CN105893886A - System locking method and device - Google Patents

System locking method and device Download PDF

Info

Publication number
CN105893886A
CN105893886A CN201610203794.0A CN201610203794A CN105893886A CN 105893886 A CN105893886 A CN 105893886A CN 201610203794 A CN201610203794 A CN 201610203794A CN 105893886 A CN105893886 A CN 105893886A
Authority
CN
China
Prior art keywords
lock
out state
instruction
foreground program
currently
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610203794.0A
Other languages
Chinese (zh)
Inventor
李�真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610203794.0A priority Critical patent/CN105893886A/en
Publication of CN105893886A publication Critical patent/CN105893886A/en
Priority to PCT/CN2016/102465 priority patent/WO2017166789A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention provides a system locking method and device, and relates to the field of man-machine interaction. The method comprises the following steps: monitoring whether a locking instruction is received or not; when the locking instruction is received, judging whether a foreground program which is run at the present time exists or not at present; if the foreground program which is run at the present time exists at present, entering a first locking state, wherein the first locking state comprises the steps of shielding all input instructions except an unlocking instruction, keeping a terminal screen at an opening state and keeping continual running of the foreground program. With the adoption of the system locking method and device, the flexibility and convenience of system locking operation can be improved.

Description

A kind of system lock method and device
Technical field
The present invention relates to field of human-computer interaction, be specifically related to a kind of system lock method and device.
Background technology
Along with popularizing of intelligent terminal, a lot of users utilize screen locking software to protect the terminal privacy of oneself. Intelligent terminal's screen locking is similar with computer screen lock, includes two ways, and one is turned off screen power supplies, One is to utilize the quick, intelligent screen locking of software.The purpose of screen locking is to protect the computer of oneself or mobile phone hidden Private, prevent maloperation, in the case of not closing a terminal, save electricity.
Existing screen locking mode, regardless of locking principle, the result of locking is typically to stop fortune Row all programs, screen of closing a terminal, user can open screen access and unlock interface;And unlocking Afterwards, user can enter system desktop, accesses all of application program, it can be seen that, existing Motility and the convenience of screen locking mode are poor.
Summary of the invention
The present invention is to solve the motility of existing screen locking mode and the poor problem of convenience.
In view of this, the present invention provides a kind of system lock method, including:
Monitor whether to receive lock instruction;
When receiving lock instruction, it is judged that currently whether have the foreground program being currently running;
If currently there being the foreground program being currently running, then enter the first lock-out state, described first locking State include shield except unlock instruction in addition to all input instruction, keep terminal screen be in opening, Described foreground program is kept to continue to run with.
Preferably, also include:
If currently without the foreground program being currently running, then enter the second lock-out state, described second lock Determine state and include close a terminal screen, shielding harness desktop.
The present invention also provides for another kind of system lock method, including:
Monitor whether to receive lock instruction;
When receiving lock instruction, to user feedback lock-out state option, lock-out state option includes First lock-out state and the second lock-out state, and described first lock-out state and the second lock-out state Locked content differs;
Monitor whether to receive the selected instruction that user provides;
When receiving the selected instruction that user provides, determine entrance the first lock according to described selected instruction Determine state or the second lock-out state.
Preferably, described first lock-out state include shield except unlock instruction in addition to all input instruction, Terminal screen is kept to be in opening, keep the foreground program being currently running to continue to run with.
Preferably, described second lock-out state includes close a terminal screen, shielding harness desktop, end The foreground program being currently running.
Correspondingly, the present invention provides a kind of systems locking arrangement, including:
Monitoring means, is used for monitoring whether to receive lock instruction;
Whether judging unit, for when receiving lock instruction, it is judged that before being currently currently running Platform program;
First lock cell, if for currently there being the foreground program being currently running, then enters the first locking State, described first lock-out state includes all input instructions shielding in addition to unlocking instruction, keeps eventually End screen is in opening, keeps described foreground program to continue to run with.
Preferably, also include:
Second lock cell, if for currently without the foreground program being currently running, then entering the second lock Determining state, described second lock-out state includes close a terminal screen, shielding harness desktop.
The present invention also provides for another kind of systems locking arrangement, including:
First monitoring means, is used for monitoring whether to receive lock instruction;
Inquiry unit, for when receiving lock instruction, to user feedback lock-out state option, lock Determine state options and include the first lock-out state and the second lock-out state, and described first lock-out state and The locked content of the second lock-out state differs;
Second monitoring means, for monitoring whether to receive the selected instruction of user's offer;
Lock cell, for when receiving the selected instruction that user provides, according to described selected instruction Determine entrance the first lock-out state or the second lock-out state.
Preferably, described first lock-out state include shield except unlock instruction in addition to all input instruction, Terminal screen is kept to be in opening, keep the foreground program being currently running to continue to run with.
Preferably, described second lock-out state includes close a terminal screen, shielding harness desktop, end The foreground program being currently running.
The first the system lock method and device provided according to the present invention, when monitoring lock instruction, First determine whether currently whether have the foreground program being currently running, if currently there being the foreground program being currently running, Then enter the first lock-out state, described first lock-out state include shield except unlock instruction in addition to all defeated Enter instruction, keep terminal screen to be in opening, keep described foreground program to continue to run with, at this Lock-out state foreground application can remain on, and user can normally show interior by viewing terminal screen Hold and do not disturbed by maloperation, which thereby enhancing motility and the convenience of lock operation.
The second system lock method and device provided according to the present invention, when monitoring lock instruction, To user feedback lock-out state option, lock-out state option includes the first lock-out state and the second locking shape State, and content locked in two kinds of lock-out states differs, when receiving the choosing that user provides When surely instructing, enter the one in two kinds of lock-out states according to the selection of user, which thereby enhance locking The motility of operation and convenience.
Accompanying drawing explanation
In order to be illustrated more clearly that the specific embodiment of the invention or technical scheme of the prior art, under The accompanying drawing used required in detailed description of the invention or description of the prior art will be briefly described by face, It should be evident that the accompanying drawing in describing below is some embodiments of the present invention, general for this area From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain according to these accompanying drawings Obtain other accompanying drawing.
The flow chart of the system lock method that Fig. 1 provides for the embodiment of the present invention 1;
The flow chart of the system lock method that Fig. 2 provides for the embodiment of the present invention 2;
The structural representation of the systems locking arrangement that Fig. 3 provides for the embodiment of the present invention 3;
The structural representation of the systems locking arrangement that Fig. 4 provides for the embodiment of the present invention 4.
Detailed description of the invention
Below in conjunction with accompanying drawing, technical scheme is clearly and completely described, it is clear that Described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on this Embodiment in bright, those of ordinary skill in the art are obtained under not making creative work premise Every other embodiment, broadly fall into the scope of protection of the invention.
As long as additionally, technical characteristic involved in invention described below difference embodiment that The conflict of not constituting between this just can be combined with each other.
Embodiment 1
Present embodiments providing a kind of system lock method, the method can perform in intelligent terminal, The method includes as shown in Figure 1:
S1, monitors whether to receive lock instruction, and lock instruction can be provided by user, the most permissible The locking key utilizing terminal realizes, it is also possible to arrange virtual key in system desktop or main interface, when with Lock instruction is there is in family when clicking on locking button.When receiving lock instruction, perform step S2, Otherwise continue monitoring.
S2, it is judged that currently whether have the foreground program being currently running.The foreground of indication of the present invention and backstage For being the desktop of relative visualized operation system, the program i.e. run at desktop is foreground program, Foreground program run time user can perception, be all foreground program such as video player, browser etc.. And background program, it is that user can't see.It is known that existing operation system of smart phone all with Time support foreground program run and background program run.Background program is also task level program, foreground journey Sequence is also event handling level program.If currently having the foreground program being currently running, such as web browser It is in opening, then performs step S3, otherwise perform step S4.
S3, enters the first lock-out state, and described first lock-out state includes shielding in addition to unlocking instruction All input instructions, holding terminal screen are in opening, keep described foreground program to continue to run with. The mode of masking instruction has multiple, such as, can intercept and capture instruction, it is also possible to disabling system input module etc., In this case, such as user touches the operation of screen, operation closing key, the behaviour of closedown screen power supplies Make all to be shielded, only accept to unlock instruction, after receiving unblock instruction, then recover normal operating condition.Mesh It is same mechanical key that the locking key of front most intelligent terminal conciliates locking key, and this programme can be existing Terminal in perform, user can by same mechanical key send lock instruction and unlock instruct. Certainly, owing to the lock-out state of this programme is different from existing lock-out state, so for the ease of user area Point, it is also possible in existing terminal, set up the button of a lock instruction for sending this programme.
S4, enters the second lock-out state, and described second lock-out state includes close a terminal screen, shielding System desktop, the second lock-out state is identical with existing lock-out state, i.e. this programme provides two kinds simultaneously Lock-out state.
The system lock method provided according to embodiments of the present invention, when monitoring lock instruction, first Judge currently whether have the foreground program being currently running, if currently having the foreground program being currently running, then Entering the first lock-out state, described first lock-out state includes shielding all inputs in addition to unlocking instruction Instruction, holding terminal screen are in opening, keep described foreground program to continue to run with, and lock at this Determining state foreground application can remain on, user can normal viewing terminal screen display content And do not disturbed by maloperation, which thereby enhance motility and the convenience of lock operation.
Embodiment 2
Present embodiments providing another kind of system lock method, the method can perform in intelligent terminal, The method includes as shown in Figure 2:
S ' 1, monitors whether to receive lock instruction.Lock instruction can be provided by user, the most permissible The locking key utilizing terminal realizes, it is also possible to arrange virtual key in system desktop or main interface, when with Lock instruction is there is in family when clicking on locking button.The locking key of most intelligent terminal conciliates locking key For same mechanical key, this programme can perform in existing terminal, and user can be by same Individual mechanical key sends lock instruction and unlocks instruction.Certainly, owing to the lock-out state of this programme is with existing There is lock-out state different, so distinguishing for the ease of user, it is also possible to set up one in existing terminal The button of the individual lock instruction for sending this programme.
When receiving lock instruction, perform step S ' 2, otherwise to continue monitoring.
S ' 2, to user feedback lock-out state option, lock-out state option includes the first lock-out state and Two lock-out states, and the locked content of described first lock-out state and the second lock-out state differs. Such as can eject an options menu, wherein have two options.
S ' 3, monitors whether to receive the selected instruction that user provides, and i.e. waits that user selects a kind of locking State;Perform when receiving the selected instruction that user provides step S ' 4, otherwise to continue monitoring.
S ' 4, determines entrance the first lock-out state or the second lock-out state according to described selected instruction.
The system lock method provided according to embodiments of the present invention, when monitoring lock instruction, Xiang Yong Family feedback lock state options, lock-out state option includes the first lock-out state and the second lock-out state, And content locked in two kinds of lock-out states differs, when receiving the selected finger that user provides When making, enter the one in two kinds of lock-out states according to the selection of user, which thereby enhance lock operation Motility and convenience.
As one preferred embodiment, described first lock-out state includes shielding in addition to unlocking instruction All input instructions, keep terminal screen to be in opening, keep the foreground that is currently running Program continues to run with.The mode of masking instruction has multiple, such as, can intercept and capture instruction, it is also possible to disabling System input module etc., in this case, such as user touch screen operation, operation closing key, The operation closing screen power supplies is all shielded, and only accepts to unlock instruction, then recovers after receiving unblock instruction Normal operating condition.
Described second lock-out state includes closing a terminal screen, shielding harness desktop, end the most The foreground program run, the second lock-out state can be identical with existing lock-out state.
Embodiment 3
The present embodiment provides a kind of systems locking arrangement, as it is shown on figure 3, this device includes:
Monitoring means 31, is used for monitoring whether to receive lock instruction;
Whether judging unit 32, for when receiving lock instruction, it is judged that currently have and to be currently running Foreground program;
First lock cell 33, if for currently there being the foreground program being currently running, then enters the first lock Determining state, described first lock-out state includes all input instructions shielding in addition to unlocking instruction, keeps Terminal screen is in opening, keeps described foreground program to continue to run with.
The systems locking arrangement provided according to embodiments of the present invention, when monitoring lock instruction, first Judge currently whether have the foreground program being currently running, if currently having the foreground program being currently running, then Entering the first lock-out state, described first lock-out state includes shielding all inputs in addition to unlocking instruction Instruction, holding terminal screen are in opening, keep described foreground program to continue to run with, and lock at this Determining state foreground application can remain on, user can normal viewing terminal screen display content And do not disturbed by maloperation, which thereby enhance motility and the convenience of lock operation.
As one preferred embodiment, this device also includes:
Second lock cell 34, if for currently without the foreground program being currently running, then entering second Lock-out state, described second lock-out state includes close a terminal screen, shielding harness desktop.
Embodiment 4
The present invention provides another kind of systems locking arrangement, as it can be seen, this device includes:
First monitoring means 41, is used for monitoring whether to receive lock instruction;
Inquiry unit 42, for when receiving lock instruction, to user feedback lock-out state option, Lock-out state option includes the first lock-out state and the second lock-out state, and described first lock-out state Differ with the locked content of the second lock-out state;
Second monitoring means 43, for monitoring whether to receive the selected instruction of user's offer;
Lock cell 44, for when receiving the selected instruction that user provides, according to described selected finger Order determines entrance the first lock-out state or the second lock-out state.
As one preferred embodiment, described first lock-out state includes shielding in addition to unlocking instruction All input instructions, keep terminal screen to be in opening, keep the foreground that is currently running Program continues to run with.
Described second lock-out state includes closing a terminal screen, shielding harness desktop, end the most The foreground program run.
The systems locking arrangement provided according to embodiments of the present invention, when monitoring lock instruction, Xiang Yong Family feedback lock state options, lock-out state option includes the first lock-out state and the second lock-out state, And content locked in two kinds of lock-out states differs, when receiving the selected finger that user provides When making, enter the one in two kinds of lock-out states according to the selection of user, which thereby enhance lock operation Motility and convenience.
Obviously, above-described embodiment is only for clearly demonstrating example, and not to embodiment party The restriction of formula.For those of ordinary skill in the field, the most also may be used To make other changes in different forms.Here without also all of embodiment being given With exhaustive.And the obvious change thus extended out or variation are still in the guarantor of the invention Protect among scope.

Claims (10)

1. a system lock method, it is characterised in that including:
Monitor whether to receive lock instruction;
When receiving lock instruction, it is judged that currently whether have the foreground program being currently running;
If currently there being the foreground program being currently running, then enter the first lock-out state, described first lock Determine state to include all input instructions shielding in addition to unlocking instruction, keep terminal screen to be in unlatching shape State, described foreground program is kept to continue to run with.
Method the most according to claim 1, it is characterised in that also include:
If currently without the foreground program being currently running, then enter the second lock-out state, described second Lock-out state includes close a terminal screen, shielding harness desktop.
3. a system lock method, it is characterised in that including:
Monitor whether to receive lock instruction;
When receiving lock instruction, to user feedback lock-out state option, lock-out state option bag Include the first lock-out state and the second lock-out state, and described first lock-out state and the second lock-out state Locked content differ;
Monitor whether to receive the selected instruction that user provides;
When receiving the selected instruction that user provides, determine entrance first according to described selected instruction Lock-out state or the second lock-out state.
Method the most according to claim 3, it is characterised in that described first lock-out state bag Include all inputs shielding in addition to unlocking instruction to instruct, keep terminal screen to be in opening, holding The foreground program being currently running continues to run with.
Method the most according to claim 3, it is characterised in that described second lock-out state bag Include screen of closing a terminal, shielding harness desktop, terminate the foreground program that is currently running.
6. a systems locking arrangement, it is characterised in that including:
Monitoring means, is used for monitoring whether to receive lock instruction;
Whether judging unit, for when receiving lock instruction, it is judged that currently have and to be currently running Foreground program;
First lock cell, if for currently there being the foreground program being currently running, then enters the first lock Determining state, described first lock-out state includes all input instructions shielding in addition to unlocking instruction, keeps Terminal screen is in opening, keeps described foreground program to continue to run with.
Device the most according to claim 6, it is characterised in that also include:
Second lock cell, if for currently without the foreground program being currently running, then entering second Lock-out state, described second lock-out state includes close a terminal screen, shielding harness desktop.
8. a systems locking arrangement, it is characterised in that including:
First monitoring means, is used for monitoring whether to receive lock instruction;
Inquiry unit, for when receiving lock instruction, to user feedback lock-out state option, Lock-out state option includes the first lock-out state and the second lock-out state, and described first lock-out state Differ with the locked content of the second lock-out state;
Second monitoring means, for monitoring whether to receive the selected instruction of user's offer;
Lock cell, for when receiving the selected instruction that user provides, according to described selected finger Order determines entrance the first lock-out state or the second lock-out state.
Device the most according to claim 8, it is characterised in that described first lock-out state bag Include all inputs shielding in addition to unlocking instruction to instruct, keep terminal screen to be in opening, holding The foreground program being currently running continues to run with.
Device the most according to claim 8, it is characterised in that described second lock-out state bag Include screen of closing a terminal, shielding harness desktop, terminate the foreground program that is currently running.
CN201610203794.0A 2016-04-01 2016-04-01 System locking method and device Pending CN105893886A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610203794.0A CN105893886A (en) 2016-04-01 2016-04-01 System locking method and device
PCT/CN2016/102465 WO2017166789A1 (en) 2016-04-01 2016-10-18 System locking method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610203794.0A CN105893886A (en) 2016-04-01 2016-04-01 System locking method and device

Publications (1)

Publication Number Publication Date
CN105893886A true CN105893886A (en) 2016-08-24

Family

ID=57012128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610203794.0A Pending CN105893886A (en) 2016-04-01 2016-04-01 System locking method and device

Country Status (2)

Country Link
CN (1) CN105893886A (en)
WO (1) WO2017166789A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682526A (en) * 2016-12-14 2017-05-17 珠海格力电器股份有限公司 Browsed picture limiting method and mobile terminal
WO2017166789A1 (en) * 2016-04-01 2017-10-05 乐视控股(北京)有限公司 System locking method and apparatus
CN113687925A (en) * 2021-07-22 2021-11-23 成都鲁易科技有限公司 Equipment operation processing method and device, storage medium and computer equipment
CN114070659A (en) * 2021-10-29 2022-02-18 深圳市优必选科技股份有限公司 Equipment locking method and device and terminal equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063241A (en) * 2009-11-16 2011-05-18 英业达股份有限公司 Handheld electronic device and unlocking method thereof
JP2014075093A (en) * 2012-10-05 2014-04-24 Sharp Corp Information processing terminal and program
CN103793177A (en) * 2014-02-28 2014-05-14 广州视源电子科技股份有限公司 Interface processing method for touch screen device and touch screen device
CN104142773A (en) * 2013-05-06 2014-11-12 中兴通讯股份有限公司 Terminal screen locking method and terminal
CN105068867A (en) * 2015-08-21 2015-11-18 广东欧珀移动通信有限公司 Screen locking method and apparatus

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893886A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 System locking method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063241A (en) * 2009-11-16 2011-05-18 英业达股份有限公司 Handheld electronic device and unlocking method thereof
JP2014075093A (en) * 2012-10-05 2014-04-24 Sharp Corp Information processing terminal and program
CN104142773A (en) * 2013-05-06 2014-11-12 中兴通讯股份有限公司 Terminal screen locking method and terminal
CN103793177A (en) * 2014-02-28 2014-05-14 广州视源电子科技股份有限公司 Interface processing method for touch screen device and touch screen device
CN105068867A (en) * 2015-08-21 2015-11-18 广东欧珀移动通信有限公司 Screen locking method and apparatus

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017166789A1 (en) * 2016-04-01 2017-10-05 乐视控股(北京)有限公司 System locking method and apparatus
CN106682526A (en) * 2016-12-14 2017-05-17 珠海格力电器股份有限公司 Browsed picture limiting method and mobile terminal
CN113687925A (en) * 2021-07-22 2021-11-23 成都鲁易科技有限公司 Equipment operation processing method and device, storage medium and computer equipment
CN113687925B (en) * 2021-07-22 2023-09-29 成都鲁易科技有限公司 Equipment operation processing method and device, storage medium and computer equipment
CN114070659A (en) * 2021-10-29 2022-02-18 深圳市优必选科技股份有限公司 Equipment locking method and device and terminal equipment
CN114070659B (en) * 2021-10-29 2023-11-17 深圳市优必选科技股份有限公司 Equipment locking method and device and terminal equipment

Also Published As

Publication number Publication date
WO2017166789A1 (en) 2017-10-05

Similar Documents

Publication Publication Date Title
CN102646047B (en) A kind ofly start the method for application program and there is the terminal device of touch display screen
CN103543936B (en) A kind of touch screen terminal quick release enters the method and touch screen terminal of application
CN102999268B (en) Dynamic unlocking method and dynamic unlocking device based on application and use times and mobile terminal
CN102981763B (en) The method running application program under touch screen lock-out state
CN105893886A (en) System locking method and device
CN105635483B (en) A kind of processing method, device and storage medium operating mobile terminal
CN101882046A (en) Touch screen unlocking method and system thereof and touch screen device
CN101587421A (en) Unlock method and system of touch panel, and touch panel device
CN102981723B (en) Unlocking method and unlocking device for mobile terminal and mobile terminal
CN103440445A (en) Electronic equipment unlocking control method and system
CN101604223A (en) A kind of unlock method of touch-screen, system and touch panel device
CN103064606A (en) Screen unlocking method for mobile terminal
US10546109B2 (en) Smart touchscreen display
CN105094659A (en) Method and terminal for operating applications based on gestures
CN104902430A (en) Method and system for flow control of intelligent terminal
CN111966258B (en) Permission setting method and device and electronic equipment
KR20160111543A (en) Limiting the functionality of a software program based on a security model
KR100966073B1 (en) Apparatus and method for managing terminal users
CN102707888A (en) Terminal control method and terminal
CN106295305A (en) A kind of unlocking screen method and device of touch screen terminal
CN105892820A (en) Icon display management method and device
CN104376240A (en) Method for processing information and electronic equipment
CN112286070A (en) Equipment control method and device and electronic equipment
CN106155489A (en) The locking means of a kind of desktop application and device
CN105278863A (en) Time interval-based method for detecting and preventing misoperation, device and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160824

WD01 Invention patent application deemed withdrawn after publication