CN105574378A - Terminal control method and terminal control device - Google Patents

Terminal control method and terminal control device Download PDF

Info

Publication number
CN105574378A
CN105574378A CN201510906548.7A CN201510906548A CN105574378A CN 105574378 A CN105574378 A CN 105574378A CN 201510906548 A CN201510906548 A CN 201510906548A CN 105574378 A CN105574378 A CN 105574378A
Authority
CN
China
Prior art keywords
terminal device
unrestricted model
user
screen interface
locking screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510906548.7A
Other languages
Chinese (zh)
Inventor
董俊杰
陈顺
刘培龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510906548.7A priority Critical patent/CN105574378A/en
Publication of CN105574378A publication Critical patent/CN105574378A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The invention discloses a terminal control method and a terminal control device, and relates to the technical field of communication. The method comprises the following steps: providing a lock screen interface, wherein the lock screen interface is used for user selection to enter a restricted mode or for unlocking through verification information, and the application of terminal equipment is restricted under the restricted mode; and entering the restricted mode when a restricted mode selection instruction input on the lock screen interface is received. A user admitted to a normal mode such as the owner of the terminal equipment can enter the normal mode through inputting the verification information, but other users can only select the restricted mode for use, so that other users can be restricted when using the terminal equipment due to the fact that the application of the terminal equipment is restricted under the restricted mode; and moreover, the user can enter the normal mode or the restricted mode through the screen locking screen, and the user does not need to switch between the restricted mode and the normal mode through setting, so that complicated operation and setting are omitted.

Description

Terminal control method and terminal control mechanism
Technical field
The disclosure relates to communication technical field, particularly relates to a kind of terminal control method and terminal control mechanism.
Background technology
Popular along with smart mobile phone, the mobile phone of user may be contacted by other people and use.Such as, but when smart mobile phone is used by other people, there is a lot of problem, privacy content lacks available protecting, duration is used to limit.
Summary of the invention
For overcoming Problems existing in correlation technique, the disclosure provides a kind of terminal control method and terminal control mechanism.
According to the first aspect of disclosure embodiment, provide a kind of terminal control method, described method comprises:
There is provided a locking screen interface, described locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under described unrestricted model, terminal device uses limited;
When receiving the unrestricted model selection instruction inputted under described locking screen interface, enter described unrestricted model.
According to a kind of implementation of disclosure first aspect, described authorization information comprises at least one in password, gesture, fingerprint, iris and vocal print.
In implementation of the present disclosure, do not limit the verification mode of user, user can adopt the modes such as password, gesture, fingerprint, iris, vocal print to carry out authentication.
According to the another kind of implementation of disclosure first aspect, described terminal device uses the limited at least one comprised in following state:
Function or application need by being used after checking at least partially;
Function or application prohibit the use at least partially;
The use duration of function or application can not more than the first predetermined value at least partially;
The use duration of described terminal device can not more than the second predetermined value.
In implementation of the present disclosure; the rights of using of function or application are limited; can protect privacy of user, the use duration of function or application or whole terminal device is limited, can protect the health of user (particularly children).
According to the another kind of implementation of disclosure first aspect, described locking screen interface comprises the unblock entrance for being unlocked by described authorization information for user, and for selecting for user the unrestricted model entrance entering described unrestricted model;
Described unblock entrance and described unrestricted model entrance are independently two entrances; Or described unblock entrance and described unrestricted model entrance are a public entrance.
In implementation of the present disclosure, user both can enter general mode and unrestricted model by two entrances respectively, also can be entered by same entrance.
According to the another kind of implementation of disclosure first aspect, described method also comprises:
When setting operation being detected under described unrestricted model, export checking interface, described setting operation is for using limited function or application;
Receive the authentication information that described user inputs under described checking interface;
When the authentication information that described user inputs is verified, perform described setting operation, when the secondary authentication failed of the authentication information N continuous that described user inputs, do not perform described setting operation, described N is positive integer.
In above-mentioned implementation of the present disclosure, under specifically disclosing unrestricted model, how certification is carried out to the rights of using of limited function or application.Wherein, by the certification number of times of limited subscriber, avoid user to pass through repeatedly to attempt finally limited function or the use of application, ensure that security.
According to the another kind of implementation of disclosure first aspect, described setting operation comprise answer or call, check or send note, check or send instant messaging information, the operation of deducting fees can be produced in one or more.
According to the another kind of implementation of disclosure first aspect, described method also comprises:
When described terminal device is under described unrestricted model, add up the time that described user uses described terminal device continuously;
When described user uses the time of described terminal device to reach the first limit value continuously, described user is pointed out to use the overlong time of described terminal device continuously.
In above-mentioned implementation of the present disclosure, used the time of described terminal device continuously by counting user, avoid user's continuity to use terminal device for a long time, thus the protection position such as eyes of user, cervical vertebra is healthy.
According to the another kind of implementation of disclosure first aspect, the described user of described prompting uses the overlong time of described terminal device continuously, comprising:
Generate and export information, the overlong time of described information for pointing out described user to use described terminal device continuously.
According to the another kind of implementation of disclosure first aspect, when described user uses the time of described terminal device to reach the first limit value continuously, described method also comprises:
In the first setting duration, forbid that described user uses described unrestricted model.
In above-mentioned implementation of the present disclosure, by the first setting duration, forbid that user uses unrestricted model, make user carry out relax if having time, fatigue-relieving, thus reduce the infringement to user health generation.
According to the another kind of implementation of disclosure first aspect, described in forbid that described user uses described unrestricted model, comprising:
Control described terminal device and return described locking screen interface from described unrestricted model, and forbid entering described unrestricted model from described locking screen interface.
In the first setting duration, forbid that described user uses described unrestricted model, comprising:
Control described terminal device and return described locking screen interface from described unrestricted model, and forbid entering described unrestricted model from described locking screen interface in described first setting duration.
According to the another kind of implementation of disclosure first aspect, described method also comprises:
When described terminal device is under described unrestricted model, add up the touch screen frequency that described user uses the time of described terminal device and described user continuously;
When described user uses the time of described terminal device to reach the second limit value continuously, and when the touch screen frequency of described user exceedes threshold value, in the second setting duration, forbid that described user uses described unrestricted model.
In above-mentioned implementation of the present disclosure; when carrying out fierce mutual (as game) between user and terminal device; the time of described terminal device is used continuously by counting user; avoid user's continuity to carry out the mutual of fierceness for a long time and between terminal device, thus the protection position such as eyes of user, cervical vertebra is healthy.
According to the another kind of implementation of disclosure first aspect, described in the second setting duration, forbid that described user uses described unrestricted model, comprising:
Control described terminal device and return described locking screen interface from described unrestricted model, and forbid entering described unrestricted model from described locking screen interface in described second setting duration.
According to the another kind of implementation of disclosure first aspect, described method also comprises:
When described terminal device is under described unrestricted model, add up total duration that described user uses described terminal device in one-period;
According to the corresponding relation of total duration and classification, determine that described user uses the classification that total duration of described terminal device is corresponding in one-period;
When described be classified as the first predetermine level time, point out described user in current period, used total duration of described terminal device, when described be classified as the second predetermine level time, in current period, limit described user and use described unrestricted model, total duration that described second predetermine level is corresponding is greater than total duration corresponding to described first predetermine level.
In above-mentioned implementation of the present disclosure, use total duration by counting user, avoid user to use the T.T. of terminal device long, thus the protection position such as eyes of user, cervical vertebra is healthy.
According to the another kind of implementation of disclosure first aspect, described in current period, limit described user and use described unrestricted model, comprising:
Control described terminal device and return described locking screen interface from described unrestricted model, and forbid directly entering described unrestricted model from described locking screen interface in current period.
According to the another kind of implementation of disclosure first aspect, when described be classified as the second predetermine level time, described method also comprises:
Reduce described user in next cycle, reach described first predetermine level or the total duration needed for described second predetermine level.
In above-mentioned implementation of the present disclosure, by reducing to reach the total duration needed for described first predetermine level or described second predetermine level in the next cycle, the service time of user is punished, allow user form the custom not reaching the second predetermine level easily, thus reduce the time that user uses terminal device.
According to the another kind of implementation of disclosure first aspect, described method also comprises:
When described terminal device is in described unrestricted model, described terminal device shows the icon of spendable application program, under the icon of described spendable application program only comprises described unrestricted model, allow the icon of accessed application program.
According to the second aspect of disclosure embodiment, provide a kind of terminal control mechanism, described device comprises:
Output module, for providing a locking screen interface, described locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under described unrestricted model, terminal device uses limited;
Processing module, for when receiving the unrestricted model selection instruction inputted under described locking screen interface, enters described unrestricted model.
According to a kind of implementation of disclosure second aspect, described authorization information comprises at least one in password, gesture, fingerprint, iris and vocal print.
According to the another kind of implementation of disclosure second aspect, described terminal device uses the limited at least one comprised in following state:
Function or application need by being used after checking at least partially;
Function or application prohibit the use at least partially;
The use duration of function or application can not more than the first predetermined value at least partially;
The use duration of described terminal device can not more than the second predetermined value.
According to the another kind of implementation of disclosure second aspect, described locking screen interface comprises the unblock entrance for being unlocked by described authorization information for user, and for selecting for user the unrestricted model entrance entering described unrestricted model;
Described unblock entrance and described unrestricted model entrance are independently two entrances; Or described unblock entrance and described unrestricted model entrance are a public entrance.
According to the another kind of implementation of disclosure second aspect, described device also comprises receiver module;
Described output module, also for when setting operation being detected under described unrestricted model, export checking interface, described setting operation is for using limited function or application;
Described receiver module, for receiving the authentication information that described user inputs under described checking interface;
Described processing module, also for when the authentication information of described user's input is verified, performs described setting operation, and when the secondary authentication failed of the authentication information N continuous that described user inputs, do not perform described setting operation, described N is positive integer.
According to the another kind of implementation of disclosure second aspect, described setting operation comprise answer or call, check or send note, check or send instant messaging information, the operation of deducting fees can be produced in one or more.
According to the another kind of implementation of disclosure second aspect, described device also comprises:
Statistical module, for when described terminal device is under described unrestricted model, adds up the time that described user uses described terminal device continuously;
Described processing module, time also for using the time of described terminal device to reach the first limit value continuously as described user, points out described user to use the overlong time of described terminal device continuously.
According to the another kind of implementation of disclosure second aspect, described processing module, for generating and exporting information, the overlong time of described information for pointing out described user to use described terminal device continuously.
According to the another kind of implementation of disclosure second aspect, described processing module, time also for using the time of described terminal device to reach the first limit value continuously as described user, in the first setting duration, forbids that described user uses described unrestricted model.
According to the another kind of implementation of disclosure second aspect, described processing module, returns described locking screen interface for controlling described terminal device from described unrestricted model, and forbids entering described unrestricted model from described locking screen interface.
In order in the first setting duration, forbid that described user uses described unrestricted model, processing module returns described locking screen interface for controlling described terminal device from described unrestricted model, and forbids entering described unrestricted model from described locking screen interface in described first setting duration.
According to the another kind of implementation of disclosure second aspect, described device also comprises:
Statistical module, for when described terminal device is under described unrestricted model, adds up the touch screen frequency that described user uses the time of described terminal device and described user continuously;
Described processing module, also for using the time of described terminal device to reach the second limit value continuously as described user, and when the touch screen frequency of described user exceedes threshold value, in the second setting duration, forbids that described user uses described unrestricted model.
According to the another kind of implementation of disclosure second aspect, described processing module, returns described locking screen interface for controlling described terminal device from described unrestricted model, and forbids entering described unrestricted model from described locking screen interface in described second setting duration.
According to the another kind of implementation of disclosure second aspect, described device also comprises:
Statistical module, for when described terminal device is under described unrestricted model, adds up total duration that described user uses described terminal device in one-period;
Described processing module, also for the corresponding relation according to total duration and classification, determines that described user uses the classification that total duration of described terminal device is corresponding in one-period;
When described be classified as the first predetermine level time, point out described user in current period, used total duration of described terminal device, when described be classified as the second predetermine level time, in current period, limit described user and use described unrestricted model, total duration that described second predetermine level is corresponding is greater than total duration corresponding to described first predetermine level.
According to the another kind of implementation of disclosure second aspect, described processing module, returns described locking screen interface for controlling described terminal device from described unrestricted model, and forbids directly entering described unrestricted model from described locking screen interface in current period.
According to the another kind of implementation of disclosure second aspect, described processing module, also for when described in be classified as the second predetermine level time, reduce described user in next cycle, reach described first predetermine level or the total duration needed for described second predetermine level.
According to the another kind of implementation of disclosure second aspect, described output module, also for when described terminal device is in described unrestricted model, described terminal device shows the icon of spendable application program, under the icon of described spendable application program only comprises described unrestricted model, allows the icon of accessed application program.
According to the third aspect of disclosure embodiment, provide a kind of terminal control mechanism, described device comprises:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
There is provided a locking screen interface, described locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under described unrestricted model, terminal device uses limited;
When receiving the unrestricted model selection instruction inputted under described locking screen interface, enter described unrestricted model.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
The disclosure is by providing a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, the owners of terminal device etc. allow the user entering general mode can enter general mode by input validation information, other users then can only selectional restriction pattern be used, due under unrestricted model, terminal device uses limited, other users can be made to use during terminal device and be restricted; Meanwhile, user can enter general mode or unrestricted model by locking screen interface, not needing user by arranging the switching carrying out unrestricted model and general mode, eliminating loaded down with trivial details operation and setting.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows embodiment according to the invention, and is used from instructions one and explains principle of the present invention.
Fig. 1 is the application scenarios figure according to an exemplary embodiment.
Fig. 2 is the process flow diagram of a kind of terminal control method according to an exemplary embodiment.
Fig. 3 is the process flow diagram of a kind of terminal control method according to an exemplary embodiment.
Fig. 3 a is a kind of terminal device surface chart according to an exemplary embodiment.
Fig. 3 b is a kind of terminal device surface chart according to an exemplary embodiment.
Fig. 3 c is the process flow diagram of the method for limiting under a kind of unrestricted model according to an exemplary embodiment.
Fig. 3 d is the process flow diagram of the method for limiting under a kind of unrestricted model according to an exemplary embodiment.
Fig. 3 e is the process flow diagram of the method for limiting under a kind of unrestricted model according to an exemplary embodiment.
Fig. 3 f is the process flow diagram of the method for limiting under a kind of unrestricted model according to an exemplary embodiment.
Fig. 4 is the block diagram of a kind of terminal control mechanism according to an exemplary embodiment.
Fig. 5 is the block diagram of a kind of terminal control mechanism according to an exemplary embodiment.
Fig. 6 is the block diagram of a kind of terminal control mechanism according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the present invention.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present invention are consistent.
For the ease of the description of embodiment, below first simply introduce the application scenarios of embodiment in the disclosure.Fig. 1 is the application scenarios figure according to an exemplary embodiment, and see Fig. 1, this scene comprises terminal device 100, and terminal device 100 includes but not limited to it is smart phone, intelligent watch, Intelligent bracelet, panel computer etc.
It should be noted that, above-described device category is only citing, and the disclosure is not restricted this.
Fig. 2 is the process flow diagram of a kind of terminal control method according to an exemplary embodiment, and as shown in Figure 2, this terminal control method is applicable to the terminal device in aforementioned scene, comprises the following steps:
In step s 11, provide a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under unrestricted model, terminal device uses limited.
Under locking screen interface, user both can be unlocked by authorization information, thus entered general mode, also can select to enter unrestricted model.
Wherein, authorization information includes but not limited to it is at least one in password, gesture, fingerprint, iris and vocal print.
In step s 12, when receiving the unrestricted model selection instruction inputted under locking screen interface, unrestricted model is entered.
When terminal device is in unrestricted model, show the icon of spendable application program on the terminal device, allow the icon of accessed application program under the icon of this spendable application program only comprises unrestricted model, and do not comprise the icon of other application programs of installing in terminal device.Under this mode, the desktop of terminal device is more succinct, and other people such as children also can not to know in terminal device other application program, and then further requirement can not be proposed, such as ask the owner etc. of terminal device to allow to enter the requirements such as the open rights of using of user of general mode, further avoid and allow the user entering general mode to bring puzzlement to the owner etc. of terminal device.
In the another kind of implementation of disclosure embodiment, under unrestricted model, the application program that terminal device shows allows the icon of accessed application program under comprising unrestricted model, the icon of accessed application program is not allowed under comprising unrestricted model yet, but, only allow the icon of accessed application program can respond the operation of user under unrestricted model, and under unrestricted model, do not allow the icon of accessed application program can not respond the operation of user, namely, when user clicks the icon allowing accessed application program under unrestricted model, terminal device can run corresponding application program, when user clicks the icon not allowing accessed application program under unrestricted model, terminal device can not perform any action.
Allow to use and do not allow to use except application program is divided into, can also be divided into and such as limit duration application program and do not limit duration application program, need identity verification application program and do not need identity verification application program etc., different division methods can corresponding different display and mode of operation.
The scene that terminal device uses to other people by the user that the owner etc. that the scene that disclosure embodiment is suitable for is generally terminal device allows to enter general mode, the scene that terminal device uses to children by the user that the owner etc. being particularly useful for terminal device allows to enter general mode, for limiting other people access to application program in terminal device.
It should be noted that, unrestricted model in the disclosed embodiments, be name based on the effect of disclosure embodiment, but not as limit, its title can be changed as required when realizing, such as child mode etc.
The disclosure is by providing a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, the owners of terminal device etc. allow the user entering general mode can enter general mode by input validation information, other users then can only selectional restriction pattern be used, due under unrestricted model, terminal device uses limited, other users can be made to use during terminal device and be restricted; Meanwhile, user can enter general mode or unrestricted model by locking screen interface, not needing user by arranging the switching carrying out unrestricted model and general mode, eliminating loaded down with trivial details operation and setting.
Fig. 3 is the process flow diagram of a kind of terminal control method according to an exemplary embodiment, and as shown in Figure 3, this terminal control method is applicable to the terminal device in aforementioned scene, comprises the following steps:
In the step s 21, obtain unrestricted model and open request.
Alternatively, obtain unrestricted model unlatching request can comprise:
First kind of way, obtains the unrestricted model unlatching request that user produces by opening unrestricted model option.Such as, user open mobile phone arrange in unrestricted model, terminal device can get unrestricted model open request.
The second way, receives the unrestricted model unlatching request that user is sent by other device ends.Such as, user can be sent request to this terminal device by the terminal device of association, to ask to open unrestricted model.
In step S22, open request in response to unrestricted model, export-restriction pattern arranges interface.
In step S23, receive the unrestricted model configuration information that user inputs under unrestricted model arranges interface.
Unrestricted model arranges interface and can arrange at least one of following option: needing could by the function that uses or application by checking, the function prohibitted the use or application, the use duration upper limit of function or application, the use duration upper limit of terminal device.Certainly, unrestricted model arranges interface can also comprise more setting options, and the disclosure does not limit this.
Alternatively, the function in the disclosure can be the function that setting, option etc. in terminal device provide, and as peace loading, unloading etc., the application in the disclosure can be the application that system carries, and also can be the application of user installation.
Alternatively, need the function of verifying or forbidding can comprise peace loading, unloading, deletion, download etc., needs checking or the application forbidden can comprise class application (software) of deducting fees, communication class is applied, game is applied.
Particularly, checking or the function of forbidding or application is needed can be realized by following manner:
For each application in terminal device arranges flag, determine that corresponding application is the need of verifying or whether being prohibited by this flag.
Alternatively, unrestricted model arranges the authority information that interface can also arrange unrestricted model, accessing to your password of such as unrestricted model, by arranging the authority information of unrestricted model, specific user can be made to use unrestricted model.It is different that authority information and the general mode of unrestricted model unlock the authorization information used.In the case, unrestricted model authority information can from need to verify the function that could use or apply needed for authentication information different.
Such as, unrestricted model can be specifically child mode, and the head of a family is after setting child mode; child mode password is informed child; to make child use child mode, but the application of child mode lower part or function limitation system, child mode can be played a protective role to child.
In the present embodiment, step S21 ~ step S23 is optional step.
In step s 24 which, when user wakes terminal device up, provide a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under unrestricted model, terminal device uses limited.
Wherein, authorization information includes but not limited at least one in password, gesture, fingerprint, iris and vocal print.
Such as, under locking screen interface, user can be unlocked by touch-screen input password, or user can be unlocked by HOME key input fingerprint, or user can be unlocked by microphone sound import, or user can input iris by camera and unlocks.These unlocking manners all complete under terminal device is in locking screen interface.
In the disclosure, terminal device uses the limited at least one comprised in following state:
Function or application need by being used after checking at least partially;
Function or application prohibit the use at least partially;
The use duration of function or application can not more than the first predetermined value at least partially;
The use duration of terminal device can not more than the second predetermined value.
In the disclosure, the situation that above-mentioned several terminal device is limited can need to carry out combination in any according to user.Such as, part of functions or application need by being used after checking, and another part function or application prohibit the use; Or, the use duration of part of functions or application can not more than the first predetermined value, part of functions or application need by being used after checking, and use duration can not more than the function of the first predetermined value or application can with need by after verifying by the function that uses or applying portion identical.
Alternatively, locking screen interface comprises the unblock entrance for being unlocked by authorization information for user, and for selecting for user the unrestricted model entrance entering unrestricted model;
Unlocking entrance and unrestricted model entrance is independently two entrances; Or unblock entrance and unrestricted model entrance are a public entrance.
Unlocking entrance and unrestricted model entrance be independently two entrances: such as, as shown in Figure 3 a, unblock entrance is Password Input hurdle, and unrestricted model entrance can be a button.Again such as, unlocking entrance is HOME key, and unrestricted model entrance is a slider bar, and user can be unlocked by HOME key input fingerprint and enter general mode, and user can enter unrestricted model by slip.In other implementations, unblock entrance and unrestricted model can also be other forms, and the present embodiment does not limit this.
Unblock entrance and unrestricted model entrance can also be a public entrance.Such as, this public entrance is gesture inputting interface, and user inputs certain gestures and can unlock and enter general mode, and enters unrestricted model when user does not input when gesture directly clicks a point in this interface.Again such as, this public entrance is a Password Input hurdle, and user enters general mode by a unlock password, enters unrestricted model by another password; This mode, under child mode, can allow the head of a family and child respectively use a password, ensures the security of child mode.
User, when carrying out unrestricted model and general mode switches, first can return locking screen interface, then enter unrestricted model or general mode by locking screen interface.
In step s 25, when receiving the unrestricted model selection instruction inputted under locking screen interface, unrestricted model is entered.When receiving the authorization information that user inputs under locking screen interface, unlocking and entering general mode.
As shown in Figure 3 b, user by clicking unrestricted model portal generation unrestricted model selection instruction, thus can enter unrestricted model.
Wherein, unrestricted model selection instruction is used for selection and enters unrestricted model, and unrestricted model selection instruction includes but not limited to it is slip instruction or click commands.
Under unrestricted model, terminal device performs different method for limiting according to arranging of user, specifically can comprise the method for limiting that in Fig. 3 c ~ Fig. 3 f, arbitrary width provides.
The disclosure is by providing a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, the owners of terminal device etc. allow the user entering general mode can enter general mode by input validation information, other users then can only selectional restriction pattern be used, due under unrestricted model, terminal device uses limited, other users can be made to use during terminal device and be restricted; Meanwhile, user can enter general mode or unrestricted model by locking screen interface, not needing user by arranging the switching carrying out unrestricted model and general mode, eliminating loaded down with trivial details operation and setting.
Fig. 3 c is the process flow diagram of the method for limiting under a kind of unrestricted model according to an exemplary embodiment, and as shown in Figure 3 c, this method for limiting is applicable to the terminal device in aforementioned scene, comprises the following steps:
In step S31, when setting operation being detected under unrestricted model, export checking interface, setting operation is for using limited function or application.
Wherein, setting operation both can be answer or call, check or send note, check or send the operation based on communications applications such as instant messaging information, and performing this generic operation may make privacy of user impaired, also may impact communication counterpart.Setting operation also can be that payment etc. can produce the operation of deducting fees, and performs operation of deducting fees and may cause unnecessary economic loss.Setting operation can also be one or more in aforesaid operations.
In step s 32, the authentication information that user inputs under checking interface is received.
In the disclosure, authentication information includes but not limited at least one in password, gesture, fingerprint, iris and vocal print.
Such as, under checking interface, user can be unlocked by touch-screen input password, or user can be unlocked by HOME key input fingerprint, or user can be unlocked by microphone sound import, or user can input iris by camera and unlocks.These authentication modes all complete under terminal device is in checking interface.
In step S33, when the authentication information of user's input is verified, perform setting operation, when the authentication information N continuous time authentication failed of user's input, do not perform setting operation, N is positive integer (such as 1,2,3 etc.).
Below to receive calls, above-mentioned flow process is described:
When incoming call received by terminal device, and user's incoming call answering (setting operation) detected, export checking interface; If that incoming call answering is children, because children cannot provide authentication information, therefore, cannot this certification be passed through, thus cause incoming call to answer, finally be hung up.But, if the head of a family aside time, authentication information can be provided to carry out incoming call sound by the head of a family, this makes it possible to prevent child from answering the call.
Certainly, when receiving incoming call, user can directly select to hang up, and hangs up and can be realized by a button, and this button, except the button that talk application itself provides, can also be arranged on checking interface.
Alternatively, when setting operation is for receiving calls, and when terminal device does not perform setting operation, send SMS Tip to caller ID, SMS Tip contacts after a while for pointing out the other side.
Such as, when with directly hang up the telephone or continuous 3 times input code error time, terminal device hanging up calling.When terminal device hanging up calling, terminal device can automatically send a note to caller ID, and short message content can be " present be inconvenient to answer the call, return over after a while to you ".
Under above-mentioned implementation of the present disclosure specifically discloses unrestricted model, how certification is carried out to the rights of using of limited function or application.Wherein, by the certification number of times of limited subscriber, avoid user to pass through repeatedly to attempt finally limited function or the use of application, ensure that security.
Fig. 3 d is the process flow diagram of the method for limiting under a kind of unrestricted model according to an exemplary embodiment, and as shown in Figure 3 d, this method for limiting is applicable to the terminal device in aforementioned scene, comprises the following steps:
In step S41, when terminal device is under unrestricted model, counting user uses the time of terminal device continuously, and user uses the time of terminal device and terminal device screen to continue lighting time continuously.
In step S42, when user uses the time of terminal device to reach the first limit value continuously, prompting user uses the overlong time of terminal device continuously.
Alternatively, prompting user uses the overlong time of terminal device continuously, comprising:
Generate and export information, the overlong time of information for pointing out user to use terminal device continuously.
Wherein, the first limit value can be arranged according to actual conditions usually.Such as, if in order to limiting child use, then can arrange according to the age of children, the age is less, and this limit value can be less.Certainly this limit value also can be a general value, as 1 hour.
Alternatively, information can be voice, word or brightness prompting; Such as, point out user by whole screen is become ash, or, display word: " you continue to use terminal device overlong time, please have a rest ", or both modes of combining.
Alternatively, when user uses the time of terminal device to reach the first limit value continuously, method also comprises:
In the first setting duration, forbid that user uses unrestricted model.
Alternatively, in the first setting duration, forbid that user uses unrestricted model, comprising:
Control terminal returns locking screen interface from unrestricted model, and forbids entering unrestricted model from locking screen interface in the first setting duration.
Wherein, the first setting duration can be arranged according to actual conditions usually.Such as, if in order to limiting child use, then can arrange according to the age of children, the age is less, and this first setting duration can be larger.Certainly this first setting duration also can be a general value, as 15 minutes.
Alternatively, a countdown (as countdown in 1 minute) can also be shown before returning locking screen interface, after countdown completes, return locking screen interface again, do like this and user can be allowed to complete current operation.
Above-mentioned implementation of the present disclosure uses the time of terminal device continuously by counting user, avoid user's continuity to use terminal device for a long time, thus the protection position such as eyes of user, cervical vertebra is healthy.
Fig. 3 e is the process flow diagram of the method for limiting under a kind of unrestricted model according to an exemplary embodiment, and as shown in Figure 3 e, this method for limiting is applicable to the terminal device in aforementioned scene, comprises the following steps:
In step s 51, when terminal device is under unrestricted model, counting user uses the time of terminal device and the touch screen frequency of user continuously.
In step S52, when user uses the time of terminal device to reach the second limit value continuously, and when the touch screen frequency of user exceedes threshold value, in the second setting duration, forbid that user uses unrestricted model.
Alternatively, in the second setting duration, forbid that user uses unrestricted model, comprising:
Control terminal returns locking screen interface from unrestricted model, and forbids entering unrestricted model from locking screen interface in the second setting duration.
Wherein, judge whether user's touch screen frequency exceedes threshold value, be mainly used for detecting user and whether playing games.This threshold value can be arranged according to different game, threshold value can be stored in device end with game corresponding relation in advance, when opening unrestricted model, terminal device according to the game of installing in the threshold value preset and game corresponding relation and terminal device, can arrange corresponding threshold value.
Wherein, the set-up mode of the second limit value and the second setting duration can with reference to the set-up mode in step S42.Second limit value can equal the first limit value, also can be not equal to the first limit value; Second setting duration can equal the first setting duration, also can be not equal to the first setting duration.Preferably; second limit value is less than the first limit value; second setting duration is greater than the first setting duration; thus make user carry out playing wait and carry out between terminal device fierce mutual operation time; shorten the lasting use duration of user; increase simultaneously and forbid that user uses the time of unrestricted model, thus strengthen the protection to user, be conducive to user's body health.
When above-mentioned implementation of the present disclosure by carrying out fierce mutual (as game) between user and terminal device; the time of terminal device is used continuously by counting user; avoid user's continuity to carry out the mutual of fierceness for a long time and between terminal device, thus the protection position such as eyes of user, cervical vertebra is healthy.
Fig. 3 f is the process flow diagram of the method for limiting under a kind of unrestricted model according to an exemplary embodiment, and as illustrated in figure 3f, this method for limiting is applicable to the terminal device in aforementioned scene, comprises the following steps:
In step S61, when terminal device is under unrestricted model, counting user uses total duration of terminal device in one-period.
In step S62, according to the corresponding relation of total duration and classification, determine that user uses the classification that total duration of terminal device is corresponding in one-period.
In step S63, when being classified as the first predetermine level, prompting user has used total duration of terminal device in current period, when being classified as the second predetermine level, in current period, limited subscriber uses unrestricted model, and total duration that the second predetermine level is corresponding is greater than total duration corresponding to the first predetermine level.
Alternatively, in current period, limited subscriber uses unrestricted model, comprising:
Control terminal returns locking screen interface from unrestricted model, and forbids directly entering unrestricted model from locking screen interface in current period.
Wherein, the cycle can be one day, a week or other times length, and the present embodiment does not limit this.
Alternatively, when classification reaches the first predetermine level, locking screen interface can also be return from unrestricted model by control terminal, and user needs wait one schedule time (as 30 seconds) just can enter unrestricted model.
Wherein, forbid directly entering unrestricted model from unrestricted model entrance in current period, comprise following two kinds of situations: the first, forbid entering unrestricted model again within this cycle; The second, within this cycle, enter unrestricted model needs to carry out certification, and above-mentioned authentication mode can from identical or different during unblock.
For the second situation, when user enters unrestricted model again, generate the information that reminding user reduces terminal device service time, and user needs wait one schedule time (as 60 seconds) just can enter unrestricted model.
Alternatively, when being classified as the second predetermine level, method also comprises:
Reduction user reaches the total duration needed for the first predetermine level or the second predetermine level in next cycle.
Such as, interim in this week, reaching the first predetermine level needs 2 hours, and reaches predetermine level in next cycle and only need 1 hour.Wherein, the duration of reduction can be arranged according to actual conditions.Such as, if in order to limiting child use, then can arrange according to the corresponding relation of the age of children and total duration and classification, not repeat here.
Below by citing, the second terminal device control mode is described:
Using one day as the cycle, according to blue, orange (the first predetermine level) and red (the second predetermine level) classification.Total duration is greater than 1 hour, is less than 2 hours, is classified as blueness; Total duration is greater than 2 hours, is less than 3 hours, is classified as orange; Total duration is greater than 3 hours, is classified as redness.When being classified as orange, export a prompting message: " you played mobile phone time today more than 2 hours, please noted minimizing "; When being classified as redness, return to locking screen interface.
For red classification, duration punishment can be subject to.If namely the previous day is red, so within second day, reaching orange classification only needs 1 hour, and reaching red classification only needs 2 hours.If second day, still reach red classification, within the 3rd day, reaching orange classification only needs 0 hour, and reaching red classification only needs 1 hour, the like.
For the setting of the first predetermine level and the second predetermine level, being not only in order to limited subscriber uses time of mobile phone, is also the ability in order to cultivate user (particularly children) self-contr ol.
Above-mentioned implementation of the present disclosure uses total duration by counting user, avoids user to use the T.T. of terminal device long, thus the protection position such as eyes of user, cervical vertebra is healthy.
Fig. 4 is the block diagram of a kind of terminal control mechanism according to an exemplary embodiment, and this terminal control mechanism can be a part for terminal device or terminal device, and as shown in Figure 4, device comprises:
Output module 301, for output module, for providing a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under unrestricted model, terminal device uses limited;
Processing module 302, for when receiving the unrestricted model selection instruction inputted under locking screen interface, enters unrestricted model.
The disclosure is by providing a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, the owners of terminal device etc. allow the user entering general mode can enter general mode by input validation information, other users then can only selectional restriction pattern be used, due under unrestricted model, terminal device uses limited, other users can be made to use during terminal device and be restricted; Meanwhile, user can enter general mode or unrestricted model by locking screen interface, not needing user by arranging the switching carrying out unrestricted model and general mode, eliminating loaded down with trivial details operation and setting.
Fig. 5 is the block diagram of a kind of terminal control mechanism according to an exemplary embodiment, and this terminal control mechanism can be a part for terminal device or terminal device, and as shown in Figure 5, device comprises:
Output module 401, for providing a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under unrestricted model, terminal device uses limited;
Processing module 402, for when receiving the unrestricted model selection instruction inputted under locking screen interface, enters unrestricted model.
Alternatively, authorization information comprises at least one in password, gesture, fingerprint, iris and vocal print.
Alternatively, terminal device uses the limited at least one comprised in following state:
Function or application need by being used after checking at least partially;
Function or application prohibit the use at least partially;
The use duration of function or application can not more than the first predetermined value at least partially;
The use duration of terminal device can not more than the second predetermined value.
Alternatively, locking screen interface comprises the unblock entrance for being unlocked by authorization information for user, and for selecting for user the unrestricted model entrance entering unrestricted model;
Unlocking entrance and unrestricted model entrance is independently two entrances; Or unblock entrance and unrestricted model entrance are a public entrance.
Alternatively, this device also comprises receiver module 403;
Output module 401, also for when setting operation being detected under unrestricted model, export checking interface, setting operation is for using limited function or application.
Receiver module 403, for receiving the authentication information that user inputs under checking interface;
Processing module 402, also for when the authentication information that user inputs is verified, performs setting operation, and when the secondary authentication failed of the authentication information N continuous that user inputs, do not perform setting operation, N is positive integer.
Wherein, setting operation can comprise answer or call, check or send note, check or send instant messaging information, the operation of deducting fees can be produced in one or more.
Further, processing module 403, also for working as setting operation for receiving calls, and when terminal device does not perform setting operation, send SMS Tip to caller ID, SMS Tip contacts after a while for pointing out the other side.
Alternatively, this device also comprises:
Statistical module 404, for when terminal device is under unrestricted model, counting user uses the time of terminal device continuously;
Processing module 402, time also for using the time of terminal device to reach the first limit value continuously as user, prompting user uses the overlong time of terminal device continuously.
Alternatively, processing module 402, for generating and exporting information, the overlong time of information for pointing out user to use terminal device continuously.
Further, processing module 402, time also for using the time of terminal device to reach the first limit value continuously as user, in the first setting duration, forbids that user uses unrestricted model.
Alternatively, processing module 402, returns locking screen interface for control terminal from unrestricted model, and forbids entering unrestricted model from locking screen interface in the first setting duration.
Alternatively, this device also comprises: statistical module 404, and for when terminal device is under unrestricted model, counting user uses the time of terminal device and the touch screen frequency of user continuously;
Processing module 402, also for using the time of terminal device to reach the second limit value continuously as user, and when the touch screen frequency of user exceedes threshold value, in the second setting duration, forbids that user uses unrestricted model.
Alternatively, processing module 402, returns locking screen interface for control terminal from unrestricted model, and forbids entering unrestricted model from locking screen interface in the second setting duration.
Alternatively, this device also comprises: statistical module 404, and for when terminal device is under unrestricted model, counting user uses total duration of terminal device in one-period;
Processing module 402, also for the corresponding relation according to total duration and classification, determines that user uses the classification that total duration of terminal device is corresponding in one-period;
When being classified as the first predetermine level, prompting user has used total duration of terminal device in current period, when being classified as the second predetermine level, in current period, limited subscriber uses unrestricted model, and total duration that the second predetermine level is corresponding is greater than total duration corresponding to the first predetermine level.
Alternatively, processing module 402, returns locking screen interface for control terminal from unrestricted model, and forbids directly entering unrestricted model from locking screen interface in current period.
Further, processing module 402, also for when being classified as the second predetermine level, reduction user reaches the total duration needed for the first predetermine level or the second predetermine level in next cycle.
Alternatively, output module 401, also for when terminal device is in unrestricted model, shows the icon of spendable application program on the terminal device, allows the icon of accessed application program under the icon of this spendable application program only comprises unrestricted model.
The disclosure is by providing a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, the owners of terminal device etc. allow the user entering general mode can enter general mode by input validation information, other users then can only selectional restriction pattern be used, due under unrestricted model, terminal device uses limited, other users can be made to use during terminal device and be restricted; Meanwhile, user can enter general mode or unrestricted model by locking screen interface, not needing user by arranging the switching carrying out unrestricted model and general mode, eliminating loaded down with trivial details operation and setting.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Fig. 6 is the block diagram of a kind of terminal control mechanism 900 according to an exemplary embodiment.Such as, terminal control mechanism 900 can be mobile terminal.
With reference to Fig. 6, terminal control mechanism 900 can comprise following one or more assembly: processing components 902, storer 904, electric power assembly 906, multimedia groupware 908, audio-frequency assembly 910, the interface 912 of I/O (I/O), sensor module 914, and communications component 916.
The integrated operation of the usual control terminal control device 900 of processing components 902, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 902 can comprise one or more processor 920 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 902 can comprise one or more module, and what be convenient between processing components 902 and other assemblies is mutual.Such as, processing components 902 can comprise multi-media module, mutual with what facilitate between multimedia groupware 908 and processing components 902.
Storer 904 is configured to store various types of data to be supported in the operation of equipment 900.The example of these data comprises for any application program of operation on terminal control mechanism 900 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 904 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that electric power assembly 906 is terminal control mechanism 900 provide electric power.Electric power assembly 906 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for terminal control mechanism 900 and be associated.
Multimedia groupware 908 is included in the screen providing an output interface between described terminal control mechanism 900 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 908 comprises a front-facing camera and/or post-positioned pick-up head.When terminal control mechanism 900 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 910 is configured to export and/or input audio signal.Such as, audio-frequency assembly 910 comprises a microphone (MIC), and when terminal control mechanism 900 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 904 further or be sent via communications component 916.In certain embodiments, audio-frequency assembly 910 also comprises a loudspeaker, for output audio signal.
I/O interface 912 is for providing interface between processing components 902 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 914 comprises one or more sensor, for providing the state estimation of various aspects for terminal control mechanism 900.Such as, sensor module 914 can detect the opening/closing state of terminal control mechanism 900, the relative positioning of assembly, such as described assembly is display and the keypad of terminal control mechanism 900, the position of all right sense terminals control device 900 of sensor module 914 or terminal control mechanism 900 1 assemblies changes, the presence or absence that user contacts with terminal control mechanism 900, the temperature variation of terminal control mechanism 900 orientation or acceleration/deceleration and terminal control mechanism 900.Sensor module 914 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 914 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 914 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 916 is configured to the communication being convenient to wired or wireless mode between terminal control mechanism 900 and other equipment.Terminal control mechanism 900 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 916 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communications component 916 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, terminal control mechanism 900 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 904 of instruction, above-mentioned instruction can perform said method by the processor 920 of terminal control mechanism 900.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of device, make device enough perform a kind of terminal control method, described method comprises:
There is provided a locking screen interface, locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under unrestricted model, terminal device uses limited;
When receiving the unrestricted model selection instruction inputted under locking screen interface, enter unrestricted model.
Alternatively, authorization information comprises at least one in password, gesture, fingerprint, iris and vocal print.
Alternatively, terminal device uses the limited at least one comprised in following state:
Function or application need by being used after checking at least partially;
Function or application prohibit the use at least partially;
The use duration of function or application can not more than the first predetermined value at least partially;
The use duration of terminal device can not more than the second predetermined value.
Alternatively, locking screen interface comprises the unblock entrance for being unlocked by authorization information for user, and for selecting for user the unrestricted model entrance entering unrestricted model;
Unlocking entrance and unrestricted model entrance is independently two entrances; Or unblock entrance and unrestricted model entrance are a public entrance.
Alternatively, method also comprises:
When setting operation being detected under unrestricted model, export checking interface, setting operation is for using limited function or application;
Receive the authentication information that user inputs under checking interface;
When the authentication information of user's input is verified, perform setting operation, when the secondary authentication failed of the authentication information N continuous that user inputs, do not perform setting operation, N is positive integer.
Wherein, setting operation can comprise answer or call, check or send note, check or send instant messaging information, the operation of deducting fees can be produced in one or more.
Alternatively, method also comprises:
When terminal device is under unrestricted model, counting user uses the time of terminal device continuously;
When user uses the time of terminal device to reach the first limit value continuously, prompting user uses the overlong time of terminal device continuously.
Wherein, prompting user uses the overlong time of terminal device continuously, comprising:
Generate and export information, the overlong time of information for pointing out user to use terminal device continuously.
Alternatively, when user uses the time of terminal device to reach the first limit value continuously, method also comprises:
In the first setting duration, forbid that user uses unrestricted model.
Wherein, forbid that user uses unrestricted model, comprising:
Control terminal returns locking screen interface from unrestricted model, and forbids entering unrestricted model from locking screen interface.
In the first setting duration, forbid that user uses unrestricted model, comprising:
Control terminal returns locking screen interface from unrestricted model, and forbids entering unrestricted model from locking screen interface in the first setting duration.
Alternatively, method also comprises:
When terminal device is under unrestricted model, counting user uses the time of terminal device and the touch screen frequency of user continuously;
When user uses the time of terminal device to reach the second limit value continuously, and when the touch screen frequency of user exceedes threshold value, in the second setting duration, forbid that user uses unrestricted model.
Wherein, in the second setting duration, forbid that user uses unrestricted model, comprising:
Control terminal returns locking screen interface from unrestricted model, and forbids entering unrestricted model from locking screen interface in the second setting duration.
Alternatively, method also comprises:
When terminal device is under unrestricted model, counting user uses total duration of terminal device in one-period;
According to the corresponding relation of total duration and classification, determine that user uses the classification that total duration of terminal device is corresponding in one-period;
When being classified as the first predetermine level, prompting user has used total duration of terminal device in current period, when being classified as the second predetermine level, in current period, limited subscriber uses unrestricted model, and total duration that the second predetermine level is corresponding is greater than total duration corresponding to the first predetermine level.
Wherein, in current period, limited subscriber uses unrestricted model, comprising:
Control terminal returns locking screen interface from unrestricted model, and forbids directly entering unrestricted model from locking screen interface in current period.
Alternatively, when being classified as the second predetermine level, method also comprises:
Reduction user reaches the total duration needed for the first predetermine level or the second predetermine level in next cycle.
Alternatively, method also comprises:
When terminal device is in unrestricted model, show the icon of spendable application program on the terminal device, under the icon of spendable application program only comprises unrestricted model, allow the icon of accessed application program.
Those skilled in the art, at consideration instructions and after putting into practice invention disclosed herein, will easily expect other embodiment of the present invention.The application is intended to contain any modification of the present invention, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present invention and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present invention and spirit are pointed out by claim below.
Should be understood that, the present invention is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.Scope of the present invention is only limited by appended claim.

Claims (27)

1. a terminal control method, is characterized in that, described method comprises:
There is provided a locking screen interface, described locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under described unrestricted model, terminal device uses limited;
When receiving the unrestricted model selection instruction inputted under described locking screen interface, enter described unrestricted model.
2. method according to claim 1, is characterized in that, described authorization information comprises at least one in password, gesture, fingerprint, iris and vocal print.
3. method according to claim 1, is characterized in that, described terminal device uses the limited at least one comprised in following state:
Function or application need by being used after checking at least partially;
Function or application prohibit the use at least partially;
The use duration of function or application can not more than the first predetermined value at least partially;
The use duration of described terminal device can not more than the second predetermined value.
4. method according to claim 1, is characterized in that, described locking screen interface comprises the unblock entrance for being unlocked by described authorization information for user, and for selecting for user the unrestricted model entrance entering described unrestricted model;
Described unblock entrance and described unrestricted model entrance are independently two entrances; Or described unblock entrance and described unrestricted model entrance are a public entrance.
5. the method according to any one of Claims 1-4, is characterized in that, described method also comprises:
When setting operation being detected under described unrestricted model, export checking interface, described setting operation is for using limited function or application;
Receive the authentication information that described user inputs under described checking interface;
When the authentication information that described user inputs is verified, perform described setting operation, when the secondary authentication failed of the authentication information N continuous that described user inputs, do not perform described setting operation, described N is positive integer.
6. method according to claim 5, is characterized in that, described setting operation comprise answer or call, check or send note, check or send instant messaging information, the operation of deducting fees can be produced in one or more.
7. the method according to any one of Claims 1-4, is characterized in that, described method also comprises:
When described terminal device is under described unrestricted model, add up the time that described user uses described terminal device continuously;
When described user uses the time of described terminal device to reach the first limit value continuously, described user is pointed out to use the overlong time of described terminal device continuously.
8. method according to claim 7, is characterized in that, when described user uses the time of described terminal device to reach the first limit value continuously, described method also comprises:
In the first setting duration, forbid that described user uses described unrestricted model.
9. method according to claim 8, is characterized in that, described in forbid that described user uses described unrestricted model, comprising:
Control described terminal device and return described locking screen interface from described unrestricted model, and forbid entering described unrestricted model from described locking screen interface.
10. the method according to any one of Claims 1-4, is characterized in that, described method also comprises:
When described terminal device is under described unrestricted model, add up the touch screen frequency that described user uses the time of described terminal device and described user continuously;
When described user uses the time of described terminal device to reach the second limit value continuously, and when the touch screen frequency of described user exceedes threshold value, in the second setting duration, forbid that described user uses described unrestricted model.
11. methods according to any one of Claims 1-4, it is characterized in that, described method also comprises:
When described terminal device is under described unrestricted model, add up total duration that described user uses described terminal device in one-period;
According to the corresponding relation of total duration and classification, determine that described user uses the classification that total duration of described terminal device is corresponding in one-period;
When described be classified as the first predetermine level time, point out described user in current period, used total duration of described terminal device, when described be classified as the second predetermine level time, in current period, limit described user and use described unrestricted model, total duration that described second predetermine level is corresponding is greater than total duration corresponding to described first predetermine level.
12. methods according to claim 11, is characterized in that, when described be classified as the second predetermine level time, described method also comprises:
Reduce described user in next cycle, reach described first predetermine level or the total duration needed for described second predetermine level.
13. methods according to any one of Claims 1-4, it is characterized in that, described method also comprises:
When described terminal device is in described unrestricted model, described terminal device shows the icon of spendable application program, under the icon of described spendable application program only comprises described unrestricted model, allow the icon of accessed application program.
14. 1 kinds of terminal control mechanisms, is characterized in that, described device comprises:
Output module, for providing a locking screen interface, described locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under described unrestricted model, terminal device uses limited;
Processing module, for when receiving the unrestricted model selection instruction inputted under described locking screen interface, enters described unrestricted model.
15. devices according to claim 14, is characterized in that, described authorization information comprises at least one in password, gesture, fingerprint, iris and vocal print.
16. devices according to claim 14, is characterized in that, described terminal device uses the limited at least one comprised in following state:
Function or application need by being used after checking at least partially;
Function or application prohibit the use at least partially;
The use duration of function or application can not more than the first predetermined value at least partially;
The use duration of described terminal device can not more than the second predetermined value.
17. devices according to claim 14, is characterized in that, described locking screen interface comprises the unblock entrance for being unlocked by described authorization information for user, and for selecting for user the unrestricted model entrance entering described unrestricted model;
Described unblock entrance and described unrestricted model entrance are independently two entrances; Or described unblock entrance and described unrestricted model entrance are a public entrance.
18., according to claim 14 to the device described in 17 any one, is characterized in that, described device also comprises receiver module;
Described output module, also for when setting operation being detected under described unrestricted model, export checking interface, described setting operation is for using limited function or application;
Described receiver module, for receiving the authentication information that described user inputs under described checking interface;
Described processing module, also for when the authentication information of described user's input is verified, performs described setting operation, and when the secondary authentication failed of the authentication information N continuous that described user inputs, do not perform described setting operation, described N is positive integer.
19. devices according to claim 18, is characterized in that, described setting operation comprise answer or call, check or send note, check or send instant messaging information, the operation of deducting fees can be produced in one or more.
20., according to claim 14 to the device described in 17 any one, is characterized in that, described device also comprises:
Statistical module, for when described terminal device is under described unrestricted model, adds up the time that described user uses described terminal device continuously;
Described processing module, time also for using the time of described terminal device to reach the first limit value continuously as described user, points out described user to use the overlong time of described terminal device continuously.
21. devices according to claim 20, is characterized in that, described processing module, time also for using the time of described terminal device to reach the first limit value continuously as described user, in the first setting duration, forbid that described user uses described unrestricted model.
22. devices according to claim 21, is characterized in that, described processing module, return described locking screen interface for controlling described terminal device from described unrestricted model, and forbid entering described unrestricted model from described locking screen interface.
23., according to claim 14 to the device described in 17 any one, is characterized in that, described device also comprises:
Statistical module, for when described terminal device is under described unrestricted model, adds up the touch screen frequency that described user uses the time of described terminal device and described user continuously;
Described processing module, also for using the time of described terminal device to reach the second limit value continuously as described user, and when the touch screen frequency of described user exceedes threshold value, in the second setting duration, forbids that described user uses described unrestricted model.
24., according to claim 14 to the device described in 17 any one, is characterized in that, described device also comprises:
Statistical module, for when described terminal device is under described unrestricted model, adds up total duration that described user uses described terminal device in one-period;
Described processing module, also for the corresponding relation according to total duration and classification, determines that described user uses the classification that total duration of described terminal device is corresponding in one-period;
When described be classified as the first predetermine level time, point out described user in current period, used total duration of described terminal device, when described be classified as the second predetermine level time, in current period, limit described user and use described unrestricted model, total duration that described second predetermine level is corresponding is greater than total duration corresponding to described first predetermine level.
25. devices according to claim 24, it is characterized in that, described processing module, also for when described in be classified as the second predetermine level time, reduce described user in next cycle, reach described first predetermine level or the total duration needed for described second predetermine level.
26. according to claim 14 to the device described in 17 any one, it is characterized in that, described output module, also for when described terminal device is in described unrestricted model, described terminal device shows the icon of spendable application program, under the icon of described spendable application program only comprises described unrestricted model, allows the icon of accessed application program.
27. 1 kinds of terminal control mechanisms, is characterized in that, described device comprises:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
There is provided a locking screen interface, described locking screen interface is used for selecting enter unrestricted model or unlocked by authorization information for user, and under described unrestricted model, terminal device uses limited;
When receiving the unrestricted model selection instruction inputted under described locking screen interface, enter described unrestricted model.
CN201510906548.7A 2015-12-09 2015-12-09 Terminal control method and terminal control device Pending CN105574378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510906548.7A CN105574378A (en) 2015-12-09 2015-12-09 Terminal control method and terminal control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510906548.7A CN105574378A (en) 2015-12-09 2015-12-09 Terminal control method and terminal control device

Publications (1)

Publication Number Publication Date
CN105574378A true CN105574378A (en) 2016-05-11

Family

ID=55884499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510906548.7A Pending CN105574378A (en) 2015-12-09 2015-12-09 Terminal control method and terminal control device

Country Status (1)

Country Link
CN (1) CN105574378A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101126A (en) * 2016-06-30 2016-11-09 珠海市魅族科技有限公司 A kind of method of information processing and terminal
CN106327193A (en) * 2016-08-24 2017-01-11 宇龙计算机通信科技(深圳)有限公司 System unlock method and equipment
CN107026935A (en) * 2016-10-28 2017-08-08 珠海格力电器股份有限公司 The authority control method and device of mobile device and mobile device
CN107392056A (en) * 2017-07-31 2017-11-24 广东欧珀移动通信有限公司 Terminal and child mode implementation method, computer-readable recording medium
CN107402710A (en) * 2017-07-13 2017-11-28 努比亚技术有限公司 Method for protecting privacy, mobile terminal and computer-readable recording medium
WO2018000206A1 (en) * 2016-06-28 2018-01-04 宋英楠 Incoming call control method and device for mobile phone
CN107613142A (en) * 2017-10-19 2018-01-19 佛山市章扬科技有限公司 A kind of method for controlling mobile phone usage time
CN107784212A (en) * 2017-11-20 2018-03-09 北京小米移动软件有限公司 Icon display method and device
WO2018045728A1 (en) * 2016-09-07 2018-03-15 中兴通讯股份有限公司 Method and apparatus for protecting unlocked status of touch screen
CN108462788A (en) * 2017-02-17 2018-08-28 郭敏 A kind of method and system of automatic replacement mobile terminal pattern
CN108924292A (en) * 2018-06-12 2018-11-30 Oppo广东移动通信有限公司 terminal control method, device, mobile terminal and storage medium
CN109191265A (en) * 2018-09-19 2019-01-11 深圳市朗耀电子商务有限公司 A kind of bullion memory management method
CN110933224A (en) * 2019-10-28 2020-03-27 维沃移动通信有限公司 Scene mode switching method and electronic equipment
CN110995934A (en) * 2019-12-16 2020-04-10 北京小米移动软件有限公司 Method, device and medium for realizing multi-user use of intelligent terminal
CN111010481A (en) * 2019-12-16 2020-04-14 北京小米移动软件有限公司 Incoming call monitoring method, incoming call monitoring device and computer storage medium
CN111125689A (en) * 2019-12-24 2020-05-08 北京明朝万达科技股份有限公司 Application management method and device, plug-in, electronic equipment and computer storage medium
CN111753287A (en) * 2020-06-28 2020-10-09 中国银行股份有限公司 Authority control method and device
CN112579232A (en) * 2020-12-09 2021-03-30 珠海格力电器股份有限公司 Content display method and device, electronic equipment and computer storage medium
CN113157111A (en) * 2016-07-29 2021-07-23 苹果公司 Systems, devices, and methods for dynamically providing user interface controls at a touch-sensitive secondary display
CN113313350A (en) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 Internet of things data acquisition, analysis and management system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022610A (en) * 2006-02-15 2007-08-22 乐金电子(中国)研究开发中心有限公司 Cellphone with guard function and guard method
US20090287921A1 (en) * 2008-05-16 2009-11-19 Microsoft Corporation Mobile device assisted secure computer network communication
CN102830920A (en) * 2012-08-03 2012-12-19 广东欧珀移动通信有限公司 Handheld equipment privacy protection method
CN102930221A (en) * 2011-08-09 2013-02-13 三星电子(中国)研发中心 Method for protecting data in handheld equipment
CN103440140A (en) * 2013-09-11 2013-12-11 昆山富泰科电脑有限公司 System for classifying applications of intelligent device and setting use permission
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN103902862A (en) * 2012-12-30 2014-07-02 联想(北京)有限公司 Mobile device management method and device and mobile device
CN104992091A (en) * 2015-06-05 2015-10-21 小米科技有限责任公司 Method and apparatus for accessing terminal end

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022610A (en) * 2006-02-15 2007-08-22 乐金电子(中国)研究开发中心有限公司 Cellphone with guard function and guard method
US20090287921A1 (en) * 2008-05-16 2009-11-19 Microsoft Corporation Mobile device assisted secure computer network communication
CN102930221A (en) * 2011-08-09 2013-02-13 三星电子(中国)研发中心 Method for protecting data in handheld equipment
CN102830920A (en) * 2012-08-03 2012-12-19 广东欧珀移动通信有限公司 Handheld equipment privacy protection method
CN103902862A (en) * 2012-12-30 2014-07-02 联想(北京)有限公司 Mobile device management method and device and mobile device
CN103440140A (en) * 2013-09-11 2013-12-11 昆山富泰科电脑有限公司 System for classifying applications of intelligent device and setting use permission
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN104992091A (en) * 2015-06-05 2015-10-21 小米科技有限责任公司 Method and apparatus for accessing terminal end

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018000206A1 (en) * 2016-06-28 2018-01-04 宋英楠 Incoming call control method and device for mobile phone
CN106101126A (en) * 2016-06-30 2016-11-09 珠海市魅族科技有限公司 A kind of method of information processing and terminal
CN113157111A (en) * 2016-07-29 2021-07-23 苹果公司 Systems, devices, and methods for dynamically providing user interface controls at a touch-sensitive secondary display
CN106327193A (en) * 2016-08-24 2017-01-11 宇龙计算机通信科技(深圳)有限公司 System unlock method and equipment
WO2018035930A1 (en) * 2016-08-24 2018-03-01 宇龙计算机通信科技(深圳)有限公司 System unlocking method and device
CN106327193B (en) * 2016-08-24 2019-08-02 宇龙计算机通信科技(深圳)有限公司 A kind of system unlocking method and equipment
WO2018045728A1 (en) * 2016-09-07 2018-03-15 中兴通讯股份有限公司 Method and apparatus for protecting unlocked status of touch screen
CN107026935A (en) * 2016-10-28 2017-08-08 珠海格力电器股份有限公司 The authority control method and device of mobile device and mobile device
CN108462788A (en) * 2017-02-17 2018-08-28 郭敏 A kind of method and system of automatic replacement mobile terminal pattern
CN107402710B (en) * 2017-07-13 2020-12-08 上海读客数字信息技术有限公司 Privacy information protection method, mobile terminal and computer readable storage medium
CN107402710A (en) * 2017-07-13 2017-11-28 努比亚技术有限公司 Method for protecting privacy, mobile terminal and computer-readable recording medium
CN107392056A (en) * 2017-07-31 2017-11-24 广东欧珀移动通信有限公司 Terminal and child mode implementation method, computer-readable recording medium
CN107613142A (en) * 2017-10-19 2018-01-19 佛山市章扬科技有限公司 A kind of method for controlling mobile phone usage time
CN107784212A (en) * 2017-11-20 2018-03-09 北京小米移动软件有限公司 Icon display method and device
CN108924292A (en) * 2018-06-12 2018-11-30 Oppo广东移动通信有限公司 terminal control method, device, mobile terminal and storage medium
CN109191265A (en) * 2018-09-19 2019-01-11 深圳市朗耀电子商务有限公司 A kind of bullion memory management method
CN110933224A (en) * 2019-10-28 2020-03-27 维沃移动通信有限公司 Scene mode switching method and electronic equipment
CN111010481A (en) * 2019-12-16 2020-04-14 北京小米移动软件有限公司 Incoming call monitoring method, incoming call monitoring device and computer storage medium
CN110995934A (en) * 2019-12-16 2020-04-10 北京小米移动软件有限公司 Method, device and medium for realizing multi-user use of intelligent terminal
CN111010481B (en) * 2019-12-16 2022-06-24 北京小米移动软件有限公司 Incoming call monitoring method, incoming call monitoring device and computer storage medium
CN110995934B (en) * 2019-12-16 2022-07-29 北京小米移动软件有限公司 Method, device and medium for realizing multi-user use of intelligent terminal
CN111125689A (en) * 2019-12-24 2020-05-08 北京明朝万达科技股份有限公司 Application management method and device, plug-in, electronic equipment and computer storage medium
CN111753287A (en) * 2020-06-28 2020-10-09 中国银行股份有限公司 Authority control method and device
CN111753287B (en) * 2020-06-28 2022-07-22 中国银行股份有限公司 Authority control method and device
CN112579232A (en) * 2020-12-09 2021-03-30 珠海格力电器股份有限公司 Content display method and device, electronic equipment and computer storage medium
CN113313350A (en) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 Internet of things data acquisition, analysis and management system

Similar Documents

Publication Publication Date Title
CN105574378A (en) Terminal control method and terminal control device
CN104850769B (en) Operation executes method and device
CN104765552B (en) Right management method and device
CN104933351B (en) The treating method and apparatus of information security
CN104216742B (en) Brush machine control method and device based on password
CN104391712B (en) Closedown method and device
CN105930707A (en) Method and device for switching systems
CN106210238B (en) Short message storage method and device
CN106097494A (en) The method for unlocking of smart lock and device
CN104091376A (en) Intelligent lock control method and apparatus thereof
CN110400405B (en) Method, device and medium for controlling access control
CN104573550A (en) Method and device for protecting data
CN105550568A (en) Mobile terminal data protection method and apparatus
CN104331228A (en) Screen locking method and device
CN106204011A (en) NFC payment and device
CN105511922A (en) Application startup controlling method and device
CN104468581B (en) The method and device of login application program
CN106453527A (en) Account sharing method and equipment
CN106446653A (en) Application authority management method and device and electronic equipment
CN104219053A (en) Information displaying method, information concealing method and information concealing device
CN106471513B (en) Authority control method and device
CN105450835A (en) Method and device for realizing emergency contact and smart terminal
CN107230060A (en) The method and apparatus that a kind of account is reported the loss
CN105069344A (en) Mobile terminal locking method and apparatus
CN105808995B (en) A kind of password prompt method, apparatus and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160511