CN108200283A - A kind of information processing method and terminal based on pattern of leaving behind - Google Patents
A kind of information processing method and terminal based on pattern of leaving behind Download PDFInfo
- Publication number
- CN108200283A CN108200283A CN201711469929.9A CN201711469929A CN108200283A CN 108200283 A CN108200283 A CN 108200283A CN 201711469929 A CN201711469929 A CN 201711469929A CN 108200283 A CN108200283 A CN 108200283A
- Authority
- CN
- China
- Prior art keywords
- information
- terminal
- predetermined
- scheduled event
- pattern
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 11
- 230000010365 information processing Effects 0.000 title claims abstract description 10
- 238000000034 method Methods 0.000 claims abstract description 53
- 238000001514 detection method Methods 0.000 claims abstract description 17
- 238000012795 verification Methods 0.000 claims description 35
- 230000005540 biological transmission Effects 0.000 claims description 21
- 230000009471 action Effects 0.000 claims description 4
- 230000005484 gravity Effects 0.000 claims description 4
- 238000012546 transfer Methods 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- XEGGRYVFLWGFHI-UHFFFAOYSA-N bendiocarb Chemical compound CNC(=O)OC1=CC=CC2=C1OC(C)(C)O2 XEGGRYVFLWGFHI-UHFFFAOYSA-N 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000027455 binding Effects 0.000 description 1
- 238000009739 binding Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Information Transfer Between Computers (AREA)
Abstract
This application involves intelligent terminal technical field, more particularly to a kind of information processing method and terminal based on pattern of leaving behind, the method are applied to first terminal, the method includes:Obtain triggering command;Pattern is left behind based on triggering command triggering first terminal;It is described leave behind pattern under, detection first terminal whether scheduled event occurs;If scheduled event occurs, target information associated with the scheduled event is obtained;The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application transmits file;Above-mentioned technical proposal can allow user to learn some important informations, such as incoming information and short message in time by predetermined way in the case where user leaves behind terminal, further improve the usage experience of user, improve intelligence and the Humanization Level of Municipal of terminal.
Description
Technical field
This application involves intelligent terminal technical field, more particularly to a kind of information processing method and end based on pattern of leaving behind
End.
Background technology
With the continuous development of intelligent terminal technology, intelligent terminal gradually penetrates into the every aspect of user's life, user
The frequency that contact communication is carried out using intelligent terminal is also increasingly closer;At the same time, user is also further seeking for terminal
Intelligent level and Humanization Level of Municipal.
In actual life, the problem of user leaves behind terminal is frequently present of, may lead to not learn end due to leaving behind terminal
Some important informations on end, such as incoming information and short message, bad usage experience is brought to user, also affects terminal
Intelligence and Humanization Level of Municipal;Therefore, how in the case where user leaves behind terminal, user is allowed to learn some important letters in time
Breath, such as incoming information and short message are the technical issues of terminal first having are badly in need of solving.
Invention content
The purpose of the application is to provide a kind of information processing method and terminal based on pattern of leaving behind, can pass through predetermined party
Formula allows user to learn some important informations, such as incoming information and short message in time, further in the case where user leaves behind terminal
Improve the usage experience of user, improve intelligence and the Humanization Level of Municipal of terminal.
To solve the above problems, the first aspect of the application provides a kind of information processing method based on pattern of leaving behind,
Applied to first terminal, the method includes:
Obtain triggering command;
Pattern is left behind based on triggering command triggering first terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application passes
Defeated file.
As an alternative embodiment, before triggering command is obtained, the method further includes:
Specified one has the application of information transfer capability as intended application;
By the intended application, the data transmission relations of first terminal and second terminal are established.
As an alternative embodiment, the method for obtaining triggering command includes:
Verification information and/or user that the predetermined contact person in intended application sends are detected by second terminal to the mesh
The verification information of the upper predetermined network transmission portfolios of mark application;
Judge whether the verification information is predetermined information;
If the verification information is predetermined information, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
Judge whether the verification information is that the method for predetermined information includes as an alternative embodiment, described:
Parsing identifies the text information included in the verification information and/or voice messaging and authentication information;
Whether the content for judging the text information and/or voice messaging is predetermined content;
If the content of the text information and/or voice messaging is predetermined content, the identity is further judged
Whether verification information is predetermined identity information;
If the authentication information is predetermined identity information, judge the verification information for predetermined information.
As an alternative embodiment, the method for obtaining triggering command includes:
Detect the state of first terminal;
Judge to whether there is contact action within a predetermined period of time or whether have gravity sensing signal;
If in the presence of the triggering command for triggering pattern of leaving behind is not generated;
If being not present, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
As an alternative embodiment, the method whether the detection first terminal occurs scheduled event includes:
It is described leave behind pattern under,
Detect whether people's incoming call of being related;
If the people that is related sends a telegram here, judge scheduled event occurs.
As an alternative embodiment, the method whether the detection first terminal occurs scheduled event further includes:
It is described leave behind pattern under,
Unread short messages are detected whether;
If there are unread short messages, judge scheduled event occurs.
As an alternative embodiment, the method packet for obtaining target information associated with the scheduled event
It includes:
When detecting that the people that is related sends a telegram here, tone information function is opened;
Obtain the tone information of the contact person of incoming call;With the number and name information of the contact person.
As an alternative embodiment, the method packet for obtaining target information associated with the scheduled event
It includes:
Identify the content of unread short messages;
Based on the content of the unread short messages, the classification of the unread short messages is judged;
If the classification of the unread short messages is non-junk short message or the short message of predetermined severity level, the interior of the short message is obtained
Hold.
As an alternative embodiment, the intended application is applied for wechat or QQ applications;
The predetermined network transmits file:Wechat is applied or QQ is using the file on upper file transmission assistant.
According to further aspect of the application, embodiments herein additionally provides a kind of terminal, and the terminal is configured
It is at least to perform following operation:
Obtain triggering command;
Pattern is left behind based on the triggering command triggering terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application passes
Defeated file.
The above-mentioned technical proposal of the application is by when user leaves behind terminal, taking triggering command so that terminal triggering is gone forward side by side
Enter to leave behind pattern;It is described leave behind pattern under, detect some important informations (i.e. target information), such as incoming information and short message;
Then incoming information and short message etc. are sent to by preset intended application predetermined on predetermined contact person and/or intended application
Network transmission file;User only needs to log in the intended application in another terminal, you can gets target information;So as to real
Now user is helped to learn some important informations (i.e. target information), such as the purpose of incoming information and short message in time, further changed
It has been apt to the usage experience of user, has improved intelligence and the Humanization Level of Municipal of terminal;And it is to utilize the mesh in existing terminal
Mark application (such as wechat application, QQ applications) can be realized, and save cost of implementation.
Description of the drawings
Fig. 1 is the schematic flow chart for the information processing method based on pattern of leaving behind that embodiments herein provides;
Fig. 2 is the method for the data transmission relations for establishing first terminal and second terminal that embodiments herein provides
Schematic flow chart;
Fig. 3 is the schematic flow chart of the method for the acquisition triggering command that embodiments herein provides;
Fig. 4 be embodiments herein provide judge the verification information whether be predetermined information method it is schematic
Flow chart;
Fig. 5 is the schematic flow chart of the method for acquisition triggering command that another embodiment of the application provides.
Specific embodiment
Purpose, technical scheme and advantage to make the application are of greater clarity, With reference to embodiment and join
According to attached drawing, the application is further described.It should be understood that these descriptions are merely illustrative, and it is not intended to limit this Shen
Range please.In addition, in the following description, the description to known features and technology is omitted, to avoid this is unnecessarily obscured
The concept of application.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can
Understand and consistently understand the application.Therefore, for those skilled in the art, it will be understood that provide the various implementations to the application
It is the purpose rather than limitation appended claims and its application of Equivalent definitions illustrated that the description of example, which is only,.
Below in conjunction with the attached drawing in the application some embodiments, the technical solution in the embodiment of the present application is carried out clear
Chu is fully described by, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.
Based on the embodiment in the application, what those of ordinary skill in the art were obtained without making creative work is all
Other embodiment shall fall in the protection scope of this application.
It should be noted that the term used in the embodiment of the present application is only merely for the mesh of description specific embodiment
, and it is not intended to be limiting the application." one " of the embodiment of the present application and singulative used in the attached claims,
"one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other meanings.Also
It should be appreciated that term "and/or" used herein refers to and list items purposes comprising one or more mutually bindings are any
Or all possible combinations.Expression " first ", " second ", " first " and " second " be for modify respective element without
Consideration sequence or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.Under in addition,
Involved technical characteristic as long as they do not conflict with each other can phase in the described the application different embodiments in face
Mutually combine.
For the clearer each attached drawing of description, in various figures, different labels is given for same step.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone,
PC (PC, such as tablet computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book
Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device
(VR) and the combination of one or more of wearable device etc..According to some embodiments of the present application, the wearable device
It can include type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics
Clothes), decorated type (such as pad skin, tatoo or built in electronic device) etc. or several combinations.In some realities of the application
It applies in example, the electronic equipment can be flexible, be not limited to above equipment or can be one kind in above-mentioned various equipment
Or several combination.In this application, term " user " can be indicated using the people of electronic equipment or setting using electronic equipment
Standby (such as artificial intelligence electronic equipment).
Below in conjunction with attached drawing, it is described in detail according to the sequence of Fig. 1 to Fig. 5.
Fig. 1 (i.e. shown in attached drawing 100) is please referred to, Fig. 1 is the letter based on pattern of leaving behind that embodiments herein provides
Cease the schematic flow chart of processing method;
As shown in Figure 1, embodiments herein provides a kind of information processing method based on pattern of leaving behind, applied to
One terminal, the method includes:
Step S101:Obtain triggering command;
Step S102:Pattern is left behind based on triggering command triggering first terminal;
It is described leave behind pattern under,
Step S103:Whether detection first terminal occurs scheduled event;
If scheduled event occurs, S103 is entered step:Obtain target information associated with the scheduled event;
Step S104:The target information is sent in predetermined contact person and/or the intended application in intended application
Predetermined network transmits file;
Wherein, if scheduled event does not occur, target information associated with the scheduled event is not obtained, i.e. in Fig. 1
Shown step S106.
By when user leaves behind terminal, taking triggering command so that terminal triggers and enters the pattern of leaving behind;It is left behind described
Under pattern, some important informations (i.e. target information), such as incoming information and short message are detected;Then by incoming information and short message etc.
The predetermined network being sent to by preset intended application on predetermined contact person and/or intended application transmits file;User is only
It needs to log in the intended application in another terminal, you can get target information;One is learnt in time so as to fulfill user is helped
A little important informations (i.e. target information), such as the purpose of incoming information and short message, further improve the usage experience of user, carry
The intelligence of high terminal and Humanization Level of Municipal
Please refer to Fig. 2 (i.e. shown in attached drawing 200), Fig. 2 be embodiments herein provide establish first terminal and the
The schematic flow chart of the method for the data transmission relations of two terminals;
Before triggering command is obtained, the step of further including the data transmission relations for establishing first terminal and second terminal;
As shown in Fig. 2, the method includes:
Step S201:Specified one has the application of information transfer capability as intended application;
Step S202:By the intended application, the data transmission relations of first terminal and second terminal are established.
Wherein, it should be noted that intended application can utilize installed social networking application on first terminal, as QQ should
With, wechat application etc.;First terminal is established in addition, described herein and the data transmission relations of second terminal refer to first terminal
It can realize that information sharing, information are transmitted by intended application (such as QQ applications, wechat application) with second terminal.
Fig. 3 (i.e. shown in attached drawing 300) is please referred to, Fig. 3 is the side for the acquisition triggering command that embodiments herein provides
The schematic flow chart of method;
As shown in figure 3, the method for obtaining triggering command includes:
Step S301:Verification information and/or the user for detecting the predetermined contact person transmission in intended application are whole by second
The predetermined network in the intended application is held to transmit the verification information of portfolios;
Step S302:Judge whether the verification information is predetermined information;
If the verification information is predetermined information, S303 is entered step:Generation refers to for triggering the triggering for pattern of leaving behind
It enables;
Step S304:Obtain the triggering command of generation.
Wherein, if the verification information is not predetermined information, the triggering command for triggering pattern of leaving behind is not generated, i.e.,
Step S305 shown in Fig. 3.
Wherein, it should be noted that the predetermined information can be User Defined setting, such as " I'm it is sorry, you are fallen
", " sorry is forgotten with you " etc.;These predetermined informations can be speech form or written form,
Can be graphic form or picture and text combining form.
Such as:User logs in intended application, contact person or network transmission file in intended application in second terminal
Folder is sent " sorry, you are fallen ";First terminal can log in intended application detection receive sent by second terminal " to not
Rise, you fallen " this information;Then it identifies that user forgets band first terminal, and then generates triggering command triggering first
Terminal leaves behind pattern.
Fig. 4 (i.e. shown in attached drawing 400) is please referred to, Fig. 4 is the judgement verification information that embodiments herein provides
Whether be predetermined information method schematic flow chart;
Judge whether the verification information is that the method for predetermined information includes as shown in figure 4, described:
Step S401:Parsing identifies the text information included in the verification information and/or voice messaging and authentication
Information;
Step S402:Whether the content for judging the text information and/or voice messaging is predetermined content;
If the content of the text information and/or voice messaging is predetermined content, S403 is entered step:Further
Judge whether the authentication information is predetermined identity information;
If the authentication information is predetermined identity information, S404 is entered step:It is pre- to judge the verification information
Determine information.
Wherein, if the content of the text information and/or voice messaging is not predetermined content or the authentication
Information is not predetermined identity information, then it is not predetermined information to judge the verification information;Step S405 i.e. shown in Fig. 4.
Fig. 5 (i.e. shown in attached drawing 500) is please referred to, Fig. 5 is the acquisition triggering command that another embodiment of the application provides
Method schematic flow chart;
As shown in figure 4, the method for obtaining triggering command includes:
Step S501:Detect the state of first terminal;
Step S502:Judge to whether there is contact action within a predetermined period of time or whether have gravity sensing signal;
If in the presence of S503 is entered step:The triggering command for triggering pattern of leaving behind is not generated;
If being not present, S504 is entered step:The triggering command of pattern is left behind in generation for triggering;
Step S505:Obtain the triggering command of generation.
As a kind of optional embodiment, the method whether the detection first terminal occurs scheduled event includes:
It is described leave behind pattern under,
Detect whether people's incoming call of being related;
If the people that is related sends a telegram here, judge scheduled event occurs.
As a kind of optional embodiment, the method whether the detection first terminal occurs scheduled event further includes:
It is described leave behind pattern under,
Unread short messages are detected whether;
If there are unread short messages, judge scheduled event occurs.
As a kind of optional embodiment, the method packet for obtaining target information associated with the scheduled event
It includes:
When detecting that the people that is related sends a telegram here, tone information function is opened;
Obtain the tone information of the contact person of incoming call;With the number and name information of the contact person.
As a kind of optional embodiment, the method packet for obtaining target information associated with the scheduled event
It includes:
Identify the content of unread short messages;
Based on the content of the unread short messages, the classification of the unread short messages is judged;
If the classification of the unread short messages is non-junk short message or the short message of predetermined severity level, the interior of the short message is obtained
Hold.
As a kind of optional embodiment, the intended application is applied for wechat or QQ applications;
The predetermined network transmits file:Wechat is applied or QQ is using the file on upper file transmission assistant.
It should be noted that second terminal wechat application can be logged in by account number cipher or QQ is applied, then by disappearing
The mode that breath is sent or file uploads is applied to wechat or the file transmission assistant of QQ applications sends predetermined information, such as " to not
It rises, you is fallen ";Then whether there is new letter on the file transmission assistant of the application of first terminal detection wechat or QQ applications
Breath;Then it carries out obtaining identification information content;If the information content is such as predetermined informations such as " sorry, you are fallen ", you can
Triggering first terminal leaves behind pattern.It is of course also possible to it is to send predetermined information by way of predetermined contact person;Such as:Second
Terminal is with second user identity logs intended application;First terminal is with the first user identity Deng Li intended applications;First user's body
Part and second user identity are mutually good friend contact person in intended application;Second user identity be may specify as legal identity,
It is sent when with second user identity by first object identity of the intended application on first terminal as " let down, you being fallen
" etc. predetermined informations, you can that triggers first terminal leaves behind pattern.
In addition, by then passing through the social networking applications such as wechat application or QQ applications, user logs in and sends message and is required for leading to
The verification of account password is crossed, safety is higher;Ensure safety;
Simultaneously as authentication information of the user by second terminal typing is further included in predetermined information, it can be further
Improve security performance.
In order to which above-mentioned technical proposal is better achieved, embodiments herein additionally provides a kind of terminal, the terminal quilt
It is configured at least perform following operate:
Obtain triggering command;
Pattern is left behind based on the triggering command triggering terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application passes
Defeated file.
As a kind of optional embodiment, before triggering command is obtained, the terminal is configured as at least performing following
Operation:
Specified one has the application of information transfer capability as intended application;
By the intended application, the data transmission relations of first terminal and second terminal are established.
As a kind of optional embodiment, when obtaining triggering command, the terminal is configured as at least performing following grasp
Make:
Verification information and/or user that the predetermined contact person in intended application sends are detected by second terminal to the mesh
The verification information of the upper predetermined network transmission portfolios of mark application;
Judge whether the verification information is predetermined information;
If the verification information is predetermined information, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
As a kind of optional embodiment, when whether judge the verification information is predetermined information, the terminal by with
It is set to and at least performs following operate:
Parsing identifies the text information included in the verification information and/or voice messaging and authentication information;
Whether the content for judging the text information and/or voice messaging is predetermined content;
If the content of the text information and/or voice messaging is predetermined content, the identity is further judged
Whether verification information is predetermined identity information;
If the authentication information is predetermined identity information, judge the verification information for predetermined information.
As a kind of optional embodiment, when obtaining triggering command, the terminal is configured as at least performing following grasp
Make:
Detect the state of first terminal;
Judge to whether there is contact action within a predetermined period of time or whether have gravity sensing signal;
If in the presence of the triggering command for triggering pattern of leaving behind is not generated;
If being not present, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
As a kind of optional embodiment, when whether detection first terminal occurs scheduled event, the terminal is configured
It is at least to perform following operation:
It is described leave behind pattern under,
Detect whether people's incoming call of being related;
If the people that is related sends a telegram here, judge scheduled event occurs.
As a kind of optional embodiment, when whether detection first terminal occurs scheduled event, the terminal is configured
It is at least to perform following operation:
It is described leave behind pattern under,
Unread short messages are detected whether;
If there are unread short messages, judge scheduled event occurs.
As a kind of optional embodiment, when obtaining target information associated with the scheduled event, the terminal
It is configured as at least performing following operate:
When detecting that the people that is related sends a telegram here, tone information function is opened;
Obtain the tone information of the contact person of incoming call;With the number and name information of the contact person.
As a kind of optional embodiment, when obtaining target information associated with the scheduled event, the terminal
It is configured as at least performing following operate:
Identify the content of unread short messages;
Based on the content of the unread short messages, the classification of the unread short messages is judged;
If the classification of the unread short messages is non-junk short message or the short message of predetermined severity level, the interior of the short message is obtained
Hold.
As a kind of optional embodiment, the intended application is applied for wechat or QQ applications;
The predetermined network transmits file:Wechat is applied or QQ is using the file on upper file transmission assistant.
The application is intended to protect a kind of information processing method and terminal based on pattern of leaving behind;By leaving behind terminal in user
When, take triggering command so that terminal triggers and enters the pattern of leaving behind;It is described leave behind pattern under, detect some important informations (i.e.
Target information), such as incoming information and short message;Then incoming information and short message etc. are sent to by preset intended application pre-
Determine the predetermined network transmission file in contact person and/or intended application;User only needs to log in the target in another terminal
Using, you can get target information;Some important informations (i.e. target information), Tathagata are learnt in time so as to fulfill user is helped
The purpose of power information and short message etc. further improves the usage experience of user, improves the intelligence of terminal and hommization water
It is flat;And can be realized using the intended application (such as wechat application, QQ applications) in existing terminal, it has saved and has been implemented as
This.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can
To carry out various change.
It should be noted that in the present specification, term " comprising ", "comprising" or its any other variant are intended to
Non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only will including those
Element, but also including other elements that are not explicitly listed or further include as this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
Also there are other identical elements in process, method, article or equipment including the element.Finally, it is also necessary to explanation
That a series of above-mentioned processing not only include the processing that is performed in temporal sequence with sequence described here, and including parallel or
The processing respectively rather than in chronological order performed.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
It is completed by the relevant hardware of computer program instructions, the program can be stored in a computer readable storage medium,
The program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic disc,
CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM)
Deng.
It should be understood that the above-mentioned specific embodiment of the application is used only for exemplary illustration or explains the application's
Principle, without forming the limitation to the application.Therefore, that is done in the case of without departing from spirit and scope is any
Modification, equivalent replacement, improvement etc., should be included within the protection domain of the application.In addition, the application appended claims purport
Covering the whole variations fallen into scope and boundary or this range and the equivalent form on boundary and repairing
Change example.
Claims (10)
1. a kind of information processing method based on pattern of leaving behind, which is characterized in that applied to first terminal, the method includes:
Obtain triggering command;
Pattern is left behind based on triggering command triggering first terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application transmits text
Part presss from both sides.
2. according to the method described in claim 1, it is characterized in that, before triggering command is obtained, the method further includes:
Specified one has the application of information transfer capability as intended application;
By the intended application, the data transmission relations of first terminal and second terminal are established.
3. according to the method described in claim 2, it is characterized in that, the method for obtaining triggering command includes:
The verification information and/or user for detecting the predetermined contact person transmission in intended application should to the target by second terminal
The verification information of predetermined network transmission portfolios used;
Judge whether the verification information is predetermined information;
If the verification information is predetermined information, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
4. according to the method described in claim 3, it is characterized in that, described judge whether the verification information is predetermined information
Method includes:
Parsing identifies the text information included in the verification information and/or voice messaging and authentication information;
Whether the content for judging the text information and/or voice messaging is predetermined content;
If the content of the text information and/or voice messaging is predetermined content, the authentication is further judged
Whether information is predetermined identity information;
If the authentication information is predetermined identity information, judge the verification information for predetermined information.
5. according to the method described in claim 2, it is characterized in that, the method for obtaining triggering command includes:
Detect the state of first terminal;
Judge to whether there is contact action within a predetermined period of time or whether have gravity sensing signal;
If in the presence of the triggering command for triggering pattern of leaving behind is not generated;
If being not present, the triggering command of pattern is left behind in generation for triggering;
Obtain the triggering command of generation.
6. according to the method described in claim 1, it is characterized in that, whether the detection first terminal occurs the side of scheduled event
Method includes:
It is described leave behind pattern under,
Detect whether people's incoming call of being related;
If the people that is related sends a telegram here, judge scheduled event occurs.
7. according to the method described in claim 6, it is characterized in that, whether the detection first terminal occurs the side of scheduled event
Method further includes:
It is described leave behind pattern under,
Unread short messages are detected whether;
If there are unread short messages, judge scheduled event occurs.
8. according to the method described in claim 6, it is characterized in that, described obtain target letter associated with the scheduled event
The method of breath includes:
When detecting that the people that is related sends a telegram here, tone information function is opened;
Obtain the tone information of the contact person of incoming call;With the number and name information of the contact person.
9. the method according to the description of claim 7 is characterized in that described obtain target letter associated with the scheduled event
The method of breath includes:
Identify the content of unread short messages;
Based on the content of the unread short messages, the classification of the unread short messages is judged;
If the classification of the unread short messages is non-junk short message or the short message of predetermined severity level, the content of the short message is obtained.
10. a kind of terminal, which is characterized in that the terminal is configured as at least performing following operate:
Obtain triggering command;
Pattern is left behind based on the triggering command triggering terminal;
It is described leave behind pattern under,
Whether detection first terminal occurs scheduled event;
If scheduled event occurs, target information associated with the scheduled event is obtained;
The predetermined network target information being sent in predetermined contact person and/or the intended application in intended application transmits text
Part presss from both sides.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711469929.9A CN108200283A (en) | 2017-12-29 | 2017-12-29 | A kind of information processing method and terminal based on pattern of leaving behind |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711469929.9A CN108200283A (en) | 2017-12-29 | 2017-12-29 | A kind of information processing method and terminal based on pattern of leaving behind |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108200283A true CN108200283A (en) | 2018-06-22 |
Family
ID=62586095
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711469929.9A Pending CN108200283A (en) | 2017-12-29 | 2017-12-29 | A kind of information processing method and terminal based on pattern of leaving behind |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108200283A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021115220A1 (en) * | 2019-12-13 | 2021-06-17 | 维沃移动通信有限公司 | Information sharing method, electronic device and computer-readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1964531A (en) * | 2006-01-24 | 2007-05-16 | 深圳市经纬科技有限公司 | Mobile phone information remote inquiring method |
CN101163347A (en) * | 2007-11-21 | 2008-04-16 | 深圳华为通信技术有限公司 | Method and equipment for remote control mobile terminal |
EP2187606A1 (en) * | 2004-08-06 | 2010-05-19 | Fujitsu Limited | Terminal device, message display method and program for the same |
CN102316223A (en) * | 2011-09-30 | 2012-01-11 | 惠州Tcl移动通信有限公司 | Processing method for mobile phone unread information and mobile phone |
CN105472156A (en) * | 2015-12-08 | 2016-04-06 | 努比亚技术有限公司 | Incoming call reminding method and device |
CN106412253A (en) * | 2016-09-09 | 2017-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Communication method, communication device and terminal |
-
2017
- 2017-12-29 CN CN201711469929.9A patent/CN108200283A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2187606A1 (en) * | 2004-08-06 | 2010-05-19 | Fujitsu Limited | Terminal device, message display method and program for the same |
CN1964531A (en) * | 2006-01-24 | 2007-05-16 | 深圳市经纬科技有限公司 | Mobile phone information remote inquiring method |
CN101163347A (en) * | 2007-11-21 | 2008-04-16 | 深圳华为通信技术有限公司 | Method and equipment for remote control mobile terminal |
CN102316223A (en) * | 2011-09-30 | 2012-01-11 | 惠州Tcl移动通信有限公司 | Processing method for mobile phone unread information and mobile phone |
CN105472156A (en) * | 2015-12-08 | 2016-04-06 | 努比亚技术有限公司 | Incoming call reminding method and device |
CN106412253A (en) * | 2016-09-09 | 2017-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Communication method, communication device and terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021115220A1 (en) * | 2019-12-13 | 2021-06-17 | 维沃移动通信有限公司 | Information sharing method, electronic device and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104144110B (en) | The method and system of PUSH message | |
CN104683591A (en) | Message disturbance-free method based on mobile terminal and mobile terminal using method | |
EP3035155A1 (en) | Wearable device and data transmission method | |
CN105554291A (en) | User reminding method and system | |
CN102801706A (en) | Terminal and security processing method for information contents | |
CN104793725B (en) | The processing method and processing device of alert notification message | |
CN104883294A (en) | Data transmission control method and device | |
CN104375748A (en) | Rapid terminal application program attribute setting method and corresponding terminal | |
CN103995997A (en) | Method and equipment for distributing user rights | |
CN107704613A (en) | A kind of approaches to IM, terminal and computer-readable recording medium | |
CN108847229A (en) | A kind of information interacting method and terminal based on voice assistant | |
CN108347533A (en) | A kind of message display and answering method and terminal | |
CN106027382A (en) | Anti-leakage device and method and user terminal | |
CN103885827B (en) | Automatically switch the method and intelligent terminal of operational mode | |
CN108304135A (en) | A kind of method of adjustment and terminal of virtual modifier key | |
CN107846351A (en) | A kind of chat messages sensitive information encryption method and device | |
CN106127034B (en) | A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment | |
CN106971163A (en) | One kind connects neck people recognition methods, device and system | |
CN108200283A (en) | A kind of information processing method and terminal based on pattern of leaving behind | |
CN107835295A (en) | A kind of item based reminding method and terminal based on application message | |
CN108243085A (en) | Push, setting method and the device of communication group status indicator | |
CN108958585A (en) | A kind of information displaying method and terminal device of chat interface | |
CN107831889A (en) | The method and mobile terminal that a kind of information is sent | |
CN103813315A (en) | Data protection method of mobile communication terminal | |
CN104932661A (en) | Information prompt method and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180622 |
|
WD01 | Invention patent application deemed withdrawn after publication |