CN109460655B - Electronic device control method and device, electronic device and storage medium - Google Patents

Electronic device control method and device, electronic device and storage medium Download PDF

Info

Publication number
CN109460655B
CN109460655B CN201811099492.9A CN201811099492A CN109460655B CN 109460655 B CN109460655 B CN 109460655B CN 201811099492 A CN201811099492 A CN 201811099492A CN 109460655 B CN109460655 B CN 109460655B
Authority
CN
China
Prior art keywords
screen
application
operation request
authority
range
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811099492.9A
Other languages
Chinese (zh)
Other versions
CN109460655A (en
Inventor
滕文星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201811099492.9A priority Critical patent/CN109460655B/en
Publication of CN109460655A publication Critical patent/CN109460655A/en
Priority to PCT/CN2019/106552 priority patent/WO2020057573A1/en
Application granted granted Critical
Publication of CN109460655B publication Critical patent/CN109460655B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses an electronic equipment control method and device, electronic equipment and a storage medium. The electronic equipment control method comprises the following steps: acquiring a permission setting request acting on a first screen; according to the permission setting request, setting a second permission range corresponding to a second screen on the basis of a first permission range corresponding to a first screen, wherein the second permission range is smaller than the first permission range; acquiring an operation request; if the operation request acts on the first screen, responding or rejecting the operation request according to the first authority range; and if the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range.

Description

Electronic device control method and device, electronic device and storage medium
Technical Field
The present application relates to the field of electronic technologies, but not limited to the field of electronic technologies, and in particular, to a method and an apparatus for controlling an electronic device, and a storage medium.
Background
In order to meet different display requirements, electronic devices have appeared, for example, dual-screen devices comprising two screens.
When the electronic device displays, the first screen and the second screen may be divided. The users using the first screen and the second screen may be different users. However, in the related art, when a single-system device supports multi-screen display, there are security problems such as easy information leakage.
Content of application
The embodiment of the application is expected to provide an electronic device control method and device, an electronic device and a storage medium.
The technical scheme of the application is realized as follows:
an embodiment of the present application provides an electronic device control method, including:
acquiring a permission setting request acting on a first screen;
according to the permission setting request, setting a second permission range corresponding to a second screen on the basis of a first permission range corresponding to a first screen, wherein the second permission range is smaller than the first permission range;
acquiring an operation request;
if the operation request acts on the first screen, responding or rejecting the operation request according to the first authority range;
and if the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range.
A safety control device for electronic equipment is disclosed,
The device comprises:
the first acquisition module is used for acquiring a permission setting request acting on a first screen;
the setting module is used for setting a second authority range corresponding to a second screen on the basis of a first authority range corresponding to a first screen according to the authority setting request, wherein the second authority range is smaller than the first authority range;
the second acquisition module is used for acquiring the operation request;
the first execution module is used for responding or rejecting the operation request according to the first authority range if the operation request acts on the first screen;
and the second execution module is used for responding or rejecting the operation request according to the second authority range if the operation request acts on the second screen.
An electronic device, comprising:
a first screen;
at least one second screen;
the processor is respectively connected with the first screen and the second screen and at least configured to acquire a permission setting request acting on the first screen; according to the permission setting request, setting a second permission range corresponding to a second screen on the basis of a first permission range corresponding to a first screen, wherein the second permission range is smaller than the first permission range; acquiring an operation request; if the operation request acts on the first screen, responding or rejecting the operation request according to the first authority range; and if the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range.
A computer storage medium storing a computer program; the computer program, when executed, enables the aforementioned electronic device control method to be implemented.
According to the technical scheme provided by the embodiment of the application, the second authority range of the second screen is set on the basis of the first authority range corresponding to the first screen according to the authority setting request acting on the first screen; and the second authority range of the second screen is smaller than the first authority range. Thus, when the operation request is acquired, the corresponding operation request can be responded or rejected based on the corresponding authority range according to the screen acted by the operation request. Therefore, when the master user uses the first screen, abuse of other users when using the second screen can be avoided by setting the second permission range of the second screen, so that the problem that the safety of the electronic equipment is not enough due to abuse of the second screen when the first screen and the second screen use the same permission at the same time is solved, and the use safety of the electronic equipment and the safety of information stored in the electronic equipment are improved.
Drawings
Fig. 1 is a schematic flowchart of a first electronic device control method according to an embodiment of the present disclosure;
Fig. 2 is a schematic flowchart of a second electronic device control method according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a third electronic device control method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a fourth electronic device control method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of various electronic device control apparatuses according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 7 is a schematic flowchart of a fourth electronic device control method according to an embodiment of the present application;
fig. 8 is a schematic flowchart of a fifth electronic device control method according to an embodiment of the present application;
fig. 9 is a schematic flowchart of a sixth electronic device control method according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a safety center device according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a security center system according to an embodiment of the present application.
Detailed Description
The technical solution of the present application is further described in detail with reference to the drawings and specific embodiments of the specification.
As shown in fig. 1, the present embodiment provides an electronic device control method, including:
Step S110: acquiring a permission setting request acting on a first screen;
step S120: according to the permission setting request, setting a second permission range corresponding to a second screen on the basis of a first permission range corresponding to a first screen, wherein the second permission range is smaller than the first permission range;
step S130: acquiring an operation request;
step S140: if the operation request acts on the first screen, responding or rejecting the operation request according to the first authority range;
step S150: and if the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range.
The electronic device according to this embodiment may be an electronic device including at least two screens. In some embodiments, the electronic device may also be an electronic device that includes 3 or 4 screens.
Taking a dual-screen device as an example, the first surface and the second surface of the first electronic device are both provided with a screen; the second surface is opposite the first surface.
If more than two screens are included, at least one second screen is located opposite the first screen.
The screen may be various types of screens, for example, an electronic ink display screen, a liquid crystal display screen, an Organic Light Emitting Diode (OLED) display screen, and the like.
In this embodiment, the electronic device may be various types of electronic devices, for example, a fixed device or a mobile device. The mobile device may include: vehicle-mounted mobile equipment or man-carried mobile equipment. The human-borne mobile device may include: a mobile phone or a tablet computer.
The electronic device includes: a first screen and at least one second screen.
In this embodiment, the electronic device may be a single system device or a multi-system device. If the electronic equipment is single-system equipment, the electronic equipment only runs one operating system, and the permission ranges of the first screen and the at least one second screen of the electronic equipment are set in the operating system. If the electronic device is a multi-system device, the electronic device may run multiple operating systems, and in this embodiment, the first permission range and the second permission range are set in the same operating system; namely, the first screen configured with the first authority range and the second screen configured with the second authority range can be the same operating system which is currently opened.
The operating system may be a variety of operating systems, such as an android operating system, an IOS operating system, a Windows operating system, and so forth.
The first screen and the second screen may be different screens, and the first screen and the second screen are two independent screens. The independence of the two independent screens can be embodied in that the control logics of the first screen and the second screen are completely independent; one of the screens may be lit individually, or multiple screens may be lit simultaneously. In some embodiments, the first screen and the second screen are not different regions of one screen. The display areas of the first screen and the second screen are different, for example, the first screen and the second screen are distributed on different surfaces of the multi-screen display device, and the like.
The first screen and the second screen may be the same type of screen, and may be different types of screens. For example, the first screen and the second screen may each be a liquid crystal display, an electronic ink display, an Organic Light Emitting Diode (OLED) display, or the like. In still other embodiments, the electronic device may have different types of screens for the first screen and the second screen to meet different display requirements. Different types of screens may be: screens with different display principles; or screens with different specific properties. For example, the first screen may be a liquid crystal display screen or an OLED display screen; the second screen may be an electronic ink display screen. The display principle of the electronic ink display screen is different from that of the liquid crystal display screen and that of the OLED display screen. Screens with different specific properties, for example, the first screen may be a hard screen with a small flexibility factor, and the second screen may be a flexible display screen with a large flexibility factor. The hard screen needs to maintain a specific attitude, for example, cannot be bent or the bending amplitude is very small; while the flexible display screen may be curved. If the electronic equipment is wearable equipment such as a smart watch, a hard screen can be arranged on the dial plate; a flexible display is provided on the wristband portion. The specific property may be a property such as a power consumption parameter, in addition to the flexibility factor. The different types of screens have different power consumption. For example, the power consumption of a liquid crystal display of the same area and the same resolution may be greater than that of an electronic ink display.
In summary, in some embodiments, the first screen and the second screen may be different screens; the electronic device at this time may be a multi-screen device.
The first screen and the second screen may be two independent physical screens, or may be different screen areas of the same physical screen. For example, two different display areas facing different directions in a flexible display screen may also be considered as a first screen and a second screen in the present application.
In other embodiments, the first screen and the second screen may be screen regions located within different screens; for example, the electronic device is a flexible display device, and the flexible display device includes a flexible display screen that can be folded, so that the display surfaces of two different areas of the flexible display screen can be oriented to different display surfaces, and a user can view the display of the first screen and the second screen on different sides of the screen.
In summary, in the present embodiment, the display surfaces of the first screen and the second screen face different directions, for example, face opposite directions or the included angle between the two display surfaces is greater than non-zero, for example, greater than u specific angle, which may be between 90 degrees and 270 degrees; of course, this is merely an example of a specific angle, and the specific implementation is not limited thereto.
In some embodiments, the first screen may be a primary screen and the second screen is a secondary screen; the main screen is a main display screen of the electronic equipment, and the auxiliary screen can be screens of different main screens. In some embodiments, the secondary screen of the electronic device may be: and an auxiliary screen for assisting the main screen display.
The distinction between the primary and secondary screens may be embodied in at least one of:
the setting positions are different, the main screen is positioned on the front surface (for example, the surface A) of the electronic equipment, and the front surface is the surface which is viewed and used by a user longest; the auxiliary screen is arranged on the back surface of the electronic equipment, and the back surface is the back surface of the front surface;
the system settings are different, and the operating system sets the corresponding screen as the primary screen, so that the primary screen may set many priorities relative to the secondary screen. For example, the device automatically lights the main screen during startup; whether the sub-screen needs to be lit up after the start-up may need to be determined by detecting an operation instruction applied to the main screen. For another example, during the starting process of the electronic device, the main screen is lighted preferentially, and then the auxiliary screen is lighted. In some embodiments, according to the energy storage condition of the current device, if the lighting of the current device is lower than a specific value, the secondary screen is automatically turned off to save the display power consumption, so as to prolong the standby time of the electronic device and maintain the normal display of the primary screen.
In some embodiments, the specific screens corresponding to the primary screen and the secondary screen may be switched according to the setting of the user.
The first screen has a first permission range; the second screen has a second permission range. The first range of authority being greater than the second range of authority, may include:
the first range of rights contains more rights than the second range of rights; thus, the permission set corresponding to the first screen is larger than the permission set corresponding to the second screen; in this manner, rights relating to information security and device usage security of the electronic device may be deleted from the second scope of rights.
In some embodiments, the first range of rights may have a higher level of rights than the second range of rights; thus, the first screen has a higher permission level for the same permission; for example, taking the webpage viewing permission as an example, the high permission level can view all the webpage contents, and the low permission level can only view the specified contents;
in other embodiments, the privilege priority of the first privilege range may be higher than the privilege priority of the second privilege range; thus, the operation request acting on the first screen has higher priority aiming at the same authority; for example, by using an intelligent home control application on the electronic device, a first screen detects an operation request for controlling the air conditioner to be turned on and setting a target temperature to be a, and a second screen detects an operation request for controlling the air conditioner to be turned on and setting the target temperature to be B; and according to the permission priority of the first screen being higher than that of the second screen, the electronic equipment sends an opening instruction with the target temperature of A to the air conditioner at the moment.
In some embodiments, the first range of permissions may be: a permission range containing all permissions of the electronic equipment; the second range of permissions may be: the authority range containing partial authority of the electronic equipment. At this time, the first authority range defaults to the authority range of the electronic device.
In general, the difference between the first and second ranges of authority may be manifested in any of the three aspects described above. Therefore, the permission of the second screen when the electronic equipment is used can be controlled through the permission difference setting of the first screen and the second screen, and therefore the use safety information of the electronic equipment and the information safety of the information stored in the electronic equipment are improved.
Because the first permission range and the second permission range are set, the second screen does not have all permissions of the electronic device any more, and if an operation request acting on the second screen is detected, whether the operation request is responded or not needs to be determined according to the second permission range of the second screen. For example, if the authority used by the operation request is within the second authority range, the operation request is responded, otherwise, the operation request is not responded. Not responding to the operation request is that: the operation request is rejected.
The operation request may correspond to various operations acting on the screen, for example, a touch operation such as clicking, sliding, pressing, or dragging a control, or various operation requests acting on the screen detected by a mouse or an eye tracker.
For example, the operation request may include: and detecting an operation request corresponding to cursor operation, such as clicking, dragging and the like of a certain display control of the second screen indicated by the cursor. The cursor operation may be a cursor operation based on mouse assistance or a cursor operation based on a touch panel that is not disposed to overlap the second screen;
for example, the operation request may include: an operation request detected by the sight line positioning operation; for example, an operation of a display control acting on the second screen by a through hole positioning or an eye tracker or the like.
In some embodiments, as shown in fig. 2, the method further comprises:
step S100: determining whether an application condition of a second permission range is satisfied;
the step S150 may include: and if the application condition is met and the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range.
In some embodiments, as shown in fig. 2, the method further comprises:
Step S160: and if the application condition is not met, responding or rejecting the operation request acting on the second screen according to the first authority range.
Therefore, under some specific conditions, whether the application condition of the second permission range is met or not can be determined based on user input or built-in instructions of the electronic equipment according to circumstances, if the application condition of the second permission range is met, the response of the operation request of the second screen is limited according to the second permission range, otherwise, the second screen also enjoys the first permission range, and therefore different operation requirements can be conveniently met. For example, if the non-master user using the second screen is a user trusted by the master user, the electronic device may be instructed by the user input to currently not satisfy the application condition of the second permission range, so as to avoid inconvenience caused by the restriction of the second permission range on the operation request response of the second screen; thereby again enhancing the user experience.
In some embodiments, the first screen and the second screen are different physical screens facing different directions; the step S100 may include: determining whether to launch a secure application environment; and if the safe application environment is started, determining the application conditions meeting the second authority range.
For example, whether the application condition is met is determined according to whether a network to which the electronic device is currently connected is a preset network, for example, according to whether a hotspot to which the electronic device is currently connected is a hotspot of a home network configured inside the electronic device or a hotspot of an office area, and the like. If the non-secure hotspot in the public area to which the electronic device is currently connected is considered to be an application condition meeting the second permission range.
For another example, the first screen and the second screen are different display areas of the same physical screen;
the step S100 may include: and determining the application condition meeting the second permission range according to whether the current posture of the physical screen is a preset posture or not and if the current posture of the physical screen is the preset posture enabling the first screen and the second screen to face different directions.
If the first screen and the second screen are not oriented in different directions because of the current postures, the first screen and the second screen are both under the monitoring of the master user, the operation request response of the second screen with the limited second permission range is not required to be started. If the current posture causes the first screen and the second screen to face different directions, the application condition of the second permission range can be considered to be satisfied.
In some embodiments, the step S100 may further include: and determining whether the electronic equipment is in a safe mode, and if so, considering that the application condition of the second permission range is met. For example, if the electronic device automatically enters the secure mode based on a user operation, based on a network type to which the electronic device is currently connected, or based on a current posture of the electronic device, the electronic device may determine whether the application condition of the second permission range is satisfied according to whether the electronic device enters the secure mode when detecting an operation acting on the second screen. If the identification information indicating that the electronic device enters the secure mode is provided in the electronic device, the processor of the electronic device may consider that the current electronic device is in the secure mode and meets the application condition of the second permission range.
In some embodiments, the step S150 may include:
inquiring the authority identification of the authority contained in the second authority range according to the identification information carried by the operation request;
if the identification information is contained in the authority identification, responding to the operation request; and/or refusing the operation request if the identification information is not contained in the authority identification.
The identification information corresponding to the operation request may include at least one of:
the application identification of the application acted by the operation request;
an operation identifier of an operation requested by the operation request;
the operation request requests an operation type identification of the requested operation.
In the second right range, there are provided: identification information to which an operation request acting on the second screen can be responded. In this way, querying the second authority range with the identification information can determine whether the operation corresponding to the operation request can respond.
For example, the same type of operation request may correspond to different specific operations, for example, a payment operation in a payment application may include: password-free payment operation and password payment operation. The password-free payment operation and the password payment operation are different specific payment operations of payment operations, and the operation identifications are different. The operation identifiers of the two specific payment operations may be included in the first authority range corresponding to the first screen at the same time, but only the operation identifier of the password payment operation may be included in the second authority range corresponding to the second screen.
For example, the operation types may be divided according to functions implemented by the operations, such as a reading operation, an image capturing operation, an audio capturing operation, an information sharing operation of a social application, a call operation, an instant messaging operation, a payment operation, a shopping operation, a system upgrade operation, an application installation operation, an application deletion operation, and the like. The above are examples of different types of operations, and the specific implementation is not limited to any of the above.
In some embodiments, the step S150 may include:
displaying application icons of the first type of applications on a display page of the second screen according to the application display authority of the second authority range; alternatively, the step S150 may include: and shielding the display of the second type of application on the second screen according to the application display authority of the second authority range.
The display page may be a desktop of the second screen, an application folder page, or a management page number, but is not limited to these pages.
The operation request corresponds to identification information, and the identification information can be one or more of an application identification of an application generated by the operation request, a type identification of an operation type and an operation identification of the operation.
And inquiring a second authority range of the second screen according to the identification information corresponding to the operation request, and determining whether to respond to the operation request according to an inquiry result.
If the second permission range includes the identification information, it can be considered that the second permission range corresponding to the second screen includes the permission responding to the operation request, so that the operation request is responded. If the second permission range does not contain the identification information, the second permission range is considered to not contain the permission for responding to the operation request, and the operation request is rejected.
And if the operation request is responded, the electronic equipment executes the operation request, and if the effect of the operation request response needs to be displayed, the effect is displayed through the second screen.
If the operation request is rejected, the electronic equipment shields the operation request, namely does not execute the operation request.
In some embodiments, the applications of the electronic device may be classified into a first type of application and a second type of application. The second type of application is an application in the electronic equipment except the first type of application.
The first type of application and the second type of application have at least one of the following differences:
the security level is different, for example, the security level of the first type of application is lower than that of the second type of application;
the application type is not used, for example, the first type of application may be some multimedia applications, more output applications of the same kind of public information, little or no private information related to the user, etc.; while a second type of application may be a social application, a payment application, etc. that may relate to the user's private information.
The determination of the application type can be determined by the processor of the electronic device by analyzing the application identification or according to the attribute configuration of the application.
For example, the payment application may include: applications for various banks, applications for mobile payments such as pay-for-treasure or WeChat, financial applications for various financial companies, applications for e.g. stock trading and/or fund trading, etc.
The social application may include: various applications that utilize various communication technologies for social interaction, such as applications that utilize instant messaging technologies for social interaction, may typically be as follows: WeChat, and the like.
Of course, the above is only an example of the difference between the first type of application and the second type of application, and the specific implementation is not limited to any one of the above.
In some embodiments, the electronic device may automatically determine which applications installed on the electronic device are applications of the first type according to the security level, the application type, and other parameters defined by the second permission range, so that the user's attention may be reduced to set whether each application belongs to the applications operable in the second permission range.
Since the first type of application is only displayed on the second screen, the second type of application which the holder of the device does not want others to operate through the second screen is rather directly hidden, and thus, no opportunity is given for others to operate the second type of application with a high security level through the second screen, thereby preventing various security problems caused by others operating the second type of application through the second screen.
In some embodiments, the first type of application comprises at least one of:
An entertainment application providing entertainment services;
a search application providing information search;
providing a multimedia information acquisition application for multimedia information acquisition;
an application store application that provides an application installation service;
and/or the presence of a gas in the gas,
the second type of application comprises at least one of:
a payment application providing a network payment service;
a shopping application providing an online shopping service;
a mail application providing an email service;
a social application providing a social service;
an information recording application that provides information recording;
a security control application for providing security control of a device.
For example, the entertainment application may include:
audio entertainment applications, e.g., various listening applications;
video entertainment applications, for example, various video applications, the video applications herein may include: conventional video applications (e.g., Tencent video, Aifangi video), and so on. In some embodiments, the video application may further include: short video applications, such as a fish fighting video, etc. Conventional video applications may generally provide video for various video durations, while short video applications may be: an application for providing a video having a video duration less than a certain value.
In some embodiments, video applications may also be divided into: active sharing type video applications, centralized push type video applications, for example, centralized push type video from a relatively fixed small number of video providers; and the actively shared video application may be: each user can actively share the video application.
The entertainment application may further include: gaming applications, on which users may participate in various electronic games, such as stand-alone games, networked network games, and the like.
The search application may be an application corresponding to a search engine, such as a hundred degree search, a google search, and the like.
The multimedia information collection application may include: audio capture applications (e.g., various camera applications), audio capture applications (e.g., various song recording applications), and the like.
In some embodiments, the application negotiates an application, for example, an APP store application. Installation packages for various applications can be found on the application store application for installation, upgrade, or update of the application, and the like.
Of course, the above is only an example of the first type of application, and the specific implementation is not limited to the above one.
The payment application may be used for applications such as electronic payment, remittance, transfer, etc. that provide out-of-value payouts for money, stocks, funds, etc., such as a payroll application, a banking application, etc.
The shopping application may purchase goods and/or services via a network, such as Taobao, Jingdong, Mei Tuo. The merchandise may include: clothing, electronic equipment, articles for daily use, school supplies, restaurants and the like. The services may include: aviation services, railway services, travel services, hotel services, home cleaning services, and the like.
Mail applications that provide email services may include: mail applications based on different types of mail protocols. The mail application differentiation by its content attributes may include: office mail applications, private mail applications, and the like.
Recording applications may include, but are not limited to:
applications for information memos, e.g., memo applications;
applications for notes, e.g., there are cloud note taking applications;
an application for scheduling, a schedule information application.
Security control applications, such as antivirus software applications, firewall applications, etc., that provide security control of devices.
The above is merely an illustration of the second type of application, and the specific implementation is not limited thereto.
The setting of the first type of application and the second type of application may be performed based on detecting user input, or may be automatically set by the electronic device based on application identification and/or attribute configuration according to security in the process of providing service by the application.
In some embodiments, as shown in fig. 3, if the operation request acts on the second screen, responding to the operation request according to the second permission range further includes:
step S151: if the operation request acts on the second screen, and the second permission range comprises a preset permission corresponding to the operation request;
Step S152: inquiring the authority attribute of the preset authority;
step S153: and executing predetermined operation according to the authority attribute.
In this way, through the setting of the authority attribute, even when the operation request of the second screen is allowed to be responded, the response of the second screen to the operation request can be further limited or monitored, so that the safety of the electronic equipment is improved again.
In some embodiments, the step S153 may include at least one of:
if the authority attribute comprises a first screen monitoring attribute, displaying the monitoring information on the first screen according to a response condition acted on the operation request, wherein the monitoring information comprises state information of the operation request;
and if the authority attribute comprises a first screen notification attribute, displaying notification information of an operation request acting on the second screen on the first screen according to the operation request, wherein the notification information is used for notifying the operation request acting on the second screen based on the executed operation request.
In some embodiments, the determining the operation attribute of the first type of application according to the application operation authority of the second screen includes:
Determining whether the first type of application has a first screen notification attribute according to the application operation authority of the second screen; the first screen notification attribute is used for displaying an operation notification on the first screen when the first type of application executes a first preset operation;
determining whether the first type of application has a first screen monitoring attribute according to the application operation authority of the second screen, wherein the first screen monitoring attribute is used for displaying monitoring information on the first screen when the first type of application executes a second preset operation;
determining whether the first type of application has an editing limitation right according to the application operation right of the second screen, wherein the editing limitation right is used for forbidding the first type of application to respond to an editing operation request acting on the second screen;
and determining whether the first type of application has access limitation authority according to the application operation authority of the second screen, wherein the access limitation authority is used for forbidding the first type of application to respond to the access operation request acting on the second screen.
In some embodiments, the second screen is displayed with applications of the first type, such that the second screen provides an interface to use the applications of the first type outwardly, but upon specific use, a notification may be displayed on the first screen, such that the holder of the electronic device is informed of which applications are specifically used by the user currently using the second screen.
In still other embodiments, some of the functionality of the first type of application may not be in the second privilege range or may be in the second privilege range where the security level requirement is high, requiring the first screen to output a notification to be known to the holder of the electronic device. At this time, it can be realized by setting a first screen notification attribute of the first type application. For example, a first type of application provided with a first screen notification attribute is started or when a specific operation is performed, an operation notification is displayed on the first screen. For example, a prompt notification that the corresponding first type application is started pops up on the first screen, or a prompt notification that the first type application has performed a specific operation.
In some embodiments, the first type of application may be provided with a first screen monitoring attribute. After the first screen monitoring attribute is set, the first type of application is started or operated, corresponding monitoring information is generated, and the monitoring information is displayed on the first screen at regular time or irregular time or is continuously displayed in a preset area of the first screen. The persistent display here may include: and keeping displaying the monitoring information of the first type of application in the preset area during the time that the first type of application is opened until the first type of application is closed. The predetermined area may be a specific display position of the first screen or may be an application-specific interface of a movable display position. For example, the application interface may be a floating window, the floating window may be located on the uppermost layer of the display of the first screen, and changes of the desktop or the application interface of the first screen displayed on the lower layer of the floating window do not interfere with the display of the floating window, so that it may be ensured that a user of the electronic device may view the monitoring information through the floating window at any time.
If a first type of application is set with a first screen monitoring attribute, the operating system of the electronic device, the monitoring application or the application itself monitors the information of the first type of application,
the monitoring information includes, but is not limited to, the following:
an application log having a first screen monitoring attribute application; the application log may include: an operation log for each operation performed by the corresponding application, the operation log may include: the execution time of the operation, the parameters of the operation. For example, the parameters of operation may include: the number of operations, the parameter values carried. For example, for the video application as an example, the operation log may include: the specific content of the operation log for playing the video may include: information such as a video identifier (e.g., a name, a uniform resource locator) of a video played on the second screen, start and stop time of the playing, a user account used for the playing, and the like;
based on the information converted by the application log, the application log has a specific format which may not be convenient for a common user to read, and only the interested content of the holder of the electronic device is selected by screening the information of the application log and is converted into natural language for output.
The above is an example of the monitoring information, and the specific implementation is not limited to any one of the above.
In some embodiments, as shown in fig. 4, the method further comprises:
step S170: if the operation right corresponding to the operation request acting on the second screen is limited outside the second authority range, query information is displayed on the first screen;
step S180: responding or rejecting the operation request based on the operation instruction acting on the inquiry information.
If an operation request acting on the second screen is outside the second permission range, in order to reduce the possibility that the operation request which has to be responded is mistakenly killed, in this embodiment, query information is displayed on the first screen, an operation instruction acting on the query information can be obtained through the display of the query information, and whether the operation instruction is responded or not can be determined based on the operation instruction, so that the intelligence of the electronic device and the satisfaction degree of the user are further improved.
For example, the query message may pop up in the form of a dialog box on which a control indicating "agree" or "disagree" is displayed, so that the user may give corresponding information input of agreement or disagreement by a single click or one-time operation, simplifying the user operation.
In some embodiments, the query information includes at least one of:
first inquiry information, wherein the first inquiry information is used for inquiring whether the second screen is allowed to start the requested application this time;
second inquiry information for inquiring whether to switch to the first screen to start the requested application;
and third inquiry information used for inquiring that the second screen agrees to start the requested application at this time and later.
The first inquiry information corresponds to single inquiry information, and the operation detected by the first screen is only used for the person who agrees or disagrees with the current starting.
The second query message may be initiated by switching directly to the first screen, thereby facilitating monitoring by the user using the first screen.
The third inquiry information can be used for setting the start permission or the start prohibition of the second screen at this time and later; therefore, the holder of the electronic equipment does not need to set the second authority range specially, and the second authority range is set in the using process of the electronic equipment, so that the user operation is simplified, and the user experience is improved.
In some embodiments, the method further comprises: and updating the second authority range according to the operation instruction.
In some embodiments, the updating the second permission range according to the operation indication may include: and if the operation indication is a first permission indication, adding a preset permission into the second permission range.
If it is detected that the operation instruction indicates that the second screen needs to be granted in response to the corresponding operation request, it indicates that the primary user is a non-primary user who is relieved of the use of the second screen, and in order to avoid that the primary user can only enter a setting page of a specific second permission range to set the second permission range, in this embodiment, if the operation instruction indicating the approval generated based on the inquiry information is detected, the second permission range may be directly updated. Therefore, the user does not need to specially set or update the second authority range, and the user experience is improved again.
In some embodiments, the step S180 may include at least one of:
if the operation instruction is a second agreement instruction, responding to the operation request by using a second screen;
and if the operation instruction is a third agreement instruction, responding to the operation request by using the first screen.
For example, in some embodiments, the step S120 may further include:
and detecting an application state of the application indicated by the application operation request, and if the application is started on the first screen or the other second screens, determining whether to respond to the operation request according to the application parameters of the application.
The application state may include at least one of:
Is started;
not starting;
a screen to start.
And if the application parameter indicates that the application can only open one application interface, rejecting the operation request.
Taking a social application as an example, if one social application may only run one account, only one application interface may be opened, and if the application is already started on the first screen, it may be directly determined to reject the operation request.
And if the application parameters indicate that the application can open a plurality of application interfaces and the authority of the application is within a second authority range, responding to the operation request. Taking office application as an example, office application can open a plurality of application interfaces and display different files, so that the application interfaces do not conflict with each other, and the request can be responded.
In some embodiments, the step S110 may include: acquiring an application starting request acting on the application icon displayed on the second screen;
the step S120 may include: if the second screen does not have the authority of starting the application requested by the application starting request, displaying inquiry information on the first screen;
according to the agreement instruction of the application requested by the second screen starting, starting the application corresponding to the application identifier, and displaying an application interface of the started application on the second screen, wherein the agreement instruction is as follows: formed based on operations acting on the query information.
In some embodiments, the step S120 may include: and setting corresponding second permission ranges of the second screen under different application modes on the basis of the first permission range corresponding to the first screen according to the permission setting request.
In still other embodiments, the application mode includes at least one of:
a child mode;
an elderly mode;
normal adult mode.
The second permission range of the second screen may be different for different application modes.
In some embodiments, before the obtaining of the operation request acting on the second screen, the method further includes:
selecting an application mode according to the user attribute;
and determining the second authority range of the second screen according to the application mode.
For example, the application mode is selected according to at least one of the age, sex, occupational characteristics, education level, and hobbies of the user.
In some embodiments, the selecting an application mode according to the user attribute includes:
the child mode, the old man mode, or the adult mode is selected according to the age of the user.
The child mode may be that the multimedia application used in the second screen is not able to view a particular type of video, e.g., a violent video, etc.
The elderly mode may require applications that the second screen allows for, for example, applications that may be intrusive to the elderly, and user satisfaction may be increased by prohibiting the use of these applications.
The adult mode may be a normal mode other than the child mode and the senior mode.
In some embodiments, the selecting an application mode according to the user attribute includes:
a regular game application start mode, a specific game application start mode, a game application start prohibition mode, and the like are selected according to the gender of the user.
A regular game application launch mode, allowing the launching of all game applications. The particular game application launch mode may only allow launching of a particular game. The gaming application disables the start mode and does not allow the second screen to start and/or display the gaming application. In some further embodiments, if the operation request is rejected, the method further comprises: and outputting a rejection prompt through the corresponding second screen. The rejection prompt may include: and prompting that the corresponding operation request is rejected. In other embodiments, the rejection prompt may further include: reason why the operation request is rejected; to distinguish a prompt that the operation request was denied for another reason. For example, some operation requests are requests that the device does not have the capability to display, rather than the capability to display a rejection that is not allowed because of the second scope of authority corresponding to the second screen. In the present embodiment, the reason why the prompt is rejected is used for distinction.
In some embodiments, the electronic device is configured with at least a secure mode that responds to an operation request made to or corresponding to the second screen based on the second range of authority.
In other embodiments, the electronic device may further be configured with a normal mode, and in the normal mode, the permission range between the first screen and the second screen may be the same, for example, the permission range of the second screen in the normal mode may also be equal to the first permission range.
In some further embodiments, the responding to the operation request or rejecting the operation request according to the second permission range of the second screen includes:
and under the condition that the security mode is started, responding to the operation request according to the second authority range.
If the electronic equipment is in the safe mode, the operation request is responded according to the second authority range, otherwise, the operation request acting on the second screen can be responded according to other configurations of the electronic equipment.
In some embodiments, the step S110 may include: acquiring an application starting request acting on the application icon displayed on the second screen;
the step S120 may include: inquiring the second authority range according to the application identifier corresponding to the application operation request;
If the second permission range contains the permission of the application corresponding to the application identifier, starting the application corresponding to the application identifier, and displaying an application interface of the started application on the second screen.
In some embodiments, the main page of the second screen may display all applications of the electronic device, without distinguishing the first type of application from the second type of application, but the permission of the second screen is limited, so in this embodiment, or an application start request for displaying an application icon acting on the second screen is obtained, in step S120, it needs to be determined whether the start request can be responded to, and if the permission of the start request is included in the second permission range, the electronic device starts the application and displays an application interface of the application on the second screen.
In some embodiments, the determining the second permission range of the second screen according to the setting operation applied to the first screen includes at least one of:
determining a security mode of the second screen according to a setting operation applied to the first screen;
determining a first type of application which can be displayed by the second screen according to the setting operation acted on the first screen;
And determining the operation attribute of the first type of application when the first type of application is displayed on the second screen according to the setting operation acted on the first screen.
The above is merely an example for setting the second right range, and the specific implementation is not limited to any description above.
As shown in fig. 5, the present embodiment provides an electronic device control apparatus, including:
a first obtaining module 110 configured to obtain a permission setting request acting on a first screen;
a setting module 120 configured to set a second permission range corresponding to a second screen on the basis of a first permission range corresponding to a first screen according to the permission setting request, wherein the second permission range is smaller than the first permission range;
a second obtaining module 130 configured to obtain the operation request;
a first execution module 140 configured to respond to or reject the operation request according to the first permission range if the operation request acts on the first screen;
the second execution module 150 is configured to respond to or reject the operation request according to the second permission range if the operation request acts on the second screen.
In some embodiments, the first obtaining module 110, the setting module 120, the second obtaining module 130, the first executing module 140, and the second executing module 150 may correspond to program modules, and the program modules may be processed to obtain the operation request acting on the second screen and respond to the operation request or the clustering operation request according to the second permission range of the second screen.
In some embodiments, the apparatus further comprises:
the determining module is configured to determine whether the application condition of the second permission range is met;
the second executing module 150 is configured to respond or reject the operation request according to the second permission range if the application condition is satisfied and the operation request acts on the second screen.
And the determining module is configured to respond or refuse the operation request acting on the second screen according to the first authority range if the application condition is not met.
In some embodiments, the first screen and the second screen are different physical screens facing different directions;
the determining module is configured to determine whether to start a secure application environment; and if the safe application environment is started, determining the application conditions meeting the second authority range.
In some embodiments, the first screen and the second screen are different display regions of the same physical screen; the determining module is configured to determine, according to whether the current posture of the physical screen is a preset posture, an application condition that meets the second permission range if the current posture of the physical screen is a preset posture in which the first screen and the second screen face different directions.
In some embodiments, the second executing module 150 is configured to query, according to the identification information carried in the operation request, an authority identification of an authority included in the second authority range; if the identification information is contained in the authority identification, responding to the operation request; and/or refusing the operation request if the identification information is not contained in the authority identification.
In some embodiments, the identification information carried by the operation request may include at least one of:
the application identification of the application acted by the operation request;
an operation identifier of an operation requested by the operation request;
the operation request requests an operation type identification of the requested operation.
In some embodiments, the second execution module 150 is configured to display an application icon of the first type of application on the display page of the second screen according to the application display permission of the second permission range; or shielding the display of the second type of application on the second screen according to the application display authority of the second authority range.
The first type of application comprises at least one of:
an entertainment application providing entertainment services;
a search application providing information search;
Providing a multimedia information acquisition application for multimedia information acquisition;
an application store application that provides an application installation service;
and/or the presence of a gas in the gas,
the second type of application comprises at least one of:
a payment application providing a network payment service;
a shopping application providing an online shopping service;
a mail application providing an email service;
a social application providing a social service;
an information recording application that provides information recording;
a security control application for providing security control of a device.
In some embodiments, the second execution module 150 is configured to, if the operation request acts on the second screen, determine that the second permission range includes a predetermined permission corresponding to the operation request; inquiring the authority attribute of the preset authority; and executing predetermined operation according to the authority attribute.
The second execution module 150 is configured to execute at least one of:
if the authority attribute comprises a first screen monitoring attribute, displaying the monitoring information on the first screen according to a response condition acted on the operation request, wherein the monitoring information comprises state information of the operation request;
and if the authority attribute comprises a first screen notification attribute, displaying notification information of an operation request acting on the second screen on the first screen according to the operation request, wherein the notification information is used for notifying the operation request acting on the second screen based on the executed operation request.
In some embodiments, the apparatus further comprises:
the inquiry module is configured to display inquiry information on the first screen if the operation right corresponding to the operation request acting on the second screen is limited outside the second authority range;
and the third execution module is configured to respond or reject the operation request based on the operation instruction acting on the inquiry information.
In some embodiments, the apparatus further comprises:
and the updating module is configured to update the second permission range according to the operation instruction.
In some embodiments, the updating module is configured to add a preset right to the second right range if the operation indication is the first consent indication.
In some embodiments, the third execution module is configured to execute at least one of:
if the operation instruction is a second agreement instruction, responding to the operation request by using a second screen;
and if the operation instruction is a third agreement instruction, responding to the operation request by using the first screen.
In some embodiments, the setting module 120 is configured to set a second permission range corresponding to the second screen in different application modes on the basis of the first permission range corresponding to the first screen according to the permission setting request.
In some embodiments, the application mode includes at least one of:
a child mode;
an elderly mode;
normal adult mode.
As shown in fig. 6, the present embodiment provides an electronic apparatus including:
a first screen 101;
at least one second screen 102;
a processor 103 connected to the first screen 101 and the second screen 102, respectively, and configured to execute any one of the above-mentioned electronic device control methods; for example, one or more of the methods shown in fig. 1-9 and 7-9 may be performed.
In some embodiments, the processor 103 is at least configured to obtain a permission setting request acting on the first screen 101; according to the permission setting request, setting a second permission range corresponding to a second screen 102 on the basis of a first permission range corresponding to a first screen 101, wherein the second permission range is smaller than the first permission range; acquiring an operation request; if the operation request acts on the first screen 101, responding or rejecting the operation request according to the first authority range; and if the operation request acts on the second screen 102, responding or rejecting the operation request according to the second authority range.
The processor 103 may be various types of processors 103 and the processor 103 may be various types of processors 103, and the processor 103 may be: a central processing unit 103, a microprocessor 103, a digital signal processor 103, an application processor 103, a programmable device, etc.
The first screen 101 and the second screen 102 may be different screens. The association relationship between the first screen 101 and the second screen 102 can be referred to in the foregoing embodiments, and is not repeated here.
The processor 103 may be connected to the first screen 101 and the second screen 102 through various buses, and is configured to respond to or reject an operation request according to the operation request applied to the second screen 102 and the second permission range of the second screen 102.
The first screen 101 and the second screen 102 may be located on opposite sides of the electronic device. For example, the first screen 101 is located on a first surface of the electronic device; at least one of the second screens 102 is located on a second surface of the electronic device; the second surface is opposite the first surface.
If the first screen 101 is a primary screen, the primary screen is located on the front side of the electronic device, and if the second screen 102 is a secondary screen, at least one secondary screen is located on the back side of the electronic device. If the electronic device includes multiple secondary screens, some of the secondary screens may even be located on the side of the electronic device.
In this embodiment, the electronic device may be a device of a single operating system.
The electronic equipment can ensure the equipment use safety of the electronic equipment and the information safety of the stored information by executing any one or more electronic equipment control methods.
There is also provided in some embodiments a computer storage medium having a computer program stored thereon; after being executed, the computer program can implement the electronic device control method provided by one or more of the foregoing technical solutions, for example, one or more of the methods shown in fig. 1 to 4 and fig. 7 to 9 can be executed.
The computer storage media may be various types of storage media, and the storage media may be non-transitory storage media.
Several specific examples are provided below in connection with any of the embodiments described above:
example 1:
the application provides a permission management method of a double-screen terminal. The application comprises a management module (whether a security mode can be started by the management in the setting, a sensitive information source can be set, a default auxiliary screen using desktop (launcher) group and a launcher group for adding auxiliary screens in the management are set), a launcher setting module, a sensitive information acquisition module (installing sensitive application or using), and a monitoring module, wherein if a user does not set or carelessly sets some information and divulgence information, the main screen needs to be prompted for related information.
The application scenarios of the method provided by the application can be as follows:
for example, the mobile phone is taken as the aforementioned electronic device, a mobile phone holder uses a main screen of the dual screens, the dual-screen mobile phone supports single-system dual-screen operation, and a non-holder user needs to use a secondary screen to perform certain unique behaviors, which include watching a movie, playing a game, and the like.
Due to the characteristic that the double screens can be folded, a mobile phone holder may not know the behaviors of a user who is not the holder, at this time, the mobile phone holder sets the safety function of the secondary screen through the safety center system, limits the behaviors of the secondary screen, sets the application which can only be used by the user, and authorizes and monitors when the user opens the application. Therefore, the mobile phone of the mobile phone holder can be safely managed, and information leakage and manual system damage of the user are prevented.
The application also describes a permission management method under the double-screen AB mode, and the management scheme of the management method is as follows:
the first step is as follows: it is necessary to set a security mode whether to start the dual screen application in the management module. And it is possible to set which screen is the main screen and which is the sub screen.
The second step is that: if the security mode of the double-screen application is started, a default authority range of the main screen and the auxiliary screen is given, and a mode of increasing and deleting the authority and the application range is provided in the setting so as to avoid information leakage. Applications such as host information exposure include but are not limited to short messages, WeChat, diary, photo, microblog, Tmao, Kyoto, etc. Take an example of a setup: the main screen is a full authority range, and the auxiliary screen is a limited authority range.
The setting contents of the authority range of the sub-screen may include, but are not limited to:
1) applications that do not need to be displayed for setting the secondary screen, such as the applications related to money, such as the jingdong, naobao, pay-for-treasure, and the like;
2) the secondary screen may display applications that need to be opened on the primary screen. For example, the operation of installing an application needs to be opened on the main screen to judge whether installation is necessary;
3) the method comprises the following steps that openable applications are controlled, wherein the controlled mode comprises the steps that a monitoring picture is provided on a main screen, and characters are provided on the main screen to prompt the current operation mode of a user;
4) applications can be opened but only have viewing rights and no editing rights, such as contacts can be opened but not be added or deleted, photos can be viewed but not delete and modify functions can be provided. And setting addition and deletion of related applications, and modifying related rights in a form including long-press dragging and not limited to the long-press dragging.
The third step: after the related authority range is set in the management module, icons of related applications can be distinguished and displayed on the auxiliary screen to indicate which icons cannot be used, the owner can confirm the identity of the owner through identity authentication and edit the application icons, specifically, a menu of each icon of a launcher can be added, 4 options are provided for management, and after the setting is finished, the setting can be stored in a database. For example, the sub-screen discriminates application icons displaying applications of a first type or applications of a second type; the differentiated display herein may include: the display is differentiated using different display parameters, for example, including but not limited to: the colors are displayed, for example, the application icons of the second type of application are gray icons and the application icons of the first type of application are color icons. As another example, the first type of application and the second type of application are displayed at different display luminances.
The fourth step: although the relevant applications are set, the user is inevitably provided with an opportunity to use the information relevant to the mobile phone owner, and a sensitive information monitoring mode can be set. And monitoring is applied by setting a permission in the PMS, and if a new application is installed, monitoring can be carried out through the AMS.
Example 2:
referring to fig. 7, the method for setting the permission of a dual-screen device according to this embodiment may include:
step S101: the main screen sets whether the auxiliary screen starts an security mode or not;
step S102: the set options are stored in a database so as to be used by the auxiliary screen conveniently; the option here is an option for configuring the second permission range;
step S103: the auxiliary screen performs desktop display according to the setting of the main screen, for example, only an application icon needing to display an application with permission is displayed, or application icons with permission and application icons without permission are displayed in a distinguishing manner. When the auxiliary screen operates and clicks one Application (APP), an Activity Manager Service (AMS) system discriminates the operation of the auxiliary screen, interrupts Application loading, and provides confirmation information to the main screen to allow a user of the main screen to confirm the information.
Step S104: the main screen displays the confirmation information of the auxiliary screen application, after the confirmation operation acting on the main screen is detected, the AMS restores the related application initialization and loads the auxiliary screen, and at the moment, the auxiliary screen performs APP initialization.
The method for setting the secondary screen on the primary screen in this embodiment includes setting whether to turn on the scheduling mode S101, and it should be noted that the secondary screen defaults that the secondary screen does not have permission to access the setting item, and if the secondary screen enters the setting item, the setting interface should be displayed on the primary screen for setting. If the secure mode is enabled, several aspects can be set:
(1) the security applications that the sub-screen needs to display may be set to include, which should include one or more default minimum subset of applications, and the default applications may be differentiated for a specific group of people by function, authority, for example, entertainment applications by function, including applications related to the category of playing movies and games, for example, children mode for a specific group of people, and elder mode, which not only limits the applications, but also involves changes in desktop (launcher) style. Again, for example, all applications without risky privileges are the smallest subset. If a new application is installed, the default is not within a safe range. For example, the font of the senior mode desktop may be larger than the normal adult mode.
(2) The security application can be displayed on the secondary screen, related use prompt key information can be set, an application of the secondary screen is opened, the AMS intercepts and opens the disappearance, the current secondary screen ID2 is confirmed through the Identification (ID) of the primary screen and the secondary screen, the current application process is suspended, the security monitoring application is called, the application is set to be the attribute of the primary screen ID1, a prompt interface is displayed on the primary screen, and a user of the primary screen needs to confirm the prompt interface, including but not limited to: 1) whether the application is being displayed, 2) whether to switch to the home screen display, and 3) whether to confirm the option each time. The application can be opened on the secondary screen if and only if the user has selected to be displayed and does not switch to the primary screen S104. If each validation is chosen, it needs to be started the next time the application is started again, otherwise it needs to be called only once. When the application is displayed and the home screen is switched, the AMS immediately ends the application instance of ID2, restarting an application instance of ID 1; if the application is selected not to be displayed, the AMS should stop the display of the application and give a sub-screen prompt message before stopping.
(3) After the setting items are set, the setting items are stored in the local computer in a database mode S102, the operation of refreshing the auxiliary screen is triggered, and the application group in the security mode S103 is displayed.
Example 3:
the following is a specific example of how the security centre works.
The successful setting of the auxiliary screen permission is taken as an example for explanation. As shown in fig. 8, firstly, the sub-screen cannot be provided with a security center; therefore, the safety center is set by the user who is not the owner through the auxiliary screen, and the permission range of the auxiliary screen is changed to cause the safety problem.
Before authority setting is carried out on the main screen, main screen identity authentication is carried out, the modes of inputting passwords, gesture graphs or fingerprints and the like are not limited, after authentication is successful, an authentication result needs to be returned, a setting result of the last time needs to be returned, and if the setting is not carried out last time, a default setting item needs to be returned.
The main screen needs to start a security mode, and is used as a part of a database, a default application group needs to be set, setting options such as whether the main screen is notified or not need to be set, the setting is quitted after the setting is finished, and the auxiliary screen desktop needs to be notified to perform interface timing refreshing.
After the setting in the above manner, the secondary screen starts the security mode, and the secondary screen starts the security mode and starts the notification main screen mode as an example.
Thus, if the main screen passes the main screen identity authentication after the information interaction meeting with the security center, the main screen identity authentication can be: and identity authentication is performed based on user operation of the main screen. For example, the home screen displays an open interface for the secure mode to open, within which user input information may be collected, including but not limited to biometric information of the user, such as fingerprint information and/or iris information, etc. In other embodiments, a password input by the user may be collected in the interface, and the password may include: the password input in the form of text or character strings also includes a gesture graphic password input by the user through the graphic displayed on the interface.
After the identity of the main screen passes the verification, the main screen can request to start the security mode of the auxiliary screen; the security center returns a setting result to the home screen based on the request. The main screen informs the security center whether the default application combination is set or not to inform the main screen, and the security center returns a setting result to the main screen based on the setting result. After the setup is complete, the home screen may inform the security center to turn the setup off. The security center refreshes the interface of the auxiliary screen based on the setting of interaction with the main screen, for example, through the refreshing, application icons of which the auxiliary screen does not have operation authority are displayed, or application icons of which the authority is distinguished and displayed and the like are displayed, and in some embodiments, the interface display style of the auxiliary screen can be adjusted according to the current mode; including but not limited to: the font, the font size, the page background color and the like of the display font of the auxiliary screen.
FIG. 9 is a diagram illustrating an AMS that first suspends an application when the secondary screen clicks on the application, then accesses a database of a security center to query whether the application can be opened, and returns the result of opening the application to the AMS when the database returns that authorization is required for the primary screen, the AMS invokes the built-in security application to display a notification interface of the primary screen, and when a user of the primary screen views the notification interface and selects an option that agrees to launch the secondary screen application and that is displayed on the secondary screen, the result is returned to the AMS, which is responsible for ending the security application and resuming the secondary screen application. Referring to fig. 9, the method for performing an application operation according to the second authority range of the sub-screen may include:
The secondary screen detects the operation of clicking the application and sends an operation request of the clicked application to the AMS;
AMS inquires whether the main screen needs to be inquired from the security center;
the security center tells the AMS whether to ask the home screen based on the result of the query, e.g., as shown in fig. 9, returns a required query, in another case, may also return an unnecessary query;
the AMS returns suspended applications that need to be queried based on the security center, where the suspended applications may include: suspending the start of the clicked application on the secondary screen, for example, pushing a start request triggered by the clicked application into a queue to be processed, the AMS initiates a notification interface to inquire whether the primary screen allows the secondary screen to start the corresponding application.
The main screen agrees to the auxiliary screen to start the corresponding application;
and the auxiliary screen restores the application starting and displays the application interface of the application. The recovery initiation here may include: the method includes reading a start request of an application from a queue, and in response to the start request, if the home screen does not agree, discarding the start request in the queue, or automatically discarding the start request in the queue when a specific condition is met.
Example 4:
referring to fig. 10, the wireless routing apparatus includes a setting module 401, a database 402, and a monitoring center 403; the setting module 401 provides an entry and a mode for setting the auxiliary screen permission by the main screen, the database 402 needs to store the content of the relevant setting, and the monitoring center 403 is used for monitoring the action of opening the application by the auxiliary screen and making a corresponding prompt.
The monitoring center 403 monitors the opening of the application, requires permission for the application, deletes the application, monitors the change of the database, and notifies the update of the auxiliary screen; secondly, monitoring that the application is opened, and stopping the application from being opened and informing a main screen; when the application is deleted again, the database needs to be informed to delete the setting of the application; in addition, the permissions required by the application are monitored and the settings associated with the default group of settings are changed.
Example 5:
referring to fig. 11, the present embodiment discloses a security center system, including: the security center device 501 comprises a setting module 5011, a database 5012 and a monitoring center 5013, and the terminal 502 comprises an AMS5021, a PMS 5022, a main screen interface 5023 and an auxiliary screen interface 5024. The main screen interface 5023 is used for calling a setting module 5011 of the security center device 501, interacts with a database 5012, and has a function of setting security permissions, operations of the sub screen interface 5024 are monitored by the monitoring center 5013 and contact with the AMS5021, a Packet Management Service (PMS) 5022 manages operations of the sub screen, and if the main screen interface 5023 needs to be notified, the main screen interface 5023 needs to perform authorization and operations of a user.
Therefore, the electronic equipment provided by the embodiment of the application can be used for setting the permission of special crowds, for example, the main screen can be used for setting the auxiliary screen into a child mode and an old man mode to simplify a User Interface (User Interface, UI), so that safety is guaranteed, and the mobile phone can meet the requirements of various crowds.
When the auxiliary screen permission is set, the read-only permission can be set for some applications. For example, a contact person is possibly tampered by a customer, when the contact person is set, the item is added, when the monitoring center monitors that the similar application is opened on the auxiliary screen, the read-only permission judgment is carried out in combination with the initialization of the AMS (action), and different components and the attributes of the components are loaded, so that the purpose that a user cannot easily add or delete the application is achieved.
Aiming at new installation application, the problems of information leakage and system damage can exist, the new application is not opened by default at this time, but a setting for opening the new application permission is added, and the authorization can be processed by adopting a main screen authorization mode if the authorization is needed. Once the home screen is not authorized, the way of partial nameplate authority cannot be authorized.
The auxiliary screen also supports the authority of a holder for manually dragging or selecting a menu to control whether to be independently applied or not in the auxiliary screen by inputting a password and the like.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing module, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (20)

1. An electronic device control method comprising:
acquiring a permission setting request acting on a first screen;
according to the permission setting request, setting a second permission range corresponding to a second screen on the basis of a first permission range corresponding to a first screen, wherein the second permission range is smaller than the first permission range;
acquiring an operation request;
if the operation request acts on the first screen, responding or rejecting the operation request according to the first authority range;
if the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range;
if the operation right corresponding to the operation request acting on the second screen is limited outside the second authority range, query information is displayed on the first screen;
responding or rejecting the operation request based on the operation instruction acting on the inquiry information.
2. The method of claim 1, wherein the method further comprises:
determining whether an application condition of a second permission range is satisfied;
if the operation request acts on the second screen, responding or rejecting the operation request acting on the second screen according to the second authority range includes:
And if the application condition is met and the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range.
3. The method of claim 2, wherein,
the determination of whether the second right range application condition is met comprises the following steps:
and if the application condition is not met, responding or rejecting the operation request acting on the second screen according to the first authority range.
4. The method of claim 2, wherein,
the first screen and the second screen are different physical screens facing different directions;
the determining whether the application condition of the second permission range is met comprises the following steps:
determining whether to launch a secure application environment;
and if the safe application environment is started, determining the application conditions meeting the second authority range.
5. The method of claim 2, wherein,
the first screen and the second screen are different display areas of the same physical screen;
the determining whether the application condition of the second permission range is met comprises the following steps:
according to whether the current posture of the physical screen is a preset posture or not,
and if the current posture of the physical screen is a preset posture which enables the first screen and the second screen to face different directions, determining an application condition meeting the second permission range.
6. The method of claim 1, wherein,
if the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range includes:
inquiring the authority identification of the authority contained in the second authority range according to the identification information carried by the operation request;
the responding or rejecting the operation request according to the second authority range comprises:
if the identification information is contained in the authority identification, responding to the operation request;
and/or the presence of a gas in the gas,
and if the identification information is not contained in the authority identification, rejecting the operation request.
7. The method of claim 6, wherein,
the identification information carried by the operation request may include at least one of:
the application identification of the application acted by the operation request;
an operation identifier of an operation requested by the operation request;
the operation request requests an operation type identification of the requested operation.
8. The method of claim 1, wherein,
if the operation request acts on the second screen, responding to the operation request according to the second authority range, including:
displaying application icons of the first type of applications on a display page of the second screen according to the application display authority of the second authority range;
Alternatively, the first and second electrodes may be,
if the operation request acts on the second screen, rejecting the operation request according to the second authority range, including:
and shielding the display of the second type of application on the second screen according to the application display authority of the second authority range.
9. The method of claim 8, wherein the first type of application comprises at least one of:
an entertainment application providing entertainment services;
a search application providing information search;
providing a multimedia information acquisition application for multimedia information acquisition;
an application store application that provides an application installation service;
and/or the presence of a gas in the gas,
the second type of application comprises at least one of:
a payment application providing a network payment service;
a shopping application providing an online shopping service;
a mail application providing an email service;
a social application providing a social service;
an information recording application that provides information recording;
a security control application for providing security control of a device.
10. The method of claim 1, wherein,
if the operation request acts on the second screen, responding to the operation request according to the second permission range further comprises:
if the operation request acts on the second screen, and the second permission range comprises a preset permission corresponding to the operation request;
Inquiring the authority attribute of the preset authority;
and executing predetermined operation according to the authority attribute.
11. The method of claim 10, wherein said performing a predetermined operation in accordance with said permission attributes comprises at least one of:
if the authority attribute comprises a first screen monitoring attribute, displaying the monitoring information on the first screen according to a response condition acted on the operation request, wherein the monitoring information comprises state information of the operation request;
and if the authority attribute comprises a first screen notification attribute, displaying notification information of an operation request acting on the second screen on the first screen according to the operation request, wherein the notification information is used for notifying the operation request acting on the second screen based on the executed operation request.
12. The method of claim 1, wherein the method further comprises:
and updating the second authority range according to the operation instruction.
13. The method of claim 12, wherein said updating the second range of permissions according to the operational indication comprises:
and if the operation indication is a first permission indication, adding a preset permission into the second permission range.
14. The method of claim 1, wherein,
the responding to the operation request based on the operation instruction acting on the inquiry information comprises:
if the operation instruction is a second agreement instruction, responding to the operation request by using a second screen;
and if the operation instruction is a third agreement instruction, responding to the operation request by using the first screen.
15. The method of claim 1, wherein,
the setting of the second authority range corresponding to the second screen on the basis of the first authority range corresponding to the first screen according to the authority setting request comprises the following steps:
and setting corresponding second permission ranges of the second screen under different application modes on the basis of the first permission range corresponding to the first screen according to the permission setting request.
16. The method of claim 15, wherein the application mode comprises at least one of:
a child mode;
an elderly mode;
normal adult mode.
17. An electronic device control apparatus comprising:
a first acquisition module configured to acquire a permission setting request acting on a first screen;
the setting module is configured to set a second authority range corresponding to a second screen on the basis of a first authority range corresponding to a first screen according to the authority setting request, wherein the second authority range is smaller than the first authority range;
The second acquisition module is configured to acquire the operation request;
the first execution module is configured to respond or reject the operation request according to the first authority range if the operation request acts on the first screen;
the second execution module is configured to respond or reject the operation request according to the second authority range if the operation request acts on the second screen;
the inquiry module is configured to display inquiry information on the first screen if the operation right corresponding to the operation request acting on the second screen is limited outside the second authority range;
and the third execution module is configured to respond or reject the operation request based on the operation instruction acting on the inquiry information.
18. An electronic device, comprising:
a first screen;
at least one second screen;
the processor is respectively connected with the first screen and the second screen and at least configured to acquire a permission setting request acting on the first screen; according to the permission setting request, setting a second permission range corresponding to a second screen on the basis of a first permission range corresponding to a first screen, wherein the second permission range is smaller than the first permission range; acquiring an operation request; if the operation request acts on the first screen, responding or rejecting the operation request according to the first authority range; if the operation request acts on the second screen, responding or rejecting the operation request according to the second authority range; if the operation right corresponding to the operation request acting on the second screen is limited outside the second authority range, query information is displayed on the first screen; responding or rejecting the operation request based on the operation instruction acting on the inquiry information.
19. The electronic device of claim 18, wherein the first screen is located on a first surface of the electronic device;
at least one second screen is positioned on a second surface of the electronic equipment;
the second surface is opposite the first surface.
20. A computer storage medium storing a computer program; the computer program, when executed, is capable of implementing the method as provided by any one of claims 1 to 16.
CN201811099492.9A 2018-09-20 2018-09-20 Electronic device control method and device, electronic device and storage medium Active CN109460655B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811099492.9A CN109460655B (en) 2018-09-20 2018-09-20 Electronic device control method and device, electronic device and storage medium
PCT/CN2019/106552 WO2020057573A1 (en) 2018-09-20 2019-09-19 Electronic device control method and apparatus, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811099492.9A CN109460655B (en) 2018-09-20 2018-09-20 Electronic device control method and device, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN109460655A CN109460655A (en) 2019-03-12
CN109460655B true CN109460655B (en) 2021-08-03

Family

ID=65606840

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811099492.9A Active CN109460655B (en) 2018-09-20 2018-09-20 Electronic device control method and device, electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN109460655B (en)
WO (1) WO2020057573A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460655B (en) * 2018-09-20 2021-08-03 中兴通讯股份有限公司 Electronic device control method and device, electronic device and storage medium
CN110119261B (en) * 2019-04-29 2022-02-08 深圳达闼科技控股有限公司 File sharing method, folding screen terminal, computing device and computer storage medium
CN110119630A (en) * 2019-05-06 2019-08-13 珠海格力电器股份有限公司 Control method, device, storage medium and the processor of electronic equipment
CN110535732B (en) * 2019-07-29 2021-12-07 深圳绿米联创科技有限公司 Equipment control method and device, electronic equipment and storage medium
CN110427165B (en) * 2019-08-01 2021-05-14 维沃移动通信有限公司 Icon display method and mobile terminal
CN110889691B (en) * 2019-11-11 2022-06-03 支付宝(杭州)信息技术有限公司 Information display method, device and equipment
CN114071199B (en) * 2020-08-07 2024-03-12 惠州视维新技术有限公司 Screen control method, terminal equipment and storage medium
CN112698907B (en) * 2021-03-25 2021-06-22 湖北亿咖通科技有限公司 Application display control method and electronic equipment
CN113760122A (en) * 2021-07-21 2021-12-07 深圳市智微智能科技股份有限公司 Secondary screen touch control method and system for dual-screen equipment, terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203133812U (en) * 2013-02-05 2013-08-14 范艳君 Multi-screen display and control system
CN106228364A (en) * 2016-07-15 2016-12-14 珠海市魅族科技有限公司 A kind of information demonstrating method and present device
CN107643912A (en) * 2017-08-31 2018-01-30 维沃移动通信有限公司 A kind of information sharing method and mobile terminal
CN108008927A (en) * 2017-11-30 2018-05-08 努比亚技术有限公司 Multi-screen meeting implementation method, mobile terminal and computer-readable recording medium
CN108205419A (en) * 2017-12-21 2018-06-26 中兴通讯股份有限公司 Double screens control method, apparatus, mobile terminal and computer readable storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101828306B1 (en) * 2011-10-18 2018-02-13 삼성전자 주식회사 Method and apparatus for operating mobile terminal
KR20140013548A (en) * 2012-07-25 2014-02-05 삼성전자주식회사 User terminal apparatus and control method thereof
CN105471956A (en) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 User safety control method of social network, social application tool and terminal
CN104902074B (en) * 2015-04-22 2018-06-19 四川金英科技有限责任公司 A kind of mobile phone information safety management method based on more permission modes
CN106814988A (en) * 2016-12-26 2017-06-09 宇龙计算机通信科技(深圳)有限公司 A kind of screen control method, device and terminal
CN107277243A (en) * 2017-06-14 2017-10-20 黄之 Processing method, display methods and the display system of multi-display display information
CN109460655B (en) * 2018-09-20 2021-08-03 中兴通讯股份有限公司 Electronic device control method and device, electronic device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203133812U (en) * 2013-02-05 2013-08-14 范艳君 Multi-screen display and control system
CN106228364A (en) * 2016-07-15 2016-12-14 珠海市魅族科技有限公司 A kind of information demonstrating method and present device
CN107643912A (en) * 2017-08-31 2018-01-30 维沃移动通信有限公司 A kind of information sharing method and mobile terminal
CN108008927A (en) * 2017-11-30 2018-05-08 努比亚技术有限公司 Multi-screen meeting implementation method, mobile terminal and computer-readable recording medium
CN108205419A (en) * 2017-12-21 2018-06-26 中兴通讯股份有限公司 Double screens control method, apparatus, mobile terminal and computer readable storage medium

Also Published As

Publication number Publication date
WO2020057573A1 (en) 2020-03-26
CN109460655A (en) 2019-03-12

Similar Documents

Publication Publication Date Title
CN109460655B (en) Electronic device control method and device, electronic device and storage medium
EP2469442B1 (en) Mobile terminal and method of controlling a mode screen display therein
EP2469443B1 (en) Mobile terminal and method of controlling a mode screen display therein
US20180357440A1 (en) Personalized Meetings
US8904164B2 (en) Multi-mode handheld wireless device to provide data utilizing combined context awareness and situational awareness
US10025949B2 (en) Item sharing based on information boundary and access control list settings
US9646145B2 (en) Method and system for dynamically assignable user interface
EP2469404B1 (en) Mobile terminal and method of displaying information in accordance with a plurality of modes of use
CN106648024B (en) Contextual history of computing objects
US11782573B2 (en) User interfaces for enabling an activity
KR20190102308A (en) Data content filter
KR20180072389A (en) Method for providing content corresponding to an accessory and electronic device thereof
US11336599B2 (en) Architecture for performing action in a third-party service by an email client
KR20150040245A (en) User interface management method and system
US10447702B2 (en) Digital credential tiers
US20190114199A1 (en) Loading and running virtual working environments in a mobile device management system
CN112699354A (en) User authority management method and terminal equipment
US10476944B2 (en) Backend service integration
US20210209254A1 (en) Rule-based control of communication devices
KR102672203B1 (en) User interfaces for enabling an activity
CN116166740A (en) Data synchronization management method, system and electronic equipment
KR20240095121A (en) User interfaces for enabling an activity
Halsey The Windows 10 Productivity Handbook: Discover Expert Tips, Tricks, and Hidden Features in Windows 10
CN116931778A (en) Information processing method, device, equipment, medium and program product
CN115629726A (en) Securities information display method and terminal device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant