CN111866272A - Control method and device of electronic equipment - Google Patents

Control method and device of electronic equipment Download PDF

Info

Publication number
CN111866272A
CN111866272A CN202010615323.7A CN202010615323A CN111866272A CN 111866272 A CN111866272 A CN 111866272A CN 202010615323 A CN202010615323 A CN 202010615323A CN 111866272 A CN111866272 A CN 111866272A
Authority
CN
China
Prior art keywords
target
user
information
input
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010615323.7A
Other languages
Chinese (zh)
Inventor
宋加超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010615323.7A priority Critical patent/CN111866272A/en
Publication of CN111866272A publication Critical patent/CN111866272A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a control method and device of electronic equipment, and belongs to the technical field of mobile communication. The method comprises the following steps: receiving target input of a user to a target application program under the condition that the operation mode of the electronic equipment is a target working mode; executing a target operation in response to the target input; wherein the target operation comprises at least one of: outputting prompt information, shielding communication signals and processing target information. According to the embodiment of the application, the problem that the property safety of the user cannot be guaranteed in an authentication mode in some scenes can be solved.

Description

Control method and device of electronic equipment
Technical Field
The application belongs to the technical field of mobile communication, and particularly relates to a control method and device of electronic equipment.
Background
As functions of electronic devices are increased, the electronic devices become an indispensable part of life, and various Applications (APPs) can be installed on the electronic devices to meet user demands.
Some of these functions, and the use of APPs, may be related to the user's property security. In order to ensure the property security of the user, the related art mostly performs the authentication by various means such as inputting a password or inputting a fingerprint. However, in some application scenarios, the property security of the user cannot be guaranteed, for example, when the user is in a dangerous scenario such as being hijacked, the user may meet the requirements of the hijacker in order to guarantee the life security of the user, for example, the user may transfer money or make a call through a payment application in the electronic device, and thus, the property security of the user may be lost.
Disclosure of Invention
The embodiment of the application aims to provide a control method and a control device for electronic equipment, which can solve the problem that the property safety of a user cannot be ensured by an authentication mode in some scenes.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a method for controlling an electronic device, where the method includes:
receiving target input of a user to a target application program under the condition that the operation mode of the electronic equipment is a target working mode;
executing a target operation in response to the target input;
wherein the target operation comprises at least one of: outputting prompt information, shielding communication signals and processing target information.
In a second aspect, an embodiment of the present application provides a control apparatus for an electronic device, where the apparatus includes:
the receiving module is used for receiving target input of a user to a target application program under the condition that the running mode of the electronic equipment is a target working mode;
an execution module for executing a target operation in response to a target input;
wherein the target operation comprises at least one of: outputting prompt information, shielding communication signals and processing target information.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, where the program or instructions, when executed by the processor, implement the steps of the control method of the electronic device according to the first aspect.
In a fourth aspect, the present application provides a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the control method of the electronic device according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the control method of the electronic device according to the first aspect.
In this embodiment of the application, in the target operating mode, some applications in the electronic device are in a target state different from an actual state of the applications, and when target input to the applications by a user is received, the electronic device may perform target operations, which may cause people other than the user of the electronic device to only obtain false information in the applications. As such, people other than the user of the electronic device may mistake the false information in the application for the true information in the application. For example, in the target working mode, when other people open the application program, the user can be prompted that the application program cannot be opened, the call request cannot be made, or the user can be prompted that the SIM card owes the fee after the call request is made, and only the account balance in the application program can be seen to be zero, so that the property loss of the user can be reduced, and the property safety of the user can be protected.
Drawings
Fig. 1 is a schematic diagram of a display interface for setting a target unlock mode according to an embodiment of the present application;
FIG. 2 is a schematic diagram of another display interface for setting a target unlock mode according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a control method of an electronic device according to an embodiment of the present disclosure;
fig. 4 is a schematic flowchart of another control method for an electronic device according to an embodiment of the present disclosure;
fig. 5 is a schematic view of a display interface of an electronic device according to an embodiment of the present disclosure;
fig. 6 is a schematic flowchart of a control method for an electronic device according to an embodiment of the present application;
FIG. 7 is a schematic view of a display interface of another electronic device provided in an embodiment of the present application;
FIG. 8 is a schematic view of a display interface of another electronic device provided in an embodiment of the present application;
fig. 9 is a schematic flowchart of a control method for an electronic device according to an embodiment of the present application;
FIG. 10 is a schematic view of a display interface of another electronic device provided in an embodiment of the present application;
FIG. 11 is a schematic view of a display interface of another electronic device provided in an embodiment of the present application;
FIG. 12 is a schematic view of a display interface of another electronic device provided in an embodiment of the present application;
Fig. 13 is a schematic structural diagram of a control device of an electronic apparatus according to an embodiment of the present application;
fig. 14 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application
Fig. 15 is a schematic hardware structure diagram of another electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
At present, with the functions of electronic devices increasing, the electronic devices become an indispensable part of people's lives, and various APPs can be installed to meet user demands.
Some of these functions, and the use of APPs, may be related to the user's property security. In order to secure the property of the user, the related art mostly performs authentication through various means such as inputting a password or inputting a fingerprint. After the user identity authentication is performed by inputting a password or inputting a fingerprint and the like, after the electronic equipment is unlocked, the authority such as payment and the like in the electronic equipment is not limited. Therefore, in some scenes, for example, when the user is hijacked, the holder threatens the user to open the electronic equipment and threatens the user to acquire payment passwords and the like of some payment applications, so that the property of the user is hijacked. Therefore, the property security of the user cannot be guaranteed by performing the authentication in a mode of inputting a password or inputting a fingerprint.
In view of the problems in the related art, embodiments of the present application provide a method for controlling an electronic device. The method comprises the following steps: in the target working mode, some application programs in the electronic equipment are in a target state different from the actual state of the application programs, and after target input of users to the application programs is received, the electronic equipment can execute target operations, and the target operations can enable other people except the users of the electronic equipment to only obtain false information in the application programs. As such, people other than the user of the electronic device may mistake the false information in the application for the true information in the application. For example, in the target working mode, when other people open the application program, the user can be prompted that the application program cannot be opened, the call request cannot be made, or the user can be prompted that the SIM card owes the fee after the call request is made, and only the account balance in the application program can be seen to be zero, so that the property loss of the user can be reduced, and the property safety of the user can be protected.
Before describing the control method of the electronic device provided in the embodiment of the present application in detail, a method for setting an operating mode of the electronic device needs to be described in detail:
in order to prevent privacy information in the electronic device, such as account information, property information, identification cards and the like, from being leaked, the user can set various second inputs. Wherein the second input is an unlocking input, such as a fingerprint input, a number input, a pattern input, and the like. To further prevent the user's property safety in hazardous scenarios, the user may set various operating modes of the electronic device. Different operating modes correspond to different unlocking inputs. As shown in fig. 1, in order to prevent the dangerous scene, the user cannot guarantee the property safety of the user after being held, the user may preset an unlocking input, and the electronic device may enter a target operating mode by using the unlocking mode to unlock the electronic device.
It should be noted that an operation mode can be triggered to enter through corresponding different types of unlock inputs. For example, the operation modes of the electronic device include a target operation mode and a non-target operation mode, and the different types of unlocking inputs include a fingerprint input, a number input, a pattern input, a voice input, and the like. The unlocking input corresponding to the target operation mode may include one or more of a fingerprint input, a numeric input, a pattern input, and a voice input, and the unlocking input corresponding to the non-target operation mode may also include one or more of a fingerprint input, a numeric input, a pattern input, and a voice input.
For example, the unlock input of the target operation mode setting includes a fingerprint input, a number input, a pattern input. Wherein the fingerprint in the fingerprint input corresponds to a thumb fingerprint of the user. The number input corresponds to a number of "123456". The pattern corresponding to the pattern input is in a zigzag shape. The voice corresponding to the voice input is' Zhang III is a commander. Therefore, the corresponding relation between the thumb fingerprint of the user, the numbers '123456', the 'Z' -shaped patterns and the voice 'Zhang san is a commander and a rival and rival' respectively and the target unlocking mode is established. The unlock input of the non-target operation mode setting includes a fingerprint input, a number input, a pattern input, and a voice input. Wherein the fingerprint in the fingerprint input corresponds to the index finger fingerprint of the user. The number input corresponds to a number "456789". The pattern corresponding to the pattern input is in an N shape. The speech input corresponds to a speech of "Liqu is a beauty". Therefore, the corresponding relation between the index finger fingerprint of the user, the number '456789', 'N' font pattern and the voice as 'Liquan is beauty' and the non-target unlocking mode is established.
In addition, when the user uses the thumb print to unlock the electronic device, the electronic device enters the target operation mode. When the user unlocks the electronic device by using the index finger fingerprint, the electronic device enters a non-target working mode.
After the corresponding relation between the unlocking mode and the working mode is established, the user can control the working mode of the electronic equipment by using the target unlocking mode. For example, when the user is in a dangerous scene, such as a case where the electronic device is opened by a threat of a person being trapped, the user may unlock the electronic device using a preset target unlocking manner capable of enabling the electronic device to enter a target operation mode.
When the electronic equipment is in the non-target working mode, the state of the electronic equipment and the states of some application programs in the electronic equipment cannot be changed at all. When the electronic device is in the target working mode, the states of some application programs can be changed to some extent. For example, a Subscriber Identity Module (SIM) card arrears, APP masquerading, such as bank APP icon hiding, etc. And the states of these applications need to be set in advance. As shown in fig. 2, after the user sets the unlocking mode for the electronic device to enter the target operating mode, the user may further select a function of the electronic device in the target operating mode. For example, SIM card arrearage, APP camouflage, APP such as bank APP icon hiding, online alarm and the like. The APP camouflage function can be that information such as balance in an account of the payment application is displayed to be zero, or can be an unbound bank card in the account of the payment application. When the APP disguising function is selected, the user can select the APP needing disguising from the APP list according to the self requirement.
It should be noted that the electronic device in the embodiment of the present application may include at least one of the following: the mobile phone, the tablet personal computer, the intelligent wearable device and the like have the functions of receiving information and displaying information.
The following describes in detail the control method of the electronic device according to the embodiments of the present application with reference to the accompanying drawings, taking an execution subject of the control method of the electronic device as an example, and through specific embodiments and application scenarios thereof.
Fig. 3 is a flowchart illustrating a control method of an electronic device according to an embodiment of the present disclosure.
As shown in fig. 3, a method for controlling an electronic device provided in an embodiment of the present application may include:
s301: and receiving target input of a user to the target application program under the condition that the running mode of the electronic equipment is the target working mode.
When a user of the electronic equipment unlocks the electronic equipment through the target fingerprint, the electronic equipment enters a non-screen-locking state from a screen-locking state, and a target working mode of the electronic equipment is also started.
Optionally, in the target operating mode, after the electronic device enters the non-screen-locking state from the screen-locking state, the target application icon may not be displayed on the display desktop, where the application program corresponding to the target application icon is an application program for performing a payment operation. In addition, in the target working mode, after the electronic equipment enters the non-screen-locking state from the screen-locking state, all application icons can be normally displayed on the display desktop, and after target input is received, target operation is executed.
It can be understood that, in the target operating mode, if all application icons are normally displayed on the display desktop, after the preset operation is performed, the icons of the bank APP (or all application programs capable of performing the payment operation) of the display desktop of the electronic device may be hidden.
Alternatively, the target application may be: the APP that can carry out instant messaging class, like phone APP, SMS APP also can be the APP that can carry out payment operation, like bank class APP, payment class APP, still can be the APP relevant with user privacy.
Optionally, the target input of the user to the target application program may be to open the target application program, or to execute a corresponding function in the target application program, or may be to target input of a function in the target application program, for example, if the user needs to check the account balance in the application program a, the target input is to input the account balance in the application program a.
S302: in response to the target input, a target operation is performed. Wherein the target operation comprises at least one of: outputting prompt information, shielding communication signals and processing target information.
In addition, when the electronic device is in the target operation mode, the target application can be set in a state different from the actual state after the target operation is executed.
After the target operation is executed, contact ways of relatives, friends and the like of the user are hidden, and the relatives and the friends are prevented from being maliciously cheated; or after the target operation is executed, shielding the communication signal of the mobile phone, so that the mobile phone cannot be contacted with the outside through the terminal; or after the target operation is executed, displaying account information bound to the application program as account information different from actual account information, such as an account number of "741258", but displaying the account number of "963258"; or, the account information bound in the application program is hidden, so that the property of the user is prevented from being stolen through the account information and the password of the user.
Therefore, in the target working mode, some application programs in the electronic equipment are in a target state different from the actual state of the application programs, and after target input of users to the application programs is received, the electronic equipment can execute target operations, and the target operations can enable other people except the users of the electronic equipment to only obtain the false information in the application programs. As such, people other than the user of the electronic device may mistake the false information in the application for the true information in the application. For example, in the target working mode, when other people open the application program, the user can be prompted that the application program cannot be opened, the call request cannot be made, or the user can be prompted that the SIM card owes the fee after the call request is made, and only the account balance in the application program can be seen to be zero, so that the property loss of the user can be reduced, and the property safety of the user can be protected.
In some embodiments of the present application, in order to ensure the personal safety of the user, the following steps may be further included after S302:
s303: and sending alarm information to a preset alarm object.
The alarm information includes at least one of device information of the electronic device and location information of the electronic device.
The device information may include information on the kind of the electronic device, the model of the electronic device, and the like. The device information of the electronic device may be pre-stored in the electronic device before the electronic device is shipped from a factory. When the device information is required to be used, the device information can be directly read from a storage module of the electronic device. The position information of the user may be obtained through a Positioning module in the electronic device, such as a Global Positioning System (GPS) and a BeiDou Navigation Satellite System (BDS).
After at least one item of equipment information of the electronic equipment and position information of the electronic equipment is acquired, alarm information is sent to a preset communication object such as a public security system or a preset emergency contact person. Wherein the alarm information includes at least one of device information of the electronic device and location information of the electronic device. For example, the alarm information can be sent to the public security system, and when the user is clamped, the public security system can lock the user urgently and rescue the user after receiving the alarm information, so that the personal safety of the user is ensured.
Therefore, the position of the user and the information of the electronic equipment can be locked by the outside through the alarm information, so that the user is rescued, and the personal safety of the user is guaranteed.
It should be noted that the above embodiments can be applied to various application scenarios, such as call, instant messaging, and the like. The following describes application scenarios such as call instant messaging in detail.
First, an application scenario embodiment of a call is described.
As shown in fig. 4, in some embodiments of the present application, in order to ensure the property security of the user and the property security of the relatives, friends, and the like of the user, S301 and S302 in the control method of the electronic device provided in the embodiments of the present application are specifically:
s401: and receiving target input of a user to the target application program under the condition that the running mode of the electronic equipment is the target working mode.
Here, the target input may be an input to a call request sent by a target contact in the target application. The target contact may be a parent, friend, etc. of the user. For example, in the case of a hijacked user, when the user unlocks the electronic device, the holder may threaten the user to deceive the user's friends or relatives into transferring money to an account (the account that the holder uses to store the held money), and the holder may search for the user's relatives or friends 'contacts through the address book in the user's electronic device.
S402: responding to the target input, outputting first prompt information and/or shielding a communication signal; the first prompt message is used for indicating that the SIM card is in an arrearage state.
In order to ensure the property safety of the user and the property safety of relatives, friends and the like of the user, after receiving the input of the call request sent to the target contact person, the electronic equipment can directly shield the communication signal and output first prompt information.
It will be appreciated that in the event that the electronic device is shielded from communication signals, anyone cannot use the electronic device to make a telephone call. In order to enable a person using the electronic equipment to determine that the electronic equipment cannot make a telephone call, first prompt information can be output to prompt the person using the electronic equipment that the electronic equipment cannot make a telephone call.
Optionally, the first prompt message may be a voice prompt message. For example, in the case that the user is hijacked, the holder may threaten the user to deceive friends or relatives of the user into transferring money to an account (the account used by the holder to store the held money), and at this time, the first prompt is a voice prompt: "your account balance is insufficient, please add money", the holder can't converse with the relatives or friends of the user, has avoided the holder to reach the purpose such as deceiving the relatives or friends' property of the user through disguising as the user, thus when having guaranteed the property safety of the user, also guaranteed the relatives or friends of the user not deceived by the holder, lost property.
Optionally, the first prompt message may also be a text prompt message. For example, as shown in fig. 5, in the target operation mode, after the user or the holder presses the phone dialing key, the electronic device immediately pops up the information that the network cannot be connected.
Then, an application scenario of instant messaging is introduced.
As shown in fig. 6, in some embodiments of the present application, in order to ensure the property security of the user and the property security of the relatives, friends, and the like of the user, S301 and S302 in the control method of the electronic device provided in the embodiments of the present application are specifically:
s601: and receiving target input of a user to the target application program under the condition that the running mode of the electronic equipment is the target working mode.
Here, the target input may be an input initiated to a target contact and the target application may be an instant messaging enabled application.
S602: outputting second prompt information; the second prompt message is used for indicating that the network cannot be connected or indicating that the target application program fails to be opened.
The second prompt message may indicate that the current network cannot be connected, and may also indicate that the application cannot be opened, and the second prompt message may be a text prompt message. After the user opens the payment application program, second prompt information can be displayed on an interface of the application program, and if the application program cannot log in; when the user opens the application program of the instant messaging and sends the instant messaging information to the contact A through the application program, the information can be displayed on the display interface of the application program and cannot be sent or the network cannot be connected.
For example, as shown in fig. 7, when sending a short message, after the content of the short message that the user needs to send is edited and the send button is clicked, the "information cannot be sent" may be displayed on the application page in the form of a floating window. Meanwhile, an identifier can be displayed beside the short message content to remind the user that the short message is not successfully sent.
For another example, as shown in fig. 8, in the target operation mode, the electronic device assumes that the holder wants to send information to the contacts in the user communication list through the payment application registered by the user, but if the holder registers the payment application in the interface of the payment application, the holder can display that the network is not connected, and the holder may give up sending information to the contacts in the user communication list to retrieve the property of the user or the contacts in the user's communication list.
Therefore, the holder cannot communicate with the relatives or friends of the user through the electronic equipment of the user, the purpose that the holder deceives the relatives or friends of the user through disguising the holder is avoided, the property safety of the user is guaranteed, and meanwhile the property loss caused by the deception that the relatives or friends of the user are not deceived by the holder is also guaranteed.
In addition to the above special scenarios, as shown in fig. 9, in some embodiments of the present application, in order to ensure the property safety of the user and the property safety of the relatives, friends, and the like of the user, S301 and S302 in the control method of the electronic device provided in the embodiment of the present application are specifically:
S901: and receiving target input of a user to the target application program under the condition that the running mode of the electronic equipment is the target working mode.
Here, the target input may be an input initiated to the target contact. The target application may be a payment-type application.
S902: and processing the target information in the target application program.
The target information may be balance in the target application, target contacts, historical transaction information for the user, and information for the account bound in the target application. The target input refers to click input of target information.
When the target information is the account balance of the payment application, the value of the account balance is displayed as 0 when the electronic equipment starts the target working mode. For example, as shown in fig. 10, the balance in the account may be 0 when the electronic device is in the target operation mode, and the balance of the account is the real value when the electronic device is in the non-target operation mode.
When the target information is a target contact, such as a parent and a friend of the user, the contact information of the parent and the friend of the user can be hidden when the target working mode of the electronic equipment is started. That is, in the contact information in the target application program, the contacts such as relatives and friends of the user are not displayed. Alternatively, the electronic device may also modify the names of the user's relatives, friends, etc. to other names. For example, in the user's contact list
When the target information is the historical transaction information of the user, as shown in fig. 11, the electronic device hides the historical transaction information of the user when the electronic device is in the target-on operating mode, so as to prevent the holder from performing fraud and lassitude on the person having close transaction with the user according to the historical transaction information of the user.
When the target information is an account associated with the payment application account, such as a bank card account, the account association interface of the payment application does not display any target account associated with the user when the electronic device starts the target working mode. For example, as shown in fig. 12, the bank card account association interface of a certain payment application does not display any bank card icon associated with the user. And when the electronic equipment is in the non-target working mode, the bank card icons bound to the account are all in a display state.
Therefore, when the user is hijacked and the electronic equipment is in the target working mode, and when the holder cannot acquire any information capable of fraudulently pulling the lanyard, the action of fraudulently pulling the lanyard and the lanyard on the user can be automatically abandoned, so that the property safety of the user is ensured.
In some embodiments of the present application, in order to ensure property security of a user, the electronic device may hide target application icons of some target applications, such as a bank APP, in a target operating mode.
From this, personnel except the user can't see like the icon of bank class APP to unable operation such as transferring accounts, payment through bank class APP has guaranteed user's property safety.
According to the control method of the electronic device, in the target working mode, some application programs in the electronic device are in the target states different from the actual states of the application programs, and after target input of the application programs by a user is received, the electronic device can execute target operations, and the operations can enable other people except the user of the electronic device to only obtain false information in the application programs. As such, people other than the user of the electronic device may mistake the false information in the application for the true information in the application. For example, in the target working mode, when other people open the application program, the user can be prompted that the application program cannot be opened, the call request cannot be made, or the user can be prompted that the SIM card owes the fee after the call request is made, and only the account balance in the application program can be seen to be zero, so that the property loss of the user can be reduced, and the property safety of the user can be protected.
It should be noted that, in the embodiment of the present application, a method for controlling an electronic device executed by the electronic device is taken as an example, and the method for controlling an electronic device provided in the embodiment of the present application is described. However, in the control method of the electronic device provided in the embodiment of the present application, the execution main body may be the electronic device, or may be a control apparatus of the electronic device or a control module in the control apparatus of the electronic device, for executing the control method of the electronic device; the electronic equipment comprises a control device of the electronic equipment.
Based on the control method of the electronic equipment provided by the application, correspondingly, the application provides a control device of the electronic equipment. Next, in the embodiments of the present application, a method for controlling an electronic device by a control device of the electronic device is taken as an example, and the control device of the electronic device provided in the embodiments of the present application is described.
Fig. 13 is a schematic structural diagram of a control device 1300 of an electronic device according to the present application.
As shown in fig. 13, the control apparatus 1300 of the electronic device provided by the present application may include: a module 1301 is received, and a module 1302 is executed.
A receiving module 1301, configured to receive a target input of a user to a target application program when an operation mode of the electronic device is a target operation mode;
an execution module 1302 for executing a target operation in response to a target input;
wherein the target operation comprises at least one of: outputting prompt information, shielding communication signals and processing target information.
In one possible embodiment, the target input is an input to send a call request to the target contact;
an execution module 1302, configured to output first prompt information;
an execution module 1302, specifically configured to mask the communication signal;
The first prompt message is used for indicating that the SIM card is in an arrearage state.
Therefore, the purposes of knocking the properties of relatives or friends of the user and the like by people except the user through the electronic equipment of the user are avoided, so that the property safety of the user is ensured, and meanwhile, the relatives or friends of the user are prevented from being deceived by the holder to lose the properties.
In one possible embodiment, the target input is an input by a user to open a target application;
an executing module 1302, configured to output a second prompt message;
the execution module 1302 is further configured to specifically process target information in the target application;
the second prompt message is used for indicating that the network cannot be connected or indicating that the target application program fails to be opened.
Therefore, the method avoids people except the user from being disguised as the user, achieves the purpose of deceiving the property of relatives or friends of the user and the like through the electronic equipment of the user, and ensures the property safety of the relatives or friends of the user while ensuring the property safety of the user.
In a possible embodiment, the executing module 1302 is specifically configured to, in a case that the target information is a balance, display the balance as the target balance;
An executing module 1302, configured to hide the target contact when the target information is the target contact;
an executing module 1302, configured to change a name of the target contact when the target information is the target contact;
an executing module 1302, configured to hide the historical transaction information when the target information is the historical transaction information;
the executing module 1302 is specifically configured to hide the bound account when the target information is the account bound in the target application.
Therefore, when the user is hijacked and the electronic equipment is in the target working mode, and when the holder cannot acquire any information capable of fraudulently pulling the lanyard, the action of fraudulently pulling the lanyard and the lanyard on the user can be automatically abandoned, so that the property safety of the user is ensured.
In one possible embodiment, in the target operation mode, the display desktop of the electronic device does not display the target application icon;
and the application program corresponding to the target application icon is the application program for executing the payment operation.
In a possible embodiment, the control apparatus 1300 of an electronic device provided in this embodiment may further include:
a hiding module 1303 for hiding the target application icon;
A sending module 1304, configured to send alarm information;
and the target application program corresponding to the target application icon is an application program for executing payment operation.
From this, personnel except the user can't see the icon like bank type APP to unable operation such as account transfer, payment through bank type APP has guaranteed user's property safety. And the alarm information can lock the position of the user and the information of the electronic equipment by the outside, so that the user is rescued, and the personal safety of the user is ensured.
In a possible embodiment, the control apparatus of an electronic device provided in the embodiment of the present application may further include:
the receiving module 1301 is further configured to receive a second input of the user;
a setting module 1305, configured to set a target unlock input in response to the second input.
Therefore, by setting the corresponding relation between the target unlocking input and the target working mode, after the target unlocking input of the user is received, the electronic equipment can enter the target working mode, and under the target working mode, the property loss of the user can be reduced, and the property safety of the user can be protected.
To sum up, the control device of the electronic device according to the embodiment of the present application may unlock the electronic device and control the electronic device to start the target operating mode corresponding to the target unlocking input after receiving the target unlocking input of the user. Also, in the target operation mode, the states of some target objects in the electronic device may be set to target states different from their actual states. Therefore, after the electronic equipment starts the target working mode, other people except the user of the electronic equipment can only acquire the target state of the target object and can mistake the target state as the actual state of the target object, for example, in the target working mode, other people can only see that the account of the payment application is zero and cannot see the icon of the bank application, and the like, so that the property loss of the user can be reduced, and the property safety of the user can be protected.
The control device of the electronic device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The control device of the electronic apparatus in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The control device of the electronic device provided in the embodiment of the present application can implement each process implemented by the control device of the electronic device in the method embodiments in fig. 3, fig. 4, fig. 6, and fig. 9, and is not described here again to avoid repetition.
Optionally, as shown in fig. 14, an electronic device 1400 is further provided in this embodiment of the present application, and includes a processor 1401, a memory 1402, and a program or an instruction stored in the memory 1402 and executable on the processor 1401, where the program or the instruction is executed by the processor 1401 to implement each process of the control method embodiment of the electronic device, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Fig. 15 is a schematic hardware structure diagram of an electronic device implementing an embodiment of the present application.
The electronic device 1500 includes, but is not limited to: a radio frequency unit 1501, a network module 1502, an audio output unit 1503, an input unit 1504, a sensor 1505, a display unit 1506, a user input unit 1507, an interface unit 1508, a memory 1509, and a processor 1510.
Those skilled in the art will appreciate that the electronic device 1500 may also include a power supply (e.g., a battery) for powering the various components, which may be logically coupled to the processor 1510 via a power management system to perform functions such as managing charging, discharging, and power consumption via the power management system. The electronic device structure shown in fig. 15 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The user input unit 1507 is configured to receive a target input of a user to a target application program when the operation mode of the electronic device is a target operation mode;
a processor 1510 for performing a target operation in response to a target input;
wherein the target operation comprises at least one of: outputting prompt information, shielding communication signals and processing target information.
In the embodiment of the application, in the target working mode, some application programs in the electronic device are in a target state different from an actual state of the application programs, and after target input of the application programs by a user is received, the electronic device executes target operations, which enable other people except the user of the electronic device to only obtain false information in the application programs. As such, people other than the user of the electronic device may mistake the false information in the application for the true information in the application. For example, in the target working mode, when other people open the application program, the user can be prompted that the application program cannot be opened, the call request cannot be made, or the user can be prompted that the SIM card owes the fee after the call request is made, and only the account balance in the application program can be seen to be zero, so that the property loss of the user can be reduced, and the property safety of the user can be protected.
Optionally, the target input is an input for sending a call request to the target contact;
a processor 1510 configured to output a first prompt message;
a processor 1510, specifically also for masking communication signals;
the first prompt message is used for indicating that the SIM card is in an arrearage state.
Therefore, the purposes of knocking the properties of relatives or friends of the user and the like by people except the user through the electronic equipment of the user are avoided, so that the property safety of the user is ensured, and meanwhile, the relatives or friends of the user are prevented from being deceived by the holder to lose the properties.
Optionally, the target input is an input for a user to open a target application program;
the processor 1510 is specifically configured to output the second prompt message;
the processor 1510 is specifically configured to process target information in a target application;
the second prompt message is used for indicating that the network cannot be connected or indicating that the target application program fails to be opened.
Therefore, the method avoids people except the user from being disguised as the user, achieves the purpose of deceiving the property of relatives or friends of the user and the like through the electronic equipment of the user, and ensures the property safety of the relatives or friends of the user while ensuring the property safety of the user.
Optionally, the processor 1510 is specifically configured to, when the target information is a balance, display that the balance is the target balance;
the processor 1510 is specifically configured to hide the target contact when the target information is the target contact;
the processor 1510 is specifically configured to, in a case that the target information is a target contact, change a name of the target contact;
the processor 1510 is specifically configured to hide the historical transaction information when the target information is the historical transaction information;
the processor 1510 is specifically configured to hide the bound account if the target information is the bound account in the target application.
Therefore, when the user is hijacked and the electronic equipment is in the target working mode, and when the holder cannot acquire any information capable of fraudulently pulling the lanyard, the action of fraudulently pulling the lanyard and the lanyard on the user can be automatically abandoned, so that the property safety of the user is ensured.
Optionally, the processor 1510 is configured to hide the target application icon;
a processor 1510 for sending alarm information;
and the target application program corresponding to the target application icon is an application program for executing payment operation.
From this, personnel except the user can't see the icon like bank type APP to unable operation such as account transfer, payment through bank type APP has guaranteed user's property safety. And the alarm information can lock the position of the user and the information of the electronic equipment by the outside, so that the user is rescued, and the personal safety of the user is ensured.
In a possible embodiment, the control apparatus of an electronic device provided in the embodiment of the present application may further include:
a user input unit 1507, further for receiving a second input by the user;
a processor 1510, for setting a target unlock input in response to the second input.
Therefore, by setting the corresponding relation between the target unlocking input and the target working mode, after the target unlocking input of the user is received, the electronic equipment can enter the target working mode, and under the target working mode, the property loss of the user can be reduced, and the property safety of the user can be protected.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the control method embodiment of the electronic device, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device in the above embodiment. Readable storage media, including computer-readable storage media, such as Read-Only Memory (ROM), random-access Memory (RAM), magnetic or optical disks, etc.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the control method embodiment of the electronic device, and the same technical effect can be achieved.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method of controlling an electronic device, the method comprising:
receiving target input of a user to a target application program under the condition that the operation mode of the electronic equipment is a target working mode;
in response to the target input, performing a target operation;
wherein the target operation comprises at least one of: outputting prompt information, shielding communication signals and processing target information.
2. The method of claim 1, wherein the target input is an input for sending a call request to a target contact, and the performing the target operation specifically comprises:
outputting the first prompt message and/or shielding the communication signal;
the first prompt message is used for indicating that the SIM card is in an arrearage state.
3. The method according to claim 1, wherein the target input is an input of the user to open the target application, and the performing the target operation specifically includes:
outputting second prompt information or processing target information in the target application program;
the second prompt message is used for indicating that the network cannot be connected or indicating that the target application program fails to be opened.
4. The method according to claim 3, wherein the processing the target information in the target application specifically includes:
under the condition that the target information is a balance, displaying that the balance is a target balance;
hiding or changing the name of the target contact person under the condition that the target information is the target contact person;
hiding the historical transaction information under the condition that the target information is the historical transaction information;
and hiding the bound account under the condition that the target information is the bound account in the target application program.
5. The method according to any one of claims 1-4, wherein in the target operating mode, a display desktop of the electronic device does not display a target application icon;
and the application program corresponding to the target application icon is an application program for executing payment operation.
6. An apparatus for controlling an electronic device, the apparatus comprising:
the receiving module is used for receiving target input of a user to a target application program under the condition that the running mode of the electronic equipment is a target working mode;
An execution module to execute a target operation in response to the target input;
wherein the target operation comprises at least one of: outputting prompt information, shielding communication signals and processing target information.
7. The apparatus of claim 6, wherein the target input is an input to send a call request to a target contact;
the execution module is specifically used for outputting first prompt information;
the execution module is specifically used for shielding communication signals;
the first prompt message is used for indicating that the SIM card is in an arrearage state.
8. The apparatus of claim 6, wherein the target input is an input by the user to open the target application;
the execution module is specifically used for outputting second prompt information;
the execution module is specifically further configured to process target information in the target application program;
the second prompt message is used for indicating that the network cannot be connected or indicating that the target application program fails to be opened.
9. The apparatus of claim 8,
the execution module is specifically configured to display that the balance is a target balance when the target information is the balance;
The execution module is specifically configured to hide the target contact person when the target information is the target contact person;
the execution module is specifically configured to change a name of the target contact when the target information is the target contact;
the execution module is specifically configured to hide the historical transaction information when the target information is the historical transaction information;
the execution module is specifically configured to hide the bound account when the target information is the account bound in the target application.
10. The apparatus according to any one of claims 6-9, wherein in the target operating mode, a display desktop of the electronic device does not display a target application icon; and the target application program corresponding to the target application icon is an application program for executing payment operation.
CN202010615323.7A 2020-06-30 2020-06-30 Control method and device of electronic equipment Pending CN111866272A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010615323.7A CN111866272A (en) 2020-06-30 2020-06-30 Control method and device of electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010615323.7A CN111866272A (en) 2020-06-30 2020-06-30 Control method and device of electronic equipment

Publications (1)

Publication Number Publication Date
CN111866272A true CN111866272A (en) 2020-10-30

Family

ID=72989625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010615323.7A Pending CN111866272A (en) 2020-06-30 2020-06-30 Control method and device of electronic equipment

Country Status (1)

Country Link
CN (1) CN111866272A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982267A (en) * 2012-11-06 2013-03-20 周万荣 Safety protection method and system and terminal
US20150113658A1 (en) * 2013-10-22 2015-04-23 Hon Hai Precision Industry Co., Ltd. Mobile device and method for protecting private information stored in mobile device
CN105955635A (en) * 2016-04-20 2016-09-21 北京小米移动软件有限公司 Interface display method and device
CN107392013A (en) * 2017-06-12 2017-11-24 努比亚技术有限公司 A kind of terminal safety protection method, terminal and computer-readable recording medium
CN108268763A (en) * 2018-02-13 2018-07-10 广东欧珀移动通信有限公司 terminal control method, device, storage medium and terminal
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Control method, device, storage medium and the mobile terminal of application program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982267A (en) * 2012-11-06 2013-03-20 周万荣 Safety protection method and system and terminal
US20150113658A1 (en) * 2013-10-22 2015-04-23 Hon Hai Precision Industry Co., Ltd. Mobile device and method for protecting private information stored in mobile device
CN105955635A (en) * 2016-04-20 2016-09-21 北京小米移动软件有限公司 Interface display method and device
CN107392013A (en) * 2017-06-12 2017-11-24 努比亚技术有限公司 A kind of terminal safety protection method, terminal and computer-readable recording medium
CN108268763A (en) * 2018-02-13 2018-07-10 广东欧珀移动通信有限公司 terminal control method, device, storage medium and terminal
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Control method, device, storage medium and the mobile terminal of application program

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US11100202B2 (en) Fingerprint recognition method and device for touch screen, and touch screen
KR101438869B1 (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
CN110651270B (en) Data access method and device
KR101552587B1 (en) Location-based access control for portable electronic device
US8463234B2 (en) Method for providing security services by using mobile terminal password and mobile terminal thereof
JP4397827B2 (en) Authentication system for portable terminal device having electronic money function
CN105701414A (en) Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment
CN112580014B (en) Verification code obtaining method and device
EP1789873A2 (en) Non-intrusive trusted user interface
US11631079B2 (en) Settlement system, user terminal and method executed therein, settlement device and method executed therein, and program
CN110457965B (en) Radio frequency card function calling method and device
CN108781234B (en) Function control method and terminal
CN105894280A (en) Mobile terminal and method capable of hiding payment code
CN111414605B (en) Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN108399710A (en) A kind of fingerprint recognition alarm method, system and terminal device
CN102932741A (en) Mobile phone antitheft tracking method and antitheft tracking mobile phone
CN112887922B (en) Message sending method and electronic equipment
CN111866272A (en) Control method and device of electronic equipment
CN111428222A (en) Gesture control method and device of mobile terminal, mobile terminal and storage medium
CN110719365A (en) Information processing method, mobile terminal and computer storage medium
CN108122111A (en) Safe payment method, device, storage medium and computer equipment
CN107203879A (en) A kind of bank card strange land illegal system and method based on mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030

RJ01 Rejection of invention patent application after publication