CN111027043B - Unlocking method and device of application program and storage medium - Google Patents

Unlocking method and device of application program and storage medium Download PDF

Info

Publication number
CN111027043B
CN111027043B CN201911306385.3A CN201911306385A CN111027043B CN 111027043 B CN111027043 B CN 111027043B CN 201911306385 A CN201911306385 A CN 201911306385A CN 111027043 B CN111027043 B CN 111027043B
Authority
CN
China
Prior art keywords
screen locking
locking state
terminal
information
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911306385.3A
Other languages
Chinese (zh)
Other versions
CN111027043A (en
Inventor
闫良玉
李梦洋
包卿
薛立俊
侯泽龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mingdu Zhiyun Zhejiang Technology Co Ltd
Original Assignee
Mingdu Zhiyun Zhejiang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mingdu Zhiyun Zhejiang Technology Co Ltd filed Critical Mingdu Zhiyun Zhejiang Technology Co Ltd
Priority to CN201911306385.3A priority Critical patent/CN111027043B/en
Publication of CN111027043A publication Critical patent/CN111027043A/en
Application granted granted Critical
Publication of CN111027043B publication Critical patent/CN111027043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

The invention discloses an unlocking method of an application program, which comprises the steps of receiving input information, wherein the input information carries a target identifier for unlocking; judging whether the target identifier is matched with the first identifier or the second identifier; when the target identification is matched with the first identification, the first screen locking state is released; and when the target identifier is matched with the second identifier, unlocking the first screen locking state and/or the second screen locking state. By respectively and independently setting the screen locking states for the application program and the terminal for installing the application program and reasonably distributing the unlocking permission for the preset identification for unlocking the two screen locking states, the convenience of unlocking is ensured, and the confidentiality of information can be maintained.

Description

Unlocking method and device of application program and storage medium
Technical Field
The invention relates to the technical field of industrial Internet of things, in particular to an unlocking method and device for an application program.
Background
In recent years, with rapid development of science and technology, digital management software such as various enterprise resource management software (ERP), enterprise Office Automation (OA), and Manufacturing Execution System (MES) in an enterprise has become popular, and these system software are installed on microcomputer terminals such as Windows operating system and IOS system. The operating systems are all provided with an automatic screen locking function, but the screen locking is only used for locking the screen of the whole operating system, other applications on the operating system cannot be operated after the screen is locked, and the operating system must be unlocked if the screen is locked. Software systems such as ERP, OA and MES do not have built-in independent screen locking functions, and when the terminal is not provided with automatic screen locking or screen locking time is not up, production execution system software MES cannot independently lock the screen, so that the MES has the possibility of misoperation when an operator leaves, production safety is influenced, and meanwhile, confidential files, data and the like are leaked out.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides 1 an unlocking method of an application program, which is characterized by comprising the following steps: receiving input information, wherein the input information carries a target identifier for unlocking; judging whether the target identifier is matched with a first identifier or a second identifier, wherein the first identifier is used for unlocking a first screen locking state, the second identifier is used for unlocking a second screen locking state, a terminal running the application program is configured to enter the first screen locking state when a trigger event is not received within first preset time, and the application program is configured to enter the second screen locking state when the trigger event is not received within second preset time; when the target identification is matched with the first identification, the first screen locking state is released; and when the target identifier is matched with the second identifier, unlocking the first screen locking state and/or the second screen locking state.
Preferably, the second screen locking state is configured to lock the application display interface running in the terminal foreground after the trigger event is not received within a second preset time.
Preferably, the second screen locking state is configured to lock the application running in the terminal foreground after the trigger event is not received within a second preset time.
Preferably, the second screen locking state is configured to lock the application or the application display interface running in the foreground of the terminal, and then the terminal keeps responding to other applications.
Preferably, the first lock screen state is configured to lock the terminal display screen after the trigger event is not received within a first preset time.
Preferably, after the terminal sequentially enters the first screen locking state from the second screen locking state, whether the target identifier is matched with the first identifier or the second identifier is judged; and if the target identifier is matched with the second identifier, the first screen locking state and the second screen locking state are released, if the target identifier is matched with the first identifier, the first screen locking state is unlocked, and if not, the original screen locking state of the terminal is maintained.
Preferably, after the terminal sequentially enters the first screen locking state from the second screen locking state, whether the target identifier is matched with the first identifier or the second identifier is judged; and if the target identifier is matched with the second identifier, unlocking the target identifier, and if the target identifier is matched with the first identifier, unlocking the first screen locking state.
Preferably, when the terminal is in a first screen locking state, whether the target identifier is matched with the first identifier or the second identifier is judged; and if the target identifier is matched with the first identifier or the second identifier, the first screen locking state is released.
The invention also discloses an unlocking device of the application program, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the unlocking method of the application program when executing the computer program.
The invention also discloses a computer readable storage medium, which stores a computer program, and the computer program realizes the steps of the unlocking method of any one of the application programs when being executed by a processor.
The invention solves the problems that the application programs installed on the terminals such as the PC end and the like only depend on the system screen locking to shield the interface and have no potential safety hazard and other risks brought by the built-in independent screen locking to daily work, the screen locking states are respectively and independently set for the application programs and the terminals for installing the application programs, and the preset identifications for unlocking the two screen locking states are reasonably distributed with unlocking authorities, for example, the second identification is set as a high-priority identification capable of removing the first screen locking state and the second screen locking state, and the authority for removing the first screen locking state of the terminal is only given to the first identification, thereby not only ensuring the convenience and the rapidness of unlocking and reducing the complexity of repeated input, but also keeping the confidentiality of information, leading other application program operators similar to MES to only be capable of removing the locking state of the display screen of the terminal even if the application program operators have the screen locking unlocking password of the terminal during leaving, and the MES application program running in the terminal foreground still keeps the screen locking or locking state of the interface, thereby reducing the hidden danger of production data leakage as much as possible and preventing the excessive system data and information from being leaked when the operator leaves the state.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a schematic application environment diagram of a locking state information display method according to an embodiment of the present invention.
Fig. 2 is a flowchart illustrating a method for displaying locking state information according to an embodiment of the present invention.
Fig. 3 is a schematic flowchart of step S13 according to an embodiment of the present invention.
Fig. 4 is a schematic flowchart of step S132 according to an embodiment of the present invention.
Fig. 5 is a schematic flowchart of step S133 according to an embodiment of the present invention.
Fig. 6 is another flowchart of step S133 according to an embodiment of the disclosure.
Fig. 7 is a flowchart illustrating an application unlocking method according to an embodiment of the present invention.
Fig. 8 is a schematic structural diagram of a locking state information display device according to an embodiment of the disclosure.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Also, the use of the terms "a" or "an" and the like do not denote a limitation of quantity, but rather denote the presence of at least one. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
According to the embodiment of the invention, the embodiment of the information display method of the screen locking state is provided.
Alternatively, in this embodiment, the information display method of the lock screen state may be applied to a hardware environment formed by the server 3 and the terminal 1 as shown in fig. 1. As shown in fig. 1, the server 3 is connected to the terminal 1 through a network 2, which includes but is not limited to: the terminal 1 is not limited to a PC, a mobile phone, a tablet computer, and the like. The information display method of the screen locking state of the embodiment of the invention can be executed by the server 3, the terminal 1, or both the server 3 and the terminal 1. The information display method of the lock screen state performed by the terminal 1 according to the embodiment of the present invention may be performed by a client installed thereon.
The embodiment will be described by taking a production execution system MES as an example, and it is needless to say that the methods described below can be applied to various other types of software such as ERP and OA. The production execution system MES is positioned between the MRPII/ERP and the process control layer and faces to the production management technology and the real-time information system of the vehicle interlayer. The MES emphasizes the execution of the production plan. On one hand, the MES further refines the command of the service management system and then sends a production instruction to the production process; on the other hand, the MES feeds back the real-time information collected by the process control layer to the service management system as the basis for compiling the production plan later. The existing MES software has no self-contained screen locking function, and cannot independently lock the screen of an MES software interface which runs and is displayed on a terminal foreground. When the MES is opened and displayed on the terminal operation desktop, software misoperation can occur when related operators leave occasionally, great potential safety hazards are brought to factory production safety and product quality, and meanwhile, leakage of confidential files, data and the like in the MES cannot be effectively prevented. In this embodiment, the MES software adopting the screen locking state information display method may implement an independent locking function of an application interface thereof, so that the screen may be automatically locked when the software is unmanned for a long time, thereby avoiding a possibility that the MES of the production execution system is misoperated, and specifically may include the following steps:
and (4) logging in the system by the newly registered user, and setting a screen locking setting mode. The screen locking mode can be automatically triggered by default, the screen is not locked by default, or the screen is locked after the preset time by default, and the like. And the user logs in the verification database for the user name and the password, after the user passes the verification of logging in the system, the system is in a default unlocking state, and the screen locking function is automatically triggered by default. The screen locking triggering time interval can be set to be 3-30 minutes, or the screen locking function can be selected. And closing the screen locking automatic triggering function while the screen locking function is opened, removing the monitoring of the mouse and the keyboard, manually triggering the screen locking, and immediately executing the screen locking after the manual screen locking option is selected. The screen locking range can be set as required, and the screen locking range can be only locked in the application program interface range or can be directly locked in the terminal screen. When the locking of the application program interface is selected, the terminal only stops responding to the operation of the application program under the condition that the unlocking identification is input wrongly, and still continues normal response to other application programs in the terminal.
The system monitors a preset trigger event on a terminal interface. The preset trigger event can be set to be the movement, clicking, entering, pulley rolling and the like of a mouse and the operation of pressing any key by a keyboard, the screen locking interval time can be overloaded as long as any operation is carried out, and the screen locking time is recalculated from zero after the overload. And after the screen locking time is reached and the screen is locked, removing all monitoring events of the mouse and the keyboard by the system until the monitoring is restarted after the system is unlocked. And before the screen is unlocked, if a preset trigger event occurs, reloading the screen locking time.
After the system is locked, the system data is automatically updated, the to-do work information pushed by the background is not only reminded by the corresponding module of the system, but also the title of the to-do task is pushed to the screen locking interface. Adding picture and text controls on the screen locking interface, and binding database fields of the to-be-handled information titles to realize the purpose. And reminding in a bullet screen mode by using different color fonts and different icons according to the emergency level of the task to be handled. And after the windows operating system locks the screen, the information of the work to be done is transferred to a screen locking interface of the windows operating system.
There are several ways to unlock the system: unlocking the password, verifying the user name and password of the database to unlock, and requiring to input again if the password is wrong; fingerprint unblock mainly is used when being used for mobile terminal, mobile tablet operation. After logging in the system, performing fingerprint input setting, wherein the input fingerprint is associated with the user ID; and pattern unlocking, which is mainly used for operation of mobile terminals and mobile tablets. After logging in the system, pattern entry setting is carried out, and the entered pattern is associated with the user ID; and after logging in the system, performing face scanning and recording face biological characteristics, wherein the recorded face biological characteristics are associated with the user ID.
When the MES application software is in the screen locking state, various events to be handled or state information in the MES need to be reminded, so that missing of the affairs is prevented. As shown in fig. 2, the information display method of the locked state may specifically include the following steps:
and step S11, acquiring information to be displayed when the application program is in a locking state, wherein the locking state is an application program interface locking state entered after the application program meets preset locking conditions.
The locking state of the application program interface can be that the MES locks the MES application program interface in the foreground when the terminal does not receive related operations within the preset time, and the locking can be a locking mode of image shielding and the like of an application program interface display area. Of course, the application program interface locking state may also be set to be similar to the terminal screen locking, and the whole terminal screen is directly locked. In this embodiment, the application interface lock state is set to lock only the application software interface displayed in the foreground, and the computer terminal in the application interface lock state can still normally perform other operations and respond to other applications except for the display area outside the application software interface. After the MES and other various application programs enter a locking state, the MES and other application programs only lock the display module outwards, the background data of the system are still updated automatically according to the preset state, and besides the notification information of the tasks to be handled and the like pushed by various backgrounds, the notification information of the tasks to be handled and the like can also be pushed to a screen locking interface so as to prompt an operator to respond and process in time and avoid delay or omission. The information to be displayed on the locking interface may be keyword extraction or title extraction, etc. performed on the received content to be handled pushed by the server in a preset manner, and the emergency level may be further evaluated according to the received content, or the emergency level information may be directly obtained from the received content.
And step S12, acquiring the current state of the terminal of the application program in the locked state. Specifically, when the application program is in a locked state, the computer terminal where the application program is located may be in a normal working state, that is, the computer screen is not in a screen locking state, and is in a normal interaction state with the outside during normal opening; or after a specific time elapses after the application program is in the locked state, the terminal enters the screen locking state after the preset trigger event is not received within the preset time.
And step S13, when the terminal is in the first screen locking state, displaying the information on a first screen locking interface of the terminal, otherwise, displaying the information on the application program locking interface. In this embodiment, the first lock screen state is a lock screen state that the terminal enters after not receiving the trigger event within the preset time. In some embodiments, as shown in fig. 3, the step S13 may further include:
and step S131, judging the information type. For example, the type of information may be divided according to whether the application needs to actively present the information. For example, the type of information may include pop-up type information and non-pop-up type information. For example, if pop-up type information, such as an emergency audit event, system alarm information, etc., is received in the screen-locked state, the pop-up type information is read. In addition, the required display information can be separated according to the degree of affair urgency, for example, the information types can be grouped into three types of urgent events, important events, general events and the like according to the received information content or the attached label of the information.
And step S132, selecting a corresponding display template from a plurality of preset display templates according to the information type. For example, information types are distinguished according to the emergency degree of the transaction, so that an operator can distinguish different levels of transactions immediately, different information types can be matched with information display templates in different screen locking states or locking states.
In some specific embodiments, the display template may include color group information, and the step of selecting a corresponding display template from a plurality of preset display templates according to the information type may specifically include, as shown in fig. 4:
and step S1321, judging the information emergency degree according to the information type.
Step S1322 is to select corresponding color group information according to the information urgency.
In step S1323, the font color of the displayed information is set as the selected color group information.
A plurality of color pairs are arranged on the computer terminal in advance. Each color pair includes: a first color, such as a background color, and a second color, such as a font color, a graphic, or a pattern color. The plurality of color pairs of the arrangement may be different color pairs having the same contrast or different color pairs having different contrasts. For example, pairs of black and gray colors and pairs of dark and light gray colors having the same contrast. Pairs of green and black colors and pairs of white and brown colors with different contrasts. In this embodiment, the importance degree of the information may be determined first, and if the information to be displayed is determined to be important information, the value of the contrast between the first color and the second color in the plurality of color pairs is selected to be higher than a preset threshold, for example, 50 color pairs.
And step S133, displaying the information on the first screen locking interface or the application locking interface by using the selected display template. Specifically, when only the application program enters the locking interface and the terminal for installing the application program does not enter the first locking interface, only the information needing to be displayed is displayed on the locking interface of the application program according to the required display template style. And when the MES finds that the terminal also enters the first screen locking interface after the application program enters the locking interface, displaying the information to be displayed on the first screen locking interface of the terminal according to the required template style. Specifically, a plug-in or a third-party plug-in can be built in the terminal operating system, and certainly, an information transmission module in the MES software can be called, so that information to be displayed is displayed on the terminal screen locking interface through the plug-in.
In this embodiment, the information urgency level may also be determined according to the information type. For example, the MES may determine the sender of the to-be-handled message to be displayed, may group the senders in an emergency degree in advance, and may determine the emergency degree of the message when the sender of the corresponding emergency degree is received. The emergency degree of the information required to be displayed can be directly judged by the terminal through extracting the keywords in the information title to be handled or embedding the emergency degree identification and the like during the generation of the software system information.
And then selecting a display area from a plurality of preset display modes according to the information urgency degree, wherein the display modes can comprise display on an unlocked interface only, display on a locked interface, display on a first lock screen interface and the like. And displaying the received information of each event to be handled and the like in the corresponding display area according to the selected display mode. For example, a display mode corresponding to each urgency level of display information such as a task to be handled can be selected from selectable display modes during MES software setting. For example, the general information can be selected to be displayed only on the unlocked interface, that is, if the terminal receives the general information, whether the MES is in the locked interface state is judged, if not, the information can be displayed or an information prompt is sent out, and if the MES is in the locked interface, the information is not displayed on the locked interface. The important information is selected and displayed on the locking interface, namely if the received information is judged to be the important information, even if the MES running on the foreground is in an interface locking state, the information is also displayed in front of the locking interface in a specific display form, for example, the information can be information of a text control or a picture control, and the information to be handled is displayed in the front of the locking interface in a text frame form or a picture form in an overlaying or inserting mode. In addition, the emergency information can be selected in a display mode on the first screen locking interface, in the mode, when only the MES is in an interface locking state on the terminal display screen and the terminal screen does not enter the first screen locking interface state, the emergency information is displayed on the locking interface, the display mode is similar to the important information display mode, but when the MES does not release the locking interface state and the terminal screen enters the first screen locking state, if the MES of the terminal receives the emergency information, the emergency information is sent to the terminal screen locking through a display control or a third-party screen locking display control which is internally arranged and interacts with the terminal operating system for displaying, and the situation that when various emergency state events occur, an operator delays processing time and safety accidents are caused because the operating terminal is in the screen locking state is prevented.
In some embodiments, the lock state of the application program interface may further include a second lock screen state, and the second lock screen state is configured to lock the screen of the computer terminal after the application program meets the preset lock condition. Namely, when the MES software which is displayed and operated on the terminal foreground does not receive the trigger event within the preset time, the interface locking indication is triggered, and at the moment, the software can directly lock the whole terminal screen after receiving the locking indication, which is similar to the first screen locking interface of the terminal, so that the information protection range of the application program is expanded.
Further, the types of events that the application needs to display in the locked state for receiving can be classified into general events and emergency events. When the interface locking state of the MES is set to be the second lock screen state, as shown in fig. 5, the information display method of the locking state may further include:
step S1331, determining the urgency of the information.
And step S1333, when the information is an emergency, determining a display state of the application program and/or the terminal.
And step S1333, if the application program is in the second screen locking state and the terminal is not in the first screen locking state, displaying the information on a second screen locking interface.
And step S1334, if the terminal is in the first screen locking state, displaying the information on a first screen locking interface.
Specifically, when the received information is determined to be an emergency, the display states of the application and the terminal are acquired. And if the application program is only in the second screen locking state at the moment, displaying the received emergency information on a second screen locking interface in a specific text display mode or a picture display mode through a display plug-in the software. If the terminal is found to be in the first screen locking state, the emergency event information is directly sent to the terminal screen locking for displaying through a built-in display control interactive with a terminal operating system or a third-party screen locking display control no matter whether the application program is in the second screen locking state, and therefore the situation that when various emergency events occur, due to the fact that the operating terminal is in the screen locking state, processing time of an operator is delayed and safety accidents are caused is prevented.
Further, in this embodiment, as shown in fig. 6, when the interface locking state of the MES is set to be the second lock screen state, the method for displaying information of the locking state may further include:
and step S1335, when the information is a general event, determining a display state of the application program and/or the terminal.
And step S1336, if the application program is in the second screen locking state and the terminal is not in the first screen locking state, displaying the information on a second screen locking interface.
And step S1337, if the application program is in the second screen locking state and the terminal is in the first screen locking state, canceling the information display.
Specifically, when the received information is determined to be a general event, the display states of the application program and the terminal are acquired. And if the application program is in the second screen locking state at the moment, displaying the received general event information on a second screen locking interface in a specific text display mode or a picture display mode through a display plug-in the software. If the terminal is found to be in the first screen locking state at this time, the display of the information is directly abandoned regardless of whether the application program is in the second screen locking state. After the terminal cancels the first screen locking state, the information can be displayed on a second screen locking interface of the application program. The display that various non-emergency events are in a screen locking state at the terminal is reduced, excessive system data and information are prevented from being leaked when an operator leaves the terminal, and the hidden danger of production data leakage can be reduced as far as possible under the condition that important information can be timely reminded.
The method for displaying the information of the screen locking state disclosed by each embodiment of the invention selects the corresponding display modes according to different situations of the locking state of the acquired information to be displayed and the screen locking state of the terminal, thereby not only solving the problems that the application programs installed on the terminals such as the existing PC terminal and the like can only shield the interface by depending on the system screen locking without the potential safety hazard and other risks brought to daily work by the built-in independent screen locking, but also being capable of sending various emergency information to be displayed to the screen locking interface of the terminal or the application program for display in time, and preventing the occurrence of various emergency state events, which cause the delay of processing time of an operator due to the screen locking state of an operation terminal, and generating safety accidents. Meanwhile, different display modes are selected according to the information types in a classified mode, the display that various non-emergency events are in a screen locking state at the terminal is reduced, excessive system data and information are prevented from being leaked when an operator leaves the terminal, and the hidden danger of leakage of production data can be reduced as far as possible under the condition that important information can be timely reminded.
Example 2
The application described in this embodiment has an automatic interface locking function, which is exemplified by a manufacturing execution system MES, wherein the preset of the automatic interface locking time of the MES can select a mode of setting a time range of 3 minutes to 30 minutes, never or directly locking a screen manually, defaulting to 3 minutes, and the like. When the production execution system MES is in a no-operation state, the screen locking function is automatically triggered, the screen locking time is called from the background server, when the idle state reaches the preset screen locking time, the system interface is locked, and at the moment, the system interface displays a login page. The function ensures that the screen is automatically locked when the production execution system MES is unmanned for a long time, avoids the possibility of misoperation of the production execution system MES, ensures the production safety and the product quality, and prevents the leakage of confidential files, data and the like in the production execution system MES.
When the screen of the production execution system MES is locked, normal operation of other works is not hindered, and various unlocking modes such as passwords, fingerprints, patterns, facial recognition, voice recognition and the like can be selected for unlocking the production execution system MES. After the MES screen locking of the production execution system, the screen locking interface can display a rolling bullet screen for prompting the information of the work to be done by the system, and reminds an operator to process related work in time. And if the terminal with the windows operating system is locked, displaying the bullet screen to-be-done prompt information on a windows screen locking interface. Specific implementation methods can be seen in the foregoing embodiments. The present embodiment further discloses an unlocking method of an application, as shown in fig. 7, which can be used to unlock an application or a terminal in an interface lock state or a terminal lock screen state as described in the foregoing embodiments, and includes the following steps:
step S21, receiving input information, where the input information carries a target identifier for unlocking.
In some embodiments of the present application, the unlocking request may specifically be a terminal screen unlocking request or a media content unlocking request for different unlocking states. The unlocking operation can be an operation of unlocking by opening a display device of the terminal equipment with the MES software installed by the user or an MES software interface in a foreground running state on the terminal equipment. The terminal equipment can be various terminal equipment such as a PC terminal or a smart phone or a tablet computer provided with various client sides of MES software. The specific unlocking operation may be unlocking code input directly on an interactive device such as a keyboard touch screen, fingerprint identification input of a fingerprint device, audio input of a sound acquisition device, image input of an image acquisition device, and the like, which are used as target identifications of the unlocking identification information.
Step S22, determining whether the target identifier matches a first identifier or a second identifier, where the first identifier is used to unlock a first screen-locking state, and the second identifier is used to unlock a second screen-locking state, where a terminal running the application program is configured to enter the first screen-locking state if the terminal does not receive a trigger event within a first preset time, and the application program is configured to enter the second screen-locking state if the terminal does not receive a trigger event within a second preset time.
In this embodiment, the first lock screen state is configured to lock the terminal display screen after the trigger event is not received within a first preset time.
In this embodiment, the second screen locking state may be the application program interface locking state described in the foregoing first embodiment. In this embodiment, the second lock screen state has a plurality of setting states.
One setting state of the second screen locking state is to lock the display interface of the application program running in the foreground of the terminal after the trigger event is not received within a second preset time. The computer terminal in the application program interface locking state can still normally perform other operations and respond to other application programs, and simultaneously only locks the application program display interface and the like, and can still selectively perform operations such as closing, saving or dragging the application program to the display interface. For example, after various application programs such as the MES enter a locked state, the display module is only locked outwards, the system background data is still updated automatically according to the preset state, and besides the notification information of the tasks to be handled and the like pushed by various backgrounds, the notification information of the tasks to be handled and the like is also pushed to the screen locking interface so as to prompt an operator to respond and process in time, so that delay or omission is avoided. The information to be displayed on the locking interface may be keyword extraction or title extraction, etc. performed on the received content to be handled pushed by the server in a preset manner, and the emergency level may be further evaluated according to the received content, or the emergency level information may be directly obtained from the received content.
And the other setting state of the second screen locking state is configured to lock the application program running in the terminal foreground after the trigger event is not received within a second preset time. The computer terminal can normally perform other operations and respond to other application programs after the application program interface is in a locking state. But all operations on the application will be locked before being unlocked.
The second screen locking state is also configured to lock the screen of the computer terminal after the trigger event is not received within a second preset time. Namely, when the MES software displayed and running on the terminal foreground does not receive a trigger event within the preset time, an interface locking instruction is triggered, and at the moment, the software can directly lock the whole terminal screen after receiving the locking instruction, so that the screen is similar to a first screen locking interface of the terminal, and the information protection range of an application program is expanded.
In this embodiment, when the application program is in the second screen locking state, the computer terminal where the application program is located may be in a normal working state, that is, the computer screen is not in the screen locking state, and is in a normal interaction state with the outside during normal opening; or after a specific time elapses after the application program is in the second screen locking state, the terminal enters the first screen locking state after the terminal still continues to receive no preset trigger event within a preset time.
And step S23, when the target identification is matched with the first identification, the first screen locking state is released.
The first identification is an unlocking password which is preset by the system and used for unlocking the first screen locking state of the terminal. And after the target identifier input by the user and acquired from the terminal interaction module is judged to be matched with the first identifier, the first screen locking state of the terminal can be released.
And step S24, when the target identifier is matched with the second identifier, unlocking the first screen locking state and/or the second screen locking state.
Wherein the second identifier is a preset unlocking password stored in the database for unlocking the first screen locking state of the application program, i.e. the MES software in this embodiment. And after the target identifier input by the user and acquired from the terminal interaction module is judged to be matched with the second identifier, the second screen locking state of the application program can be released.
In addition, in this embodiment, when the display interface of the MES system is in the second screen locking state, the terminal where the display interface is located may be in the normal response state, or the terminal may enter the first screen locking state after a specific time has elapsed after the application program is in the second state, and the terminal still does not receive the preset trigger event within the first preset time.
In this embodiment, after the terminal sequentially enters the first screen locking state from the second screen locking state, it is determined whether the target identifier is matched with the first identifier or the second identifier. Specifically, the acquired target identifier may be sequentially compared with the first identifier and the second identifier stored in the database.
And if the target identifier is matched with the second identifier, the first screen locking state and the second screen locking state are released, if the target identifier is matched with the first identifier, the first screen locking state is unlocked, and if not, the original screen locking state of the terminal is maintained. Specifically, when the target identifier is matched with the second identifier, the first screen locking state and the second screen locking state can be directly released without comparing with the first identifier or whether the target identifier is matched with the first identifier or not. However, when the target identifier is only matched with the first identifier and not matched with the second identifier, only the first screen locking state of the terminal is released, and the application program is still in the second screen locking state. The second identification is set to be the high-priority identification capable of removing the first lock screen and the second lock screen, and meanwhile, the first identification is only given the permission of removing the first lock screen state of the terminal, so that the unlocking convenience is guaranteed, the complexity of inputting for many times is reduced rapidly, and the confidentiality of information can be kept, so that other operators similar to MES can only remove the lock state of the display screen of the terminal even if the operators have the lock screen unlocking password of the terminal during leaving, and the MES application program running in the foreground of the terminal still keeps the lock screen or the lock state of the interface, and the potential danger of leakage of production data is reduced as far as possible.
In other embodiments, the method for unlocking the application program may also be configured to determine whether the target identifier is matched with the first identifier or the second identifier after the terminal sequentially enters the first screen locking state from the second screen locking state; and if the target identifier is matched with the second identifier, unlocking the target identifier, and if the target identifier is matched with the first identifier, unlocking the first screen locking state. Specifically, when the terminal display interface and the application program are locked, when the input target identifier is matched with the second identifier but not matched with the first identifier, the first screen locking state and the second screen locking state are not unlocked, that is, the first identifier is used as a priority identifier required by unlocking, and the second screen locking state can be unlocked only after the first screen locking state is unlocked. And unlocking the first screen locking state only when the target identification is matched with the first identification.
In other embodiments, the method for unlocking the application program may also be configured to determine whether the target identifier is matched with the first identifier or the second identifier when the terminal is in the first screen locking state; and if the target identifier is matched with the first identifier or the second identifier, the first screen locking state is released. Specifically, when the terminal display interface is in the first screen locking state, no matter whether the application program is in the second screen locking state or not, the first screen locking state can be unlocked as long as the input target identifier is matched with any one of the first identifier or the second identifier, the second identifier is set to be a high-authority password which can unlock the first screen locking state and the second screen locking state, the convenience of the system is improved, and meanwhile the confidentiality degree of the application program in the terminal is also guaranteed.
The unlocking method of the application program disclosed by the embodiment solves the problems that the application program installed on the terminal such as the existing PC end and the like only shields an interface by depending on a system lock screen without potential safety hazards and other risks brought to daily work by a built-in independent lock screen, the application program and the terminal for installing the application program are respectively and independently provided with the lock screen states, and the preset identifications for unlocking the two lock screen states are reasonably distributed with unlocking permission, for example, the second identification is set into a high-priority identification capable of removing the first lock screen and the second lock screen, and the first identification is only given permission for removing the first lock screen state of the terminal, so that the convenience and the rapidness of unlocking are ensured, the complexity of repeated input is reduced, the confidentiality of information is kept, and other application program operators similar to MES can only remove the lock screen unlocking password of the display screen of the terminal even if the other operators have the lock screen unlocking password of the terminal during leaving, and the MES application program running on the terminal foreground still keeps the screen locking or locking state of the interface, thereby reducing the hidden danger of leakage of production data as much as possible and preventing the leakage of excessive system data and information when an operator leaves the state.
It should be noted that, in the present specification, the foregoing embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and like parts between the embodiments may be referred to each other.
Example 3
The invention also provides an unlocking device for various application programs, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the unlocking method for the application programs described in the embodiments.
The unlocking device of the application program can include but is not limited to a processor and a memory. It will be appreciated by those skilled in the art that the schematic diagram is merely an example of the unlocking means of the application program and does not constitute a limitation of the unlocking means device of the application program, and may comprise more or less components than those shown, or some components may be combined, or different components, for example, the unlocking means device of the application program may further comprise an input-output device, a network access device, a bus, etc.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like, said processor being the control center of the unlocking means device for said application program, the various parts of the unlocking means device for the entire application program being connected by means of various interfaces and lines.
The memory may be used to store the computer programs and/or modules, and the processor may implement the various functions of the unlocking device apparatus of the application program by running or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory. The memory may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like, and the memory may include a high speed random access memory, and may further include a non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The unlocking means of the application program, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer-readable storage medium. Based on such understanding, all or part of the flow of the method according to the above embodiments may be implemented by a computer program, which may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the steps of the embodiments of the unlocking method for each application program may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
In summary, the above-mentioned embodiments are only preferred embodiments of the present invention, and all equivalent changes and modifications made in the claims of the present invention should be covered by the claims of the present invention.

Claims (4)

1. An unlocking method of an application program, comprising:
receiving input information, wherein the input information carries a target identifier for unlocking;
judging whether the target identifier is matched with a first identifier or a second identifier, wherein the first identifier is used for unlocking a first screen locking state, the second identifier is used for unlocking a second screen locking state, the terminal running the application program is configured to enter the first screen locking state when not receiving a trigger event within a first preset time, the application program is configured to enter the second screen locking state when not receiving the trigger event within a second preset time, and the first screen locking state is configured to lock a terminal display screen; the second screen locking state is configured to lock an application program or an application program display interface running in a terminal foreground, judge the emergency degree of the information when an event is received, judge the display state of the application program and/or the terminal when the information is the emergency event, display the information on the second screen locking interface if the application program is in the second screen locking state and the terminal is not in the first screen locking state, and display the information on the first screen locking interface if the terminal is in the first screen locking state; when the information is a general event, if the application program is in a second screen locking state and the terminal is not in a first screen locking state, displaying the information on a second screen locking interface, and if the application program is in the second screen locking state and the terminal is in the first screen locking state, canceling the information display;
after the terminal sequentially enters a first screen locking state from a second screen locking state, judging whether the target identification is matched with the first identification or the second identification, if the target identification is matched with the second identification, unlocking the first screen locking state, and if not, keeping the original screen locking state of the terminal.
2. The unlocking method according to claim 1, wherein:
when the terminal is in a first screen locking state, judging whether the target identifier is matched with the first identifier or the second identifier; and if the target identifier is matched with the first identifier or the second identifier, the first screen locking state is released.
3. An unlocking device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that: the processor, when executing the computer program, realizes the steps of the method according to any of claims 1-2.
4. A computer-readable storage medium storing a computer program, characterized in that: the computer program realizing the steps of the method according to any of claims 1-2 when executed by a processor.
CN201911306385.3A 2019-12-18 2019-12-18 Unlocking method and device of application program and storage medium Active CN111027043B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911306385.3A CN111027043B (en) 2019-12-18 2019-12-18 Unlocking method and device of application program and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911306385.3A CN111027043B (en) 2019-12-18 2019-12-18 Unlocking method and device of application program and storage medium

Publications (2)

Publication Number Publication Date
CN111027043A CN111027043A (en) 2020-04-17
CN111027043B true CN111027043B (en) 2022-07-01

Family

ID=70210174

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911306385.3A Active CN111027043B (en) 2019-12-18 2019-12-18 Unlocking method and device of application program and storage medium

Country Status (1)

Country Link
CN (1) CN111027043B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577594A (en) * 2013-11-13 2014-02-12 广州市久邦数码科技有限公司 Lock screen interface information pushing system and method
EP3151117A1 (en) * 2015-09-30 2017-04-05 Xiaomi Inc. Method and device for delaying information broadcasting
CN106682463A (en) * 2016-09-30 2017-05-17 北京小米移动软件有限公司 Unlocking method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104317484A (en) * 2014-10-23 2015-01-28 久邦计算机技术(广州)有限公司 Screen locking system with application screen and display equipment thereof
CN104537291A (en) * 2015-01-09 2015-04-22 宇龙计算机通信科技(深圳)有限公司 Screen interface unlocking method and screen interface unlocking device
CN104793929B (en) * 2015-02-15 2019-08-16 努比亚技术有限公司 Application interface shows the customizing method and device of information
CN105677151A (en) * 2015-12-31 2016-06-15 魅族科技(中国)有限公司 Information display method and terminal
CN106022027B (en) * 2016-06-28 2019-03-19 青岛海信移动通信技术股份有限公司 A kind of unlocking method and a device of mobile device
CN106485107A (en) * 2016-09-19 2017-03-08 北京小米移动软件有限公司 Screen locking method and device
CN106778175B (en) * 2016-12-26 2020-07-07 Oppo广东移动通信有限公司 Interface locking method and device and terminal equipment
CN107862189A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Unlocking method and related product
CN110502302A (en) * 2019-08-20 2019-11-26 维沃移动通信有限公司 Control method, terminal device and the storage medium of Application Program Interface

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577594A (en) * 2013-11-13 2014-02-12 广州市久邦数码科技有限公司 Lock screen interface information pushing system and method
EP3151117A1 (en) * 2015-09-30 2017-04-05 Xiaomi Inc. Method and device for delaying information broadcasting
CN106682463A (en) * 2016-09-30 2017-05-17 北京小米移动软件有限公司 Unlocking method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于Android平台的双层锁屏应用模块的设计与实现;陈彬浩;《中国优秀硕士学位论文全文数据库 信息科技辑》;20160215(第2期);第I138-95页 *

Also Published As

Publication number Publication date
CN111027043A (en) 2020-04-17

Similar Documents

Publication Publication Date Title
CN111259460B (en) Locking state information display method and device
CN110457195B (en) Method and device for obtaining local log of client, server and storage medium
CN108449320B (en) Intelligent automatic safe office system and method
CN110489415B (en) Data updating method and related equipment
CN103368904A (en) Mobile terminal, and system and method for suspicious behavior detection and judgment
CN103679031A (en) File virus immunizing method and device
CN107409134B (en) Forensic analysis method
CN110414246B (en) Shared file security management method, device, terminal and storage medium
CN104794827A (en) Method and apparatus for prevention of false alarms in monitoring systems
CN111641610B (en) Remote response and remote control method, device, equipment and storage medium
CN115017485B (en) Data authority management and control method and system
CN116383693A (en) Data issuing method based on data security automatic classification grading result
CN109657485B (en) Authority processing method and device, terminal equipment and storage medium
DE102017113147A1 (en) Secure payment protection method and corresponding electronic device
CN111027043B (en) Unlocking method and device of application program and storage medium
CN107315947A (en) Pay class application management method, device and mobile terminal
CN113220285B (en) Security event response scenario generation method, system, device and storage medium
CN113542238B (en) Zero trust-based risk judging method and system
CN115146283A (en) Information security testing method and device for vehicle-mounted information interaction system
Awajan et al. Machine learning techniques for automated policy violation reporting
CN114445894A (en) Storage cabinet management method and device, storage cabinet, electronic equipment and storage medium
CN109543420B (en) Permission configuration method and device based on sud, electronic equipment and storage medium
CN112699369A (en) Method and device for detecting abnormal login through stack backtracking
CN113395234A (en) Traffic hijacking monitoring method and device for promotion information
CN115292482B (en) Message processing method for commonweal litigation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 310056 room 1701, 17th floor, building 3, No. 316, Jianghong South Road, Changhe street, Binjiang District, Hangzhou, Zhejiang

Applicant after: Mingdu Zhiyun (Zhejiang) Technology Co.,Ltd.

Address before: 310000 1, 3 building, No. 316 Jianghong Road, Changhe street, Binjiang District, Hangzhou, Zhejiang.

Applicant before: ZHEJIANG MINGDU INTELLIGENT CONTROL TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant