[go: up one dir, main page]

CN108200283A - A kind of information processing method and terminal based on pattern of leaving behind - Google Patents

A kind of information processing method and terminal based on pattern of leaving behind Download PDF

Info

Publication number
CN108200283A
CN108200283A CN201711469929.9A CN201711469929A CN108200283A CN 108200283 A CN108200283 A CN 108200283A CN 201711469929 A CN201711469929 A CN 201711469929A CN 108200283 A CN108200283 A CN 108200283A
Authority
CN
China
Prior art keywords
information
terminal
predetermined
scheduled event
pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711469929.9A
Other languages
Chinese (zh)
Inventor
袁高鋆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201711469929.9A priority Critical patent/CN108200283A/en
Publication of CN108200283A publication Critical patent/CN108200283A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application involves intelligent terminal technical field, more particularly to a kind of information processing method and terminal based on pattern of leaving behind, the method are applied to first terminal, the method includes:Obtain triggering command;Pattern is left behind based on triggering command triggering first terminal;It is described leave behind pattern under, detection first terminal whether scheduled event occurs;If scheduled event occurs, target information associated with the scheduled event is obtained;The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application transmits file;Above-mentioned technical proposal can allow user to learn some important informations, such as incoming information and short message in time by predetermined way in the case where user leaves behind terminal, further improve the usage experience of user, improve intelligence and the Humanization Level of Municipal of terminal.

Description

A kind of information processing method and terminal based on pattern of leaving behind
Technical field
This application involves intelligent terminal technical field, more particularly to a kind of information processing method and end based on pattern of leaving behind End.
Background technology
With the continuous development of intelligent terminal technology, intelligent terminal gradually penetrates into the every aspect of user's life, user The frequency that contact communication is carried out using intelligent terminal is also increasingly closer;At the same time, user is also further seeking for terminal Intelligent level and Humanization Level of Municipal.
In actual life, the problem of user leaves behind terminal is frequently present of, may lead to not learn end due to leaving behind terminal Some important informations on end, such as incoming information and short message, bad usage experience is brought to user, also affects terminal Intelligence and Humanization Level of Municipal;Therefore, how in the case where user leaves behind terminal, user is allowed to learn some important letters in time Breath, such as incoming information and short message are the technical issues of terminal first having are badly in need of solving.
Invention content
The purpose of the application is to provide a kind of information processing method and terminal based on pattern of leaving behind, can pass through predetermined party Formula allows user to learn some important informations, such as incoming information and short message in time, further in the case where user leaves behind terminal Improve the usage experience of user, improve intelligence and the Humanization Level of Municipal of terminal.
To solve the above problems, the first aspect of the application provides a kind of information processing method based on pattern of leaving behind, Applied to first terminal, the method includes:
Obtain triggering command;
Pattern is left behind based on triggering command triggering first terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application passes Defeated file.
As an alternative embodiment, before triggering command is obtained, the method further includes:
Specified one has the application of information transfer capability as intended application;
By the intended application, the data transmission relations of first terminal and second terminal are established.
As an alternative embodiment, the method for obtaining triggering command includes:
Verification information and/or user that the predetermined contact person in intended application sends are detected by second terminal to the mesh The verification information of the upper predetermined network transmission portfolios of mark application;
Judge whether the verification information is predetermined information;
If the verification information is predetermined information, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
Judge whether the verification information is that the method for predetermined information includes as an alternative embodiment, described:
Parsing identifies the text information included in the verification information and/or voice messaging and authentication information;
Whether the content for judging the text information and/or voice messaging is predetermined content;
If the content of the text information and/or voice messaging is predetermined content, the identity is further judged Whether verification information is predetermined identity information;
If the authentication information is predetermined identity information, judge the verification information for predetermined information.
As an alternative embodiment, the method for obtaining triggering command includes:
Detect the state of first terminal;
Judge to whether there is contact action within a predetermined period of time or whether have gravity sensing signal;
If in the presence of the triggering command for triggering pattern of leaving behind is not generated;
If being not present, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
As an alternative embodiment, the method whether the detection first terminal occurs scheduled event includes:
It is described leave behind pattern under,
Detect whether people's incoming call of being related;
If the people that is related sends a telegram here, judge scheduled event occurs.
As an alternative embodiment, the method whether the detection first terminal occurs scheduled event further includes:
It is described leave behind pattern under,
Unread short messages are detected whether;
If there are unread short messages, judge scheduled event occurs.
As an alternative embodiment, the method packet for obtaining target information associated with the scheduled event It includes:
When detecting that the people that is related sends a telegram here, tone information function is opened;
Obtain the tone information of the contact person of incoming call;With the number and name information of the contact person.
As an alternative embodiment, the method packet for obtaining target information associated with the scheduled event It includes:
Identify the content of unread short messages;
Based on the content of the unread short messages, the classification of the unread short messages is judged;
If the classification of the unread short messages is non-junk short message or the short message of predetermined severity level, the interior of the short message is obtained Hold.
As an alternative embodiment, the intended application is applied for wechat or QQ applications;
The predetermined network transmits file:Wechat is applied or QQ is using the file on upper file transmission assistant.
According to further aspect of the application, embodiments herein additionally provides a kind of terminal, and the terminal is configured It is at least to perform following operation:
Obtain triggering command;
Pattern is left behind based on the triggering command triggering terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application passes Defeated file.
The above-mentioned technical proposal of the application is by when user leaves behind terminal, taking triggering command so that terminal triggering is gone forward side by side Enter to leave behind pattern;It is described leave behind pattern under, detect some important informations (i.e. target information), such as incoming information and short message; Then incoming information and short message etc. are sent to by preset intended application predetermined on predetermined contact person and/or intended application Network transmission file;User only needs to log in the intended application in another terminal, you can gets target information;So as to real Now user is helped to learn some important informations (i.e. target information), such as the purpose of incoming information and short message in time, further changed It has been apt to the usage experience of user, has improved intelligence and the Humanization Level of Municipal of terminal;And it is to utilize the mesh in existing terminal Mark application (such as wechat application, QQ applications) can be realized, and save cost of implementation.
Description of the drawings
Fig. 1 is the schematic flow chart for the information processing method based on pattern of leaving behind that embodiments herein provides;
Fig. 2 is the method for the data transmission relations for establishing first terminal and second terminal that embodiments herein provides Schematic flow chart;
Fig. 3 is the schematic flow chart of the method for the acquisition triggering command that embodiments herein provides;
Fig. 4 be embodiments herein provide judge the verification information whether be predetermined information method it is schematic Flow chart;
Fig. 5 is the schematic flow chart of the method for acquisition triggering command that another embodiment of the application provides.
Specific embodiment
Purpose, technical scheme and advantage to make the application are of greater clarity, With reference to embodiment and join According to attached drawing, the application is further described.It should be understood that these descriptions are merely illustrative, and it is not intended to limit this Shen Range please.In addition, in the following description, the description to known features and technology is omitted, to avoid this is unnecessarily obscured The concept of application.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can Understand and consistently understand the application.Therefore, for those skilled in the art, it will be understood that provide the various implementations to the application It is the purpose rather than limitation appended claims and its application of Equivalent definitions illustrated that the description of example, which is only,.
Below in conjunction with the attached drawing in the application some embodiments, the technical solution in the embodiment of the present application is carried out clear Chu is fully described by, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments. Based on the embodiment in the application, what those of ordinary skill in the art were obtained without making creative work is all Other embodiment shall fall in the protection scope of this application.
It should be noted that the term used in the embodiment of the present application is only merely for the mesh of description specific embodiment , and it is not intended to be limiting the application." one " of the embodiment of the present application and singulative used in the attached claims, "one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other meanings.Also It should be appreciated that term "and/or" used herein refers to and list items purposes comprising one or more mutually bindings are any Or all possible combinations.Expression " first ", " second ", " first " and " second " be for modify respective element without Consideration sequence or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.Under in addition, Involved technical characteristic as long as they do not conflict with each other can phase in the described the application different embodiments in face Mutually combine.
For the clearer each attached drawing of description, in various figures, different labels is given for same step.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone, PC (PC, such as tablet computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device (VR) and the combination of one or more of wearable device etc..According to some embodiments of the present application, the wearable device It can include type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics Clothes), decorated type (such as pad skin, tatoo or built in electronic device) etc. or several combinations.In some realities of the application It applies in example, the electronic equipment can be flexible, be not limited to above equipment or can be one kind in above-mentioned various equipment Or several combination.In this application, term " user " can be indicated using the people of electronic equipment or setting using electronic equipment Standby (such as artificial intelligence electronic equipment).
Below in conjunction with attached drawing, it is described in detail according to the sequence of Fig. 1 to Fig. 5.
Fig. 1 (i.e. shown in attached drawing 100) is please referred to, Fig. 1 is the letter based on pattern of leaving behind that embodiments herein provides Cease the schematic flow chart of processing method;
As shown in Figure 1, embodiments herein provides a kind of information processing method based on pattern of leaving behind, applied to One terminal, the method includes:
Step S101:Obtain triggering command;
Step S102:Pattern is left behind based on triggering command triggering first terminal;
It is described leave behind pattern under,
Step S103:Whether detection first terminal occurs scheduled event;
If scheduled event occurs, S103 is entered step:Obtain target information associated with the scheduled event;
Step S104:The target information is sent in predetermined contact person and/or the intended application in intended application Predetermined network transmits file;
Wherein, if scheduled event does not occur, target information associated with the scheduled event is not obtained, i.e. in Fig. 1 Shown step S106.
By when user leaves behind terminal, taking triggering command so that terminal triggers and enters the pattern of leaving behind;It is left behind described Under pattern, some important informations (i.e. target information), such as incoming information and short message are detected;Then by incoming information and short message etc. The predetermined network being sent to by preset intended application on predetermined contact person and/or intended application transmits file;User is only It needs to log in the intended application in another terminal, you can get target information;One is learnt in time so as to fulfill user is helped A little important informations (i.e. target information), such as the purpose of incoming information and short message, further improve the usage experience of user, carry The intelligence of high terminal and Humanization Level of Municipal
Please refer to Fig. 2 (i.e. shown in attached drawing 200), Fig. 2 be embodiments herein provide establish first terminal and the The schematic flow chart of the method for the data transmission relations of two terminals;
Before triggering command is obtained, the step of further including the data transmission relations for establishing first terminal and second terminal; As shown in Fig. 2, the method includes:
Step S201:Specified one has the application of information transfer capability as intended application;
Step S202:By the intended application, the data transmission relations of first terminal and second terminal are established.
Wherein, it should be noted that intended application can utilize installed social networking application on first terminal, as QQ should With, wechat application etc.;First terminal is established in addition, described herein and the data transmission relations of second terminal refer to first terminal It can realize that information sharing, information are transmitted by intended application (such as QQ applications, wechat application) with second terminal.
Fig. 3 (i.e. shown in attached drawing 300) is please referred to, Fig. 3 is the side for the acquisition triggering command that embodiments herein provides The schematic flow chart of method;
As shown in figure 3, the method for obtaining triggering command includes:
Step S301:Verification information and/or the user for detecting the predetermined contact person transmission in intended application are whole by second The predetermined network in the intended application is held to transmit the verification information of portfolios;
Step S302:Judge whether the verification information is predetermined information;
If the verification information is predetermined information, S303 is entered step:Generation refers to for triggering the triggering for pattern of leaving behind It enables;
Step S304:Obtain the triggering command of generation.
Wherein, if the verification information is not predetermined information, the triggering command for triggering pattern of leaving behind is not generated, i.e., Step S305 shown in Fig. 3.
Wherein, it should be noted that the predetermined information can be User Defined setting, such as " I'm it is sorry, you are fallen ", " sorry is forgotten with you " etc.;These predetermined informations can be speech form or written form, Can be graphic form or picture and text combining form.
Such as:User logs in intended application, contact person or network transmission file in intended application in second terminal Folder is sent " sorry, you are fallen ";First terminal can log in intended application detection receive sent by second terminal " to not Rise, you fallen " this information;Then it identifies that user forgets band first terminal, and then generates triggering command triggering first Terminal leaves behind pattern.
Fig. 4 (i.e. shown in attached drawing 400) is please referred to, Fig. 4 is the judgement verification information that embodiments herein provides Whether be predetermined information method schematic flow chart;
Judge whether the verification information is that the method for predetermined information includes as shown in figure 4, described:
Step S401:Parsing identifies the text information included in the verification information and/or voice messaging and authentication Information;
Step S402:Whether the content for judging the text information and/or voice messaging is predetermined content;
If the content of the text information and/or voice messaging is predetermined content, S403 is entered step:Further Judge whether the authentication information is predetermined identity information;
If the authentication information is predetermined identity information, S404 is entered step:It is pre- to judge the verification information Determine information.
Wherein, if the content of the text information and/or voice messaging is not predetermined content or the authentication Information is not predetermined identity information, then it is not predetermined information to judge the verification information;Step S405 i.e. shown in Fig. 4.
Fig. 5 (i.e. shown in attached drawing 500) is please referred to, Fig. 5 is the acquisition triggering command that another embodiment of the application provides Method schematic flow chart;
As shown in figure 4, the method for obtaining triggering command includes:
Step S501:Detect the state of first terminal;
Step S502:Judge to whether there is contact action within a predetermined period of time or whether have gravity sensing signal;
If in the presence of S503 is entered step:The triggering command for triggering pattern of leaving behind is not generated;
If being not present, S504 is entered step:The triggering command of pattern is left behind in generation for triggering;
Step S505:Obtain the triggering command of generation.
As a kind of optional embodiment, the method whether the detection first terminal occurs scheduled event includes:
It is described leave behind pattern under,
Detect whether people's incoming call of being related;
If the people that is related sends a telegram here, judge scheduled event occurs.
As a kind of optional embodiment, the method whether the detection first terminal occurs scheduled event further includes:
It is described leave behind pattern under,
Unread short messages are detected whether;
If there are unread short messages, judge scheduled event occurs.
As a kind of optional embodiment, the method packet for obtaining target information associated with the scheduled event It includes:
When detecting that the people that is related sends a telegram here, tone information function is opened;
Obtain the tone information of the contact person of incoming call;With the number and name information of the contact person.
As a kind of optional embodiment, the method packet for obtaining target information associated with the scheduled event It includes:
Identify the content of unread short messages;
Based on the content of the unread short messages, the classification of the unread short messages is judged;
If the classification of the unread short messages is non-junk short message or the short message of predetermined severity level, the interior of the short message is obtained Hold.
As a kind of optional embodiment, the intended application is applied for wechat or QQ applications;
The predetermined network transmits file:Wechat is applied or QQ is using the file on upper file transmission assistant.
It should be noted that second terminal wechat application can be logged in by account number cipher or QQ is applied, then by disappearing The mode that breath is sent or file uploads is applied to wechat or the file transmission assistant of QQ applications sends predetermined information, such as " to not It rises, you is fallen ";Then whether there is new letter on the file transmission assistant of the application of first terminal detection wechat or QQ applications Breath;Then it carries out obtaining identification information content;If the information content is such as predetermined informations such as " sorry, you are fallen ", you can Triggering first terminal leaves behind pattern.It is of course also possible to it is to send predetermined information by way of predetermined contact person;Such as:Second Terminal is with second user identity logs intended application;First terminal is with the first user identity Deng Li intended applications;First user's body Part and second user identity are mutually good friend contact person in intended application;Second user identity be may specify as legal identity, It is sent when with second user identity by first object identity of the intended application on first terminal as " let down, you being fallen " etc. predetermined informations, you can that triggers first terminal leaves behind pattern.
In addition, by then passing through the social networking applications such as wechat application or QQ applications, user logs in and sends message and is required for leading to The verification of account password is crossed, safety is higher;Ensure safety;
Simultaneously as authentication information of the user by second terminal typing is further included in predetermined information, it can be further Improve security performance.
In order to which above-mentioned technical proposal is better achieved, embodiments herein additionally provides a kind of terminal, the terminal quilt It is configured at least perform following operate:
Obtain triggering command;
Pattern is left behind based on the triggering command triggering terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application passes Defeated file.
As a kind of optional embodiment, before triggering command is obtained, the terminal is configured as at least performing following Operation:
Specified one has the application of information transfer capability as intended application;
By the intended application, the data transmission relations of first terminal and second terminal are established.
As a kind of optional embodiment, when obtaining triggering command, the terminal is configured as at least performing following grasp Make:
Verification information and/or user that the predetermined contact person in intended application sends are detected by second terminal to the mesh The verification information of the upper predetermined network transmission portfolios of mark application;
Judge whether the verification information is predetermined information;
If the verification information is predetermined information, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
As a kind of optional embodiment, when whether judge the verification information is predetermined information, the terminal by with It is set to and at least performs following operate:
Parsing identifies the text information included in the verification information and/or voice messaging and authentication information;
Whether the content for judging the text information and/or voice messaging is predetermined content;
If the content of the text information and/or voice messaging is predetermined content, the identity is further judged Whether verification information is predetermined identity information;
If the authentication information is predetermined identity information, judge the verification information for predetermined information.
As a kind of optional embodiment, when obtaining triggering command, the terminal is configured as at least performing following grasp Make:
Detect the state of first terminal;
Judge to whether there is contact action within a predetermined period of time or whether have gravity sensing signal;
If in the presence of the triggering command for triggering pattern of leaving behind is not generated;
If being not present, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
As a kind of optional embodiment, when whether detection first terminal occurs scheduled event, the terminal is configured It is at least to perform following operation:
It is described leave behind pattern under,
Detect whether people's incoming call of being related;
If the people that is related sends a telegram here, judge scheduled event occurs.
As a kind of optional embodiment, when whether detection first terminal occurs scheduled event, the terminal is configured It is at least to perform following operation:
It is described leave behind pattern under,
Unread short messages are detected whether;
If there are unread short messages, judge scheduled event occurs.
As a kind of optional embodiment, when obtaining target information associated with the scheduled event, the terminal It is configured as at least performing following operate:
When detecting that the people that is related sends a telegram here, tone information function is opened;
Obtain the tone information of the contact person of incoming call;With the number and name information of the contact person.
As a kind of optional embodiment, when obtaining target information associated with the scheduled event, the terminal It is configured as at least performing following operate:
Identify the content of unread short messages;
Based on the content of the unread short messages, the classification of the unread short messages is judged;
If the classification of the unread short messages is non-junk short message or the short message of predetermined severity level, the interior of the short message is obtained Hold.
As a kind of optional embodiment, the intended application is applied for wechat or QQ applications;
The predetermined network transmits file:Wechat is applied or QQ is using the file on upper file transmission assistant.
The application is intended to protect a kind of information processing method and terminal based on pattern of leaving behind;By leaving behind terminal in user When, take triggering command so that terminal triggers and enters the pattern of leaving behind;It is described leave behind pattern under, detect some important informations (i.e. Target information), such as incoming information and short message;Then incoming information and short message etc. are sent to by preset intended application pre- Determine the predetermined network transmission file in contact person and/or intended application;User only needs to log in the target in another terminal Using, you can get target information;Some important informations (i.e. target information), Tathagata are learnt in time so as to fulfill user is helped The purpose of power information and short message etc. further improves the usage experience of user, improves the intelligence of terminal and hommization water It is flat;And can be realized using the intended application (such as wechat application, QQ applications) in existing terminal, it has saved and has been implemented as This.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in the present specification, term " comprising ", "comprising" or its any other variant are intended to Non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only will including those Element, but also including other elements that are not explicitly listed or further include as this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that Also there are other identical elements in process, method, article or equipment including the element.Finally, it is also necessary to explanation That a series of above-mentioned processing not only include the processing that is performed in temporal sequence with sequence described here, and including parallel or The processing respectively rather than in chronological order performed.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with It is completed by the relevant hardware of computer program instructions, the program can be stored in a computer readable storage medium, The program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
It should be understood that the above-mentioned specific embodiment of the application is used only for exemplary illustration or explains the application's Principle, without forming the limitation to the application.Therefore, that is done in the case of without departing from spirit and scope is any Modification, equivalent replacement, improvement etc., should be included within the protection domain of the application.In addition, the application appended claims purport Covering the whole variations fallen into scope and boundary or this range and the equivalent form on boundary and repairing Change example.

Claims (10)

1. a kind of information processing method based on pattern of leaving behind, which is characterized in that applied to first terminal, the method includes:
Obtain triggering command;
Pattern is left behind based on triggering command triggering first terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application transmits text Part presss from both sides.
2. according to the method described in claim 1, it is characterized in that, before triggering command is obtained, the method further includes:
Specified one has the application of information transfer capability as intended application;
By the intended application, the data transmission relations of first terminal and second terminal are established.
3. according to the method described in claim 2, it is characterized in that, the method for obtaining triggering command includes:
The verification information and/or user for detecting the predetermined contact person transmission in intended application should to the target by second terminal The verification information of predetermined network transmission portfolios used;
Judge whether the verification information is predetermined information;
If the verification information is predetermined information, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
4. according to the method described in claim 3, it is characterized in that, described judge whether the verification information is predetermined information Method includes:
Parsing identifies the text information included in the verification information and/or voice messaging and authentication information;
Whether the content for judging the text information and/or voice messaging is predetermined content;
If the content of the text information and/or voice messaging is predetermined content, the authentication is further judged Whether information is predetermined identity information;
If the authentication information is predetermined identity information, judge the verification information for predetermined information.
5. according to the method described in claim 2, it is characterized in that, the method for obtaining triggering command includes:
Detect the state of first terminal;
Judge to whether there is contact action within a predetermined period of time or whether have gravity sensing signal;
If in the presence of the triggering command for triggering pattern of leaving behind is not generated;
If being not present, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
6. according to the method described in claim 1, it is characterized in that, whether the detection first terminal occurs the side of scheduled event Method includes:
It is described leave behind pattern under,
Detect whether people's incoming call of being related;
If the people that is related sends a telegram here, judge scheduled event occurs.
7. according to the method described in claim 6, it is characterized in that, whether the detection first terminal occurs the side of scheduled event Method further includes:
It is described leave behind pattern under,
Unread short messages are detected whether;
If there are unread short messages, judge scheduled event occurs.
8. according to the method described in claim 6, it is characterized in that, described obtain target letter associated with the scheduled event The method of breath includes:
When detecting that the people that is related sends a telegram here, tone information function is opened;
Obtain the tone information of the contact person of incoming call;With the number and name information of the contact person.
9. the method according to the description of claim 7 is characterized in that described obtain target letter associated with the scheduled event The method of breath includes:
Identify the content of unread short messages;
Based on the content of the unread short messages, the classification of the unread short messages is judged;
If the classification of the unread short messages is non-junk short message or the short message of predetermined severity level, the content of the short message is obtained.
10. a kind of terminal, which is characterized in that the terminal is configured as at least performing following operate:
Obtain triggering command;
Pattern is left behind based on the triggering command triggering terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application transmits text Part presss from both sides.
CN201711469929.9A 2017-12-29 2017-12-29 A kind of information processing method and terminal based on pattern of leaving behind Pending CN108200283A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711469929.9A CN108200283A (en) 2017-12-29 2017-12-29 A kind of information processing method and terminal based on pattern of leaving behind

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711469929.9A CN108200283A (en) 2017-12-29 2017-12-29 A kind of information processing method and terminal based on pattern of leaving behind

Publications (1)

Publication Number Publication Date
CN108200283A true CN108200283A (en) 2018-06-22

Family

ID=62586095

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711469929.9A Pending CN108200283A (en) 2017-12-29 2017-12-29 A kind of information processing method and terminal based on pattern of leaving behind

Country Status (1)

Country Link
CN (1) CN108200283A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021115220A1 (en) * 2019-12-13 2021-06-17 维沃移动通信有限公司 Information sharing method, electronic device and computer-readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1964531A (en) * 2006-01-24 2007-05-16 深圳市经纬科技有限公司 Mobile phone information remote inquiring method
CN101163347A (en) * 2007-11-21 2008-04-16 深圳华为通信技术有限公司 Method and equipment for remote control mobile terminal
EP2187606A1 (en) * 2004-08-06 2010-05-19 Fujitsu Limited Terminal device, message display method and program for the same
CN102316223A (en) * 2011-09-30 2012-01-11 惠州Tcl移动通信有限公司 Processing method for mobile phone unread information and mobile phone
CN105472156A (en) * 2015-12-08 2016-04-06 努比亚技术有限公司 Incoming call reminding method and device
CN106412253A (en) * 2016-09-09 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Communication method, communication device and terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2187606A1 (en) * 2004-08-06 2010-05-19 Fujitsu Limited Terminal device, message display method and program for the same
CN1964531A (en) * 2006-01-24 2007-05-16 深圳市经纬科技有限公司 Mobile phone information remote inquiring method
CN101163347A (en) * 2007-11-21 2008-04-16 深圳华为通信技术有限公司 Method and equipment for remote control mobile terminal
CN102316223A (en) * 2011-09-30 2012-01-11 惠州Tcl移动通信有限公司 Processing method for mobile phone unread information and mobile phone
CN105472156A (en) * 2015-12-08 2016-04-06 努比亚技术有限公司 Incoming call reminding method and device
CN106412253A (en) * 2016-09-09 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Communication method, communication device and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021115220A1 (en) * 2019-12-13 2021-06-17 维沃移动通信有限公司 Information sharing method, electronic device and computer-readable storage medium

Similar Documents

Publication Publication Date Title
CN104144110B (en) The method and system of PUSH message
CN104683591A (en) Message disturbance-free method based on mobile terminal and mobile terminal using method
EP3035155A1 (en) Wearable device and data transmission method
CN105554291A (en) User reminding method and system
CN102801706A (en) Terminal and security processing method for information contents
CN104793725B (en) The processing method and processing device of alert notification message
CN104883294A (en) Data transmission control method and device
CN104375748A (en) Rapid terminal application program attribute setting method and corresponding terminal
CN103995997A (en) Method and equipment for distributing user rights
CN107704613A (en) A kind of approaches to IM, terminal and computer-readable recording medium
CN108847229A (en) A kind of information interacting method and terminal based on voice assistant
CN108347533A (en) A kind of message display and answering method and terminal
CN106027382A (en) Anti-leakage device and method and user terminal
CN103885827B (en) Automatically switch the method and intelligent terminal of operational mode
CN108304135A (en) A kind of method of adjustment and terminal of virtual modifier key
CN107846351A (en) A kind of chat messages sensitive information encryption method and device
CN106127034B (en) A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment
CN106971163A (en) One kind connects neck people recognition methods, device and system
CN108200283A (en) A kind of information processing method and terminal based on pattern of leaving behind
CN107835295A (en) A kind of item based reminding method and terminal based on application message
CN108243085A (en) Push, setting method and the device of communication group status indicator
CN108958585A (en) A kind of information displaying method and terminal device of chat interface
CN107831889A (en) The method and mobile terminal that a kind of information is sent
CN103813315A (en) Data protection method of mobile communication terminal
CN104932661A (en) Information prompt method and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180622

WD01 Invention patent application deemed withdrawn after publication