CN111753339A - Recommendation method, device and equipment for safety lock on electronic equipment - Google Patents

Recommendation method, device and equipment for safety lock on electronic equipment Download PDF

Info

Publication number
CN111753339A
CN111753339A CN202010496894.3A CN202010496894A CN111753339A CN 111753339 A CN111753339 A CN 111753339A CN 202010496894 A CN202010496894 A CN 202010496894A CN 111753339 A CN111753339 A CN 111753339A
Authority
CN
China
Prior art keywords
age
user
safety lock
information
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010496894.3A
Other languages
Chinese (zh)
Other versions
CN111753339B (en
Inventor
沈若凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202311539248.0A priority Critical patent/CN117633921A/en
Priority to CN202010496894.3A priority patent/CN111753339B/en
Publication of CN111753339A publication Critical patent/CN111753339A/en
Application granted granted Critical
Publication of CN111753339B publication Critical patent/CN111753339B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Abstract

The embodiment of the specification provides a recommendation method, a recommendation device and recommendation equipment for a safety lock on electronic equipment, wherein the method comprises the following steps: acquiring age information for representing the age of a user from the electronic equipment; determining the age of the user according to the age information; searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device, so as to solve the problem that the safety lock currently applied to the electronic device is not matched with the age of the user.

Description

Recommendation method, device and equipment for safety lock on electronic equipment
Technical Field
The present invention relates to the field of electronic devices, and in particular, to a method, an apparatus, and a device for recommending a security lock on an electronic device.
Background
With the popularization of electronic devices, children have more opportunities to contact the electronic devices such as mobile phones and tablet computers at present. However, the privacy problem cannot be ignored due to the age problem, and the electronic devices belonging to children also have the requirement of a safety lock at present, for example, how to effectively prevent the device information of children from being leaked in public places.
The current nine-grid password or digital password is still complex for children of young age, and at the stage of younger age, the passwords in these forms are still abstract for children, so that the electronic product is easy to be locked while the passwords cannot be completely memorized.
Disclosure of Invention
The specification provides a recommendation method, a recommendation device and recommendation equipment for a safety lock on electronic equipment, which are used for solving the problem that the safety lock applied to the electronic equipment is not matched with the age of a user currently.
In order to achieve the above purpose, the embodiment of the invention adopts the following technical scheme:
in a first aspect, an embodiment of the present specification provides a recommendation method for a security lock on an electronic device, including:
acquiring age information for representing the age of a user from the electronic equipment;
determining the age of the user according to the age information;
searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device.
In a second aspect, an embodiment of the present specification provides a recommendation device for a security lock on an electronic device, including:
the information acquisition module is used for acquiring age information for representing the age of the user from the electronic equipment;
the age determining module is used for determining the age of the user according to the age information;
the safety lock matching module is used for searching a safety lock type matched with the age of the user from a preset safety lock type library and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment;
and the safety lock configuration module is used for configuring the corresponding safety lock as the safety lock used by the electronic equipment in response to the operation that the user selects the safety lock to configure.
In a third aspect, embodiments of the present specification provide a recommendation device for security lock on an electronic device, including:
a processor; and the number of the first and second groups,
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring age information for representing the age of a user from the electronic equipment;
determining the age of the user according to the age information;
searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device.
In a fourth aspect, embodiments of the present specification provide a storage medium. The storage medium is used to store computer-executable instructions. The computer executable instructions, when executed, implement the following process:
acquiring age information for representing the age of a user from the electronic equipment;
determining the age of the user according to the age information;
searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device.
According to the recommendation method, device and equipment for the safety lock on the electronic equipment, provided by the embodiment of the specification, the age information used for representing the age of the user is obtained from the electronic equipment; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
Drawings
In order to more clearly illustrate one or more embodiments or prior art solutions of the present specification, the drawings that are needed in the description of the embodiments or prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and that other drawings can be obtained by those skilled in the art without inventive exercise.
FIG. 1 is a schematic diagram of a scenario of a recommendation method for security lock on an electronic device according to an embodiment of the present disclosure;
FIG. 2 is a first flowchart illustrating a method for recommending security locks on an electronic device according to an embodiment of the present disclosure;
FIG. 3-a is a first schematic diagram of a security lock provided in an embodiment of the present disclosure;
FIG. 3-b is a schematic diagram of a security lock provided in an embodiment of the present disclosure;
FIG. 3-c is a schematic diagram of a security lock provided in an embodiment of the present disclosure;
FIG. 4 is a second flowchart illustrating a method for recommending security locks on an electronic device according to an embodiment of the present disclosure;
FIG. 5 is a third flowchart illustrating a method for recommending security locks on an electronic device according to an embodiment of the present disclosure;
FIG. 6 is a fourth flowchart illustrating a method for recommending security locks on an electronic device according to an embodiment of the present disclosure;
FIG. 7 is a fifth flowchart illustrating a recommendation method for security lock on an electronic device according to an embodiment of the present disclosure;
FIG. 8 is a sixth flowchart illustrating a method for recommending security locks on an electronic device according to an embodiment of the present disclosure;
FIG. 9 is a schematic diagram illustrating a module of a recommendation apparatus for security lock on an electronic device according to an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of a recommendation device for a security lock on an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
Fig. 1 is a schematic view of a scenario of a recommendation method for security lock on an electronic device according to an embodiment of the present disclosure, as shown in fig. 1, the scenario includes: the security lock system comprises an electronic device and a server for synchronizing security lock type library data and related algorithm data to the electronic device. The electronic equipment can be a mobile phone, a tablet computer, a desktop computer, a portable notebook computer and the like; the electronic equipment is in communication connection with the server through a wireless network.
Specifically, during the use of the electronic device by a user, the electronic device acquires age information for representing the age of the user from a local computer through a security lock plug-in preset by a system or a built-in application with a security lock function; the age information can be age information which represents the age of the user and is directly input into the electronic equipment by the user, or the age information which represents the age of the user and is formed by monitoring the running condition of each application on the electronic equipment; after acquiring age information representing the age of the user, determining the age of the user according to the age information; searching a safety lock type matched with the determined age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment so that the user can select and configure a safety lock suitable for the user requirement; and responding to the operation that the user selects the safety lock to configure, configuring the corresponding safety lock as a safety lock used by the electronic device, so that the user uses the safety lock to lock and protect the electronic device when using the electronic device.
Further, the age information may include birth time information of the user input to the electronic device by the user; accordingly, when the age of the user is determined according to the age information, the natural age of the user may be determined according to the birth time information of the user. The natural age of the user can generally reflect the level of mental well-being of the user, as well as the complexity of the operations that can be performed.
Further, when the user configures the safety lock used by the electronic device for the first time, the operation of determining the natural age of the user according to the birth time information of the user can be executed, so that the natural age of the user is used as a basic standard for assessing the mind of the user when recommending the safety lock, and the method is generally applied in the subsequent safety lock configuration process.
Further, when searching for a security lock type matching the age of the user from a preset security lock type library and recommending the security lock information of the corresponding type to the security lock configuration interface of the electronic device, the method may include, when the user configures the security lock used by the electronic device for the first time, searching for a security lock type matching the natural age of the user from the preset security lock type library and recommending the security lock information of the corresponding type to the security lock configuration interface of the electronic device.
Further, the age information may include duration information of the user using different types of applications on the electronic device; accordingly, when determining the age of the user according to the age information, the mental age of the user may be determined according to the information on the time duration for which the user uses different types of applications on the electronic device. The mental age of the user can be personalized to reflect the mental level of the user and the complexity of the operations that can be performed.
Further, the operation of selecting the safety lock for configuration by the user comprises setting the validity period of the safety lock, correspondingly, when the user does not configure the safety lock used by the electronic equipment for the first time, the operation of determining the psychological age of the user according to the time length information of different types of applications used by the user on the electronic equipment and the time length information of different types of applications used by the user on the electronic equipment can be executed according to the time length information of the application used by the user on the electronic equipment, wherein the time length information is collected in the validity period of the safety lock configured for the last time, so that the determined psychological age of the user is used as a core standard for evaluating the mental of the user when the safety lock is recommended, and the.
Further, when determining the psychological age of the user according to the duration information of different types of applications used by the user on the electronic device, a first duration vector can be constructed according to the duration information of different types of applications used by the user on the electronic device; and then comparing the first duration vector with a plurality of second duration vectors corresponding to a plurality of preset psychological ages to determine the psychological age of the user.
Further, when determining the mental age of the user by comparing the first duration vector with second duration vectors corresponding to a plurality of preset mental ages, the mental age corresponding to the second duration vector with the smallest euclidean distance with the first duration vector in the plurality of second duration vectors may be determined as the mental age of the user.
Further, when searching for a security lock type matching the age of the user from a preset security lock type library and recommending security lock information of the corresponding type to a security lock configuration interface of the electronic device, when the user does not configure a security lock used by the electronic device for the first time, searching for a security lock type matching the psychological age of the user or a comprehensive age obtained by combining the psychological age with a natural age from the preset security lock type library, and recommending security lock information of the corresponding type to the security lock configuration interface of the electronic device.
Further, the integrated age may be an age obtained by weighted summation of the psychological age and the natural age of the user.
Further, when a safety lock type matched with the age of the user is searched from a preset safety lock type library and safety lock information of a corresponding type is recommended to a safety lock configuration interface of the electronic equipment, the age of the user can be mapped to an S-shaped growth curve to obtain a mapped age; then searching a safety lock type matched with the mapping age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; the safety lock type library records safety lock types corresponding to different mapping age groups, so that data in the safety lock type library can be conveniently set and updated.
The technical solution of the present specification is further illustrated by the following examples.
Example one
Based on the above application scenario architecture, fig. 2 is a flowchart illustrating a first method for recommending security locks on an electronic device according to an embodiment of the present disclosure, where the method in fig. 2 can be executed by the electronic device in fig. 1, as shown in fig. 2, the method includes the following steps:
step S102, acquiring age information used for representing the age of the user from the electronic equipment.
Wherein, the age information for characterizing the age of the user may include, but is not limited to: age information directly input by the user and representing the age of the user, such as birth time information of the user; the electronic device may also form age information representing the age of the user by monitoring the running conditions of the applications on the electronic device, for example, the age information may be information of the time for which the user uses different types of applications on the electronic device. By analyzing the type of the application used by the user on the electronic equipment and using the duration information of the application, the age information of the user can be reflected indirectly from the aspect of user behaviors.
Specifically, after the user triggers and enables the safety lock function on the electronic device, the electronic device actively collects preset age information for representing the age of the user on the local computer or obtains the preset age information through external input. The birth time information of the user can be acquired from user information registered when the user uses the electronic device for the first time, or after the user triggers and starts a safety lock function on the electronic device, the electronic device initiates a request page for inquiring the birth time information of the user, and the user inputs the birth time information in the request page; the user can use the time length information of different types of applications on the electronic equipment to realize timing by means of the application or the system plug-in which is arranged in the electronic equipment and can record the running time length of each application, or the running time length monitoring module of each application completes the monitoring of the running time length of the application.
Step S104, the age of the user is determined according to the age information.
Specifically, after acquiring age information representing the age of the user from the electronic device, the age of the user reflected by the age information may be calculated according to internal logic between the age information and the age of the user or through a preset age conversion method.
For example, when the age information includes birth time information of the user input to the electronic device by the user, accordingly, determining the age of the user according to the age information may include determining the natural age of the user according to the birth time information of the user. The natural age of the user can generally reflect the level of mental well-being of the user, as well as the complexity of the operations that can be performed.
For another example, when the age information includes duration information of the user using different types of applications on the electronic device, accordingly, determining the age of the user according to the age information may include determining the mental age of the user according to the duration information of the user using different types of applications on the electronic device. The mental age of the user can be personalized to reflect the mental level of the user and the complexity of the operations that can be performed.
And S106, searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment.
The safety lock type library preset in the electronic equipment comprises safety locks of different types, the safety locks correspond to different age groups respectively, and the complexity of the safety locks is equivalent to the mental level of users of the corresponding age groups. Data in the security lock type library in the electronic device can be synchronized from the server shown in fig. 1, so that online updating of the security lock type library in the electronic device is realized.
In this embodiment, the security lock type is not specifically limited, and may include, for example: pictographic password disks (as shown in fig. 3-a), differently shaped gesture password disks (similar to the squared figure, but shaped differently from the squared figure, as shown in fig. 3-b), differently numbered digital password disks, including any number of digits of a digital password, and a limited number of digits of a digital password (as shown in fig. 3-c).
Specifically, after the age of the user is determined, a security lock type corresponding to the mental level corresponding to the age of the user can be searched from a security lock type library preset in the electronic device, and security lock information of the corresponding type is recommended to a security lock configuration interface of the electronic device for the user to perform security lock configuration. For example, when the age of the user belongs to the stages of infants and children, the pictographic password disk can be recommended, so that the memory is convenient; when the age of the user belongs to teenagers and higher ages, the gesture password disk and/or the digital password disk can be recommended to meet password setting requirements of different operation complexity. When a security lock is actually recommended, the recommended security lock may be one or more.
And S108, responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment.
Specifically, the user can arbitrarily select a recommended security lock in the security lock configuration interface, configure the password of the security lock, and after clicking the configuration, the electronic device sets the security lock as the security lock used by the electronic device.
According to the recommendation method for the safety lock on the electronic equipment, provided by the embodiment of the specification, the age information used for representing the age of the user is obtained from the electronic equipment; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
Example two
The embodiment expands and supplements the recommendation method of the security lock on the electronic device shown in fig. 2 on the basis of the first embodiment.
In one embodiment, a user will preferably choose to characterize the user's true age in terms of the user's natural age, typically when first configuring a security lock for use with an electronic device, to reflect the user's mental level. Thus, when a user first configures a security lock for use with an electronic device, the electronic device may perform the method steps as shown in FIG. 4:
and S102-2, acquiring age information used for representing the age of the user from the electronic equipment, wherein the age information comprises birth time information of the user input into the electronic equipment by the user.
This step may be taken as a refinement step of step S102.
Specifically, after the user triggers and enables the safety lock function on the electronic device, the electronic device actively collects preset age information for representing the natural age of the user on the local computer or obtains the preset age information through external input. The birth time information of the user may be obtained from user information registered when the user uses the electronic device for the first time, or after the user triggers and enables a security lock function on the electronic device, the electronic device initiates a request page inquiring the birth time information of the user, and the user inputs the birth time information on the request page and obtains the birth time information.
And S104-2, determining the natural age of the user according to the birth time information of the user.
This step may be referred to as a refinement step of step S104.
Specifically, the current natural age of the user can be deduced according to the birth time information of the user and the time information when the user sets the safety lock on the electronic equipment. The natural age of the user can generally reflect the level of mental well-being of the user, as well as the complexity of the operations that can be performed.
In a practical application scenario, since the natural age of the user can be acquired by the electronic device more directly and quickly, when the user configures the security lock used by the electronic device for the first time, the operation of determining the natural age of the user according to the birth time information of the user can be executed, so that the electronic device can quickly know the mental level of the current user and the complexity of the execution operation.
S106-2, when the user configures the safety lock used by the electronic equipment for the first time, searching the safety lock type matched with the natural age of the user from a preset safety lock type library, and recommending the safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment.
This step may be referred to as a refinement step of step S106.
Specifically, when the user configures the security lock used by the electronic device for the first time, the electronic device may search, according to the acquired natural age of the user, a security lock type matched with the natural age of the user from a preset security lock type library, and recommend security lock information of the corresponding type to a security lock configuration interface of the electronic device, so that the user can select and configure the recommended security lock at any time.
After step S106-2, the processing procedure of step S108 may be continued.
Further, in another specific embodiment, the user can also optimize and select to represent the real age of the user by the psychological age of the user when the safety lock used by the electronic device is not configured for the first time, so that the mental level of the user is embodied. Thus, the electronic device may perform the method steps as shown in fig. 5 when the user does not configure the security lock used by the electronic device for the first time:
and S102-4, acquiring age information used for representing the age of the user from the electronic equipment, wherein the age information comprises duration information of different types of applications used by the user on the electronic equipment.
This step may be taken as a refinement step of step S102.
Specifically, after the user triggers and enables the safety lock function on the electronic device, the electronic device actively collects preset age information for representing the age of the user on the local computer or obtains the preset age information through external input. The user can use the time length information of different types of applications on the electronic device to realize timing by means of the application or system plug-in which is built in the electronic device and can record the running time length of each application, or the running time length monitoring module of each application completes the monitoring of the running time length of the application.
And S104-4, determining the psychological age of the user according to the duration information of different types of applications used by the user on the electronic equipment.
This step may be referred to as a refinement step of step S104.
Specifically, by acquiring the duration information of different types of applications used by the user on the electronic device, the operation complexity of the application used by the user at ordinary times, and the experience and time allocated to the applications with different operation complexities can be known, so as to calculate the current mental age of the user. The mental age of the user can be personalized to reflect the mental level of the user and the complexity of the operations that can be performed.
In an actual application scenario, although the psychological age of the user is closely linked with the behavioral ability of the user, and the mental level of the user and the complexity of the operation that can be performed can be more truly reflected, in the process of determining the psychological age of the user, the running time lengths of different types of applications on the electronic device need to be monitored and accumulated within a certain time. Therefore, it is generally possible to choose to implement the matching of the security lock type based on the above-mentioned psychological age when the user does not configure the security lock for use by the electronic device for the first time, thereby leaving an effective monitoring time for obtaining information on the duration of time for which the user uses different types of applications on the electronic device.
For example, in step S108, setting the validity period of the security lock may be included in the operation of selecting the security lock for configuration by the user; accordingly, when the user does not configure the security lock used by the electronic device for the first time, the operation of determining the psychological age of the user according to the time length information of different types of applications used by the user on the electronic device, which is collected in the validity period of the security lock configured for the last time, in step S104-4 may be performed, so that the psychological age of the user determined in the validity period of the previous security lock is used as the basis for determining that the security lock is recommended to the user for the next time. By analogy, the complexity of the safety lock recommended to the user can be correspondingly changed along with the change of the psychological age of the user, so that the requirements of the user on the operation complexity of the safety lock in different psychological ages are met.
S106-4, when the user does not configure the safety lock used by the electronic equipment for the first time, searching a safety lock type matched with the psychological age of the user or the comprehensive age after the psychological age is combined with the natural age from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment.
This step may be referred to as a refinement step of step S106.
Specifically, when the user does not configure the security lock used by the electronic device for the first time, the type of the security lock matched with the user can be searched based on the psychological age of the user determined by the validity period of the security lock configured for the last time, or the psychological age and the natural age of the user determined in the method can be combined to search the type of the security lock matched with the combined comprehensive age, and the security lock information of the corresponding type is recommended to the security lock configuration interface of the electronic device for selection and configuration by the user.
In a specific embodiment, the comprehensive age may be specifically an age obtained by weighted summation of the mental age and the natural age of the user.
After step S106-4, the processing of step S108 may continue.
Further, as shown in fig. 6, the step S104-4 may include:
s104-42, constructing a first time length vector according to the time length information of different types of applications used by the user on the electronic equipment.
For example, in a predetermined time period, for example, when a user does not configure a security lock used by an electronic device for the first time, information on the duration of time that the user uses an application on the electronic device may be collected in the validity period of the security lock configured last time, and the duration of time that the user uses the application is accumulated according to the application type, so as to construct a first duration vector with the application type as a vector dimension, where a value in each dimension of the first duration vector is the average daily usage duration of the application included in the application type for the dimension by the user.
And S104-44, comparing the first duration vector with a plurality of second duration vectors corresponding to a plurality of preset psychological ages to determine the psychological age of the user.
The second duration vector has the same dimension as the first duration vector, and identifies the daily average usage duration of each application type of application used by the user with the corresponding mental age. By comparing the similarity of the first duration vector and the plurality of second duration vectors, the psychological age of the current user can be determined.
In an alternative embodiment, the mental age corresponding to the second duration vector with the smallest euclidean distance with respect to the first duration vector in the plurality of second duration vectors may be determined as the mental age of the user.
In addition, the correlation algorithm for determining the mental age of the user in the embodiment can be synchronously acquired from the server in fig. 1, so that the online update of the correlation algorithm in the electronic device is realized.
Further, as shown in fig. 7, the step S106 may include:
and S106-6, mapping the age of the user to an S-shaped growth curve to obtain the mapped age.
Generally, the age span between different users is large, and the mental level of the aged people is clear in different age groups from the old up to eight days to the young children, for example, the mental level of children and teenagers is obviously improved along with the increase of the age, but the mental level of adults is more stable along with the increase of the age. Therefore, in order to adapt to the characteristics of mental levels of users of different age groups and conveniently recommend a safety lock which is suitable for the mental levels and meets the complexity of executable operations to the users, the embodiment maps the ages of the users to the S-shaped growth curve to obtain the mapped ages. The S-shaped growth curve is characterized in that: the curve has a large rate of change near the point 0, and a small rate of change after a certain distance from the point 0, and the curve value approaches a specified boundary value infinitely. This feature coincides with the varying features of the mental level as the user changes with age. Therefore, regardless of the age span of the user in the actual application scenario, it can be mapped into a mapped age with a smaller bound (e.g., (between 0, 1)).
Wherein, the curve function of the S-shaped growth curve may be sigmoid function:
Figure BDA0002523225880000111
s106-8, searching a safety lock type matched with the mapping age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; the safety lock type library records safety lock types corresponding to different mapping age groups.
Based on the characteristic that the variation of the mental level of the user along with the age variation is consistent with the variation of the S-shaped growth curve, the safety lock types corresponding to different mapping age groups on the S-shaped growth curve can be obtained in advance through modes such as model training, machine learning and the like, and then the safety lock types are constructed based on the obtained safety lock types corresponding to the different mapping age groups.
Specifically, after the mapping age corresponding to the current user is obtained, the mapping age group to which the mapping age of the user belongs may be directly determined from a preset security lock type library, then the security lock type corresponding to the mapping age group is determined as the security lock type matching the mapping age of the user, and the security lock information of the corresponding type is recommended to the security lock configuration interface of the electronic device.
By introducing the mapping age of the user, the coordination management between the age of the user with larger span and the recommended safety lock type can be realized.
In addition, based on the processing procedures of the above method embodiments, the present implementation further provides a method example of comprehensive application of the method embodiments in an actual application scenario, as shown in fig. 8, where the method includes:
s1, the user inputs the year and month of birth.
When the user opens the safety lock configuration of the mobile phone for the first time, the user needs to input the birth year and month of the user for the safety lock configuration module to judge the current natural age of the user.
S2: and outputting the safety lock type corresponding to the natural age of the user.
After the natural age of the user is calculated, the security lock configuration module maps the natural age into a corresponding mapping age range, matches an optional security lock type from a preset security lock type library, and outputs security lock information of the corresponding type to a mobile phone page for the user to select.
S3: and the user configures a safety lock and an expiration date.
Selecting a safety lock from recommended safety locks by a user for configuration, and specifying the validity period of the safety lock; if the user does not specify an expiration date, a 6 month expiration date is defaulted.
S4: the usage duration of the user using the different types of applications is recorded.
And during the safety lock taking effect, acquiring the use time of the user for each application through a system built-in plug-in of the mobile phone, classifying the applications according to the specified types, and updating the daily use time of the user on each type of application in the period.
S5: and judging whether the safety lock is expired.
The safety lock configuration module polls and judges whether the valid period of the safety lock is reached, if not, the daily average use time of each type of application of the user in the period of time is continuously accumulated; if the result is yes, the process proceeds to S6.
S6: calculating the mental age of the user.
According to the usage time of each type of application used by the user on the mobile phone, which is recorded and calculated by the mobile phone system, the usage time is compared with the average usage time of each application type of application used by the user corresponding to a plurality of pre-stored psychological age groups; and determining the psychological age group corresponding to the minimum Euclidean distance by using a calculation method of the Euclidean distance to obtain a final psychological age range.
S7: and calculating and outputting the safety lock type suitable for the age of the user according to the natural age and the psychological age of the user.
The current natural age A of the user and the calculated psychological age B are used as input, the result obtained by weighting and calculating the current natural age A and the calculated psychological age B is mapped into a given age range by adopting a sigmoid function, and finally the age is output as the age of the user used for matching the safety lock type. And returning to the step S3 according to the information of the user age re-matching and recommending the safety lock, and selecting and configuring the safety lock by the user.
In the long past cycle, the safety lock type which accords with the solution capability of the user at the current stage is recommended continuously in the user growth process. The problem of solving the problem and the memory ability difference at different ages of the user is effectively solved, and a safety lock which accords with the current memory ability and the solution ability is recommended for the user.
According to the recommendation method for the safety lock on the electronic equipment, provided by the embodiment of the specification, the age information used for representing the age of the user is obtained from the electronic equipment; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
EXAMPLE III
On the basis of the same technical concept, the embodiment of the present specification further provides a recommendation device for a security lock on an electronic device, which corresponds to the recommendation method for a security lock on an electronic device described in fig. 2 and fig. 4 to fig. 8. Fig. 9 is a schematic block diagram of a recommendation apparatus for a security lock on an electronic device according to an embodiment of the present disclosure, where the recommendation apparatus is configured to execute a recommendation method for a security lock on an electronic device described in fig. 2, 4 to 8, and as shown in fig. 9, the recommendation apparatus includes:
the information acquisition module 201 is used for acquiring age information for representing the age of a user from the electronic equipment;
an age determining module 202 for determining the age of the user according to the age information;
the safety lock matching module 203 is used for searching a safety lock type matched with the age of the user from a preset safety lock type library and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
the security lock configuration module 204 is configured to configure a security lock for use with the electronic device in response to a user selecting the security lock for configuration.
According to the recommendation device for the safety lock on the electronic equipment, the age information used for representing the age of the user is obtained from the electronic equipment; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
Optionally, the age information may include birth time information of the user input to the electronic device by the user; accordingly, the age determination module 202 determines the natural age of the user based on the birth time information of the user.
Optionally, the age determination module 202 performs an operation of determining the natural age of the user according to the birth time information of the user when the user configures the security lock used by the electronic device for the first time.
Optionally, the security lock matching module 203 searches a security lock type matching with the natural age of the user from a preset security lock type library when the user configures the security lock used by the electronic device for the first time, and recommends security lock information of a corresponding type to the security lock configuration interface of the electronic device.
Optionally, the age information may include duration information of different types of applications used by the user on the electronic device; accordingly, the age determination module 202 determines the mental age of the user according to the duration information of the user using different types of applications on the electronic device.
Optionally, the operation of selecting the security lock by the user for configuration includes setting a validity period of the security lock; accordingly, when the user does not configure the security lock used by the electronic device for the first time, the age determining module 202 performs an operation of determining the psychological age of the user according to the duration information of the user using the applications on the electronic device, which is acquired in the validity period of the security lock configured for the last time, and according to the duration information of the user using the applications of different types on the electronic device.
Optionally, the age determining module 202 is configured to construct a first time length vector according to the time length information of different types of applications used by the user on the electronic device; and comparing the first duration vector with a plurality of second duration vectors corresponding to a plurality of preset psychological ages to determine the psychological age of the user.
Optionally, the age determining module 202 determines a psychological age corresponding to a second duration vector with a smallest euclidean distance with respect to the first duration vector, from among the plurality of second duration vectors, as the psychological age of the user.
Optionally, the security lock matching module 203 searches, when the user does not configure the security lock used by the electronic device for the first time, a security lock type matching the psychological age of the user or the comprehensive age after the psychological age is combined with the natural age from a preset security lock type library, and recommends security lock information of the corresponding type to the security lock configuration interface of the electronic device.
Optionally, the integrated age is an age obtained by weighted summation of the psychological age and the natural age of the user.
Optionally, the security lock matching module 203 maps the age of the user to an S-shaped growth curve to obtain a mapped age; searching a safety lock type matched with the mapping age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; the safety lock type library records safety lock types corresponding to different mapping age groups.
According to the recommendation device for the safety lock on the electronic equipment, the age information used for representing the age of the user is obtained from the electronic equipment; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
It should be noted that, the embodiment of the recommendation apparatus for a security lock on an electronic device in this specification and the embodiment of the recommendation method for a security lock on an electronic device in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to the implementation of the recommendation method for a security lock on an electronic device, and repeated details are not described again.
Example four
Corresponding to the recommendation method for a security lock on an electronic device described in fig. 2 and fig. 4 to fig. 8, based on the same technical concept, an embodiment of the present specification further provides a recommendation device for a security lock on an electronic device, where the recommendation device is configured to perform the recommendation method for a security lock on an electronic device, and fig. 10 is a schematic structural diagram of a recommendation device for a security lock on an electronic device provided in the embodiment of the present specification.
As shown in fig. 10, the recommendation device for security lock on an electronic device may have a relatively large difference due to different configurations or performances, and may include one or more processors 301 and a memory 302, where the memory 302 may store one or more stored applications or data. Memory 302 may be, among other things, transient storage or persistent storage. The application program stored in memory 302 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in a recommendation device for a security lock on an electronic device. Still further, the processor 301 may be configured to communicate with the memory 302 to execute a series of computer-executable instructions in the memory 302 on a recommendation device for a security lock on an electronic device. The recommendation device for security locks on an electronic device may also include one or more power sources 303, one or more wired or wireless network interfaces 304, one or more input-output interfaces 305, one or more keyboards 306, and the like.
In a particular embodiment, a recommendation device for a security lock on an electronic device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the recommendation device for a security lock on an electronic device, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for:
acquiring age information for representing the age of a user from the electronic equipment;
determining the age of the user according to the age information;
searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device.
The recommendation device for the safety lock on the electronic device provided in the embodiment of the specification acquires age information used for representing the age of the user from the electronic device; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
Optionally, the age information comprises birth time information of the user input by the user to the electronic device when the computer-executable instructions are executed;
the determining the age of the user according to the age information includes:
and determining the natural age of the user according to the birth time information of the user.
Optionally, the computer executable instructions, when executed, further comprise:
and when the user configures the safety lock used by the electronic equipment for the first time, executing the operation of determining the natural age of the user according to the birth time information of the user.
Optionally, when executed, the computer executable instructions search a preset security lock type library for a security lock type matching the age of the user and recommend corresponding types of security lock information to a security lock configuration interface of the electronic device, including:
when a user configures the safety lock used by the electronic equipment for the first time, searching a safety lock type matched with the natural age of the user from a preset safety lock type library, and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment.
Optionally, the age information comprises information of how long a user used different types of applications on the electronic device when the computer-executable instructions are executed;
the determining the age of the user according to the age information includes:
and determining the psychological age of the user according to the duration information of the different types of applications used by the user on the electronic equipment.
Optionally, when the computer executable instruction is executed, the operation of selecting the security lock for configuration by the user includes setting the validity period of the security lock; the method further comprises the following steps:
when the user does not configure the safety lock used by the electronic equipment for the first time, according to the acquired duration information of the application used by the user on the electronic equipment in the valid period of the safety lock configured for the last time, the operation of determining the psychological age of the user according to the duration information of the application used by the user on the electronic equipment in different types is executed.
Optionally, when executed, the computer-executable instructions, when determining a mental age of a user based on information about how long the user uses different types of applications on the electronic device, comprise:
constructing a first time length vector according to the time length information of different types of applications used by the user on the electronic equipment;
and comparing the first duration vector with a plurality of second duration vectors corresponding to a plurality of preset psychological ages to determine the psychological age of the user.
Optionally, when executed, the determining the mental age of the user according to the comparison between the first duration vector and a second duration vector corresponding to a plurality of preset mental ages includes:
and determining the psychological age corresponding to the second duration vector with the minimum Euclidean distance with the first duration vector in the plurality of second duration vectors as the psychological age of the user.
Optionally, when executed, the computer executable instructions search a preset security lock type library for a security lock type matching the age of the user and recommend corresponding types of security lock information to a security lock configuration interface of the electronic device, including:
when the user does not configure the safety lock used by the electronic equipment for the first time, searching a safety lock type matched with the psychological age of the user or the comprehensive age after the psychological age is combined with the natural age from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment.
Optionally, the computer executable instructions, when executed, are further configured to determine a combined age of the mental age and the natural age of the user.
Optionally, the computer executable instructions, when executed, searching for a security lock type matching the age of the user from a preset security lock type library and recommending corresponding type of security lock information to a security lock configuration interface of the electronic device comprise:
mapping the age of the user to an S-shaped growth curve to obtain a mapped age;
searching a safety lock type matched with the mapping age of the user from a preset safety lock type library, and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment; and the safety lock type library records safety lock types corresponding to different mapping age groups.
According to the recommendation device for the safety lock on the electronic device, the age information used for representing the age of the user is obtained from the electronic device; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
It should be noted that, the embodiment of the recommendation device for a security lock on an electronic device in this specification and the embodiment of the recommendation method for a security lock on an electronic device in this specification are based on the same inventive concept, and therefore, specific implementation of this embodiment may refer to implementation of the recommendation method for a security lock on an electronic device described above, and repeated details are not repeated.
EXAMPLE five
Based on the same technical concept, the present specification further provides a storage medium for storing computer-executable instructions, in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and the storage medium stores the computer-executable instructions, when executed by a processor, the method for recommending security lock on an electronic device described in fig. 2 and fig. 4 to fig. 8 can implement the following processes:
acquiring age information for representing the age of a user from the electronic equipment;
determining the age of the user according to the age information;
searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device.
The storage medium provided in the embodiments of the present specification stores computer-executable instructions that, when executed by the processor, perform the steps of obtaining age information for characterizing the age of the user from the electronic device; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
Optionally, the storage medium stores computer-executable instructions that, when executed by a processor, include user birth time information of the user input to the electronic device;
the determining the age of the user according to the age information includes:
and determining the natural age of the user according to the birth time information of the user.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, further comprise:
and when the user configures the safety lock used by the electronic equipment for the first time, executing the operation of determining the natural age of the user according to the birth time information of the user.
Optionally, the storage medium stores computer executable instructions that, when executed by the processor, search a preset security lock type library for a security lock type matching the age of the user and recommend corresponding types of security lock information to a security lock configuration interface of the electronic device, including:
when a user configures the safety lock used by the electronic equipment for the first time, searching a safety lock type matched with the natural age of the user from a preset safety lock type library, and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, include information on how long a user used different types of applications on the electronic device;
the determining the age of the user according to the age information includes:
and determining the psychological age of the user according to the duration information of the different types of applications used by the user on the electronic equipment.
Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the operation of the user selecting the security lock for configuration includes setting the validity period of the security lock; the method further comprises the following steps:
when the user does not configure the safety lock used by the electronic equipment for the first time, according to the acquired duration information of the application used by the user on the electronic equipment in the valid period of the safety lock configured for the last time, the operation of determining the psychological age of the user according to the duration information of the application used by the user on the electronic equipment in different types is executed.
Optionally, the storage medium stores computer-executable instructions that, when executed by a processor, determine a mental age of a user based on information about how long the user uses different types of applications on the electronic device, including:
constructing a first time length vector according to the time length information of different types of applications used by the user on the electronic equipment;
and comparing the first duration vector with a plurality of second duration vectors corresponding to a plurality of preset psychological ages to determine the psychological age of the user.
Optionally, the computer-executable instructions stored in the storage medium, when executed by the processor, determine the mental age of the user according to a comparison between the first duration vector and a second duration vector corresponding to a plurality of preset mental ages, including:
and determining the psychological age corresponding to the second duration vector with the minimum Euclidean distance with the first duration vector in the plurality of second duration vectors as the psychological age of the user.
Optionally, the storage medium stores computer executable instructions that, when executed by the processor, search a preset security lock type library for a security lock type matching the age of the user and recommend corresponding types of security lock information to a security lock configuration interface of the electronic device, including:
when the user does not configure the safety lock used by the electronic equipment for the first time, searching a safety lock type matched with the psychological age of the user or the comprehensive age after the psychological age is combined with the natural age from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, the integrated age is an age weighted and summed of the mental age and the natural age of the user.
Optionally, the computer executable instructions stored in the storage medium, when executed by the processor, the searching for a security lock type matching the age of the user from a preset security lock type library and recommending a corresponding type of security lock information to a security lock configuration interface of the electronic device includes:
mapping the age of the user to an S-shaped growth curve to obtain a mapped age;
searching a safety lock type matched with the mapping age of the user from a preset safety lock type library, and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment; and the safety lock type library records safety lock types corresponding to different mapping age groups.
The computer-executable instructions stored in the storage medium provided by the embodiment of the specification are executed by the processor, and the processor acquires age information for representing the age of the user from the electronic equipment; determining the age of the user according to the age information; searching a safety lock type matched with the age of a user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment; and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the current electronic equipment. In the embodiment of the specification, safety locks matched with corresponding ages are provided for users to configure, so that the use requirements of users in different ages on the safety locks are met, and particularly for children, safety lock types with different complexities suitable for the mind of the users can be provided, and the unlocking difficulty is reduced.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the recommendation method for a security lock on an electronic device in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to the implementation of the recommendation method for a security lock on an electronic device, and repeated details are not described here.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 30 s of the 20 th century, improvements in a technology could clearly be distinguished between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), HDCal, JHDL (Java Hardware Description Language), langue, Lola, HDL, laspam, hardsradware (Hardware Description Language), vhjhd (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in multiple software and/or hardware when implementing the embodiments of the present description.
One skilled in the art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of this document and is not intended to limit this document. Various modifications and changes may occur to those skilled in the art from this document. Any modifications, equivalents, improvements, etc. which come within the spirit and principle of the disclosure are intended to be included within the scope of the claims of this document.

Claims (24)

1. A method for recommendation of a security lock on an electronic device, comprising:
acquiring age information for representing the age of a user from the electronic equipment;
determining the age of the user according to the age information;
searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device.
2. The method of claim 1, the age information comprising user birth time information of the user input to the electronic device by a user;
the determining the age of the user according to the age information includes:
and determining the natural age of the user according to the birth time information of the user.
3. The method of claim 2, further comprising:
and when the user configures the safety lock used by the electronic equipment for the first time, executing the operation of determining the natural age of the user according to the birth time information of the user.
4. The method according to claim 3, wherein the searching for a security lock type matching the user's age from a preset security lock type library and recommending corresponding type of security lock information to a security lock configuration interface of the electronic device comprises:
when a user configures the safety lock used by the electronic equipment for the first time, searching a safety lock type matched with the natural age of the user from a preset safety lock type library, and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment.
5. The method of any of claims 1-4, the age information comprising information of how long a user used different types of applications on the electronic device;
the determining the age of the user according to the age information includes:
and determining the psychological age of the user according to the duration information of the different types of applications used by the user on the electronic equipment.
6. The method of claim 5, wherein the operation of the user selecting the security lock for configuration comprises setting a validity period of the security lock; the method further comprises the following steps:
when the user does not configure the safety lock used by the electronic equipment for the first time, according to the acquired duration information of the application used by the user on the electronic equipment in the valid period of the safety lock configured for the last time, the operation of determining the psychological age of the user according to the duration information of the application used by the user on the electronic equipment in different types is executed.
7. The method of claim 5, wherein determining the mental age of the user based on the duration information of the user using different types of applications on the electronic device comprises:
constructing a first time length vector according to the time length information of different types of applications used by the user on the electronic equipment;
and comparing the first duration vector with a plurality of second duration vectors corresponding to a plurality of preset psychological ages to determine the psychological age of the user.
8. The method of claim 7, wherein determining the mental age of the user according to the comparison of the first duration vector with a second duration vector corresponding to a plurality of preset mental ages comprises:
and determining the psychological age corresponding to the second duration vector with the minimum Euclidean distance with the first duration vector in the plurality of second duration vectors as the psychological age of the user.
9. The method according to claim 5, wherein the searching for a security lock type matching the user's age from a preset security lock type library and recommending corresponding type of security lock information to a security lock configuration interface of the electronic device comprises:
when the user does not configure the safety lock used by the electronic equipment for the first time, searching a safety lock type matched with the psychological age of the user or the comprehensive age after the psychological age is combined with the natural age from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment.
10. The method of claim 9, wherein the aggregate age is an age weighted by a mental age and a natural age of the user.
11. The method of claim 1, wherein the searching for a security lock type matching the user's age from a preset security lock type library and recommending corresponding types of security lock information to a security lock configuration interface of the electronic device comprises:
mapping the age of the user to an S-shaped growth curve to obtain a mapped age;
searching a safety lock type matched with the mapping age of the user from a preset safety lock type library, and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment; and the safety lock type library records safety lock types corresponding to different mapping age groups.
12. A recommendation device for a security lock on an electronic device, comprising:
the information acquisition module is used for acquiring age information for representing the age of the user from the electronic equipment;
the age determining module is used for determining the age of the user according to the age information;
the safety lock matching module is used for searching a safety lock type matched with the age of the user from a preset safety lock type library and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment;
and the safety lock configuration module is used for configuring the corresponding safety lock as the safety lock used by the electronic equipment in response to the operation that the user selects the safety lock to configure.
13. The apparatus of claim 12, the age information comprising user birth time information of the user input to the electronic device by a user;
and the age determining module is used for determining the natural age of the user according to the birth time information of the user.
14. The apparatus of claim 13, the age determination module to perform the operation of determining the natural age of the user based on the birth time information of the user when the user first configures a security lock for use with the electronic device.
15. The apparatus according to claim 14, wherein the security lock matching module searches a security lock type matching with the natural age of the user from a preset security lock type library when the user configures the security lock used by the electronic device for the first time, and recommends security lock information of the corresponding type to a security lock configuration interface of the electronic device.
16. The apparatus of any of claims 12-15, the age information comprising information of how long a user used different types of applications on the electronic device;
the age determining module determines the psychological age of the user according to the duration information of the different types of applications used by the user on the electronic equipment.
17. The device of claim 16, wherein the user selecting the security lock for configuration comprises setting an expiration date of the security lock;
the age determining module is used for executing the operation of determining the psychological age of the user according to the duration information of different types of applications used by the user on the electronic equipment, wherein the duration information is acquired in the effective period of the safety lock configured last time when the user does not configure the safety lock used by the electronic equipment for the first time.
18. The apparatus of claim 16, the age determination module to construct a first duration vector based on duration information of use of different types of applications by the user on the electronic device;
and comparing the first duration vector with a plurality of second duration vectors corresponding to a plurality of preset psychological ages to determine the psychological age of the user.
19. The apparatus of claim 18, wherein the age determining module determines a mental age of the user corresponding to a second duration vector of the plurality of second duration vectors having a smallest euclidean distance with respect to the first duration vector.
20. The apparatus according to claim 16, wherein the security lock matching module searches a security lock type matching a psychological age of the user or a comprehensive age obtained by combining the psychological age and a natural age from a preset security lock type library when the user configures the security lock used by the electronic device for a non-first time, and recommends security lock information of the corresponding type to a security lock configuration interface of the electronic device.
21. The apparatus of claim 20, the aggregate age being an age weighted by a mental age and a natural age of the user.
22. The device of claim 12, the security lock matching module to map the user' S age into an sigmoid growth curve, resulting in a mapped age; searching a safety lock type matched with the mapping age of the user from a preset safety lock type library, and recommending safety lock information of a corresponding type to a safety lock configuration interface of the electronic equipment; and the safety lock type library records safety lock types corresponding to different mapping age groups.
23. A recommendation device for a security lock on an electronic device, comprising:
a processor; and the number of the first and second groups,
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring age information for representing the age of a user from the electronic equipment;
determining the age of the user according to the age information;
searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device.
24. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring age information for representing the age of a user from the electronic equipment;
determining the age of the user according to the age information;
searching a safety lock type matched with the age of the user from a preset safety lock type library, and recommending safety lock information of the corresponding type to a safety lock configuration interface of the electronic equipment;
and responding to the operation that the user selects the safety lock to configure, and configuring the corresponding safety lock as the safety lock used by the electronic device.
CN202010496894.3A 2020-06-03 2020-06-03 Recommendation method, device and equipment for security lock on electronic equipment Active CN111753339B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202311539248.0A CN117633921A (en) 2020-06-03 2020-06-03 Recommendation method, device and equipment for security lock on electronic equipment
CN202010496894.3A CN111753339B (en) 2020-06-03 2020-06-03 Recommendation method, device and equipment for security lock on electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010496894.3A CN111753339B (en) 2020-06-03 2020-06-03 Recommendation method, device and equipment for security lock on electronic equipment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202311539248.0A Division CN117633921A (en) 2020-06-03 2020-06-03 Recommendation method, device and equipment for security lock on electronic equipment

Publications (2)

Publication Number Publication Date
CN111753339A true CN111753339A (en) 2020-10-09
CN111753339B CN111753339B (en) 2023-10-20

Family

ID=72673983

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202311539248.0A Pending CN117633921A (en) 2020-06-03 2020-06-03 Recommendation method, device and equipment for security lock on electronic equipment
CN202010496894.3A Active CN111753339B (en) 2020-06-03 2020-06-03 Recommendation method, device and equipment for security lock on electronic equipment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202311539248.0A Pending CN117633921A (en) 2020-06-03 2020-06-03 Recommendation method, device and equipment for security lock on electronic equipment

Country Status (1)

Country Link
CN (2) CN117633921A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104822074A (en) * 2015-04-14 2015-08-05 天脉聚源(北京)传媒科技有限公司 Television program recommending method and device thereof
CN109147104A (en) * 2018-06-29 2019-01-04 江苏恒宝智能系统技术有限公司 A kind of electronic lock and its verification method of double verification
WO2019174395A1 (en) * 2018-03-13 2019-09-19 阿里巴巴集团控股有限公司 Method and apparatus for information recommendation, and device
CN110929158A (en) * 2019-11-29 2020-03-27 腾讯科技(深圳)有限公司 Content recommendation method, system, storage medium and terminal equipment
WO2021092659A1 (en) * 2019-11-14 2021-05-20 Pulse Link Pty Ltd Smart personal monitoring systems and methods thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104822074A (en) * 2015-04-14 2015-08-05 天脉聚源(北京)传媒科技有限公司 Television program recommending method and device thereof
WO2019174395A1 (en) * 2018-03-13 2019-09-19 阿里巴巴集团控股有限公司 Method and apparatus for information recommendation, and device
CN109147104A (en) * 2018-06-29 2019-01-04 江苏恒宝智能系统技术有限公司 A kind of electronic lock and its verification method of double verification
WO2021092659A1 (en) * 2019-11-14 2021-05-20 Pulse Link Pty Ltd Smart personal monitoring systems and methods thereof
CN110929158A (en) * 2019-11-29 2020-03-27 腾讯科技(深圳)有限公司 Content recommendation method, system, storage medium and terminal equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LI LIN; TINGTING LIU; JIAN HU; JIANBIAO ZHANG: "A privacy-aware cloud service selection method toward data life-cycle", IEEE *
张弘;石瑞民;丁锰;: "密码持有人信息与所使用密码关系的调查统计分析", 中国人民公安大学学报(自然科学版), no. 01 *

Also Published As

Publication number Publication date
CN111753339B (en) 2023-10-20
CN117633921A (en) 2024-03-01

Similar Documents

Publication Publication Date Title
TWI735782B (en) Model training method, data similarity determination method, device and equipment
US11138262B2 (en) Context-aware music recommendation methods and systems
WO2016064576A1 (en) Tagging personal photos with deep networks
CN111143178B (en) User behavior analysis method, device and equipment
CN110688974A (en) Identity recognition method and device
CN111930809A (en) Data processing method, device and equipment
US11694059B2 (en) Method, apparatus, electronic device and storage medium for predicting user attribute
CN113344098A (en) Model training method and device
CN116049761A (en) Data processing method, device and equipment
CN111046304B (en) Data searching method and device
CN116597892B (en) Model training method and molecular structure information recommending method and device
CN111723280B (en) Information processing method and device, storage medium and electronic equipment
CN111753339B (en) Recommendation method, device and equipment for security lock on electronic equipment
KR101646926B1 (en) Method and system of deep concept hioerarchy for reconstruction in multi-modality data
CN108681490B (en) Vector processing method, device and equipment for RPC information
CN116524998A (en) Model training method and molecular property information prediction method and device
CN116701570A (en) Recall result screening method, recall result screening device, computer equipment and storage medium
Sigg et al. A novel approach to context prediction in ubicomp environments
CN112307371B (en) Applet sub-service identification method, device, equipment and storage medium
CN115830633A (en) Pedestrian re-identification method and system based on multitask learning residual error neural network
CN110929871A (en) Game decision method and system
CN111291645A (en) Identity recognition method and device
CN117332282B (en) Knowledge graph-based event matching method and device
CN115017915B (en) Model training and task execution method and device
Li et al. Hisrect: Features from historical visits and recent tweet for co-location judgement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant