CN104573479B - A kind of use control method and device of user equipment - Google Patents
A kind of use control method and device of user equipment Download PDFInfo
- Publication number
- CN104573479B CN104573479B CN201410797735.1A CN201410797735A CN104573479B CN 104573479 B CN104573479 B CN 104573479B CN 201410797735 A CN201410797735 A CN 201410797735A CN 104573479 B CN104573479 B CN 104573479B
- Authority
- CN
- China
- Prior art keywords
- content
- rule
- control
- user equipment
- children
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The present invention provides a kind of use control method and device of user equipment, method therein includes:Receive code content input by user;Determine the corresponding specific crowd of the code content;According to current safety corresponding with identified specific crowd rule, usage time to the user equipment and/or carry out using control using content.The present invention can be according to specific crowd, such as children, use pattern password unlatching specific crowd is corresponding to use control model, children using the time and content of user equipment are controlled in real time in the case where user does not perceive, enable a user to effectively use the beneficial functions of user equipment.
Description
Technical field
The present invention relates to field of mobile terminals more particularly to a kind of use control method and device of user equipment.
Background technology
With the development of mobile Internet, more and more user equipmenies, such as smart mobile phone, tablet computer, electronics are read
It reads device etc. and occupies very high frequency of use in family life, so as to which children also be caused also to be got over using the time of user equipment
Come more.User equipment not only serves as the amusement equipment use for loosening body and mind, tutor auxiliary platform equipment is can also be used as, by swashing
The mode of hair learning interest promotes children's study ability.
Since children lack self-control when the age is smaller, judgment is also lacked to the quality of user equipment content visible.
When lacking parent's supervision, they may be immoderate using the application in user equipment with game function, long-term in face of screen
Curtain can also affect vision and normal learning life;In addition, since user equipment is generally Internet enabled, children are possible to
Browsing is unfavorable for their physically and mentally healthy contents, such as porn site, violent pictures etc..Therefore it needs to set children using user
The standby time and content visible is controlled.
Invention content
Present invention solves the technical problem that one of be how to specific crowd using user equipment time and content visible
What is controlled uses user equipment.
According to an aspect of the invention, there is provided a kind of use control method of user equipment, wherein, including:
Receive code content input by user;
Determine the corresponding specific crowd of the code content;
According to current safety corresponding with identified specific crowd rule, to the usage time of the user equipment and/
Or it carries out using control using content.
According to another aspect of the present invention, the use control device of a kind of user equipment, wherein, including:
For receiving the device of code content input by user,;
For determining the device of the corresponding specific crowd of the code content;
For being carried out according to the corresponding current safety rule of identified specific crowd to usage time and/or using content
Use the device of control.
Since the present embodiment can be according to specific crowd, such as children, use pattern password opens specific crowd and corresponds to
Use control model, children are controlled using the time and content of user equipment in real time in the case where user does not perceive
System enables a user to effectively use the beneficial functions of user equipment.
Although those of ordinary skill in the art will be appreciated that following detailed description carries out referenced in schematic embodiment, attached drawing,
But the present invention is not limited in these embodiments.But the scope of the present invention is extensive, and is intended to be bound only by appended right
It is required that limit the scope of the present invention.
Description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, of the invention is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows the flow chart using control method of user equipment according to an embodiment of the invention.
Fig. 2 is the detail flowchart using control method of user equipment according to an embodiment of the invention.
Fig. 3 is the flow chart using control method of user equipment in accordance with another embodiment of the present invention.
Fig. 4 is the block diagram using control device of user equipment according to an embodiment of the invention.
Fig. 5 is the block diagram using control device of user equipment in accordance with another embodiment of the present invention.
The same or similar reference numeral represents the same or similar component in attached drawing.
Specific embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
Fig. 1 shows the flow chart using control method of user equipment according to an embodiment of the invention.Wherein, the use
Family equipment includes but not limited to desktop computer, laptop, smart mobile phone, tablet computer, game machine, set-top box, electronics and reads
Read device etc..
As shown in fig. 1, the use control method of user equipment described in the present embodiment mainly includes the following steps:
S100, code content input by user is received, wherein, the code content includes, but are not limited to character, gesture
Or at least one of fingerprint;
S110, the corresponding specific crowd of pattern for determining the code content
S120, according to current safety corresponding with identified specific crowd rule, during to the use of the user equipment
Between and/or carried out using control using content.
Wherein, the specific crowd includes, but are not limited to the crowd divided by all ages and classes range or by different operating
The crowd of Type division or the crowd etc. divided by different zones.In the following, to press the youngster in the crowd of all ages and classes range division
It is illustrated for child.Each step is described in further detail referring to Fig. 2.
As shown in Fig. 2, in step S100, which receives user and passes through virtually or physically keyboard, built-in sensors
Or the code content of fingerprint entry window input.The code content can pass through power key or certain gestures startup pair in user
It inputs, can also be inputted in the arbitrary picture after the user equipment is unlocked during the unlock operation of user equipment.
Specifically, it can store in a user device there are many for unlocking the code content of operation, mainly include common solution
Lock cipher, specific crowd (such as children) use pattern password.When the unlock that user starts to user equipment operates, if user
Common unlocking pin is inputted, then the user equipment enters mode standard, is not controlled to usage time and/or using content;
If user inputs children's use pattern password, which enters children's use pattern, and right according to current safety rule
It usage time and/or is controlled using content.When the user equipment returns parent in use, then can be by starting to user
Common unlocking pin is inputted during the unlock operation of equipment and restores mode standard, so as to the normal use user equipment.
Also, since children's study and ability to model are stronger, using only character as children's use pattern password and general
General solution lock cipher is then easily remembered by children and jumps out children's use pattern, and the user equipment is used so as to unrestricted, because
This when parent gives user equipment need before children's use to input password when, three kinds of following modes of preferable use it
One, to avoid children's use pattern is jumped out:
Mode one
Children's use pattern password and common unlocking pin are used as in a manner that gesture is combined character, that is, inputted
The window of code content is not provided with the button of confirmation input, only inputs after corresponding character again by specific gesture ability
Trigger reception of the user equipment to code content.It is specific since attention children can only focus on the input of character
Even if gesture can make children remember character password, the input of code content can not be also completed, so as to ensure to be only capable of in children
The user equipment is used under use pattern.
Mode two
It is stored with the finger print information for starting children's use pattern in a user device, is given by the user equipment
Tong Qian, it is only necessary to specific finger be inputted into fingerprint in fingerprint entry window, you can start children's use pattern.It is used as by fingerprint
The mode that code content starts children's use pattern can realize startup children's use pattern in the case where not discovered by children.
Mode three
One password acceptance program started simultaneously with operating system, the password acceptance can be installed in the user equipment
Program is always in running background and real-time reception content input by user, when content input by user and preset children use mould
When formula password (such as specific character string or gesture) matches, then it will start children's use pattern, so as to fulfill not by children
Start children's use pattern in the case of discovering.
In step S110, determine that the process of the corresponding specific crowd of the code content can be included in the user equipment and connect
After receiving code content input by user, according to the classification of code content and the progress of pre-stored children's use pattern password
Match, such as:
The passwords such as common unlocking pin and children's use pattern password are stored in the user equipment.When user is passing through
When the unlock that power key or certain gestures start to user equipment has input code content when operating, the code content is first determined whether
Which kind of corresponding latching mode when the code content and children's use pattern code matches, then performs next step.Alternatively,
Input code content in arbitrary picture after user is in unlock, first determine whether the code content whether with pre-stored children
Use pattern code matches perform next step if matching.
In step S120, according to current safety corresponding with identified specific crowd rule, to the user equipment
It usage time and/or is carried out using content using control.Specifically, when code content input by user with it is pre-stored specific
During the use pattern code matches of crowd (such as children), then according to the corresponding current safety rule of children to usage time and/
Or it is controlled using content.
Optionally, if the code content for judging to input during the unlock operation of user to user equipment is common unlocking pin,
Start general mode after then the user equipment is unlocked;If in the password inputted during the unlock operation for judging user to user equipment
Hold for children's use pattern password, then startup children's use pattern after the user equipment is unlocked.After user is judged in unlock
Arbitrary picture in the code content that inputs and pre-stored children's use pattern code matches, by the user if matching
Equipment starts children's use pattern.
Wherein, the process controlled according to current safety rule to usage time in step S120 and/or using content
Include, but are not limited to following manner:
Mode 1:
To usage time, current safety rule can be set as specific time period (such as the Mon-Fri only in one day
19 points to 20 points, 18 points to 20 points of weekend) using the user equipment or in accumulation used specific duration (such as week
One to Friday accumulate 1 hour, weekend accumulate 2 hours) after then close the user equipment.In this prior under the control of safety regulation,
Children can only cause shadow so as to avoid usage time long in the defined time using the user equipment to the health of children
It rings.
Mode 2:
To using content, current safety rule can be set as only allowing to access the network address for pre-entering white list, only permit
Perhaps it installs or runs and pre-enter the application program of white list, browsing is only allowed to pre-enter audio-video document of white list etc..
In this prior under the control of safety regulation, children can only browse to specific content by the user equipment, so as to avoid it is pornographic,
The contents such as violence are to physically and mentally healthy influence.It, then can should for example, main long find that children compare addiction to some game in the recent period
Game is removed from white list, so as to control addiction degree of the children to game.
It is further preferred that the control for using content, can use the curriculum offering corresponding time for different
Weights are controlled the time used for using content with the product of corresponding time weight as usage time.For example,
If the daily usage time set in current safety rule may be configured as 1 as 1 hour, for the weights of game, that is, work as operation
The game of 1 hour, then it is assumed that usage time reaches 1 hour;0.5 may be configured as the weights for playing music, that is, work as broadcasting
The music of 2 hours, then it is assumed that usage time reaches 1 hour;0.4 may be configured as the weights of early education reading matter, that is, work as browsing
The early education reading matter of 2.5 hours, then it is assumed that usage time reaches 1 hour.According to the different weights of different curriculum offerings
Afterwards, children's reasonable distribution difference can be guided to use the usage time of content, so as to reach what is taught through lively activities and strike a proper balance between work and rest
Purpose.
The use control method of the user equipment provided through this embodiment can make according to specific crowd (such as children)
With pattern password open protection of the child pattern, in the case where children do not perceive in real time to children using user equipment time and
Content is controlled, and children is enable effectively to use the beneficial functions of user equipment, so as to promote the health hair of children's body and mind
Exhibition.
In another embodiment, as shown in figure 3, the use control method of the user equipment can also include step
S130, according to content-control rule, to currently carrying out the use content progress using control via the current safety rule
With inquiry;And pair use content to match with the content-control rule carries out forbidding controlling.
Although the current safety rule in a upper embodiment can be carried out to the usage time of user equipment and/or using content
Control, but the content that still might have other than rule when children are using the user equipment is seen by children.Such as by current
Safety regulation allows the link in the website logged in log on to website, certain application program or sound that other unsuitable children log in regard
Contain content of unsuitable children viewing etc. in frequency file, thus the present embodiment on the basis of above-mentioned current safety rule into
One step intercepts specific content by content-control rule.Optionally, user equipment can be in local according to content-control
Rule, to currently via the current safety rule carry out using control use content progress matching inquiry or by with net
The interaction of network equipment obtains matching inquiry as a result, detailed process is as follows:
By described currently being sent to using the relevant information of content using control is carried out by the current safety rule
The network equipment;
Receive the use content carried out about the currently process current safety rule using control from the network equipment
With the matching result of content-control rule.
It is optionally, described to include website, application program and audio, video data using content,
Wherein, the described pair of use content to match with the content-control rule the step of control forbid to include with
It is any one of lower:
1) forbid accessing the website to match with the secure access rule.Specifically, user equipment captures current net
Network access request, and obtaining the current network access request and secure access locally or through with network equipment interaction
The matches of rule are as a result, then, forbid accessing the website to match with the secure access rule.In the network equipment (such as
High in the clouds) secure access rule in include real-time update unsuitable children access website, when children pass through links and accesses
During to these websites, then the website that by way of forbidding accessing the children can be avoided to be accessed by unsuitable children influences.
2) forbid installing or starting the application program to match with the security application rule.Specifically, user equipment carries
It takes the application program for being currently installed on or starting, and described be currently installed on or open to obtain locally or through with network equipment interaction
Dynamic application program and the matching result of the security application rule in high in the clouds then, are forbidden installing or be started and the security application
The application program that rule matches.Some popular application programs may bundle dangerous content, children by illegal operator
These application programs may be packed into the user equipment in the case of ignorant and above-mentioned current safety rule None- identified, because
This can be swept the application program for being currently installed on or starting by the security application rule of local or the network equipment (such as high in the clouds)
It retouches, if not finding dangerous content, allows to install or start, if finding dangerous content, prevent to install or start, so as to ensure
The health of user equipment content.
3) content that display is forbidden to match with the safety display rule.Specifically, the current display of user equipment interception
Content, it is and to obtain that the content currently shown and safety is aobvious in the interaction locally or through the network equipment (such as high in the clouds)
Show the matching result of rule, then, the content that display is forbidden to match with the safety display rule.When children browse audio and video
During file, sectional drawing can be carried out to the audio-video document of broadcasting at predetermined time intervals, and by being matched with characteristic value or artificial neuron
The image recognition algorithm of network, analysis present displayed content it is whether healthy, to the corresponding audio-video document of unsound content into
Row is closed, so that children avoid being influenced by decadent content.
The use control method of user equipment described in the present embodiment can advise current safety according to content-control rule
It is then supplemented, the use content of user equipment is more accurately controlled by cloud massive data and powerful computing capability
System can effectively use the beneficial functions of user equipment so as to further ensure children.
According to one embodiment of present invention, also provide a kind of user equipment uses control device, wherein, which sets
Standby including but not limited to desktop computer, laptop, smart mobile phone, tablet computer, game machine, set-top box, electronic reader
Deng.
As shown in Figure 4, the use control device of the user equipment mainly includes:
For receiving the device of code content input by user (hereinafter referred to as " receiving unit ") 400;
For determining the device of the corresponding specific crowd of the code content (hereinafter referred to as " judging unit ") 410;And
For being carried out according to the corresponding current safety rule of identified specific crowd to usage time and/or using content
Use the device (hereinafter referred to as " using control unit ") 420 of control.
Wherein, receiving unit 400 pass through the dialog box, built-in sensors or the fingerprint that are shown on screen for receiving user
The code content of typing window input.The code content can set user by power key or certain gestures startup in user
Standby unlock inputs when operating, and can also be inputted in the arbitrary picture after the user equipment is unlocked.
Specifically, can be stored in a user device there are many for unlocking the code content of operation, mainly include common solution
Lock cipher, specific crowd (such as children) use pattern password.When the unlock that user starts to user equipment operates, if user
Common unlocking pin is inputted, then the user equipment enters mode standard, is not controlled to usage time and/or using content;
If user inputs children's use pattern password, which enters children's use pattern, and right according to current safety rule
It usage time and/or is controlled using content.When the user equipment returns parent in use, then can be by starting to user
Common unlocking pin is inputted during the unlock operation of equipment and restores mode standard, so as to the normal use user equipment.
Also, since children's study and ability to model are stronger, using only character as children's use pattern password and general
General solution lock cipher is then easily remembered by children and jumps out children's use pattern, and the user equipment is used so as to unrestricted, because
This when parent gives user equipment need before children's use to input password when, three kinds of following modes of preferable use it
One, to avoid children's use pattern is jumped out:
Mode one
Children's use pattern password and common unlocking pin are used as in a manner that gesture is combined character, that is, inputted
The window of code content is not provided with the button of confirmation input, only inputs after corresponding character again by specific gesture ability
Trigger reception of the user equipment to code content.It is specific since attention children can only focus on the input of character
Even if gesture can make children remember character password, the input of code content can not be also completed, so as to ensure to be only capable of in children
The user equipment is used under use pattern.
Mode two
It is stored with the finger print information for starting children's use pattern in a user device, is given by the user equipment
Tong Qian, it is only necessary to specific finger be inputted into fingerprint in fingerprint entry window, you can start children's use pattern.It is used as by fingerprint
The mode that code content starts children's use pattern can realize startup children's use pattern in the case where not discovered by children.
Mode three
One password acceptance program started simultaneously with operating system, the password acceptance can be installed in the user equipment
Program is always in running background and real-time reception content input by user, when content input by user and preset children use mould
When formula password (such as specific character string or gesture) matches, then it will start children's use pattern, so as to fulfill not by children
Start children's use pattern in the case of discovering.
Judging unit 410, specifically, can be in the user equipment for determining the corresponding specific crowd of the code content
After receiving code content input by user, carried out according to the classification of code content and pre-stored children's use pattern password
Matching.
Specifically, it is had input when user is being started the unlock to user equipment by power key or certain gestures and operated close
During digital content, then judge which kind of latching mode the code content corresponds to.Common unlocking pin and youngster are stored in the user equipment
Virgin use pattern password etc..Code content is inputted in arbitrary picture after user is in unlock, then whether judges the code content
With pre-stored children's use pattern code matches.
Using control unit 420, according to current safety corresponding with identified specific crowd rule, the user is set
It standby usage time and/or carries out using control using content.Specifically, when code content input by user with it is pre-stored
During the use pattern code matches of specific crowd (such as children), then using control unit 420 according to current safety rule to making
It is controlled with the time and/or using content.
Optionally, if judging unit 410 judges during the unlock operation of user to user equipment the code content that inputs to be general
General solution lock cipher starts general mode after then the user equipment is unlocked;If judging unit 410 judges user to user equipment
The code content inputted during unlock operation is children's use pattern password, then starting children after the user equipment is unlocked uses mould
Formula.The code content inputted in arbitrary picture after judging unit 410 judges user in unlock makes with pre-stored children
With pattern code matches, the user equipment is started into children's use pattern if matching.
Wherein, it is controlled using control unit 420 according to current safety rule to usage time and/or using content
Process includes, but are not limited to following manner:
Mode 1:
To usage time, current safety rule can be set as specific time period (such as the Mon-Fri only in one day
19 points to 20 points, 18 points to 20 points of weekend) using the user equipment or in accumulation used specific duration (such as week
One to Friday accumulate 1 hour, weekend accumulate 2 hours) after then close the user equipment.In this prior under the control of safety regulation,
Children can only cause shadow so as to avoid usage time long in the defined time using the user equipment to the health of children
It rings.
Mode 2:
To using content, current safety rule can be set as only allowing to access the network address for pre-entering white list, only permit
Perhaps it installs or runs and pre-enter the application program of white list, browsing is only allowed to pre-enter audio-video document of white list etc..
In this prior under the control of safety regulation, children can only browse to specific content by the user equipment, so as to avoid it is pornographic,
The contents such as violence are to physically and mentally healthy influence.It, then can should for example, main long find that children compare addiction to some game in the recent period
Game is removed from white list, so as to control addiction degree of the children to game.
It is further preferred that it can be included using control unit 420:
Time control subelement (not shown) for being directed to the different use corresponding time weights of curriculum offering, will make
It is controlled by the use of the time used of content with the product of corresponding time weight as usage time.If for example, current peace
The daily usage time set in full rule may be configured as 1 as 1 hour, for the weights of game, i.e., when run 1 it is small when
Game, then it is assumed that usage time reaches 1 hour;0.5 may be configured as the weights for playing music, i.e., when played 2 it is small when
Music, then it is assumed that usage time reaches 1 hour;0.4 may be configured as the weights of early education reading matter, i.e., when browsed 2.5 it is small when
Early education reading matter, then it is assumed that usage time reaches 1 hour.After according to the different weights of different curriculum offerings, Ke Yiyin
The usage time that children's reasonable distribution difference uses content is led, so as to achieve the purpose that teach through lively activities and strike a proper balance between work and rest.
The user equipment provided through this embodiment uses control device, can be made according to specific crowd (such as children)
With pattern password open protection of the child pattern, in the case where children do not perceive in real time to children using user equipment time and
Content is controlled, and children is enable effectively to use the beneficial functions of user equipment, so as to promote the health hair of children's body and mind
Exhibition.
In another embodiment, as shown in figure 5, the user equipment is further included using control device:
According to content-control rule, to currently via the current safety rule carry out using the use content of control
The device (hereinafter referred to as " content matching unit ", be not shown) of matching inquiry;
Pair the device of control forbid (hereinafter referred to as " to forbid using content with what the content-control rule matched
Control unit 430 ").
Although the current safety rule in a upper embodiment can be carried out to the usage time of user equipment and/or using content
Control, but the content that still might have other than rule when children are using the user equipment is seen by children.Such as by current
Safety regulation allows the link in the website logged in log on to website, certain application program or sound that other unsuitable children log in regard
Contain content of unsuitable children viewing etc. in frequency file, thus the present embodiment on the basis of above-mentioned current safety rule into
One step intercepts specific content by content-control rule.Optionally, content matching unit can be in user equipment local
According to content-control rule, to currently carrying out using the use content of control match looking into via the current safety rule
It askes or matching inquiry result is obtained by the interaction with the network equipment.For latter means, content matching unit may include:
Sending module, for currently being carried out described by the current safety rule using the phase using content controlled
It closes information and is sent to the network equipment;
Receiving module carries out using control from the network equipment for receiving about the current safety rule is currently passed through
The matching result using content and content-control rule of system.
It is optionally, described to include website, application program and audio, video data using content,
Wherein, pair use content to match with the content-control rule of control unit 430 is forbidden to carry out forbidding controlling
The operation of system includes following at least any one:
1) forbid accessing the website to match with the secure access rule.Specifically, content matching unit picks are current
Network access request, and obtained in user equipment locally or through with network equipment interaction by the current network access
Request is matched with the secure access rule in high in the clouds;Then, control unit 430 is forbidden to forbid accessing and the secure access rule
The website then to match.The unsuitable children for including real-time update in the secure access rule of the network equipment (such as high in the clouds) visit
The website asked, when children by links and accesses to these websites when, then can forbid access by way of avoid children by not
It is suitble to the influence of website that children access.
2) forbid installing or starting the application program to match with the security application rule.Specifically, content matching list
The member extraction application program that is currently installed on or starts, and obtained locally or through with network equipment interaction by the current peace
Dress or the application program started are matched with the security application rule in high in the clouds;Then, forbid control unit 430 forbid installation or
Start the application program to match with the security application rule.Some popular application programs may be tied by illegal operator
Dangerous content is tied up, children may be in the case of ignorant and above-mentioned current safety rule None- identified by these application programs
The user equipment is packed into, therefore the application program for being currently installed on or starting can be passed through local or the peace of the network equipment (such as high in the clouds)
It is scanned entirely using rule, if not finding dangerous content, allows to install or start, if finding dangerous content, prevent to pacify
Dress starts, so as to control the health of user equipment content.
3) content that display is forbidden to match with the safety display rule.Specifically, the interception of content matching unit is current
The content of display, and obtain the content currently shown and cloud in the interaction locally or through the network equipment (such as high in the clouds)
The safety at end shows that rule is matched, and then, forbids control unit 430 that display is forbidden to show that rule matches with the safety
Content.When children browse audio-video document, sectional drawing can be carried out to the audio-video document of broadcasting at predetermined time intervals, and pass through
It is matched with characteristic value or the image recognition algorithm of artificial neural network, whether analysis present displayed content is healthy, to unsound
The corresponding audio-video document of content is closed, so that children avoid being influenced by decadent content.
User equipment described in the present embodiment uses control device, can be according to content-control rule to current safety rule
It is supplemented, the use content of user equipment is more accurately controlled by cloud massive data and powerful computing capability
System can effectively use the beneficial functions of user equipment so as to further ensure children.
It should be noted that the present invention can be carried out in the assembly of software and/or software and hardware, for example, can adopt
With application-specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment
In, software program of the invention can perform to realize steps described above or function by processor.Similarly, it is of the invention
Software program can be stored in computer readable recording medium storing program for performing (including relevant data structure), for example, RAM memory,
Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the present invention, example
Such as, as coordinating with processor so as to perform the circuit of each step or function.
In addition, the part of the present invention can be applied to computer program product, such as computer program instructions, when its quilt
When computer performs, by the operation of the computer, it can call or provide according to the method for the present invention and/or technical solution.
And the program instruction of the method for the present invention is called, it is possibly stored in fixed or moveable recording medium and/or passes through
Broadcast or the data flow in other signal loaded mediums and be transmitted and/or be stored according to described program instruction operation
In the working storage of computer equipment.Here, including a device according to one embodiment of present invention, which includes using
Memory in storage computer program instructions and processor for executing program instructions, wherein, when the computer program refers to
When order is performed by the processor, method and/or skill of the device operation based on aforementioned multiple embodiments according to the present invention are triggered
Art scheme.
It is obvious to a person skilled in the art that the present invention is not limited to the details of above-mentioned exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Profit requirement rather than above description limit, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims
Variation includes within the present invention.Any reference numeral in claim should not be considered as to the involved claim of limitation.This
Outside, it is clear that one word of " comprising " is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in system claims is multiple
Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade words are used for table
Show title, and do not represent any particular order.
Claims (8)
1. a kind of use control method of user equipment, wherein, including:
Receive code content input by user;
Determine the corresponding specific crowd of the code content;
According to current safety corresponding with identified specific crowd rule, usage time to the user equipment and/or make
It is carried out using control with content;
Wherein, it is described to include according to current safety rule to usage time and/or the step of control using content:
According to from the different corresponding time weights of use content, the time used for using content is weighed with the corresponding time
The product of value carries out using control as usage time.
2. according to the method described in claim 1, wherein, the method further includes:
According to content-control rule, to currently via the current safety rule match using the use content of control
Inquiry;
Pair use content to match with the content-control rule carries out forbidding controlling.
3. it is described according to content-control rule according to the method described in claim 2, wherein, to currently via the current peace
Full rule include the step of carrying out matching inquiry using the use content of control:
It currently carries out being sent to network using the relevant information of content using control via the current safety rule by described
Equipment;
Receive from the network equipment about currently via the current safety rule carry out using control use content with it is interior
Hold the matching result of control rule.
4. it is described to include website, application program and audio, video data using content according to the method described in claim 3, wherein,
Wherein, the described pair of use content to match with the content-control rule the step of control forbid to include with down toward
It is any one of few:
Forbid accessing the website to match with secure access rule;
Forbid installing or start the application program that matches with security application rule;
The content that display is forbidden to match with safety display rule.
5. a kind of user equipment uses control device, wherein, including:
For receiving the device of code content input by user;
For determining the device of the corresponding specific crowd of the code content;
For being used according to the corresponding current safety rule of identified specific crowd to usage time and/or using content
The device of control;
Wherein, it is described to be used to carry out the device packet using control according to current safety rule to usage time and/or using content
It includes:
Subelement is controlled, for basis and the different corresponding time weights of use content, content will be used in actual use
Between carry out as usage time using control with the product of corresponding time weight.
6. device according to claim 5, wherein, described device further includes:
According to content-control rule, to currently via the current safety rule match using the use content of control
The device of inquiry;
Pair device for using content forbid control to match with the content-control rule.
7. device according to claim 6, wherein, it is described according to content-control rule, to currently via the current peace
Full rule included using the device that matching inquiry is carried out using content of control:
Sending module, for currently carrying out believing using the correlation of content using control via the current safety rule by described
Breath is sent to the network equipment;
Receiving module, for receive from the network equipment about currently via the current safety rule carry out using control
Use the matching result of content and content-control rule.
8. device according to claim 7, wherein, it is described to include website, application program and audio, video data using content,
Wherein, described pair with the content-control rule match forbid the device of control using content for perform with
Under any one of at least operation:
Forbid accessing the website to match with secure access rule;
Forbid installing or start the application program that matches with security application rule;
The content that display is forbidden to match with safety display rule.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410797735.1A CN104573479B (en) | 2014-12-18 | 2014-12-18 | A kind of use control method and device of user equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410797735.1A CN104573479B (en) | 2014-12-18 | 2014-12-18 | A kind of use control method and device of user equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104573479A CN104573479A (en) | 2015-04-29 |
CN104573479B true CN104573479B (en) | 2018-07-06 |
Family
ID=53089519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410797735.1A Active CN104573479B (en) | 2014-12-18 | 2014-12-18 | A kind of use control method and device of user equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104573479B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106919408A (en) * | 2015-12-24 | 2017-07-04 | 北京奇虎科技有限公司 | Control the method and device of mobile terminal |
CN107305612A (en) * | 2016-04-25 | 2017-10-31 | 奇酷软件(深圳)有限公司 | Management method, managing device and the terminal of application program |
CN105916005B (en) * | 2016-06-12 | 2019-01-08 | 腾讯科技(深圳)有限公司 | The content model control method and device of multimedia messages |
CN106228061A (en) * | 2016-07-27 | 2016-12-14 | 广东欧珀移动通信有限公司 | Control method and mobile terminal |
CN106295273A (en) * | 2016-07-27 | 2017-01-04 | 广东欧珀移动通信有限公司 | Control method and control device |
CN106228060A (en) * | 2016-07-27 | 2016-12-14 | 广东欧珀移动通信有限公司 | Control method and control device |
CN106650429A (en) * | 2016-09-30 | 2017-05-10 | 北京奇虎科技有限公司 | User behavior management method and system, and secure desktop |
CN106650416A (en) * | 2016-11-29 | 2017-05-10 | 深圳市金立通信设备有限公司 | Password setting and decrypting methods and terminal |
CN106845274A (en) * | 2017-02-07 | 2017-06-13 | 广东小天才科技有限公司 | The method and electric terminal of file process |
CN109657428A (en) * | 2017-10-12 | 2019-04-19 | 深圳市Tcl高新技术开发有限公司 | A kind of control method of mobile terminal, mobile terminal and storage medium |
CN107645585A (en) * | 2017-10-12 | 2018-01-30 | 深圳辉烨通讯技术有限公司 | A kind of method and device for intercepting voice service |
CN108494841B (en) * | 2018-03-13 | 2020-05-22 | 广东小天才科技有限公司 | Management and control method and device based on use condition of terminal equipment |
CN109325335A (en) * | 2018-10-15 | 2019-02-12 | 深圳壹账通智能科技有限公司 | System safety method, device, computer equipment and storage medium |
CN109889539B (en) * | 2019-03-21 | 2021-02-19 | 安徽威尔信通信科技有限责任公司 | Intelligent terminal browsing information filtering method based on WIFI |
CN112148896A (en) * | 2020-09-10 | 2020-12-29 | 京东数字科技控股股份有限公司 | Data processing method and device for terminal media monitoring and broadcasting |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1909610A (en) * | 2005-08-05 | 2007-02-07 | 鸿富锦精密工业(深圳)有限公司 | Television device with definition mode and its control method |
CN102650955A (en) * | 2012-03-31 | 2012-08-29 | 奇智软件(北京)有限公司 | Mode adapting method and mode adapting system for user interface |
CN103139353A (en) * | 2013-01-28 | 2013-06-05 | 广东欧珀移动通信有限公司 | Lock unlocking method and lock unlocking device of mobile terminal |
CN103427990A (en) * | 2012-05-18 | 2013-12-04 | 华为终端有限公司 | Authority authentication method and terminal device |
CN103488924A (en) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | Terminal unlocking processing method, device and equipment |
CN104036195A (en) * | 2013-03-07 | 2014-09-10 | 联想(北京)有限公司 | Information processing method and device |
-
2014
- 2014-12-18 CN CN201410797735.1A patent/CN104573479B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1909610A (en) * | 2005-08-05 | 2007-02-07 | 鸿富锦精密工业(深圳)有限公司 | Television device with definition mode and its control method |
CN102650955A (en) * | 2012-03-31 | 2012-08-29 | 奇智软件(北京)有限公司 | Mode adapting method and mode adapting system for user interface |
CN103427990A (en) * | 2012-05-18 | 2013-12-04 | 华为终端有限公司 | Authority authentication method and terminal device |
CN103139353A (en) * | 2013-01-28 | 2013-06-05 | 广东欧珀移动通信有限公司 | Lock unlocking method and lock unlocking device of mobile terminal |
CN104036195A (en) * | 2013-03-07 | 2014-09-10 | 联想(北京)有限公司 | Information processing method and device |
CN103488924A (en) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | Terminal unlocking processing method, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN104573479A (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104573479B (en) | A kind of use control method and device of user equipment | |
US11558368B2 (en) | Screen-analysis based device security | |
CN111585964B (en) | Login information input method, login information storage method and related device | |
CN103814380B (en) | For strengthening the method and apparatus of the security in equipment using multiple-factor password or dynamic password | |
CN103797752B (en) | For providing certification to control the access of method and computer to(for) computer system | |
CN104270404B (en) | A kind of login method and device based on terminal iidentification | |
US7873995B2 (en) | Method and apparatus for generating and reinforcing user passwords | |
US10963545B2 (en) | Authentication via typing cadence, gestures, and QR codes | |
CN104541493B (en) | Biometric data is used to carry out wireless pairing and communicate between devices | |
CN108763561A (en) | E-book method for pushing, device and computer readable storage medium | |
CN103927466A (en) | Method and device for controlling mobile terminal | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN105701420B (en) | A kind of management method and terminal of user data | |
CN103348352B (en) | Personal digital assistant device and grip features learning method | |
Khodadadi et al. | Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes. | |
CN108305057A (en) | Dispensing apparatus, method and the computer readable storage medium of electronics red packet | |
CN105608616B (en) | Method and device for remotely assisting controlled equipment | |
CN110163241A (en) | Data sample generation method, device, computer equipment and storage medium | |
CN109254661A (en) | Image display method, device, storage medium and electronic equipment | |
CN108710516A (en) | Acquisition method, device, storage medium and the intelligent terminal of forecast sample | |
CN108664286A (en) | Application program preloads method, apparatus, storage medium and mobile terminal | |
CN108401173A (en) | Interactive terminal, method and the computer readable storage medium of mobile live streaming | |
US20200201977A1 (en) | Method for authenticating a first user and corresponding first device and system | |
KR20130082980A (en) | User personalized recommendation system based on face-recognition | |
CN109657428A (en) | A kind of control method of mobile terminal, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |