating mode and life pattern to application program with And sound is configured, and realizes the mobile terminal that different operational modes are unlocked by different unlocking pins, simplifies user setting Operation improves the service efficiency of mobile terminal.
Fig. 5 is a kind of structure diagram of terminal control mechanism provided by the embodiments of the present application.As shown in figure 5, the device Including:Receiving module 510, judgment module 520, handover module 530 and unlocked state 540.
Receiving module 510, for receiving unlocking information input by user;
Judgment module 520, for judging whether the unlocking information that the receiving module 510 receives is correct;
Handover module 530, if judging that the unlocking information is correct for the judgment module 520, into the solution The corresponding operational mode of lock information;
Unlocked state 540, for unlocking the terminal.
Further, judgment module 520 is used for:
Obtain the corresponding password type of the unlocking information;
Obtain the corresponding default unlocking pin of the password type;
Judge whether the unlocking information matches with the default unlocking pin;
If the unlocking information is matched with the default unlocking pin, the unlocking information is correct;
If the unlocking information is mismatched with the default unlocking pin, the unlocking information mistake.
Further, the operational mode includes personal pattern and borrows pattern, correspondingly, the handover module 530 is used In:
Obtain face information;
Judge whether the face information is primary user;
If the face information is primary user, enter personal pattern;
If the face information is non-master user, into borrow pattern, the personal data of the primary user are hidden.
Further, the handover module 530 is used for:
Shielding shows the payment accounts and payment cipher of instant messaging chat message or the shielding primary user.
Further, the operational mode includes operating mode and life pattern, correspondingly, the handover module 530 is used In:If the unlocking information is matched with working password, into operating mode;
If the unlocking information and life password match, into life pattern;The operating mode and the life Pattern using permission difference.
Further, the handover module 530 is used for:
Obtain the configuration information of the corresponding operational mode of the unlocking information;
According to the configuration information to the sensor of terminal, internetwork connection mode, memory space, using permission sum number It is configured according at least one of access.
Further, the receiving module 510 is used for:
Receive unlocked by fingerprint information input by user, face unlocking information, iris unlocking information, gesture unlocking information and text At least one of this unlocking information.
The terminal control mechanism provided in the embodiment of the present application, first receiving module 510 receive unlock letter input by user Breath;Secondly, judgment module 520 judges whether the unlocking information is correct;Again, if the judgment module 520 judge it is described Unlocking information is correct, then handover module 530 enters the corresponding operational mode of the unlocking information, and unlocked state 540 unlocks described Corresponding terminal can be configured according to different unlocking informations in terminal.Relative to only being set in the relevant technologies, a unlock is close Code can check that userspersonal information compares after other users unlock, and it is different close that the embodiment of the present application can realize that user passes through After code is entered in different mode, and the other users of non-master user are using the unlocking pin unlock of non-master user, terminal can be with Primary user's personal information is shielded, improves the safety of user data.Meanwhile, it is capable to it realizes through unlocking pin in multiple operation moulds It is switched between formula, improves the switch speed between each operational mode.
Above device can perform the method that the aforementioned all embodiments of the application are provided, and it is corresponding to have the execution above method Function module and advantageous effect.The not technical detail of detailed description in the present embodiment, reference can be made to the aforementioned all implementations of the application The method that example is provided.
Fig. 6 is the structure diagram of another terminal device provided by the embodiments of the present application.As shown in fig. 6, the terminal can To include:Housing (not shown), memory 601, central processing unit (Central Processing Unit, CPU) 602 (also known as processor, hereinafter referred to as CPU), the computer program that is stored on memory 601 and can be run on processor 602, Circuit board (not shown) and power circuit (not shown).The circuit board is placed in the space that the housing surrounds Portion;The CPU602 and the memory 601 are arranged on the circuit board;The power circuit, for for the terminal Each circuit or device power supply;The memory 601, for storing executable program code;The CPU602 is by reading The executable program code that is stored in memory 601 is stated to run program corresponding with the executable program code.
The terminal further includes:Peripheral Interface 603, RF (Radio Frequency, radio frequency) circuit 605, voicefrequency circuit 606th, loud speaker 611, power management chip 608, input/output (I/O) subsystem 609, touch screen 612, other input/controls Equipment 610 and outside port 604, these components are communicated by one or more communication bus or signal wire 607.
It should be understood that graphic terminal 600 is only an example of terminal, and terminal device 600 can be with With than more or less components shown in figure, two or more components can be combined or can be had Different component configurations.Various parts shown in figure can be including one or more signal processings and/or special integrated Hardware, software including circuit are realized in the combination of hardware and software.
Below just a kind of terminal device provided in this embodiment be described in detail, the terminal device using smart mobile phone as Example.
Memory 601, the memory 601 can be by access such as CPU602, Peripheral Interfaces 603, and the memory 601 can To include high-speed random access memory, nonvolatile memory can also be included, such as one or more disk memory, Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU602 and deposited by Peripheral Interface 603, the Peripheral Interface 603 Reservoir 601.
I/O subsystems 609, the I/O subsystems 609 can be by the input/output peripherals in equipment, such as touch screen 612 With other input/control devicess 610, it is connected to Peripheral Interface 603.I/O subsystems 609 can include 6091 He of display controller For controlling one or more input controllers 6092 of other input/control devicess 610.Wherein, one or more input controls Device 6092 processed receives electric signal from other input/control devicess 610 or sends electric signal to other input/control devicess 610, Other input/control devicess 610 can include physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour Vertical pole clicks idler wheel.What deserves to be explained is input controller 6092 can with it is following any one connect:Keyboard, infrared port, The indicating equipment of USB interface and such as mouse.
Wherein, according to the operation principle of touch screen and transmission information medium classification, touch screen 612 can be resistance-type, Capacitor induction type, infrared-type or surface acoustic wave type.Classify according to mounting means, touch screen 612 can be:It is external hanging type, built-in Formula or monoblock type.Classify according to technical principle, touch screen 612 can be:Vector pressure sensing technology touch screen, resistive technologies are touched Touch screen, capacitance technology touch screen, infrared technology touch screen or surface acoustic wave technique touch screen.
Touch screen 612, the touch screen 612 are the input interface and output interface between user terminal and user, can User is shown to depending on output, visual output can include figure, text, icon, video etc..Optionally, touch screen 612 is by user The electric signal (electric signal of such as contact surface) triggered on touch screen curtain, is sent to processor 602.
Display controller 6091 in I/O subsystems 609 receives electric signal from touch screen 612 or is sent out to touch screen 612 Electric signals.Touch screen 612 detects the contact on touch screen, and the contact detected is converted to and shown by display controller 6091 The interaction of user interface object on touch screen 612, that is, realize human-computer interaction, the user interface being shown on touch screen 612 Icon that object can be the icon of running game, be networked to corresponding network etc..What deserves to be explained is equipment can also include light Mouse, light mouse are the extensions for not showing the touch sensitive surface visually exported or the touch sensitive surface formed by touch screen.
RF circuits 605 are mainly used for establishing the communication of intelligent sound box and wireless network (i.e. network side), realize intelligent sound box Data receiver and transmission with wireless network.Such as transmitting-receiving short message, Email etc..
Voicefrequency circuit 606 is mainly used for receiving audio data from Peripheral Interface 603, which is converted to telecommunications Number, and the electric signal is sent to loud speaker 611.
Loud speaker 611 for the voice signal for receiving intelligent sound box from wireless network by RF circuits 605, is reduced to Sound simultaneously plays the sound to user.
Power management chip 608, the hardware for being connected by CPU602, I/O subsystem and Peripheral Interface are powered And power management.
In the present embodiment, central processing unit 602 is used for:
Receive unlocking information input by user;
Judge whether the unlocking information is correct;
If the unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.
Further, it is described to judge whether the unlocking information is correct, including:
Obtain the corresponding password type of the unlocking information;
Obtain the corresponding default unlocking pin of the password type;
Judge whether the unlocking information matches with the default unlocking pin;
If the unlocking information is matched with the default unlocking pin, the unlocking information is correct;
If the unlocking information is mismatched with the default unlocking pin, the unlocking information mistake.
Further, the operational mode includes personal pattern and borrows pattern, correspondingly, described believe into the unlock Corresponding operational mode is ceased, including:
Obtain face information;
Judge whether the face information is primary user;
If the face information is primary user, enter personal pattern;
If the face information is non-master user, into borrow pattern, the personal data of the primary user are hidden.
Further, the personal data for hiding the primary user, including:
Shielding shows the payment accounts and payment cipher of instant messaging chat message or the shielding primary user.
Further, the operational mode includes operating mode and life pattern, correspondingly, described obtain the unlock letter Corresponding operational mode is ceased, including:
If the unlocking information is matched with working password, into operating mode;
If the unlocking information and life password match, into life pattern;The operating mode and the life Pattern using permission difference.
Further, it is described to enter the corresponding operational mode of the unlocking information, including:
Obtain the configuration information of the corresponding operational mode of the unlocking information;
According to the configuration information to the sensor of terminal, internetwork connection mode, memory space, using permission sum number It is configured according at least one of access.
Further, it is described to receive unlocking information input by user, including:
Receive unlocked by fingerprint information input by user, face unlocking information, iris unlocking information, gesture unlocking information and text At least one of this unlocking information.
The embodiment of the present application also provides a kind of storage medium for including terminal device executable instruction, and the terminal device can When being performed by terminal device processor for performing a kind of terminal control method, this method includes execute instruction:
Receive unlocking information input by user;
Judge whether the unlocking information is correct;
If the unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.
Further, it is described to judge whether the unlocking information is correct, including:
Obtain the corresponding password type of the unlocking information;
Obtain the corresponding default unlocking pin of the password type;
Judge whether the unlocking information matches with the default unlocking pin;
If the unlocking information is matched with the default unlocking pin, the unlocking information is correct;
If the unlocking information is mismatched with the default unlocking pin, the unlocking information mistake.
Further, the operational mode includes personal pattern and borrows pattern, correspondingly, described believe into the unlock Corresponding operational mode is ceased, including:
Obtain face information;
Judge whether the face information is primary user;
If the face information is primary user, enter personal pattern;
If the face information is non-master user, into borrow pattern, the personal data of the primary user are hidden.
Further, the personal data for hiding the primary user, including:
Shielding shows the payment accounts and payment cipher of instant messaging chat message or the shielding primary user.
Further, the operational mode includes operating mode and life pattern, correspondingly, described obtain the unlock letter Corresponding operational mode is ceased, including:
If the unlocking information is matched with working password, into operating mode;
If the unlocking information and life password match, into life pattern;The operating mode and the life Pattern using permission difference.
Further, it is described to enter the corresponding operational mode of the unlocking information, including:
Obtain the configuration information of the corresponding operational mode of the unlocking information;
According to the configuration information to the sensor of terminal, internetwork connection mode, memory space, using permission sum number It is configured according at least one of access.
Further, it is described to receive unlocking information input by user, including:
Receive unlocked by fingerprint information input by user, face unlocking information, iris unlocking information, gesture unlocking information and text At least one of this unlocking information.
The arbitrary of one or more computer-readable media may be used in the computer storage media of the embodiment of the present application Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device or arbitrary above combination.The more specific example (non exhaustive list) of computer readable storage medium includes:Tool There are one or the electrical connections of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium can be any tangible medium for including or storing program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media can include in a base band or as a carrier wave part propagation data-signal, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but it is unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By instruction execution system, device either device use or program in connection.
The program code included on computer-readable medium can be transmitted with any appropriate medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with one or more programming language or combinations come write for perform the application operation computer Program code, programming language include object oriented program language-such as Java, Smalltalk, C++, also wrap Include conventional procedural programming language-such as " C " language or similar programming language.Program code can be complete Ground is performed, is partly performed on the user computer on the user computer, the software package independent as one performs, partly exists Part performs or performs on a remote computer or server completely on the remote computer on subscriber computer.It is being related to In the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (LAN) or wide area Net (WAN)-be connected to subscriber computer or, it may be connected to outer computer (such as utilizes ISP To pass through Internet connection).
Certainly, a kind of storage medium for including computer executable instructions that the embodiment of the present application is provided, computer Operation is recommended in the application that executable instruction is not limited to the described above, and the application that the application any embodiment is provided can also be performed Relevant operation in recommendation method.
Note that it above are only the preferred embodiment of the application and institute's application technology principle.It will be appreciated by those skilled in the art that The application is not limited to specific embodiment described here, can carry out for a person skilled in the art it is various it is apparent variation, The protection domain readjusted and substituted without departing from the application.Therefore, although being carried out by above example to the application It is described in further detail, but the application is not limited only to above example, in the case where not departing from the application design, also It can include other more equivalent embodiments, and scope of the present application is determined by scope of the appended claims.

Claims (10)

1. a kind of terminal control method, which is characterized in that including:
Receive unlocking information input by user;
Judge whether the unlocking information is correct;
If the unlocking information is correct, into the corresponding operational mode of the unlocking information, the terminal is unlocked.
2. terminal control method according to claim 1, which is characterized in that described to judge the unlocking information whether just Really, including:
Obtain the corresponding password type of the unlocking information;
Obtain the corresponding default unlocking pin of the password type;
Judge whether the unlocking information matches with the default unlocking pin;
If the unlocking information is matched with the default unlocking pin, the unlocking information is correct;
If the unlocking information is mismatched with the default unlocking pin, the unlocking information mistake.
3. terminal control method according to claim 1, which is characterized in that the operational mode includes personal pattern and borrows With pattern, correspondingly, described enter the corresponding operational mode of the unlocking information, including:
Obtain face information;
Judge whether the face information is primary user;
If the face information is primary user, enter personal pattern;
If the face information is non-master user, into borrow pattern, the personal data of the primary user are hidden.
4. terminal control method according to claim 3, which is characterized in that a number for hiding the primary user According to, including:
Shielding shows the payment accounts and payment cipher of instant messaging chat message or the shielding primary user.
5. terminal control method according to claim 1, which is characterized in that the operational mode includes operating mode and life Pattern living, correspondingly, described obtain the corresponding operational mode of the unlocking information, including:
If the unlocking information is matched with working password, into operating mode;
If the unlocking information and life password match, into life pattern;The operating mode and the life pattern Using permission difference.
6. terminal control method according to claim 1, which is characterized in that described to enter the corresponding fortune of the unlocking information Row pattern, including:
Obtain the configuration information of the corresponding operational mode of the unlocking information;
According to the configuration information to the sensor of terminal, internetwork connection mode, memory space, visit using permission and data It at least one of asks and to be configured.
7. terminal control method according to claim 1, which is characterized in that it is described to receive unlocking information input by user, Including:
Receive unlocked by fingerprint information input by user, face unlocking information, iris unlocking information, gesture unlocking information and text solution At least one of lock information.
8. a kind of terminal control mechanism, which is characterized in that including:
Receiving module, for receiving unlocking information input by user;
Judgment module, for judging whether the unlocking information that the receiving module receives is correct;
Handover module if judging that the unlocking information is correct for the judgment module, enters the unlocking information and corresponds to Operational mode;
Handover module unlocked state, for unlocking the terminal.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The terminal control method as described in any in claim 1-7 is realized during row.
10. a kind of terminal, including memory, processor and storage are on a memory and can be in the computer journey of processor operation Sequence, which is characterized in that the processor realizes the terminal control as described in claim 1-7 is any when performing the computer program Method processed.
CN201810150261.XA 2018-02-13 2018-02-13 terminal control method, device, storage medium and terminal Pending CN108268763A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810150261.XA CN108268763A (en) 2018-02-13 2018-02-13 terminal control method, device, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810150261.XA CN108268763A (en) 2018-02-13 2018-02-13 terminal control method, device, storage medium and terminal

Publications (1)

Publication Number Publication Date
CN108268763A true CN108268763A (en) 2018-07-10

Family

ID=62774237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810150261.XA Pending CN108268763A (en) 2018-02-13 2018-02-13 terminal control method, device, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN108268763A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614783A (en) * 2018-12-20 2019-04-12 惠州Tcl移动通信有限公司 Terminal safety protection method, device, mobile terminal and storage medium
CN111143797A (en) * 2019-12-27 2020-05-12 上海闻泰信息技术有限公司 Unlocking method and device of terminal equipment, terminal equipment and storage medium
CN111866272A (en) * 2020-06-30 2020-10-30 维沃移动通信有限公司 Control method and device of electronic equipment
WO2021088272A1 (en) * 2019-11-04 2021-05-14 深圳传音控股股份有限公司 Application protection method, control device, and readable storage medium
CN114840843A (en) * 2019-05-24 2022-08-02 华为技术有限公司 Login method of intelligent terminal and electronic equipment
CN115206006A (en) * 2022-06-23 2022-10-18 浙江骑客机器人科技有限公司 Electric vehicle and unlocking method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords
CN105897430A (en) * 2016-06-22 2016-08-24 浙江德景电子科技有限公司 User management method and system for intelligent terminal
CN106126999A (en) * 2016-06-15 2016-11-16 维沃移动通信有限公司 The unlocking method of a kind of Intelligent Recognition visitor and mobile terminal
CN106372468A (en) * 2015-07-21 2017-02-01 腾讯科技(深圳)有限公司 Mobile terminal operation method and mobile terminal
CN106506786A (en) * 2016-12-27 2017-03-15 努比亚技术有限公司 The terminal and method of protection user privacy information
CN107679410A (en) * 2017-09-07 2018-02-09 深圳支点电子智能科技有限公司 Possess the mobile terminal and Related product of certain privacy protection function

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords
CN106372468A (en) * 2015-07-21 2017-02-01 腾讯科技(深圳)有限公司 Mobile terminal operation method and mobile terminal
CN106126999A (en) * 2016-06-15 2016-11-16 维沃移动通信有限公司 The unlocking method of a kind of Intelligent Recognition visitor and mobile terminal
CN105897430A (en) * 2016-06-22 2016-08-24 浙江德景电子科技有限公司 User management method and system for intelligent terminal
CN106506786A (en) * 2016-12-27 2017-03-15 努比亚技术有限公司 The terminal and method of protection user privacy information
CN107679410A (en) * 2017-09-07 2018-02-09 深圳支点电子智能科技有限公司 Possess the mobile terminal and Related product of certain privacy protection function

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614783A (en) * 2018-12-20 2019-04-12 惠州Tcl移动通信有限公司 Terminal safety protection method, device, mobile terminal and storage medium
CN114840843A (en) * 2019-05-24 2022-08-02 华为技术有限公司 Login method of intelligent terminal and electronic equipment
CN114840843B (en) * 2019-05-24 2022-11-11 华为技术有限公司 Login method of intelligent terminal and electronic equipment
WO2021088272A1 (en) * 2019-11-04 2021-05-14 深圳传音控股股份有限公司 Application protection method, control device, and readable storage medium
CN111143797A (en) * 2019-12-27 2020-05-12 上海闻泰信息技术有限公司 Unlocking method and device of terminal equipment, terminal equipment and storage medium
CN111143797B (en) * 2019-12-27 2023-09-26 上海闻泰信息技术有限公司 Unlocking method and device of terminal equipment, terminal equipment and storage medium
CN111866272A (en) * 2020-06-30 2020-10-30 维沃移动通信有限公司 Control method and device of electronic equipment
CN115206006A (en) * 2022-06-23 2022-10-18 浙江骑客机器人科技有限公司 Electric vehicle and unlocking method thereof

Similar Documents

Publication Publication Date Title
CN108268763A (en) terminal control method, device, storage medium and terminal
KR102508947B1 (en) Embedded authentication systems in an electronic device
KR102406099B1 (en) Electronic device and method for displaying information thereof
CN108563933A (en) Control method, device, storage medium and the mobile terminal of application program
US10867149B2 (en) User identification through an external device on a per touch basis on touch sensitive devices
US9692868B2 (en) Mobile terminal and control method for the mobile terminal
WO2020001385A1 (en) Electronic apparatus and application program control method
US9626505B2 (en) Method and apparatus for managing authentication
KR102312336B1 (en) Method for sharing data and apparatus thereof
CN103699825A (en) Display apparatus and method for operating the same
US9877192B2 (en) Mobile terminal and method of controlling the same
KR20140079012A (en) Mobile apparatus having function of face recognition with additional component
CN103442141A (en) Method for having access to safe mode in one-touch mode
CN109074171B (en) Input method and electronic equipment
US10891397B2 (en) User interface display method for terminal, and terminal
CN105701420B (en) A kind of management method and terminal of user data
KR102335552B1 (en) Cover device, and electronic device and method for identifying the same
CN108475306B (en) User interface for mobile device
CN108718271A (en) Processing method, device, storage medium and the terminal of good friend's request
CN109558243A (en) Processing method, device, storage medium and the terminal of virtual data
CN106708409B (en) A kind of response method of popup menu, device and mobile terminal
CN110941821A (en) Data processing method, device and storage medium
CN110189137A (en) Method, apparatus, equipment and the storage medium of brush face payment
CN108369618A (en) A kind of fingerprint identification method and terminal device
JP7450708B2 (en) Display method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180710

RJ01 Rejection of invention patent application after publication