Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for setting permission password for mobile phone

A permission password and password technology, which is applied in the field of mobile phone permission password setting, can solve the problems of privacy leakage, lack of sincerity of the owner, and failure to refuse to borrow, etc., to achieve the effect of protecting privacy and protecting privacy

Inactive Publication Date: 2012-05-16
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF3 Cites 94 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the users who use mobile phones are often people who the owner knows. Many times, the owner cannot refuse to borrow his own mobile phone, and is worried that the privacy will be leaked after the password is given; but it is difficult to ensure that the private data stored in the mobile phone will be leaked.
[0004] The guest mode set on some mobile phones, the borrower can view the current status as the guest mode, and can take the initiative to turn off this mode, which will not only make the borrower think that the owner is not sincere enough, but also cannot effectively protect the privacy of the owner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for setting permission password for mobile phone
  • Method for setting permission password for mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will describe in detail with reference to the accompanying drawings in conjunction with the embodiments, so as to further explain the technical features and advantages of the present invention.

[0020] Method flow chart of the present invention is as figure 1 As shown, a method for setting a mobile phone authority password, the steps are as follows:

[0021] Step 1. Enter the authority password setting program;

[0022] Step 2. Set the highest authority password;

[0023] Step 3. Determine whether to set a visitor password, if yes, perform step 4, otherwise complete the permission password setting;

[0024] Step 4, execute the program of setting visitor password;

[0025] Step 5. Determine whether to customize visitor permissions, if yes, perform step 6.1, otherwise perform step 6.2;

[0026] Step 6.1, set visitor permissions, go to step 7;

[0027] Step 6.2, the visitor authority set by the default system, go to step 7;

[0028] Step 7. Complete th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses method for setting a permission password for a mobile phone. The method comprises the steps as follows: 1, entering a permission password setting program; 2, setting the highest permission password; 3, judging whether a visitor password is set or not, if yes, Step 4 is executed, otherwise, setting of the permission password is finished; 4, executing the program of setting a visitor password; 5, judging whether visitor permission is user-defined or not, if yes, Step 6.1 is executed, otherwise, Step 6.2 is executed; 6.1, setting visitor permission; 6.2, defaulting the visitor permission set by the system; and 7, accomplishing setting of the permission password. When the permission password is used for unlocking, whether a password inputted by a user is the highest permission password or the visitor permission password can be judged, if the password is the highest permission password, all the functions, applications and documentations of the mobile phone are opened, and if the password is the visitor permission password, the functions, applications and documentations of the mobile phone are used in a limited way. The method can protect data privacy of a user through passwords with different permissions and restrict access, and has the advantages of simplicity and convenience in operation, and easiness in implementation.

Description

technical field [0001] The invention relates to a mobile phone encryption technology, in particular to a method for setting a mobile phone authority password. Background technique [0002] Currently, the existing technology can only realize functions such as unlocking encryption, application restriction, and data hiding. The mobile phone unlocking interface encryption technology encrypts the touch screen mobile phone unlocking interface, and enters the correct password to enter the visitor's unlocking interface to enter the mobile phone function interface; the mobile phone software function is hidden as the mobile phone application program, which can be set whether to allow opening, or whether to allow the use of all program functions; mobile phone file data Hide to hide files stored on your phone. [0003] In order to protect privacy, current mobile phone users will encrypt characters or patterns on the mobile phone unlocking interface to restrict other people from using t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/72454
Inventor 曾元清
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products