CN104573479B - A kind of use control method and device of user equipment - Google Patents

A kind of use control method and device of user equipment Download PDF

Info

Publication number
CN104573479B
CN104573479B CN201410797735.1A CN201410797735A CN104573479B CN 104573479 B CN104573479 B CN 104573479B CN 201410797735 A CN201410797735 A CN 201410797735A CN 104573479 B CN104573479 B CN 104573479B
Authority
CN
China
Prior art keywords
content
rule
control
user equipment
children
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410797735.1A
Other languages
Chinese (zh)
Other versions
CN104573479A (en
Inventor
袁艺
王道龙
刘晓伟
李华明
刘孟
燕宇飞
易敏文
吕文玉
张钰
袁正沧
方驰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201410797735.1A priority Critical patent/CN104573479B/en
Publication of CN104573479A publication Critical patent/CN104573479A/en
Application granted granted Critical
Publication of CN104573479B publication Critical patent/CN104573479B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention provides a kind of use control method and device of user equipment, method therein includes:Receive code content input by user;Determine the corresponding specific crowd of the code content;According to current safety corresponding with identified specific crowd rule, usage time to the user equipment and/or carry out using control using content.The present invention can be according to specific crowd, such as children, use pattern password unlatching specific crowd is corresponding to use control model, children using the time and content of user equipment are controlled in real time in the case where user does not perceive, enable a user to effectively use the beneficial functions of user equipment.

Description

A kind of use control method and device of user equipment
Technical field
The present invention relates to field of mobile terminals more particularly to a kind of use control method and device of user equipment.
Background technology
With the development of mobile Internet, more and more user equipmenies, such as smart mobile phone, tablet computer, electronics are read It reads device etc. and occupies very high frequency of use in family life, so as to which children also be caused also to be got over using the time of user equipment Come more.User equipment not only serves as the amusement equipment use for loosening body and mind, tutor auxiliary platform equipment is can also be used as, by swashing The mode of hair learning interest promotes children's study ability.
Since children lack self-control when the age is smaller, judgment is also lacked to the quality of user equipment content visible. When lacking parent's supervision, they may be immoderate using the application in user equipment with game function, long-term in face of screen Curtain can also affect vision and normal learning life;In addition, since user equipment is generally Internet enabled, children are possible to Browsing is unfavorable for their physically and mentally healthy contents, such as porn site, violent pictures etc..Therefore it needs to set children using user The standby time and content visible is controlled.
Invention content
Present invention solves the technical problem that one of be how to specific crowd using user equipment time and content visible What is controlled uses user equipment.
According to an aspect of the invention, there is provided a kind of use control method of user equipment, wherein, including:
Receive code content input by user;
Determine the corresponding specific crowd of the code content;
According to current safety corresponding with identified specific crowd rule, to the usage time of the user equipment and/ Or it carries out using control using content.
According to another aspect of the present invention, the use control device of a kind of user equipment, wherein, including:
For receiving the device of code content input by user,;
For determining the device of the corresponding specific crowd of the code content;
For being carried out according to the corresponding current safety rule of identified specific crowd to usage time and/or using content Use the device of control.
Since the present embodiment can be according to specific crowd, such as children, use pattern password opens specific crowd and corresponds to Use control model, children are controlled using the time and content of user equipment in real time in the case where user does not perceive System enables a user to effectively use the beneficial functions of user equipment.
Although those of ordinary skill in the art will be appreciated that following detailed description carries out referenced in schematic embodiment, attached drawing, But the present invention is not limited in these embodiments.But the scope of the present invention is extensive, and is intended to be bound only by appended right It is required that limit the scope of the present invention.
Description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, of the invention is other Feature, objects and advantages will become more apparent upon:
Fig. 1 shows the flow chart using control method of user equipment according to an embodiment of the invention.
Fig. 2 is the detail flowchart using control method of user equipment according to an embodiment of the invention.
Fig. 3 is the flow chart using control method of user equipment in accordance with another embodiment of the present invention.
Fig. 4 is the block diagram using control device of user equipment according to an embodiment of the invention.
Fig. 5 is the block diagram using control device of user equipment in accordance with another embodiment of the present invention.
The same or similar reference numeral represents the same or similar component in attached drawing.
Specific embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
Fig. 1 shows the flow chart using control method of user equipment according to an embodiment of the invention.Wherein, the use Family equipment includes but not limited to desktop computer, laptop, smart mobile phone, tablet computer, game machine, set-top box, electronics and reads Read device etc..
As shown in fig. 1, the use control method of user equipment described in the present embodiment mainly includes the following steps:
S100, code content input by user is received, wherein, the code content includes, but are not limited to character, gesture Or at least one of fingerprint;
S110, the corresponding specific crowd of pattern for determining the code content
S120, according to current safety corresponding with identified specific crowd rule, during to the use of the user equipment Between and/or carried out using control using content.
Wherein, the specific crowd includes, but are not limited to the crowd divided by all ages and classes range or by different operating The crowd of Type division or the crowd etc. divided by different zones.In the following, to press the youngster in the crowd of all ages and classes range division It is illustrated for child.Each step is described in further detail referring to Fig. 2.
As shown in Fig. 2, in step S100, which receives user and passes through virtually or physically keyboard, built-in sensors Or the code content of fingerprint entry window input.The code content can pass through power key or certain gestures startup pair in user It inputs, can also be inputted in the arbitrary picture after the user equipment is unlocked during the unlock operation of user equipment.
Specifically, it can store in a user device there are many for unlocking the code content of operation, mainly include common solution Lock cipher, specific crowd (such as children) use pattern password.When the unlock that user starts to user equipment operates, if user Common unlocking pin is inputted, then the user equipment enters mode standard, is not controlled to usage time and/or using content; If user inputs children's use pattern password, which enters children's use pattern, and right according to current safety rule It usage time and/or is controlled using content.When the user equipment returns parent in use, then can be by starting to user Common unlocking pin is inputted during the unlock operation of equipment and restores mode standard, so as to the normal use user equipment.
Also, since children's study and ability to model are stronger, using only character as children's use pattern password and general General solution lock cipher is then easily remembered by children and jumps out children's use pattern, and the user equipment is used so as to unrestricted, because This when parent gives user equipment need before children's use to input password when, three kinds of following modes of preferable use it One, to avoid children's use pattern is jumped out:
Mode one
Children's use pattern password and common unlocking pin are used as in a manner that gesture is combined character, that is, inputted The window of code content is not provided with the button of confirmation input, only inputs after corresponding character again by specific gesture ability Trigger reception of the user equipment to code content.It is specific since attention children can only focus on the input of character Even if gesture can make children remember character password, the input of code content can not be also completed, so as to ensure to be only capable of in children The user equipment is used under use pattern.
Mode two
It is stored with the finger print information for starting children's use pattern in a user device, is given by the user equipment Tong Qian, it is only necessary to specific finger be inputted into fingerprint in fingerprint entry window, you can start children's use pattern.It is used as by fingerprint The mode that code content starts children's use pattern can realize startup children's use pattern in the case where not discovered by children.
Mode three
One password acceptance program started simultaneously with operating system, the password acceptance can be installed in the user equipment Program is always in running background and real-time reception content input by user, when content input by user and preset children use mould When formula password (such as specific character string or gesture) matches, then it will start children's use pattern, so as to fulfill not by children Start children's use pattern in the case of discovering.
In step S110, determine that the process of the corresponding specific crowd of the code content can be included in the user equipment and connect After receiving code content input by user, according to the classification of code content and the progress of pre-stored children's use pattern password Match, such as:
The passwords such as common unlocking pin and children's use pattern password are stored in the user equipment.When user is passing through When the unlock that power key or certain gestures start to user equipment has input code content when operating, the code content is first determined whether Which kind of corresponding latching mode when the code content and children's use pattern code matches, then performs next step.Alternatively, Input code content in arbitrary picture after user is in unlock, first determine whether the code content whether with pre-stored children Use pattern code matches perform next step if matching.
In step S120, according to current safety corresponding with identified specific crowd rule, to the user equipment It usage time and/or is carried out using content using control.Specifically, when code content input by user with it is pre-stored specific During the use pattern code matches of crowd (such as children), then according to the corresponding current safety rule of children to usage time and/ Or it is controlled using content.
Optionally, if the code content for judging to input during the unlock operation of user to user equipment is common unlocking pin, Start general mode after then the user equipment is unlocked;If in the password inputted during the unlock operation for judging user to user equipment Hold for children's use pattern password, then startup children's use pattern after the user equipment is unlocked.After user is judged in unlock Arbitrary picture in the code content that inputs and pre-stored children's use pattern code matches, by the user if matching Equipment starts children's use pattern.
Wherein, the process controlled according to current safety rule to usage time in step S120 and/or using content Include, but are not limited to following manner:
Mode 1:
To usage time, current safety rule can be set as specific time period (such as the Mon-Fri only in one day 19 points to 20 points, 18 points to 20 points of weekend) using the user equipment or in accumulation used specific duration (such as week One to Friday accumulate 1 hour, weekend accumulate 2 hours) after then close the user equipment.In this prior under the control of safety regulation, Children can only cause shadow so as to avoid usage time long in the defined time using the user equipment to the health of children It rings.
Mode 2:
To using content, current safety rule can be set as only allowing to access the network address for pre-entering white list, only permit Perhaps it installs or runs and pre-enter the application program of white list, browsing is only allowed to pre-enter audio-video document of white list etc.. In this prior under the control of safety regulation, children can only browse to specific content by the user equipment, so as to avoid it is pornographic, The contents such as violence are to physically and mentally healthy influence.It, then can should for example, main long find that children compare addiction to some game in the recent period Game is removed from white list, so as to control addiction degree of the children to game.
It is further preferred that the control for using content, can use the curriculum offering corresponding time for different Weights are controlled the time used for using content with the product of corresponding time weight as usage time.For example, If the daily usage time set in current safety rule may be configured as 1 as 1 hour, for the weights of game, that is, work as operation The game of 1 hour, then it is assumed that usage time reaches 1 hour;0.5 may be configured as the weights for playing music, that is, work as broadcasting The music of 2 hours, then it is assumed that usage time reaches 1 hour;0.4 may be configured as the weights of early education reading matter, that is, work as browsing The early education reading matter of 2.5 hours, then it is assumed that usage time reaches 1 hour.According to the different weights of different curriculum offerings Afterwards, children's reasonable distribution difference can be guided to use the usage time of content, so as to reach what is taught through lively activities and strike a proper balance between work and rest Purpose.
The use control method of the user equipment provided through this embodiment can make according to specific crowd (such as children) With pattern password open protection of the child pattern, in the case where children do not perceive in real time to children using user equipment time and Content is controlled, and children is enable effectively to use the beneficial functions of user equipment, so as to promote the health hair of children's body and mind Exhibition.
In another embodiment, as shown in figure 3, the use control method of the user equipment can also include step S130, according to content-control rule, to currently carrying out the use content progress using control via the current safety rule With inquiry;And pair use content to match with the content-control rule carries out forbidding controlling.
Although the current safety rule in a upper embodiment can be carried out to the usage time of user equipment and/or using content Control, but the content that still might have other than rule when children are using the user equipment is seen by children.Such as by current Safety regulation allows the link in the website logged in log on to website, certain application program or sound that other unsuitable children log in regard Contain content of unsuitable children viewing etc. in frequency file, thus the present embodiment on the basis of above-mentioned current safety rule into One step intercepts specific content by content-control rule.Optionally, user equipment can be in local according to content-control Rule, to currently via the current safety rule carry out using control use content progress matching inquiry or by with net The interaction of network equipment obtains matching inquiry as a result, detailed process is as follows:
By described currently being sent to using the relevant information of content using control is carried out by the current safety rule The network equipment;
Receive the use content carried out about the currently process current safety rule using control from the network equipment With the matching result of content-control rule.
It is optionally, described to include website, application program and audio, video data using content,
Wherein, the described pair of use content to match with the content-control rule the step of control forbid to include with It is any one of lower:
1) forbid accessing the website to match with the secure access rule.Specifically, user equipment captures current net Network access request, and obtaining the current network access request and secure access locally or through with network equipment interaction The matches of rule are as a result, then, forbid accessing the website to match with the secure access rule.In the network equipment (such as High in the clouds) secure access rule in include real-time update unsuitable children access website, when children pass through links and accesses During to these websites, then the website that by way of forbidding accessing the children can be avoided to be accessed by unsuitable children influences.
2) forbid installing or starting the application program to match with the security application rule.Specifically, user equipment carries It takes the application program for being currently installed on or starting, and described be currently installed on or open to obtain locally or through with network equipment interaction Dynamic application program and the matching result of the security application rule in high in the clouds then, are forbidden installing or be started and the security application The application program that rule matches.Some popular application programs may bundle dangerous content, children by illegal operator These application programs may be packed into the user equipment in the case of ignorant and above-mentioned current safety rule None- identified, because This can be swept the application program for being currently installed on or starting by the security application rule of local or the network equipment (such as high in the clouds) It retouches, if not finding dangerous content, allows to install or start, if finding dangerous content, prevent to install or start, so as to ensure The health of user equipment content.
3) content that display is forbidden to match with the safety display rule.Specifically, the current display of user equipment interception Content, it is and to obtain that the content currently shown and safety is aobvious in the interaction locally or through the network equipment (such as high in the clouds) Show the matching result of rule, then, the content that display is forbidden to match with the safety display rule.When children browse audio and video During file, sectional drawing can be carried out to the audio-video document of broadcasting at predetermined time intervals, and by being matched with characteristic value or artificial neuron The image recognition algorithm of network, analysis present displayed content it is whether healthy, to the corresponding audio-video document of unsound content into Row is closed, so that children avoid being influenced by decadent content.
The use control method of user equipment described in the present embodiment can advise current safety according to content-control rule It is then supplemented, the use content of user equipment is more accurately controlled by cloud massive data and powerful computing capability System can effectively use the beneficial functions of user equipment so as to further ensure children.
According to one embodiment of present invention, also provide a kind of user equipment uses control device, wherein, which sets Standby including but not limited to desktop computer, laptop, smart mobile phone, tablet computer, game machine, set-top box, electronic reader Deng.
As shown in Figure 4, the use control device of the user equipment mainly includes:
For receiving the device of code content input by user (hereinafter referred to as " receiving unit ") 400;
For determining the device of the corresponding specific crowd of the code content (hereinafter referred to as " judging unit ") 410;And
For being carried out according to the corresponding current safety rule of identified specific crowd to usage time and/or using content Use the device (hereinafter referred to as " using control unit ") 420 of control.
Wherein, receiving unit 400 pass through the dialog box, built-in sensors or the fingerprint that are shown on screen for receiving user The code content of typing window input.The code content can set user by power key or certain gestures startup in user Standby unlock inputs when operating, and can also be inputted in the arbitrary picture after the user equipment is unlocked.
Specifically, can be stored in a user device there are many for unlocking the code content of operation, mainly include common solution Lock cipher, specific crowd (such as children) use pattern password.When the unlock that user starts to user equipment operates, if user Common unlocking pin is inputted, then the user equipment enters mode standard, is not controlled to usage time and/or using content; If user inputs children's use pattern password, which enters children's use pattern, and right according to current safety rule It usage time and/or is controlled using content.When the user equipment returns parent in use, then can be by starting to user Common unlocking pin is inputted during the unlock operation of equipment and restores mode standard, so as to the normal use user equipment.
Also, since children's study and ability to model are stronger, using only character as children's use pattern password and general General solution lock cipher is then easily remembered by children and jumps out children's use pattern, and the user equipment is used so as to unrestricted, because This when parent gives user equipment need before children's use to input password when, three kinds of following modes of preferable use it One, to avoid children's use pattern is jumped out:
Mode one
Children's use pattern password and common unlocking pin are used as in a manner that gesture is combined character, that is, inputted The window of code content is not provided with the button of confirmation input, only inputs after corresponding character again by specific gesture ability Trigger reception of the user equipment to code content.It is specific since attention children can only focus on the input of character Even if gesture can make children remember character password, the input of code content can not be also completed, so as to ensure to be only capable of in children The user equipment is used under use pattern.
Mode two
It is stored with the finger print information for starting children's use pattern in a user device, is given by the user equipment Tong Qian, it is only necessary to specific finger be inputted into fingerprint in fingerprint entry window, you can start children's use pattern.It is used as by fingerprint The mode that code content starts children's use pattern can realize startup children's use pattern in the case where not discovered by children.
Mode three
One password acceptance program started simultaneously with operating system, the password acceptance can be installed in the user equipment Program is always in running background and real-time reception content input by user, when content input by user and preset children use mould When formula password (such as specific character string or gesture) matches, then it will start children's use pattern, so as to fulfill not by children Start children's use pattern in the case of discovering.
Judging unit 410, specifically, can be in the user equipment for determining the corresponding specific crowd of the code content After receiving code content input by user, carried out according to the classification of code content and pre-stored children's use pattern password Matching.
Specifically, it is had input when user is being started the unlock to user equipment by power key or certain gestures and operated close During digital content, then judge which kind of latching mode the code content corresponds to.Common unlocking pin and youngster are stored in the user equipment Virgin use pattern password etc..Code content is inputted in arbitrary picture after user is in unlock, then whether judges the code content With pre-stored children's use pattern code matches.
Using control unit 420, according to current safety corresponding with identified specific crowd rule, the user is set It standby usage time and/or carries out using control using content.Specifically, when code content input by user with it is pre-stored During the use pattern code matches of specific crowd (such as children), then using control unit 420 according to current safety rule to making It is controlled with the time and/or using content.
Optionally, if judging unit 410 judges during the unlock operation of user to user equipment the code content that inputs to be general General solution lock cipher starts general mode after then the user equipment is unlocked;If judging unit 410 judges user to user equipment The code content inputted during unlock operation is children's use pattern password, then starting children after the user equipment is unlocked uses mould Formula.The code content inputted in arbitrary picture after judging unit 410 judges user in unlock makes with pre-stored children With pattern code matches, the user equipment is started into children's use pattern if matching.
Wherein, it is controlled using control unit 420 according to current safety rule to usage time and/or using content Process includes, but are not limited to following manner:
Mode 1:
To usage time, current safety rule can be set as specific time period (such as the Mon-Fri only in one day 19 points to 20 points, 18 points to 20 points of weekend) using the user equipment or in accumulation used specific duration (such as week One to Friday accumulate 1 hour, weekend accumulate 2 hours) after then close the user equipment.In this prior under the control of safety regulation, Children can only cause shadow so as to avoid usage time long in the defined time using the user equipment to the health of children It rings.
Mode 2:
To using content, current safety rule can be set as only allowing to access the network address for pre-entering white list, only permit Perhaps it installs or runs and pre-enter the application program of white list, browsing is only allowed to pre-enter audio-video document of white list etc.. In this prior under the control of safety regulation, children can only browse to specific content by the user equipment, so as to avoid it is pornographic, The contents such as violence are to physically and mentally healthy influence.It, then can should for example, main long find that children compare addiction to some game in the recent period Game is removed from white list, so as to control addiction degree of the children to game.
It is further preferred that it can be included using control unit 420:
Time control subelement (not shown) for being directed to the different use corresponding time weights of curriculum offering, will make It is controlled by the use of the time used of content with the product of corresponding time weight as usage time.If for example, current peace The daily usage time set in full rule may be configured as 1 as 1 hour, for the weights of game, i.e., when run 1 it is small when Game, then it is assumed that usage time reaches 1 hour;0.5 may be configured as the weights for playing music, i.e., when played 2 it is small when Music, then it is assumed that usage time reaches 1 hour;0.4 may be configured as the weights of early education reading matter, i.e., when browsed 2.5 it is small when Early education reading matter, then it is assumed that usage time reaches 1 hour.After according to the different weights of different curriculum offerings, Ke Yiyin The usage time that children's reasonable distribution difference uses content is led, so as to achieve the purpose that teach through lively activities and strike a proper balance between work and rest.
The user equipment provided through this embodiment uses control device, can be made according to specific crowd (such as children) With pattern password open protection of the child pattern, in the case where children do not perceive in real time to children using user equipment time and Content is controlled, and children is enable effectively to use the beneficial functions of user equipment, so as to promote the health hair of children's body and mind Exhibition.
In another embodiment, as shown in figure 5, the user equipment is further included using control device:
According to content-control rule, to currently via the current safety rule carry out using the use content of control The device (hereinafter referred to as " content matching unit ", be not shown) of matching inquiry;
Pair the device of control forbid (hereinafter referred to as " to forbid using content with what the content-control rule matched Control unit 430 ").
Although the current safety rule in a upper embodiment can be carried out to the usage time of user equipment and/or using content Control, but the content that still might have other than rule when children are using the user equipment is seen by children.Such as by current Safety regulation allows the link in the website logged in log on to website, certain application program or sound that other unsuitable children log in regard Contain content of unsuitable children viewing etc. in frequency file, thus the present embodiment on the basis of above-mentioned current safety rule into One step intercepts specific content by content-control rule.Optionally, content matching unit can be in user equipment local According to content-control rule, to currently carrying out using the use content of control match looking into via the current safety rule It askes or matching inquiry result is obtained by the interaction with the network equipment.For latter means, content matching unit may include:
Sending module, for currently being carried out described by the current safety rule using the phase using content controlled It closes information and is sent to the network equipment;
Receiving module carries out using control from the network equipment for receiving about the current safety rule is currently passed through The matching result using content and content-control rule of system.
It is optionally, described to include website, application program and audio, video data using content,
Wherein, pair use content to match with the content-control rule of control unit 430 is forbidden to carry out forbidding controlling The operation of system includes following at least any one:
1) forbid accessing the website to match with the secure access rule.Specifically, content matching unit picks are current Network access request, and obtained in user equipment locally or through with network equipment interaction by the current network access Request is matched with the secure access rule in high in the clouds;Then, control unit 430 is forbidden to forbid accessing and the secure access rule The website then to match.The unsuitable children for including real-time update in the secure access rule of the network equipment (such as high in the clouds) visit The website asked, when children by links and accesses to these websites when, then can forbid access by way of avoid children by not It is suitble to the influence of website that children access.
2) forbid installing or starting the application program to match with the security application rule.Specifically, content matching list The member extraction application program that is currently installed on or starts, and obtained locally or through with network equipment interaction by the current peace Dress or the application program started are matched with the security application rule in high in the clouds;Then, forbid control unit 430 forbid installation or Start the application program to match with the security application rule.Some popular application programs may be tied by illegal operator Dangerous content is tied up, children may be in the case of ignorant and above-mentioned current safety rule None- identified by these application programs The user equipment is packed into, therefore the application program for being currently installed on or starting can be passed through local or the peace of the network equipment (such as high in the clouds) It is scanned entirely using rule, if not finding dangerous content, allows to install or start, if finding dangerous content, prevent to pacify Dress starts, so as to control the health of user equipment content.
3) content that display is forbidden to match with the safety display rule.Specifically, the interception of content matching unit is current The content of display, and obtain the content currently shown and cloud in the interaction locally or through the network equipment (such as high in the clouds) The safety at end shows that rule is matched, and then, forbids control unit 430 that display is forbidden to show that rule matches with the safety Content.When children browse audio-video document, sectional drawing can be carried out to the audio-video document of broadcasting at predetermined time intervals, and pass through It is matched with characteristic value or the image recognition algorithm of artificial neural network, whether analysis present displayed content is healthy, to unsound The corresponding audio-video document of content is closed, so that children avoid being influenced by decadent content.
User equipment described in the present embodiment uses control device, can be according to content-control rule to current safety rule It is supplemented, the use content of user equipment is more accurately controlled by cloud massive data and powerful computing capability System can effectively use the beneficial functions of user equipment so as to further ensure children.
It should be noted that the present invention can be carried out in the assembly of software and/or software and hardware, for example, can adopt With application-specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, software program of the invention can perform to realize steps described above or function by processor.Similarly, it is of the invention Software program can be stored in computer readable recording medium storing program for performing (including relevant data structure), for example, RAM memory, Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the present invention, example Such as, as coordinating with processor so as to perform the circuit of each step or function.
In addition, the part of the present invention can be applied to computer program product, such as computer program instructions, when its quilt When computer performs, by the operation of the computer, it can call or provide according to the method for the present invention and/or technical solution. And the program instruction of the method for the present invention is called, it is possibly stored in fixed or moveable recording medium and/or passes through Broadcast or the data flow in other signal loaded mediums and be transmitted and/or be stored according to described program instruction operation In the working storage of computer equipment.Here, including a device according to one embodiment of present invention, which includes using Memory in storage computer program instructions and processor for executing program instructions, wherein, when the computer program refers to When order is performed by the processor, method and/or skill of the device operation based on aforementioned multiple embodiments according to the present invention are triggered Art scheme.
It is obvious to a person skilled in the art that the present invention is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Profit requirement rather than above description limit, it is intended that all by what is fallen within the meaning and scope of the equivalent requirements of the claims Variation includes within the present invention.Any reference numeral in claim should not be considered as to the involved claim of limitation.This Outside, it is clear that one word of " comprising " is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in system claims is multiple Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade words are used for table Show title, and do not represent any particular order.

Claims (8)

1. a kind of use control method of user equipment, wherein, including:
Receive code content input by user;
Determine the corresponding specific crowd of the code content;
According to current safety corresponding with identified specific crowd rule, usage time to the user equipment and/or make It is carried out using control with content;
Wherein, it is described to include according to current safety rule to usage time and/or the step of control using content:
According to from the different corresponding time weights of use content, the time used for using content is weighed with the corresponding time The product of value carries out using control as usage time.
2. according to the method described in claim 1, wherein, the method further includes:
According to content-control rule, to currently via the current safety rule match using the use content of control Inquiry;
Pair use content to match with the content-control rule carries out forbidding controlling.
3. it is described according to content-control rule according to the method described in claim 2, wherein, to currently via the current peace Full rule include the step of carrying out matching inquiry using the use content of control:
It currently carries out being sent to network using the relevant information of content using control via the current safety rule by described Equipment;
Receive from the network equipment about currently via the current safety rule carry out using control use content with it is interior Hold the matching result of control rule.
4. it is described to include website, application program and audio, video data using content according to the method described in claim 3, wherein,
Wherein, the described pair of use content to match with the content-control rule the step of control forbid to include with down toward It is any one of few:
Forbid accessing the website to match with secure access rule;
Forbid installing or start the application program that matches with security application rule;
The content that display is forbidden to match with safety display rule.
5. a kind of user equipment uses control device, wherein, including:
For receiving the device of code content input by user;
For determining the device of the corresponding specific crowd of the code content;
For being used according to the corresponding current safety rule of identified specific crowd to usage time and/or using content The device of control;
Wherein, it is described to be used to carry out the device packet using control according to current safety rule to usage time and/or using content It includes:
Subelement is controlled, for basis and the different corresponding time weights of use content, content will be used in actual use Between carry out as usage time using control with the product of corresponding time weight.
6. device according to claim 5, wherein, described device further includes:
According to content-control rule, to currently via the current safety rule match using the use content of control The device of inquiry;
Pair device for using content forbid control to match with the content-control rule.
7. device according to claim 6, wherein, it is described according to content-control rule, to currently via the current peace Full rule included using the device that matching inquiry is carried out using content of control:
Sending module, for currently carrying out believing using the correlation of content using control via the current safety rule by described Breath is sent to the network equipment;
Receiving module, for receive from the network equipment about currently via the current safety rule carry out using control Use the matching result of content and content-control rule.
8. device according to claim 7, wherein, it is described to include website, application program and audio, video data using content,
Wherein, described pair with the content-control rule match forbid the device of control using content for perform with Under any one of at least operation:
Forbid accessing the website to match with secure access rule;
Forbid installing or start the application program that matches with security application rule;
The content that display is forbidden to match with safety display rule.
CN201410797735.1A 2014-12-18 2014-12-18 A kind of use control method and device of user equipment Active CN104573479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410797735.1A CN104573479B (en) 2014-12-18 2014-12-18 A kind of use control method and device of user equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410797735.1A CN104573479B (en) 2014-12-18 2014-12-18 A kind of use control method and device of user equipment

Publications (2)

Publication Number Publication Date
CN104573479A CN104573479A (en) 2015-04-29
CN104573479B true CN104573479B (en) 2018-07-06

Family

ID=53089519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410797735.1A Active CN104573479B (en) 2014-12-18 2014-12-18 A kind of use control method and device of user equipment

Country Status (1)

Country Link
CN (1) CN104573479B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106919408A (en) * 2015-12-24 2017-07-04 北京奇虎科技有限公司 Control the method and device of mobile terminal
CN107305612A (en) * 2016-04-25 2017-10-31 奇酷软件(深圳)有限公司 Management method, managing device and the terminal of application program
CN105916005B (en) * 2016-06-12 2019-01-08 腾讯科技(深圳)有限公司 The content model control method and device of multimedia messages
CN106228061A (en) * 2016-07-27 2016-12-14 广东欧珀移动通信有限公司 Control method and mobile terminal
CN106295273A (en) * 2016-07-27 2017-01-04 广东欧珀移动通信有限公司 Control method and control device
CN106228060A (en) * 2016-07-27 2016-12-14 广东欧珀移动通信有限公司 Control method and control device
CN106650429A (en) * 2016-09-30 2017-05-10 北京奇虎科技有限公司 User behavior management method and system, and secure desktop
CN106650416A (en) * 2016-11-29 2017-05-10 深圳市金立通信设备有限公司 Password setting and decrypting methods and terminal
CN106845274A (en) * 2017-02-07 2017-06-13 广东小天才科技有限公司 The method and electric terminal of file process
CN109657428A (en) * 2017-10-12 2019-04-19 深圳市Tcl高新技术开发有限公司 A kind of control method of mobile terminal, mobile terminal and storage medium
CN107645585A (en) * 2017-10-12 2018-01-30 深圳辉烨通讯技术有限公司 A kind of method and device for intercepting voice service
CN108494841B (en) * 2018-03-13 2020-05-22 广东小天才科技有限公司 Management and control method and device based on use condition of terminal equipment
CN109325335A (en) * 2018-10-15 2019-02-12 深圳壹账通智能科技有限公司 System safety method, device, computer equipment and storage medium
CN109889539B (en) * 2019-03-21 2021-02-19 安徽威尔信通信科技有限责任公司 Intelligent terminal browsing information filtering method based on WIFI
CN112148896A (en) * 2020-09-10 2020-12-29 京东数字科技控股股份有限公司 Data processing method and device for terminal media monitoring and broadcasting

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909610A (en) * 2005-08-05 2007-02-07 鸿富锦精密工业(深圳)有限公司 Television device with definition mode and its control method
CN102650955A (en) * 2012-03-31 2012-08-29 奇智软件(北京)有限公司 Mode adapting method and mode adapting system for user interface
CN103139353A (en) * 2013-01-28 2013-06-05 广东欧珀移动通信有限公司 Lock unlocking method and lock unlocking device of mobile terminal
CN103427990A (en) * 2012-05-18 2013-12-04 华为终端有限公司 Authority authentication method and terminal device
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN104036195A (en) * 2013-03-07 2014-09-10 联想(北京)有限公司 Information processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909610A (en) * 2005-08-05 2007-02-07 鸿富锦精密工业(深圳)有限公司 Television device with definition mode and its control method
CN102650955A (en) * 2012-03-31 2012-08-29 奇智软件(北京)有限公司 Mode adapting method and mode adapting system for user interface
CN103427990A (en) * 2012-05-18 2013-12-04 华为终端有限公司 Authority authentication method and terminal device
CN103139353A (en) * 2013-01-28 2013-06-05 广东欧珀移动通信有限公司 Lock unlocking method and lock unlocking device of mobile terminal
CN104036195A (en) * 2013-03-07 2014-09-10 联想(北京)有限公司 Information processing method and device
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment

Also Published As

Publication number Publication date
CN104573479A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104573479B (en) A kind of use control method and device of user equipment
US11558368B2 (en) Screen-analysis based device security
CN111585964B (en) Login information input method, login information storage method and related device
CN103814380B (en) For strengthening the method and apparatus of the security in equipment using multiple-factor password or dynamic password
CN103797752B (en) For providing certification to control the access of method and computer to(for) computer system
CN104270404B (en) A kind of login method and device based on terminal iidentification
US7873995B2 (en) Method and apparatus for generating and reinforcing user passwords
US10963545B2 (en) Authentication via typing cadence, gestures, and QR codes
CN104541493B (en) Biometric data is used to carry out wireless pairing and communicate between devices
CN108763561A (en) E-book method for pushing, device and computer readable storage medium
CN103927466A (en) Method and device for controlling mobile terminal
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN105701420B (en) A kind of management method and terminal of user data
CN103348352B (en) Personal digital assistant device and grip features learning method
Khodadadi et al. Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes.
CN108305057A (en) Dispensing apparatus, method and the computer readable storage medium of electronics red packet
CN105608616B (en) Method and device for remotely assisting controlled equipment
CN110163241A (en) Data sample generation method, device, computer equipment and storage medium
CN109254661A (en) Image display method, device, storage medium and electronic equipment
CN108710516A (en) Acquisition method, device, storage medium and the intelligent terminal of forecast sample
CN108664286A (en) Application program preloads method, apparatus, storage medium and mobile terminal
CN108401173A (en) Interactive terminal, method and the computer readable storage medium of mobile live streaming
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
KR20130082980A (en) User personalized recommendation system based on face-recognition
CN109657428A (en) A kind of control method of mobile terminal, mobile terminal and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant