CN117271024A - Screen control method, device, terminal equipment and storage medium - Google Patents

Screen control method, device, terminal equipment and storage medium Download PDF

Info

Publication number
CN117271024A
CN117271024A CN202311058839.6A CN202311058839A CN117271024A CN 117271024 A CN117271024 A CN 117271024A CN 202311058839 A CN202311058839 A CN 202311058839A CN 117271024 A CN117271024 A CN 117271024A
Authority
CN
China
Prior art keywords
interface
user
identity authentication
terminal equipment
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311058839.6A
Other languages
Chinese (zh)
Inventor
马伟健
李星宇
刘柏良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN202311058839.6A priority Critical patent/CN117271024A/en
Publication of CN117271024A publication Critical patent/CN117271024A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention discloses a screen control method, a device, terminal equipment and a storage medium, and relates to the technical field of intelligent display, wherein the method comprises the following steps: after the terminal equipment is started, displaying a user identity authentication interface; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. The invention can simultaneously meet the real-name use requirement of the terminal equipment at present, backtrack the requirement of the use record of the terminal equipment and provide data support for the postmortem.

Description

Screen control method, device, terminal equipment and storage medium
Technical Field
The present invention relates to the field of intelligent display technologies, and in particular, to a screen control method, a device, a terminal device, and a storage medium.
Background
In ECC (general control center) of an enterprise data center, for safety and compliance, real-name requirements are applied to terminal devices accessing an enterprise network, that is, each user using the terminal device is required to provide real identity information for registration and authentication, so as to ensure legal use and traceability of the terminal device and network resources, and especially for those terminal devices participating in critical tasks such as production environment production, release, data maintenance and the like, the authenticity of the identity of the user needs to be ensured, and the use record of the user needs to be able to be traced back. In addition, corresponding data needs to be provided to support post audit work.
However, the current terminal device only has the characteristic of identity authentication, and has no capability of backtracking the usage record of a user and providing corresponding data to support post audit work.
Disclosure of Invention
The invention mainly aims to provide a screen control method, a device, terminal equipment and a storage medium, which aim to simultaneously meet the real-name use requirement of the terminal equipment at present, trace back the use record requirement and provide data support for postmortem.
To achieve the above object, the present invention provides a screen control method, which is applied to a terminal device, the method comprising:
after the terminal equipment is started, displaying a user identity authentication interface;
responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user;
performing identity authentication based on the operation information;
and if the identity authentication is passed, recording the use information of the user using the terminal equipment.
Optionally, the step of displaying the user authentication interface includes:
loading a first interface and controlling the screen to display the first interface;
the step of recording the usage information of the user using the terminal device includes:
And storing the use information of the user using the terminal equipment into a database.
Optionally, the step of performing identity authentication based on the operation information includes:
based on the operation information, carrying out first authentication on the user through an application program interface of identity authentication;
if the application program interface of the identity authentication judges that the user passes the first authentication, a first authentication result is returned;
performing second authentication on the user through the application program interface of the identity authentication based on the first authentication result;
if the application program interface of the identity authentication judges that the user passes the second authentication, a second authentication result is returned;
judging whether the user matches a preset limited rule or not based on the second authentication result;
and if the user does not match the restricted rule, the identity authentication of the user is passed.
Optionally, the step of loading a first interface and controlling the screen to display the first interface includes:
loading the first interface, and maximally juxtaposing the first interface;
disabling windows system hotkeys and task manager;
and setting the focus of the mouse to be positioned on the first interface at regular time.
Optionally, after the terminal device is started, the step of loading a first interface and controlling the screen to display the first interface includes:
providing a barrier reporting channel through the first interface;
and providing a picture carousel function through the first interface.
Optionally, the step of storing the usage information of the user using the terminal device in a database includes:
closing the first interface and loading a second interface;
and starting the permission of using the second interface and detecting the idle time length of the second interface.
Optionally, the step of opening the right to use the second interface and detecting the idle duration of the second interface includes:
canceling the forbidden of the windows system hot key;
canceling the disabling of the task manager;
canceling the focal point binding of the mouse;
starting timing operation, and detecting the idle time length of the second interface through the timing operation;
if the idle time length of the second interface exceeds a preset threshold value, storing the use information of the user using the terminal equipment into the database;
closing the second interface and loading the first interface.
Optionally, the step of opening the right to use the second interface and detecting the idle duration of the second interface includes:
Responding to the operation of closing the second interface by the user by using the windows system hot key, and storing the use information of the user by using the terminal equipment into the database;
closing the second interface and loading the first interface.
The embodiment of the invention also provides a screen control device, which comprises:
the screen locking module displays a user identity authentication interface after the terminal equipment is started;
the data acquisition module is used for responding to an operation instruction of a user on the user identity authentication interface and acquiring operation information of the user;
the identity authentication module is used for carrying out identity authentication based on the operation information;
and the screen unlocking module records the use information of the user using the terminal equipment if the identity authentication passes.
The embodiment of the invention also provides a terminal device, which comprises a memory, a processor and a screen control program stored in the memory and capable of running on the processor, wherein the screen control program realizes the screen control method when being executed by the processor.
The embodiment of the invention also provides a computer readable storage medium, wherein a screen control program is stored on the computer readable storage medium, and the screen control program realizes the screen control method when being executed by a processor.
The screen control method, the device, the terminal equipment and the storage medium provided by the embodiment of the invention display a user identity authentication interface after the terminal equipment is started; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment.
Drawings
FIG. 1 is a schematic diagram of functional modules of a terminal device to which a screen control device of the present invention belongs;
FIG. 2 is a flowchart of an exemplary embodiment of a screen control method according to the present invention;
FIG. 3 is a functional diagram of a screen control system architecture according to the present invention;
FIG. 4 is a flowchart of another exemplary embodiment of a screen control method according to the present invention;
FIG. 5 is a schematic diagram of a first interface according to an embodiment of the invention;
FIG. 6 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention;
FIG. 7 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention;
FIG. 8 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention;
FIG. 9 is a flowchart of another exemplary embodiment of a screen control method according to the present invention;
FIG. 10 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention;
FIG. 11 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention;
FIG. 12 is a flowchart of another exemplary embodiment of a screen control method according to the present invention;
fig. 13 is a schematic overall flow chart of the screen control method of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The main solutions of the embodiments of the present invention are: after the terminal equipment is started, displaying a user identity authentication interface; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment.
Technical terms related to the embodiment of the invention:
plate jumping machine: a board hopping machine is a special server located in a network for providing secure remote access to and management of other devices or transfer stations of the network. The trigger is located between the terminal device and the target device and plays roles of access control and identity authentication. The main purpose of the board hopping machine is to enhance the security and access control of the network, and by centralizing all accesses on the board hopping machine, the access behavior can be better monitored and managed, and the risk of directly accessing sensitive equipment is reduced. However, this approach may be inconvenient in terms of operation and maintenance monitoring and emergency handling.
Winforms: winforms is a Microsoft development based User Interface (UI) technology for creating Windows applications. WinForms provides a set of visual design tools and components that enable developers to quickly create rich desktop applications.
National encryption algorithm: the national cryptographic algorithm refers to a series of cryptographic algorithms issued and promoted by the China code administration, and aims to protect information security and national interests. The cryptographic algorithm includes symmetric cryptographic algorithm, asymmetric cryptographic algorithm, hash algorithm, etc.
OAuth 2.0: OAuth 2.0 (Open Authorization 2.0) is an open authorization framework for secure authentication and authorization processes between end device applications and servers. It is widely used in Web and mobile applications to enable authorized access by users in various third party applications using their data stored on other service providers. By adopting the OAuth 2.0 framework, the mobile phone APP can be in butt joint with the internal OAuth 2.0 authentication platform system by scanning the two-dimensional code. Therefore, the user can safely authorize the third party application program to access the protected resource through the mobile phone APP, and meanwhile, the burden of the user is reduced. The mode of authorized access through OAuth 2.0 provides convenience and ensures the use safety of the terminal.
windows system hotkeys: the windows system hotkey refers to the use of a specific key combination in the windows operating system to trigger a predefined operation or function. These hotkeys provide a way to quickly access and execute commonly used tasks, improving the user's efficiency and operational experience. For example, windows key +R is to open a run dialog. Additionally, windows systems also provide a number of hotkey combinations for performing various tasks, such as adjusting volume, capturing a screen, switching input methods, opening a task manager, and so forth. Some applications may also have their own specific hotkeys.
The embodiment of the invention considers that: the existing terminal equipment only has the characteristic of identity authentication, and has no capability of backtracking the use record of a user and providing corresponding data to support post audit work.
Therefore, the embodiment of the invention provides a solution, and the real-name use requirement of the terminal equipment at present is met by carrying out identity authentication based on the operation information; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment.
Specifically, referring to fig. 1, fig. 1 is a schematic diagram of functional modules of a terminal device to which the screen control device of the present invention belongs. The screen control means may be device independent means capable of data processing, which may be carried on the device in the form of hardware or software. The device can be an intelligent mobile terminal with a data processing function such as a mobile phone and a tablet personal computer, and can also be a fixed device or a server with a data processing function.
In this embodiment, the apparatus to which the screen control device belongs at least includes an output module 110, a processor 120, a memory 130, and a communication module 140.
The memory 130 stores therein an operating system and a screen control program; the output module 110 may be a display screen or the like. The communication module 140 may include a WIFI module, a bluetooth module, and the like, and communicate with an external device or a server through the communication module 140.
Wherein the screen control program in the memory 130 when executed by the processor performs the steps of:
after the terminal equipment is started, displaying a user identity authentication interface;
responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user;
performing identity authentication based on the operation information;
and if the identity authentication is passed, recording the use information of the user using the terminal equipment.
Further, the screen control program in the memory 130, when executed by the processor, also implements the steps of:
after the terminal equipment is started, loading a first interface and controlling the screen to display the first interface;
and storing the use information of the user using the terminal equipment into a database.
Further, the screen control program in the memory 130, when executed by the processor, also implements the steps of:
based on the operation information, carrying out first authentication on the user through an application program interface of identity authentication;
If the application program interface of the identity authentication judges that the user passes the first authentication, a first authentication result is returned;
performing second authentication on the user through the application program interface of the identity authentication based on the first authentication result;
if the application program interface of the identity authentication judges that the user passes the second authentication, a second authentication result is returned;
judging whether the user matches a preset limited rule or not based on the second authentication result;
and if the user does not match the restricted rule, the identity authentication of the user is passed.
Further, the screen control program in the memory 130, when executed by the processor, also implements the steps of:
loading the first interface, and maximally juxtaposing the first interface;
disabling windows system hotkeys and task manager;
and setting the focus of the mouse to be positioned on the first interface at regular time.
Further, the screen control program in the memory 130, when executed by the processor, also implements the steps of:
providing a barrier reporting channel through the first interface;
and providing a picture carousel function through the first interface.
Further, the screen control program in the memory 130, when executed by the processor, also implements the steps of:
Closing the first interface and loading a second interface;
and starting the permission of using the second interface and detecting the idle time length of the second interface.
Further, the screen control program in the memory 130, when executed by the processor, also implements the steps of:
canceling the forbidden of the windows system hot key;
canceling the disabling of the task manager;
canceling the focal point binding of the mouse;
starting timing operation, and detecting the idle time length of the second interface through the timing operation;
if the idle time length of the second interface exceeds a preset threshold value, storing the use information of the user using the terminal equipment into the database;
closing the second interface and loading the first interface.
Further, the screen control program in the memory 130, when executed by the processor, also implements the steps of:
responding to the operation of closing the second interface by the user by using the windows system hot key, and storing the use information of the user by using the terminal equipment into the database;
closing the second interface and loading the first interface.
According to the scheme, the user identity authentication interface is displayed after the terminal equipment is started; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment.
Based on the above device architecture, but not limited to the above architecture, the method embodiments of the present invention are presented.
The main body of execution of the method of this embodiment may be a screen control device, which may be a device-independent device capable of performing data processing, and may be carried on the device in the form of hardware or software.
Referring to fig. 2, fig. 2 is a flowchart illustrating an exemplary embodiment of a screen control method according to the present invention. The method is applied to the terminal equipment, and the screen control method comprises the following steps:
step S10, after the terminal equipment is started, a user identity authentication interface is displayed.
In order to better explain the device and architecture used in the present solution, a screen control system may be introduced, and the implementation method is applied to the screen control system.
The screen control system comprises terminal equipment and a server, wherein the terminal equipment comprises a desktop application end and a web end.
As shown in fig. 3, fig. 3 is a functional diagram of a screen control system architecture according to the present invention.
Specifically, as an implementation manner, the desktop application end may include the following modules:
(1) And a screen control module. And the first interface is realized by adopting the window, the first interface is maximized and the first interface is forcedly arranged at the top when the mouse is started, meanwhile, a hot key and a task manager of the windows system are disabled, and the focus of the mouse is set to be arranged at the first interface at regular time. Through the setting, the purpose of controlling the screen is achieved, namely, the user can only see the first interface and cannot perform other operations.
(2) And an identity authentication module. And (3) adopting a two-dimension code scanning authentication mode to butt an internal OAUTH2.0 authentication platform, adopting a public-private key pair cryptographic algorithm encryption method by the terminal equipment, and returning a first authentication result to the terminal equipment after the code scanning authentication is successful, wherein the first authentication result is an authorization code token. After the terminal equipment acquires the first authentication result, secondary authentication is initiated to the authentication server through an encryption process, and a second authentication result is acquired, wherein the second authentication result is user information.
(3) And the picture carousel module. And broadcasting the preset picture files in turn in the first interface.
(4) And the user fault reporting module. The desktop application end is in butt joint with the internal robot message platform, a user selects corresponding barrier reporting content, and the barrier reporting content is clicked and then sent to a corresponding processor user end through the internal robot message platform.
Specifically, as an implementation, the web side may include the following modules:
(1) And a parameter maintenance module. Parameters of a screen control system, such as carousel time, screen locking time, seat numbers, version numbers, program start and stop, blacklist setting, user permission, idle time preset threshold of a second interface and the like, can be set through a parameter maintenance module at a web end, and parameter configuration can be defined.
(2) And a record query module. The usage record of the appointed user can be inquired through the record inquiring module, and the user of the terminal equipment can be traced back through the usage record.
(3) And a version control module. The version control module can uniformly control the version in the screen control system, and can also respectively control the versions of the desktop application end, the web end and the server end in the screen control system.
(4) And a real-time display module. The use condition of each terminal device can be displayed in real time through the real-time display module.
Specifically, as an implementation manner, the server side interacts with the terminal device through the connection database, and the data storage operation can be performed through the server side.
Step S10, after the terminal equipment is started, a user identity authentication interface is displayed.
The screen control method can be used for a desktop application end in the terminal equipment and a web end in the terminal equipment.
In this embodiment, the screen control method is used for a desktop application end in a terminal device.
The user identity verification interface requires the user to input personal identity information or login credentials to confirm the validity of the identity.
Specifically, as an implementation manner, the first interface may be loaded through the terminal device and the screen may be controlled to display the first interface.
Step S20, responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user.
Specifically, as an implementation manner, the operation of the user may be that the two-dimensional code on the first interface is scanned through the mobile phone APP, so as to obtain the operation information of the user.
The operation information of the user is a section of random code generated by scanning the two-dimensional code, and the random code consists of letters and numbers.
Specifically, as another embodiment, the user may operate to input the account number and the password of the user.
The operation information of the user is the account number and the password of the user.
And step S30, carrying out identity authentication based on the operation information.
The current common identity authentication method at the terminal comprises the following steps:
1. based on the account and password authentication mode of the system.
2. Based on the authentication mode of the third party authentication platform and the trigger. The authentication mode places the terminal equipment in an independent network segment, and accesses the service network or the machine by logging in the springboard machine through the third party authentication platform and accessing the service network or the machine from the inside of the springboard machine. The log-in board-jump machine generally uses a two-factor authentication, usually in the form of a password+a mobile phone verification code or a password+a dynamic token. The disadvantage of this authentication approach is that all applications need to be logged onto the board jumper first, and the additional step of logging onto the board jumper may increase response time, which is very detrimental to operation and maintenance monitoring and emergency handling.
In one embodiment, the embodiment of the invention may perform identity authentication through frameworks such as OAuth2.0, JWT (JSON Web Token), openID Connect, SAML (Security Assertion Markup Language), and the like.
In the embodiment of the invention, based on the random code generated by scanning the two-dimensional code by the user, the authentication is performed through OAUTH 2.0.
Step S40, if the identity authentication is passed, recording the use information of the user using the terminal equipment.
In order to meet the requirement of backtracking the use record of the user and the requirement of providing data support for the post audit, the use information of the user using the terminal equipment needs to be recorded.
The user information of the terminal equipment used by the user comprises user information returned after the user identity authentication is passed and equipment information of the terminal equipment used by the user.
In one embodiment, the usage information of the user using the terminal device may be stored in a database.
In another embodiment, after recording the use information of the user using the terminal device, the background work order interface can be queried to obtain the work order information of the user, and data support is provided for post audit. Before using the terminal device, the user needs to propose an application, and after the application is approved, a work order message is generated, so that the follow-up audit is facilitated.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment.
Referring to fig. 4, fig. 4 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention.
Based on the embodiment shown in fig. 2, the step S10, after the terminal device is powered on, displaying a user authentication interface includes:
step S11, after the terminal equipment is started, loading a first interface and controlling the screen to display the first interface.
In one embodiment, the first interface may be embedded with a two-dimensional code, so that a user can conveniently perform a scanning operation.
Wherein, as an implementation manner, the control screen may display the first interface as follows: and maximizing the juxtaposed top first interface, disabling the hot keys and the task manager of the windows system, and setting the focus of the mouse to be positioned on the first interface at regular time.
Fig. 5 is a schematic diagram of a first interface according to an embodiment of the invention, as shown in fig. 5.
The right side of the first interface is provided with a two-dimensional code for the user to perform identity authentication operation.
The left side of the first interface is a picture carousel function module.
The first interface also provides a barrier reporting channel.
Referring to fig. 6, fig. 6 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention.
Based on the embodiment shown in fig. 2, the step S40, if the identity authentication is passed, the step of recording the usage information of the user using the terminal device includes:
step S41, if the identity authentication is passed, the use information of the user using the terminal equipment is stored in a database.
In order to meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit, the use information of the user using the terminal device can be stored in a database.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. And if the identity authentication is passed, storing the use information of the user using the terminal equipment into a database.
According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment. After the terminal equipment is started, the first interface is loaded and the screen is controlled to display the first interface, so that unauthorized access and operation can be effectively prevented, and the safety and privacy protection capability of the terminal equipment are improved. In addition, the embodiment of the invention can trace back the user use record and provide data support for post audit by storing the use information of the user using the terminal equipment into the database.
Referring to fig. 7, fig. 7 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention.
Based on the embodiment shown in fig. 2, the step S30, the step of performing identity authentication based on the operation information includes:
step S31, based on the operation information, the user is authenticated for the first time through an application program interface of identity authentication.
In one embodiment, the first authentication may be performed on the user through the OAUTH2.0 authentication platform based on the random code generated by the user scanning the two-dimensional code.
The terminal equipment is connected with the internal OAUTH2.0 authentication platform in a butt joint mode, encrypts the random code by adopting a public and private key pair national encryption algorithm encryption method and then sends the encrypted random code to the internal OAUTH2.0 authentication platform.
Step S32, if the application program interface of the identity authentication determines that the user passes the first authentication, a first authentication result is returned.
If the internal OAUTH2.0 authentication platform judges that the random code passes authentication, the internal OAUTH2.0 authentication platform returns a corresponding authorization code token to the terminal equipment, wherein the authorization code token is a first authentication result.
Step S33, performing a second authentication on the user through the application program interface of the identity authentication based on the first authentication result.
The terminal equipment encrypts the authorization code token and sends the encrypted authorization code token to the internal OAUTH2.0 authentication platform.
Step S34, if the application program interface of the identity authentication determines that the user passes the second authentication, a second authentication result is returned.
If the authorization code token passes the authentication, the internal OAUTH2.0 authentication platform returns user information to the terminal device, and the user information is the second authentication result.
The user information may include, among other things, name, age, email address, contact phone, contact address, user position, etc.
And step S35, judging whether the user matches a preset limited rule or not based on the second authentication result.
Step S36, if the user does not match the restricted rule, the identity authentication of the user is passed.
Wherein, as an implementation mode, the preset limited rule may be: and judging the access limitation of the terminal equipment according to the user position in the user information. If the position of the user is outsourcing personnel, matching a preset limited rule, wherein the identity authentication of the user at the terminal equipment is not passed. If the position of the user is a common staff member, the user does not match with a preset limited rule, and the identity authentication of the user at the terminal equipment is passed.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. Based on the operation information, carrying out first authentication on the user through an application program interface of identity authentication; if the application program interface of the identity authentication judges that the user passes the first authentication, a first authentication result is returned; performing second authentication on the user through the application program interface of the identity authentication based on the first authentication result; if the application program interface of the identity authentication judges that the user passes the second authentication, a second authentication result is returned; judging whether the user matches a preset limited rule or not based on the second authentication result; and if the user does not match the restricted rule, the identity authentication of the user is passed.
According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment. The embodiment of the invention carries out the matching of the restricted rule based on the second authentication result, can be used for limiting the access authority or the operation range of the user and ensures that the user operates under the specified condition, thereby preventing the terminal equipment from being maliciously logged in and generating a secret leakage event.
Referring to fig. 8, fig. 8 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention.
Based on the embodiments shown in fig. 4 and fig. 6, the step S11 of loading the first interface and controlling the screen to display the first interface after the terminal device is powered on includes:
step S111, loading the first interface after the terminal device is started, and maximizing and juxtaposing the first interface.
The first interface is loaded, and the maximized juxtaposition of the first interface can ensure that the first interface is displayed in a maximized mode when the terminal equipment is started, and ensure that a user can see the first interface.
And S112, disabling a windows system hotkey and a task manager.
The method comprises the steps that a user can be prevented from switching to other application programs through the windows system hotkey by disabling the windows system hotkey, so that the access range of the user to terminal equipment is limited.
Wherein, disabling the task manager may prevent the user from closing the terminal device through the task manager.
Step S113, setting the timing of the mouse focus to be positioned on the first interface.
The setting of the mouse focus timing on the first interface can ensure that the user locks the mouse focus on the first interface all the time during operation, can prevent the user from moving the mouse focus to other application programs, and ensures that the user can only operate on the first interface.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. After the terminal equipment is started, loading a first interface and controlling the screen to display the first interface; storing the use information of the user using the terminal equipment into a database; further, loading the first interface, and maximizing and juxtaposing the first interface; disabling windows system hotkeys and task manager; and setting the focus of the mouse to be positioned on the first interface at regular time.
According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment. After the terminal equipment is started, the first interface is loaded and the screen is controlled to display the first interface, so that unauthorized access and operation can be effectively prevented, and the safety and privacy protection capability of the terminal equipment are improved. In addition, the embodiment of the invention can trace back the user use record and provide data support for post audit by storing the use information of the user using the terminal equipment into the database. Furthermore, the embodiment of the invention achieves the purpose of controlling the screen by disabling the hotkey and the task manager of the windows system and setting the focus of the mouse to be positioned on the first interface at regular time, so that the user can only see the first interface, and can be prevented from switching to other application programs or executing unsafe operation, thereby enhancing the safety of terminal equipment and preventing potential security threat and unauthorized access.
Referring to fig. 9, fig. 9 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention.
Based on the embodiments shown in fig. 4 and fig. 6, the step S11 includes, after the terminal device is turned on, loading a first interface and controlling the screen to display the first interface:
step S12, providing a barrier reporting channel through the first interface.
In one embodiment, the terminal device interfaces with the internal robot message platform, the user selects the corresponding barrier report content in the barrier report channel of the first interface, and the barrier report content is clicked and then sent to the corresponding processor user terminal through the internal robot message platform.
Step S13, providing a picture carousel function through the first interface.
And broadcasting the preset picture file in the first interface in turn.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. After the terminal equipment is started, loading a first interface and controlling the screen to display the first interface; and storing the use information of the user using the terminal equipment into a database. Providing a barrier reporting channel through the first interface; and providing a picture carousel function through the first interface.
According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment. After the terminal equipment is started, the first interface is loaded and the screen is controlled to display the first interface, so that unauthorized access and operation can be effectively prevented, and the safety and privacy protection capability of the terminal equipment are improved. In addition, the embodiment of the invention can trace back the user use record and provide data support for post audit by storing the use information of the user using the terminal equipment into the database. According to the embodiment of the invention, the barrier reporting channel is provided through the first interface, so that the user can submit the problem more conveniently, and the communication efficiency between the user and the service team is improved. And moreover, the first interface is used for providing a picture carousel function, so that rich and various picture displays can be provided for users.
Referring to fig. 10, fig. 10 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention.
Based on the embodiment shown in fig. 8, step S41 includes, after storing the usage information of the user using the terminal device in a database:
step S42, closing the first interface and loading the second interface.
If the user identity authentication is passed, the user obtains more rights to use the terminal device, and at this time, the first interface is closed, and the second interface with more rights and functions is loaded.
And step S43, starting the permission of using the second interface and detecting the idle time length of the second interface.
In order to avoid the second interface being in an idle state for a long time, reduce the security risk, and effectively release system resources, improve the overall performance and response speed of the terminal device, idle duration detection needs to be performed on the second interface.
In one embodiment, a timing operation may be started, and the idle duration of the second interface may be detected through the timing operation. If the timing operation detects that the idle time of the second interface exceeds a preset threshold value, closing the second interface and loading the first interface.
In one embodiment, the permission of the second interface may be opened by canceling the disable of the windows system hot key, canceling the disable of the task manager and canceling the focal binding of the mouse.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. After the terminal equipment is started, loading a first interface and controlling the screen to display the first interface; storing the use information of the user using the terminal equipment into a database; further, loading the first interface, and maximizing and juxtaposing the first interface; disabling windows system hotkeys and task manager; and setting the focus of the mouse to be positioned on the first interface at regular time. Loading a first interface and controlling the screen to display the first interface; and storing the use information of the user using the terminal equipment into a database.
According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment. After the terminal equipment is started, the first interface is loaded and the screen is controlled to display the first interface, so that unauthorized access and operation can be effectively prevented, and the safety and privacy protection capability of the terminal equipment are improved. In addition, the embodiment of the invention can trace back the user use record and provide data support for post audit by storing the use information of the user using the terminal equipment into the database. Furthermore, the embodiment of the invention achieves the purpose of controlling the screen by disabling the hotkey and the task manager of the windows system and setting the focus of the mouse to be positioned on the first interface at regular time, so that the user can only see the first interface, and can be prevented from switching to other application programs or executing unsafe operation, thereby enhancing the safety of terminal equipment and preventing potential security threat and unauthorized access. After the first interface is closed, the second interface is loaded and idle time length detection is carried out, when the second interface is idle for a period of time, the second interface is closed, the first interface is reloaded, the second interface can be prevented from being kept in an open state for a long time, potential safety risks are reduced, and unauthorized access and operation are prevented.
Referring to fig. 11, fig. 11 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention.
Based on the embodiment shown in fig. 10, the step S43 of opening the right to use the second interface and performing idle duration detection on the second interface includes:
step S431, canceling the disable of the windows system hot key.
Step S432, the disabling of the task manager is canceled.
Step S433, cancel the focus binding of the mouse.
Wherein, canceling the disabling of the task manager and canceling the focal binding of the mouse may enable the user to freely use all functions in the second interface by canceling the disabling of the windows system hotkey.
Step S434, a timing job is started, and the idle duration of the second interface is detected through the timing job.
Where a timed job is a periodically triggered task, certain operations may be performed within a specified time interval. In this scenario, the timed job is used to detect the idle duration of the second interface.
The idle time of the second interface refers to a time period when the user does not perform any operation on the second interface. The timing operation can acquire the current time when each execution is performed, compare the current time with the operation time of the last second interface, and calculate the time difference between the current time and the operation time of the last second interface. And if the time difference exceeds a preset threshold value, judging that the second interface is in an idle state.
Step S435, if the idle duration of the second interface exceeds a preset threshold, storing the usage information of the user using the terminal device into the database.
The preset threshold value can be set according to actual requirements or use habits of users.
The user using information of the terminal equipment comprises user information returned after the user identity authentication is passed and terminal equipment information used by the user.
Step S436, closing the second interface and loading the first interface.
When the idle time of the second interface exceeds a preset threshold, it is determined that the user does not use the second interface any more, so that in order to effectively release system resources, the overall performance and response speed of the terminal device are improved, potential security risks are reduced, unauthorized access and operation are prevented, and therefore the second interface needs to be closed and loaded into the first interface.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. After the terminal equipment is started, loading a first interface and controlling the screen to display the first interface; and storing the use information of the user using the terminal equipment into a database. Further, loading the first interface, and maximizing and juxtaposing the first interface; disabling windows system hotkeys and task manager; and setting the focus of the mouse to be positioned on the first interface at regular time. Closing the first interface and loading a second interface; and starting the permission of using the second interface and detecting the idle time length of the second interface. The method comprises the steps of canceling the disabling of a hot key of the windows system; canceling the disabling of the task manager; canceling the focal point binding of the mouse; starting timing operation, and detecting the idle time length of the second interface through the timing operation; if the idle time length of the second interface exceeds a preset threshold value, storing the use information of the user using the terminal equipment into the database; closing the second interface and loading the first interface.
According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment. After the terminal equipment is started, the first interface is loaded and the screen is controlled to display the first interface, so that unauthorized access and operation can be effectively prevented, and the safety and privacy protection capability of the terminal equipment are improved. In addition, the embodiment of the invention can trace back the user use record and provide data support for post audit by storing the use information of the user using the terminal equipment into the database. Furthermore, the embodiment of the invention achieves the purpose of controlling the screen by disabling the hotkey and the task manager of the windows system and setting the focus of the mouse to be positioned on the first interface at regular time, so that the user can only see the first interface, and can be prevented from switching to other application programs or executing unsafe operation, thereby enhancing the safety of terminal equipment and preventing potential security threat and unauthorized access. After the first interface is closed, the second interface is loaded and idle time length detection is carried out, when the second interface is idle for a period of time, the second interface is closed, the first interface is reloaded, the second interface can be prevented from being kept in an open state for a long time, potential safety risks are reduced, and unauthorized access and operation are prevented. According to the embodiment of the invention, the task manager is canceled from being disabled and the binding of the mouse focus is canceled by canceling the hot key disabling of the windows system, so that a user can freely use all functions in the second interface, and the user experience can be enhanced. In addition, the embodiment of the invention detects the idle time of the second interface by starting the timing operation, and when the idle time of the second interface exceeds the preset threshold, the second interface is closed and loaded into the first interface, so that the system resources can be effectively released. When the user does not use the second interface any more, the terminal device can allocate the resources to other needed tasks, so that the overall performance and response speed of the terminal device are improved, the second interface can be prevented from being kept in an open state for a long time, potential safety risks are reduced, and unauthorized access and operation are prevented.
Referring to fig. 12, fig. 12 is a flowchart illustrating another exemplary embodiment of a screen control method according to the present invention.
Based on the embodiment shown in fig. 11, the step S43, after opening the right to use the second interface and detecting the idle duration of the second interface, includes:
and step S44, responding to the operation of closing the second interface by the user by using the windows system hot key, and storing the use information of the user by using the terminal equipment into the database.
And when the fact that the user uses the windows system hot key to close the second interface is detected, storing the use information of the user using the terminal equipment into the database.
The user using information of the terminal equipment comprises user information returned after the user identity authentication is passed and terminal equipment information used by the user.
And S45, closing the second interface and loading the first interface.
In order to control the screen of the terminal device and reduce the exposure time of the potential security hole, the first interface needs to be loaded when the second interface is closed.
Wherein after loading the first interface, the user needs to re-authenticate to continue accessing the second interface.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. After the terminal equipment is started, loading a first interface and controlling the screen to display the first interface; and storing the use information of the user using the terminal equipment into a database. Further, loading the first interface, and maximizing and juxtaposing the first interface; disabling windows system hotkeys and task manager; and setting the focus of the mouse to be positioned on the first interface at regular time. Closing the first interface and loading a second interface; and starting the permission of using the second interface and detecting the idle time length of the second interface. The method comprises the steps of canceling the disabling of a hot key of the windows system; canceling the disabling of the task manager; canceling the focal point binding of the mouse; starting timing operation, and detecting the idle time length of the second interface through the timing operation; if the idle time length of the second interface exceeds a preset threshold value, storing the use information of the user using the terminal equipment into the database; closing the second interface and loading the first interface. In addition, responding to the operation of closing the second interface by the user by using the windows system hot key, and storing the use information of the user by using the terminal equipment into the database; closing the second interface and loading the first interface.
According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment. After the terminal equipment is started, the first interface is loaded and the screen is controlled to display the first interface, so that unauthorized access and operation can be effectively prevented, and the safety and privacy protection capability of the terminal equipment are improved. In addition, the embodiment of the invention can trace back the user use record and provide data support for post audit by storing the use information of the user using the terminal equipment into the database. Furthermore, the embodiment of the invention achieves the purpose of controlling the screen by disabling the hotkey and the task manager of the windows system and setting the focus of the mouse to be positioned on the first interface at regular time, so that the user can only see the first interface, and can be prevented from switching to other application programs or executing unsafe operation, thereby enhancing the safety of terminal equipment and preventing potential security threat and unauthorized access. After the first interface is closed, the second interface is loaded and idle time length detection is carried out, when the second interface is idle for a period of time, the second interface is closed, the first interface is reloaded, the second interface can be prevented from being kept in an open state for a long time, potential safety risks are reduced, and unauthorized access and operation are prevented. According to the embodiment of the invention, the task manager is canceled from being disabled and the binding of the mouse focus is canceled by canceling the hot key disabling of the windows system, so that a user can freely use all functions in the second interface, and the user experience can be enhanced. In addition, the embodiment of the invention detects the idle time of the second interface by starting the timing operation, and when the idle time of the second interface exceeds the preset threshold, the second interface is closed and loaded into the first interface, so that the system resources can be effectively released. When the user does not use the second interface any more, the terminal device can allocate the resources to other needed tasks, so that the overall performance and response speed of the terminal device are improved, the second interface can be prevented from being kept in an open state for a long time, potential safety risks are reduced, and unauthorized access and operation are prevented. In addition, in the embodiment of the invention, by responding to the operation of closing the second interface by using the windows system hot key by a user, closing the second interface and loading the first interface, the screen control can be performed on the terminal equipment, the exposure time of potential security holes is reduced, and the first interface is loaded after closing the second interface, in the first interface, the user usually needs to carry out identity authentication again, and the user passing the identity authentication can continue to access the second interface, so that the security of the terminal equipment is improved.
Referring to fig. 13, fig. 13 is a schematic overall flow chart of the screen control method according to the present invention.
S1, loading a first interface.
S2, calling an OAUTH2.0 interface, and displaying the authentication two-dimensional code in the first interface.
S3, the user mobile phone APP scans the codes.
S4, the OAUTH2.0 platform authenticates the identity of the user, and if the authentication is not passed, the user has no authority to access the second interface; if the authentication is passed, the OAUTH2.0 platform returns a first authentication result to the terminal device.
S5, obtaining the name and ID of the user.
S6, judging whether the user matches the restricted rule or not based on the name and ID of the user and the first return result. If the restricted rule is matched, prompting that the authorization of the user fails and the user cannot log in; if the limited rule is not matched, recording user information and terminal information, closing the first interface, and loading the second interface.
S7, starting timing operation, and detecting the idle time of the second interface. If the idle time length exceeds a preset threshold value, recording user information and terminal information, and closing a second interface; if the idle time length does not exceed the preset threshold value, the timing operation continues to detect the idle time length of the second interface.
And S8, enabling a windows system hot key.
S9, the user uses the hot key to close the second interface, records the user information and the terminal information, and closes the second interface.
According to the scheme, after the terminal equipment is started, a user identity authentication interface is displayed; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment.
In addition, an embodiment of the present application further provides a screen control device, where the screen control device includes:
the screen locking module displays a user identity authentication interface after the terminal equipment is started;
the data acquisition module is used for responding to an operation instruction of a user on the user identity authentication interface and acquiring operation information of the user;
the identity authentication module is used for carrying out identity authentication based on the operation information;
And the screen unlocking module records the use information of the user using the terminal equipment if the identity authentication passes.
The principle and implementation process of the screen control are realized in this embodiment, please refer to the above embodiments, and the description thereof is omitted herein.
In addition, the embodiment of the application also provides a terminal device, which comprises a memory, a processor and a screen control program stored on the memory and capable of running on the processor, wherein the screen control program realizes the steps of the screen control method when being executed by the processor.
Because the screen control program is executed by the processor, all the technical schemes of all the embodiments are adopted, and therefore, the screen control program at least has all the beneficial effects brought by all the technical schemes of all the embodiments, and the detailed description is omitted.
In addition, the embodiment of the application also proposes a computer readable storage medium, on which a screen control program is stored, which when executed by a processor implements the steps of the screen control method as described above.
Because the screen control program is executed by the processor, all the technical schemes of all the embodiments are adopted, and therefore, the screen control program at least has all the beneficial effects brought by all the technical schemes of all the embodiments, and the detailed description is omitted.
According to the scheme, the user identity authentication interface is displayed after the terminal equipment is started; responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user; performing identity authentication based on the operation information; and if the identity authentication is passed, recording the use information of the user using the terminal equipment. According to the embodiment of the invention, the identity authentication is performed based on the operation information, so that the real-name use requirement of the terminal equipment at present is met; and after the identity authentication is passed, the embodiment of the invention can meet the requirement of backtracking the user use record and the requirement of providing data support for the post audit by recording the use information of the user using the terminal equipment.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or method that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to perform the method of each embodiment of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (11)

1. A screen control method, wherein the method is applied to a terminal device, the method comprising the steps of:
after the terminal equipment is started, displaying a user identity authentication interface;
responding to an operation instruction of a user on the user identity authentication interface, and acquiring operation information of the user;
performing identity authentication based on the operation information;
and if the identity authentication is passed, recording the use information of the user using the terminal equipment.
2. The method of claim 1, wherein the step of displaying a user authentication interface comprises:
loading a first interface and controlling the screen to display the first interface;
the step of recording the usage information of the user using the terminal device includes:
and storing the use information of the user using the terminal equipment into a database.
3. The method of claim 1, wherein the step of authenticating the identity based on the operation information comprises:
based on the operation information, carrying out first authentication on the user through an application program interface of identity authentication;
if the application program interface of the identity authentication judges that the user passes the first authentication, a first authentication result is returned;
Performing second authentication on the user through the application program interface of the identity authentication based on the first authentication result;
if the application program interface of the identity authentication judges that the user passes the second authentication, a second authentication result is returned;
judging whether the user matches a preset limited rule or not based on the second authentication result;
and if the user does not match the restricted rule, the identity authentication of the user is passed.
4. The method of claim 2, wherein the step of loading a first interface and controlling the screen to display the first interface comprises:
loading the first interface, and maximally juxtaposing the first interface;
disabling windows system hotkeys and task manager;
and setting the focus of the mouse to be positioned on the first interface at regular time.
5. The method according to claim 2, wherein after the step of loading a first interface and controlling the screen to display the first interface after the terminal device is powered on, the method comprises:
providing a barrier reporting channel through the first interface;
and providing a picture carousel function through the first interface.
6. The method of claim 4, wherein the step of storing the usage information of the user using the terminal device in a database comprises:
Closing the first interface and loading a second interface;
and starting the permission of using the second interface and detecting the idle time length of the second interface.
7. The method of claim 6, wherein the step of opening the right to use the second interface and detecting the idle duration of the second interface comprises:
canceling the forbidden of the windows system hot key;
canceling the disabling of the task manager;
canceling the focal point binding of the mouse;
starting timing operation, and detecting the idle time length of the second interface through the timing operation;
if the idle time length of the second interface exceeds a preset threshold value, storing the use information of the user using the terminal equipment into the database;
closing the second interface and loading the first interface.
8. The method of claim 7, wherein the step of opening the right to use the second interface and detecting the idle duration of the second interface comprises:
responding to the operation of closing the second interface by the user by using the windows system hot key, and storing the use information of the user by using the terminal equipment into the database;
Closing the second interface and loading the first interface.
9. A screen control apparatus, the apparatus comprising:
the screen locking module displays a user identity authentication interface after the terminal equipment is started;
the data acquisition module is used for responding to an operation instruction of a user on the user identity authentication interface and acquiring operation information of the user;
the identity authentication module is used for carrying out identity authentication based on the operation information;
and the screen unlocking module records the use information of the user using the terminal equipment if the identity authentication passes.
10. A screen control terminal device, characterized in that it comprises a memory, a processor and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, implements the screen control method according to any one of claims 1-8.
11. A computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the screen control method according to any one of claims 1-8.
CN202311058839.6A 2023-08-21 2023-08-21 Screen control method, device, terminal equipment and storage medium Pending CN117271024A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311058839.6A CN117271024A (en) 2023-08-21 2023-08-21 Screen control method, device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311058839.6A CN117271024A (en) 2023-08-21 2023-08-21 Screen control method, device, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117271024A true CN117271024A (en) 2023-12-22

Family

ID=89207170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311058839.6A Pending CN117271024A (en) 2023-08-21 2023-08-21 Screen control method, device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117271024A (en)

Similar Documents

Publication Publication Date Title
US10223520B2 (en) System and method for integrating two-factor authentication in a device
CN110463161B (en) Password state machine for accessing protected resources
US8595810B1 (en) Method for automatically updating application access security
US8464320B2 (en) System and method for providing authentication continuity
US9794228B2 (en) Security challenge assisted password proxy
JP6426189B2 (en) System and method for biometric protocol standard
US20180295137A1 (en) Techniques for dynamic authentication in connection within applications and sessions
US10445487B2 (en) Methods and apparatus for authentication of joint account login
US8909930B2 (en) External reference monitor
US20180295120A1 (en) Session-limited, manually-entered user authentication information
US9848001B2 (en) Secure access to mobile applications
KR101451359B1 (en) User account recovery
CN105429943B (en) Information processing method and terminal thereof
US9954853B2 (en) Network security
US11695779B2 (en) User management system for computing support
KR101404537B1 (en) A server access control system by automatically changing user passwords and the method thereof
CN117271024A (en) Screen control method, device, terminal equipment and storage medium
US20230161860A1 (en) Using a digital badge to access managed devices
Sotirios Windows Active Directory Security Audit
Saini Comparative Analysis of Top 5, 2-Factor Authentication Solutions
Albayati et al. Profile Based Access Control Model Using JSON Web Tokens
Mahdad et al. Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices
Bergman Login hardening with Multi-factor Authentication
CN114329384A (en) Safety protection method for power grid operating system
CN117253303A (en) Door lock control method, system, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination