CN111859367A - Screen locking password setting method, terminal and computer readable storage medium - Google Patents

Screen locking password setting method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN111859367A
CN111859367A CN202010737949.5A CN202010737949A CN111859367A CN 111859367 A CN111859367 A CN 111859367A CN 202010737949 A CN202010737949 A CN 202010737949A CN 111859367 A CN111859367 A CN 111859367A
Authority
CN
China
Prior art keywords
time
screen locking
locking password
monitoring service
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010737949.5A
Other languages
Chinese (zh)
Inventor
周高锋
卢浩宇
代敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Hangzhou Information Technology Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Hangzhou Information Technology Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010737949.5A priority Critical patent/CN111859367A/en
Publication of CN111859367A publication Critical patent/CN111859367A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the invention relates to the technical field of terminals, and discloses a screen locking password setting method, a terminal and a computer readable storage medium. In the invention, the time of the terminal is monitored by using a time monitoring service; the time monitoring service is restarted under the condition that the background running state is abnormal; if the change of the monitored time meets the preset condition, updating the currently set screen locking password based on the monitored time, and improving the security and stability of password setting.

Description

Screen locking password setting method, terminal and computer readable storage medium
Technical Field
The embodiment of the invention relates to the technical field of terminals, in particular to a screen locking password setting method, a terminal and a computer readable storage medium.
Background
With the development of electronic information technology, the range of services covered by terminals is more and more extensive nowadays. In the process of using many services, a large amount of contents related to user privacy, such as call records, private short messages, photos and other information, are generated. In order to protect the privacy information of the user, the current terminal system supports the function of locking the screen. If the user needs to wake up the screen and release the screen locking state, the terminal needs to input a preset screen locking password, if the input password is the same as the preset screen locking password, the screen locking state can be normally released, and otherwise, the terminal system cannot be started.
The inventors found that at least the following problems exist in the related art: traditional lock screen password sets up to six fixed numbers usually, and the user sets up to the birthday for avoiding the password to be forgotten usually, and regular searchable lists such as commemorative day or simple digital combination are as the password, and the mode of setting up of such lock screen password is not safe, and very easily cracked by the people, can't guarantee the security of the information at terminal.
Disclosure of Invention
The embodiment of the invention aims to provide a screen locking password setting method, a terminal and a computer readable storage medium, which improve the security and stability of password setting.
In order to solve the above technical problem, an embodiment of the present invention provides a method for setting a screen locking password, including: monitoring the time of the terminal by using a time monitoring service; the time monitoring service is restarted under the condition that the background running state is abnormal; and if the change of the monitored time meets the preset condition, updating the currently set screen locking password based on the monitored time.
An embodiment of the present invention further provides a terminal, including: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the screen locking password setting method.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and the computer program realizes the screen locking password setting method when being executed by a processor.
Compared with the prior art, the method and the device have the advantages that the time of the terminal is monitored through the time monitoring service resident in the background, the current screen locking password is changed when the change of the time meets the preset condition, the modified screen locking password is related to the current time, and the security of dynamically updating the screen locking password is higher than that of a static password. In addition, the time monitoring service can be automatically restarted if the running state of the time monitoring service is abnormal in the background, so that the time monitoring service can be kept in the running state in the background, real-time monitoring time change is guaranteed, the screen locking password can be timely updated based on the current time, and the stability and the reliability of updating the screen locking password are improved.
In addition, the time monitoring service is restarted under the abnormal condition of the background running state, and the method comprises the following steps: detecting a background running state of the time monitoring service by using a first equipment management receiver; and if the background running state of the time monitoring service is detected to be abnormal, starting the time monitoring service again. And restarting the time monitoring service by utilizing the first equipment management receiver to ensure that the time monitoring service is resident in the background.
In addition, the first device management receiver registers in the time listening service.
In addition, the monitoring the time of the terminal by using the time monitoring service includes: receiving a time broadcast of the terminal system using a second device management receiver; wherein the second device management receiver is registered in the time listening service.
In addition, the time broadcast of the terminal system is transmitted at a preset period. The change in the time to listen by changing the frequency of transmission of the time broadcast of the system meets a preset condition.
In addition, the second device management receiver is also statically registered in the manifest file. The safety and the stability of the second equipment management receiver are ensured, and the second equipment management receiver is prevented from being cleared by software.
In addition, the screen locking password which is currently set is updated based on the monitored time, and the method comprises the following steps: obtaining a target screen locking password according to a preset password setting rule and monitoring time; and updating the currently set screen locking password by using the target screen locking password.
In addition, the preset password setting rule includes: converting the monitored time into a digital sequence form; changing the arrangement sequence of the digital sequences; and taking the changed digital sequence as a target screen locking password.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flowchart of a screen-lock password setting method according to a first embodiment of the present invention;
FIG. 2 is a flowchart of a screen-lock password setting method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal according to a third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention will be described in detail with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that in various embodiments of the invention, numerous technical details are set forth in order to provide a better understanding of the present application. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present invention, and the embodiments may be mutually incorporated and referred to without contradiction.
The first embodiment of the invention relates to a method for setting a screen locking password, which monitors the time of a terminal by using a time monitoring service; the time monitoring service is restarted under the condition that the background running state is abnormal; and if the change of the monitored time meets the preset condition, updating the currently set screen locking password based on the monitored time. Thereby improving the security and stability of password setting. The implementation details of the lock screen password setting method of the present embodiment are specifically described below, and the following description is only provided for the convenience of understanding, and is not necessary for implementing the present embodiment.
As shown in fig. 1, the method for setting a screen locking password according to the embodiment includes:
step 101, using a time monitoring service to monitor the time of a terminal.
Specifically, the time listening service is created and configured in advance so as to be directly called and used when the time listening service is utilized. When creating and configuring the time monitoring service, firstly, a subclass of an inheritance service can be defined, and secondly, the time monitoring service TimeLockService can be configured in a manifest file (android manifest.
And starting the time monitoring service by using a startService () function, and running in a background after the time monitoring service is started to continuously monitor the time of the terminal.
The time monitoring service is used to monitor the time of the terminal, and the monitoring may be implemented by using a second device management receiver (TimeLockReceiver) registered in the time monitoring service. Specifically, a second device management receiver (TimeLockReceiver) is dynamically registered in a TimeLockService, and the second device management receiver may receive a time broadcast sent by a terminal system when the time of the terminal changes, that is, the second device management receiver represents that the time of the terminal changes when receiving the time broadcast, and may calculate the time of the terminal after the change (the time for receiving the time broadcast) according to the number of times the second device management receiver receives the time broadcast when determining the initial time of the terminal and the time interval for sending the time broadcast by the terminal system.
In addition, in practical application, a time monitoring service (TimeLockService) needs to be resident in the background, so that the time monitoring service can continuously monitor the change of time, the screen locking password can be timely updated, and the stability and reliability of the screen locking password are improved.
In order to keep the time monitoring service resident in the background, the background running state of the time monitoring service can be monitored by using other services, or the broadcast receiver is used for receiving and monitoring the broadcast of the background running state of the time monitoring service. Taking the background running state of the monitoring service monitored by the broadcast monitoring time as an example, the monitoring process is specifically described below. After the time monitoring service is started, if the running state of the time monitoring service is normal, the broadcasting which runs normally is sent in a preset period. If the broadcast receiver receives the broadcast which runs normally, the running state of the time monitoring service background is normal. If the broadcast receiver does not receive the broadcast sent by the time monitoring service after the preset time, the time monitoring service is abnormal in the background running state and is cleared by the system or the antivirus software. If the broadcast receiver receives the broadcast with abnormal operation, the background operation state of the time monitoring service is also abnormal. When the background running state of the time monitoring service is abnormal, the time monitoring service is controlled to restart, for example, the time monitoring service can be awakened by a broadcast receiver. The broadcast receiver for monitoring the background running state of the time monitoring service can be a newly added first equipment management receiver registered in the time monitoring service, and can also monitor the time monitoring service by utilizing a second equipment management receiver registered in the time monitoring service, so that the utilization rate of the second equipment management receiver is improved.
In addition, in practical application, the time monitoring service may be used to monitor the device management receiver for monitoring the background running state thereof, that is, the time monitoring service and the device management receiver monitor the background running state mutually. This can be done after one of the time listening service and device management receiver is cleared by the antivirus program while the other is running, which can be awakened immediately, and the awakened time listening service or device management receiver will not be cleared again within a certain time. Since one of the time monitoring service and the equipment management receiver is in a running state, the time monitoring service and the equipment management receiver can stably realize that the time monitoring service is resident in a background.
And 102, updating the currently set screen locking password based on the monitored time when the change of the monitored time meets the preset condition.
Specifically, when the time of the terminal is monitored, the time monitoring service may be used to monitor that the time of the terminal changes. And judging whether the change of the time meets a preset condition, wherein the preset condition can be that whether the change of the time meets a preset threshold value, and if the change of the time is 1 minute, the preset condition is met.
In order to realize that the monitored Time change meets the preset condition, a Time filter Time _ Tick can be used for setting a timing task, and the Time filter Time _ Tick can be used for realizing the transmission of Time broadcast in a preset period. For example, if the preset condition is set that the Time change is 1 minute, the timing task may be set to send a broadcast every 1 minute, and then the Time monitoring service may receive the Time broadcast sent by using the Time filter Time _ Tick, that is, the Time change satisfies the preset condition.
And after the change of the terminal time meets a preset condition, updating the currently set screen locking password. Specifically, the screen locking password can be updated according to a preset password setting rule and the monitored current time, or the monitored current time is directly used as the updated screen locking password.
The set password setting rule may be as follows: and converting the monitored time into a digital sequence form, changing the arrangement sequence of the digital sequence, taking the changed digital sequence as a target screen locking password, and finally replacing the current screen locking password by using the target screen locking password. For example, if the password setting rule specifies that the number sequence is adjusted from 1234 to 4321, the target lock screen password may be set to 0311 when the monitored current time is 11: 30.
The set password setting rule can also be that the target screen locking password with four digits is obtained through recalculation according to a preset formula and monitoring time. For example, if the predetermined formula is N +2, N is the number of each digit, i.e., the monitored time is converted into a form of a digital sequence, 2 is added to the number of each digit, and if the number of the digit after calculation is greater than ten, the number of the digit is taken as the number of the digit after calculation. Assume that the time of monitoring is 11:30, then the target lock screen password may be set to 3352. In practical application, a user can set password setting rules and formulas according to the self condition so as to improve the password security and avoid the problem that the user forgets the password to cause abnormal unlocking.
Compared with the prior art, the method and the device have the advantages that the time of the terminal is monitored through the time monitoring service resident in the background, the current screen locking password is changed when the change of the time meets the preset condition, the modified screen locking password is related to the current time, and the security of dynamically updating the screen locking password is higher than that of a static password. In addition, the time monitoring service can be automatically restarted if the running state of the time monitoring service is abnormal in the background, so that the time monitoring service can be kept in the running state in the background, real-time monitoring time change is guaranteed, the screen locking password can be timely updated based on the current time, and the stability and the reliability of updating the screen locking password are improved.
The second embodiment of the present invention relates to a method for setting a screen locking password, and in the second embodiment of the present invention, the second device management receiver is statically registered in a manifest file, so as to enhance the security and stability of the second device management receiver.
As shown in fig. 2, the method for setting a screen locking password according to this embodiment includes:
step 201, statically registering the device management receiver and the power-on self-starting receiver.
Specifically, the TimeLockReceiver is statically registered to ensure the stability of the second device manager and avoid being cleared by the terminal system.
Step 202, setting a calculation formula.
Specifically, the set calculation formula can be complex or simple, the monitored time is calculated by using the calculation formula, and the calculated result is used as the target screen locking password. The obtained target screen locking password is kept to be four-digit, so that the target screen locking password can be dynamically changed based on the original screen locking interface.
Step 203, create a device manager.
Specifically, after the application is started, the user creates a device manager according to the prompt, and the subsequent screen locking password modification operation is taken over by the device manager.
The device manager detects whether a screen locking password is set at the current terminal, if so, the screen locking password is modified according to the current time and the set calculation formula, and if not, the current time and the target screen locking password calculated by the calculation formula are directly set as the current screen locking password.
Step 204, the time listening service is started.
The device manager sets the password and simultaneously starts a time monitoring service TimeLockservice, and the service resides in the background.
Step 205, dynamically register the device management receiver.
The second device manager TimeLockReceiver is dynamically registered again in service to listen for the Time broadcast sent by the filter timetick to listen for changes in Time. The filter Time _ Tick is registered with the second device manager by dynamic registration when the Time filter is created.
And step 206, modifying the screen locking password.
And monitoring the time change, sending a request to an equipment manager, updating the current screen locking password by the equipment manager, and replacing the current screen locking password by using the calculated target screen locking password.
When the user unlocks, the correct result of calculation is input in the input box through the current time and a preset calculation formula, and then the unlocking can be realized. If the input times exceed the preset times, the user is prohibited from inputting again, and the user is allowed to input again after waiting for a period of time.
In this embodiment, the updating process of the screen locking password is wholly described, and the second device management receiver is statically registered in the manifest file in advance, so that the security and the stability of the second device management receiver are ensured, and the second device management receiver is prevented from being cleared by software.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
A third embodiment of the invention is directed to a terminal, as shown in fig. 3, comprising at least one processor 301; and a memory 302 communicatively coupled to the at least one processor 301; the memory 302 stores instructions executable by the at least one processor 301, and the instructions are executed by the at least one processor 301, so that the at least one processor 301 can execute the lock screen password setting method in any of the above method embodiments.
Where the memory 302 and the processor 301 are coupled in a bus, the bus may comprise any number of interconnected buses and bridges, the buses coupling one or more of the various circuits of the processor 301 and the memory 302. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 301 is transmitted over a wireless medium through an antenna, which further receives the data and transmits the data to the processor 301.
The processor 301 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 302 may be used to store data used by processor 301 in performing operations.
A fourth embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific embodiments for practicing the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. A screen locking password setting method is characterized by comprising the following steps:
monitoring the time of the terminal by using a time monitoring service;
the time monitoring service is restarted under the condition that the background running state is abnormal;
and if the change of the monitored time meets a preset condition, updating the currently set screen locking password based on the monitored time.
2. The screen locking password setting method of claim 1, wherein the restarting of the time monitoring service in case of abnormal background running state comprises:
detecting a background running state of the time monitoring service by using a first equipment management receiver;
and if the background running state of the time monitoring service is detected to be abnormal, the time monitoring service is started again.
3. The screen-locking password setting method according to claim 2, wherein the first device management receiver is registered in the time listening service.
4. The method for setting the screen locking password according to claim 1, wherein the monitoring the time of the terminal by using the time monitoring service comprises:
receiving a time broadcast of the terminal system using a second device management receiver; wherein the second device management receiver is registered in the time listening service.
5. The screen locking password setting method of claim 4, wherein the time broadcast of the terminal system is transmitted at a preset period.
6. The lock screen password setting method according to claim 4, wherein the second device management receiver is further statically registered with a manifest file.
7. The method for setting the screen locking password according to claim 1, wherein the updating the currently set screen locking password based on the monitored time comprises:
obtaining a target screen locking password according to a preset password setting rule and the monitoring time;
and updating the currently set screen locking password by using the target screen locking password.
8. The screen locking password setting method according to claim 7, wherein the preset password setting rule includes:
converting the monitored time into a digital sequence form;
changing the arrangement sequence of the number sequence;
and taking the changed digital sequence as a target screen locking password.
9. A terminal, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the lock screen password setting method of any of claims 1 to 8.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the lock screen password setting method of any one of claims 1 to 8.
CN202010737949.5A 2020-07-28 2020-07-28 Screen locking password setting method, terminal and computer readable storage medium Pending CN111859367A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010737949.5A CN111859367A (en) 2020-07-28 2020-07-28 Screen locking password setting method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010737949.5A CN111859367A (en) 2020-07-28 2020-07-28 Screen locking password setting method, terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111859367A true CN111859367A (en) 2020-10-30

Family

ID=72948829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010737949.5A Pending CN111859367A (en) 2020-07-28 2020-07-28 Screen locking password setting method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111859367A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116127441A (en) * 2023-02-15 2023-05-16 江苏中石电子科技有限公司 Terminal encryption system of Internet of things and encryption method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090328154A1 (en) * 2008-06-25 2009-12-31 Microsoft Corporation Isolation of services or processes using credential managed accounts
EP2894584A1 (en) * 2012-10-12 2015-07-15 ZTE Corporation Screen unlocking method, device and terminal
CN107292160A (en) * 2017-06-21 2017-10-24 福建中金在线信息科技有限公司 The update method of account number cipher, more new system, electronic equipment and storage medium
CN107315946A (en) * 2017-06-27 2017-11-03 深圳传音通讯有限公司 Screen-lock password generation method and device
CN107391198A (en) * 2017-07-25 2017-11-24 广东欧珀移动通信有限公司 Method for scheduling task and device, computer-readable recording medium, mobile terminal
CN108460262A (en) * 2018-01-08 2018-08-28 平安科技(深圳)有限公司 Cipher management method, device, terminal device and storage medium
CN110032861A (en) * 2019-03-12 2019-07-19 东莞市步步高通信软件有限公司 A kind of method and terminal device that password is set

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090328154A1 (en) * 2008-06-25 2009-12-31 Microsoft Corporation Isolation of services or processes using credential managed accounts
EP2894584A1 (en) * 2012-10-12 2015-07-15 ZTE Corporation Screen unlocking method, device and terminal
CN107292160A (en) * 2017-06-21 2017-10-24 福建中金在线信息科技有限公司 The update method of account number cipher, more new system, electronic equipment and storage medium
CN107315946A (en) * 2017-06-27 2017-11-03 深圳传音通讯有限公司 Screen-lock password generation method and device
CN107391198A (en) * 2017-07-25 2017-11-24 广东欧珀移动通信有限公司 Method for scheduling task and device, computer-readable recording medium, mobile terminal
CN108460262A (en) * 2018-01-08 2018-08-28 平安科技(深圳)有限公司 Cipher management method, device, terminal device and storage medium
CN110032861A (en) * 2019-03-12 2019-07-19 东莞市步步高通信软件有限公司 A kind of method and terminal device that password is set

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116127441A (en) * 2023-02-15 2023-05-16 江苏中石电子科技有限公司 Terminal encryption system of Internet of things and encryption method thereof

Similar Documents

Publication Publication Date Title
US20200162466A1 (en) Certificate based profile confirmation
US11638141B1 (en) Remote sim unlock (RSU) implementation using blockchain
US10831881B2 (en) Method and terminal for enhancing information security
CN110289965B (en) Application program service management method and device
CN108304251B (en) Thread synchronization method and server
US11928450B2 (en) Mobile terminal, method for uninstalling pre-installed application therein, and memory
CN111859367A (en) Screen locking password setting method, terminal and computer readable storage medium
US11503080B2 (en) Remote management of a user device
RU2679187C2 (en) Method, device for setting system data and terminal
WO2023103992A1 (en) Container operation method and apparatus, electronic device, and storage medium
CN111953633A (en) Access control method and access control device based on terminal environment
CN114866970A (en) Policy control method, system and related equipment
CN114861160A (en) Method, device, equipment and storage medium for improving non-administrator account authority
CN113225296B (en) Authority management method and device
CN112055849B (en) Exclusive control system and exclusive control method
CN111638917A (en) Application start limiting method, device and storage medium
CN111199596A (en) Intelligent door lock control method, device and system
CN111339520B (en) Hardware dog-based online control method, electronic equipment and storage medium
CN112015488A (en) Implementation method of special terminal, electronic equipment and storage medium
US10848942B1 (en) Validating over-the-air configuration commands
CN111913763A (en) Method for stopping preinstalled application program, terminal and storage medium
CN113867831A (en) Intelligent device control method, intelligent device, storage medium and electronic device
CN116702178A (en) Method and device for integrating SaaS platform by third-party system
CN117573016A (en) Click response method, apparatus, device, medium, and program product
CN113177199A (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination