CN107292137B - Method and device for determining object to be unlocked - Google Patents

Method and device for determining object to be unlocked Download PDF

Info

Publication number
CN107292137B
CN107292137B CN201610201980.0A CN201610201980A CN107292137B CN 107292137 B CN107292137 B CN 107292137B CN 201610201980 A CN201610201980 A CN 201610201980A CN 107292137 B CN107292137 B CN 107292137B
Authority
CN
China
Prior art keywords
locked application
application program
locked
evaluation value
system evaluation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610201980.0A
Other languages
Chinese (zh)
Other versions
CN107292137A (en
Inventor
刘卓霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610201980.0A priority Critical patent/CN107292137B/en
Priority to TW106105976A priority patent/TWI739805B/en
Priority to PCT/CN2017/078047 priority patent/WO2017167131A1/en
Publication of CN107292137A publication Critical patent/CN107292137A/en
Application granted granted Critical
Publication of CN107292137B publication Critical patent/CN107292137B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]

Abstract

The application and the computer technology disclose a method and a device for determining an object to be unlocked, which are used for accurately selecting an application program to be unlocked according to the use requirement of a user and avoiding resource loss. The method comprises the following steps: when determining that at least two locked applications instructed to be unlocked exist, selecting the locked applications with current system evaluation values meeting preset screening conditions as objects to be unlocked, wherein the system evaluation value of one locked application is used for representing the importance degree of the locked application relative to a user. Therefore, the intelligent device can deduce the use habit of the user based on the system evaluation value, and accurately screen out the locked application program which is most consistent with the use habit of the user at present from a plurality of locked application programs as an object to be unlocked, so that the unlocking efficiency and the unlocking accuracy are greatly improved; furthermore, resource loss caused by repeated selection and repeated confirmation of the object to be unlocked with the user is avoided.

Description

Method and device for determining object to be unlocked
Technical Field
The present disclosure relates to computer technologies, and in particular, to a method and an apparatus for determining an object to be unlocked.
Background
At present, in order to better protect private data of a user, an intelligent device provides an application program locking service for the user, that is, the user can lock a designated application program on the intelligent device according to the use requirement of the user and unlock the application program when the application program is required to be used, so that other people except the user cannot use the locked application program, and the use safety of the application program is enhanced.
Currently, when an intelligent device maintains a locked application program, a timer needs to be used to poll and check whether the locked application program is switched to a foreground for operation at intervals, and if it is monitored that a certain application program is instructed by a user to be switched to the foreground, a visual operation interface needs to be provided for the user to prompt the user to unlock according to a preset rule.
However, checking whether there is an application that needs to be unlocked in a polling manner consumes excessive system resources, and when there are multiple applications that need to be unlocked, it is not possible to accurately determine which application needs to be unlocked preferentially, thereby reducing operating efficiency.
Disclosure of Invention
The embodiment of the application provides a method and a device for determining an object to be unlocked, which are used for accurately selecting an application program to be unlocked according to the use requirement of a user and avoiding resource loss.
The embodiment of the application provides the following specific technical scheme:
a method for determining an object to be unlocked includes:
determining that there are at least two locked applications that are triggered to unlock operations;
acquiring current system evaluation values of the at least two locked applications, wherein the system evaluation value of one locked application is used for representing the importance degree of the one locked application relative to a user;
and selecting a locked application program with the system evaluation value conforming to a preset screening strategy as an object to be unlocked.
Optionally, determining that there are at least two locked applications that are triggered to unlock operations includes:
determining from the system notification that there are at least two locked applications that are triggered to unlock operations.
Alternatively, the system evaluation value of one locked application is generated based on the historical use state information of the one locked application.
Optionally, further comprising:
and according to a set period, recalculating the latest system evaluation value of each locked application program according to the latest historical use state information of each locked application program.
Optionally, the historical usage state information of a locked application includes one or any combination of the following parameters:
the used frequency of the locked application program in a first set time range;
the information updating state of the locked application program in a second set time range;
the degree of association between the locked application and other applications used by the user within the third set time frame.
Optionally, selecting a locked application with a system evaluation value conforming to a preset screening policy as an object to be unlocked includes:
if the first locked application program selected in the last unlocking operation does not exist in the at least two locked application programs, screening out a second locked application program with the highest priority corresponding to the current system evaluation value, and selecting the second locked application program as an object to be unlocked;
if a first locked application program selected in last unlocking operation exists in the at least two locked application programs, screening a second locked application program with the highest priority corresponding to the current system evaluation value, judging whether the change trend of the current system evaluation value of the second locked application program meets a preset second change rule or not, if yes, selecting the second locked application program as an object to be unlocked, otherwise, selecting the first locked application program as the object to be unlocked when the change trend of the current system evaluation value of the first locked application program meets a preset first change rule.
Optionally, when it is determined that the variation trend of the current system evaluation value of the first locked application program meets a preset first variation rule, the method includes:
and judging that the priority of the current system evaluation value of the first locked application program is increased compared with the previous calculation, or when the priority of the current system evaluation value of the first locked application program is reduced and the reduction amplitude does not reach a set first threshold value, determining that the change trend of the current system evaluation value of the first locked application program accords with a preset first change rule.
Optionally, when it is determined that the variation trend of the current system evaluation value of the second locked application program meets a preset second variation rule, the method includes:
and judging that the change trend of the current system evaluation value of the second locked application program is in accordance with a preset second change rule when the priority of the current system evaluation value of the second locked application program is increased compared with the previous calculation and the increase amplitude reaches a set second threshold value.
Optionally, further comprising:
and unlocking the locked application program selected as the object to be unlocked.
Optionally, unlocking the locked application selected as the object to be unlocked includes:
and presenting a visual operation interface based on the locked application program selected as the object to be unlocked, and prompting a user to unlock based on a preset rule.
An apparatus for determining an object to be unlocked, comprising:
a determination unit configured to determine that there are at least two locked applications that have been triggered to perform an unlocking operation;
an obtaining unit, configured to obtain current system evaluation values of the at least two locked applications, where the system evaluation value of one locked application is used to represent an importance degree of the one locked application with respect to a user;
and the processing unit is used for selecting one locked application program with the system evaluation value conforming to the preset screening strategy as an object to be unlocked.
Optionally, when it is determined that there are at least two locked applications that trigger the unlocking operation, the determining unit is configured to:
determining from the system notification that there are at least two locked applications that are triggered to unlock operations.
Alternatively, the system evaluation value of one locked application is generated based on the historical use state information of the one locked application.
Optionally, the obtaining unit is further configured to:
and according to a set period, recalculating the latest system evaluation value of each locked application program according to the latest historical use state information of each locked application program.
Optionally, the historical usage state information of a locked application includes one or any combination of the following parameters:
the used frequency of the locked application program in a first set time range;
the information updating state of the locked application program in a second set time range;
the degree of association between the locked application and other applications used by the user within the third set time frame.
Optionally, when a locked application with a system evaluation value conforming to a preset screening policy is selected as the object to be unlocked, the processing unit is configured to:
if the first locked application program selected in the last unlocking operation does not exist in the at least two locked application programs, screening out a second locked application program with the highest priority corresponding to the current system evaluation value, and selecting the second locked application program as an object to be unlocked;
if a first locked application program selected in last unlocking operation exists in the at least two locked application programs, screening a second locked application program with the highest priority corresponding to the current system evaluation value, judging whether the change trend of the current system evaluation value of the second locked application program meets a preset second change rule or not, if yes, selecting the second locked application program as an object to be unlocked, otherwise, selecting the first locked application program as the object to be unlocked when the change trend of the current system evaluation value of the first locked application program meets a preset first change rule.
Optionally, when it is determined that a variation trend of the current system evaluation value of the first locked application program conforms to a preset first variation rule, the processing unit is configured to:
and judging that the priority of the current system evaluation value of the first locked application program is increased compared with the previous calculation, or when the priority of the current system evaluation value of the first locked application program is reduced and the reduction amplitude does not reach a set first threshold value, determining that the change trend of the current system evaluation value of the first locked application program accords with a preset first change rule.
Optionally, when it is determined that a variation trend of the current system evaluation value of the second locked application program conforms to a preset second variation rule, the processing unit is configured to:
and judging that the change trend of the current system evaluation value of the second locked application program is in accordance with a preset second change rule when the priority of the current system evaluation value of the second locked application program is increased compared with the previous calculation and the increase amplitude reaches a set second threshold value.
Optionally, the processing unit is further configured to:
and unlocking the locked application program selected as the object to be unlocked.
Optionally, when the locked application selected as the object to be unlocked is unlocked, the processing unit is configured to:
and presenting a visual operation interface based on the locked application program selected as the object to be unlocked, and prompting a user to unlock based on a preset rule.
In the embodiment of the application, the intelligent device periodically calculates the system evaluation value of each locked application according to a rule default by the system, and selects the locked application with the current system evaluation value meeting the preset screening condition as an object to be unlocked when determining that at least two locked applications instructed to be unlocked exist, wherein the system evaluation value of one locked application is used for representing the importance degree of the locked application relative to a user. Therefore, the intelligent device can deduce the use habit of the user based on the system evaluation value, and accurately screen out the locked application program which is most consistent with the use habit of the user at present from a plurality of locked application programs as an object to be unlocked, so that the unlocking efficiency and the unlocking accuracy are greatly improved; furthermore, resource loss caused by repeated selection and repeated confirmation of the object to be unlocked with the user is avoided, and the user experience is greatly improved.
Drawings
FIG. 1 is a flowchart illustrating an overview of unlocking an application in an embodiment of the present application;
FIG. 2 is a detailed flowchart illustrating parsing of an application in an embodiment of the present application;
fig. 3 is a functional structure schematic diagram of an intelligent device in the embodiment of the present application.
Detailed Description
In order to select an application program for accurate unlocking according to the use requirement of a user and avoid resource loss, in the embodiment of the application, the intelligent device periodically calculates the system evaluation value of each locked application program according to a default rule of the system, and when it is determined that at least two locked application programs which are instructed to be switched from a background to a foreground (namely, instructed to be unlocked) exist, the intelligent device selects the locked application program of which the current system evaluation value meets a preset screening condition for unlocking, wherein the system evaluation value of one locked application program represents the importance degree of the system for identifying the locked application program relative to the user, and the system evaluation value can be set based on the historical use state of the locked application program.
Preferred embodiments of the present application will be described in further detail below.
Referring to fig. 1, in the embodiment of the present application, an outline flow of unlocking an application program by an intelligent device is as follows:
step 100: the smart device obtains a list of locked applications.
In practical applications, after a user sets a locked application, the smart device may maintain a locked application set in the system.
Step 101: and the intelligent equipment monitors the system kernel mapping file.
In this embodiment, the intelligent device does not poll to inquire whether the locked application needs to be unlocked, but monitors the system kernel mapping file, and once the unlocking operation is triggered, the flag bit in the system content mapping file is rewritten, and at this time, the intelligent device knows that the locked application needs to be unlocked.
In this embodiment, the touch lock operation may be triggered by a variety of events, including but not limited to the following:
1. and determining that the user triggers the unlocking operation of a certain locked application program according to the clicking operation of the user.
For example, if the user clicks on an application for managing photos and wishes to view private photos, the application for managing photos will be triggered to unlock.
2. And triggering the unlocking operation of the corresponding locked application program when the timing event set by the user is overtime.
For example, if the user presets to view bills within a certain time period, the application program for account management will be triggered to unlock the bill within the corresponding time period.
3. When the relevant data of a certain locked application program needs to be updated or/and is updated in the background, the unlocking operation of the locked application program is triggered.
For example, if stock information stored in a locked application for managing stocks is updated in the background and the user needs to be prompted to view the updated information, an unlocking operation of the locked application for managing stocks is triggered.
Step 102: does the smart device determine whether there is a locked application triggered to unlock based on the monitoring result? If yes, go to step 103; otherwise, return to step 101.
Step 103: the intelligent device acquires a list of locked applications which are triggered to be unlocked.
After the unlocking operation is triggered, the smart device may obtain a list of the locked applications that are triggered to perform the unlocking operation, and in a general case, if only one locked application exists in the list, the unlocking operation is performed directly.
Step 104: the intelligent device determines the current system evaluation value of each locked application program triggered to be unlocked respectively, and screens out the locked application programs of which the current system evaluation values accord with a preset screening strategy.
In the embodiment of the application, the smart device calculates the latest system evaluation value of each locked application according to the latest historical use state information of each locked application respectively according to the set period, and one system evaluation value of each locked application is used for representing the importance degree of the locked application relative to the user and is generated based on the historical use state information of the locked application.
Preferably, the historical usage status information may include, but is not limited to, one or any combination of the following parameters:
1. the used frequency of the locked application program in a first set time range.
Specifically, the more frequently a locked application is used, the higher the priority level represented by the current system evaluation value of the locked application, i.e., the more important the smart device may deem the locked application to be relative to the user, and the need to unlock the locked application as soon as possible.
2. And updating the state of the information of the locked application program within a second set time range.
Specifically, the closer the latest update time of the related information (e.g., stock information) of a locked application is to the current time, the higher the priority level represented by the current system evaluation value of the locked application, i.e., the more important the intelligent device may deem the locked application to be relative to the user, and the need to unlock the locked application as soon as possible is met.
3. The degree of association between the locked application and other applications used by the user within the third set time frame.
Specifically, the closer the time that an associated application (e.g., application software for mobile payment) of a locked application (e.g., application for billing) was last used to the current time, the higher the priority level represented by the locked application's current system evaluation value, i.e., the more important the smart device may deem the locked application to be relative to the user, the quicker it may need to unlock it.
Of course, the historical usage state information may also include other types of parameters, the three types are only examples, and the smart device may perform weighting processing on various types of parameters included in the historical usage state information of one locked application program, and then calculate to obtain the system evaluation value corresponding to the locked application program.
On the other hand, the priority represented by the system evaluation value may be higher as the value is smaller, or may also be higher as the value is larger, and any value manner can implement the technical solution of the embodiment of the present application, which is not described herein again.
Further, the smart device may perform screening based on the current system evaluation value of each locked application according to a preset screening policy, and determine whether there is a locked application that meets the screening policy.
The specific setting manner of the screening policy will be described in detail in the following embodiments, and will not be described herein again.
Step 105: the intelligent device judges whether a locked application program is screened out, if so, the step 106 is executed; otherwise, return to step 101.
Step 106: and the intelligent equipment presents a visual operation interface on the screened locked application program to prompt a user to unlock according to a preset rule.
For example, the user may be prompted to input a preset password to unlock, or perform a sliding operation according to a preset pattern to unlock, and so on, which is not described herein again.
Referring to fig. 2, the above embodiment will be described in further detail with a specific application scenario.
Step 200: after the system is started, the intelligent device records the identification of each locked application program and the initial value of the system evaluation value of each locked application program in the locked application program list.
Alternatively, under the linux system, the oom _ score value of the process may be configured as the system evaluation value of the locked application.
Step 201: the intelligent device performs system initialization and starts listening.
Step 202: the intelligent device acquires a list (hereinafter referred to as list X) of locked applications currently triggered to be unlocked, and calculates a current system evaluation value of each locked application in the list X according to a preset evaluation rule.
Specifically, the corresponding current system evaluation value is calculated according to the latest historical usage status information of each locked application program, which has been described in the previous embodiment and will not be described herein again.
Step 203: the intelligent device updates the current system evaluation value of each locked application program in the list X and records the change trend of each locked application program.
The change trend of the system evaluation value is an increasing trend or a decreasing trend compared with the last calculation.
Step 204: the smart device arranges each locked application in list X in ascending order according to the current system evaluation value.
In practical applications, the smaller the value of the system evaluation value, the higher the priority, and the larger the value of the system evaluation value, the higher the priority. In this embodiment, assuming that the smaller the value is, the higher the priority is, for example, then after the system evaluation values are arranged in an ascending order, the locked application with the highest priority (i.e., the system evaluation value with the smallest value) can be selected.
Step 205: does the smart device determine if there is only one locked application in list X? If yes, go to step 206; otherwise, step 207 is performed.
Step 206: the smart device directly selects the one locked application with the smallest current system evaluation value (i.e., highest priority) in list X, and then proceeds to step 212.
Step 207: the smart device determines whether the locked application with the smallest system evaluation value currently in the list X is the same as the locked application selected in the last unlocking operation? If yes, go back to step 206; otherwise, step 208 is performed.
Step 208: the smart device determines whether the change trend of the system evaluation value of the locked application with the smallest system evaluation value is consistent with the change rule a compared to the last calculation (i.e., the system evaluation value calculation)? If yes, go to step 206; otherwise, step 209 is performed.
Specifically, the change rule a may be: compared with the last calculation, the current system evaluation value of the smallest locked application program has a trend of decreasing, and the decreasing amplitude reaches the threshold value a.
Since the embodiment is described by taking an example that the smaller the value of the system evaluation value is, the higher the priority is, the change rule a may be interpreted as: the priority of the current system evaluation value of the locked application program with the highest priority of the current system evaluation value is improved compared with the priority of the current system evaluation value of the locked application program which is calculated last time, and the improvement amplitude reaches a threshold value A.
This is because the smart device will periodically update the system evaluation value of each locked application, and a change in the system evaluation value will necessarily result in a change in the priority, so as to avoid a temporary slight increase in the priority of some locked applications, which may cause the system to erroneously select such locked applications for unlocking, and accordingly, it is necessary to determine that the priority of a certain locked application is the highest and is increased by a certain magnitude compared to the previous calculation, and it is determined that the priority of the locked application is substantially increased, and it is indeed necessary to immediately perform an unlocking operation, which is done to avoid an erroneous selection due to a slight change in the priority.
Step 209: the smart device determines whether the execution of the change in the current system evaluation value of the locked application selected in the previous interpretation operation conforms to the change rule B, compared to the previous calculation? If yes, go to step 211; otherwise, step 210 is performed.
In this embodiment, step 209 is exemplified by "the locked application selected in the last unlocking operation appears in the current list X again", and if the locked application selected in the last unlocking operation is not currently instructed to perform the unlocking operation, step 209 may not be performed.
Specifically, the change rule B may be: compared with the last calculation, the current change trend of the system evaluation value of the locked application program selected in the last unlocking operation is a descending change, or an ascending change, and the descending amplitude does not reach the threshold B.
Since the embodiment is described by taking an example that the smaller the value of the system evaluation value is, the higher the priority is, the change rule B may be interpreted as: the priority of the current system evaluation value of the locked application program selected in the last unlocking operation is increased compared with the priority of the current system evaluation value calculated in the last calculation, or is reduced and the reduction amplitude reaches a threshold value A.
This is because the smart device will periodically update the system evaluation value of each locked application, and a change in the system evaluation value will necessarily result in a change in priority, whereas if the last unlocked locked application is currently present in the list X, which indicates that the locked application may indeed be an application that the user needs to use urgently, if the trend of the change in priority of the current system evaluation value of the locked application with the highest priority of the current system does not conform to the change rule a, it needs to be considered that the locked application selected in the last unlocking operation is unlocked again.
Meanwhile, in order to avoid the temporary slight change of the priority of some locked applications, which causes the system to mistakenly not select such locked applications for unlocking, correspondingly, when the priority of the current system evaluation value of a certain locked application which is determined to be unlocked last time is raised, or the descending amplitude does not reach the threshold value B although the priority is lowered, the intelligent device still determines that the locked application really needs to immediately execute the unlocking operation, and the process is also to avoid the wrong selection caused by the slight change of the priority.
Step 210: the smart device returns a null value indicating that no locked applications are currently unlocked.
In this case, it is possible that the locked application reaches the unlocking condition (e.g., related information is updated, or other associated applications are called), but the priority change trend of the locked application does not conform to the corresponding change rule, and the locked application is not unlocked, so as to avoid the situation that the unlocking frequency is too high, thereby causing interference to the user.
Step 211: the smart device again selects the locked application selected in the last unlocking operation.
Step 212: and the intelligent equipment presents a corresponding visual operation interface based on the selected locked application program and prompts a user to unlock according to a preset rule.
Therefore, the intelligent device can select the most important locked application program as much as possible to unlock according to the current importance degree of each locked application program relative to the user, and therefore the unlocking result is more in line with the use habit of the user.
For example: suppose that three locked applications, namely "instant messaging software", "payment software", and "news software", are recorded in the list X currently acquired by the smart device, that is, the three software are triggered to perform an unlocking operation. Meanwhile, suppose that the smart device periodically updates the system evaluation values of the above three pieces of software with reference to "the frequency of use of the locked application in the last 1 hour".
Scene 1:
suppose that in the last calculation, the locked application program and the corresponding system evaluation value that triggered the unlocking operation are: "order-8 points", "payment software-7 points", "news software-6 points", and the software that was last selected as the object to be unlocked is "order".
Meanwhile, it is assumed that in the present calculation, the system evaluation values of each locked application in the list X are: "instant messaging software-7 points", "payment software-6 points", "news software-2 points".
Obviously, the "order" does not appear in the list X currently acquired, and then the smart device selects "instant messaging software" with the highest system evaluation value as the object to be unlocked.
Scene 2:
suppose that in the last calculation, the locked application program and the corresponding system evaluation value that triggered the unlocking operation are: "instant messaging software-8 points", "payment software-7 points", "news software-6 points", and the software that was last selected as the object to be unlocked is "instant messaging software".
Meanwhile, it is assumed that in the present calculation, the system evaluation values of each locked application in the list X are: "instant messaging software-7 points", "payment software-6 points", "news software-2 points".
Obviously, the "instant messaging software" appears again in the currently acquired list X, and although the system evaluation value of the "instant messaging software" is reduced from 8 points to 7 points compared with the last calculation, the reduction amplitude does not exceed the first threshold value "2 points", the smart device still selects the "instant messaging software" again as the object to be unlocked.
Scene 3:
suppose that in the last calculation, the locked application program and the corresponding system evaluation value that triggered the unlocking operation are: "instant messaging software-8 points", "payment software-7 points", "news software-6 points", and the software that was last selected as the object to be unlocked is "instant messaging software".
Meanwhile, it is assumed that in the present calculation, the system evaluation values of each locked application in the list X are: "instant messaging software-4 points", "payment software-9 points", "news software-4 points".
Obviously, the "instant messaging software" appears in the currently acquired list X again, but compared with the last calculation, the system evaluation value of the "instant messaging software" is reduced from 8 points to 4 points, and the reduction amplitude exceeds the first threshold value of "2 points", so that the smart device cannot select the "instant messaging software" as the object to be unlocked at this time.
Meanwhile, compared with the system evaluation value of the payment software calculated last time, the system evaluation value is improved from 7 points to 9 points, and the improvement amplitude exceeds the second threshold value of 1 point, so that the intelligent device selects the payment software as the object to be unlocked.
Based on the above embodiments, referring to fig. 3, in the embodiment of the present application, the smart device at least includes a determining unit 30, an obtaining unit 31 and a processing unit 32, wherein,
a determination unit 30 for determining that there are at least two locked applications that are triggered to be unlocked;
an obtaining unit 31, configured to obtain current system evaluation values of the at least two locked applications, where the system evaluation value of one locked application is used to represent an importance degree of the one locked application with respect to a user;
and the processing unit 32 is used for selecting one locked application program of which the system evaluation value accords with the preset screening strategy as the object to be unlocked.
Optionally, when determining that there are at least two locked applications that trigger the unlocking operation, the determining unit 30 is configured to:
determining from the system notification that there are at least two locked applications that are triggered to unlock operations.
Alternatively, the system evaluation value of one locked application is generated based on the historical use state information of the one locked application.
Optionally, the obtaining unit 31 is further configured to:
and according to a set period, recalculating the latest system evaluation value of each locked application program according to the latest historical use state information of each locked application program.
Optionally, the historical usage state information of a locked application includes one or any combination of the following parameters:
the used frequency of the locked application program in a first set time range;
the information updating state of the locked application program in a second set time range;
the degree of association between the locked application and other applications used by the user within the third set time frame.
Optionally, when a locked application with a system evaluation value conforming to a preset screening policy is selected as the object to be unlocked, the processing unit 32 is configured to:
if the first locked application program selected in the last unlocking operation does not exist in the at least two locked application programs, screening out a second locked application program with the highest priority corresponding to the current system evaluation value, and selecting the second locked application program as an object to be unlocked;
if a first locked application program selected in last unlocking operation exists in the at least two locked application programs, screening a second locked application program with the highest priority corresponding to the current system evaluation value, judging whether the change trend of the current system evaluation value of the second locked application program meets a preset second change rule or not, if yes, selecting the second locked application program as an object to be unlocked, otherwise, selecting the first locked application program as the object to be unlocked when the change trend of the current system evaluation value of the first locked application program meets a preset first change rule.
Optionally, when it is determined that the variation trend of the current system evaluation value of the first locked application program conforms to a preset first variation rule, the processing unit 32 is configured to:
and judging that the priority of the current system evaluation value of the first locked application program is increased compared with the previous calculation, or when the priority of the current system evaluation value of the first locked application program is reduced and the reduction amplitude does not reach a set first threshold value, determining that the change trend of the current system evaluation value of the first locked application program accords with a preset first change rule.
Optionally, when it is determined that the variation trend of the current system evaluation value of the second locked application program conforms to a preset second variation rule, the processing unit 32 is configured to:
and judging that the change trend of the current system evaluation value of the second locked application program is in accordance with a preset second change rule when the priority of the current system evaluation value of the second locked application program is increased compared with the previous calculation and the increase amplitude reaches a set second threshold value.
Optionally, the processing unit 32 is further configured to:
and unlocking the locked application program selected as the object to be unlocked.
Optionally, when the locked application selected as the object to be unlocked is unlocked, the processing unit 32 is configured to:
and presenting a visual operation interface based on the locked application program selected as the object to be unlocked, and prompting a user to unlock based on a preset rule.
In summary, in the embodiment of the present application, the smart device periodically calculates the system evaluation value of each locked application according to a rule default to the system, and when it is determined that there are at least two locked applications that are instructed to be unlocked, selects a locked application whose current system evaluation value meets a preset screening condition as an object to be unlocked, where the system evaluation value of one locked application is used to represent the importance degree of the locked application relative to the user. Therefore, the intelligent device can deduce the use habit of the user based on the system evaluation value, and accurately screen out the locked application program which is most consistent with the use habit of the user at present from a plurality of locked application programs as an object to be unlocked, so that the unlocking efficiency and the unlocking accuracy are greatly improved; furthermore, resource loss caused by repeated selection and repeated confirmation of the object to be unlocked with the user is avoided, and the user experience is greatly improved.
Furthermore, the intelligent device can timely determine the locked application program instructed to be unlocked according to the system notification without polling search, so that the monitoring program is not required to be maintained in the background in real time, resource loss is effectively avoided, and the standby time of the device is prolonged.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.

Claims (16)

1. A method for determining an object to be unlocked, comprising:
monitoring a system kernel mapping file, and determining that at least two locked application programs triggered to be unlocked exist according to a system notification;
acquiring current system evaluation values of the at least two locked applications, wherein the system evaluation value of one locked application is used for representing the importance degree of the one locked application relative to a user;
if a first locked application program selected in last unlocking operation exists in the at least two locked application programs, screening out a second locked application program with the highest priority corresponding to the current system evaluation value, and when the priority of the current system evaluation value of the second locked application program is improved compared with that of the previous calculation and the improvement amplitude reaches a set second threshold value, determining that the change trend of the current system evaluation value of the second locked application program accords with a preset second change rule, and selecting the second locked application program as an object to be unlocked.
2. The method of claim 1, wherein the system evaluation value for a locked application is generated based on historical usage state information for the locked application.
3. The method of claim 2, further comprising:
and according to a set period, recalculating the latest system evaluation value of each locked application program according to the latest historical use state information of each locked application program.
4. The method of claim 2, wherein the historical usage state information of a locked application includes one or any combination of the following parameters:
the used frequency of the locked application program in a first set time range;
the information updating state of the locked application program in a second set time range;
the degree of association between the locked application and other applications used by the user within the third set time frame.
5. The method of any one of claims 1-4, further comprising:
if the first locked application program selected in the last unlocking operation does not exist in the at least two locked application programs, screening out a second locked application program with the highest priority corresponding to the current system evaluation value, and selecting the second locked application program as an object to be unlocked;
if a first locked application program selected in last unlocking operation exists in the at least two locked application programs, and the change trend of the current system evaluation value of the second locked application program does not accord with a preset second change rule, when the change trend of the current system evaluation value of the first locked application program is determined to accord with a preset first change rule, the first locked application program is selected as an object to be unlocked.
6. The method of claim 5, wherein determining that the change trend of the current system evaluation value of the first locked application program meets a preset first change rule comprises:
and judging that the priority of the current system evaluation value of the first locked application program is increased compared with the previous calculation, or when the priority of the current system evaluation value of the first locked application program is reduced and the reduction amplitude does not reach a set first threshold value, determining that the change trend of the current system evaluation value of the first locked application program accords with a preset first change rule.
7. The method of claim 5, further comprising:
and unlocking the locked application program selected as the object to be unlocked.
8. The method of claim 7, wherein unlocking a locked application selected as an object to be unlocked comprises:
and presenting a visual operation interface based on the locked application program selected as the object to be unlocked, and prompting a user to unlock based on a preset rule.
9. An apparatus for determining an object to be unlocked, comprising:
the system comprises a determining unit, a judging unit and a judging unit, wherein the determining unit is used for monitoring a system kernel mapping file and determining that at least two locked application programs triggered to be unlocked exist according to a system notification;
an obtaining unit, configured to obtain current system evaluation values of the at least two locked applications, where the system evaluation value of one locked application is used to represent an importance degree of the one locked application with respect to a user;
and the processing unit is used for screening out a second locked application program with the highest priority corresponding to the current system evaluation value if a first locked application program selected in the last unlocking operation exists in the at least two locked application programs, and determining that the change trend of the current system evaluation value of the second locked application program accords with a preset second change rule when the priority of the current system evaluation value of the second locked application program is improved and the improvement amplitude reaches a set second threshold value compared with the last calculation, and selecting the second locked application program as an object to be unlocked.
10. The apparatus of claim 9, wherein the system evaluation value for a locked application is generated based on historical usage state information for the locked application.
11. The apparatus of claim 10, wherein the obtaining unit is further to:
and according to a set period, recalculating the latest system evaluation value of each locked application program according to the latest historical use state information of each locked application program.
12. The apparatus of claim 10, wherein the historical usage state information of a locked application comprises one or any combination of the following parameters:
the used frequency of the locked application program in a first set time range;
the information updating state of the locked application program in a second set time range;
the degree of association between the locked application and other applications used by the user within the third set time frame.
13. The apparatus of any of claims 9-12, wherein the processing unit is further to:
if the first locked application program selected in the last unlocking operation does not exist in the at least two locked application programs, screening out a second locked application program with the highest priority corresponding to the current system evaluation value, and selecting the second locked application program as an object to be unlocked;
if a first locked application program selected in last unlocking operation exists in the at least two locked application programs, and the change trend of the current system evaluation value of the second locked application program does not accord with a preset second change rule, when the change trend of the current system evaluation value of the first locked application program is determined to accord with a preset first change rule, the first locked application program is selected as an object to be unlocked.
14. The apparatus of claim 13, wherein when determining that the change trend of the current system evaluation value of the first locked application conforms to a preset first change rule, the processing unit is configured to:
and judging that the priority of the current system evaluation value of the first locked application program is increased compared with the previous calculation, or when the priority of the current system evaluation value of the first locked application program is reduced and the reduction amplitude does not reach a set first threshold value, determining that the change trend of the current system evaluation value of the first locked application program accords with a preset first change rule.
15. The apparatus as recited in claim 13, said processing unit to further:
and unlocking the locked application program selected as the object to be unlocked.
16. The apparatus of claim 15, wherein, in unlocking a locked application selected as an object to be unlocked, the processing unit is to:
and presenting a visual operation interface based on the locked application program selected as the object to be unlocked, and prompting a user to unlock based on a preset rule.
CN201610201980.0A 2016-03-31 2016-03-31 Method and device for determining object to be unlocked Active CN107292137B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201610201980.0A CN107292137B (en) 2016-03-31 2016-03-31 Method and device for determining object to be unlocked
TW106105976A TWI739805B (en) 2016-03-31 2017-02-22 Method and device for determining object to be unlocked
PCT/CN2017/078047 WO2017167131A1 (en) 2016-03-31 2017-03-24 Method and device for determining object to be unlocked

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610201980.0A CN107292137B (en) 2016-03-31 2016-03-31 Method and device for determining object to be unlocked

Publications (2)

Publication Number Publication Date
CN107292137A CN107292137A (en) 2017-10-24
CN107292137B true CN107292137B (en) 2020-10-16

Family

ID=59963488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610201980.0A Active CN107292137B (en) 2016-03-31 2016-03-31 Method and device for determining object to be unlocked

Country Status (3)

Country Link
CN (1) CN107292137B (en)
TW (1) TWI739805B (en)
WO (1) WO2017167131A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI683249B (en) * 2018-11-28 2020-01-21 宏碁股份有限公司 Mobile device with in-display fingerprint sensor
CN116453245B (en) * 2023-04-20 2023-11-14 东莞市伟创动力科技有限公司 Unlocking management method and system for electronic lock

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100561425C (en) * 2003-03-12 2009-11-18 中兴通讯股份有限公司 The universal latch fixed system and the method at a kind of window application interface
CN101848276A (en) * 2010-04-16 2010-09-29 中山大学 Method and system for locking and unlocking mobile phone screens
CN102722363B (en) * 2011-03-30 2015-06-24 宏达国际电子股份有限公司 Handheld electric device and control method thereof
CN103631613A (en) * 2012-08-24 2014-03-12 上海斐讯数据通信技术有限公司 Terminal unlocking and program running triggering method
KR20140027828A (en) * 2012-08-27 2014-03-07 삼성전자주식회사 Operation method of lock function and electronic device operating the same
CN102981723B (en) * 2012-11-07 2015-06-10 北京百度网讯科技有限公司 Unlocking method and unlocking device for mobile terminal and mobile terminal
CN103927106A (en) * 2013-01-14 2014-07-16 富泰华工业(深圳)有限公司 Application program starting system and method
CN103077341B (en) * 2013-01-30 2016-01-20 广东欧珀移动通信有限公司 A kind of application program unlock method and device
CN103218120A (en) * 2013-04-12 2013-07-24 四川长虹电器股份有限公司 Method for quickly unlocking application program of android terminal
US10095345B2 (en) * 2014-05-30 2018-10-09 Apple Inc. Low power scan for device wake up and unlock
KR20160016490A (en) * 2014-07-31 2016-02-15 삼성전자주식회사 Method and system for providing information on a time zone of an external device
CN104123077B (en) * 2014-08-08 2019-10-08 努比亚技术有限公司 Unlocking method and mobile terminal
TWI753846B (en) * 2014-09-02 2022-02-01 美商蘋果公司 Methods, systems, electronic devices, and computer readable storage media for electronic message user interfaces

Also Published As

Publication number Publication date
TW201737073A (en) 2017-10-16
CN107292137A (en) 2017-10-24
WO2017167131A1 (en) 2017-10-05
TWI739805B (en) 2021-09-21

Similar Documents

Publication Publication Date Title
CN110378487B (en) Method, device, equipment and medium for verifying model parameters in horizontal federal learning
US20170099292A1 (en) Systems and Methods for Access Permission Revocation and Reinstatement
US10587555B2 (en) Event log analyzer
US10534908B2 (en) Alerts based on entities in security information and event management products
CN109614238B (en) Target object identification method, device and system and readable storage medium
US8572621B2 (en) Selection of server for relocation of application program based on largest number of algorithms with identical output using selected server resource criteria
KR20130021892A (en) Terminal and method for providing risk of applications using the same
US9800596B1 (en) Automated detection of time-based access anomalies in a computer network through processing of login data
CN106685894B (en) Risk identification method, device and system
CN107292137B (en) Method and device for determining object to be unlocked
US11146447B2 (en) Method and apparatus of establishing computer network monitoring criteria
US10990670B2 (en) Virtual network function audit method and apparatus
CN105447384B (en) A kind of anti-method monitored, system and mobile terminal
EP3174268B1 (en) Method and apparatus for using network exhaustive resource
CN110677423A (en) Data acquisition method and device based on client agent side and computer equipment
CN111835817B (en) Device management method, readable storage medium, and electronic device
CN105988835B (en) Software upgrading method and terminal
CN111753293A (en) Operation behavior monitoring method and device, electronic equipment and storage medium
CN113467901A (en) Task scheduling method and related equipment
CN110865876A (en) Scheduling method and device for service dependent resources
CN111176576A (en) Metadata modification method, device, equipment and storage medium of storage volume
CN111352710A (en) Process management method and device, computing equipment and storage medium
JP2018207295A (en) Image processing device, method of controlling image processing device, and program
JP4420804B2 (en) Log income management system, method, and program
CN113709153B (en) Log merging method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant