CN111835905A - Terminal control method, intelligent terminal and device with storage function - Google Patents

Terminal control method, intelligent terminal and device with storage function Download PDF

Info

Publication number
CN111835905A
CN111835905A CN201910310061.0A CN201910310061A CN111835905A CN 111835905 A CN111835905 A CN 111835905A CN 201910310061 A CN201910310061 A CN 201910310061A CN 111835905 A CN111835905 A CN 111835905A
Authority
CN
China
Prior art keywords
controlled terminal
user
terminal
wearable device
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910310061.0A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201910310061.0A priority Critical patent/CN111835905A/en
Publication of CN111835905A publication Critical patent/CN111835905A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/50Controlling the output signals based on the game progress
    • A63F13/52Controlling the output signals based on the game progress involving aspects of the displayed game scene

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a terminal control method, an intelligent terminal and a device with a storage function, wherein the method comprises the following steps: the wearable device judges whether an authorization request from the controlled terminal is received or not, wherein the authorization request comprises an authorization request for the controlled terminal to perform preset risk operation; if receiving the authorization request, displaying the authorization request to the user and sending a prompt message for judging whether the authorization is available; judging whether an authorization confirmation instruction input by a user is received, wherein the user is a user of the wearable equipment; and if the authorization confirmation instruction is received, sending authorization confirmation information to the controlled terminal so as to open the operation authority of the preset risk operation corresponding to the controlled terminal. Through the mode, the possibility that the child is indulged in the terminal equipment such as a mobile phone or the risk operation such as payment can be reduced, so that parents can know more entertainment activities of the child.

Description

Terminal control method, intelligent terminal and device with storage function
Technical Field
The present application relates to the field of intelligent terminals, and in particular, to a terminal control method, an intelligent terminal, and a device having a storage function.
Background
With the development of science and technology, almost every family has a computer and a mobile phone at present, children may use terminal equipment such as the mobile phone when parents are not at home, and may be addicted to games or watch unhealthy things, and the concept of money and time of many children is not very strong, so that the problems of myopia of many children, purchase of money of the mobile phone of the parents to game equipment and the like are caused. In addition, many parents neglect the physical and mental cultivation of children in busy business at present, and cannot know what the children play with the mobile phones.
Disclosure of Invention
The technical problem mainly solved by the application is to provide a terminal control method, an intelligent terminal and a device with a storage function, so that the possibility that children are indulged in terminal equipment such as mobile phones or risk operations such as payment can be reduced, and parents can know more about the entertainment activities of the children.
In order to solve the above technical problem, the first technical solution adopted by the present application is: provided is a terminal control method, including: the wearable device judges whether an authorization request from a controlled terminal is received or not, wherein the authorization request comprises an authorization request for the controlled terminal to perform preset risk operation; if the authorization request is received, displaying the authorization request to a user and sending a prompt message for judging whether the authorization is available; judging whether an authorization confirmation instruction input by a user is received, wherein the user is a user of the wearable equipment; and if the authorization confirmation instruction is received, sending authorization confirmation information to the controlled terminal so as to open the operation authority of the preset risk operation corresponding to the controlled terminal.
In order to solve the above technical problem, the second technical solution adopted by the present application is: provided is a terminal control method, including: the controlled terminal receives an operation instruction input by a current user; judging whether the operation instruction is an operation instruction for performing preset risk operation; if the operation instruction is an operation instruction for performing preset risk operation, sending an authorization request to the bound wearable device; judging whether the authorization confirmation information from the wearable equipment is received or not; and if the authorization confirmation information is received, opening the operation authority of the preset risk operation corresponding to the operation instruction.
In order to solve the above technical problem, the third technical solution adopted by the present application is: provided is a smart terminal including: a communication circuit and a processor connected to each other; the communication circuit is used for communicating with other terminal equipment; the processor is configured to execute instructions to implement the terminal control method according to any one of the above technical solutions.
In order to solve the above technical problem, a fourth technical solution adopted by the present application is: there is provided an apparatus having a storage function, in which a program is stored, wherein the program is executed to implement the terminal control method according to any one of the above-described embodiments.
The beneficial effect of this application is: different from the situation in the prior art, in the embodiment of the application, after receiving an authorization request from a controlled terminal, a wearable device displays the authorization request to a user, and sends a prompt message indicating whether to authorize the wearable device, and after receiving an authorization confirmation command input by the user using the wearable device, the wearable device sends authorization confirmation message to the controlled terminal to open an operation permission of a preset risk operation corresponding to the controlled terminal. In this way, this application makes the head of a family can use wearable equipment, especially under the inconvenient circumstances that uses terminals such as cell-phone, in time when child carries out certain risky operation, judges whether authorizes child and uses to can reduce the possibility that child indulges terminal equipment such as cell-phone or carries out the risky operation such as payment, make the head of a family more know the amusement activity that child used controlled terminal to go on simultaneously.
Drawings
Fig. 1 is a schematic flowchart of a first embodiment of a terminal control method according to the present application;
fig. 2 is a schematic flowchart of the wearable device interacting with a smart terminal according to the present application;
fig. 3 is a schematic content diagram of an authorization request displayed on a display screen of a wearable device according to the present application;
fig. 4 is a flowchart illustrating a second embodiment of a terminal control method according to the present application;
fig. 5 is a flowchart illustrating a terminal control method according to a third embodiment of the present application;
FIG. 6 is a scene schematic diagram of an authority change request input by a user to a controlled terminal through a touch wearable device according to the present application;
fig. 7 is a flowchart illustrating a fourth embodiment of a terminal control method according to the present application;
fig. 8 is a flowchart illustrating a fifth embodiment of a terminal control method according to the present application;
fig. 9 is a flowchart illustrating a sixth embodiment of a terminal control method according to the present application;
FIG. 10 is a schematic structural diagram of an embodiment of an intelligent terminal according to the present application;
FIG. 11 is a schematic structural diagram of a wearable device as a smart terminal according to the present application;
FIG. 12 is a schematic structural diagram of the intelligent terminal of the present application as a controlled terminal;
FIG. 13 is a schematic structural diagram of an embodiment of a device with a storage function according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic flowchart of a first embodiment of a terminal control method according to the present application, where an execution main body of the embodiment is a wearable device, and the wearable device may be a smart band, a smart watch, or various smart terminals such as smart eyes and a smart helmet. As shown in fig. 1, a first embodiment of a terminal control method according to the present application includes:
s11: the wearable device determines whether an authorization request is received from the controlled terminal.
The controlled terminal can be a terminal such as a smart phone, a tablet, a notebook computer and a desktop computer, and can also be an intelligent wearable device. The authorization request comprises an authorization request for the controlled terminal to perform preset risk operation. The preset risk operation comprises accessing bad websites, starting preset applications in non-allowed time periods, performing payment operation and the like.
Bad websites are some websites that are not suitable for children to visit, set by parents through the wearable device or the controlled terminal.
The non-permitted time period is a time period set by the parent through the wearable device or the controlled terminal, in which some preset applications (e.g., game applications, video applications, etc.) cannot be opened, and the non-permitted time period may be a rest time period in the morning or at noon, or an interval time period between two consecutive opening of the preset applications.
The payment operation is at least part of payment operation of the controlled terminal set by the parent through the wearable device or the controlled terminal, such as a large payment operation, payment operation of some applications (such as game applications), and the like.
The authorization request is request information sent to the wearable device when the controlled terminal needs to perform the preset risk operation, and the controlled terminal can execute the authorized preset risk operation only when receiving the authorization confirmation information of the wearable device.
Optionally, as shown in fig. 1, before step S11, the method may further include:
s10: the wearable device is bound with the controlled terminal, and sends an authority setting instruction to a preset application of the controlled terminal, so that the controlled terminal sends an authorization request to the wearable device when the preset risk operation of the preset application is carried out.
The wearable device and the controlled terminal can be connected in a Bluetooth mode, a WiFi mode or a cellular network mode and then bound. The preset application is an application which is preset by a parent through the wearable device, is installed on the controlled terminal and needs to perform an authorization request, such as a game application, a video application, a shopping application, a reading application, a payment application and the like.
Specifically, in an application example, as shown in fig. 2, after the wearable device searches for a terminal device near the wearable device through bluetooth and binds a corresponding controlled terminal, the user can send an authority setting instruction to the bound controlled terminal through the wearable device, after the controlled terminal receives the authority setting instruction, the controlled terminal performs authority limitation on preset risk operation of a preset application according to the authority setting instruction, and then when the preset application executes the preset risk operation with the restricted authority, the controlled terminal sends an authorization request to the wearable device.
For example, in order to prevent children from making large payment (for example, payment operation exceeding 100 yuan) with the controlled terminal, the parents may set large payment authority for all payment applications, including mobile banking, payment software, etc., after binding the controlled terminal with the wearable device in advance. When the controlled terminal needs to perform the bulk payment operation, the controlled terminal sends an authorization request to the wearable device, where the authorization request may include information such as a payment amount of the bulk payment operation, a related application, and a payment reason, so that a parent can know specific request content and reason through the authorization request received by the wearable device.
In other application examples, the wearable device may also automatically set an operation performed in a frequently-visited application as a preset risk operation according to a historical operation record of the controlled terminal. In addition, wearable equipment can also set up an early warning alarm clock at controlled terminal, when controlled terminal need carry out and predetermine the risk operation, opens this early warning alarm clock, and suggestion current user this operation probably has the risk.
The wearable device is provided with a communication circuit (such as an antenna circuit) and can receive messages sent by an external device, the wearable device can be simultaneously bound with a plurality of terminals, and the controlled terminal is one of the terminals bound in advance. Referring to fig. 2, when the controlled terminal receives an operation instruction input by a current user and determines that the operation instruction is an operation instruction corresponding to a preset risk operation, the controlled terminal sends authorization request information to the wearable device, and when the wearable device receives information of a bound terminal, the wearable device analyzes the information, and if it is known that a sender of the information is the controlled terminal after the information is analyzed and the information is an authorization request, the wearable device determines that the authorization request from the controlled terminal is received, and performs the following step S12.
S12: and informing the user of the authorization request and sending out prompt information for judging whether the authorization is available.
The specific request content of the authorization request may include the related application and the operation information that needs to be performed specifically. For example, the specific request content of the authorization request for starting the preset application is "request the authorization terminal a to start the game".
The prompt message of the authorization can be a text or voice prompt message for the authorization request to give whether authorization is available.
Specifically, the wearable device may display the specific content of the authorization request through its own display screen, and display an option of whether to authorize, so that the user inputs an instruction of whether to authorize.
For example, as shown in fig. 3, the display screen of the wearable device displays that the specific content of the authorization request is "request to authorize the terminal a to start the game", and displays two options, "authorized" and "unauthorized", so that the user can touch the corresponding option or select the corresponding option through a key or the like to completely perform an authorized instruction input operation.
Of course, in other embodiments, the wearable device may also notify the user of the authorization request by voice or the like, or may also issue a prompt message indicating whether to authorize by voice.
S13: and judging whether an authorization confirmation instruction input by a user is received.
Wherein the user is a user of the wearable device, for example, the user is a parent of a child using the controlled terminal.
Specifically, after the wearable device sends out the prompt information of whether to authorize, a touch screen signal, a key signal or a voice signal and the like are monitored to judge whether to receive an authorization confirmation instruction input by a user. For example, after the wearable device displays two options of "authorization" and "non-authorization" through a screen of the wearable device, a touch screen signal is monitored, if the touch screen signal of the user touching the screen is detected, after the touch screen signal is analyzed, when an instruction that the user inputs the "authorization" is obtained, it is determined that an authorization confirmation instruction input by the user is received, and if the instruction that the user inputs the "non-authorization" is obtained after the touch screen signal is analyzed, it is determined that the authorization confirmation instruction input by the user is not received.
Certainly, in other embodiments, the wearable device may also set an instruction receiving time, and if the confirmation and authorization instruction input by the user is not received within the instruction receiving time, it is determined that the confirmation and authorization instruction input by the user is not received, at this time, the prompt information about whether to authorize may be re-sent, or it may be directly determined that the authorization request is rejected, or after the prompt information about whether to authorize is repeatedly sent for multiple times (e.g., 3 times), the confirmation and authorization instruction input by the user is still not received, and then it is directly determined that the authorization request is rejected.
If the wearable device receives the confirmation authorization command as a result of the determination in step S13, the following step S14 is executed, otherwise, step S15 is executed.
S14: and sending the authorization confirmation information to the controlled terminal so as to open the operation authority of the preset risk operation corresponding to the controlled terminal.
S15: and sending the authorization refusing information to the controlled terminal so that the controlled terminal cannot perform corresponding preset risk operation.
The authorization confirming information comprises preset risk operation which is confirmed by the wearable device and authorized to be executed by the controlled terminal, and the authorization refusing information comprises preset risk operation which is refused by the wearable device and authorized to be executed by the controlled terminal. The corresponding preset risk operation is the preset risk operation which is executed by the controlled terminal and confirmed by the confirmation authorization information, or the preset risk operation which is executed by the controlled terminal and refused by the refusal authorization information.
Specifically, as shown in fig. 2, after the wearable device determines that the confirmation authorization instruction input by the user is received, it generates corresponding confirmation authorization information and sends the confirmation authorization information to the controlled terminal, and after the controlled terminal receives the confirmation authorization information, the controlled terminal analyzes the preset risk operation authorized by the confirmation authorization information, and then starts the operation permission of the preset risk operation.
When the wearable device judges that an authorization confirmation instruction input by a user is not received, corresponding authorization refusing information is generated and sent to the controlled terminal, after the controlled terminal receives the authorization refusing information, and after preset risk operation that the authorization refusing information refuses authorization is obtained through analysis, the operation permission of the preset risk operation is not opened, namely the controlled terminal does not execute the preset risk operation. Meanwhile, the controlled terminal can also send out prompt information to prompt the current user that the preset risk operation is not authorized and cannot be used.
In this embodiment, the parent can use wearable equipment, especially under the circumstances of inconvenient terminal such as using cell-phone, in time when child uses controlled terminal to carry out some risky operations, judge whether authorize child to use to can reduce child's terminal equipment such as indulge in cell-phone or carry out the possibility of risky operations such as payment, make the parent know more the amusement activity that child used controlled terminal to carry out simultaneously.
In other embodiments, the parent may also control, through the wearable device, the time when the child uses the controlled terminal to perform operations such as games, and avoid the child from using the controlled terminal excessively.
Specifically, as shown in fig. 4, a second embodiment of the terminal control method according to the present application is further defined after step S14 based on the first embodiment of the terminal control method according to the present application, and further includes:
s21: judging whether the use time of the preset application of the controlled terminal exceeds the preset time or not, or judging whether the use times of the preset application exceeds the preset times or not, or judging whether the time/times of the preset application used by the same user exceeds the preset limit or not.
The preset time is a preset maximum time for using the preset application, and may be a maximum time for using the preset application each time, an accumulated maximum time for using the preset application every day, or an accumulated maximum time for using the preset application every week. The preset number is a preset maximum number of times of using the preset application, and may be a maximum number of times of using the preset application every day or an accumulated maximum number of times of using the preset application every week. The preset limit is a preset maximum time or a preset maximum number of times that the same user uses the preset application, the maximum time may be a maximum time that the preset application is used each time/day/week, and the maximum number may be a maximum number of times that the preset application is used each day/week.
Specifically, the wearable device may calculate the usage time and usage times of the preset application by using a timer, a counter, and the like, and the wearable device may also control the controlled terminal to monitor the usage time and usage times of the preset application, and report the data to the wearable device in real time or at regular time, so that the wearable device can control the wearable device.
Because the users of the controlled terminal may not be the same person, when judging whether the use of the preset application by the same user exceeds the preset limit, the wearable device can control the controlled terminal to acquire the biological characteristic information of the fingerprint, the voiceprint, the facial feature and the like of the user when starting the same preset application every time so as to identify the identity of the user, and calculate the time and the times of using the preset application by the same user by utilizing a timer, a counter and the like, so that the monitoring can be carried out aiming at different users. Thus, the preset limit for each user may be different for different users, e.g. for children the time/number of uses of the preset application is limited to a small range of values and for adults the time/number of uses of the preset application is limited to a large range of values.
If any of the determinations of the above steps S21 is yes, the following step S22 is executed, and if all of the determinations of the above step S21 are no, the step S23 is executed.
S22: and sending prompt information to the controlled terminal, and/or controlling the controlled terminal to execute at least one of a black screen operation, a preset application closing operation and a punishment mechanism operation of opening a preset application.
The prompt message may be at least one form of text, voice, vibration, or the like, for example, a prompt message that the application is required to be closed when the use is overtime is prompted in a bullet screen form on the current interface of the controlled terminal.
The penalty mechanism may be a predetermined penalty measure for a predetermined application. For example, for a game application, the penalty mechanism may be set to reduce network resources available to the game application (such as directly limiting the network speed of the controlled terminal), or to sell equipment currently account of the game application. For another example, for a video application, the penalty mechanism may be set to reduce network resources and the like that the video application can use.
S23: the usage of the default application is monitored.
The use condition of the preset application comprises information such as continuous use time, accumulated use time, use times, user identity and the like.
In an application example, after the controlled terminal starts the preset application (for example, starts the game a) each time, the start time of the preset application is reported to the wearable device, the wearable device starts timing after receiving the start time (for example, 9:00pm) of the game a, when the timing reaches the preset time (for example, 45 minutes), the wearable device obtains the running state of the game a through the controlled terminal, if the running state of the game a is still started, it is determined that the use time of the preset application exceeds the preset time, at this time, the wearable device can directly send an instruction for closing the game a to the controlled terminal, and after receiving the instruction, the controlled terminal closes the game a. If the running state of the game a is off, the off time of the game a is obtained, the using time of the game a is recorded, so as to calculate whether the accumulated using time of the game a exceeds a preset limit or not, and meanwhile, the using condition of the preset application is continuously monitored, so that the step S21 is continuously executed when the preset application is restarted.
Of course, in other application cases, the wearable device may also send a prompt message to the controlled terminal, and/or control the controlled terminal to perform at least one of a black screen operation or a penalty mechanism operation of opening a preset application. The wearable device may start to record the usage of the preset application directly when sending the authorization confirmation information to the controlled terminal, and monitor the usage of the preset application in real time or periodically, and update related data (including usage time, times, etc.), so as to execute step S22 when any of the determination results in step S21 is yes.
Through the mode, parents can control the time that children use the controlled terminal to carry out operations such as games through wearable equipment, and when the operation time is too long or the number of times is too many, the parents can remind or take certain punishment measures in time, and even directly control the controlled terminal to close the application, so that the children can be prevented from using the controlled terminal in a transition way, especially the possibility that the children are indulged in the games can be reduced, and meanwhile, the eyesight of the children can be prevented from being influenced.
In other embodiments, a child may change the permission of the preset risk operation through the controlled terminal, and the wearable device may set that the controlled terminal needs to be authorized by the wearable device before changing the permission, otherwise, the control terminal cannot change the permission.
Specifically, as shown in fig. 5, a third embodiment of the terminal control method according to the present application is further defined after step S10 based on the first embodiment of the terminal control method according to the present application, and further includes:
s31: and judging whether a permission change request of the controlled terminal sent by a user input or the controlled terminal is received.
The permission change request may be request information for changing the setting of a certain preset application or a certain preset risk operation, or may be request information for starting the setting change permission of all preset risk operations of the controlled terminal.
Specifically, the wearable device may monitor an instruction input by the user in real time, and determine whether the instruction is a right change request of the controlled terminal. For example, as shown in fig. 6, when a user inputs an authority change request of a controlled terminal by touching a touch screen of a wearable device, the wearable device monitors the touch signal, analyzes and obtains a position coordinate (point M) of the touch screen corresponding to the touch signal, and obtains instruction information corresponding to an icon/key (e.g., a key icon of "change setting" in fig. 6) of the position coordinate corresponding to the interface by combining with a currently displayed interface of the touch screen, and finally analyzes and obtains the authority change request of the controlled terminal input by the user.
When a user of the controlled terminal requests to change the permission of the preset risk operation on the controlled terminal, for example, requests to change the setting of a certain preset application, the user needs to send a permission change request message of the controlled terminal to the wearable device, and after receiving the message of the controlled terminal, the wearable device analyzes the message content to determine that the message is the permission change request of the controlled terminal sent by the controlled terminal.
If the permission change request is received, the following step S32 is executed, otherwise, the step S11 is continuously executed.
S32: and acquiring the identity information of the user, or controlling the controlled terminal to acquire the identity information of the current user.
Specifically, when the wearable device receives an authority change request of the controlled terminal input by the user, the identity information of the user can be obtained by acquiring the biological characteristics of the user, such as information of a fingerprint, a voiceprint, a palm print, a face and the like, and identifying the biological characteristics. Similarly, when the wearable device receives the permission change request sent by the controlled terminal, the controlled terminal can be controlled to acquire the biological characteristics of the current user, and the biological characteristics are identified to obtain the identity information of the current user of the controlled terminal. Where each user has unique identity information, for example, a wearable device may be assigned an identity ID to each user.
Or, directly using the acquired biological characteristics as the identity information of the user or the current user.
S33: and identifying whether the identity information of the user or the identity information of the current user is matched with a preset user.
Wherein the preset user is a preset user having a controlled terminal permission set or changed permission, for example an owner of the wearable device, such as a parent of a child using the controlled terminal.
Specifically, in an application example, the wearable device stores in advance identity information (e.g., a preset identity ID) of a preset user, and when the wearable device receives an authority change request of a controlled terminal input by a user and acquires the identity information (e.g., the user ID) of the user, the user ID is compared with the preset identity ID, and if the user ID is consistent with the preset identity ID, the identity information of the user is matched with the preset user, otherwise, the user ID is not matched. Similarly, when the wearable device receives the permission change request sent by the controlled terminal and acquires the identity information (such as the current user ID) of the current user of the controlled terminal, the current user ID is compared with the preset user ID, if the current user ID is consistent with the preset user ID, the identity information of the user is matched with the preset user, and otherwise, the identity information is not matched. Of course, in other application examples, the acquired biometric features may also be directly matched with the biometric features of the preset user, if the difference between the two is within a tolerable range, the two are matched, otherwise, the two are not matched.
If the recognition result of the step S33 is a match, the step S34 is executed, otherwise, the step S35 is executed.
S34: and opening the permission change function of the controlled terminal.
S35: the rights change function of the controlled terminal is not opened.
The permission changing function of the opened controlled terminal can open all permission changing functions, and can only open the specific permission/set permission changing function which is requested to be changed in the permission changing request.
When the identification result of step S33 is a match, it indicates that the user who needs to change the controlled terminal right has the controlled terminal right setting or the changed right, at this time, the wearable device opens the right changing function of the controlled terminal, and the user can change the right setting of the controlled terminal. When the identification result of step S33 is not matched, it indicates that the user who needs to change the controlled terminal right does not have the controlled terminal right setting or the changed right, at this time, the wearable device does not open the right changing function of the controlled terminal, and the user cannot change the right setting of the controlled terminal.
Through the mode, the user who does not have the authority to change the authority setting of the controlled terminal cannot change, so that the condition that the child does not agree with the parents to modify the authority of the controlled terminal privately can be avoided, and the condition that the child is addicted to the terminal in a transition mode and the eyesight is influenced is further prevented.
In other embodiments, the parent may also monitor the current or past usage of the controlled terminal in real time through the wearable device, so that the parent can know the entertainment of the child using the controlled terminal in time.
Specifically, as shown in fig. 7, a fourth embodiment of a terminal control method according to the present application is based on the first embodiment of the terminal control method according to the present application, and further includes:
s42: the wearable device acquires a display interface of the controlled terminal, and displays the display interface of the controlled terminal by using a display screen of the wearable device or display screens of other terminal devices connected with the wearable device; or the wearable device calls the historical operation record of the controlled terminal and displays the historical operation record by using the display screen of the wearable device or the display screens of other terminal devices connected with the wearable device.
The display interface of the controlled terminal is a real-time display interface of the controlled terminal, and the historical operation record includes records of at least part of operations performed by the controlled terminal within a period of time, such as the number of times of opening the browser B in a week, the time of opening each time, the time of closing, the time of using, the browsed web pages, the historical display interface, and the like.
Specifically, when the wearable device has a display screen, and after receiving a display interface/historical operation record of the controlled terminal, which is input by a user, acquired in real time, or a corresponding historical operation record is retrieved and synchronized to the display screen of the wearable device for display, or sent to the display screen of another connected terminal device (such as a desktop computer) for display, so that a user of the wearable device (such as a parent of a child using the controlled terminal) can know the entertainment condition of the child using the controlled terminal in time, and thus whether to adjust the authority setting of the controlled terminal can be determined, and the possibility that the child performs risky operations can be further reduced.
Alternatively, the wearable device may apply and monitor the controlled terminal through its own installed control. As shown in fig. 7, before step S42, the method further includes:
s40: the wearable device starts a control application and is connected with the controlled terminal.
The control application is an application program pre-installed on the wearable device, and can realize the functions of connecting with the controlled terminal and acquiring the information of the controlled terminal.
S41: and starting a screen recording and/or data calling function of the control application to acquire a display interface of the controlled terminal and/or call a historical operation record of the controlled terminal.
Specifically, when a household needs to acquire the current use condition or the historical operation record of the controlled terminal, the screen recording or the data retrieval function of the control application installed on the wearable device can be started, that is, the real-time display interface of the controlled terminal can be recorded or the historical operation record of the controlled terminal can be retrieved through the control application. The controlled terminal can be internally provided with an application program corresponding to the control application, so that the corresponding data can be sent to the control application through the application program, and the wearable device can perform subsequent display operation.
Of course, in other embodiments, the wearable device may also perform operations such as setting and changing of the authority of the controlled terminal, and authorization of the preset application through the control application.
In other embodiments, before authorizing the controlled terminal to execute the preset risk operation, the wearable device may further determine whether the current use condition of the controlled terminal is abnormal, so as not to authorize when the current use condition is abnormal, thereby avoiding occurrence of the operation risk.
As shown in fig. 8 in detail, a fifth embodiment of the terminal control method according to the present application is based on the first embodiment of the terminal control method, and before further limiting step S13, the method further includes:
s51: the wearable equipment controls a camera of the controlled terminal to shoot an image of a current user or a current environment in real time and transmits the image to the wearable equipment; or the wearable device controls the controlled terminal to acquire the physical sign data of the current user and transmits the physical sign data to the wearable device.
The camera can be a front camera or a rear camera, and can simultaneously control the front camera and the rear camera to simultaneously acquire images. The physical sign data can be the heart rate, pulse and other data of the current user of the controlled terminal, and if the heart rate or pulse of the current user is too high or too fast, the situation indicates that the emotion of the current user is unstable and is not suitable for some risky operations (such as playing games).
S52: the wearable device analyzes the image and identifies whether the current user is an authorized user or whether the current environment is abnormal; or, the wearable device analyzes the sign data, and identifies whether the current user is suitable for performing the preset risk operation.
Specifically, before determining whether to authorize the preset risk operation requesting authorization, the wearable device may control a camera of the controlled terminal to shoot an image of the current user or the current environment in real time, analyze the obtained image, identify and obtain features of the current user in the image of the current user by using technologies such as image identification, compare the features with images/features of authorized users, identify the current user as an authorized user if the features are matched with the images/features of the authorized users, and otherwise identify that the current user is not an authorized user; the wearable device can also identify and obtain information such as people, objects and buildings appearing in the current environment by using technologies such as image identification (such as a neural network model), judge whether the appearing people are strangers or whether the appearing objects are dangerous goods or not, or judge whether positions corresponding to the environmental information such as the buildings are strangers, and judge that the current environment is abnormal when the appearing people are strangers or the appearing objects are dangerous goods or the positions corresponding to the environmental information such as the buildings are strangers.
Before determining whether to authorize the preset risk operation requesting authorization, the wearable device may also obtain, through the controlled terminal, the physical sign data of the current user, for example, obtain corresponding data by using a sensor, a pedometer, and other devices of the controlled terminal to perform calculation, or when the controlled terminal is the wearable device, directly measure the physical sign data of the current user by using a sensing device, and determine whether the physical sign data exceeds a preset range, for example, whether a heart rate exceeds a preset value (e.g., 100), and if the physical sign data exceeds the preset range, it indicates that the current user is unstable in mood or bad in physical condition, and is not suitable for the preset risk operation.
If the current user is not an authorized user or the current environment is abnormal or the current user is not suitable for performing the preset risk operation, the following step S53 is executed, otherwise, the step S54 is executed.
S53: and sending alarm information to the user to prompt the user that the authorization request is abnormal.
S54: execution continues with step S13.
Specifically, when the wearable device determines that the current user of the controlled terminal is not an authorized user or that the current environment is abnormal or that the current user is not suitable for performing a preset risk operation, the wearable device sends an alarm message to the user using the wearable device, for example, the alarm message is sent in at least one of text, voice, ringing, vibration, and the like, so as to prompt the user that the authorization request is abnormal, so as to prompt the user to authorize cautiously. Meanwhile, the current user of the user controlled terminal can be reminded of possible abnormality, parents can timely know the abnormal conditions of children of the controlled terminal, and financial loss and the like caused by certain unexpected conditions (such as the fact that the children lose the controlled terminal) are avoided.
As shown in fig. 9, an execution subject of the sixth embodiment of the terminal control method of the present application is a controlled terminal, and the controlled terminal may be a terminal such as a smart phone, a tablet, a notebook computer, a desktop computer, or an intelligent wearable device. As shown in fig. 9, a sixth embodiment of a terminal control method according to the present application includes:
s61: and the controlled terminal receives the operation instruction input by the current user.
The controlled terminal can obtain the operation instruction input by the current user through a touch screen, a microphone, a keyboard or a sensor and other devices.
For example, the controlled terminal receives a voice signal input by a current user through a microphone, and after the voice signal is recognized, a corresponding operation instruction can be obtained.
S62: and judging whether the operation instruction is an operation instruction for performing preset risk operation.
The preset risk operation comprises accessing a bad website, starting a preset application in a non-allowed time period, performing payment operation and the like.
Specifically, the controlled terminal may determine whether an operation required by the operation instruction is a preset risk operation according to the operation content of the operation instruction input by the current user. For example, when the operation required by the operation instruction is to open a bad website, it is determined that the operation instruction is an operation instruction for performing a preset risk operation.
If the operation command is an operation command for performing a predetermined risk operation, step S64 is executed, otherwise step S63 is executed.
S63: and executing the operation corresponding to the operation instruction.
S64: an authorization request is sent to the bound wearable devices.
S65: it is determined whether confirmation authorization information is received from the wearable device.
If the confirmed authorization information is received, step S66 is executed, otherwise step S67 is executed.
S66: and opening the operation authority of the preset risk operation corresponding to the operation instruction, and executing the preset risk operation corresponding to the operation instruction.
S67: and not executing the preset risk operation corresponding to the operation instruction.
Specifically, when the operation instruction is not a preset risk operation, the controlled terminal may directly perform an operation corresponding to the operation instruction, for example, directly open a non-preset application (e.g., a camera application). When the operation instruction is a preset risk operation, the controlled terminal needs to send an authorization request to the wearable device, and only after receiving the authorization confirmation information sent by the wearable device, the operation authority of the preset risk operation corresponding to the operation instruction is started, the controlled terminal can execute the corresponding preset risk operation, otherwise, the controlled terminal does not execute the corresponding preset risk operation.
In this embodiment, when the controlled terminal performs the preset risk operation, the authorized preset risk operation may be performed only by obtaining authorization of the wearable device bound to the controlled terminal, and the unauthorized preset risk operation may not be performed, so that the possibility of performing the risk operation by a child using the controlled terminal is reduced, the device operation safety is improved, a parent using the wearable device may know in time the condition that the child uses the controlled terminal, the child is prevented from performing the risk operation by using the controlled terminal in time, financial loss and the like are avoided, and meanwhile, the child can be prevented from using the controlled terminal in a transition manner.
In other embodiments, the controlled terminal may further perform more interactions with the wearable device, and specifically, reference may be made to the contents of any one of the first to fifth embodiments of the terminal control method of the present application, which are not repeated here.
As shown in fig. 10, in an embodiment of an intelligent terminal according to the present application, an intelligent terminal 100 includes: a communication circuit 110 and a processor 120 connected to each other.
The communication circuit 110 is used for communicating with other terminal devices. The communication circuit 110 may include an antenna circuit, an input/output interface, and the like.
The processor 120 controls the operation of the smart terminal 100, and the processor 120 may also be referred to as a Central Processing Unit (CPU). The processor 120 may be an integrated circuit chip having signal processing capabilities. The processor 120 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
As shown in fig. 11, in an application example, the smart terminal 100 is a wearable device used by parents and can be bound to a controlled terminal 200 used by a child, the communication circuit 110 of the smart terminal 100 is used for communicating with the controlled terminal 200, and the processor 120 thereof is executable to implement the terminal control method provided by any one of the first to fifth embodiments of the terminal control method of the present application or a non-conflicting combination thereof.
As shown in fig. 12, in another application example, the smart terminal 100 may also be a controlled terminal used by a child, which may be bound with a wearable device 300 used by a parent, the communication circuit 110 of the smart terminal 100 is used for communicating with the wearable device 300, and the processor 120 thereof is executable to implement the terminal control method provided in the sixth embodiment of the terminal control method of the present application. The controlled terminal may be a terminal such as a smart phone (e.g., the mobile phone shown in fig. 12), a tablet, a laptop, a desktop, or a smart wearable device.
Of course, in other embodiments, the intelligent terminal 100 may further include other components such as a memory (not shown), a display (not shown), a camera (not shown), and the like, which are not limited herein.
As shown in fig. 13, in an embodiment of the apparatus with storage function of the present application, a program 410 is stored in the apparatus with storage function 400, and the program 410 is used to be executed to implement the method provided by any one of the first to fifth embodiments of the terminal control method of the present application or a non-conflicting combination thereof, or the program 410 is used to be executed to implement the method provided by the sixth embodiment of the terminal control method of the present application.
The device 400 with the storage function may be a portable storage medium such as a usb disk and an optical disk, or may be an intelligent terminal, a server, or a separate component which can be integrated in the intelligent terminal, such as a chip.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application or are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A terminal control method, comprising:
the wearable device judges whether an authorization request from a controlled terminal is received or not, wherein the authorization request comprises an authorization request for the controlled terminal to perform preset risk operation;
if the authorization request is received, informing a user of the authorization request and sending a prompt message for judging whether the authorization is available;
judging whether an authorization confirmation instruction input by a user is received, wherein the user is a user of the wearable equipment;
and if the authorization confirmation instruction is received, sending authorization confirmation information to the controlled terminal so as to open the operation authority of the preset risk operation corresponding to the controlled terminal.
2. The method of claim 1, wherein the wearable device determines whether an authorization request from a controlled terminal is received before the wearable device determines that the authorization request is received, comprising:
and the wearable device binds the controlled terminal and sends an authority setting instruction to a preset application of the controlled terminal, so that the controlled terminal sends the authorization request to the wearable device when the preset risk operation of the preset application is carried out.
3. The method according to claim 2, wherein after sending the confirmation authorization information to the controlled terminal, the method further comprises:
judging whether the use time of the preset application of the controlled terminal exceeds a preset time or not, or judging whether the use times of the preset application exceed a preset time or not, or judging whether the time/times of using the preset application by the same user exceeds a preset limit or not;
if any judgment result is yes, sending prompt information to the controlled terminal, and/or controlling the controlled terminal to execute at least one of a black screen operation, a preset application closing operation and a punishment mechanism operation of opening the preset application.
4. The method of claim 2, wherein after the wearable device binds the controlled terminal and sends a right setting instruction to a preset application of the controlled terminal, the method further comprises:
judging whether a user input or a permission change request of the controlled terminal sent by the controlled terminal is received;
if the permission change request is received, acquiring the identity information of the user, or controlling the controlled terminal to acquire the identity information of the current user;
identifying whether the identity information of the user or the identity information of the current user is matched with a preset user;
and if the authority change function of the controlled terminal is matched with the authority change function of the controlled terminal, otherwise, the authority change function of the controlled terminal is not opened.
5. The method of claim 1, further comprising:
the wearable device acquires a display interface of the controlled terminal, and displays the display interface by using a display screen of the wearable device or display screens of other terminal devices connected with the wearable device; or,
and the wearable equipment calls the historical operation record of the controlled terminal and displays the historical operation record by utilizing a display screen of the wearable equipment or display screens of other terminal equipment connected with the wearable equipment.
6. The method of claim 5, further comprising:
the wearable device starts a control application and is connected with the controlled terminal;
and starting a screen recording and/or data calling function of the control application to acquire a display interface of the controlled terminal and/or calling a historical operation record of the controlled terminal.
7. The method of claim 1, wherein before determining whether the user input is a confirmation authorization instruction, further comprising:
the wearable equipment controls a camera of the controlled terminal to shoot an image of a current user or a current environment in real time and transmits the image to the wearable equipment; or the wearable device controls the controlled terminal to acquire the physical sign data of the current user and transmits the physical sign data to the wearable device;
the wearable device analyzes the image and identifies whether the current user is an authorized user or whether the current environment is abnormal; or the wearable device analyzes the sign data to identify whether the current user is suitable for performing the preset risk operation;
if the current user is not an authorized user or the current environment is abnormal or the current user is not suitable for the preset risk operation, alarm information is sent to the user to prompt the user that the authorization request is abnormal.
8. A terminal control method, comprising:
the controlled terminal receives an operation instruction input by a current user;
judging whether the operation instruction is an operation instruction for performing preset risk operation;
if the operation instruction is an operation instruction for performing preset risk operation, sending an authorization request to the bound wearable device;
judging whether the authorization confirmation information from the wearable equipment is received or not;
and if the authorization confirmation information is received, opening the operation authority of the preset risk operation corresponding to the operation instruction.
9. An intelligent terminal, comprising: a communication circuit and a processor connected to each other;
the communication circuit is used for communicating with other terminal equipment;
the processor is used for executing instructions to realize the terminal control method according to any one of claims 1-7 and 8.
10. An apparatus having a storage function, in which a program is stored, characterized in that the program is executed to implement the terminal control method according to any one of claims 1 to 8.
CN201910310061.0A 2019-04-17 2019-04-17 Terminal control method, intelligent terminal and device with storage function Withdrawn CN111835905A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910310061.0A CN111835905A (en) 2019-04-17 2019-04-17 Terminal control method, intelligent terminal and device with storage function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910310061.0A CN111835905A (en) 2019-04-17 2019-04-17 Terminal control method, intelligent terminal and device with storage function

Publications (1)

Publication Number Publication Date
CN111835905A true CN111835905A (en) 2020-10-27

Family

ID=72915512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910310061.0A Withdrawn CN111835905A (en) 2019-04-17 2019-04-17 Terminal control method, intelligent terminal and device with storage function

Country Status (1)

Country Link
CN (1) CN111835905A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113205335A (en) * 2021-04-19 2021-08-03 深圳市安全守护科技有限公司 Payment management method and device and computer readable storage medium
CN113938510A (en) * 2021-09-29 2022-01-14 青岛海信移动通信技术股份有限公司 Terminal equipment and terminal control method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2469964A1 (en) * 2009-09-21 2012-06-27 ZTE Corporation Mobile terminal for implementing monitoring management and monitoring implementation method thereof
CN106657583A (en) * 2016-09-30 2017-05-10 努比亚技术有限公司 Alarm method, device and terminal
CN108574776A (en) * 2018-03-26 2018-09-25 努比亚技术有限公司 A kind of terminal management method, mobile terminal and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2469964A1 (en) * 2009-09-21 2012-06-27 ZTE Corporation Mobile terminal for implementing monitoring management and monitoring implementation method thereof
CN106657583A (en) * 2016-09-30 2017-05-10 努比亚技术有限公司 Alarm method, device and terminal
CN108574776A (en) * 2018-03-26 2018-09-25 努比亚技术有限公司 A kind of terminal management method, mobile terminal and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113205335A (en) * 2021-04-19 2021-08-03 深圳市安全守护科技有限公司 Payment management method and device and computer readable storage medium
CN113938510A (en) * 2021-09-29 2022-01-14 青岛海信移动通信技术股份有限公司 Terminal equipment and terminal control method

Similar Documents

Publication Publication Date Title
US11727093B2 (en) Setting and terminating restricted mode operation on electronic devices
US11928200B2 (en) Implementation of biometric authentication
CN114047856B (en) User interface for controlling or presenting device usage on an electronic device
EP3401779B1 (en) Method and apparatus for invoking function in application
CN107392056A (en) Terminal and child mode implementation method, computer-readable recording medium
US8725113B2 (en) User proximity control of devices
RU2628258C2 (en) Method and device for child mode processing
US9942753B2 (en) Method and system for monitoring and restricting use of mobile devices
CN106446670B (en) Application program management method and device and electronic equipment
CN110287694B (en) Application program management method, mobile terminal and storage medium
CN108780475A (en) Personalized inference certification for virtually assisting
CN108377241A (en) Monitoring method, device, equipment based on access frequency and computer storage media
CN107292158A (en) Mobile terminal and pattern triggering method, computer-readable recording medium
EP2169585A1 (en) User authentication judging device, user authentication judging system, user authentication judging program and user authentication judging method
CN107480497A (en) Mobile terminal and child mode implementation method, computer-readable recording medium
CN107249084A (en) Mobile terminal and routine call method, computer-readable recording medium
CN107437023A (en) Control method and control device for terminal application and mobile terminal
WO2018233716A1 (en) Terminal privacy protection method, terminal and computer-readable storage medium
CN111835905A (en) Terminal control method, intelligent terminal and device with storage function
CN105262823A (en) Method, apparatus and system for controlling terminal
CN111182120A (en) Method for controlling unlocking, mobile terminal and computer storage medium
CN107454257A (en) Mobile terminal and method for connecting network, computer-readable recording medium
CN106506810A (en) The method and apparatus of the use time of limiting terminal equipment
CN107437018B (en) Mobile terminal, control method thereof, and computer-readable storage medium
WO2023131163A1 (en) Application management method and related apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201027