Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Management method and device for terminal permission

A management method and authority technology, applied in the direction of unauthorized/fraudulent phone call prevention, electronic digital data processing, instruments, etc., can solve the problems of privacy leakage, low mobile phone security, and affecting the personal and property safety of users, and achieve improvement Technical effect, the effect of solving low security

Inactive Publication Date: 2018-04-03
ZTE CORP
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the user's mobile phone, there are some applications, or some specific text messages, private photos and other personal information that you don't want others to see. When other people borrow your mobile phone from you, as long as you unlock the mobile phone, all these information will be displayed, thus It may cause the leakage of privacy and affect the personal and property safety of users
[0003] Aiming at the technical problem of low security of mobile phones in related technologies, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management method and device for terminal permission
  • Management method and device for terminal permission
  • Management method and device for terminal permission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal (such as a wearable device, a mobile phone, a tablet computer, etc.), a computer terminal, or a similar computing device. Take running on a mobile terminal as an example, such as figure 1 As shown, the mobile terminal may include one or more (only one is shown in the figure) processors 101 (the processors 101 may include but not limited to processing devices such as microprocessors MCUs or programmable logic devices FPGAs) for storing Data storage 103, and transmission means 105 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device.

[0030] The memory 103 can be used to store software programs and modules of application software, such as program instructions / modules corresponding to the control met...

Embodiment 2

[0072] The embodiment of the present invention also provides a device for managing terminal rights. The device is used to implement the above-mentioned embodiments and preferred implementation modes, and what has been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0073] Figure 4 is a schematic diagram of an apparatus for managing terminal rights according to an embodiment of the present invention. Such as Figure 4As shown, the device may include: a collection unit 41 , a determination unit 42 and an execution unit 43 .

[0074] The collection unit 41 is used to collect the biological characteristics of the terminal user when the mobile terminal is unlocked;

...

Embodiment 3

[0088] The embodiment of the invention also provides a storage medium. Optionally, in this embodiment, the above-mentioned storage medium may be configured to store program codes for performing the following steps:

[0089] S1, when the mobile terminal is unlocked, collect the biological characteristics of the terminal user;

[0090] S2. Determine the user authority of the terminal user on the mobile terminal according to the biometric feature;

[0091] S3. After the mobile terminal is successfully unlocked, perform operations permitted by the user authority.

[0092] Optionally, in this embodiment, the above-mentioned storage medium may include but not limited to: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk Various media that can store program codes such as discs or optical discs.

[0093] Optionally, in this embodiment, the processor executes according to the program code stored in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a management method and a management device for the terminal permission. The method comprises the steps of acquiring the biological characteristics of a user of a terminal whenthe mobile terminal is to be unlocked; determining the user permission of the mobile terminal according to the biological characteristics; and executing the operation allowed by the user permission after the successful unlocking operation of the mobile terminal. The method and the device solve the technical problem in the prior art that existing mobile phones are low in safety.

Description

technical field [0001] The present invention relates to the field of equipment security, in particular to a method and device for managing terminal rights. Background technique [0002] With the development of society, the functions of mobile phones are becoming more and more abundant. In addition to normal communication functions, they can also be used for shopping, consumption, and saving user information. Mobile phones have become an indispensable part of people. In the user's mobile phone, there are some applications, or some specific text messages, private photos and other personal information that you do not want to be seen by others. When other people borrow your mobile phone from you, as long as you unlock the mobile phone, all these information will be displayed. It may cause the leakage of privacy and affect the personal and property safety of users. [0003] Aiming at the technical problem of relatively low security of mobile phones in related technologies, no ef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/67G06F21/32
CPCH04M1/67G06F21/32G06F2221/2141H04M1/72463H04M1/725
Inventor 周洁
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products