CN108833673B - Method, apparatus, hardware apparatus and medium for restricting user operation - Google Patents

Method, apparatus, hardware apparatus and medium for restricting user operation Download PDF

Info

Publication number
CN108833673B
CN108833673B CN201810437920.8A CN201810437920A CN108833673B CN 108833673 B CN108833673 B CN 108833673B CN 201810437920 A CN201810437920 A CN 201810437920A CN 108833673 B CN108833673 B CN 108833673B
Authority
CN
China
Prior art keywords
area
terminal
time period
user
terminals
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810437920.8A
Other languages
Chinese (zh)
Other versions
CN108833673A (en
Inventor
夏翼
陈文伟
王霖
张奇
万庆徽
王小雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Microlive Vision Technology Co Ltd
Original Assignee
Beijing Microlive Vision Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Microlive Vision Technology Co Ltd filed Critical Beijing Microlive Vision Technology Co Ltd
Priority to CN201810437920.8A priority Critical patent/CN108833673B/en
Publication of CN108833673A publication Critical patent/CN108833673A/en
Application granted granted Critical
Publication of CN108833673B publication Critical patent/CN108833673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72451User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications

Abstract

The invention discloses a method, a device, a hardware device and a medium for limiting user operation. The method comprises the steps that a first area is generated on the terminal at the starting time of a first preset time period, and the first area covers all or part of a terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; wherein, at least two terminals in the plurality of terminals generate different sending information in the predetermined times of operations in the first area, but the sending information meets the verification requirement. Therefore, the operation of some users is avoided from being actually the operation of the same person at the same time, and the habit or the behavior of the user is more accurately known.

Description

Method, apparatus, hardware apparatus and medium for restricting user operation
Technical Field
The present invention relates to the field of computer technology, and more particularly, to a method, an apparatus, a hardware apparatus, and a medium for restricting user operations.
Background
With the development of living standards and smart phone technologies, smart phones become an indispensable part of people's daily life, and more people use smart phones.
The merchant side or the internet platform side meets the requirement, so that the client side limits the operation of the user.
Disclosure of Invention
In order to solve the problems in the prior art, an aspect of the present invention provides a method for limiting user operations, including: generating a first area on the terminal at the starting time of a first preset time period, wherein the first area covers all or part of a terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; wherein, at least two terminals in the plurality of terminals generate different sending information in the predetermined times of operations in the first area, but the sending information meets the verification requirement.
Another aspect of the present invention provides an apparatus for restricting a user operation, including: the terminal comprises a first generating module, a second generating module and a display module, wherein the first generating module is used for generating a first area on the terminal at the starting time of a first preset time period, and the first area covers all or part of a terminal screen; the first locking module is used for locking any operation in the first area after receiving the operation for the preset times performed by the user in the first area within a first preset time period; the second generation module is used for generating a second area in a second preset time period and enabling the first area to disappear if the sending information generated based on the operation of the preset times meets the verification requirement; wherein, at least two terminals in the plurality of terminals generate different sending information in the predetermined times of operations in the first area, but the sending information meets the verification requirement.
Yet another aspect of the present invention provides a hardware apparatus, comprising: a processor and a memory for storing executable instructions of the processor; wherein the processor is configured to: the above method is performed.
Yet another aspect of the present invention provides a computer readable storage medium having stored thereon at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by a processor to implement the above method.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
generating a first area in the terminal within a first preset time period, wherein the first area covers all or part of a terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; the method comprises the steps that at least two terminals in a plurality of terminals generate different sending information according with the verification requirements, wherein the sending information generated by the operations performed in the first area for the preset times is different, the operations received by the terminals operated by a plurality of users in the first preset time period can be effectively verified, the operations of different terminals are avoided being actually performed by the same user at the same time, the operations of all the users are performed under the equal and fair conditions, and meanwhile, the habits or behaviors of people using the users can be known more accurately through the operations of the users.
Drawings
Fig. 1 is a flowchart illustrating a method for limiting user operations according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating another method for limiting user operations according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a further method for limiting user operations according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for restricting user operations according to another embodiment of the present invention;
FIG. 5 is a flowchart illustrating a further method for limiting user operations according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a further method for restricting user operations according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of an apparatus for limiting user operations according to an embodiment of the present invention;
FIG. 8 is a schematic structural diagram of another apparatus for limiting user operations according to an embodiment of the present invention;
FIG. 9 is a schematic structural diagram of another apparatus for limiting user operations according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a hardware device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Referring to fig. 1, an embodiment of the present invention provides a method for limiting user operations, which includes the following steps:
step 101, generating a first area on the terminal within the starting time of a first predetermined time period, wherein the first area covers all or part of the terminal screen.
And step 102, after receiving the operation of the user for the preset times in the first area within the first preset time period, locking any operation of the first area, wherein the sending information generated by the operation of the preset times in the first area by at least two terminals in the plurality of terminals is different but meets the verification requirement.
Step 103, if the transmission information generated based on the predetermined number of operations meets the verification requirement, a second area is generated in the terminal within a second predetermined time, and the first area disappears.
On the basis of the foregoing embodiment, as an optional embodiment, after the terminal generates the second area within the second predetermined time, the method further includes: and locking any operation in the second area after receiving the operation performed by the user for the predetermined times in the second predetermined time.
On the basis of the above embodiment, as an optional embodiment, after receiving a predetermined number of operations performed by the user in the first area within a first predetermined time period, locking in the first area after any operation, and before generating the second area by the terminal within a second predetermined time period, the method further includes: and generating a third area in the terminal within a third preset time, locking any operation in the third area, displaying a verification result whether the sending information generated based on the operation for a preset number of times meets the verification requirement in the third area, and disappearing the first area.
On the basis of the above embodiment, as an optional embodiment, after the first area receives a predetermined number of operations performed by the user within a first predetermined time period, and after any operation of locking in the first area, the method further includes: and if the transmission information generated based on the operation for the preset times does not meet the verification requirement, not receiving the operation of the user.
On the basis of the foregoing embodiment, as an optional embodiment, after the first area is generated on the terminal at the start time of the first predetermined time period, the method further includes: and displaying the identifier added to the first area in the first area.
The method provided by the embodiment of the invention generates a first area at the terminal by the starting time of a first preset time period, wherein the first area covers all or part of the terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; the method comprises the steps that at least two terminals in a plurality of terminals generate different sending information according with the verification requirements, wherein the sending information generated by the operations performed in the first area for the preset times is different, the operations received by the terminals operated by a plurality of users in the first preset time period can be effectively verified, the operations of different terminals are avoided being actually performed by the same user at the same time, the operations of all the users are performed under the equal and fair conditions, and meanwhile the habits or behaviors of the users can be known more accurately through the operations of the users.
The embodiment of the present invention provides a method for limiting user operations, which combines the contents of the first embodiment, with reference to fig. 2, and the method flow is as follows:
in step 201, a plurality of terminals generate a first area on each terminal at the starting time of a first predetermined time period, and the first area covers all or part of the terminal screen.
Specifically, after the user runs an APP (Application) installed on the terminal, a click operation is applied at a start button, thereby sending a request to the service module. The terminal receives a first instruction sent by the service module in response to the request, and then generates the first area at the starting time of the first preset time period, so that even if the request time sent by a certain user is different from that of other users, all the users can generate the first area at the same starting time. The first region is always displayed for a first predetermined period of time. The first area can be suspended on a desktop of the terminal, and can also be suspended on an interface displayed by the APP, and the interface is used as a background of the first area. The information displayed on the interface may be dynamic information, such as video, or static information, such as text, which is not limited in this embodiment. Preferably, the first area covers part of the desktop or the interface, so that the content which is interesting to the user or the content sent by other users or pushed by the service module can be displayed on other parts of the desktop or the interface. The first predetermined time period may be 10 seconds, and the first area is always displayed within 10 seconds, in other embodiments, the first predetermined time period may also be 12 seconds, which is not limited in this embodiment. The service module may be a server.
Step 202, after the plurality of terminals respectively generate a first area within a first preset time period and receive operations of a user for a preset number of times, any operation of the first area is locked and sending information is generated based on the operations for the preset number of times, and at least two terminals in the plurality of terminals generate different sending information based on the operations for the preset number of times and meet verification requirements.
Specifically, the user can perform operations in the first area within a first predetermined time period, the number of operations is a predetermined number of times, and when the user completes the predetermined number of operations, any operation in the first area is locked, and at this time, no operation can be performed in the first area any more. The operation of the user may be a single click operation, a double click operation, a scroll operation, or a combination of multiple operations, such as a combination of a click operation and a recording operation, which is not limited in this embodiment. The predetermined number of times may be one time, or may be a plurality of times, such as two times or three times. The first area is divided into a plurality of operation areas, each operation area corresponds to one content and the content is different, for example, the lower half part of the first area is divided into a first operation area, a second operation area and a third operation area from top to bottom in sequence, 3 operation areas are distinguished, and when the operation areas correspond to three contents, the three operation areas correspond to the three contents. The correspondence relationship between the operation area of at least one of the two terminals among the plurality of terminals and the content is as follows: the first operation area corresponds to the first content, the second operation area corresponds to the second content, and the third operation area corresponds to the third content. The correspondence relationship between the operation area and the content of the other terminal of the at least two terminals among the plurality of terminals is as follows: the first operation area corresponds to the fourth content, the second operation area corresponds to the second content, and the third operation area corresponds to the third content.
When the operation of the preset times is one time, presetting a verification rule: and the fourth content and the first content both accord with the verification requirement, the second content and the third content do not accord with the verification requirement, a user completes one operation in the first operation area of the terminal, and then the sending information is generated based on the operation, wherein the sending information comprises the first content. And the other user completes one operation in the first operation area on the other terminal, and then generates sending information based on the operation, wherein the sending information comprises fourth content, so that the sending information is different and meets the verification requirement. When the predetermined number of operations is multiple times, the preset validation rule is a combination sequence of different contents, and the number of times is two, the preset validation rule may be: the first content is in front of the second content, the second content is in front of the fourth content, and the second content is in back of the second content, the first content, the second content and the third content and other combination sequences of the fourth content, the second content and the third content do not meet the verification requirements, a user firstly completes one operation in a first operation area on the terminal, and then completes one operation in a second operation area, and then the sending information is generated based on the two operations, wherein the sending information comprises the first content and the second content. And the other user completes one operation in the first operation area on the other terminal and then completes one operation in the second operation area, and then the sending information is generated based on the two operations and comprises the fourth content and the second content, so that the sending information is different and meets the verification requirements.
In step 203, if the transmission information generated based on the predetermined number of operations performed on the first area meets the verification requirement, the terminal meeting the verification requirement in the second predetermined time period generates a second area, and the first area disappears.
Specifically, after each terminal sends information, the service module verifies the received sent information according to a preset verification rule, judges whether the received sent information meets the verification requirement, and if the received sent information meets the verification requirement, sends a second instruction to the terminal corresponding to the sent information meeting the verification requirement, so that a second area is generated in the terminal within a second preset time period, and the first area disappears. The second area covers the terminal screen in whole or in part. For the setting position of the second area on the terminal, reference may be made to the above description about the first area, and details are not repeated here.
In order to enhance the experience of the user and to know whether the own operation meets the verification requirement, after step 202 and before step 203, referring to fig. 3, the method further includes:
and step 204, generating a third area in the terminal within a third preset time period, locking any operation in the third area, displaying a verification result whether the sending information generated based on the operation for a preset number of times meets the verification requirement in the third area, and eliminating the first area.
Specifically, after each terminal sends information, the service module verifies the received sent information according to a preset verification rule, judges whether the received sent information meets the verification requirement or not to obtain a verification result, generates a third instruction according to the verification result, enables a third area to be generated in the terminal within a third preset time period, locks any operation in the third area, displays the verification result, namely informs a user using the terminal, and the first area disappears.
In order to facilitate the user meeting the authentication requirement to continue the operation as in the first area, referring to fig. 4, after the terminal generates the second area within the second predetermined time period, the method further comprises:
and step 205, after receiving the operation performed by the user for the preset times in the second area in the second preset time period, locking any operation in the second area.
Specifically, the processing manner of this step may refer to the related description of step 202 in the above embodiment, and is not described herein again.
To facilitate screening users to disable continued operation by users that do not meet the authentication requirements, after step 202, referring to fig. 5, the method further comprises:
step 206, determining whether the transmission information generated by the predetermined number of operations performed on the first area meets the verification requirement, if yes, executing step 203, otherwise executing step 207,
in step 207, if the transmission information generated based on the predetermined number of operations performed on the first area does not meet the verification requirement, the user operation is not received.
Specifically, if the transmission information generated based on the predetermined number of operations does not meet the verification requirement, the terminal may generate a second area within a second predetermined time, the first area disappears, and any operation of locking the second area within the second predetermined time is performed, and at this time, the operation of the user is not received; and the program can also be quitted, so that the user can not operate, namely, the operation of not receiving the user is realized.
In order to attract a user to operate at a terminal and improve the good experience of the user, before the user does not receive the operation of the user, the method further comprises the following steps: and judging whether the user has the permission to continue operating, if so, generating a second area and disappearing the first area in the terminal within a second preset time period, and locking any operation in the second area after receiving the operation of the user for a preset number of times in the second preset time period, otherwise, not receiving the operation of the user.
Due to the existence of such scenarios: at least two terminals generate different sending information in accordance with the verification requirement after performing the predetermined number of operations in the first area, and in order to avoid generating doubt without users, referring to fig. 6, after generating the first area on the terminal at the starting time of the first predetermined time period, the method further includes: the identifier added to the first area is displayed in the first area, step 208.
The method provided by the embodiment of the invention generates a first area on the terminal at the starting time of a first preset time period, wherein the first area covers all or part of a terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated by the terminal in second preset time, and the first area disappears; the method comprises the steps that at least two terminals in the plurality of terminals generate different sending information according to the verification requirements, wherein the sending information generated by the operation of the plurality of terminals for the preset times in the first area is different, the operation received by the plurality of terminals operated by the plurality of users in the first preset time period can be effectively verified, the operation of different terminals is avoided from being actually performed by the same user at the same time, the operation of all the users is performed under the equal and fair conditions, and meanwhile the habit or the behavior of the user can be known more accurately through the operation of the user.
Referring to fig. 7, an embodiment of the present invention provides an apparatus for limiting user operations, where the apparatus is configured to perform the method provided in the foregoing embodiment, and the method includes: a first generation module 301, a first locking module 302 and a second generation module 303.
Specifically, the first generating module 301 is configured to generate a first area on the terminal at a starting time of a first predetermined time period, where the first area covers all or part of the terminal screen.
The first locking module 302 is used for locking any operation of the first area after the first area receives the operation of the user for the preset times in the first preset time period;
the second generating module 303 is configured to generate a second area and a first area in the terminal within a second predetermined time period if the transmission information generated based on the predetermined number of operations meets the verification requirement, where at least two terminals in the plurality of terminals generate different transmission information but all of the transmission information generated by the predetermined number of operations performed in the first area meets the verification requirement.
As an alternative embodiment, referring to fig. 8, the apparatus further comprises: and a second locking module 304, configured to lock any operation performed in the second area after receiving the predetermined number of operations performed by the user in the second area within a second predetermined time period.
As an alternative embodiment, referring to fig. 9, the apparatus further comprises: a third generating module 305, configured to generate a third area in a third predetermined time period, lock any operation in the third area, display a verification result in the third area as to whether the transmission information generated based on the predetermined number of operations meets the verification requirement, and disappear the first area.
As an alternative embodiment, the apparatus further comprises: and the third locking module is used for not receiving the operation of the user if the sending information generated based on the operation of the preset times does not meet the verification requirement.
As an alternative embodiment, the apparatus further comprises: and the mark display module is used for displaying the mark added to the first area in the first area.
The processing manners of the first generating module 301, the first locking module 302, and the second generating module 303 may specifically refer to the related descriptions of steps 101 to 103 and 201 to 203 in the foregoing embodiment, the processing manner of the second locking module 305 may refer to the related description of step 205 in the foregoing embodiment, the processing manner of the third generating module 305 may refer to the related description of step 204 in the foregoing embodiment, the processing manner of the third locking module may refer to the related description of step 206 in the foregoing embodiment, and the processing manner of the mark displaying module may refer to the related description of step 207 in the foregoing embodiment, which is not described in detail herein.
The device provided by the embodiment of the invention generates a first area at the terminal by the starting time of a first preset time period, wherein the first area covers all or part of the terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; the method comprises the steps that at least two terminals in a plurality of terminals generate different sending information according with the verification requirements, wherein the sending information generated by the operations performed in the first area for the preset times is different, the operations received by the terminals operated by a plurality of users in the first preset time period can be effectively verified, the operations of different terminals are avoided being actually performed by the same user at the same time, the operations of all the users are performed under the equal and fair conditions, and meanwhile the habits or behaviors of the users can be known more accurately through the operations of the users.
An embodiment of the present invention provides a hardware device, where the hardware device may be configured to implement the method for limiting user operations provided in the foregoing embodiment, an application APP corresponding to the method runs on the hardware device, and an external representation form of the hardware device is a terminal, and the hardware device may be an electronic device such as a smart phone and a tablet computer that has a mobile phone operating system or is compatible with the mobile phone operating system, and the method includes: a processor and a memory for storing executable instructions for the processor.
In particular, the processor is configured to: generating a first area on the hardware device at a starting time of a first predetermined time period, the first area covering all or part of a hardware device screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the hardware device within a second preset time period, and the first area disappears; wherein, at least two hardware devices in the plurality of hardware devices generate different sending information for the operation of the predetermined times in the first area, and the sending information meets the verification requirement.
Assuming that the above is the first possible embodiment, a second possible embodiment provided on the basis of the first possible embodiment locks any operation in the second area after receiving a predetermined number of operations performed by the user in the second area within a second predetermined period of time.
In a third possible implementation form, which is provided on the basis of the first possible implementation form, the processor of the hardware apparatus is further configured to: and generating a third area by the hardware device within a third preset time period, wherein the first area disappears, locking any operation in the third area, and displaying a verification result whether the sending information generated based on the operation for a preset number of times meets the verification requirement in the third area.
In a fourth possible implementation provided on the basis of the second possible implementation, the processor of the hardware apparatus is further configured to: and if the transmission information generated based on the operation for the preset times does not meet the verification requirement, not receiving the operation of the user.
In a fifth possible embodiment provided on the basis of the first possible embodiment, the mark added to the first area is displayed in the first area. .
Fig. 10 is a block diagram illustrating a hardware device for implementing a method of restricting user operations according to an example embodiment. Referring to fig. 10, a hardware device may include one or more of the following components: processing component 401, memory 402, power component 403, multimedia component 404, audio component 405, input/output (I/O) interface 406, sensor component 407, and communication component 408.
Processing component 401 generally controls the overall operation of hardware device 400, such as operations associated with display, telephone calls, data communications, and recording operations. The processing component 401 may include one or more processors 410 to execute instructions to perform some of the steps of the method of restricting user operation described above. Further, processing component 401 may include one or more modules that facilitate interaction between processing component 401 and other components. For example, the processing component 401 may include a multimedia module to facilitate interaction between the multimedia component 404 and the processing component 401.
The memory 402 is configured to store various types of data to support operations at the hardware apparatus 400. Examples of such data include instructions for any application or method operating on hardware device 400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 402 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power components 403 provide power to the various components of the hardware device 400. Power components 403 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for hardware device 400.
The multimedia component 404 includes a screen that provides an output interface between the hardware device 400 and a user. In some embodiments, the screen may include an LCD (Liquid Crystal Display) and a TP (Touch Panel). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 404 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the hardware apparatus 400 is in an operation mode, such as a shooting mode or a video mode or a scanning mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 405 is configured to output and/or input audio signals. For example, audio component 405 includes a Microphone (MIC) configured to receive external audio signals when hardware apparatus 400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 402 or transmitted via the communication component 408. In some embodiments, audio component 405 also includes a speaker for outputting audio signals.
The I/O interface 406 provides an interface between the processing component 401 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a login button, a submit button, and a scan button.
The sensor component 407 includes one or more sensors for providing various aspects of status assessment for the hardware device 400. For example, sensor component 407 may detect an open/closed state of hardware device 400, the relative positioning of components, such as a display and keypad of hardware device 400, the change in position of hardware device 400 or a component of hardware device 400, the presence or absence of user contact with hardware device 400, the orientation or acceleration/deceleration of hardware device 400, and the change in temperature of hardware device 400. The sensor assembly 407 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 407 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 407 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 408 is configured to facilitate wired or wireless communication between the hardware apparatus 400 and other devices. Hardware device 400 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 408 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the Communication component 408 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on an RFID (Radio Frequency Identification) technology, an IrDA (Infrared Data Association) technology, an UWB (Ultra Wideband) technology, a BT (Bluetooth) technology, and other technologies.
In an exemplary embodiment, the hardware apparatus 400 may be implemented by one or more ASICs (Application Specific Integrated circuits), DSPs (Digital Signal processors), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a computer readable storage medium is also provided, in which at least one instruction, at least one program, code set, or set of instructions is stored, which is loaded and executed by a processor to implement the above-described method of restricting user operations. Such as memory 402, including instructions executable by processor 410 of hardware device 400 to perform the methods described above. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The instructions in the storage medium, when executed by a processing component of the hardware device, enable the mobile hardware device to perform the above-described method of restricting user operations.
It will be appreciated by those skilled in the art that the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The embodiments disclosed above are therefore to be considered in all respects as illustrative and not restrictive. All changes which come within the scope of or equivalence to the invention are intended to be embraced therein.

Claims (12)

1. A method of limiting user operations, the method comprising:
generating a first area on the terminal at the starting time of a first preset time period, wherein the first area covers all or part of a terminal screen;
after receiving a predetermined number of operations performed by a user in the first area within the first predetermined time period, locking any operation in the first area;
if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in a second preset time period by the terminal, and the first area disappears;
and the terminal comprises a plurality of terminals, wherein at least two terminals in the plurality of terminals generate different sending information in the operation of the predetermined times in the first area, and the sending information meets the verification requirement.
2. The method of claim 1, wherein after the terminal generates the second region within the second predetermined time period, further comprising:
locking any operation in the second area after receiving the predetermined number of operations performed by the user in the second area within the second predetermined period of time.
3. The method of claim 2, wherein after the first region receives a predetermined number of operations performed by a user within the first predetermined time period, locking in after any operation of the first region, the method further comprises:
and if the sending information generated based on the operation of the preset times does not meet the verification requirement, not receiving the operation of the user.
4. The method of claim 1, wherein after generating the first region on the terminal at the start time of the first predetermined time period, the method further comprises: and displaying the identifier added to the first area in the first area.
5. An apparatus for limiting user operations, the apparatus comprising:
the terminal comprises a first generating module, a second generating module and a display module, wherein the first generating module is used for generating a first area on the terminal at the starting time of a first preset time period, and the first area covers all or part of a terminal screen;
the first locking module is used for locking any operation in the first area after receiving the operation of the user for the preset times in the first area within the first preset time period;
a second generating module, configured to generate a second area in a second predetermined time period by the terminal if the transmission information generated based on the predetermined number of operations meets a verification requirement, where the first area disappears;
and at least two terminals in the plurality of terminals generate different sending information according with the verification requirement when the terminals perform the operation for the preset times in the first area.
6. The apparatus of claim 5, further comprising:
and the second locking module is used for locking any operation in the second area after receiving the operation of the user for the preset times in the second area within the second preset time period.
7. The apparatus of claim 6, further comprising:
and the third locking module is used for not receiving the operation of the user if the sending information generated based on the operation of the preset times does not meet the verification requirement.
8. The apparatus of claim 5, further comprising:
and the mark display module is used for displaying the mark added to the first area in the first area.
9. A hardware apparatus, comprising: a processor and a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any of claims 1-4.
10. A computer readable storage medium having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by a processor to implement the method of any of claims 1 to 4.
11. A method of limiting user operations, the method comprising:
generating a first area on the terminal at the starting time of a first preset time period, wherein the first area covers all or part of a terminal screen;
after receiving a predetermined number of operations performed by a user in the first area within the first predetermined time period, locking any operation in the first area;
generating a third area in a third preset time period by the terminal, locking any operation in the third area, displaying a verification result whether the sending information generated based on the operation for the preset times meets the verification requirement in the third area, and enabling the first area to disappear;
if the sending information generated based on the operation of the preset times meets the verification requirement, generating a second area in a second preset time period by the terminal;
and the terminal comprises a plurality of terminals, wherein at least two terminals in the plurality of terminals generate different sending information in the operation of the predetermined times in the first area, and the sending information meets the verification requirement.
12. An apparatus for limiting user operations, the apparatus comprising:
the terminal comprises a first generating module, a second generating module and a display module, wherein the first generating module is used for generating a first area on the terminal at the starting time of a first preset time period, and the first area covers all or part of a terminal screen;
the first locking module is used for locking any operation in the first area after receiving the operation of the user for the preset times in the first area within the first preset time period;
a third generating module, configured to generate a third area in a third predetermined time period, lock any operation in the third area, and display, in the third area, a verification result indicating whether the transmission information generated based on the predetermined number of operations meets a verification requirement, where the first area disappears;
a second generating module, configured to generate a second area in a second predetermined time period by the terminal if the transmission information generated based on the predetermined number of operations meets a verification requirement;
and at least two terminals in the plurality of terminals generate different sending information according with the verification requirement when the terminals perform the operation for the preset times in the first area.
CN201810437920.8A 2018-05-09 2018-05-09 Method, apparatus, hardware apparatus and medium for restricting user operation Active CN108833673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810437920.8A CN108833673B (en) 2018-05-09 2018-05-09 Method, apparatus, hardware apparatus and medium for restricting user operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810437920.8A CN108833673B (en) 2018-05-09 2018-05-09 Method, apparatus, hardware apparatus and medium for restricting user operation

Publications (2)

Publication Number Publication Date
CN108833673A CN108833673A (en) 2018-11-16
CN108833673B true CN108833673B (en) 2021-02-19

Family

ID=64148650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810437920.8A Active CN108833673B (en) 2018-05-09 2018-05-09 Method, apparatus, hardware apparatus and medium for restricting user operation

Country Status (1)

Country Link
CN (1) CN108833673B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051944A (en) * 2006-04-06 2007-10-10 株式会社Ntt都科摩 Mobile device and transmission restriction method
CN102868814A (en) * 2012-09-06 2013-01-09 惠州Tcl移动通信有限公司 Mobile phone screen unlocking method and mobile phone

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0568082A (en) * 1991-09-06 1993-03-19 Nec Corp Radio telephone set with limited dial function
TW200409525A (en) * 2002-11-26 2004-06-01 Lite On Technology Corp Voice identification method for cellular phone and cellular phone with voiceprint password
EP1911263A4 (en) * 2005-07-22 2011-03-30 Kangaroo Media Inc System and methods for enhancing the experience of spectators attending a live sporting event
KR101685363B1 (en) * 2010-09-27 2016-12-12 엘지전자 주식회사 Mobile terminal and operation method thereof
JP2014071828A (en) * 2012-10-01 2014-04-21 Fuji Xerox Co Ltd Information processing apparatus, image forming apparatus, and program
TW201333903A (en) * 2013-04-16 2013-08-16 Global Cloud Computing Corp Cloud-end broadcast interactive teaching system and its method
KR101667733B1 (en) * 2015-05-04 2016-10-19 엘지전자 주식회사 Mobile terminal and method for controlling the same
CN105094664A (en) * 2015-06-10 2015-11-25 小米科技有限责任公司 Terminal device privacy protection method and apparatus
JP6821933B2 (en) * 2016-03-24 2021-01-27 カシオ計算機株式会社 Electronic equipment, communication equipment, control methods, and programs
CN106502644A (en) * 2016-09-23 2017-03-15 广州华多网络科技有限公司 Direct broadcasting room electronics present gives display effect control method, device and equipment
CN106952090A (en) * 2017-02-27 2017-07-14 努比亚技术有限公司 Payment verification device and method
CN107330319B (en) * 2017-06-29 2020-12-18 广东源泉科技有限公司 Interaction control method, equipment and computer readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051944A (en) * 2006-04-06 2007-10-10 株式会社Ntt都科摩 Mobile device and transmission restriction method
CN102868814A (en) * 2012-09-06 2013-01-09 惠州Tcl移动通信有限公司 Mobile phone screen unlocking method and mobile phone

Also Published As

Publication number Publication date
CN108833673A (en) 2018-11-16

Similar Documents

Publication Publication Date Title
CN106170004B (en) Method and device for processing verification code
CN106453052B (en) Message interaction method and device
US20170171321A1 (en) Methods and devices for managing accounts
EP2988205A1 (en) Method and device for transmitting image
EP2981116A1 (en) Method and apparatus for accessing wi-fi network and computer program product
CN107959757B (en) User information processing method and device, APP server and terminal equipment
CN107147815B (en) Call processing method and device based on taxi taking
CN112463418A (en) Cross-device information sharing method, device, medium and electronic device
CN107145771B (en) Application program unlocking method and device and terminal
CN108280342B (en) Application synchronization method and device for application synchronization
CN109246094B (en) User terminal verification method, device and storage medium
CN106302342B (en) User account switching method and device
CN107656616B (en) Input interface display method and device and electronic equipment
CN106506808B (en) Method and device for prompting communication message
CN106447747B (en) Image processing method and device
CN109885360B (en) Data processing method, device and storage medium
US20170201479A1 (en) Group message display method, device and medium
US20170041377A1 (en) File transmission method and apparatus, and storage medium
CN111541922A (en) Method, device and storage medium for displaying interface input information
CN106712960B (en) Processing method and device of verification code information
CN107483605B (en) File downloading method and device and storage medium
CN107241439B (en) Message pushing method and device for H5 page
CN111859208A (en) Display method, display device and storage medium
CN106919302B (en) Operation control method and device of mobile terminal
CN106550012B (en) Monitoring method of intelligent equipment and intelligent equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant