CN108132813B - Function locking method and device of application program and electronic equipment - Google Patents

Function locking method and device of application program and electronic equipment Download PDF

Info

Publication number
CN108132813B
CN108132813B CN201711396552.9A CN201711396552A CN108132813B CN 108132813 B CN108132813 B CN 108132813B CN 201711396552 A CN201711396552 A CN 201711396552A CN 108132813 B CN108132813 B CN 108132813B
Authority
CN
China
Prior art keywords
control
locking
identification
application program
time period
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711396552.9A
Other languages
Chinese (zh)
Other versions
CN108132813A (en
Inventor
高毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201711396552.9A priority Critical patent/CN108132813B/en
Publication of CN108132813A publication Critical patent/CN108132813A/en
Application granted granted Critical
Publication of CN108132813B publication Critical patent/CN108132813B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons

Abstract

The disclosure relates to a method and a device for locking functions of an application program and electronic equipment, wherein the method comprises the following steps: if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control; determining the use state of the function control according to the program identification and the control identification; and if the use state is determined to be the locking state, forbidding to respond to the operation. The technical scheme can realize control level control of the application program, does not influence normal use of other function controls while locking a certain function control of the application program, is beneficial to a user to correct bad habits of frequently operating a certain function control, can improve the intelligent level of the terminal equipment, and meets the requirements of the user.

Description

Function locking method and device of application program and electronic equipment
Technical Field
The present disclosure relates to the field of mobile terminal technologies, and in particular, to a method and an apparatus for locking a function of an application program, and an electronic device.
Background
With the development of mobile terminal technology, the number of APPs (applications) is increasing. APP in the related art brings good user experience and high-quality content to a user, and meanwhile brings trouble to the user, the user may frequently start the APP, or a certain function in the APP, for example, bad habits of not stopping brushing friends circle, brushing microblogs, brushing head bars and the like are formed, and then normal life and work of the user are affected.
Disclosure of Invention
In order to overcome the problems in the related art, embodiments of the present disclosure provide a method and an apparatus for locking a function of an application program, and an electronic device, so as to solve the disadvantages in the related art.
According to a first aspect of the embodiments of the present disclosure, there is provided a method for locking a function of an application, including:
if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control;
determining the use state of the function control according to the program identification and the control identification;
and if the use state is determined to be the locking state, forbidding to respond to the operation.
In an embodiment, before the operation for the functionality control in the current application is detected, the method further includes:
if the locking operation aiming at the functional control in the current application program is detected, acquiring a program identifier of the application program and a control identifier of the functional control;
and writing the program identification and the control identification into a pre-constructed locking control information table.
In an embodiment, the writing the program identifier and the control identifier into a pre-constructed locking control information table includes:
determining control information of the functional control according to the program identification and the control identification, wherein the control information only corresponds to the functional control;
and writing the control information into a pre-constructed locking control information table.
In an embodiment, the method further comprises:
determining a locking time period of the functionality control;
constructing a corresponding relation between the locking time period and the control identification;
and writing the locking time period into the locking control information table based on the corresponding relation.
In an embodiment, the method further comprises:
based on the corresponding relation, inquiring a locking time period corresponding to the control identification from the locking control information table;
and if the current time is determined to be within the locking time period, determining that the use state is the locking state.
In an embodiment, the method further comprises:
and generating prompt information for indicating that the function control is in a locked state, and/or generating prompt information for prompting to unlock the function control.
According to a second aspect of the embodiments of the present disclosure, there is provided a function locking apparatus of an application, including:
the identification determining module is used for determining the program identification of the application program and the control identification of the function control when the operation aiming at the function control in the current application program is detected;
the state determining module is used for determining the use state of the functional control according to the program identifier and the control identifier;
and the operation inhibition module is used for inhibiting the response to the operation when the use state is determined to be the locking state.
In one embodiment, the apparatus further comprises an information writing module;
the information writing module includes:
the identification acquisition unit is used for acquiring a program identification of the application program and a control identification of the function control when the locking operation aiming at the function control in the current application program is detected;
and the information writing unit is used for writing the program identification and the control identification into a pre-constructed locking control information table.
In an embodiment, the information writing unit is further configured to:
determining control information of the functional control according to the program identification and the control identification, wherein the control information only corresponds to the functional control;
and writing the control information into a pre-constructed locking control information table.
In one embodiment, the apparatus further comprises a time write module;
the time writing module comprises:
the time determining unit is used for determining the locking time period of the function control;
the relation construction unit is used for constructing the corresponding relation between the locking time period and the control identification;
and the time writing unit is used for writing the locking time period into the locking control information table based on the corresponding relation.
In one embodiment, the apparatus further comprises:
the time inquiry module is used for inquiring the locking time period corresponding to the control identification from the locking control information table based on the corresponding relation;
the operation prohibition module is further configured to determine that the usage status is a locked status when it is determined that the current time is within the locked time period.
In one embodiment, the apparatus further comprises:
and the information generation module is used for generating prompt information used for indicating that the function control is in a locked state and/or prompting prompt information used for unlocking the function control.
According to a third aspect of the embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory configured to store processor-executable instructions;
wherein the processor is configured to:
if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control;
determining the use state of the function control according to the program identification and the control identification;
and if the use state is determined to be the locking state, forbidding to respond to the operation.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when processed by a processor, implements:
if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control;
determining the use state of the function control according to the program identification and the control identification;
and if the use state is determined to be the locking state, forbidding to respond to the operation.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the embodiment, when the operation of the function control in the current application program is detected, the program identification of the application program and the control identification of the function control are determined, the use state of the function control is determined according to the program identification and the control identification, and then when the use state is determined to be the locking state, the response to the operation is forbidden, so that the control level control of the application program can be realized, the normal use of other function controls is not influenced while a certain function control of the application program is locked, the user can be facilitated to correct the bad habit of frequently operating a certain function control, the intelligentization level of the terminal equipment can be improved, and the user requirements can be met.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow diagram illustrating a method for functionality locking of an application in accordance with an illustrative embodiment;
FIG. 2 is a flow chart illustrating a method for functionality locking of an application in accordance with yet another illustrative embodiment;
FIG. 3 is a flowchart illustrating how program identifications and control identifications are written into a lock control information table in accordance with an illustrative embodiment;
FIG. 4 is a flow chart illustrating a method for functionality locking of an application in accordance with yet another illustrative embodiment;
FIG. 5 is a flow chart illustrating a method for functionality locking of an application in accordance with yet another illustrative embodiment;
FIG. 6 is a flow chart illustrating a method for functionality locking of an application in accordance with yet another illustrative embodiment;
FIG. 7 is a diagram illustrating an application scenario of a method for functionality locking of an application, according to an illustrative embodiment;
FIG. 8 is a block diagram illustrating a function locking mechanism for an application in accordance with an exemplary embodiment;
FIG. 9 is a block diagram illustrating a function locking mechanism for an application according to yet another exemplary embodiment;
FIG. 10 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
FIG. 1 is a flow diagram illustrating a method for functionality locking of an application in accordance with an illustrative embodiment; this embodiment may be used for terminal devices (e.g., cell phones, tablets, personal computers, etc.). As shown in FIG. 1, the method includes the following steps S11-S13:
s11: and if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control.
In an embodiment, when the operating system of the terminal device detects an operation (for example, a click operation) of a user on a functionality control in a current application program, a program identifier of the application program and a control identifier of the functionality control are determined.
In an embodiment, the functional control may include a control that can be clicked, pressed for a long time, dragged, and the like by a user in an application program, for example, a button, an input box, a list, and the like, which is not limited in this embodiment.
In an embodiment, the program identifier may be used to include information such as a name, a number, and a package name of the application program, which is used to distinguish the application program from other application programs; similarly, the control identifier may be used to include information such as a name and a number of the function control, and may be used to distinguish the function control from other function controls.
S12: and determining the use state of the functional control according to the program identification and the control identification.
In one embodiment, the use states of the functionality control may include a locked state and an unlocked state. For example, if the use state of the function control is a locked state, it indicates that the function of the function control is locked, that is, the corresponding function cannot be realized; and if the use state of the function control is the unlocking state, the function of the function control is not locked, and the corresponding function can be realized.
In an embodiment, after determining the program identifier and the control identifier, the use state of the functional control may be determined according to the program identifier and the control identifier, for example, a locked application program list may be queried according to the program identifier, if it is determined that the program identifier exists in the application program list, the locked control list may be further queried according to the control identifier, and when it is determined that the control identifier exists in the control list, the use state of the functional control may be determined to be a locked state;
otherwise, if it is determined that the program identifier does not exist in the application program list, or if it is determined that the control identifier does not exist in the control list, it may be determined that the use state of the functional control is the unlock state.
S13: and if the use state is determined to be the locking state, forbidding to respond to the operation.
In an embodiment, when it is determined that the use state of the functionality control is the locked state, the operation on the functionality control is prohibited from being responded, that is, the operation is not responded, for example, the operation event is not notified to the application program.
As can be seen from the above description, in the embodiment of the present disclosure, when an operation directed at a function control in a current application is detected, a program identifier of the application and a control identifier of the function control are determined, and a use state of the function control is determined according to the program identifier and the control identifier, and then when it is determined that the use state is a locked state, a response to the operation is prohibited, so that control level control of the application can be implemented, a normal use of another function control is not affected while a certain function control of the application is locked, a user is facilitated to correct a bad habit of frequently operating a certain function control, an intelligence level of a terminal device can be improved, and a user demand is met.
Fig. 2 is a flowchart illustrating a function locking method of an application according to still another exemplary embodiment. As shown in FIG. 2, the method includes the following steps S21-S25:
s21: and if the locking operation aiming at the functional control in the current application program is detected, acquiring the program identifier of the application program and the control identifier of the functional control.
In an embodiment, when the operating system of the terminal device detects a locking operation of the user for the function control, the program identifier of the application program and the control identifier of the function control may be acquired.
In an embodiment, the locking operation may be a long-press operation, or may be a trigger operation for "locking a control option" in a control editing menu, and a specific form may be set according to a requirement of a user or a developer, which is not limited in this embodiment.
S22: and writing the program identification and the control identification into a pre-constructed locking control information table.
In an embodiment, a table for recording locking control information, that is, the locking control information table, may be pre-constructed, where the locking control information includes a control identifier of a locked functionality control and a program identifier of an application program to which the functionality control belongs.
In an embodiment, after the program identifier and the control identifier are obtained, the program identifier and the control identifier may be written into a pre-constructed locking control information table, so that whether the functional control is locked or not may be determined subsequently according to the control information table.
S23: and if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control.
S24: and determining the use state of the functional control according to the program identification and the control identification.
S25: and if the use state is determined to be the locking state, forbidding to respond to the operation.
For the explanation and explanation of steps S23-S25, reference may be made to steps S11-S13 in the embodiment shown in fig. 1, which is not repeated herein.
As can be seen from the above description, according to the embodiment of the present disclosure, when a locking operation for a function control in a current application program is detected, a program identifier of the application program and a control identifier of the function control are obtained, and the program identifier and the control identifier are written into a pre-constructed locking control information table, so that it can be realized to determine whether the function control is locked based on contents recorded in the locking control information table subsequently, so as to implement control level control on the application program, which is beneficial for a user to correct a bad habit of frequently operating a certain function control, and can improve an intelligence level of a terminal device, and meet a user demand.
FIG. 3 is a flowchart illustrating how program identifications and control identifications are written into a lock control information table in accordance with an illustrative embodiment; on the basis of the above embodiments, this embodiment exemplarily illustrates how to write the program identifier and the control identifier into the locking control information table. As shown in fig. 3, the writing of the program identifier and the control identifier into the pre-constructed lock control information table in step S22 may include the following steps S31-S32:
s31: and determining control information of the functional control according to the program identification and the control identification, wherein the control information uniquely corresponds to the functional control.
In an embodiment, after the program identifier and the control identifier are obtained, control information may be determined according to the program identifier and the control identifier, where the control information uniquely corresponds to the function control, that is, the control information and the function control are in a one-to-one correspondence relationship.
In an embodiment, the control information may be a corresponding relationship between the program identifier and the control identifier, or may be new identifier information (for example, identifier information obtained by combining the program identifier and the control identifier) generated according to the program identifier and the control identifier, and the specific form may be set according to the needs of a user or a developer, which is not limited in this embodiment.
S32: and writing the control information into a pre-constructed locking control information table.
In an embodiment, after determining the control information, the control information may be written into the locked control information table.
It should be noted that the locking control information table may be stored locally in the terminal device, or may be stored in a storage device of the server.
As can be seen from the above description, in the embodiment of the present disclosure, by determining the control information of the functional control according to the program identifier and the control identifier, and writing the control information into the pre-constructed locking control information table, it can be achieved that whether the functional control is locked is subsequently determined based on the control information recorded in the locking control information table, and thus control of the application program at a control level can be achieved, and the user requirements are met.
FIG. 4 is a flow chart illustrating a method for functionality locking of an application in accordance with yet another illustrative embodiment; as shown in fig. 4, the method includes the following steps S41-S48:
s41: and if the locking operation aiming at the functional control in the current application program is detected, acquiring the program identifier of the application program and the control identifier of the functional control.
S42: and writing the program identification and the control identification into a pre-constructed locking control information table.
S43: determining a lock time period for the functionality control.
In an embodiment, prompt information for inputting the locking time period may be generated in the process of locking the function control, and the locking time period of the function control input by the user may be further received.
In an embodiment, the locking time period may be a specific time, for example, 9:00-17:00, or may be a specific date, for example, 9 months and 1 day, and the specific form may be set according to the needs of a user or a developer, which is not limited in this embodiment.
S44: constructing a corresponding relation between the locking time period and the control identification;
in an embodiment, after the locking time period is determined, a corresponding relationship between the locking time period and the control identifier may be constructed, that is, the locking time period is associated with the control identifier, so as to realize a subsequent query of the locking time period corresponding to the control identifier based on the corresponding relationship.
S45: and writing the locking time period into the locking control information table based on the corresponding relation.
In an embodiment, after determining the correspondence, the locking time period may be written into the locking control information table based on the correspondence, that is, the control identifier, the program identifier, and the locking time period are simultaneously stored in the locking control information table.
S46: and if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control.
S47: and determining the use state of the functional control according to the program identification and the control identification.
S48: and if the use state is determined to be the locking state, forbidding to respond to the operation.
For the explanation and explanation of steps S41-S42 and S46-S48, reference may be made to steps S21-S25 in the embodiment shown in fig. 2, which is not repeated herein.
As can be seen from the above description, in the embodiment of the present disclosure, by determining the locking time period of the function control, and constructing the corresponding relationship between the locking time period and the control identifier, and then writing the locking time period into the locking control information table based on the corresponding relationship, it can be achieved that whether the function control is locked is determined based on the locking time period recorded in the locking control information table subsequently, and then control of the application program at the control level can be achieved, so as to meet the user demand.
FIG. 5 is a flow chart illustrating a method for functionality locking of an application in accordance with yet another illustrative embodiment; as shown in fig. 5, the method may include the following steps S51-S59:
s51: and if the locking operation aiming at the functional control in the current application program is detected, acquiring the program identifier of the application program and the control identifier of the functional control.
S52: and writing the program identification and the control identification into a pre-constructed locking control information table.
S53: determining a lock time period for the functionality control.
S54: constructing a corresponding relation between the locking time period and the control identification;
s55: and writing the locking time period into the locking control information table based on the corresponding relation.
S56: and if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control.
S57: and determining the use state of the functional control according to the program identification and the control identification.
For the explanation and explanation of steps S51-S57, reference may be made to steps S41-S47 in the embodiment shown in fig. 4, which is not repeated herein.
S58: and inquiring the locking time period corresponding to the control identification from the locking control information table based on the corresponding relation.
In an implementation, based on the above-constructed correspondence between the locking time period and the control identifier, the locking time period corresponding to the control identifier may be queried from the locking control information table, for example, it is determined that the locking time period corresponding to the current control identifier is 9:00-17: 00.
S59: and if the current time is determined to be within the locking time period, determining that the use state is a locking state, and forbidding to respond to the operation.
In one embodiment, after determining the lock on period, it may be determined whether the current time is within the lock on period. For example, if the locking time period is determined to be 9:00-17:00 and the current time is determined to be 13:00, the current time may be determined to be within the locking time period.
In an embodiment, if it is determined that the current time is within the lock time period, it may be determined that the usage state is the lock state, and the step of prohibiting the response to the operation may be further performed.
As can be seen from the above description, in the embodiment of the present disclosure, based on the correspondence between the locking time period and the control identifier, the locking time period corresponding to the control identifier is queried from the locking control information table, and when it is determined that the current time is within the locking time period, it is determined that the use state is the locking state, so that control-level control of an application program can be implemented, a normal use of another function control is not affected while a certain function control of the application program is locked, which is beneficial for a user to correct an unfavorable habit of frequently operating a certain function control, and can improve an intelligence level of a terminal device, and meet a user demand.
FIG. 6 is a flow chart illustrating a method for functionality locking of an application in accordance with yet another illustrative embodiment; as shown in fig. 6, the method includes the following steps S61-S64:
s61: and if the operation aiming at the functional control in the current application program is detected, determining the program identification of the application program and the control identification of the functional control.
S62: and determining the use state of the functional control according to the program identification and the control identification.
S63: and if the use state is determined to be the locking state, forbidding to respond to the operation.
For the explanation and explanation of steps S61-S63, reference may be made to steps S11-S13 in the embodiment shown in fig. 1, which is not repeated herein.
S64: and generating prompt information for indicating that the function control is in a locked state, and/or generating prompt information for prompting to unlock the function control.
In an embodiment, after determining that the use state is the locked state and prohibiting responding to the operation, prompt information for indicating that the functionality control is in the locked state may be generated, so as to remind a user that the functionality control is in the locked state. On the basis, prompt information for prompting the unlocking of the function control can be generated, so that the function control can be unlocked by inputting a password or a fingerprint and the like when a user urgently needs to use the function control.
As can be seen from the above description, in the embodiment of the present disclosure, after determining that the use state is the locked state and prohibiting responding to the operation, the prompt information indicating that the function control is in the locked state is generated, so that the user can be reminded that the function control is in the locked state. In addition, by generating prompt information for prompting the unlocking of the function control, the function control can be unlocked by inputting a password or a fingerprint and the like when a user urgently needs to use the function control, the intelligent level of the terminal equipment can be improved, and the user requirements can be met.
FIG. 7 is a diagram illustrating an application scenario of a method for functionality locking of an application, according to an illustrative embodiment; as shown in fig. 7, when the terminal device 100 detects an operation for a function control in a current application program, the program identifier of the application program and the control identifier of the function control are determined, and then the use state of the function control is determined according to the program identifier and the control identifier, and if it is determined that the use state of the function control at this time is a locked state, the response to the operation is prohibited. For example, when a refresh operation for a friend circle in the current WeChat is detected, the packet name "com.technical.mm" of the WeChat and the control ID of the friend circle are determined, the use state of the friend circle is determined according to the packet name and the control ID of the WeChat, if it is determined that the corresponding relationship between the packet name "com.technical.mm" of the WeChat and the control ID of the friend circle exists in the locked control information table, and the current time (e.g., 10:00) is within the locked time period (9:00-17:00) of the function control, the use state of the friend circle can be determined to be the locked state, and further, the response to the operation for the friend circle can be prohibited, and the prompt information 110 shown in FIG. 7 can be generated to prompt the user that the friend circle is in the locked state, and the locked time is 9:00-17: 00.
As can be seen from the above description, the embodiment can implement control of the application program at a control level, and does not affect normal use of other function controls while locking a certain function control of the application program, thereby facilitating a user to correct bad habits of frequently operating a certain function control, improving the intelligence level of the terminal device, and satisfying user requirements.
FIG. 8 is a block diagram illustrating a function locking mechanism for an application in accordance with an exemplary embodiment; as shown in fig. 8, the apparatus includes: an identity determination module 110, a state determination module 120, and an operation prohibition module 130, wherein:
the identification determination module 110 is configured to determine, when an operation for a functionality control in a current application is detected, a program identification of the application and a control identification of the functionality control;
a state determining module 120, configured to determine a use state of the functionality control according to the program identifier and the control identifier;
an operation inhibiting module 130 configured to inhibit a response to the operation when the usage status is determined to be a locked status.
FIG. 9 is a block diagram illustrating a function locking mechanism for an application according to yet another exemplary embodiment; the identifier determining module 230, the state determining module 240, and the operation prohibiting module 260 have the same functions as the identifier determining module 110, the state determining module 120, and the operation prohibiting module 130 in the embodiment shown in fig. 8, and are not described herein again. As shown in fig. 9, the apparatus further includes an information writing module 210;
the information writing module 210 may include:
an identifier obtaining unit 211, configured to obtain a program identifier of an application program and a control identifier of a function control when a locking operation for the function control in a current application program is detected;
and an information writing unit 212, configured to write the program identifier and the control identifier into a pre-constructed locking control information table.
In an embodiment, the information writing unit 212 may further be configured to:
determining control information of the functional control according to the program identification and the control identification, wherein the control information only corresponds to the functional control;
and writing the control information into a pre-constructed locking control information table.
In an embodiment, the apparatus may further include a time write module 220;
the time writing module 220 may include:
a time determining unit 221, configured to determine a locking time period of the function control;
a relationship construction unit 222, configured to construct a corresponding relationship between the locking time period and the control identifier;
a time writing unit 223, configured to write the locking time period into the locking control information table based on the correspondence.
In an embodiment, the apparatus may further include:
a time query module 250, configured to query, based on the correspondence, a locking time period corresponding to the control identifier from the locking control information table;
the operation inhibit module 260 may be further configured to determine that the usage status is a locked status when the current time is determined to be within the locked time period.
In an embodiment, the apparatus may further comprise:
the information generating module 270 may be configured to generate a prompt message for indicating that the function control is in a locked state, and/or a prompt message for prompting to unlock the function control.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
FIG. 10 is a block diagram illustrating an electronic device in accordance with an example embodiment. For example, the apparatus 300 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 10, the apparatus 900 may include one or more of the following components: processing component 902, memory 904, power component 906, multimedia component 908, audio component 910, input/output (I/O) interface 912, sensor component 914, and communication component 916.
The processing component 902 generally controls overall operation of the device 900, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. Processing element 902 may include one or more processors 320 to execute instructions to perform all or a portion of the steps of the methods described above. Further, processing component 902 can include one or more modules that facilitate interaction between processing component 902 and other components. For example, the processing component 902 can include a multimedia module to facilitate interaction between the multimedia component 908 and the processing component 902.
The memory 904 is configured to store various types of data to support operation at the device 900. Examples of such data include instructions for any application or method operating on device 900, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 904 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 906 provides power to the various components of device 900. The power components 906 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 900.
The multimedia component 908 comprises a screen providing an output interface between the device 900 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 908 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 900 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 910 is configured to output and/or input audio signals. For example, audio component 910 includes a Microphone (MIC) configured to receive external audio signals when apparatus 900 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 904 or transmitted via the communication component 916. In some embodiments, audio component 910 also includes a speaker for outputting audio signals.
I/O interface 912 provides an interface between processing component 902 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 914 includes one or more sensors for providing status assessment of various aspects of the apparatus 900. For example, sensor assembly 914 may detect an open/closed state of device 900, the relative positioning of components, such as a display and keypad of device 900, the change in position of device 900 or a component of device 900, the presence or absence of user contact with device 900, the orientation or acceleration/deceleration of device 900, and the change in temperature of device 900. The sensor assembly 914 may include a proximity sensor configured to detect the presence of a nearby object in the absence of any physical contact. The sensor assembly 914 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 914 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 916 is configured to facilitate communications between the apparatus 900 and other devices in a wired or wireless manner. The apparatus 900 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 916 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 916 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 900 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the function locking method of the above-described application programs.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 904 comprising instructions, executable by the processor 320 of the device 900 to perform the method for functionality locking of an application program as described above is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method for locking functions of an application program, comprising:
when the operation aiming at the functional control in the current application program is detected, combining the program identification of the application program and the control identification of the functional control to obtain the control information of the functional control;
determining a locking time period of the functional control from a pre-constructed locking control information table according to the control information, and determining the use state of the control based on the locking time period;
when the use state is determined to be the locking state, inhibiting the operation from being responded;
the method further comprises the following steps:
and generating prompt information for indicating that the function control is in a locked state, and/or prompting that the function control is unlocked by inputting a password or a fingerprint.
2. The method of claim 1, further comprising:
if the locking operation aiming at the functional control in the current application program is detected, acquiring a program identifier of the application program and a control identifier of the functional control;
and combining the program identification and the control identification to obtain control information of the functional control, and writing the control information into a pre-constructed locking control information table.
3. The method of claim 2, further comprising:
determining a locking time period of the functionality control;
constructing a corresponding relation between the locking time period and the control identification;
and writing the locking time period into the locking control information table based on the corresponding relation.
4. The method of claim 3, further comprising:
based on the corresponding relation, inquiring a locking time period corresponding to the control identification from the locking control information table;
and if the current time is determined to be within the locking time period, determining that the use state is the locking state.
5. A function lock apparatus for an application program, comprising:
the identification determining module is used for merging the program identification of the application program and the control identification of the functional control to obtain the control information of the functional control when the operation aiming at the functional control in the current application program is detected;
the state determining module is used for determining the locking time period of the functional control from a pre-constructed locking control information table according to the control information and determining the use state of the control based on the locking time period;
an operation prohibition module configured to prohibit a response to the operation when it is determined that the use state is the lock state;
the device further comprises:
and the information generation module is used for generating prompt information for indicating that the functional control is in a locked state and/or prompting the prompt information for unlocking the functional control in a password or fingerprint input mode.
6. The apparatus of claim 5, further comprising an information writing module;
the information writing module includes:
the identification acquisition unit is used for acquiring a program identification of the application program and a control identification of the function control when the locking operation aiming at the function control in the current application program is detected;
and the information writing unit is used for merging the program identifier and the control identifier to obtain control information of the functional control, and writing the control information into a pre-constructed locking control information table.
7. The apparatus of claim 6, further comprising a time write module;
the time writing module comprises:
the time determining unit is used for determining the locking time period of the function control;
the relation construction unit is used for constructing the corresponding relation between the locking time period and the control identification;
and the time writing unit is used for writing the locking time period into the locking control information table based on the corresponding relation.
8. The apparatus of claim 7, further comprising:
the time inquiry module is used for inquiring the locking time period corresponding to the control identification from the locking control information table based on the corresponding relation;
the operation prohibition module is further configured to determine that the usage status is a locked status when it is determined that the current time is within the locked time period.
9. An electronic device, characterized in that the electronic device comprises:
a processor;
a memory configured to store processor-executable instructions;
wherein the processor is configured to:
if the operation aiming at the functional control in the current application program is detected, combining the program identification of the application program and the control identification of the functional control to obtain the control information of the functional control;
determining a locking time period of the functional control from a pre-constructed locking control information table according to the control information, and determining the use state of the control based on the locking time period;
if the use state is determined to be the locking state, the response to the operation is forbidden;
further comprising:
and generating prompt information for indicating that the function control is in a locked state, and/or prompting that the function control is unlocked by inputting a password or a fingerprint.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being processed by a processor, is adapted to carry out:
if the operation aiming at the functional control in the current application program is detected, combining the program identification of the application program and the control identification of the functional control to obtain the control information of the functional control;
determining a locking time period of the functional control from a pre-constructed locking control information table according to the control information, and determining the use state of the control based on the locking time period;
if the use state is determined to be the locking state, the response to the operation is forbidden;
further comprising:
and generating prompt information for indicating that the function control is in a locked state, and/or prompting that the function control is unlocked by inputting a password or a fingerprint.
CN201711396552.9A 2017-12-21 2017-12-21 Function locking method and device of application program and electronic equipment Active CN108132813B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711396552.9A CN108132813B (en) 2017-12-21 2017-12-21 Function locking method and device of application program and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711396552.9A CN108132813B (en) 2017-12-21 2017-12-21 Function locking method and device of application program and electronic equipment

Publications (2)

Publication Number Publication Date
CN108132813A CN108132813A (en) 2018-06-08
CN108132813B true CN108132813B (en) 2021-07-23

Family

ID=62391270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711396552.9A Active CN108132813B (en) 2017-12-21 2017-12-21 Function locking method and device of application program and electronic equipment

Country Status (1)

Country Link
CN (1) CN108132813B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111078329B (en) * 2018-10-22 2024-02-06 青岛海信移动通信技术有限公司 Mobile terminal and method for locking and unlocking widgets in mobile terminal
CN109542721B (en) * 2018-11-05 2022-08-12 北京炎黄盈动科技发展有限责任公司 Application state control method and device in application container and storage medium
CN111414631A (en) * 2020-03-10 2020-07-14 维沃移动通信有限公司 Information processing method and electronic equipment
CN111638934B (en) * 2020-06-11 2023-08-01 上海摩象网络科技有限公司 State synchronization method and device of interaction control and handheld camera
CN114489858B (en) * 2022-02-11 2024-03-19 Tcl通讯科技(成都)有限公司 Application software information setting method and device, terminal equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101840556A (en) * 2009-03-16 2010-09-22 苹果公司 Separate method, device and the relevant device of the supplementary functions assembly of locked application
CN104063654A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Monitoring method and device for application program
CN105094962A (en) * 2015-08-25 2015-11-25 小米科技有限责任公司 Application disabled method and apparatus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103605429A (en) * 2013-11-30 2014-02-26 深圳市金立通信设备有限公司 Processing method for response key operation and mobile terminal
US20150332038A1 (en) * 2014-05-17 2015-11-19 Adriana Lyons Secure entry of secrets
JP2016110346A (en) * 2014-12-04 2016-06-20 キヤノン株式会社 License management system, client device, and license management method
CN106598630A (en) * 2016-12-30 2017-04-26 深圳天珑无线科技有限公司 Key control method and apparatus, and terminal
CN107437016B (en) * 2017-07-11 2020-05-26 Oppo广东移动通信有限公司 Application control method and related product

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101840556A (en) * 2009-03-16 2010-09-22 苹果公司 Separate method, device and the relevant device of the supplementary functions assembly of locked application
CN104063654A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Monitoring method and device for application program
CN105094962A (en) * 2015-08-25 2015-11-25 小米科技有限责任公司 Application disabled method and apparatus

Also Published As

Publication number Publication date
CN108132813A (en) 2018-06-08

Similar Documents

Publication Publication Date Title
CN108132813B (en) Function locking method and device of application program and electronic equipment
EP3113131B1 (en) Method and device for providing object finding information
EP3151117B1 (en) Method and device for delaying information broadcasting
US10292004B2 (en) Method, device and medium for acquiring location information
WO2017113660A1 (en) Application program management method and device
US10409684B2 (en) Method, device and storage medium for cleaning memory
CN106211159B (en) Bluetooth-based identity recognition method and device
CN105847243B (en) Method and device for accessing intelligent camera
CN105979088B (en) Message pushing method and device
CN107635074B (en) Method, apparatus and computer-readable storage medium for controlling alarm
CN107562349B (en) Method and device for executing processing
RU2645282C2 (en) Method and device for calling via cloud-cards
US11100735B2 (en) Method and apparatus for controlling entrance guard
CN107454204B (en) User information labeling method and device
CN110061904B (en) Method, device and system for acquiring social information, electronic equipment and storage medium
CN112037787A (en) Wake-up control method, device and computer readable storage medium
JP6276863B2 (en) Traffic control method and apparatus for mobile router
CN105511922A (en) Application startup controlling method and device
CN109862169B (en) Electronic equipment control method, device and storage medium
US10263925B2 (en) Method, device and medium for sending message
CN107368175B (en) Processing method and device for reducing terminal power consumption and terminal
CN106506808B (en) Method and device for prompting communication message
CN105657676B (en) Information reminding method and device
CN106570381B (en) Fingerprint unlocking method and device
CN106445122B (en) Equipment state control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant