CN107643977B - Anti-addiction method and related product - Google Patents
Anti-addiction method and related product Download PDFInfo
- Publication number
- CN107643977B CN107643977B CN201711062442.9A CN201711062442A CN107643977B CN 107643977 B CN107643977 B CN 107643977B CN 201711062442 A CN201711062442 A CN 201711062442A CN 107643977 B CN107643977 B CN 107643977B
- Authority
- CN
- China
- Prior art keywords
- user
- user identifier
- limited
- overtime
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 206010012335 Dependence Diseases 0.000 title claims abstract description 32
- 238000012795 verification Methods 0.000 claims abstract description 68
- 238000004891 communication Methods 0.000 claims description 20
- 238000001514 detection method Methods 0.000 claims description 8
- 238000012790 confirmation Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Landscapes
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses an anti-addiction method and a related product, comprising the following steps: receiving first verification information input aiming at an identity verification interface on a terminal; when a first user identifier corresponding to the first verification information is judged to be a limited user, detecting an operation duration corresponding to the first user identifier and a limited application on the terminal; judging whether the operation duration reaches a limit duration corresponding to the first user identifier; and if the operation duration reaches the limit duration corresponding to the first user identifier, limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier. Correspondingly, the invention also discloses an anti-addiction device. By adopting the invention, the time length of the limited application on the terminal used by the limited user can be controlled, and the function of the terminal is enhanced.
Description
Technical Field
The invention relates to the technical field of electronics, in particular to an anti-addiction method and a related product.
Background
At present, many parents configure terminal devices, such as mobile phones, tablet computers, notebook computers and the like, for children, so that on one hand, the feelings between the parents and the children can be enhanced, and on the other hand, certain negative effects are brought to the children; due to poor continence of children, it is easy to indulge in games or to surf the internet for a long time and watch movies, which not only injures the eyes of the children, but also may seriously affect the learning of the children.
The prior art discloses an anti-addiction method: controlling the time of using the terminal equipment by a child by setting the starting time and the shutdown time of the terminal equipment; although the method controls the time for the child to use the terminal device, the method also limits the child to use other useful functions of the terminal device, and the basic functions may not affect the child, so that the anti-addiction method provided by the prior art is not humanized enough and does not meet the market requirements.
Disclosure of Invention
The invention provides an anti-addiction method and a related product, which can control the time of a limited user using a limited application on a terminal and enhance the function of the terminal.
The invention provides an anti-addiction method, which comprises the following steps:
receiving first verification information input aiming at an identity verification interface on a terminal;
when a first user identifier corresponding to the first verification information is judged to be a limited user, detecting an operation duration corresponding to the first user identifier and a limited application on the terminal;
judging whether the operation duration reaches a limit duration corresponding to the first user identifier;
and if the operation duration reaches the limit duration corresponding to the first user identifier, limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier.
Correspondingly, the invention also provides an anti-addiction device, which comprises:
the authentication information receiving module is used for receiving first authentication information input aiming at an identity authentication interface on the terminal;
the first judging module is used for judging whether a first user identifier corresponding to the first verification information is a limited user;
an operation duration detection module, configured to detect, if the first user identifier is the limited user, an operation duration corresponding to the first user identifier for the limited application on the terminal;
the second judging module is used for judging whether the operation duration detected by the operation duration detecting module reaches the limit duration corresponding to the first user identifier;
and the processing module is used for limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier if the operation duration reaches the limit duration corresponding to the first user identifier.
The implementation of the invention has the following beneficial effects:
according to the method and the device, when the first user identification corresponding to the first verification information is judged to be the limited user, the operation duration corresponding to the first user identification of the limited application on the terminal is detected, and when the operation duration is detected to reach the limit duration corresponding to the first user identification, the limited application on the terminal is limited to receive the operation instruction corresponding to the first user identification, so that the duration of the limited application on the terminal used by the limited user is controlled, the function of the terminal is enhanced, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of an anti-addiction method provided by an embodiment of the invention;
FIG. 2 is a flow chart of another anti-addiction method provided by the embodiment of the invention;
FIG. 3 is a flow chart of another anti-addiction method provided by embodiments of the present invention;
fig. 4 is a schematic structural diagram of an anti-settling device provided in an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a first determining module according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an operation duration detection module according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a schematic flow chart of an anti-addiction method according to an embodiment of the present invention; the anti-addiction method provided by the embodiment of the present invention may be implemented on a terminal device such as a mobile phone, a PAD, or a notebook computer, and as shown in fig. 1, the anti-addiction method in the embodiment may include:
step S101, receiving first verification information input aiming at an identity verification interface on a terminal;
the first verification information may be fingerprint, sliding track, number or face information, etc.;
the terminal can display the identity authentication interface when the system is initialized; the terminal can also provide a button or icon switched by the user, and the authentication interface is displayed when the button or icon switched by the user is triggered;
step S102, when a first user identification corresponding to the first verification information is judged to be a limited user, detecting an operation duration corresponding to the first user identification and a limited application on the terminal;
specifically, when the terminal receives first verification information input for an authentication interface on the terminal, the terminal may determine whether a first user identifier corresponding to the first verification information is a limited user.
Optionally, the terminal may acquire authentication information of the user by collecting, set a corresponding user identifier for each authentication information, and set a user category for the user identifier, where the user category may be a limited user or a non-limited user; or, the terminal may download a user identifier list of the limited user from the network side, where the user identifier list of the limited user includes the user identifier of the limited user and corresponding verification information;
the specific step of the terminal determining whether the first user identifier corresponding to the first verification information is a limited user may be: and acquiring a first user identifier corresponding to the first verification information, detecting whether the first user identifier corresponding to the first verification information is contained in a pre-stored user identifier list of a limited user, and if so, judging that the first user identifier corresponding to the first verification information is the limited user.
When the first user identification corresponding to the first verification information is judged to be a limited user, detecting the operation duration of the limited application on the terminal corresponding to the first user identification; specifically, the terminal may detect whether an application in a foreground on the terminal is included in a limited application list, and if the application in the foreground is included in the limited application list, record an operation duration corresponding to the first user identifier of the limited application in the foreground; because the application can run in the background, only the operation duration of the application in the foreground is recorded, and the accuracy is improved;
the restricted application list may be determined according to the setting of the unrestricted user, for example, the unrestricted user selects some/each application on the terminal as the restricted application, so as to generate the restricted application list; or, the limited application list may be downloaded by the terminal from the network side; or, the limited application list may be determined according to the settings of the unrestricted user and network side downloading, and assuming that the limited applications set by the unrestricted user include A, B and C, and the limited applications in the limited application list downloaded by the terminal include B, C and D, the limited applications in the limited application list determined according to the settings of the unrestricted user and network side downloading include A, B, C and D;
further, if the application in the foreground is included in the limited application list, the terminal may further detect whether the running time of the limited application in the foreground is within a preset limited time period, and if the running time is within the limited time period, record an operation duration corresponding to the first user identifier of the limited application in the foreground;
it should be noted that, when the first user identifier corresponding to the first verification information is determined as the limited user, the terminal may not monitor the operation duration corresponding to the first user identifier of the non-limited application on the terminal, where the non-limited application may include at least one application of making a call, sending a short message, taking a picture, and the like.
Step S103, judging whether the operation duration reaches a limit duration corresponding to the first user identifier;
the limited user has limited operation time for the limited application; each terminal can set at least one limited user, and the non-limited user associated with the limited user can set the limit duration corresponding to the operation limited application of each limited user; specifically, before receiving first verification information input aiming at an identity verification interface on the terminal, the terminal may also receive second verification information input aiming at the identity verification interface on the terminal, and when a second user identifier corresponding to the second verification information is determined to be an unlimited user, a setting instruction of a limit duration corresponding to the first user identifier is received, and the input limit duration corresponding to the first user identifier is extracted and stored;
it should be noted that how the terminal determines that the second user identifier corresponding to the second verification information is an unrestricted user may refer to how to determine that the first user identifier corresponding to the first verification information is a restricted user, which is not described herein again;
specifically, the terminal may determine whether the operation duration reaches a limit duration corresponding to the first user identifier, and if the operation duration reaches the limit duration corresponding to the first user identifier, execute step S104; otherwise, continuously detecting the operation duration corresponding to the first user identification by the limited application on the terminal;
step S104, limiting the limited application on the terminal to receive an operation instruction corresponding to the first user identification;
specifically, if the operation duration reaches the limit duration corresponding to the first user identifier, limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier; that is, if the operation duration reaches the limit duration corresponding to the first user identifier, the terminal forcibly terminates the limited application, and even if an execution instruction for the limited application is received, the terminal does not execute the application program of the limited application; optionally, if the operation duration reaches the limit duration corresponding to the first user identifier, the terminal may further hide an application icon of the limited application on the terminal.
In the embodiment shown in fig. 1, when the first user identifier corresponding to the first verification information is determined as the limited user, the operation duration corresponding to the first user identifier of the limited application on the terminal is detected, and when it is detected that the operation duration reaches the limit duration corresponding to the first user identifier, the limited application on the terminal receives the operation instruction corresponding to the first user identifier, so that the duration of the limited application on the terminal used by the limited user is controlled, and the function of the terminal is enhanced.
Referring to fig. 2, fig. 2 is a schematic flow chart of another anti-addiction method according to an embodiment of the present invention; the anti-addiction method provided by the embodiment of the present invention may be implemented on a terminal device such as a mobile phone, a PAD, or a notebook computer, for example, as shown in fig. 2, the anti-addiction method in the embodiment may include:
step S201, receiving first verification information input aiming at an identity verification interface on a terminal;
the first verification information may be fingerprint, sliding track, number or face information, etc.;
the terminal can display the identity authentication interface when the system is initialized; the terminal can also provide a button or icon switched by the user, and the authentication interface is displayed when the button or icon switched by the user is triggered;
step S202, judging whether a first user identification corresponding to the first verification information is a limited user; if the first user identifier corresponding to the first verification information is a limited user, executing step S204; if the first user identifier corresponding to the first verification information is not a limited user, that is, the first user identifier corresponding to the first verification information is an unlimited user, then step S203 is executed;
optionally, the terminal may acquire authentication information of the user by collecting, set a corresponding user identifier for each authentication information, and set a user category for the user identifier, where the user category may be a limited user or a non-limited user; or, the terminal may download a user identifier list of the limited user from the network side, where the user identifier list of the limited user includes the user identifier of the limited user and corresponding verification information;
the specific step of the terminal determining whether the first user identifier corresponding to the first verification information is a limited user may be: and acquiring a first user identifier corresponding to the first verification information, detecting whether the first user identifier corresponding to the first verification information is contained in a pre-stored user identifier list of a limited user, and if so, judging that the first user identifier corresponding to the first verification information is the limited user.
Step S203, entering an unlimited mode;
specifically, if the first user identifier corresponding to the first verification information is not a limited user, the operation duration of the limited application on the terminal corresponding to the first user identifier is not monitored.
Step S204, detecting whether the application in the foreground on the terminal is contained in a limited application list; if the application in the foreground on the terminal is included in the limited application list, executing step S205;
the restricted application list may be determined according to the setting of the unrestricted user, for example, the unrestricted user selects some/each application on the terminal as the restricted application, so as to generate the restricted application list; or, the limited application list may be downloaded by the terminal from the network side; or, the limited application list may be determined according to the settings of the unrestricted user and network side downloading, and assuming that the limited applications set by the unrestricted user include A, B and C, and the limited applications in the limited application list downloaded by the terminal include B, C and D, the limited applications in the limited application list determined according to the settings of the unrestricted user and network side downloading include A, B, C and D;
further, if the application in the foreground is included in the limited application list, the terminal may further detect whether the running time of the limited application in the foreground is within a preset limited time period, and if the running time is within the limited time period, perform step S205.
Step S205, recording the operation duration corresponding to the first user identifier of the limited application in the foreground;
step S206, judging whether the operation duration reaches a limit duration corresponding to the first user identifier; if the operation duration reaches the limit duration corresponding to the first user identifier, executing step S207;
further, the terminal may set at least one reminding time point, that is, when a difference between the limiting time length corresponding to the first user identifier and the operation time length is equal to the set time length threshold, the terminal reminds the user; if the remaining time is only 15 minutes, reminding the user that only 15 minutes remain; when the remaining time is only 1 minute, reminding the user of only 1 minute;
step S207, receiving the input overtime length corresponding to the first user identifier, and generating an overtime application request according to the overtime length;
step S208, a communication address corresponding to the second user identification is obtained, and the overtime application request is sent to the communication address;
the communication address corresponding to the second user identifier may be a mobile phone number, a mailbox address, a micro signal or a QQ number corresponding to the second user identifier, or the like; when an overtime application request is generated according to the overtime duration, the terminal can acquire a communication address corresponding to the second user identification and send the overtime application request to the communication address, the communication address takes a mobile phone number as an example, and the terminal can set the overtime application request as a short message and send the short message to the corresponding terminal through the mobile phone number;
when the authorized user of the first user identifier is not nearby, the overtime application request can be sent through a preset contact mode, the design is humanized, and the user experience is enhanced.
Step S209, receiving a returned overtime confirmation response corresponding to the second subscriber identity, and extending the time limit according to the overtime.
When receiving a returned overtime confirmation response corresponding to the second subscriber identity, returning the overtime as a limited time length to execute step S205.
In the embodiment shown in fig. 2, when it is detected that the operation duration reaches the limit duration corresponding to the first subscriber identity, the overtime duration corresponding to the first subscriber identity that is input may be received, an overtime application request is generated according to the overtime duration, and the overtime application request is sent to the communication address corresponding to the second subscriber identity, so that the overtime application request is sent through a preset contact manner when the authorized subscriber of the first subscriber identity is not nearby, and the user experience is enhanced due to humanized design.
Referring to fig. 3, fig. 3 is a schematic flow chart of another anti-addiction method according to an embodiment of the present invention; the anti-addiction method provided by the embodiment of the invention can be realized on terminal equipment such as a mobile phone, a PAD or a notebook computer; the anti-addiction method shown in fig. 3 is different from the anti-addiction method shown in fig. 2 in that:
step S308, displaying the generated overtime application request;
step S309, receiving second verification information corresponding to a second user identification input aiming at the displayed overtime application request, and prolonging the limit time length according to the overtime time length.
Step S301 to step S307 in this embodiment are the same as step S201 to step S207 in the previous embodiment, and are not described herein again;
the embodiment shown in fig. 3 is applicable to a scenario where an unrestricted user associated with a restricted user is near the restricted user, and when an overtime application request is generated, the generated overtime application request is displayed, and if second verification information corresponding to a second user identifier input for the displayed overtime application request is received, that is, when an authorization instruction for the overtime application request is received, the time limit duration is extended according to the time increase duration, which is more convenient and faster than the previous embodiment.
Please refer to fig. 4, fig. 4 is a schematic structural diagram of an anti-addiction device according to an embodiment of the present invention; the device for preventing addiction provided by the embodiment of the invention can be realized in terminal equipment such as a mobile phone, a PAD or a notebook computer; the anti-addiction device in the embodiment of the present invention as shown in fig. 4 may include at least: a verification information receiving module 401, a first judging module 402, an operation duration detecting module 403, a second judging module 404 and a processing module 405, wherein:
a verification information receiving module 401, configured to receive first verification information input for an authentication interface on a terminal;
a first determining module 402, configured to determine whether a first user identifier corresponding to the first verification information is a limited user;
the first judging module 402 shown in fig. 5 may further include a detecting unit 4021 and a judging unit 4022, where:
a detecting unit 4021, configured to detect whether a first user identifier corresponding to the first verification information is included in a pre-stored user identifier list of a limited user;
a determining unit 4022, configured to determine that the first user identifier corresponding to the first verification information is the limited user if the first user identifier is included in the user identifier list of the limited user.
An operation duration detection module 403, configured to detect, if the first user identifier is the limited user, an operation duration corresponding to the first user identifier and a limited application on the terminal;
the operation duration detection module 403 further includes a first detection unit 4031 and a recording unit 4032 as shown in fig. 6, wherein:
a first detecting unit 4031, configured to detect whether an application in a foreground on the terminal is included in the restricted application list;
a recording unit 4032, configured to record, if the application in the foreground is included in the limited application list, an operation duration corresponding to the first user identifier of the limited application in the foreground.
Further optionally, the operation duration detection module 403 may further include a second detection unit 4033, configured to detect, if the application in the foreground is included in the limited application list, whether an operation time of the application in the foreground is within a preset limited time period, and if the operation time is within the limited time period, trigger the recording unit 4032.
A second determining module 404, configured to determine whether the operation duration detected by the operation duration detecting module 403 reaches a time limit corresponding to the first subscriber identity;
a processing module 405, configured to, if the operation duration reaches the limit duration corresponding to the first user identifier, limit the restricted application on the terminal from receiving the operation instruction corresponding to the first user identifier.
Further, the verification information receiving module 401 is further configured to: receiving second verification information input aiming at an identity verification interface on the terminal; the first determining module 402 is further configured to: judging whether a second user identification corresponding to the second verification information is a limited user; the anti-addiction device 4 may further include a setting module 406, configured to receive a setting instruction of the limited duration corresponding to the first user identifier when the second user identifier is an unrestricted user, extract the input limited duration corresponding to the first user identifier, and store the extracted limited duration.
In an optional embodiment, if the operation duration reaches the limit duration corresponding to the first user identifier, the anti-addiction device 4 may further include: an overtime duration receiving module 407, an overtime application request generating module 408, a communication sending module 409 and a communication receiving module 410, wherein:
a overtime length receiving module 407, configured to receive an input overtime length corresponding to the first user identifier;
an overtime application request generating module 408, configured to generate an overtime application request according to the time-adding duration;
a communication sending module 409, configured to obtain a communication address corresponding to the second user identifier, and send the overtime application request to the communication address;
a communication receiving module 410, configured to receive a returned overtime confirmation response corresponding to the second subscriber identity, and extend the limit time length according to the overtime length.
Further, if the communication receiving module 410 does not receive a returned time-adding confirmation response corresponding to the second user identifier, the processing module 405 is triggered;
in another optional implementation manner, if the operation duration reaches the limit duration corresponding to the first user identifier, the anti-addiction device 4 may further include: a display module 411, configured to display the overtime application request generated by the overtime application request generation module 408; the verification information receiving module 401 is further configured to: receiving second verification information corresponding to a second user identifier input by the overtime application request displayed by the display module 411, and extending the limit time length according to the overtime time length.
Further, if the verification information receiving module 401 does not receive second verification information corresponding to a second user identifier input by the overtime application request displayed by the display module 411, the processing module 405 is triggered;
it can be understood that the functions of the functional modules of the anti-addiction device 4 of the present embodiment may be specifically implemented according to the method in the foregoing method embodiment, and may specifically correspond to the related description of the method embodiment with reference to fig. 1 to fig. 3, which is not repeated herein.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that acts and modules referred to are not necessarily required to practice embodiments of the invention.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The modules or units in the device of the embodiment of the invention can be combined, divided and deleted according to actual needs.
The modules or units in the embodiments of the present invention may be implemented by a general-purpose Integrated Circuit, such as a CPU (Central Processing Unit), or an ASIC (Application Specific Integrated Circuit).
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.
Claims (9)
1. An anti-addiction method, said method comprising:
receiving first verification information input aiming at an identity verification interface on a terminal;
when a first user identifier corresponding to the first verification information is judged to be a limited user, detecting an operation duration corresponding to the first user identifier and a limited application on the terminal;
judging whether the operation duration reaches a limit duration corresponding to the first user identifier;
when the difference value between the limiting time length corresponding to the first user identification and the operation time length is equal to a set time length threshold value, reminding a user;
if the operation duration reaches the limit duration corresponding to the first user identifier, limiting the limited application on the terminal to receive an operation instruction corresponding to the first user identifier, and hiding an icon of the limited application;
if the operation duration reaches the limit duration corresponding to the first user identifier, the method further includes:
receiving input overtime time corresponding to the first user identifier, and generating an overtime application request according to the overtime time;
acquiring a communication address corresponding to a second user identification, and sending the overtime application request to the communication address;
and receiving a returned overtime confirmation response corresponding to the second user identifier, and prolonging the limit time length according to the overtime time length.
2. The method of claim 1, wherein prior to receiving the first authentication information input for the authentication interface on the terminal, the method further comprises:
receiving second verification information input aiming at an identity verification interface on the terminal;
and when the second user identification corresponding to the second verification information is determined to be an unlimited user, receiving a setting instruction of the limiting time length corresponding to the first user identification, extracting and storing the input limiting time length corresponding to the first user identification.
3. The method according to claim 1 or 2, wherein if the operation duration reaches a limit duration corresponding to the first subscriber identity, the method further comprises:
receiving input overtime time corresponding to the first user identifier, generating an overtime application request according to the overtime time, and displaying the overtime application request;
and receiving second verification information corresponding to a second user identification input aiming at the displayed overtime application request, and prolonging the limit time according to the overtime time.
4. The method according to claim 3, wherein the step of limiting the restricted application on the terminal from receiving the operation instruction corresponding to the first subscriber identity is performed if a returned overtime confirmation response corresponding to the second subscriber identity is not received or second authentication information corresponding to the second subscriber identity input for the displayed overtime application request is not received.
5. The method of claim 1 or 2, wherein after receiving the first authentication information input for the authentication interface on the terminal, the method further comprises:
detecting whether a first user identifier corresponding to the first verification information is contained in a pre-stored user identifier list of the limited user;
and if the first user identification is contained in the user identification list of the limited user, determining that the first user identification corresponding to the first verification information is the limited user.
6. The method of claim 1 or 2, wherein the detecting the operation duration of the restricted application on the terminal corresponding to the first subscriber identity comprises:
detecting whether an application in a foreground on the terminal is contained in a pre-stored limited application list or not;
if the application in the foreground is contained in the limited application list, recording the operation duration corresponding to the first user identifier of the limited application in the foreground.
7. The method of claim 6, wherein if the application in the foreground is included in the list of restricted applications, the method further comprises:
detecting whether the running time of the limited application in the foreground is within a preset limited time period or not;
and if the running time is within the limited time period, executing the step of recording the operation duration corresponding to the first user identifier and the limited application in the foreground.
8. An anti-addiction device, said device comprising:
the authentication information receiving module is used for receiving first authentication information input aiming at an identity authentication interface on the terminal;
the first judging module is used for judging whether a first user identifier corresponding to the first verification information is a limited user;
an operation duration detection module, configured to detect, if the first user identifier is the limited user, an operation duration corresponding to the first user identifier for the limited application on the terminal;
the second judging module is used for judging whether the operation duration detected by the operation duration detecting module reaches the limit duration corresponding to the first user identifier;
the device is further used for reminding the user when the difference value between the limiting time length corresponding to the first user identification and the operation time length is equal to a set time length threshold value;
the processing module is used for limiting the limited application on the terminal to receive the operation instruction corresponding to the first user identifier and hiding the icon of the limited application if the operation duration reaches the limit duration corresponding to the first user identifier;
the overtime length receiving module is used for receiving the input overtime length corresponding to the first user identifier;
the overtime application request generating module is used for generating an overtime application request according to the overtime duration;
the communication sending module is used for acquiring a communication address corresponding to a second user identifier and sending the overtime application request to the communication address;
and the communication receiving module is used for receiving a returned overtime confirmation response corresponding to the second user identifier and prolonging the limit time length according to the overtime length.
9. A computer storage medium for storing a computer program, wherein the computer program causes a computer to perform the method of any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711062442.9A CN107643977B (en) | 2015-03-25 | 2015-03-25 | Anti-addiction method and related product |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711062442.9A CN107643977B (en) | 2015-03-25 | 2015-03-25 | Anti-addiction method and related product |
CN201510134830.8A CN104765993B (en) | 2015-03-25 | 2015-03-25 | A kind of method and apparatus of Anti-addiction |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510134830.8A Division CN104765993B (en) | 2015-03-25 | 2015-03-25 | A kind of method and apparatus of Anti-addiction |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107643977A CN107643977A (en) | 2018-01-30 |
CN107643977B true CN107643977B (en) | 2021-04-02 |
Family
ID=53647818
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711062442.9A Expired - Fee Related CN107643977B (en) | 2015-03-25 | 2015-03-25 | Anti-addiction method and related product |
CN201510134830.8A Expired - Fee Related CN104765993B (en) | 2015-03-25 | 2015-03-25 | A kind of method and apparatus of Anti-addiction |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510134830.8A Expired - Fee Related CN104765993B (en) | 2015-03-25 | 2015-03-25 | A kind of method and apparatus of Anti-addiction |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN107643977B (en) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105353958B (en) * | 2015-10-28 | 2018-03-16 | 广东欧珀移动通信有限公司 | The control method and device of terminal applies |
CN105718292A (en) * | 2016-02-22 | 2016-06-29 | 广东欧珀移动通信有限公司 | Software use control method and device and mobile terminal |
CN105938543A (en) * | 2016-03-30 | 2016-09-14 | 乐视控股(北京)有限公司 | Addiction-prevention-based terminal operation control method, device, and system |
CN105786609A (en) * | 2016-03-30 | 2016-07-20 | 北京小米移动软件有限公司 | Control method and device of terminal |
CN107306293B (en) * | 2016-04-25 | 2021-10-15 | 中兴通讯股份有限公司 | Anti-addiction method and system |
CN107305503A (en) * | 2016-04-25 | 2017-10-31 | 奇酷软件(深圳)有限公司 | The control method of terminal, the control device of terminal and terminal |
CN107395386A (en) * | 2016-05-17 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of method and system, gateway device for controlling intelligent terminal |
CN106055100B (en) * | 2016-05-26 | 2018-11-20 | 广东欧珀移动通信有限公司 | A kind of Anti-addiction method, apparatus and terminal device |
CN106095637B (en) * | 2016-05-26 | 2020-01-14 | Oppo广东移动通信有限公司 | Intelligent terminal control method and device and intelligent terminal |
EP3508997B1 (en) * | 2016-09-24 | 2023-04-19 | Huawei Technologies Co., Ltd. | Offline management method for application use time, and terminal device |
CN106255110A (en) * | 2016-09-30 | 2016-12-21 | 维沃移动通信有限公司 | A kind of mobile terminal network resource uses the method and mobile terminal authorized |
CN106681814A (en) * | 2016-12-15 | 2017-05-17 | 宇龙计算机通信科技(深圳)有限公司 | Anti-addiction method and terminal |
CN106844174B (en) * | 2017-01-17 | 2020-09-29 | 河南工业大学 | Method and system for limiting time of continuous use of single electronic equipment |
CN108319366A (en) * | 2018-01-22 | 2018-07-24 | 四川斐讯信息技术有限公司 | A kind of control method and system of Anti-addiction |
CN108494841B (en) * | 2018-03-13 | 2020-05-22 | 广东小天才科技有限公司 | Management and control method and device based on use condition of terminal equipment |
CN109617852B (en) * | 2018-03-29 | 2020-10-13 | 腾讯科技(深圳)有限公司 | Method and device for preventing network addiction based on flow analysis |
CN108710786A (en) * | 2018-03-30 | 2018-10-26 | 努比亚技术有限公司 | A kind of method of Anti-addiction, equipment and computer readable storage medium |
CN109302394A (en) * | 2018-09-29 | 2019-02-01 | 武汉极意网络科技有限公司 | A kind of anti-simulation login method of terminal, device, server and storage medium |
CN109614785B (en) * | 2018-11-01 | 2021-05-25 | Oppo广东移动通信有限公司 | Application operation control method and device, storage medium and electronic equipment |
CN109582535B (en) * | 2018-11-01 | 2022-06-14 | Oppo广东移动通信有限公司 | Application operation control method and device, storage medium and electronic equipment |
CN110263518A (en) * | 2019-05-31 | 2019-09-20 | 新疆爱华盈通信息技术有限公司 | Electronic equipment and its application method |
CN112152971A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Method and apparatus for controlling network usage behavior, electronic device, and medium |
CN110688973B (en) * | 2019-09-30 | 2022-05-13 | Oppo广东移动通信有限公司 | Equipment control method and related product |
JP7125066B2 (en) * | 2020-07-15 | 2022-08-24 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | Method and terminal device for managing application program usage time offline |
CN117395066B (en) * | 2023-11-08 | 2024-06-04 | 深圳市时迅迪科技有限公司 | Network security monitoring system and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102201047A (en) * | 2010-11-09 | 2011-09-28 | 湖南创合制造有限公司 | Computer management method |
CN103024168A (en) * | 2012-12-07 | 2013-04-03 | 广东欧珀移动通信有限公司 | Mobile phone monitoring and control method |
CN104063655A (en) * | 2014-05-30 | 2014-09-24 | 小米科技有限责任公司 | Child mode processing method and device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101094069A (en) * | 2007-07-18 | 2007-12-26 | 汪铁良 | System with function of recognizing fingerprint for preventing enthrallment on network |
WO2010103110A2 (en) * | 2009-03-13 | 2010-09-16 | Metaboli | System and method for controlling the use of applications on a computer |
CN103607513A (en) * | 2013-11-26 | 2014-02-26 | 广东欧珀移动通信有限公司 | Method for controlling application to be used and intelligent terminal |
CN104143057A (en) * | 2014-07-11 | 2014-11-12 | 上海一端科技有限公司 | Method of independently controlling mobile terminal application program entering right |
CN104331355B (en) * | 2014-11-28 | 2017-10-13 | 广东欧珀移动通信有限公司 | The Anti-addiction method and apparatus of mobile terminal |
-
2015
- 2015-03-25 CN CN201711062442.9A patent/CN107643977B/en not_active Expired - Fee Related
- 2015-03-25 CN CN201510134830.8A patent/CN104765993B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102201047A (en) * | 2010-11-09 | 2011-09-28 | 湖南创合制造有限公司 | Computer management method |
CN103024168A (en) * | 2012-12-07 | 2013-04-03 | 广东欧珀移动通信有限公司 | Mobile phone monitoring and control method |
CN104063655A (en) * | 2014-05-30 | 2014-09-24 | 小米科技有限责任公司 | Child mode processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN104765993A (en) | 2015-07-08 |
CN107643977A (en) | 2018-01-30 |
CN104765993B (en) | 2017-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107643977B (en) | Anti-addiction method and related product | |
RU2643473C2 (en) | Method and tools for fingerprinting identification | |
US20190104340A1 (en) | Intelligent Terminal Control Method and Intelligent Terminal | |
CN109075820B (en) | Bluetooth pairing method, terminal device and readable storage medium | |
US20170163580A1 (en) | Interactive method and device for playback of multimedia | |
US20160028741A1 (en) | Methods and devices for verification using verification code | |
US10425403B2 (en) | Method and device for accessing smart camera | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN106170004B (en) | Method and device for processing verification code | |
CN107346397B (en) | Information processing method and related product | |
US20170171321A1 (en) | Methods and devices for managing accounts | |
CN104717622B (en) | Information forwarding method and device, terminal and server | |
CN105407098A (en) | Identity verification method and device | |
CN105512545B (en) | Access rights management method and device | |
CN103716309A (en) | Security authentication method and terminal | |
CN107506646B (en) | Malicious application detection method and device and computer readable storage medium | |
CN107666583B (en) | Call processing method and terminal | |
CN108121631B (en) | Screen abnormal state reminding method and device | |
CN104933170A (en) | Information exhibition method and device | |
CN108960839B (en) | Payment method and device | |
CN104331668A (en) | Wrong password prompting method and device | |
EP3016349A1 (en) | Method and apparatus for verifying terminal and computer program product | |
US20170161011A1 (en) | Play control method and electronic client | |
US20170180807A1 (en) | Method and electronic device for amplifying video image | |
CN105323244A (en) | Method and device for network identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: No.18, Wusha Haibin Road, Chang'an Town, Dongguan City, Guangdong Province Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210402 |