CN107194230A - A kind of method and apparatus of computer management - Google Patents
A kind of method and apparatus of computer management Download PDFInfo
- Publication number
- CN107194230A CN107194230A CN201710379921.7A CN201710379921A CN107194230A CN 107194230 A CN107194230 A CN 107194230A CN 201710379921 A CN201710379921 A CN 201710379921A CN 107194230 A CN107194230 A CN 107194230A
- Authority
- CN
- China
- Prior art keywords
- identity information
- information
- computer system
- computer
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The embodiment of the invention discloses a kind of method and apparatus of computer management, by obtaining the facial image that camera is gathered, corresponding target signature information is extracted from the facial image;The corresponding relation of characteristic information and identity information is previously stored with computer systems, by the way that target signature information is matched with characteristic information, it can be determined that go out the identity information belonging to target signature information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;When identity information belongs to the Equations of The Second Kind identity information, then the control operation prestored is performed when computer system is run.It can be seen that, the facial image of collection is dependent on, the identity to user is identified, so that according to the operation of the identity information control computer system, realize computer system and carry out intelligentized control management for the identity of user, effective control can be carried out to teen-age internet behavior.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of method and apparatus of computer management.
Background technology
The development of internet so that our life is more rich and varied, after computer networking, we can be by calculating
Machine finds required data.And internet resource enriches, and people can chat on line, play game, see video etc..Network pair
Our life generates deep effect, and its popularity rate is growing.But it is following the problem of it is also increasingly severe,
Teenager, which often indulges in online game, to extricate oneself, and lose time, or even neglects one's studies.
In traditional approach, the log into thr computer system by the way of input password, using this kind of mode, computer system without
Method identifies the identity of user, namely it is adult or child that can not determine user.And existing computer operation
System bottom does not support computer using duration, access program, accesses and be controlled in webpage and content.User inputs
Just it can use computer, for teenager, computer is often used for a long time after password, cause under eyesight
Drop, some teenagers, which indulge in networking game, to extricate oneself.And teenager lacks cognitive judgement, may access some bad
Flame on website, network, often brings harmful effect to teen-age physical and mental health.
If computer system is capable of the identity of automatic identification user, the identity for user carries out intelligentized control
Tubulation is managed, the problem of effectively can solving mentioned above.
It can be seen that, how to cause computer system to carry out intelligentized control management for the identity of user, be this area
Technical staff's urgent problem to be solved.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method and apparatus of computer management, can cause computer system
Identity for user carries out intelligentized control management.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of method of computer management, including:
The facial image of camera collection is obtained, and extracts from the facial image corresponding target signature information;
The target signature information is matched with the characteristic information prestored, the target signature information is judged
Affiliated identity information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;
If the identity information belongs to the Equations of The Second Kind identity information, perform and prestore when computer system is run
Control operation.
Optionally, the control operation prestored that performed when computer system is run includes:
Judge whether the run time of the computer system exceedes preset time;
If exceeding, computer is subjected to shutdown processing.
Optionally, the control operation prestored that performed when computer system is run includes:
Judge whether the games of the computer system operation belong to default and forbid game;
If so, then forbidding the computer system to run the games.
Optionally, the control operation prestored that performed when computer system is run includes:
Judge whether the network address of the computer system accesses belongs to default and forbid accessing network address;
If so, then forbidding network address described in the computer system accesses.
Optionally, in addition to:
The facial image that the camera is gathered is analyzed and processed, user and computer screen is got
Distance and user attitude information, when the distance be less than predetermined threshold value and/or when the attitude information do not meet it is default
During condition, then alarm is carried out.
The embodiment of the present invention additionally provides a kind of device of computer management, including acquiring unit, extraction unit, judgement list
Member and execution unit:
The acquiring unit, the facial image for obtaining camera collection;
The extraction unit, for extracting corresponding target signature information from the facial image;
The judging unit, for the target signature information to be matched with the characteristic information prestored, judges
Go out the identity information belonging to the target signature information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity
Information;
If the identity information belongs to the Equations of The Second Kind identity information, the execution unit is triggered, the execution unit,
For performing the control operation prestored when computer system is run.
Optionally, when the execution unit is specifically for judging whether the run time of the computer system exceedes default
Between;
If exceeding, computer is subjected to shutdown processing.
Optionally, the execution unit is specifically for judging whether the games of the computer system operation belong to pre-
If forbid game;
If so, then forbidding the computer system to run the games.
Optionally, the execution unit is specifically for judging whether the network address of the computer system accesses belongs to default
Forbid the network address accessed;
If so, then forbidding network address described in the computer system accesses.
Optionally, in addition to Tip element,
The Tip element, for being analyzed and processed to the facial image that the camera is gathered, getting makes
The attitude information of the distance and user of user and computer screen, when the distance is less than predetermined threshold value and/or when described
When attitude information does not meet preparatory condition, then alarm is carried out.
By obtaining the facial image that camera is gathered it can be seen from above-mentioned technical proposal, carried from the facial image
Take out corresponding target signature information;The corresponding relation of characteristic information and identity information is previously stored with computer systems,
By the way that the target signature information is matched with the characteristic information prestored, it can be determined that go out the target signature information
Affiliated identity information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;When the identity information
Belong to the Equations of The Second Kind identity information, then the control operation prestored is performed when computer system is run.It can be seen that, it is dependent on
The facial image of collection, the identity to user is identified, so that according to the operation of the identity information control computer system,
Realize computer system and carry out intelligentized control management for the identity of user, teen-age internet behavior can be entered
The effective control of row.
Brief description of the drawings
In order to illustrate the embodiments of the present invention more clearly, the required accompanying drawing used in embodiment will be done simply below
Introduce, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ordinary skill people
For member, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the method for computer management provided in an embodiment of the present invention;
Fig. 2 is a kind of structural representation of the device of computer management provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this
Embodiment in invention, those of ordinary skill in the art are not under the premise of creative work is made, and what is obtained is every other
Embodiment, belongs to the scope of the present invention.
In order that those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.
Next, a kind of method for computer management that the embodiment of the present invention is provided is discussed in detail.Fig. 1 is real for the present invention
A kind of flow chart of the method for computer management of example offer is applied, this method includes:
S101:The facial image of camera collection is obtained, and extracts from the facial image corresponding target signature
Information.
S102:The target signature information is matched with the characteristic information prestored, judges that the target is special
Identity information belonging to reference breath.
In embodiments of the present invention, user is worked as the condition of log into thr computer system using the characteristic information of face
When restarting computer or opening computer, traditional code entry frame will be replaced by recognition of face frame, in the specific implementation, can
Code entry frame and recognition of face frame are realized with the gina interfaces, the Credential Providers interfaces that are provided using Microsoft
Conversion.
By taking one family as an example, the face characteristic information of each member in family can be shifted to an earlier date input computer system
In, i.e., these characteristic informations are pre-stored within computer system, in order to realize according to face characteristic information log into thr computer system
System, can permanently be bundled these face characteristic informations with password.When can be looked into the characteristic information prestored
When finding characteristic information same or analogous with target signature information, user just can be with log into thr computer system.
It is identified for the ease of the identity to user, correspondence can be set for each characteristic information prestored
Identity information.Wherein, identity information can include first kind identity information and Equations of The Second Kind identity information.
First kind identity information need not carry out the identity of relevant control when can be and use computer, i.e., with the first kind
The user of identity information can normally use computer.Equations of The Second Kind identity information needs to carry out phase when can be using computer
The identity of control is closed, i.e., the user with Equations of The Second Kind identity information can be restricted when using computer.For example, at one
In family, in order to which the internet behavior to child is controlled, parent can be set to first kind identity information, i.e., by parent's
Face characteristic information correspondence first kind identity information;Child is set to Equations of The Second Kind identity information, i.e., by the face characteristic of child
Information correspondence Equations of The Second Kind identity information.
S103:If the identity information belongs to Equations of The Second Kind identity information, perform and deposit in advance when computer system is run
The control operation of storage.
Control operation can be bound with Equations of The Second Kind identity information in embodiments of the present invention, when determining user
When belonging to Equations of The Second Kind identity information, it just can start the control operation prestored, so as to the online row to the user
Effectively to be controlled.
Wherein the control operation can be configured according to actual conditions, for example, can enter to the surf time of user
Row control.When judging that user belongs to Equations of The Second Kind identity information, it just can start the control operation, judge computer system
Run time whether exceed preset time;If exceeding, computer is subjected to shutdown processing.
Wherein, the length of preset time can be set according to demand, for example, it is small preset time can be set into 3
When, timing is carried out when being brought into operation from computer system, when reach 3 it is small when after, just can trigger automatic shutdown program, will calculate
Machine-operated machine.
Limited by the run time to computer system, can effectively control user continuously for a long time using meter
Calculation machine, alleviates the eye strain of user.
The situation that user indulges in online game is directed to, the game installed on computer can be defined, when
It when judging that user belongs to Equations of The Second Kind identity information, just can start the control operation, judge the trip of computer system operation
Whether play program, which belongs to default, is forbidden game;If so, then forbidding the computer system to run the games.
By taking the computer that one family is used as an example, parent can be directed to the game installed on computer and be selected,
By some Game Settings to forbid game, to prevent child from playing such game.
In view of the diversification of the network information, wherein being no lack of some unsound network informations, especially for teenager
For, often lack the judgement to information, some unhealthy webpages may be browsed, or download by surfing the Net trip
Play etc., can be limited the network address of computer system accesses this, when judging that user belongs to Equations of The Second Kind identity information
When, it just can start the control operation, judge whether the network address of the computer system accesses belongs to default and forbid accessing net
Location;If so, then forbidding network address described in the computer system accesses.
In the introduction above, the log into thr computer system by way of recognition of face.The face gathered in view of camera
Image, may be influenceed to cause recognition failures by factors such as illumination, hairs, for this kind of situation, can set corresponding conversion
Function, code entry frame is converted to by recognition of face video frame.Specifically, corresponding shortcut can be set, in department of computer science
The translation function of the specific shortcut of selection and login frame is bound in advance in system.After recognition of face failure, user can be with
By by the specific shortcut on lower keyboard, such as " Shift+Ctrl+Alt ", so as to recognition of face video frame is converted to close
Code landing frame, input password can log into thr computer system.By this kind of mode, it can fully ensure that user smoothly logs in calculating
Machine system.
By obtaining the facial image that camera is gathered it can be seen from above-mentioned technical proposal, carried from the facial image
Take out corresponding target signature information;The corresponding relation of characteristic information and identity information is previously stored with computer systems,
By the way that the target signature information is matched with the characteristic information prestored, it can be determined that go out the target signature information
Affiliated identity information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;When the identity information
Belong to the Equations of The Second Kind identity information, then the control operation prestored is performed when computer system is run.It can be seen that, it is dependent on
The facial image of collection, the identity to user is identified, so that according to the operation of the identity information control computer system,
Realize computer system and carry out intelligentized control management for the identity of user, teen-age internet behavior can be entered
The effective control of row.
The identity of user can be identified, and be controlled accordingly when it is using computer in the introduction above
Management, in addition, can also analyze and process to the facial image that camera is gathered, get user and calculating
The distance of machine screen and the attitude information of user, when the distance be less than predetermined threshold value and/or when the attitude information not
When meeting preparatory condition, then alarm is carried out.
Predetermined threshold value can be user's distance calculation screen, and the concrete numerical value of the predetermined threshold value can be according to calculating
Situations such as size of machine screen, eyesight of user, reasonably set, do not limited herein.For example, can be by default threshold
Value is set to 60 centimetres.
Camera is typically secured on computer, the size according to face in facial image, it can be determined that go out user with
The distance of computer screen.
When user's distance calculation screen is too near, eyes can be caused with damage, affected one's power of vision when serious, by judging
User and the distance of computer screen, can effectively remind the distance of user and screen, so as to protect to a certain extent
The eyes of user.
By the analysis to facial image, the attitude information of user can also be got.Preparatory condition can be reflection
The information of the correct posture of user.
When the attitude information of user does not meet the preparatory condition, then it can illustrate that the posture of user is incorrect, example
Such as, there are the actions such as wryneck, support chin in user.By alarm user can be reminded to adjust sitting posture in time.
Wherein, alarm can be the one section of voice messaging stored in computer system an either snatch of music
Deng not limiting its concrete form.The purpose of alarm is in order to remind user, in order to which user is timely
Adjust incorrect posture, distance of distance calculation screen etc..
It should be noted that being entered in above-mentioned introduction with the first identity information and the second identity information to the identity of user
Row classification, in addition can also according to the quantity of user, need limitation content for being carried out to it etc., the identity to user is carried out
More careful division.
Fig. 2 is a kind of structural representation of the device of computer management provided in an embodiment of the present invention, including acquiring unit
21st, extraction unit 22, judging unit 23 and execution unit 24:
The acquiring unit 21, the facial image for obtaining camera collection.
The extraction unit 22, for extracting corresponding target signature information from the facial image.
The judging unit 23, for the target signature information to be matched with the characteristic information prestored, sentences
Break and identity information belonging to the target signature information;Wherein, identity information includes first kind identity information and Equations of The Second Kind body
Part information.
If the identity information belongs to the Equations of The Second Kind identity information, the execution unit 24 is triggered, it is described to perform list
Member 24, for performing the control operation prestored when computer system is run.
Optionally, when the execution unit is specifically for judging whether the run time of the computer system exceedes default
Between;
If exceeding, computer is subjected to shutdown processing.
Optionally, the execution unit is specifically for judging whether the games of the computer system operation belong to pre-
If forbid game;
If so, then forbidding the computer system to run the games.
Optionally, the execution unit is specifically for judging whether the network address of the computer system accesses belongs to default
Forbid the network address accessed;
If so, then forbidding network address described in the computer system accesses.
Optionally, in addition to Tip element,
The Tip element, for being analyzed and processed to the facial image that the camera is gathered, getting makes
The attitude information of the distance and user of user and computer screen, when the distance is less than predetermined threshold value and/or when described
When attitude information does not meet preparatory condition, then alarm is carried out.
The explanation of feature may refer to the related description of embodiment corresponding to Fig. 1 in embodiment corresponding to Fig. 2, here no longer
Repeat one by one.
Acquiring unit can get facial image using the collection of camera it can be seen from above-mentioned technical proposal, carry
Unit is taken to extract corresponding target signature information from facial image;Feature letter is previously stored with computer systems
The corresponding relation of breath and identity information, judging unit is by the way that the target signature information and the characteristic information prestored are carried out
Matching, it can be determined that go out the identity information belonging to the target signature information;Wherein, identity information includes first kind identity information
With Equations of The Second Kind identity information;When the identity information belongs to the Equations of The Second Kind identity information, then execution unit is triggered in computer
The control operation prestored is performed during system operation.It can be seen that, the facial image of collection is dependent on, the identity to user is carried out
Identification, so as to according to the operation of the identity information control computer system, realize the identity that computer system is directed to user
Intelligentized control management is carried out, effective control can be carried out to teen-age internet behavior.
A kind of method and apparatus of the computer management provided above the embodiment of the present invention is described in detail.Say
Each embodiment is described by the way of progressive in bright book, and what each embodiment was stressed is the difference with other embodiment
Between part, each embodiment identical similar portion mutually referring to.For device disclosed in embodiment, due to its with
Method is corresponding disclosed in embodiment, so description is fairly simple, related part is referring to method part illustration.It should refer to
Go out, for those skilled in the art, under the premise without departing from the principles of the invention, can also be to the present invention
Some improvement and modification are carried out, these are improved and modification is also fallen into the protection domain of the claims in the present invention.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description
And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software, generally describes the composition and step of each example according to function in the above description.These
Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty
Technical staff can realize described function to each specific application using distinct methods, but this realization should not
Think beyond the scope of this invention.
Directly it can be held with reference to the step of the method or algorithm that the embodiments described herein is described with hardware, processor
Capable software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Claims (10)
1. a kind of method of computer management, it is characterised in that including:
The facial image of camera collection is obtained, and extracts from the facial image corresponding target signature information;
The target signature information is matched with the characteristic information prestored, judged belonging to the target signature information
Identity information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;
If the identity information belongs to the Equations of The Second Kind identity information, the control prestored is performed when computer system is run
System operation.
2. according to the method described in claim 1, it is characterised in that described to perform what is prestored when computer system is run
Control operation includes:
Judge whether the run time of the computer system exceedes preset time;
If exceeding, computer is subjected to shutdown processing.
3. method according to claim 2, it is characterised in that described to perform what is prestored when computer system is run
Control operation includes:
Judge whether the games of the computer system operation belong to default and forbid game;
If so, then forbidding the computer system to run the games.
4. method according to claim 3, it is characterised in that described to perform what is prestored when computer system is run
Control operation includes:
Judge whether the network address of the computer system accesses belongs to default and forbid accessing network address;
If so, then forbidding network address described in the computer system accesses.
5. the method according to claim 1-4 any one, it is characterised in that also include:
The facial image that the camera is gathered is analyzed and processed, the distance of user and computer screen is got
And the attitude information of user, when the distance is less than predetermined threshold value and/or when the attitude information does not meet preparatory condition
When, then carry out alarm.
6. a kind of device of computer management, it is characterised in that including acquiring unit, extraction unit, judging unit and perform list
Member:
The acquiring unit, the facial image for obtaining camera collection;
The extraction unit, for extracting corresponding target signature information from the facial image;
The judging unit, for the target signature information to be matched with the characteristic information prestored, judges institute
State the identity information belonging to target signature information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;
If the identity information belongs to the Equations of The Second Kind identity information, the execution unit is triggered, the execution unit is used for
The control operation prestored is performed when computer system is run.
7. device according to claim 6, it is characterised in that the execution unit is specifically for judging the department of computer science
Whether the run time of system exceedes preset time;
If exceeding, computer is subjected to shutdown processing.
8. device according to claim 7, it is characterised in that the execution unit is specifically for judging the department of computer science
Whether the games of system operation, which belong to default, is forbidden game;
If so, then forbidding the computer system to run the games.
9. device according to claim 8, it is characterised in that the execution unit is specifically for judging the department of computer science
Whether the network address that system is accessed belongs to the default network address for forbidding accessing;
If so, then forbidding network address described in the computer system accesses.
10. the device according to claim 6-9 any one, it is characterised in that also including Tip element,
The Tip element, for being analyzed and processed to the facial image that the camera is gathered, gets user
With the distance and the attitude information of user of computer screen, when the distance is less than predetermined threshold value and/or when the posture
When information does not meet preparatory condition, then alarm is carried out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710379921.7A CN107194230A (en) | 2017-05-25 | 2017-05-25 | A kind of method and apparatus of computer management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710379921.7A CN107194230A (en) | 2017-05-25 | 2017-05-25 | A kind of method and apparatus of computer management |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107194230A true CN107194230A (en) | 2017-09-22 |
Family
ID=59875425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710379921.7A Pending CN107194230A (en) | 2017-05-25 | 2017-05-25 | A kind of method and apparatus of computer management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107194230A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108830066A (en) * | 2018-06-20 | 2018-11-16 | 平安科技(深圳)有限公司 | Application control method and apparatus and computer readable storage medium in terminal |
CN110737880A (en) * | 2019-10-12 | 2020-01-31 | 国网新疆电力有限公司伊犁供电公司 | Computer control device and control method for fast office |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104320708A (en) * | 2014-10-14 | 2015-01-28 | 小米科技有限责任公司 | User right handling method and device of smart television |
CN104407963A (en) * | 2014-11-10 | 2015-03-11 | 集怡嘉数码科技(深圳)有限公司 | Distance control method and terminal device |
US20160057137A9 (en) * | 2001-08-21 | 2016-02-25 | Bookit Oy Ajanvarauspalvelu | Multi-factor authentication techniques |
CN105448053A (en) * | 2015-12-02 | 2016-03-30 | 广东小天才科技有限公司 | Posture prompting method and system |
CN105827704A (en) * | 2016-03-22 | 2016-08-03 | 乐视网信息技术(北京)股份有限公司 | Account management method and device |
CN106650365A (en) * | 2016-09-29 | 2017-05-10 | 珠海格力电器股份有限公司 | Method and device for starting different working modes |
-
2017
- 2017-05-25 CN CN201710379921.7A patent/CN107194230A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160057137A9 (en) * | 2001-08-21 | 2016-02-25 | Bookit Oy Ajanvarauspalvelu | Multi-factor authentication techniques |
CN104320708A (en) * | 2014-10-14 | 2015-01-28 | 小米科技有限责任公司 | User right handling method and device of smart television |
CN104407963A (en) * | 2014-11-10 | 2015-03-11 | 集怡嘉数码科技(深圳)有限公司 | Distance control method and terminal device |
CN105448053A (en) * | 2015-12-02 | 2016-03-30 | 广东小天才科技有限公司 | Posture prompting method and system |
CN105827704A (en) * | 2016-03-22 | 2016-08-03 | 乐视网信息技术(北京)股份有限公司 | Account management method and device |
CN106650365A (en) * | 2016-09-29 | 2017-05-10 | 珠海格力电器股份有限公司 | Method and device for starting different working modes |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108830066A (en) * | 2018-06-20 | 2018-11-16 | 平安科技(深圳)有限公司 | Application control method and apparatus and computer readable storage medium in terminal |
CN110737880A (en) * | 2019-10-12 | 2020-01-31 | 国网新疆电力有限公司伊犁供电公司 | Computer control device and control method for fast office |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6100898B2 (en) | Method and device for processing messages | |
CN104811551B (en) | A kind of terminal screen control method and terminal | |
US9886512B2 (en) | Software recommending method and recommending system | |
ES2761603T3 (en) | Procedure and computer system to determine a threat score | |
CN104135365B (en) | Method, server and the client that access request is verified | |
CN104836781B (en) | Distinguish the method and device for accessing user identity | |
JP2021500645A (en) | Cognitive virtual detector | |
CN106161397A (en) | There is the electronic installation of Anti-addiction function, Anti-addiction management system and method | |
CN105049607B (en) | A kind of short message display method and mobile terminal | |
CN104732157B (en) | A kind of application hides, deployment method and device | |
CN105844123A (en) | Method and device for identity authentication on terminal, and terminal | |
KR20120116997A (en) | Biometric sensor for human presence detection and associated methods | |
CN110909353B (en) | Plug-in detection method and device | |
CN109902459A (en) | Man-machine identification verification method, system, equipment and the storage medium of WEB page | |
CN107948199B (en) | Method and device for rapidly detecting terminal shared access | |
CN106778151A (en) | Method for identifying ID and device based on person's handwriting | |
CN111641588A (en) | Webpage analog input detection method and device, computer equipment and storage medium | |
Seitz et al. | PASDJO: quantifying password strength perceptions with an online game | |
CN108881126A (en) | The methods, devices and systems of authentication code | |
CN107194230A (en) | A kind of method and apparatus of computer management | |
CN113742190A (en) | Control method and electronic device | |
CN108182276A (en) | A kind of method and electronic equipment for based on shooting picture search topic | |
CN112131551A (en) | Verification code verification method and device, computer equipment and readable storage medium | |
CN111984349A (en) | Information display method and device and electronic equipment | |
CN107944261B (en) | Application program control method and user equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170922 |
|
RJ01 | Rejection of invention patent application after publication |