CN107194230A - A kind of method and apparatus of computer management - Google Patents

A kind of method and apparatus of computer management Download PDF

Info

Publication number
CN107194230A
CN107194230A CN201710379921.7A CN201710379921A CN107194230A CN 107194230 A CN107194230 A CN 107194230A CN 201710379921 A CN201710379921 A CN 201710379921A CN 107194230 A CN107194230 A CN 107194230A
Authority
CN
China
Prior art keywords
identity information
information
computer system
computer
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710379921.7A
Other languages
Chinese (zh)
Inventor
王晓燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Decon Goggles Control Technology Co Ltd
Original Assignee
Hunan Decon Goggles Control Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Decon Goggles Control Technology Co Ltd filed Critical Hunan Decon Goggles Control Technology Co Ltd
Priority to CN201710379921.7A priority Critical patent/CN107194230A/en
Publication of CN107194230A publication Critical patent/CN107194230A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The embodiment of the invention discloses a kind of method and apparatus of computer management, by obtaining the facial image that camera is gathered, corresponding target signature information is extracted from the facial image;The corresponding relation of characteristic information and identity information is previously stored with computer systems, by the way that target signature information is matched with characteristic information, it can be determined that go out the identity information belonging to target signature information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;When identity information belongs to the Equations of The Second Kind identity information, then the control operation prestored is performed when computer system is run.It can be seen that, the facial image of collection is dependent on, the identity to user is identified, so that according to the operation of the identity information control computer system, realize computer system and carry out intelligentized control management for the identity of user, effective control can be carried out to teen-age internet behavior.

Description

A kind of method and apparatus of computer management
Technical field
The present invention relates to field of computer technology, more particularly to a kind of method and apparatus of computer management.
Background technology
The development of internet so that our life is more rich and varied, after computer networking, we can be by calculating Machine finds required data.And internet resource enriches, and people can chat on line, play game, see video etc..Network pair Our life generates deep effect, and its popularity rate is growing.But it is following the problem of it is also increasingly severe, Teenager, which often indulges in online game, to extricate oneself, and lose time, or even neglects one's studies.
In traditional approach, the log into thr computer system by the way of input password, using this kind of mode, computer system without Method identifies the identity of user, namely it is adult or child that can not determine user.And existing computer operation System bottom does not support computer using duration, access program, accesses and be controlled in webpage and content.User inputs Just it can use computer, for teenager, computer is often used for a long time after password, cause under eyesight Drop, some teenagers, which indulge in networking game, to extricate oneself.And teenager lacks cognitive judgement, may access some bad Flame on website, network, often brings harmful effect to teen-age physical and mental health.
If computer system is capable of the identity of automatic identification user, the identity for user carries out intelligentized control Tubulation is managed, the problem of effectively can solving mentioned above.
It can be seen that, how to cause computer system to carry out intelligentized control management for the identity of user, be this area Technical staff's urgent problem to be solved.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method and apparatus of computer management, can cause computer system Identity for user carries out intelligentized control management.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of method of computer management, including:
The facial image of camera collection is obtained, and extracts from the facial image corresponding target signature information;
The target signature information is matched with the characteristic information prestored, the target signature information is judged Affiliated identity information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;
If the identity information belongs to the Equations of The Second Kind identity information, perform and prestore when computer system is run Control operation.
Optionally, the control operation prestored that performed when computer system is run includes:
Judge whether the run time of the computer system exceedes preset time;
If exceeding, computer is subjected to shutdown processing.
Optionally, the control operation prestored that performed when computer system is run includes:
Judge whether the games of the computer system operation belong to default and forbid game;
If so, then forbidding the computer system to run the games.
Optionally, the control operation prestored that performed when computer system is run includes:
Judge whether the network address of the computer system accesses belongs to default and forbid accessing network address;
If so, then forbidding network address described in the computer system accesses.
Optionally, in addition to:
The facial image that the camera is gathered is analyzed and processed, user and computer screen is got Distance and user attitude information, when the distance be less than predetermined threshold value and/or when the attitude information do not meet it is default During condition, then alarm is carried out.
The embodiment of the present invention additionally provides a kind of device of computer management, including acquiring unit, extraction unit, judgement list Member and execution unit:
The acquiring unit, the facial image for obtaining camera collection;
The extraction unit, for extracting corresponding target signature information from the facial image;
The judging unit, for the target signature information to be matched with the characteristic information prestored, judges Go out the identity information belonging to the target signature information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity Information;
If the identity information belongs to the Equations of The Second Kind identity information, the execution unit is triggered, the execution unit, For performing the control operation prestored when computer system is run.
Optionally, when the execution unit is specifically for judging whether the run time of the computer system exceedes default Between;
If exceeding, computer is subjected to shutdown processing.
Optionally, the execution unit is specifically for judging whether the games of the computer system operation belong to pre- If forbid game;
If so, then forbidding the computer system to run the games.
Optionally, the execution unit is specifically for judging whether the network address of the computer system accesses belongs to default Forbid the network address accessed;
If so, then forbidding network address described in the computer system accesses.
Optionally, in addition to Tip element,
The Tip element, for being analyzed and processed to the facial image that the camera is gathered, getting makes The attitude information of the distance and user of user and computer screen, when the distance is less than predetermined threshold value and/or when described When attitude information does not meet preparatory condition, then alarm is carried out.
By obtaining the facial image that camera is gathered it can be seen from above-mentioned technical proposal, carried from the facial image Take out corresponding target signature information;The corresponding relation of characteristic information and identity information is previously stored with computer systems, By the way that the target signature information is matched with the characteristic information prestored, it can be determined that go out the target signature information Affiliated identity information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;When the identity information Belong to the Equations of The Second Kind identity information, then the control operation prestored is performed when computer system is run.It can be seen that, it is dependent on The facial image of collection, the identity to user is identified, so that according to the operation of the identity information control computer system, Realize computer system and carry out intelligentized control management for the identity of user, teen-age internet behavior can be entered The effective control of row.
Brief description of the drawings
In order to illustrate the embodiments of the present invention more clearly, the required accompanying drawing used in embodiment will be done simply below Introduce, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ordinary skill people For member, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the method for computer management provided in an embodiment of the present invention;
Fig. 2 is a kind of structural representation of the device of computer management provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this Embodiment in invention, those of ordinary skill in the art are not under the premise of creative work is made, and what is obtained is every other Embodiment, belongs to the scope of the present invention.
In order that those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description The present invention is described in further detail.
Next, a kind of method for computer management that the embodiment of the present invention is provided is discussed in detail.Fig. 1 is real for the present invention A kind of flow chart of the method for computer management of example offer is applied, this method includes:
S101:The facial image of camera collection is obtained, and extracts from the facial image corresponding target signature Information.
S102:The target signature information is matched with the characteristic information prestored, judges that the target is special Identity information belonging to reference breath.
In embodiments of the present invention, user is worked as the condition of log into thr computer system using the characteristic information of face When restarting computer or opening computer, traditional code entry frame will be replaced by recognition of face frame, in the specific implementation, can Code entry frame and recognition of face frame are realized with the gina interfaces, the Credential Providers interfaces that are provided using Microsoft Conversion.
By taking one family as an example, the face characteristic information of each member in family can be shifted to an earlier date input computer system In, i.e., these characteristic informations are pre-stored within computer system, in order to realize according to face characteristic information log into thr computer system System, can permanently be bundled these face characteristic informations with password.When can be looked into the characteristic information prestored When finding characteristic information same or analogous with target signature information, user just can be with log into thr computer system.
It is identified for the ease of the identity to user, correspondence can be set for each characteristic information prestored Identity information.Wherein, identity information can include first kind identity information and Equations of The Second Kind identity information.
First kind identity information need not carry out the identity of relevant control when can be and use computer, i.e., with the first kind The user of identity information can normally use computer.Equations of The Second Kind identity information needs to carry out phase when can be using computer The identity of control is closed, i.e., the user with Equations of The Second Kind identity information can be restricted when using computer.For example, at one In family, in order to which the internet behavior to child is controlled, parent can be set to first kind identity information, i.e., by parent's Face characteristic information correspondence first kind identity information;Child is set to Equations of The Second Kind identity information, i.e., by the face characteristic of child Information correspondence Equations of The Second Kind identity information.
S103:If the identity information belongs to Equations of The Second Kind identity information, perform and deposit in advance when computer system is run The control operation of storage.
Control operation can be bound with Equations of The Second Kind identity information in embodiments of the present invention, when determining user When belonging to Equations of The Second Kind identity information, it just can start the control operation prestored, so as to the online row to the user Effectively to be controlled.
Wherein the control operation can be configured according to actual conditions, for example, can enter to the surf time of user Row control.When judging that user belongs to Equations of The Second Kind identity information, it just can start the control operation, judge computer system Run time whether exceed preset time;If exceeding, computer is subjected to shutdown processing.
Wherein, the length of preset time can be set according to demand, for example, it is small preset time can be set into 3 When, timing is carried out when being brought into operation from computer system, when reach 3 it is small when after, just can trigger automatic shutdown program, will calculate Machine-operated machine.
Limited by the run time to computer system, can effectively control user continuously for a long time using meter Calculation machine, alleviates the eye strain of user.
The situation that user indulges in online game is directed to, the game installed on computer can be defined, when It when judging that user belongs to Equations of The Second Kind identity information, just can start the control operation, judge the trip of computer system operation Whether play program, which belongs to default, is forbidden game;If so, then forbidding the computer system to run the games.
By taking the computer that one family is used as an example, parent can be directed to the game installed on computer and be selected, By some Game Settings to forbid game, to prevent child from playing such game.
In view of the diversification of the network information, wherein being no lack of some unsound network informations, especially for teenager For, often lack the judgement to information, some unhealthy webpages may be browsed, or download by surfing the Net trip Play etc., can be limited the network address of computer system accesses this, when judging that user belongs to Equations of The Second Kind identity information When, it just can start the control operation, judge whether the network address of the computer system accesses belongs to default and forbid accessing net Location;If so, then forbidding network address described in the computer system accesses.
In the introduction above, the log into thr computer system by way of recognition of face.The face gathered in view of camera Image, may be influenceed to cause recognition failures by factors such as illumination, hairs, for this kind of situation, can set corresponding conversion Function, code entry frame is converted to by recognition of face video frame.Specifically, corresponding shortcut can be set, in department of computer science The translation function of the specific shortcut of selection and login frame is bound in advance in system.After recognition of face failure, user can be with By by the specific shortcut on lower keyboard, such as " Shift+Ctrl+Alt ", so as to recognition of face video frame is converted to close Code landing frame, input password can log into thr computer system.By this kind of mode, it can fully ensure that user smoothly logs in calculating Machine system.
By obtaining the facial image that camera is gathered it can be seen from above-mentioned technical proposal, carried from the facial image Take out corresponding target signature information;The corresponding relation of characteristic information and identity information is previously stored with computer systems, By the way that the target signature information is matched with the characteristic information prestored, it can be determined that go out the target signature information Affiliated identity information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;When the identity information Belong to the Equations of The Second Kind identity information, then the control operation prestored is performed when computer system is run.It can be seen that, it is dependent on The facial image of collection, the identity to user is identified, so that according to the operation of the identity information control computer system, Realize computer system and carry out intelligentized control management for the identity of user, teen-age internet behavior can be entered The effective control of row.
The identity of user can be identified, and be controlled accordingly when it is using computer in the introduction above Management, in addition, can also analyze and process to the facial image that camera is gathered, get user and calculating The distance of machine screen and the attitude information of user, when the distance be less than predetermined threshold value and/or when the attitude information not When meeting preparatory condition, then alarm is carried out.
Predetermined threshold value can be user's distance calculation screen, and the concrete numerical value of the predetermined threshold value can be according to calculating Situations such as size of machine screen, eyesight of user, reasonably set, do not limited herein.For example, can be by default threshold Value is set to 60 centimetres.
Camera is typically secured on computer, the size according to face in facial image, it can be determined that go out user with The distance of computer screen.
When user's distance calculation screen is too near, eyes can be caused with damage, affected one's power of vision when serious, by judging User and the distance of computer screen, can effectively remind the distance of user and screen, so as to protect to a certain extent The eyes of user.
By the analysis to facial image, the attitude information of user can also be got.Preparatory condition can be reflection The information of the correct posture of user.
When the attitude information of user does not meet the preparatory condition, then it can illustrate that the posture of user is incorrect, example Such as, there are the actions such as wryneck, support chin in user.By alarm user can be reminded to adjust sitting posture in time.
Wherein, alarm can be the one section of voice messaging stored in computer system an either snatch of music Deng not limiting its concrete form.The purpose of alarm is in order to remind user, in order to which user is timely Adjust incorrect posture, distance of distance calculation screen etc..
It should be noted that being entered in above-mentioned introduction with the first identity information and the second identity information to the identity of user Row classification, in addition can also according to the quantity of user, need limitation content for being carried out to it etc., the identity to user is carried out More careful division.
Fig. 2 is a kind of structural representation of the device of computer management provided in an embodiment of the present invention, including acquiring unit 21st, extraction unit 22, judging unit 23 and execution unit 24:
The acquiring unit 21, the facial image for obtaining camera collection.
The extraction unit 22, for extracting corresponding target signature information from the facial image.
The judging unit 23, for the target signature information to be matched with the characteristic information prestored, sentences Break and identity information belonging to the target signature information;Wherein, identity information includes first kind identity information and Equations of The Second Kind body Part information.
If the identity information belongs to the Equations of The Second Kind identity information, the execution unit 24 is triggered, it is described to perform list Member 24, for performing the control operation prestored when computer system is run.
Optionally, when the execution unit is specifically for judging whether the run time of the computer system exceedes default Between;
If exceeding, computer is subjected to shutdown processing.
Optionally, the execution unit is specifically for judging whether the games of the computer system operation belong to pre- If forbid game;
If so, then forbidding the computer system to run the games.
Optionally, the execution unit is specifically for judging whether the network address of the computer system accesses belongs to default Forbid the network address accessed;
If so, then forbidding network address described in the computer system accesses.
Optionally, in addition to Tip element,
The Tip element, for being analyzed and processed to the facial image that the camera is gathered, getting makes The attitude information of the distance and user of user and computer screen, when the distance is less than predetermined threshold value and/or when described When attitude information does not meet preparatory condition, then alarm is carried out.
The explanation of feature may refer to the related description of embodiment corresponding to Fig. 1 in embodiment corresponding to Fig. 2, here no longer Repeat one by one.
Acquiring unit can get facial image using the collection of camera it can be seen from above-mentioned technical proposal, carry Unit is taken to extract corresponding target signature information from facial image;Feature letter is previously stored with computer systems The corresponding relation of breath and identity information, judging unit is by the way that the target signature information and the characteristic information prestored are carried out Matching, it can be determined that go out the identity information belonging to the target signature information;Wherein, identity information includes first kind identity information With Equations of The Second Kind identity information;When the identity information belongs to the Equations of The Second Kind identity information, then execution unit is triggered in computer The control operation prestored is performed during system operation.It can be seen that, the facial image of collection is dependent on, the identity to user is carried out Identification, so as to according to the operation of the identity information control computer system, realize the identity that computer system is directed to user Intelligentized control management is carried out, effective control can be carried out to teen-age internet behavior.
A kind of method and apparatus of the computer management provided above the embodiment of the present invention is described in detail.Say Each embodiment is described by the way of progressive in bright book, and what each embodiment was stressed is the difference with other embodiment Between part, each embodiment identical similar portion mutually referring to.For device disclosed in embodiment, due to its with Method is corresponding disclosed in embodiment, so description is fairly simple, related part is referring to method part illustration.It should refer to Go out, for those skilled in the art, under the premise without departing from the principles of the invention, can also be to the present invention Some improvement and modification are carried out, these are improved and modification is also fallen into the protection domain of the claims in the present invention.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and The interchangeability of software, generally describes the composition and step of each example according to function in the above description.These Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty Technical staff can realize described function to each specific application using distinct methods, but this realization should not Think beyond the scope of this invention.
Directly it can be held with reference to the step of the method or algorithm that the embodiments described herein is described with hardware, processor Capable software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.

Claims (10)

1. a kind of method of computer management, it is characterised in that including:
The facial image of camera collection is obtained, and extracts from the facial image corresponding target signature information;
The target signature information is matched with the characteristic information prestored, judged belonging to the target signature information Identity information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;
If the identity information belongs to the Equations of The Second Kind identity information, the control prestored is performed when computer system is run System operation.
2. according to the method described in claim 1, it is characterised in that described to perform what is prestored when computer system is run Control operation includes:
Judge whether the run time of the computer system exceedes preset time;
If exceeding, computer is subjected to shutdown processing.
3. method according to claim 2, it is characterised in that described to perform what is prestored when computer system is run Control operation includes:
Judge whether the games of the computer system operation belong to default and forbid game;
If so, then forbidding the computer system to run the games.
4. method according to claim 3, it is characterised in that described to perform what is prestored when computer system is run Control operation includes:
Judge whether the network address of the computer system accesses belongs to default and forbid accessing network address;
If so, then forbidding network address described in the computer system accesses.
5. the method according to claim 1-4 any one, it is characterised in that also include:
The facial image that the camera is gathered is analyzed and processed, the distance of user and computer screen is got And the attitude information of user, when the distance is less than predetermined threshold value and/or when the attitude information does not meet preparatory condition When, then carry out alarm.
6. a kind of device of computer management, it is characterised in that including acquiring unit, extraction unit, judging unit and perform list Member:
The acquiring unit, the facial image for obtaining camera collection;
The extraction unit, for extracting corresponding target signature information from the facial image;
The judging unit, for the target signature information to be matched with the characteristic information prestored, judges institute State the identity information belonging to target signature information;Wherein, identity information includes first kind identity information and Equations of The Second Kind identity information;
If the identity information belongs to the Equations of The Second Kind identity information, the execution unit is triggered, the execution unit is used for The control operation prestored is performed when computer system is run.
7. device according to claim 6, it is characterised in that the execution unit is specifically for judging the department of computer science Whether the run time of system exceedes preset time;
If exceeding, computer is subjected to shutdown processing.
8. device according to claim 7, it is characterised in that the execution unit is specifically for judging the department of computer science Whether the games of system operation, which belong to default, is forbidden game;
If so, then forbidding the computer system to run the games.
9. device according to claim 8, it is characterised in that the execution unit is specifically for judging the department of computer science Whether the network address that system is accessed belongs to the default network address for forbidding accessing;
If so, then forbidding network address described in the computer system accesses.
10. the device according to claim 6-9 any one, it is characterised in that also including Tip element,
The Tip element, for being analyzed and processed to the facial image that the camera is gathered, gets user With the distance and the attitude information of user of computer screen, when the distance is less than predetermined threshold value and/or when the posture When information does not meet preparatory condition, then alarm is carried out.
CN201710379921.7A 2017-05-25 2017-05-25 A kind of method and apparatus of computer management Pending CN107194230A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710379921.7A CN107194230A (en) 2017-05-25 2017-05-25 A kind of method and apparatus of computer management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710379921.7A CN107194230A (en) 2017-05-25 2017-05-25 A kind of method and apparatus of computer management

Publications (1)

Publication Number Publication Date
CN107194230A true CN107194230A (en) 2017-09-22

Family

ID=59875425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710379921.7A Pending CN107194230A (en) 2017-05-25 2017-05-25 A kind of method and apparatus of computer management

Country Status (1)

Country Link
CN (1) CN107194230A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830066A (en) * 2018-06-20 2018-11-16 平安科技(深圳)有限公司 Application control method and apparatus and computer readable storage medium in terminal
CN110737880A (en) * 2019-10-12 2020-01-31 国网新疆电力有限公司伊犁供电公司 Computer control device and control method for fast office

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320708A (en) * 2014-10-14 2015-01-28 小米科技有限责任公司 User right handling method and device of smart television
CN104407963A (en) * 2014-11-10 2015-03-11 集怡嘉数码科技(深圳)有限公司 Distance control method and terminal device
US20160057137A9 (en) * 2001-08-21 2016-02-25 Bookit Oy Ajanvarauspalvelu Multi-factor authentication techniques
CN105448053A (en) * 2015-12-02 2016-03-30 广东小天才科技有限公司 Posture prompting method and system
CN105827704A (en) * 2016-03-22 2016-08-03 乐视网信息技术(北京)股份有限公司 Account management method and device
CN106650365A (en) * 2016-09-29 2017-05-10 珠海格力电器股份有限公司 Method and device for starting different working modes

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160057137A9 (en) * 2001-08-21 2016-02-25 Bookit Oy Ajanvarauspalvelu Multi-factor authentication techniques
CN104320708A (en) * 2014-10-14 2015-01-28 小米科技有限责任公司 User right handling method and device of smart television
CN104407963A (en) * 2014-11-10 2015-03-11 集怡嘉数码科技(深圳)有限公司 Distance control method and terminal device
CN105448053A (en) * 2015-12-02 2016-03-30 广东小天才科技有限公司 Posture prompting method and system
CN105827704A (en) * 2016-03-22 2016-08-03 乐视网信息技术(北京)股份有限公司 Account management method and device
CN106650365A (en) * 2016-09-29 2017-05-10 珠海格力电器股份有限公司 Method and device for starting different working modes

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830066A (en) * 2018-06-20 2018-11-16 平安科技(深圳)有限公司 Application control method and apparatus and computer readable storage medium in terminal
CN110737880A (en) * 2019-10-12 2020-01-31 国网新疆电力有限公司伊犁供电公司 Computer control device and control method for fast office

Similar Documents

Publication Publication Date Title
JP6100898B2 (en) Method and device for processing messages
CN104811551B (en) A kind of terminal screen control method and terminal
US9886512B2 (en) Software recommending method and recommending system
ES2761603T3 (en) Procedure and computer system to determine a threat score
CN104135365B (en) Method, server and the client that access request is verified
CN104836781B (en) Distinguish the method and device for accessing user identity
JP2021500645A (en) Cognitive virtual detector
CN106161397A (en) There is the electronic installation of Anti-addiction function, Anti-addiction management system and method
CN105049607B (en) A kind of short message display method and mobile terminal
CN104732157B (en) A kind of application hides, deployment method and device
CN105844123A (en) Method and device for identity authentication on terminal, and terminal
KR20120116997A (en) Biometric sensor for human presence detection and associated methods
CN110909353B (en) Plug-in detection method and device
CN109902459A (en) Man-machine identification verification method, system, equipment and the storage medium of WEB page
CN107948199B (en) Method and device for rapidly detecting terminal shared access
CN106778151A (en) Method for identifying ID and device based on person's handwriting
CN111641588A (en) Webpage analog input detection method and device, computer equipment and storage medium
Seitz et al. PASDJO: quantifying password strength perceptions with an online game
CN108881126A (en) The methods, devices and systems of authentication code
CN107194230A (en) A kind of method and apparatus of computer management
CN113742190A (en) Control method and electronic device
CN108182276A (en) A kind of method and electronic equipment for based on shooting picture search topic
CN112131551A (en) Verification code verification method and device, computer equipment and readable storage medium
CN111984349A (en) Information display method and device and electronic equipment
CN107944261B (en) Application program control method and user equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170922

RJ01 Rejection of invention patent application after publication