Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission management method, mobile terminal and computer readable storage medium

A mobile terminal and rights management technology, applied in computer components, computer security devices, computing, etc., can solve problems such as leakage of private information, and achieve the effect of privacy protection and convenient control

Inactive Publication Date: 2017-12-29
NUBIA TECHNOLOGY CO LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, more and more private information of people (such as browser browsing history, financial payment application software, etc.) is recorded or stored in the mobile terminal. If a user lends the mobile terminal to others for use, he will face risk of leaking private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission management method, mobile terminal and computer readable storage medium
  • Permission management method, mobile terminal and computer readable storage medium
  • Permission management method, mobile terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0061] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0062]Terminals may be implemented in various forms. For example, the terminals described in the present invention may include mobile phones, tablet computers, notebook computers, palmtop computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, portable Mobile terminals such as wearable devices, smart bracelets, and pedometers, and fixed terminals such as digital TVs and desktop computers.

[0063] In the following description, a mobile terminal will be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a permission management method. The method comprises the steps of receiving fingerprint input operation of a user in a target region, and obtaining fingerprint information input by the user; judging whether the fingerprint information input by the user is matched with preset fingerprint information or not; if the fingerprint information input by the user is matched with the preset fingerprint information, obtaining target permission configuration information corresponding to the target region; and according to the target permission configuration information, performing permission configuration on the mobile terminal. The invention furthermore discloses a mobile terminal and a computer readable storage medium. Through the scheme, the user can perform fingerprint verification in different regions, so that different permissions are configured for the mobile terminal, the user can control the permissions of the mobile terminal conveniently, and the user privacy can be effectively protected when the mobile terminal is lent.

Description

technical field [0001] The present invention relates to the technical field of mobile terminal rights management, in particular to a rights management method, a mobile terminal and a computer-readable storage medium. Background technique [0002] With the continuous development of electronic technology, mobile terminals (such as smart phones, tablet computers, etc.) have more and more powerful functions, and play an indispensable and important role in people's work and life. As a result, more and more private information of people (such as browser browsing history, financial payment application software, etc.) is recorded or stored in the mobile terminal. If a user lends the mobile terminal to others for use, he will face risk of leaking private information. [0003] It can be seen that how to protect private information in mobile terminals has become an urgent problem to be solved. Contents of the invention [0004] In view of this, the present invention proposes a righ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/62G06F3/0488G06K9/00
CPCG06F3/04886G06F21/32G06F21/6245G06F2221/2141G06V40/1365
Inventor 张智彪
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products