CN106295279B - Method and device for terminal control - Google Patents

Method and device for terminal control Download PDF

Info

Publication number
CN106295279B
CN106295279B CN201610657863.5A CN201610657863A CN106295279B CN 106295279 B CN106295279 B CN 106295279B CN 201610657863 A CN201610657863 A CN 201610657863A CN 106295279 B CN106295279 B CN 106295279B
Authority
CN
China
Prior art keywords
password
terminal
user
screen
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610657863.5A
Other languages
Chinese (zh)
Other versions
CN106295279A (en
Inventor
卢镇洲
陈巧卓
杨飘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610657863.5A priority Critical patent/CN106295279B/en
Publication of CN106295279A publication Critical patent/CN106295279A/en
Application granted granted Critical
Publication of CN106295279B publication Critical patent/CN106295279B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

本公开关于一种终端控制的方法及装置,属于计算机技术领域。该方法包括:检测用户输入的密码信息;确定所述密码信息是否为预先设置的第一密码;如果所述密码信息是第一密码,则控制终端在第一预定时长内不执行锁屏操作。通过预先设置的第一密码,可以控制终端在无用户操作的第一预定时长内不执行锁屏操作,方便用户在第一预定时长内查看终端中的某些内容,而避免因为可能在第一预定时长内因用户无操作而出现锁屏,需反复解锁终端才能查看信息的情况出现。

The present disclosure relates to a terminal control method and device, and belongs to the technical field of computers. The method includes: detecting password information input by a user; determining whether the password information is a preset first password; if the password information is the first password, controlling the terminal not to perform a screen-locking operation within a first predetermined period of time. With the preset first password, the terminal can be controlled not to perform the screen lock operation within the first predetermined period of time without user operation, which is convenient for the user to view some content in the terminal within the first predetermined period of time, and avoids the possibility The screen lock occurs due to inactivity of the user within a predetermined period of time, and the terminal needs to be repeatedly unlocked to view the information.

Description

The method and device of terminal control
Technical field
This disclosure relates to field of computer technology, in particular to a kind of method and device of terminal control.
Background technique
With the fast development of terminal technology, the type of application program is more and more various in terminal, and function is also more and more richer It is rich.The quantity that application program is installed in the terminal of user is constantly increasing, and user can use mobile phone to carry out information daily Search and browsing even carry out editor and the storage of information, such as note, picture library using mobile phone.In order to guarantee on mobile phone The safety of appearance, present mode are encrypted to mobile phone.
Existing mobile phone cipher mode is mostly: when no user is carried out encryption and screen locking in mobile phone after operation a period of time Operation.A problem caused by this way is exactly: user is only browsing a content, although being during this period of time not carried out Any operation, but user is strictly using mobile phone, but according to present mobile phone protected mode, still in this case Encryption screen locking is carried out to mobile phone, user would have to input password and is unlocked, and causes unnecessary operation.
Summary of the invention
The embodiment of the present disclosure provides a kind of terminal control method and device.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of terminal control method is provided, which comprises
Detect the encrypted message of user's input;
Determine whether the encrypted message is pre-set first password;
If the encrypted message is the first password, controlling terminal does not execute screen locking behaviour in the first scheduled duration Make.
Optionally, the controlling terminal, which does not execute screen locking in the first scheduled duration and operates, includes:
Controlling terminal does not execute screen locking operation in the first scheduled duration that no user operates.
The embodiment of the present disclosure can control terminal and first be made a reservation for what no user operate by pre-set first password Do not executed in duration screen locking operation, facilitate user to check certain contents in terminal in the first scheduled duration, and avoid because Screen locking may occur because user is without operation in the first scheduled duration, need to unlock terminal repeatedly can just check to go out the case where information It is existing.
Optionally, the method also includes:
Determine the second password whether is provided in terminal, wherein second password is for detecting terminal second Screen locking is carried out to the terminal when no user operates in scheduled duration and is encrypted, or receives the screen locking operational order of user's sending When terminal is encrypted.
Optionally, if being provided with second password in terminal, the controlling terminal is not held in the first scheduled duration Row screen locking operation, comprising:
The operation that controlling terminal does not carry out screen locking to terminal in the first scheduled duration that no user operates and encrypts.
Optionally, if being provided with second password in terminal, the method also includes:
If the encrypted message is not the first password, it is determined that whether the encrypted message is described second close Code;
If the encrypted message is second password, the terminal is decrypted with second password.
Optionally, if being provided with second password in terminal, the method also includes:
Controlling terminal executes screen locking and operates and use second password pair after the first scheduled duration that no user operates The terminal is encrypted.
Optionally, the encrypted message of the detection user input includes:
In screen lock state, the encrypted message of user's input is detected.
Optionally, first scheduled duration is greater than second scheduled duration.
The embodiment of the present disclosure can carry out the first pre- timing that controlling terminal is operated in no user by the setting of first password Screen locking is not executed and by the operation of the second password encryption, facilitates user to check in the first scheduled duration certain in terminal in long Content, and avoid that password need to be inputted repeatedly because encryption screen locking may occur because user is without operation in the first scheduled duration Appearance the case where capable of checking information that carrys out decryption terminal.
According to the second aspect of an embodiment of the present disclosure, a kind of terminal control mechanism is provided, described device includes:
Information detecting module is configured as the encrypted message of detection user's input;
First determining module is configured to determine that whether the encrypted message is pre-set first password;
Control module, if being configured as the encrypted message is the first password, controlling terminal is predetermined first Screen locking operation is not executed in duration.
Optionally, the control module is configured as controlling terminal and does not execute in the first scheduled duration that no user operates Screen locking operation.
The embodiment of the present disclosure can control terminal and first be made a reservation for what no user operate by pre-set first password Do not executed in duration screen locking operation, facilitate user to check certain contents in terminal in the first scheduled duration, and avoid because Screen locking may occur because user is without operation in the first scheduled duration, need to unlock terminal repeatedly can just check to go out the case where information It is existing.
Optionally, described device further include:
Second determining module is configured to determine that in terminal whether be provided with the second password, wherein second password is used In detecting that terminal screen locking and encrypt to the terminal when no user operates in the second scheduled duration, or receive use Terminal is encrypted when the screen locking operational order that family issues.
Optionally, the control module, if being configured as being provided with second password in terminal, controlling terminal is in nothing The operation for screen locking not being carried out to terminal in first scheduled duration of user's operation and being encrypted.
Optionally, described device further include:
Third determining module, if being configured as being provided with second password in terminal, if the encrypted message is not It is the first password, it is determined that whether the encrypted message is second password;
Deciphering module, if being configured as the encrypted message is second password, with second password to described Terminal is decrypted.
Optionally, described device further include:
Encrypting module, if being configured as being provided with second password in terminal, controlling terminal is operated in no user After first scheduled duration, executes screen locking and operate and second password is used to encrypt the terminal.
Optionally, the information detecting module is configured as detecting the encrypted message of user's input in screen lock state.
Optionally, first scheduled duration is greater than second scheduled duration.
The embodiment of the present disclosure can carry out the first pre- timing that controlling terminal is operated in no user by the setting of first password Screen locking is not executed and by the operation of the second password encryption, facilitates user to check in the first scheduled duration certain in terminal in long Content, and avoid that password need to be inputted repeatedly because encryption screen locking may occur because user is without operation in the first scheduled duration Appearance the case where capable of checking information that carrys out decryption terminal.
According to the third aspect of an embodiment of the present disclosure, a kind of terminal control mechanism is provided, described device includes:
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is configured to:
Detect the encrypted message of user's input;
Determine whether the encrypted message is pre-set first password;
If the encrypted message is the first password, controlling terminal does not execute screen locking behaviour in the first scheduled duration Make.
The technical solution that the embodiment of the present disclosure provides can include the following benefits:
The embodiment of the present disclosure can control terminal and first be made a reservation for what no user operate by pre-set first password Do not executed in duration screen locking operation, facilitate user to check certain contents in terminal in the first scheduled duration, and avoid because Screen locking may occur because user is without operation in the first scheduled duration, need to unlock terminal repeatedly can just check to go out the case where information It is existing.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of terminal control method shown according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the terminal control method shown according to another exemplary embodiment;
Fig. 3 is a kind of flow chart of the terminal control method shown according to another exemplary embodiment;
Fig. 4 is a kind of block diagram of terminal control mechanism shown according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the terminal control mechanism shown according to another exemplary embodiment;
Fig. 6 is a kind of block diagram of the terminal control mechanism shown according to another exemplary embodiment;
Fig. 7 is a kind of block diagram of the terminal control mechanism shown according to another exemplary embodiment;
Fig. 8 is a kind of block diagram of the terminal control mechanism shown according to another exemplary embodiment.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail.These attached drawings It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
It is only to be not intended to be limiting the disclosure merely for for the purpose of describing particular embodiments in the term that the disclosure uses. The "an" of the singular used in disclosure and the accompanying claims book, " described " and "the" are also intended to including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where disclosure range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
The embodiment of the present disclosure provide technical solution be applied to terminal, the terminal can be it is various can by touch screen into The intelligent terminal of row touch operation, for example, smart phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA) etc., but not limited to this.As it will be easily appreciated by one skilled in the art that the embodiment of the present invention applies also for appointing What is with processor and shows in the mobile terminal of output device.In addition, the technical solution that the embodiment of the present disclosure provides also is applicable in In the terminal with the bio-identifications module such as fingerprint identification module, voiceprint identification module or/and face recognition module.
The embodiment of the present disclosure provides a kind of terminal control method applied in above-mentioned terminal, can be with are as follows: detection user The encrypted message of input, and determine whether the encrypted message of user's input is pre-set first password, if user inputs Password be the first password, then controlling terminal do not executed in the first scheduled duration screen locking operation.The embodiment of the present disclosure is logical Pre-set first password is crossed, terminal is can control and does not execute screen locking operation in the first scheduled duration that no user operates, Facilitate user to check certain contents in terminal in the first scheduled duration, and avoid because may in the first scheduled duration because User occurs the case where the case where screen locking, the unlock terminal of need repeatedly can just check information appearance without operation.
It is a kind of method of terminal control shown according to an exemplary embodiment referring to Fig. 1, Fig. 1, this method can be used for In above-mentioned mobile terminal, comprising the following steps:
In a step 101, the encrypted message of detection user input;
In the embodiment of the present disclosure, it is lit in terminal screen, in the state of screen locking, the message in cipher of detection user's input Breath.Here, the encrypted message of user's input can be the biometric features information such as digital information, fingerprint, head portrait or sound Either gesture information, the embodiment of the present disclosure do not do specific limitation to the type of the encrypted message.
In a step 102, whether the encrypted message for determining user's input is pre-set first password;
In the embodiment of the present disclosure, user can preset first password and be saved by the function setting option of terminal. Here, corresponding function, which is set, in first password is: operation and controlling terminal is decrypted in the first scheduled duration to terminal It will not be by screen locking.Here it is possible to the encrypted message that user inputs be compared with pre-stored first password information, with true Whether the encrypted message for determining user's input is pre-set first password.
In the embodiment of the present disclosure, corresponding function is set in first password: operation is decrypted to terminal, refers to: even if eventually Other passwords (such as pre-set second password) being set are held to be encrypted, in the first password for detecting user's input When, still operation can be decrypted to by the terminal of the second password encryption.
In step 103, if the encrypted message of user's input is first password, controlling terminal is in the first scheduled duration Screen locking operation is not executed inside.
In the embodiment of the present disclosure, the first scheduled duration can be preset according to demand by user.
In the embodiments of the present disclosure, if the encrypted message of user's input is first password, controlling terminal is grasped in no user Screen locking operation is not executed in the first scheduled duration made.
The embodiment of the present disclosure can control terminal and first be made a reservation for what no user operate by pre-set first password Do not executed in duration screen locking operation, facilitate user to check certain contents in terminal in the first scheduled duration, and avoid because Screen locking may occur because user is without operation in the first scheduled duration, need to unlock terminal repeatedly can just check to go out the case where information It is existing.
In the embodiment of the present disclosure, the method for the terminal control can also include:
Determine the second password whether is provided in terminal, wherein second password is for detecting terminal second Screen locking is carried out to the terminal when no user operates in scheduled duration and is encrypted, or receives the screen locking operational order of user's sending When terminal encrypt and screen locking.
Here, user can be arranged above-mentioned second password and be saved by the function setting option of terminal.It determines in terminal Whether it is provided with the second password and can be inquired by function setting option and learns whether user is provided with the second password.
Wherein, the second scheduled duration can be preset according to a human needs by user and save use.
In the embodiment of the present disclosure, under normal circumstances, the first scheduled duration is arranged to be longer than the second scheduled duration.Such as first Scheduled duration is 10 minutes, and the second scheduled duration is 1 minute, and the embodiment of the present disclosure does not do excessive restriction to this.
In the embodiment of the present disclosure, if being provided with second password in terminal, controlling terminal is in the first pre- timing Screen locking operation is not executed in long, so that it may include:
The operation that controlling terminal does not carry out screen locking to terminal in the first scheduled duration that no user operates and encrypts.This Sample, so that it may by the setting of first password, carry out controlling terminal and not execute screen locking in the first scheduled duration that no user operates And by the operation of the second password encryption, user is facilitated to check certain contents in terminal in the first scheduled duration, and avoid because For that encryption screen locking may occur because user is without operation in the first scheduled duration, password need to be inputted repeatedly and carrys out decryption terminal ability The case where checking information appearance.
In the embodiments of the present disclosure, if being provided with second password in terminal, the method for the terminal control can be with Including following operation:
If the encrypted message is not the first password, it is determined that whether the encrypted message is described second close Code;
If the encrypted message is second password, the terminal is decrypted with second password.
In the embodiments of the present disclosure, if being provided with second password in terminal, the method for the terminal control can be with Including following operation:
Controlling terminal executes screen locking and operates and use second password pair after the first scheduled duration that no user operates The terminal is encrypted.
In conclusion the embodiment of the present disclosure can control terminal and operated in no user by pre-set first password The first scheduled duration in do not execute screen locking operation, facilitate user to check certain contents in terminal in the first scheduled duration, And avoid because screen locking may occur because user is without operation in the first scheduled duration, need to unlock terminal repeatedly can just check letter The case where breath, occurs.
Referring to fig. 2, Fig. 2 is a kind of method of terminal control shown according to an exemplary embodiment, and this method is for eventually End, may comprise steps of:
In step 201, pre-operation records the second password of user setting;
Here, user can be arranged the second password by the function setting option of terminal, and terminal record storage this second Password.
Wherein, second password was used for when detecting terminal no user operation in the second scheduled duration to the end Screen locking is carried out to terminal when holding progress screen locking simultaneously to encrypt, or receiving the screen locking operational order of user's sending and is encrypted.
In this way, in the second password of user setting and in the case where open cryptoguard, if detecting terminal No user operates in two scheduled durations, then the operation that terminal can execute screen locking and be encrypted using the second password.Alternatively, connecing When receiving the screen locking instruction of user's transmission, the operation that screen locking is operated and encrypted using the second password is executed.
Wherein, the second scheduled duration can be preset according to a human needs by user and save use.
In step 202, in the state that terminal is screen locking, the encrypted message of detection user's input;
In the embodiment of the present disclosure, it is lit in terminal screen, in the state of screen locking, the message in cipher of detection user's input Breath.Here, the encrypted message of user's input can be the biometric features information such as digital information, fingerprint, head portrait or sound Either gesture information, the embodiment of the present disclosure do not do specific limitation to the type of the encrypted message.
In step 203, whether the encrypted message for determining user's input is pre-set first password;
In the embodiment of the present disclosure, user can preset first password and be saved by the function setting option of terminal. Wherein, corresponding function, which is set, in first password is: operation and controlling terminal is decrypted in the first scheduled duration to terminal It will not be by screen locking.Here it is possible to the encrypted message that user inputs be compared with pre-stored first password information, with true Whether the encrypted message for determining user's input is pre-set first password.
In the embodiment of the present disclosure, corresponding function is set in first password: operation is decrypted to terminal, refers to: even if eventually Other passwords (such as pre-set second password) being set are held to be encrypted, in the first password for detecting user's input When, still operation can be decrypted to by the terminal of the second password encryption.
In the embodiment of the present disclosure, the first scheduled duration can by user according to a human needs and presetting and saving makes With under normal circumstances, the first scheduled duration is arranged to be longer than the second scheduled duration.If the first scheduled duration is 10 minutes, the Two scheduled durations are 1 minute, and the embodiment of the present disclosure does not do excessive restriction to this.
When the encrypted message for determining user's input is pre-set first password, step 204 is executed;
When the encrypted message for determining user's input is not pre-set first password, step 207 is executed;
In step 204, controlling terminal does not carry out screen locking to terminal in the first scheduled duration that no user operates and adds Close operation;
In step 205, it detects whether to reach the first scheduled duration;
If reaching the first scheduled duration, 206 are thened follow the steps;
If not up to the first scheduled duration, continues to execute step 204;
In step 206, controlling terminal executes screen locking and operates and use institute after the first scheduled duration that no user operates The second password is stated to encrypt the terminal
In step 207, whether the encrypted message for determining user's input is the second password;
Here, the encrypted message for the user's input for the encrypted message of user's input being identified, and being will identify that and pre- The second encrypted message first stored compares, to determine whether the encrypted message of user's input is pre-set second close Code.When the encrypted message of user's input is the second password, step 208 is executed;When the encrypted message of user's input is not second When password, step 209 is executed.
In a step 208, the terminal is decrypted with the second password that user inputs.
In step 209, the password of prompt user input is wrong, and returns to step 202.
Technical solution disclosed in the embodiment of the present disclosure can carry out controlling terminal useless by the setting of first password Screen locking is not executed in first scheduled duration of family operation and by the operation of the second password encryption, facilitates user in the first scheduled duration It inside checks certain contents in terminal, and avoids because encryption lock may occur because user is without operation in the first scheduled duration Screen need to input password appearance the case where capable of checking information that carrys out decryption terminal just repeatedly.
It is a kind of method of terminal control shown according to an exemplary embodiment referring to Fig. 3, Fig. 3, this method is for eventually End, may comprise steps of:
In step 301, pre-operation records the terminal screen locking time of user setting;
Here, the screen locking time of terminal can be arranged in user by the function setting option of terminal, such as third scheduled duration.
Wherein, the function that the terminal screen locking time of setting is configured as is: when detecting terminal in third scheduled duration No user operation then executes screen locking operation.
In this way, in the case where the user setting terminal screen locking time, if detecting terminal in third scheduled duration No user operation can then execute screen locking operation.
In step 302, in the state that terminal is screen locking, the encrypted message of detection user's input;
In the embodiment of the present disclosure, it is lit in terminal screen, in the state of screen locking, the message in cipher of detection user's input Breath.Here, the encrypted message of user's input can be the biometric features information such as digital information, fingerprint, head portrait or sound Either gesture information, the embodiment of the present disclosure do not do specific limitation to the type of the encrypted message.
In step 303, whether the encrypted message for determining user's input is pre-set first password;
In the embodiment of the present disclosure, user can preset first password and be saved by the function setting option of terminal. Wherein, corresponding function, which is set, in first password is: operation and controlling terminal is decrypted in the first scheduled duration to terminal It will not be by screen locking;Alternatively, controlling terminal will not be by screen locking in the first scheduled duration.Here it is possible to the password that user is inputted Information is compared with pre-stored first password information, to determine whether the encrypted message of user's input is pre-set First password.
In the embodiment of the present disclosure, corresponding function is set in first password: operation is decrypted to terminal, refers to: even if eventually Other passwords (such as pre-set second password) being set are held to be encrypted, in the first password for detecting user's input When, still operation can be decrypted to by the terminal of the second password encryption.
In the embodiment of the present disclosure, the first scheduled duration can by user according to a human needs and presetting and saving makes With under normal circumstances, the first scheduled duration is arranged to be longer than third scheduled duration.If the first scheduled duration is 8 minutes, third Scheduled duration is 2 minutes, and the embodiment of the present disclosure does not do excessive restriction to this.
When the encrypted message for determining user's input is pre-set first password, step 304 is executed;
When the encrypted message for determining user's input is not pre-set first password, step 307 is executed;
In step 304, controlling terminal does not execute screen locking operation in the first scheduled duration that no user operates;
In step 305, it detects whether to reach the first scheduled duration;
When reaching the first scheduled duration, step 306 is executed;
When not up to the first scheduled duration, step 304 is continued to execute.
Within step 306, controlling terminal executes screen locking operation.
In step 307, the password of prompt user input is wrong, and returns to step 302.
Technical solution disclosed in the embodiment of the present disclosure can control terminal by pre-set first password It does not execute screen locking operation in the first scheduled duration of no user operation, user is facilitated to check in terminal in the first scheduled duration Certain contents, and avoid that end need to be unlocked repeatedly because screen locking may occur because user is without operation in the first scheduled duration The case where end can just check information appearance.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 4 is a kind of block diagram of terminal control mechanism 400 shown according to an exemplary embodiment, the terminal control mechanism 400 being implemented in combination with as some or all of of terminal by software, hardware or both, which can be mobile phone Or the electronic display units such as tablet computer.The terminal control mechanism 400 may include:
Information detecting module 401 can be configured as the encrypted message of detection user's input;
First determining module 402 can be configured as and determine whether the encrypted message is pre-set first password;
Control module 403, if can be configured as the encrypted message is the first password, controlling terminal is Screen locking operation is not executed in one scheduled duration.
In one embodiment, control module 403 can be specifically configured to controlling terminal is operated in no user first Screen locking operation is not executed in scheduled duration.
The embodiment of the present disclosure can control terminal and first be made a reservation for what no user operate by pre-set first password Do not executed in duration screen locking operation, facilitate user to check certain contents in terminal in the first scheduled duration, and avoid because Screen locking may occur because user is without operation in the first scheduled duration, need to unlock terminal repeatedly can just check to go out the case where information It is existing.
Referring to Fig. 5, terminal control mechanism 400 as shown in Figure 4 can also include:
Second determining module 404, can be configured as and whether be provided with the second password in determining terminal, wherein described Two passwords are used to carry out screen locking to the terminal when detecting terminal no user operation in the second scheduled duration and encrypt, or Terminal is encrypted when receiving the screen locking operational order of user's sending.
In one embodiment, control module 403 are provided with second password if can be configured as in terminal, The operation that controlling terminal does not carry out screen locking to terminal in the first scheduled duration that no user operates and encrypts.
Referring to Fig. 6, terminal control mechanism 400 as shown in Figure 5 can also include:
Third determining module 405, if being configured as being provided with second password in terminal, if the encrypted message It is not the first password, it is determined that whether the encrypted message is second password;
Deciphering module 406, if can be configured as the encrypted message is second password, with second password The terminal is decrypted.
Referring to Fig. 7, terminal control mechanism 400 as shown in Figure 4 can also include:
Encrypting module 407 is provided with second password if can be configured as in terminal, controlling terminal is in no user After first scheduled duration of operation, executes screen locking and operate and second password is used to encrypt the terminal.
In one embodiment, information detecting module 401 can be configured as in screen lock state, detect user's input Encrypted message.
In the embodiment of the present disclosure, first scheduled duration is greater than second scheduled duration.
Technical solution disclosed in the embodiment of the present disclosure can carry out controlling terminal useless by the setting of first password Screen locking is not executed in first scheduled duration of family operation and by the operation of the second password encryption, facilitates user in the first scheduled duration It inside checks certain contents in terminal, and avoids because encryption lock may occur because user is without operation in the first scheduled duration Screen need to input password appearance the case where capable of checking information that carrys out decryption terminal just repeatedly.
, can be by pre-set first password in conclusion technical solution disclosed in the embodiment of the present disclosure, it can be with Controlling terminal does not execute screen locking operation in the first scheduled duration that no user operates, and user is facilitated to look into the first scheduled duration It sees certain contents in terminal, and avoids needing anti-because screen locking may occur because user is without operation in the first scheduled duration The case where unlock terminal can just check information again appearance.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Referring to FIG. 8, it illustrates a kind of block diagrams for terminal control mechanism 500 shown in an exemplary embodiment. For example, device 500 can be the electronic display units such as mobile phone or tablet computer.
Referring to Fig. 8, device 500 may include following one or more components: processing component 502, memory 504, power supply Component 506, multimedia component 508, audio component 510, input/output (I/O) interface 512, sensor module 514, Yi Jitong Believe component 516.
The integrated operation of the usual control device 500 of processing component 502, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing component 502 may include that one or more processors 320 refer to execute It enables, to complete all or part of the steps of above-mentioned terminal control method.In addition, processing component 502 may include one or more Module, convenient for the interaction between processing component 502 and other assemblies.For example, processing component 502 may include multi-media module, To facilitate the interaction between multimedia component 508 and processing component 502.
Memory 504 is configured as storing various types of data to support operation on device 500.These data Example includes the instruction for any application or method that operate on device 500, contact data, telephone book data, message, Picture, video etc..Memory 504 can be real by any kind of volatibility or non-volatile memory device or their combination Existing, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable is only It reads memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic Disk or CD.
Power supply module 506 provides electric power for the various assemblies of device 500.Power supply module 506 may include power management system System, one or more power supplys and other with for device 500 generate, manage, and distribute the associated component of electric power.
Multimedia component 508 includes the screen of one output interface of offer between device 500 and user.In some realities It applies in example, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can To be implemented as touch screen, to receive input signal from the user.Touch panel include one or more touch sensors with Sense the gesture on touch, slide, and touch panel.Touch sensor can not only sense the boundary of a touch or slide action, and And also detect duration and pressure relevant to touch or slide.In some embodiments, multimedia component 508 includes One front camera and/or rear camera.It is such as in a shooting mode or a video mode, preceding when device 500 is in operation mode It sets camera and/or rear camera can receive external multi-medium data.Each front camera and rear camera can Be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 510 is configured as output and/or input audio signal.For example, audio component 510 includes a Mike Wind (MIC), when device 500 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched It is set to reception external audio signal.The received audio signal can be further stored in memory 504 or via communication set Part 516 is sent.In some embodiments, audio component 510 further includes a loudspeaker, is used for output audio signal.
I/O interface 512 provides interface between processing component 502 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 514 includes one or more sensors, and the state for providing various aspects for device 500 is commented Estimate.For example, sensor module 514 can detecte the state that opens/closes of device 500, the relative positioning of component, such as component For the display and keypad of device 500, sensor module 514 can be with the position of 500 1 components of detection device 500 or device Set change, the existence or non-existence that user contacts with device 500, the temperature in 500 orientation of device or acceleration/deceleration and device 500 Variation.Sensor module 514 may include proximity sensor, be configured to detect without any physical contact near The presence of object.Sensor module 514 can also include optical sensor, such as CMOS or ccd image sensor, for answering in imaging With middle use.In some embodiments, which can also include acceleration transducer, gyro sensor, magnetic Sensor, pressure sensor or temperature sensor.
Communication component 516 is configured to facilitate the communication of wired or wireless way between device 500 and other equipment.Device 500 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 516 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, communication component 516 further includes near-field communication (NFC) module, to promote short range communication.For example, Radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, bluetooth can be based in NFC module (BT) technology and other technologies are realized.
In the exemplary embodiment, device 500 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing above-mentioned display interface switching Method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 504 of instruction, above-metioned instruction can be executed by the processor 420 of device 500 to complete above-mentioned terminal control side Method.For example, non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, Floppy disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of device 500 When row, so that device 500 is able to carry out above-mentioned terminal control method.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (17)

1.一种终端控制方法,其特征在于,所述方法包括:1. A terminal control method, wherein the method comprises: 检测用户输入的密码信息;Detect the password information entered by the user; 确定所述密码信息是否为预先设置的第一密码;determining whether the password information is a preset first password; 如果所述密码信息是所述第一密码,则控制终端在第一预定时长内不执行锁屏操作;If the password information is the first password, controlling the terminal not to perform a screen-locking operation within a first predetermined period of time; 所述第一密码用于在被第二密码加密的终端检测到用户输入的所述第一密码时,对被所述第二密码加密的终端进行解密操作,所述第二密码用于在检测到终端在第二预定时长内无用户操作时对所述终端进行锁屏并加密,或接收到用户发出的锁屏操作指令时对终端进行加密。The first password is used to decrypt the terminal encrypted by the second password when the terminal encrypted by the second password detects the first password input by the user, and the second password is used for detecting the first password. The terminal locks the screen and encrypts the terminal when there is no user operation within the second predetermined period of time, or encrypts the terminal when receiving a screen lock operation instruction sent by the user. 2.根据权利要求1所述的方法,其特征在于,所述控制终端在第一预定时长内不执行锁屏操作包括:2 . The method according to claim 1 , wherein the controlling the terminal not to perform a screen-locking operation within a first predetermined period of time comprises: 2 . 控制终端在无用户操作的第一预定时长内不执行锁屏操作。The control terminal does not perform a screen-locking operation within a first predetermined period of time when there is no user operation. 3.根据权利要求1所述的方法,其特征在于,所述方法还包括:3. The method according to claim 1, wherein the method further comprises: 确定终端中是否设置有第二密码。Determine if a second password is set in the terminal. 4.根据权利要求3所述的方法,其特征在于,如果终端中设置有所述第二密码,所述控制终端在第一预定时长内不执行锁屏操作,包括:4. The method according to claim 3, wherein if the second password is set in the terminal, the controlling the terminal not to perform a screen-locking operation within a first predetermined period of time, comprising: 控制终端在无用户操作的第一预定时长内不对终端进行锁屏并加密的操作。The control terminal does not perform an operation of locking the screen and encrypting the terminal within a first predetermined period of time when there is no user operation. 5.根据权利要求3所述的方法,其特征在于,如果终端中设置有所述第二密码,所述方法还包括:5. The method according to claim 3, wherein, if the second password is set in the terminal, the method further comprises: 如果所述密码信息不是所述第一密码,则确定所述密码信息是否为所述第二密码;If the password information is not the first password, determining whether the password information is the second password; 如果所述密码信息是所述第二密码,用所述第二密码对所述终端进行解密。If the password information is the second password, decrypt the terminal using the second password. 6.根据权利要求3所述的方法,其特征在于,如果终端中设置有所述第二密码,所述方法还包括:6. The method according to claim 3, wherein, if the second password is set in the terminal, the method further comprises: 控制终端在无用户操作的第一预定时长后,执行锁屏操作并采用所述第二密码对所述终端进行加密。The control terminal performs a screen lock operation and encrypts the terminal by using the second password after a first predetermined period of time without user operation. 7.根据权利要求1至6任一项所述的方法,其特征在于,所述检测用户输入的密码信息包括:7. The method according to any one of claims 1 to 6, wherein the detecting the password information input by the user comprises: 在锁屏状态,检测用户输入的密码信息。In the locked screen state, the password information entered by the user is detected. 8.根据权利要求3所述的方法,其特征在于,所述第一预定时长大于所述第二预定时长。8. The method of claim 3, wherein the first predetermined time period is greater than the second predetermined time period. 9.一种终端控制装置,其特征在于,所述装置包括:9. A terminal control device, wherein the device comprises: 信息检测模块,被配置为检测用户输入的密码信息;an information detection module, configured to detect the password information input by the user; 第一确定模块,被配置为确定所述密码信息是否为预先设置的第一密码;a first determining module, configured to determine whether the password information is a preset first password; 控制模块,被配置为如果所述密码信息是所述第一密码,则控制终端在第一预定时长内不执行锁屏操作;a control module, configured to control the terminal not to perform a screen-locking operation within a first predetermined period of time if the password information is the first password; 所述第一密码用于在被第二密码加密的终端检测到用户输入的所述第一密码时,对被所述第二密码加密的终端进行解密操作,所述第二密码用于在检测到终端在第二预定时长内无用户操作时对所述终端进行锁屏并加密,或接收到用户发出的锁屏操作指令时对终端进行加密。The first password is used to decrypt the terminal encrypted by the second password when the terminal encrypted by the second password detects the first password input by the user, and the second password is used for detecting the first password. The terminal locks the screen and encrypts the terminal when there is no user operation within the second predetermined period of time, or encrypts the terminal when receiving a screen lock operation instruction sent by the user. 10.根据权利要求9所述的装置,其特征在于,所述控制模块,被配置为控制终端在无用户操作的第一预定时长内不执行锁屏操作。10 . The apparatus according to claim 9 , wherein the control module is configured to control the terminal not to perform a screen-locking operation within a first predetermined period of time when there is no user operation. 11 . 11.根据权利要求9所述的装置,其特征在于,所述装置还包括:11. The apparatus of claim 9, wherein the apparatus further comprises: 第二确定模块,被配置为确定终端中是否设置有第二密码。The second determination module is configured to determine whether a second password is set in the terminal. 12.根据权利要求11所述的装置,其特征在于,所述控制模块,被配置为如果终端中设置有所述第二密码,控制终端在无用户操作的第一预定时长内不对终端进行锁屏并加密的操作。12. The apparatus according to claim 11, wherein the control module is configured to, if the second password is set in the terminal, control the terminal not to lock the terminal within a first predetermined period of time without user operation screen and encrypted operation. 13.根据权利要求11所述的装置,其特征在于,所述装置还包括:13. The apparatus of claim 11, wherein the apparatus further comprises: 第三确定模块,被配置为如果终端中设置有所述第二密码,如果所述密码信息不是所述第一密码,则确定所述密码信息是否为所述第二密码;a third determining module, configured to determine whether the password information is the second password if the second password is set in the terminal and if the password information is not the first password; 解密模块,被配置为如果所述密码信息是所述第二密码,用所述第二密码对所述终端进行解密。A decryption module configured to decrypt the terminal with the second password if the password information is the second password. 14.根据权利要求11所述的装置,其特征在于,所述装置还包括:14. The apparatus of claim 11, wherein the apparatus further comprises: 加密模块,被配置为如果终端中设置有所述第二密码,控制终端在无用户操作的第一预定时长后,执行锁屏操作并采用所述第二密码对所述终端进行加密。The encryption module is configured to, if the second password is set in the terminal, control the terminal to perform a screen lock operation and encrypt the terminal by using the second password after a first predetermined period of time without user operation. 15.根据权利要求9至14任一项所述的装置,其特征在于,所述信息检测模块,被配置为在锁屏状态,检测用户输入的密码信息。15. The device according to any one of claims 9 to 14, wherein the information detection module is configured to detect the password information input by the user in a locked screen state. 16.根据权利要求11所述的装置,其特征在于,所述第一预定时长大于所述第二预定时长。16. The apparatus of claim 11, wherein the first predetermined time period is greater than the second predetermined time period. 17.一种终端控制装置,其特征在于,所述装置包括:17. A terminal control device, wherein the device comprises: 处理器;processor; 用于存储所述处理器的可执行指令的存储器;memory for storing executable instructions for the processor; 其中,所述处理器被配置为:wherein the processor is configured to: 检测用户输入的密码信息;Detect the password information entered by the user; 确定所述密码信息是否为预先设置的第一密码;determining whether the password information is a preset first password; 如果所述密码信息是所述第一密码,则控制终端在第一预定时长内不执行锁屏操作;If the password information is the first password, controlling the terminal not to perform a screen-locking operation within a first predetermined period of time; 所述第一密码用于在被第二密码加密的终端检测到用户输入的所述第一密码时,对被所述第二密码加密的终端进行解密操作,所述第二密码用于在检测到终端在第二预定时长内无用户操作时对所述终端进行锁屏并加密,或接收到用户发出的锁屏操作指令时对终端进行加密。The first password is used to decrypt the terminal encrypted by the second password when the terminal encrypted by the second password detects the first password input by the user, and the second password is used for detecting the first password. The terminal locks the screen and encrypts the terminal when there is no user operation within the second predetermined period of time, or encrypts the terminal when receiving a screen lock operation instruction sent by the user.
CN201610657863.5A 2016-08-11 2016-08-11 Method and device for terminal control Active CN106295279B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610657863.5A CN106295279B (en) 2016-08-11 2016-08-11 Method and device for terminal control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610657863.5A CN106295279B (en) 2016-08-11 2016-08-11 Method and device for terminal control

Publications (2)

Publication Number Publication Date
CN106295279A CN106295279A (en) 2017-01-04
CN106295279B true CN106295279B (en) 2019-05-10

Family

ID=57668912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610657863.5A Active CN106295279B (en) 2016-08-11 2016-08-11 Method and device for terminal control

Country Status (1)

Country Link
CN (1) CN106295279B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108897476A (en) * 2018-06-12 2018-11-27 平安科技(深圳)有限公司 screen locking method and device and computer readable storage medium
CN113032849B (en) * 2021-03-29 2025-09-02 北京小米移动软件有限公司 Data protection method, device, terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103677551A (en) * 2012-09-11 2014-03-26 联想(北京)有限公司 Information processing method and electronic device
CN104820564A (en) * 2015-05-07 2015-08-05 网易(杭州)网络有限公司 User terminal, status switching method thereof, status switching device, game control method and game control device
CN104915582A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Unlocking method and unlocking device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150010258A (en) * 2013-07-18 2015-01-28 엘지전자 주식회사 Method for time based locking with easy release screen locking and terminal therefor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103677551A (en) * 2012-09-11 2014-03-26 联想(北京)有限公司 Information processing method and electronic device
CN104820564A (en) * 2015-05-07 2015-08-05 网易(杭州)网络有限公司 User terminal, status switching method thereof, status switching device, game control method and game control device
CN104915582A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Unlocking method and unlocking device

Also Published As

Publication number Publication date
CN106295279A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN104219058B (en) Authentication, identification authorization method and device
CN104765552B (en) Authority management method and device
CN103916233B (en) A kind of information ciphering method and device
EP3242195B1 (en) Control implementation method and apparatus for intelligent hardware device
CN104376239B (en) The unlocking method and a device of terminal
CN104391635A (en) Device and method for unlocking screen
CN102880560A (en) User privacy data protection method and mobile terminal using user privacy data protection method
CN104573550A (en) Method and device for protecting data
CN104703031A (en) Smart television control method and device
WO2021017141A1 (en) Access control method and apparatus, and medium
CN104331228A (en) Screen locking method and device
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN106682463A (en) Unlocking method and device
CN105677214A (en) Application management method and apparatus
CN106485127A (en) The control method of electronic equipment, device, electronic equipment and system
CN108319832A (en) Unlocking method and device
CN106909827A (en) Using account management method and device
CN106557679A (en) Terminal control method and device
CN105893854B (en) Encryption and decryption method and device
CN105046127A (en) Encryption and decryption implementation method and device
CN105468343A (en) Application control method and apparatus
CN106789070A (en) The decryption method of data, device and terminal
CN107743063A (en) Data processing method and device
CN106295279B (en) Method and device for terminal control
CN103916471A (en) Information display method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant