CN107643977B - Anti-addiction method and related product - Google Patents

Anti-addiction method and related product Download PDF

Info

Publication number
CN107643977B
CN107643977B CN201711062442.9A CN201711062442A CN107643977B CN 107643977 B CN107643977 B CN 107643977B CN 201711062442 A CN201711062442 A CN 201711062442A CN 107643977 B CN107643977 B CN 107643977B
Authority
CN
China
Prior art keywords
user
user identifier
limited
overtime
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201711062442.9A
Other languages
Chinese (zh)
Other versions
CN107643977A (en
Inventor
邵强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711062442.9A priority Critical patent/CN107643977B/en
Publication of CN107643977A publication Critical patent/CN107643977A/en
Application granted granted Critical
Publication of CN107643977B publication Critical patent/CN107643977B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an anti-addiction method and a related product, comprising the following steps: receiving first verification information input aiming at an identity verification interface on a terminal; when a first user identifier corresponding to the first verification information is judged to be a limited user, detecting an operation duration corresponding to the first user identifier and a limited application on the terminal; judging whether the operation duration reaches a limit duration corresponding to the first user identifier; and if the operation duration reaches the limit duration corresponding to the first user identifier, limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier. Correspondingly, the invention also discloses an anti-addiction device. By adopting the invention, the time length of the limited application on the terminal used by the limited user can be controlled, and the function of the terminal is enhanced.

Description

Anti-addiction method and related product
Technical Field
The invention relates to the technical field of electronics, in particular to an anti-addiction method and a related product.
Background
At present, many parents configure terminal devices, such as mobile phones, tablet computers, notebook computers and the like, for children, so that on one hand, the feelings between the parents and the children can be enhanced, and on the other hand, certain negative effects are brought to the children; due to poor continence of children, it is easy to indulge in games or to surf the internet for a long time and watch movies, which not only injures the eyes of the children, but also may seriously affect the learning of the children.
The prior art discloses an anti-addiction method: controlling the time of using the terminal equipment by a child by setting the starting time and the shutdown time of the terminal equipment; although the method controls the time for the child to use the terminal device, the method also limits the child to use other useful functions of the terminal device, and the basic functions may not affect the child, so that the anti-addiction method provided by the prior art is not humanized enough and does not meet the market requirements.
Disclosure of Invention
The invention provides an anti-addiction method and a related product, which can control the time of a limited user using a limited application on a terminal and enhance the function of the terminal.
The invention provides an anti-addiction method, which comprises the following steps:
receiving first verification information input aiming at an identity verification interface on a terminal;
when a first user identifier corresponding to the first verification information is judged to be a limited user, detecting an operation duration corresponding to the first user identifier and a limited application on the terminal;
judging whether the operation duration reaches a limit duration corresponding to the first user identifier;
and if the operation duration reaches the limit duration corresponding to the first user identifier, limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier.
Correspondingly, the invention also provides an anti-addiction device, which comprises:
the authentication information receiving module is used for receiving first authentication information input aiming at an identity authentication interface on the terminal;
the first judging module is used for judging whether a first user identifier corresponding to the first verification information is a limited user;
an operation duration detection module, configured to detect, if the first user identifier is the limited user, an operation duration corresponding to the first user identifier for the limited application on the terminal;
the second judging module is used for judging whether the operation duration detected by the operation duration detecting module reaches the limit duration corresponding to the first user identifier;
and the processing module is used for limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier if the operation duration reaches the limit duration corresponding to the first user identifier.
The implementation of the invention has the following beneficial effects:
according to the method and the device, when the first user identification corresponding to the first verification information is judged to be the limited user, the operation duration corresponding to the first user identification of the limited application on the terminal is detected, and when the operation duration is detected to reach the limit duration corresponding to the first user identification, the limited application on the terminal is limited to receive the operation instruction corresponding to the first user identification, so that the duration of the limited application on the terminal used by the limited user is controlled, the function of the terminal is enhanced, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of an anti-addiction method provided by an embodiment of the invention;
FIG. 2 is a flow chart of another anti-addiction method provided by the embodiment of the invention;
FIG. 3 is a flow chart of another anti-addiction method provided by embodiments of the present invention;
fig. 4 is a schematic structural diagram of an anti-settling device provided in an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a first determining module according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an operation duration detection module according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a schematic flow chart of an anti-addiction method according to an embodiment of the present invention; the anti-addiction method provided by the embodiment of the present invention may be implemented on a terminal device such as a mobile phone, a PAD, or a notebook computer, and as shown in fig. 1, the anti-addiction method in the embodiment may include:
step S101, receiving first verification information input aiming at an identity verification interface on a terminal;
the first verification information may be fingerprint, sliding track, number or face information, etc.;
the terminal can display the identity authentication interface when the system is initialized; the terminal can also provide a button or icon switched by the user, and the authentication interface is displayed when the button or icon switched by the user is triggered;
step S102, when a first user identification corresponding to the first verification information is judged to be a limited user, detecting an operation duration corresponding to the first user identification and a limited application on the terminal;
specifically, when the terminal receives first verification information input for an authentication interface on the terminal, the terminal may determine whether a first user identifier corresponding to the first verification information is a limited user.
Optionally, the terminal may acquire authentication information of the user by collecting, set a corresponding user identifier for each authentication information, and set a user category for the user identifier, where the user category may be a limited user or a non-limited user; or, the terminal may download a user identifier list of the limited user from the network side, where the user identifier list of the limited user includes the user identifier of the limited user and corresponding verification information;
the specific step of the terminal determining whether the first user identifier corresponding to the first verification information is a limited user may be: and acquiring a first user identifier corresponding to the first verification information, detecting whether the first user identifier corresponding to the first verification information is contained in a pre-stored user identifier list of a limited user, and if so, judging that the first user identifier corresponding to the first verification information is the limited user.
When the first user identification corresponding to the first verification information is judged to be a limited user, detecting the operation duration of the limited application on the terminal corresponding to the first user identification; specifically, the terminal may detect whether an application in a foreground on the terminal is included in a limited application list, and if the application in the foreground is included in the limited application list, record an operation duration corresponding to the first user identifier of the limited application in the foreground; because the application can run in the background, only the operation duration of the application in the foreground is recorded, and the accuracy is improved;
the restricted application list may be determined according to the setting of the unrestricted user, for example, the unrestricted user selects some/each application on the terminal as the restricted application, so as to generate the restricted application list; or, the limited application list may be downloaded by the terminal from the network side; or, the limited application list may be determined according to the settings of the unrestricted user and network side downloading, and assuming that the limited applications set by the unrestricted user include A, B and C, and the limited applications in the limited application list downloaded by the terminal include B, C and D, the limited applications in the limited application list determined according to the settings of the unrestricted user and network side downloading include A, B, C and D;
further, if the application in the foreground is included in the limited application list, the terminal may further detect whether the running time of the limited application in the foreground is within a preset limited time period, and if the running time is within the limited time period, record an operation duration corresponding to the first user identifier of the limited application in the foreground;
it should be noted that, when the first user identifier corresponding to the first verification information is determined as the limited user, the terminal may not monitor the operation duration corresponding to the first user identifier of the non-limited application on the terminal, where the non-limited application may include at least one application of making a call, sending a short message, taking a picture, and the like.
Step S103, judging whether the operation duration reaches a limit duration corresponding to the first user identifier;
the limited user has limited operation time for the limited application; each terminal can set at least one limited user, and the non-limited user associated with the limited user can set the limit duration corresponding to the operation limited application of each limited user; specifically, before receiving first verification information input aiming at an identity verification interface on the terminal, the terminal may also receive second verification information input aiming at the identity verification interface on the terminal, and when a second user identifier corresponding to the second verification information is determined to be an unlimited user, a setting instruction of a limit duration corresponding to the first user identifier is received, and the input limit duration corresponding to the first user identifier is extracted and stored;
it should be noted that how the terminal determines that the second user identifier corresponding to the second verification information is an unrestricted user may refer to how to determine that the first user identifier corresponding to the first verification information is a restricted user, which is not described herein again;
specifically, the terminal may determine whether the operation duration reaches a limit duration corresponding to the first user identifier, and if the operation duration reaches the limit duration corresponding to the first user identifier, execute step S104; otherwise, continuously detecting the operation duration corresponding to the first user identification by the limited application on the terminal;
step S104, limiting the limited application on the terminal to receive an operation instruction corresponding to the first user identification;
specifically, if the operation duration reaches the limit duration corresponding to the first user identifier, limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier; that is, if the operation duration reaches the limit duration corresponding to the first user identifier, the terminal forcibly terminates the limited application, and even if an execution instruction for the limited application is received, the terminal does not execute the application program of the limited application; optionally, if the operation duration reaches the limit duration corresponding to the first user identifier, the terminal may further hide an application icon of the limited application on the terminal.
In the embodiment shown in fig. 1, when the first user identifier corresponding to the first verification information is determined as the limited user, the operation duration corresponding to the first user identifier of the limited application on the terminal is detected, and when it is detected that the operation duration reaches the limit duration corresponding to the first user identifier, the limited application on the terminal receives the operation instruction corresponding to the first user identifier, so that the duration of the limited application on the terminal used by the limited user is controlled, and the function of the terminal is enhanced.
Referring to fig. 2, fig. 2 is a schematic flow chart of another anti-addiction method according to an embodiment of the present invention; the anti-addiction method provided by the embodiment of the present invention may be implemented on a terminal device such as a mobile phone, a PAD, or a notebook computer, for example, as shown in fig. 2, the anti-addiction method in the embodiment may include:
step S201, receiving first verification information input aiming at an identity verification interface on a terminal;
the first verification information may be fingerprint, sliding track, number or face information, etc.;
the terminal can display the identity authentication interface when the system is initialized; the terminal can also provide a button or icon switched by the user, and the authentication interface is displayed when the button or icon switched by the user is triggered;
step S202, judging whether a first user identification corresponding to the first verification information is a limited user; if the first user identifier corresponding to the first verification information is a limited user, executing step S204; if the first user identifier corresponding to the first verification information is not a limited user, that is, the first user identifier corresponding to the first verification information is an unlimited user, then step S203 is executed;
optionally, the terminal may acquire authentication information of the user by collecting, set a corresponding user identifier for each authentication information, and set a user category for the user identifier, where the user category may be a limited user or a non-limited user; or, the terminal may download a user identifier list of the limited user from the network side, where the user identifier list of the limited user includes the user identifier of the limited user and corresponding verification information;
the specific step of the terminal determining whether the first user identifier corresponding to the first verification information is a limited user may be: and acquiring a first user identifier corresponding to the first verification information, detecting whether the first user identifier corresponding to the first verification information is contained in a pre-stored user identifier list of a limited user, and if so, judging that the first user identifier corresponding to the first verification information is the limited user.
Step S203, entering an unlimited mode;
specifically, if the first user identifier corresponding to the first verification information is not a limited user, the operation duration of the limited application on the terminal corresponding to the first user identifier is not monitored.
Step S204, detecting whether the application in the foreground on the terminal is contained in a limited application list; if the application in the foreground on the terminal is included in the limited application list, executing step S205;
the restricted application list may be determined according to the setting of the unrestricted user, for example, the unrestricted user selects some/each application on the terminal as the restricted application, so as to generate the restricted application list; or, the limited application list may be downloaded by the terminal from the network side; or, the limited application list may be determined according to the settings of the unrestricted user and network side downloading, and assuming that the limited applications set by the unrestricted user include A, B and C, and the limited applications in the limited application list downloaded by the terminal include B, C and D, the limited applications in the limited application list determined according to the settings of the unrestricted user and network side downloading include A, B, C and D;
further, if the application in the foreground is included in the limited application list, the terminal may further detect whether the running time of the limited application in the foreground is within a preset limited time period, and if the running time is within the limited time period, perform step S205.
Step S205, recording the operation duration corresponding to the first user identifier of the limited application in the foreground;
step S206, judging whether the operation duration reaches a limit duration corresponding to the first user identifier; if the operation duration reaches the limit duration corresponding to the first user identifier, executing step S207;
further, the terminal may set at least one reminding time point, that is, when a difference between the limiting time length corresponding to the first user identifier and the operation time length is equal to the set time length threshold, the terminal reminds the user; if the remaining time is only 15 minutes, reminding the user that only 15 minutes remain; when the remaining time is only 1 minute, reminding the user of only 1 minute;
step S207, receiving the input overtime length corresponding to the first user identifier, and generating an overtime application request according to the overtime length;
step S208, a communication address corresponding to the second user identification is obtained, and the overtime application request is sent to the communication address;
the communication address corresponding to the second user identifier may be a mobile phone number, a mailbox address, a micro signal or a QQ number corresponding to the second user identifier, or the like; when an overtime application request is generated according to the overtime duration, the terminal can acquire a communication address corresponding to the second user identification and send the overtime application request to the communication address, the communication address takes a mobile phone number as an example, and the terminal can set the overtime application request as a short message and send the short message to the corresponding terminal through the mobile phone number;
when the authorized user of the first user identifier is not nearby, the overtime application request can be sent through a preset contact mode, the design is humanized, and the user experience is enhanced.
Step S209, receiving a returned overtime confirmation response corresponding to the second subscriber identity, and extending the time limit according to the overtime.
When receiving a returned overtime confirmation response corresponding to the second subscriber identity, returning the overtime as a limited time length to execute step S205.
In the embodiment shown in fig. 2, when it is detected that the operation duration reaches the limit duration corresponding to the first subscriber identity, the overtime duration corresponding to the first subscriber identity that is input may be received, an overtime application request is generated according to the overtime duration, and the overtime application request is sent to the communication address corresponding to the second subscriber identity, so that the overtime application request is sent through a preset contact manner when the authorized subscriber of the first subscriber identity is not nearby, and the user experience is enhanced due to humanized design.
Referring to fig. 3, fig. 3 is a schematic flow chart of another anti-addiction method according to an embodiment of the present invention; the anti-addiction method provided by the embodiment of the invention can be realized on terminal equipment such as a mobile phone, a PAD or a notebook computer; the anti-addiction method shown in fig. 3 is different from the anti-addiction method shown in fig. 2 in that:
step S308, displaying the generated overtime application request;
step S309, receiving second verification information corresponding to a second user identification input aiming at the displayed overtime application request, and prolonging the limit time length according to the overtime time length.
Step S301 to step S307 in this embodiment are the same as step S201 to step S207 in the previous embodiment, and are not described herein again;
the embodiment shown in fig. 3 is applicable to a scenario where an unrestricted user associated with a restricted user is near the restricted user, and when an overtime application request is generated, the generated overtime application request is displayed, and if second verification information corresponding to a second user identifier input for the displayed overtime application request is received, that is, when an authorization instruction for the overtime application request is received, the time limit duration is extended according to the time increase duration, which is more convenient and faster than the previous embodiment.
Please refer to fig. 4, fig. 4 is a schematic structural diagram of an anti-addiction device according to an embodiment of the present invention; the device for preventing addiction provided by the embodiment of the invention can be realized in terminal equipment such as a mobile phone, a PAD or a notebook computer; the anti-addiction device in the embodiment of the present invention as shown in fig. 4 may include at least: a verification information receiving module 401, a first judging module 402, an operation duration detecting module 403, a second judging module 404 and a processing module 405, wherein:
a verification information receiving module 401, configured to receive first verification information input for an authentication interface on a terminal;
a first determining module 402, configured to determine whether a first user identifier corresponding to the first verification information is a limited user;
the first judging module 402 shown in fig. 5 may further include a detecting unit 4021 and a judging unit 4022, where:
a detecting unit 4021, configured to detect whether a first user identifier corresponding to the first verification information is included in a pre-stored user identifier list of a limited user;
a determining unit 4022, configured to determine that the first user identifier corresponding to the first verification information is the limited user if the first user identifier is included in the user identifier list of the limited user.
An operation duration detection module 403, configured to detect, if the first user identifier is the limited user, an operation duration corresponding to the first user identifier and a limited application on the terminal;
the operation duration detection module 403 further includes a first detection unit 4031 and a recording unit 4032 as shown in fig. 6, wherein:
a first detecting unit 4031, configured to detect whether an application in a foreground on the terminal is included in the restricted application list;
a recording unit 4032, configured to record, if the application in the foreground is included in the limited application list, an operation duration corresponding to the first user identifier of the limited application in the foreground.
Further optionally, the operation duration detection module 403 may further include a second detection unit 4033, configured to detect, if the application in the foreground is included in the limited application list, whether an operation time of the application in the foreground is within a preset limited time period, and if the operation time is within the limited time period, trigger the recording unit 4032.
A second determining module 404, configured to determine whether the operation duration detected by the operation duration detecting module 403 reaches a time limit corresponding to the first subscriber identity;
a processing module 405, configured to, if the operation duration reaches the limit duration corresponding to the first user identifier, limit the restricted application on the terminal from receiving the operation instruction corresponding to the first user identifier.
Further, the verification information receiving module 401 is further configured to: receiving second verification information input aiming at an identity verification interface on the terminal; the first determining module 402 is further configured to: judging whether a second user identification corresponding to the second verification information is a limited user; the anti-addiction device 4 may further include a setting module 406, configured to receive a setting instruction of the limited duration corresponding to the first user identifier when the second user identifier is an unrestricted user, extract the input limited duration corresponding to the first user identifier, and store the extracted limited duration.
In an optional embodiment, if the operation duration reaches the limit duration corresponding to the first user identifier, the anti-addiction device 4 may further include: an overtime duration receiving module 407, an overtime application request generating module 408, a communication sending module 409 and a communication receiving module 410, wherein:
a overtime length receiving module 407, configured to receive an input overtime length corresponding to the first user identifier;
an overtime application request generating module 408, configured to generate an overtime application request according to the time-adding duration;
a communication sending module 409, configured to obtain a communication address corresponding to the second user identifier, and send the overtime application request to the communication address;
a communication receiving module 410, configured to receive a returned overtime confirmation response corresponding to the second subscriber identity, and extend the limit time length according to the overtime length.
Further, if the communication receiving module 410 does not receive a returned time-adding confirmation response corresponding to the second user identifier, the processing module 405 is triggered;
in another optional implementation manner, if the operation duration reaches the limit duration corresponding to the first user identifier, the anti-addiction device 4 may further include: a display module 411, configured to display the overtime application request generated by the overtime application request generation module 408; the verification information receiving module 401 is further configured to: receiving second verification information corresponding to a second user identifier input by the overtime application request displayed by the display module 411, and extending the limit time length according to the overtime time length.
Further, if the verification information receiving module 401 does not receive second verification information corresponding to a second user identifier input by the overtime application request displayed by the display module 411, the processing module 405 is triggered;
it can be understood that the functions of the functional modules of the anti-addiction device 4 of the present embodiment may be specifically implemented according to the method in the foregoing method embodiment, and may specifically correspond to the related description of the method embodiment with reference to fig. 1 to fig. 3, which is not repeated herein.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that acts and modules referred to are not necessarily required to practice embodiments of the invention.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The modules or units in the device of the embodiment of the invention can be combined, divided and deleted according to actual needs.
The modules or units in the embodiments of the present invention may be implemented by a general-purpose Integrated Circuit, such as a CPU (Central Processing Unit), or an ASIC (Application Specific Integrated Circuit).
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (9)

1. An anti-addiction method, said method comprising:
receiving first verification information input aiming at an identity verification interface on a terminal;
when a first user identifier corresponding to the first verification information is judged to be a limited user, detecting an operation duration corresponding to the first user identifier and a limited application on the terminal;
judging whether the operation duration reaches a limit duration corresponding to the first user identifier;
when the difference value between the limiting time length corresponding to the first user identification and the operation time length is equal to a set time length threshold value, reminding a user;
if the operation duration reaches the limit duration corresponding to the first user identifier, limiting the limited application on the terminal to receive an operation instruction corresponding to the first user identifier, and hiding an icon of the limited application;
if the operation duration reaches the limit duration corresponding to the first user identifier, the method further includes:
receiving input overtime time corresponding to the first user identifier, and generating an overtime application request according to the overtime time;
acquiring a communication address corresponding to a second user identification, and sending the overtime application request to the communication address;
and receiving a returned overtime confirmation response corresponding to the second user identifier, and prolonging the limit time length according to the overtime time length.
2. The method of claim 1, wherein prior to receiving the first authentication information input for the authentication interface on the terminal, the method further comprises:
receiving second verification information input aiming at an identity verification interface on the terminal;
and when the second user identification corresponding to the second verification information is determined to be an unlimited user, receiving a setting instruction of the limiting time length corresponding to the first user identification, extracting and storing the input limiting time length corresponding to the first user identification.
3. The method according to claim 1 or 2, wherein if the operation duration reaches a limit duration corresponding to the first subscriber identity, the method further comprises:
receiving input overtime time corresponding to the first user identifier, generating an overtime application request according to the overtime time, and displaying the overtime application request;
and receiving second verification information corresponding to a second user identification input aiming at the displayed overtime application request, and prolonging the limit time according to the overtime time.
4. The method according to claim 3, wherein the step of limiting the restricted application on the terminal from receiving the operation instruction corresponding to the first subscriber identity is performed if a returned overtime confirmation response corresponding to the second subscriber identity is not received or second authentication information corresponding to the second subscriber identity input for the displayed overtime application request is not received.
5. The method of claim 1 or 2, wherein after receiving the first authentication information input for the authentication interface on the terminal, the method further comprises:
detecting whether a first user identifier corresponding to the first verification information is contained in a pre-stored user identifier list of the limited user;
and if the first user identification is contained in the user identification list of the limited user, determining that the first user identification corresponding to the first verification information is the limited user.
6. The method of claim 1 or 2, wherein the detecting the operation duration of the restricted application on the terminal corresponding to the first subscriber identity comprises:
detecting whether an application in a foreground on the terminal is contained in a pre-stored limited application list or not;
if the application in the foreground is contained in the limited application list, recording the operation duration corresponding to the first user identifier of the limited application in the foreground.
7. The method of claim 6, wherein if the application in the foreground is included in the list of restricted applications, the method further comprises:
detecting whether the running time of the limited application in the foreground is within a preset limited time period or not;
and if the running time is within the limited time period, executing the step of recording the operation duration corresponding to the first user identifier and the limited application in the foreground.
8. An anti-addiction device, said device comprising:
the authentication information receiving module is used for receiving first authentication information input aiming at an identity authentication interface on the terminal;
the first judging module is used for judging whether a first user identifier corresponding to the first verification information is a limited user;
an operation duration detection module, configured to detect, if the first user identifier is the limited user, an operation duration corresponding to the first user identifier for the limited application on the terminal;
the second judging module is used for judging whether the operation duration detected by the operation duration detecting module reaches the limit duration corresponding to the first user identifier;
the device is further used for reminding the user when the difference value between the limiting time length corresponding to the first user identification and the operation time length is equal to a set time length threshold value;
the processing module is used for limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier and hiding the icon of the limited application if the operation duration reaches the limit duration corresponding to the first user identifier;
the overtime length receiving module is used for receiving the input overtime length corresponding to the first user identifier;
the overtime application request generating module is used for generating an overtime application request according to the overtime duration;
the communication sending module is used for acquiring a communication address corresponding to a second user identifier and sending the overtime application request to the communication address;
and the communication receiving module is used for receiving a returned overtime confirmation response corresponding to the second user identifier and prolonging the limit time length according to the overtime length.
9. A computer storage medium for storing a computer program, wherein the computer program causes a computer to perform the method of any one of claims 1-7.
CN201711062442.9A 2015-03-25 2015-03-25 Anti-addiction method and related product Expired - Fee Related CN107643977B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711062442.9A CN107643977B (en) 2015-03-25 2015-03-25 Anti-addiction method and related product

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711062442.9A CN107643977B (en) 2015-03-25 2015-03-25 Anti-addiction method and related product
CN201510134830.8A CN104765993B (en) 2015-03-25 2015-03-25 A kind of method and apparatus of Anti-addiction

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510134830.8A Division CN104765993B (en) 2015-03-25 2015-03-25 A kind of method and apparatus of Anti-addiction

Publications (2)

Publication Number Publication Date
CN107643977A CN107643977A (en) 2018-01-30
CN107643977B true CN107643977B (en) 2021-04-02

Family

ID=53647818

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201711062442.9A Expired - Fee Related CN107643977B (en) 2015-03-25 2015-03-25 Anti-addiction method and related product
CN201510134830.8A Expired - Fee Related CN104765993B (en) 2015-03-25 2015-03-25 A kind of method and apparatus of Anti-addiction

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201510134830.8A Expired - Fee Related CN104765993B (en) 2015-03-25 2015-03-25 A kind of method and apparatus of Anti-addiction

Country Status (1)

Country Link
CN (2) CN107643977B (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105353958B (en) * 2015-10-28 2018-03-16 广东欧珀移动通信有限公司 The control method and device of terminal applies
CN105718292A (en) * 2016-02-22 2016-06-29 广东欧珀移动通信有限公司 Software use control method and device and mobile terminal
CN105938543A (en) * 2016-03-30 2016-09-14 乐视控股(北京)有限公司 Addiction-prevention-based terminal operation control method, device, and system
CN105786609A (en) * 2016-03-30 2016-07-20 北京小米移动软件有限公司 Control method and device of terminal
CN107306293B (en) * 2016-04-25 2021-10-15 中兴通讯股份有限公司 Anti-addiction method and system
CN107305503A (en) * 2016-04-25 2017-10-31 奇酷软件(深圳)有限公司 The control method of terminal, the control device of terminal and terminal
CN107395386A (en) * 2016-05-17 2017-11-24 阿里巴巴集团控股有限公司 A kind of method and system, gateway device for controlling intelligent terminal
CN106055100B (en) * 2016-05-26 2018-11-20 广东欧珀移动通信有限公司 A kind of Anti-addiction method, apparatus and terminal device
CN106095637B (en) * 2016-05-26 2020-01-14 Oppo广东移动通信有限公司 Intelligent terminal control method and device and intelligent terminal
EP3508997B1 (en) * 2016-09-24 2023-04-19 Huawei Technologies Co., Ltd. Offline management method for application use time, and terminal device
CN106255110A (en) * 2016-09-30 2016-12-21 维沃移动通信有限公司 A kind of mobile terminal network resource uses the method and mobile terminal authorized
CN106681814A (en) * 2016-12-15 2017-05-17 宇龙计算机通信科技(深圳)有限公司 Anti-addiction method and terminal
CN106844174B (en) * 2017-01-17 2020-09-29 河南工业大学 Method and system for limiting time of continuous use of single electronic equipment
CN108319366A (en) * 2018-01-22 2018-07-24 四川斐讯信息技术有限公司 A kind of control method and system of Anti-addiction
CN108494841B (en) * 2018-03-13 2020-05-22 广东小天才科技有限公司 Management and control method and device based on use condition of terminal equipment
CN109617852B (en) * 2018-03-29 2020-10-13 腾讯科技(深圳)有限公司 Method and device for preventing network addiction based on flow analysis
CN108710786A (en) * 2018-03-30 2018-10-26 努比亚技术有限公司 A kind of method of Anti-addiction, equipment and computer readable storage medium
CN109302394A (en) * 2018-09-29 2019-02-01 武汉极意网络科技有限公司 A kind of anti-simulation login method of terminal, device, server and storage medium
CN109614785B (en) * 2018-11-01 2021-05-25 Oppo广东移动通信有限公司 Application operation control method and device, storage medium and electronic equipment
CN109582535B (en) * 2018-11-01 2022-06-14 Oppo广东移动通信有限公司 Application operation control method and device, storage medium and electronic equipment
CN110263518A (en) * 2019-05-31 2019-09-20 新疆爱华盈通信息技术有限公司 Electronic equipment and its application method
CN112152971A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and apparatus for controlling network usage behavior, electronic device, and medium
CN110688973B (en) * 2019-09-30 2022-05-13 Oppo广东移动通信有限公司 Equipment control method and related product
JP7125066B2 (en) * 2020-07-15 2022-08-24 ホアウェイ・テクノロジーズ・カンパニー・リミテッド Method and terminal device for managing application program usage time offline
CN117395066B (en) * 2023-11-08 2024-06-04 深圳市时迅迪科技有限公司 Network security monitoring system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201047A (en) * 2010-11-09 2011-09-28 湖南创合制造有限公司 Computer management method
CN103024168A (en) * 2012-12-07 2013-04-03 广东欧珀移动通信有限公司 Mobile phone monitoring and control method
CN104063655A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Child mode processing method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094069A (en) * 2007-07-18 2007-12-26 汪铁良 System with function of recognizing fingerprint for preventing enthrallment on network
WO2010103110A2 (en) * 2009-03-13 2010-09-16 Metaboli System and method for controlling the use of applications on a computer
CN103607513A (en) * 2013-11-26 2014-02-26 广东欧珀移动通信有限公司 Method for controlling application to be used and intelligent terminal
CN104143057A (en) * 2014-07-11 2014-11-12 上海一端科技有限公司 Method of independently controlling mobile terminal application program entering right
CN104331355B (en) * 2014-11-28 2017-10-13 广东欧珀移动通信有限公司 The Anti-addiction method and apparatus of mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201047A (en) * 2010-11-09 2011-09-28 湖南创合制造有限公司 Computer management method
CN103024168A (en) * 2012-12-07 2013-04-03 广东欧珀移动通信有限公司 Mobile phone monitoring and control method
CN104063655A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Child mode processing method and device

Also Published As

Publication number Publication date
CN104765993A (en) 2015-07-08
CN107643977A (en) 2018-01-30
CN104765993B (en) 2017-11-14

Similar Documents

Publication Publication Date Title
CN107643977B (en) Anti-addiction method and related product
RU2643473C2 (en) Method and tools for fingerprinting identification
US20190104340A1 (en) Intelligent Terminal Control Method and Intelligent Terminal
CN109075820B (en) Bluetooth pairing method, terminal device and readable storage medium
US20170163580A1 (en) Interactive method and device for playback of multimedia
US20160028741A1 (en) Methods and devices for verification using verification code
US10425403B2 (en) Method and device for accessing smart camera
CN106778175B (en) Interface locking method and device and terminal equipment
CN106170004B (en) Method and device for processing verification code
CN107346397B (en) Information processing method and related product
US20170171321A1 (en) Methods and devices for managing accounts
CN104717622B (en) Information forwarding method and device, terminal and server
CN105407098A (en) Identity verification method and device
CN105512545B (en) Access rights management method and device
CN103716309A (en) Security authentication method and terminal
CN107506646B (en) Malicious application detection method and device and computer readable storage medium
CN107666583B (en) Call processing method and terminal
CN108121631B (en) Screen abnormal state reminding method and device
CN104933170A (en) Information exhibition method and device
CN108960839B (en) Payment method and device
CN104331668A (en) Wrong password prompting method and device
EP3016349A1 (en) Method and apparatus for verifying terminal and computer program product
US20170161011A1 (en) Play control method and electronic client
US20170180807A1 (en) Method and electronic device for amplifying video image
CN105323244A (en) Method and device for network identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: No.18, Wusha Haibin Road, Chang'an Town, Dongguan City, Guangdong Province

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210402