CN112000932A - Mobile terminal and application control method thereof - Google Patents

Mobile terminal and application control method thereof Download PDF

Info

Publication number
CN112000932A
CN112000932A CN202010816908.5A CN202010816908A CN112000932A CN 112000932 A CN112000932 A CN 112000932A CN 202010816908 A CN202010816908 A CN 202010816908A CN 112000932 A CN112000932 A CN 112000932A
Authority
CN
China
Prior art keywords
application
mobile terminal
limited
application program
duration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010816908.5A
Other languages
Chinese (zh)
Inventor
皮素梅
姜绍宇
宋亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN202010816908.5A priority Critical patent/CN112000932A/en
Publication of CN112000932A publication Critical patent/CN112000932A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a mobile terminal and an application control method thereof, and relates to the technical field of application. The first mobile terminal can determine and send the application control information to the second mobile terminal, and the second mobile terminal can further control and limit the running time of the application program according to the application control information. Because the user of the first mobile terminal can directly control the use duration of the application program in the second mobile terminal through the first mobile terminal without directly setting the use duration on the second mobile terminal, the flexibility of controlling the application program installed in the second mobile terminal is effectively improved.

Description

Mobile terminal and application control method thereof
Technical Field
The present application relates to the field of application technologies, and in particular, to a mobile terminal and an application control method thereof.
Background
In the process that the minor uses the mobile terminal, the mobile terminal can control the running time of the entertainment application program running in the foreground of the mobile terminal, so that the minor reasonably uses the entertainment application program.
In the related art, the guardian of the minor can set the use limit duration of the entertainment application program in the mobile terminal of the minor, thereby realizing the control of the use duration of the entertainment application program installed in the mobile terminal of the minor. However, the flexibility of this control method is low.
Disclosure of Invention
The application provides a mobile terminal and an application control method thereof, which can solve the problem of low flexibility of a control method in the related art. The technical scheme is as follows:
on one hand, an application control method of a mobile terminal is provided, which is applied to a first mobile terminal; the method comprises the following steps:
determining a limited application program which is limited to be used in a second mobile terminal, wherein the second mobile terminal is a mobile terminal bound with the first mobile terminal;
determining the use limit time of the limited application program;
sending application control information to the second mobile terminal, wherein the application control information comprises an application identifier of the limited application program and the use limiting duration of the limited application program;
and the application control information is used for controlling the running time of the limited application program by the second mobile terminal according to the limited use time.
Optionally, the determining the restricted application program restricted for use in the second mobile terminal includes:
displaying application identifications of a plurality of application programs installed in the second mobile terminal;
in response to a first selection operation aiming at a first application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the first application identifier as a first type of limited application program;
in response to a second selection operation aiming at a second application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the second application identifier as a second type of limited application program;
the determining the limited use duration of the limited application program includes:
in response to a duration selection operation for the first type of limitation application program, determining a use-limitation duration of the first type of limitation application program;
and determining the limited use time length of the second type of limited application program to be 0.
Optionally, the method further includes:
determining a disable period for the restricted application, the application control information further comprising the disable period;
the displaying the application identifiers of the plurality of application programs installed in the second mobile terminal includes:
displaying application identifications of a plurality of application programs except for application programs belonging to a target application set in the application programs installed in the second mobile terminal, wherein the target application set comprises a plurality of white list application programs;
the determining of the restricted application program restricted for use in the second mobile terminal further includes:
determining the application programs except the first type of limited application programs and the second type of limited application programs from the application programs indicated by the displayed plurality of application identifications as third type of limited application programs;
the determining the limited use duration of the limited application program further includes:
determining the usage-restricted duration of the third type of restricted application as the duration of a period outside the disabled period.
Optionally, the method further includes:
determining a disable period for the restricted application;
the application control information further includes the disable period.
Optionally, the method further includes:
sending task information to the second mobile terminal;
if a task completion response sent by the second mobile terminal is received, prolonging the use limiting time, wherein the task completion response is sent by the second mobile terminal after the task indicated by the task information is determined to be completed;
and sending the prolonged limited use time length to the second mobile terminal.
Optionally, the method further includes:
determining application installation restriction information of the second mobile terminal, wherein the installation restriction information is used for indicating that the second mobile terminal prohibits installation of the application program, or allows installation of the application program and prohibits use of the application program after installation, or allows installation of the application program and permits use of the application program after installation;
the application control information further includes: the application installation restriction information.
On the other hand, an application control method of the mobile terminal is provided, which is applied to a second mobile terminal; the method comprises the following steps:
receiving application control information from a first mobile terminal, the application control information comprising: limiting the application identification of the application program and the limited use duration of the application program;
and if the running time of the limited application program is detected to be greater than or equal to the limited use time, the limited application program is forbidden to run.
Optionally, the application control information further includes: limiting a disable period for the application; the method further comprises the following steps:
and in the running process of the limited application program or when a starting instruction for the limited application program is received, if the current time is detected to be in the forbidden time period, the limited application program is forbidden to run.
In yet another aspect, a mobile terminal is provided that includes a processor; the processor is configured to:
determining a limited application program which is limited to be used in a second mobile terminal, wherein the second mobile terminal is a mobile terminal bound with a first mobile terminal;
determining the use limit time of the limited application program;
sending application control information to the second mobile terminal, wherein the application control information comprises an application identifier of the limited application program and the use limiting duration of the limited application program;
and the application control information is used for controlling the running time of the limited application program by the second mobile terminal according to the limited use time.
In yet another aspect, a mobile terminal is provided, the mobile terminal comprising a processor; the processor is configured to:
receiving application control information from a first mobile terminal, the application control information comprising: limiting the application identification of the application program and the limited use duration of the application program;
and if the running time of the limited application program is detected to be greater than or equal to the limited use time, the limited application program is forbidden to run.
In still another aspect, a mobile terminal is provided, which includes: the application control method of the mobile terminal comprises the following steps of storing, processing and computer programs stored on the storing and capable of running on the processor, wherein the processor executes the computer programs to realize the application control method of the mobile terminal according to any one of the above aspects.
In yet another aspect, a computer-readable storage medium is provided, in which a computer program is stored, and the computer program is executed by a processor to implement the application control method of the mobile terminal according to any one of the above aspects.
In yet another aspect, a computer program product containing instructions is provided, which when run on the computer causes the computer to execute the application control method of the mobile terminal according to any one of the above aspects.
The beneficial effect that technical scheme that this application provided brought includes at least:
the application provides a mobile terminal and an application control method thereof, wherein a first mobile terminal can determine and send application control information to a second mobile terminal, and the second mobile terminal can further control and limit the running duration of an application program according to the application control information. Because the user of the first mobile terminal can directly control the use duration of the application program in the second mobile terminal through the first mobile terminal without directly setting the use duration on the second mobile terminal, the flexibility of controlling the application program installed in the second mobile terminal is effectively improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an application control system of a mobile terminal according to an embodiment of the present application;
fig. 2 is a flowchart of an application control method of a mobile terminal according to an embodiment of the present application;
fig. 3 is a flowchart of an application control method of another mobile terminal according to an embodiment of the present application;
fig. 4 is a flowchart of an application control method of a mobile terminal according to another embodiment of the present application;
fig. 5 is a flowchart of a method for determining a restricted application restricted for use in a second mobile terminal according to an embodiment of the present application;
FIG. 6 is a schematic structural diagram of another application control system provided in an embodiment of the present application;
FIG. 7 is a schematic diagram of an interface for setting an available period according to an embodiment of the present application;
fig. 8 is a flowchart of another method for determining a restricted application restricted for use in a second mobile terminal according to an embodiment of the present application;
FIG. 9 is a schematic diagram of an interface for determining a first type restriction application according to an embodiment of the present application;
FIG. 10 is a schematic diagram of an interface for determining a second type of restricted application provided by an embodiment of the present application;
fig. 11 is a schematic diagram for determining application installation restriction information of a second mobile terminal according to an embodiment of the present application;
FIG. 12 is a schematic diagram of a prompt interface provided by an embodiment of the present application;
FIG. 13 is a schematic diagram of another example of a prompt interface provided by embodiments of the present application;
FIG. 14 is a schematic illustration of yet another prompting interface provided by an embodiment of the application;
FIG. 15 is a schematic diagram of establishing an agreement and drawing rewards, according to an embodiment of the present application;
FIG. 16 is a schematic diagram of another example of establishing an agreement and drawing rewards provided by embodiments of the application;
fig. 17 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application;
fig. 18 is a block diagram of a software structure of a mobile terminal according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of an application control system according to an embodiment of the present application. Referring to fig. 1, the application control system may include: a first mobile terminal 10 and a second mobile terminal 20 bound with the first mobile terminal 10, and a communication connection can be established between the first mobile terminal 10 and the second mobile terminal.
As can be seen from fig. 1, a plurality of applications may be installed on each of the first mobile terminal 10 and the second mobile terminal 20. The plurality of applications may include: entertainment applications such as music, game centers, reading and browsing devices for providing entertainment services to users, applications for providing basic services to users of mobile terminals such as calls, address lists (also called contacts), information, application centers, calendars, gallery, folder, tools, settings, themes, clocks and cameras.
Optionally, the mobile terminal may be a mobile phone, a tablet computer, a wearable device, a notebook computer, and the like, for example, referring to fig. 1, the mobile terminal may be a mobile phone. Moreover, the operating system of the mobile terminal may be an Android (Android) operating system.
As can be seen from fig. 1, the first mobile terminal 10 and the second mobile terminal 20 may also display the current time, as well as the current weather.
Fig. 2 is a flowchart of an application control method of a mobile terminal according to an embodiment of the present application, where the method may be applied to a first mobile terminal, for example, the first mobile terminal 10 in the application control system shown in fig. 1. Referring to fig. 2, the method may include:
and step 101, determining a limited application program limited to be used in the second mobile terminal.
The first mobile terminal may determine that the limited application program in the second mobile terminal needs to be limited in use when determining that the use condition of some application programs installed in the second mobile terminal needs to be limited, for example, when determining that the use duration or use period of some programs installed in the second mobile terminal needs to be limited.
And the second mobile terminal is a mobile terminal bound with the first mobile terminal.
And 102, determining the limited use time of the limited application program.
After determining the limitation application installed in the second mobile terminal, the first mobile terminal may determine the usage limit duration of the limitation application, for example, may determine the usage limit duration of the limitation application within a statistical period.
And step 103, sending the application control information to the second mobile terminal.
The first mobile terminal can obtain the application control information after determining the limited use duration of the limited application program installed in the second mobile terminal. Wherein the application control information may include: the application identification of the limited application program and the limited use time of the limited application program. And the application control information can be used for controlling the running time length of the limited application program installed in the second mobile terminal according to the limited use time length by the second mobile terminal.
To sum up, the embodiment of the present application provides an application control method for a mobile terminal, where a first mobile terminal may determine and send application control information to a second mobile terminal, and the second mobile terminal may further control and limit an operation duration of an application according to the application control information. Because the user of the first mobile terminal can directly control the use duration of the application program in the second mobile terminal through the first mobile terminal without directly setting the use duration on the second mobile terminal, the flexibility of controlling the application program installed in the second mobile terminal is effectively improved.
Fig. 3 is a flowchart of another application control method of a mobile terminal according to an embodiment of the present application, where the method may be applied to a second mobile terminal, for example, the second mobile terminal 20 in the application control system shown in fig. 1. Referring to fig. 3, the method may include:
step 201, receiving application control information from a first mobile terminal.
In an embodiment of the application, the first mobile terminal may determine application control information and may send the application control information to the second mobile terminal. Accordingly, the second mobile terminal can receive the application control information from the first mobile terminal.
Wherein the application control information may include: the application identification of the limited application program and the limited use time of the limited application program.
Step 202, if it is detected that the running duration of the limited application is greater than or equal to the limited use duration, the limited application is prohibited from running.
After receiving the application control information, the second mobile terminal may count the use duration of a certain restricted application program (i.e., the running duration of the restricted application program) and may determine the use-restricted duration of the restricted application program if receiving a start instruction for the certain restricted application program. Then, if the second mobile terminal determines that the usage duration of the restricted application is greater than or equal to the restricted usage duration, the restricted application may be prohibited from running. If the second mobile terminal determines that the use duration of the limitation application program is less than the use duration of the limitation application program, the limitation application program can be continuously operated.
To sum up, the embodiment of the present application provides an application control method for a mobile terminal, where a second mobile terminal may receive application control information sent by a first mobile terminal, and control an operation duration of a restricted application installed in the second mobile terminal based on the application control information. Because the user of the first mobile terminal can directly control the use duration of the application program in the second mobile terminal through the first mobile terminal without directly setting the use duration on the second mobile terminal, the flexibility of controlling the application program installed in the second mobile terminal is effectively improved.
Fig. 4 is a flowchart of an application control method of a mobile terminal according to an embodiment of the present application, where the method may be applied to an application control system, such as the application control system shown in fig. 1. Referring to fig. 4, the method may include:
step 301, the first mobile terminal determines a restricted application program restricted for use in the second mobile terminal.
The first mobile terminal may determine that the limited application program in the second mobile terminal needs to be limited in use when determining that the use condition of some application programs installed in the second mobile terminal needs to be limited, for example, when determining that the use duration or use period of some application programs installed in the second mobile terminal needs to be limited.
In an alternative implementation manner, the first mobile terminal may determine a set of application identifications of the restricted application program that needs to be restricted from being used in the application program installed in the first mobile terminal. Then, the first mobile terminal may determine, as the restricted application program in the second mobile terminal, an application program whose application identifier belongs to the set of application identifiers of the restricted application program, from among the application programs installed in the second mobile terminal.
In another alternative implementation, referring to fig. 5, the process of the first mobile terminal determining the restricted application program restricted for use in the second mobile terminal may include:
step 3011a, displaying application identifiers of a plurality of application programs installed in the second mobile terminal.
The first mobile terminal may acquire application identifications of a plurality of application programs installed in the second mobile terminal. Thereafter, the first mobile terminal may display the application identifications of the plurality of application programs. Wherein, the application identification may include: the at least one of the application name and the application icon may include, for example, the application name and the application icon.
Alternatively, the first mobile terminal may display the application identifications of the plurality of application programs in a list form.
In the embodiment of the present application, referring to fig. 6, fig. 6 shows a schematic structural diagram of another application control system. As shown in fig. 6, the control system may further include a server 30, and the server 30 may establish communication connections with the first mobile terminal 10 and the second mobile terminal 20, respectively. I.e. the first mobile terminal 10 may establish a communication connection with the second mobile terminal 20 via the server 30. Wherein the second mobile terminal 10 may be a mobile terminal bound with the first mobile terminal 20.
Optionally, a management application for managing the restriction application may be installed on both the first mobile terminal and the second mobile terminal. The first mobile terminal and the second mobile terminal may each first send a registration request to the server through the management application installed thereon, and the server may assign an identifier to the mobile terminal in response to the registration request. Then, any one of the first mobile terminal and the second mobile terminal may send a binding request to the server, where the binding request may carry an identifier of the mobile terminal itself and an identifier of the mobile terminal to be bound with the mobile terminal. After receiving the binding request, the server can respond to the binding request and establish a binding relationship between the mobile terminals indicated by the two identifiers, thereby realizing the binding of the two mobile terminals.
Any one of the first mobile terminal and the second mobile terminal can respond to the input operation of the user to acquire the identifier of the mobile terminal to be bound with the mobile terminal. Or, the any mobile terminal may also scan the two-dimensional code displayed on the mobile terminal to be bound with the mobile terminal to obtain the identifier of the mobile terminal to be bound with the mobile terminal. The embodiment of the present application does not limit this.
In the embodiment of the present application, the second mobile terminal 20 may upload the application identifier of the application program installed thereon to the server 30, and then the server 30 may determine the first mobile terminal bound to the second mobile terminal, and may send the application identifier uploaded by the second mobile terminal 20 to the first mobile terminal 10.
Optionally, after the management application installed in the second mobile terminal is started, the application identifiers of all the application installed in the second mobile terminal may be obtained, and the obtained application identifiers of the application may be sent to the server. And after receiving the application identifier of the application program sent by the second mobile terminal, the server can store the application identifier.
After the management application installed in the first mobile terminal is started, an acquisition request of the application identifier may be sent to the server. The server may transmit the application identification of the stored application program to the first mobile terminal in response to the acquisition request after receiving the acquisition request. Accordingly, the first mobile terminal can acquire the application identifier of the application program installed in the second mobile terminal, and can display the application identifiers of the plurality of application programs.
Step 3012a, in response to a first selection operation for a first application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the first application identifier as a first class restricted application program.
The first mobile terminal displays the application identifications of the plurality of application programs installed in the second mobile terminal. A first user of a first mobile terminal, such as a guardian of a minor, which may also be referred to as a daemon, may select a first application identification from a plurality of displayed application identifications. Accordingly, the first mobile terminal may determine, in response to a first selection operation of the first user for a first application identifier of the plurality of application identifiers, the first application identifier, and determine the application program indicated by the first application identifier as a first class restricted application program. Optionally, the selection operation may be a touch operation or a slide operation.
Step 3013a, in response to a second selection operation for a second application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the second application identifier as a second class restricted application program.
After the first mobile terminal displays the application identifications of the plurality of application programs installed in the second mobile terminal, the first user may select the second application identification from the displayed plurality of application identifications. Accordingly, the first mobile terminal may determine, in response to a second selection operation of the first user for a second application identifier of the plurality of application identifiers, the second application identifier, and determine the application program indicated by the second application identifier as the second type restricted application program.
For example, it is assumed that the application names included in the application identifiers obtained by the first mobile terminal for the plurality of application programs are respectively: application a, application b, application c, application d, and application e. Assuming that the application names first selected by the first user are application a and application c, the first mobile terminal may determine the application program indicated by application a and the application program indicated by application c as the first-class restriction application program in response to a first selection operation of the first user for the application a and the application c.
Assuming that the selected applications are identified as application b and application e after the first user selects the first-class restricted application, the first mobile terminal may determine that the application indicated by application b and the application indicated by application e are the second-class restricted application in response to a second selection operation of the first user for application b and application e.
Step 302, the first mobile terminal determines the use-limiting duration of the limited application program.
The first mobile terminal may determine a usage-restricted duration corresponding to the restriction application installed in the second mobile terminal after determining the restriction application. Therefore, the first mobile terminal can determine the application control information, wherein the application control information comprises the application identification of the limited application program and the limited use time length of the limited application program.
Optionally, the first mobile terminal may determine a usage limit duration of the limitation application within the statistical period. For example, the statistical period may be one day.
In the embodiment of the application, for the first type of limitation application, the first mobile terminal may determine the usage-limited duration of the first type of limitation application in response to a duration selection instruction for the first type of limitation application. For the second type of limitation application, the first mobile terminal may directly determine that the limited use duration of the second type of limitation application is 0, that is, a second user of the second mobile terminal is prohibited from using the second type of limitation application. Accordingly, the first type of restricted application may also be referred to as a restricted use application and the second type of restricted application may also be referred to as a disabled application.
Optionally, for the first class restricted application, the first mobile terminal may further display a plurality of candidate durations in response to the first selection operation for the application identifier. The first mobile terminal may determine the target duration as the usage-limited duration of the first limitation application program in response to a selection instruction of the first user for the target duration in the multiple candidate durations.
Optionally, if the first type restriction application includes a plurality of first restriction applications, the first mobile terminal may determine the usage-restricted duration of each of the plurality of first restriction applications one by one. For example, for each first application identifier, the first mobile terminal may display a plurality of candidate durations in response to a first selection operation for the application identifier. In this case, the usage-restricted time periods of the plurality of first restricted applications determined by the first mobile terminal may be the same or different.
Alternatively, the first mobile terminal may determine the usage-restricted time duration of at least two of the plurality of first restriction applications in batch. For example, the first mobile terminal may select at least two first application identifiers first, and then may display a plurality of candidate durations in response to a first selection operation for any one of the at least two first application identifiers. In this case, the usage-restricted time periods of at least two first limitation applications among the plurality of first limitation applications determined by the first mobile terminal are the same.
Step 303, the first mobile terminal determines a disabled period of the limitation application installed in the second mobile terminal.
In the embodiment of the present application, the first mobile terminal may further determine a disable period of the restriction application installed in the second mobile terminal. The disable period may refer to: the period of time during which the restricted application is prohibited from running, i.e. during which the user of the second mobile terminal cannot use the restricted application. And the restricted application may be used by the second mobile user during a period of availability other than the disabled period.
Correspondingly, the application restriction information determined by the first mobile terminal may further include: the disable period of the application is limited. Therefore, the use duration of the limitation application installed in the second mobile terminal can be limited, and the use period of the limitation application can be limited, so that the limitation on the limitation application installed in the second mobile terminal is enhanced.
Alternatively, the first mobile terminal may determine a period of disablement of the second mobile terminal that restricts the application within the statistical period. And, the process of the first mobile terminal determining the disabled period of the second mobile terminal may include: the first mobile terminal may display a period setting interface, which may include: a plurality of alternative availability periods. The first mobile terminal may determine a period other than the target standby period as a disabled period in which the application is restricted, in response to a selection operation of the first user for the target available period among the plurality of alternative available periods.
The statistical period may be 1 day, and the forbidden time periods in any two statistical periods may be the same or different. The number of the available time periods can be one or more, and correspondingly, the number of the forbidden time periods for limiting the application program can also be one or more. For example, the number of available periods may be 10.
Optionally, the first mobile terminal may set the disable period of the limitation application in the statistical period in units of weeks, so that the setting efficiency of the disable period of the limitation application may be improved. For example, if the first user determines monday through friday that the disabled period of the restricted application is the same, the first mobile terminal may first determine monday through friday as the applicable period of the disabled period in response to a selected operation of the first user on monday through friday. Thereafter, the first mobile terminal may determine the disabled period of the limitation application in response to the first user setting the operation of limiting the disabled period of the application. In this case, the disabled period of the restricted application determined by the first mobile terminal is the same for each day of monday through friday.
Further, the first mobile terminal may further determine the available time duration of the restricted application group in the available time period of all the restricted applications installed in the second mobile terminal, so as to implement centralized control on the running time duration of the restricted applications in the second mobile terminal.
Correspondingly, the application control information determined by the first mobile terminal may further include: the application group availability duration is limited. This enables the use of the restriction application to be further controlled, and the restriction on the restriction application installed in the second mobile terminal to be further increased.
For example, for at least two restriction applications installed in the second mobile terminal, the restriction applications having different usage-limiting durations may stop running when the second mobile terminal determines that the running durations of the two restriction applications are greater than or equal to the available duration of the restriction application group.
Optionally, the process of determining, by the first mobile terminal, to limit the available duration of the application group of the application program may refer to the process of determining, by the first mobile terminal, to limit the usage duration of the application program, which is not described herein again in this embodiment of the present application.
As can be seen from the above analysis, the first mobile terminal may not only limit the available time length of the restricted application group of all the restricted applications installed in the second mobile terminal, but also limit the use time length of each of the restricted applications in all the restricted applications. In this case, the maximum usage time of any of the restriction applications installed in the second mobile terminal may be: the minimum value of the two usage periods, namely the maximum usage period of any limiting application, can satisfy: min (limit application group availability duration, limit application usage duration). Where min () denotes taking the minimum value.
For example, the limited application group available time of the limited application determined by the first mobile terminal is 30 minutes (min), the limited use time of a certain limited application is 1h, and the limit is that the maximum use time of the application is 30min because 30min is less than 1 h.
It should be noted that, before determining the disabled period of the second mobile terminal for limiting the application program, the first mobile terminal may further determine a scenario in which the second user of the second mobile terminal is currently using the second mobile terminal, and determine the disabled period adapted to the scenario based on the scenario. For example, if the second user is a minor (which may also be referred to as a guardian), the scenario in which the second user uses the second mobile terminal may include: a free use scenario, a daily school scenario, a pre-examination sprint scenario, and a vacation scenario. Accordingly, the first mobile terminal may determine the scene indicated by the target usage mode as the scene in which the second user uses the second mobile terminal in response to the selection operation of the first user for the target usage mode among the plurality of usage modes.
The first mobile terminal can also determine the current scene of the second mobile terminal used by the second user before determining the forbidden time period of the limited application program of the second mobile terminal, so that the control flexibility and the control rationality of the limited application program installed on the second mobile terminal are effectively improved.
Optionally, the first mobile terminal may display a mode setting interface, and the mode setting interface may display four use mode controls, such as a free use control, a daily school entry control, a pre-examination sprint control, and a vacation control. The first user may select a target usage mode control of the four usage mode controls, and accordingly, the first mobile terminal may determine a scene indicated by the target usage mode control as a scene in which the second user is currently using the second mobile terminal in response to a selection operation of the first user on the target usage mode control. For example, if the first user selects the daily school control, the first mobile terminal may determine the daily school scene indicated by the daily school control as the scene in which the second user is currently using the second mobile terminal in response to the selection operation of the first user on the daily school control.
For example, assuming that the second mobile terminal is a mobile phone, the scenario that the first mobile terminal determines that the second user currently uses the second mobile terminal is a daily school scenario, and the first mobile terminal sets the disable period of the restriction application of the second mobile terminal in units of weeks. The first mobile terminal may display the period setting interface shown in fig. 7. As can be seen in fig. 7, the period setting interface may include: the explanation information 01 on the period setting, the restricted application availability period setting box 02, and the purge control 03 for purging the availability period set in the restricted application availability period setting box 02.
Referring to fig. 7, the prompt message 01 may be a text message "after the available time period or the available time length per day reaches an upper limit, the corresponding application cannot be used continuously. Some applications, such as phone, contacts, information, settings, etc., do not count the available time period ". The restricted application availability period setting box 02 may include two availability period setting items of an availability period 1 and an availability period 2.
Referring to fig. 7, the first user may click on the restricted application available period setting box 02, and the first mobile terminal may display a setting restricted application available period interface in response to a touch operation of the first user on the restricted application available period setting box 02. For each availability period, the set limit application availability period interface may include: a selection control 04 for each of seven days of the week, a time period available on the day setting control 05, and a time period available on the day setting control 06. Wherein, for each availability period, fig. 7 shows two of the day availability period setting controls 05.
As shown in fig. 7, for the available period 1, the first user touches the selection control 05 for monday through friday, and the first mobile terminal may determine that the available period of the available period 1 is monday through friday every week, that is, the available periods in five days of monday through friday are the same, in response to the touch operation of the first user on the five selection controls 05 for monday through friday. With continued reference to fig. 7, the first user may touch the time of day available period setting control 05 to set the time of day available period and may touch the time of day available duration setting control 06 to set the time of day available duration. As can be seen from fig. 7, the first mobile terminal may determine that the available time period on the day is 20:00-22:00 in response to a touch operation of the first user with respect to the available time period on the day setting control 05. In addition, the first mobile terminal may determine that the available time length of the current day is 30min in response to the touch operation of the first user on the available time length setting control 06 of the current day, that is, may determine that the available time length of the restricted application group of the restricted application program is 30 min.
For the available period 2, the first user touches the selection control 04 for saturday and sunday, and accordingly, the first mobile terminal may determine that the available period of the available period 2 is saturday and sunday of each week in response to the touch operations of the two selection controls 04 for saturday and sunday, that is, the available periods of saturday and sunday of each week are the same. Thereafter, as shown in fig. 7, the first mobile terminal may determine that the available time period on the day is unlimited in response to a touch operation of the first user setting control 05 for the available time period on the day. In addition, the first mobile terminal may determine that the available time length of the current day is 1h in response to the touch operation of the first user on the available time length setting control 06 of the current day, that is, may determine that the available time length of the restricted application group of the restricted application program is 1 h.
After setting the available time period and the available duration, the first user may touch the completion control 07. Correspondingly, the first mobile terminal may display the set available time period and the available duration in response to the touch operation of the first user on the completion control 07.
In this embodiment of the application, it should be noted that, in a scenario where the first mobile terminal determines the disabled period of the limitation application of the second mobile terminal, optionally, referring to fig. 8, the implementation process of step 301 may include:
and 3011b, displaying application identifiers of the plurality of application programs except the application programs belonging to the target application set in the application programs installed in the second mobile terminal.
The implementation process of step 3011b may refer to the implementation process of step 3011 a.
Optionally, the first mobile terminal may display, in a list form, application identifiers of the plurality of application programs except the application program belonging to the target application set, in the application programs installed in the second mobile terminal. The target application set may include a plurality of white-list applications (which may also be referred to as non-restricted applications), that is, the first mobile terminal may display the application identifiers of the applications installed in the second mobile terminal that need to be restricted from being used.
The white list application may be an application installed in the second mobile terminal and used for providing basic services for the second user, such as a call application, an information application, a setup application, and the like.
In this embodiment of the application, for an application indicated by each application identifier in the obtained application identifiers of the multiple application programs installed in the second mobile terminal, the first mobile terminal may detect whether the application is the same as an application in a pre-stored target application set. If the first mobile terminal determines that the application program is the same as an application program in the target application set, it may be determined that the application program is a white list application program, that is, the application program is an application program that does not need to be limited for use, and then it may be determined that an application identifier of the application program does not need to be displayed. If the first mobile terminal determines that the application program is different from any application program in the target application set, the application program can be determined to be the application program which needs to be limited to use, and then the application identifier of the application program can be displayed.
Step 3012b, in response to the first selection operation for the first application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the first application identifier as the first class restricted application program.
The implementation process of step 3012b may refer to the implementation process of step 3012 a.
Optionally, after the first mobile terminal displays the application identifier of the application program that needs to be restricted from being used, for each application identifier, the first mobile terminal may determine, in response to a touch operation of a first restriction type setting control in the multiple restriction type setting controls for the application identifier, the application program indicated by the application identifier as the first-type restriction application program.
Step 3013b, in response to a second selection operation for a second application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the second application identifier as a second class restricted application program.
The implementation process of step 3013b may refer to the implementation process of step 3013 a.
Optionally, for each of the application identifiers of the plurality of application programs displayed by the first mobile terminal except for the target application set, the first mobile terminal may determine, in response to a touch operation on a second restriction type setting control of the plurality of restriction type setting controls for the application identifier, the application program indicated by the application identifier as a second type of restriction application program.
Step 3014b, determine the application program other than the first-type restricted application program and the second-type restricted application program in the application programs indicated by the displayed application identifier as the third-type restricted application program.
After determining the first type of restricted application program and the second type of restricted application program, the first mobile terminal may determine, as a third type of restricted application program, all the application programs except the first type of restricted application program and the second type of restricted application program, among the application programs indicated by the displayed application identifier.
In this case, the implementation process of the first mobile terminal determining the limited usage time period of the limited application (i.e. step 302 above) may further include: the usage-restricted duration of the third type restricted application is determined to be a duration of a period other than the disabling period of the restricted application. That is, the first mobile terminal may determine the usage-restricted duration of the third type restricted application as the duration of the usable period of the restricted application. That is, the usage duration of the third type of limitation application in the available period of the limitation application other than the disabled period is not limited.
According to the above description, in the restricted application installed in the second mobile terminal determined by the first mobile terminal, the first type restricted application may be an application that allows the second mobile terminal to operate within the available time period of the restricted application but needs to be restricted in operation time duration, that is, an application that is restricted in use; the second type of restricted application may be an application that prohibits the second mobile terminal from running, that is, a forbidden application; the third type of application program may be an application program that allows the second mobile terminal to operate in the available period of the limited application program and does not limit the operation duration, that is, an application program that is freely used in the available period.
It should be noted that, the first mobile terminal may further convert the second type restriction application into the first type restriction application or the third type restriction application in response to a restriction type conversion operation of the first user for the second type restriction application.
It should be noted that, in a scenario where the restriction application further includes a third type restriction application, in order to further enhance the control effect on the restriction application installed in the second mobile terminal, the first mobile terminal may further determine the disabled period of the second mobile terminal. Accordingly, the application restriction information may further include: a disabled period of the second mobile terminal.
And in the forbidden period of the second mobile terminal, the applications installed in the second mobile terminal except the white list application cannot run, namely, in the forbidden period, the second mobile terminal prohibits running all the limiting applications (including the first type limiting application, the second type limiting application and the third type limiting application) installed on the second mobile terminal. That is, the second user may use only the whitelist application installed in the second mobile terminal and cannot use the restriction application during the disabled period.
Wherein the disable period of the second mobile terminal may be a subset of the disable period of the restricted application. Accordingly, the available period of the restricted application may be a subset of the available period of the second mobile terminal. The available period of the second mobile terminal is a period other than the disabled period of the second mobile terminal.
Optionally, the first mobile terminal may set the disabled time period of the second mobile terminal in the statistical cycle by taking the week as a unit, so as to improve the setting efficiency of the disabled time period of the second mobile terminal. The process of setting the forbidden time period of the second mobile terminal in the statistical cycle by the first mobile terminal in the unit of week may refer to the process of setting the forbidden time period of the restricted application program by the first mobile terminal in the unit of week, and this embodiment of the present application is not described herein again.
Further, the first mobile terminal may also set a usage duration (i.e., an available duration) of the second mobile terminal in its available period, so as to further enhance the limitation on the usage of the second mobile terminal. Correspondingly, the application control information may further include: an available duration of the second mobile terminal.
Optionally, in the process of determining, by the first mobile terminal, the available duration of the second mobile terminal in the available period of the second mobile terminal, reference may be made to the implementation process of determining, by the first mobile terminal, the limited use duration of the first type of limited application program, and details of the embodiment of the present application are not described herein again.
As can be seen from the above description, the first user of the first mobile terminal may limit the usage duration of the second mobile terminal, may limit the usage durations of all the restriction applications installed in the second mobile terminal collectively, and may limit the usage duration of each of the restriction applications individually. In this case, the maximum usage time of any of the restriction applications installed in the second mobile terminal may be: the minimum value of the three usage periods, that is, the maximum usage period of any of the restricted applications, can satisfy: min (the availability duration of the second mobile terminal, the limited application group availability duration, the limited availability duration of the limited application). Where min () denotes taking the minimum value.
For example, the use duration of the second mobile terminal determined by the first mobile terminal is 1h, the limited application group available duration is 30min, the limited use duration of a certain limited application program is 20min, and since 20min is less than 30min and 30min is less than 1h, the maximum use duration of the limited application program is 20 min.
As can be clearly understood from the above description, the first mobile terminal may classify the applications installed in the second mobile terminal into four classes, where the four classes of applications are: a white list application, a first type of restricted application, a second type of restricted application, and a third type of restricted application. And for different types of application programs, the second mobile terminal adopts different strategies to control the running time of the application program.
For example, for a white list application, the second mobile terminal can always run the white list application, and the running time of the white list application is not limited. For the third type of restricted application, the second mobile terminal may allow the third type of restricted application to be run when the current time is in the available period of the restricted application and is within the available period of the second mobile terminal, and the running duration of the third type of restricted application is not restricted. For the first type of restricted application, the second mobile terminal may allow the application to be run when the current time is in the available period of the restricted application and within the available period of the second mobile terminal, and may stop running the first type of restricted application when it is determined that the running duration of the application is greater than the usage-restricted duration. For the second type of restricted application, the second mobile terminal may prohibit the second type of restricted application from being run for any period of time.
For example, assuming that the second mobile terminal is a mobile phone, referring to fig. 7, the time period setting interface displayed by the first mobile terminal may further include: the handset available period setting box 08. The first mobile terminal may further display a mobile phone available period setting interface in response to a touch operation of the first user on the mobile phone available period setting frame 08. Thereafter, the first mobile terminal may determine the handset available period and the available duration in response to the first user setting the operation of limiting the available period and the available duration of the application.
As can be seen from fig. 7, the available period of the second mobile terminal determined by the first mobile terminal includes: the available time periods of the days are 12:00-14:00 and 18:00-22:00 respectively from Monday to Friday, and the available time duration is 1 h; the time period available on the day is not limited, and the time duration available on the day is also not limited. I.e. saturday and sunday, the second user is free to use the second mobile terminal.
The setting process of the available time period and the available duration of the second mobile terminal may refer to the setting process of the available time period and the available duration of the mobile phone, and details of the embodiment of the present application are not repeated herein.
Assuming that the application identifier includes an application name and an application icon, the application name of the application program installed in the second mobile terminal acquired by the first mobile terminal includes: the application a, the application b, the application c, the application d, the application e and the application f, and the white list application program comprises the following steps: the application indicated by application a. Since the application indicated by the application a belongs to the target application set among the plurality of applications installed in the second mobile terminal, the first mobile terminal may determine that the application a does not need to be displayed, and may then display the application identifier shown in fig. 9 and 10 on its application management interface. Referring to fig. 9 and 10, the application identifier 09 of each application program may include an application name 091 and an application icon 092.
As can be seen from fig. 9 and 10, the application b, the application c, the application d, the application e, and the application f may be displayed in the category of free use first, that is, the first mobile terminal may determine the application programs indicated by the application b, the application c, the application d, the application e, and the application f as the third type restricted application programs. Referring to fig. 9, the first mobile terminal may further display a first restriction type setting control 10a (i.e., a restriction control in fig. 9) and a second restriction type setting control 10b (i.e., a disabling control in fig. 9) corresponding to each application identification.
With continued reference to fig. 9, the first user may sequentially touch the first restriction type setting control 10a corresponding to the application b and the first restriction type setting control 10a corresponding to the application f. For the application b, the first mobile terminal may determine, in response to a touch operation of the first user on the first restriction type setting control 10a corresponding to the application b, the application program indicated by the application b as a first restriction application program, and display the restricted usage duration setting control 11 in the form of a floating window on the current interface.
Assuming that the statistical period is 1 day, referring to fig. 9, the limited-use duration setting control 11 displayed by the first mobile terminal may set a box for the limited-use duration. The limited use duration setting box 11 may display a plurality of alternative durations, a cancel control 111 and a determination control 112. Also, as shown in fig. 7, the set limit time frame 11 may further include a prompt word of "maximum available time per day".
Assuming that the first user wants to set the limited usage time of the application program indicated by application b to 30min in the statistical period, the first user may slide the number corresponding to "time" to 0, slide the data corresponding to "score" to 30, and click the determination control 112. Accordingly, the first mobile terminal may determine that the limited usage time of the application program indicated by the application b is 30min in response to the user's sliding operation on the number and clicking operation on the determination control 112. Assuming that the first user clicks the cancel control 111, the first mobile terminal may return to the previous interface in response to the operation of the first user clicking the cancel control 111. For the determination process of the limited use duration of the application program indicated by the application f, reference may be made to the application b, and details of the embodiment of the present application are not described herein again.
With continued reference to fig. 9, after determining the first type of restricted application, the first mobile terminal may display the first type of restricted application under the category of restricted usage and display the restricted usage duration of the restricted application.
As can be further seen from fig. 9 and 10, the first mobile terminal may further display an application search box 13, and the first mobile terminal may display an application identifier of an application program that the first user needs to quickly find in response to an input operation of the first user for the application search box 13. In addition, the first mobile terminal may also display a "batch setup" control 13. The first mobile terminal may select multiple application identifications in response to a touch operation of the first user with respect to the "batch setting" control 13, that is, allow the first user to simultaneously select multiple application identifications so that the multiple application identifications can be set simultaneously.
As shown in fig. 10, the first user may sequentially touch the second restriction type setting control corresponding to the application c and the second restriction type setting control corresponding to the application e, and accordingly, the first mobile terminal may determine, in response to the touch operation of the first user on the second restriction type setting control corresponding to the application c and the second restriction type setting control corresponding to the application e, the application program indicated by the application c and the application program indicated by the application e as the second-type restriction application programs.
With continued reference to fig. 10, the first mobile terminal, after determining the second type of restricted application, may display the second type of restricted application in the category of disabled use. As can also be seen from fig. 10, for the second restriction applications included in the second type restriction application, the first mobile terminal may further display a first-type switching control 14a (i.e., a free control in fig. 10) and a second-type switching control 14b (i.e., a restriction control in fig. 10) corresponding to each of the second type restriction applications.
For each second restricted application, the first mobile terminal may convert the second restricted application into a third type restricted application in response to the touch operation of the first user with respect to the free control 14a, and may add the second restricted application to the third type restricted application. In addition, the first mobile terminal may further convert the second limitation application into a first type limitation application in response to the touch operation of the first user on the limitation control 14b, and may add the second limitation application to the first type limitation application.
Step 304, the first mobile terminal determines the application installation restriction information of the second mobile terminal.
In the embodiment of the application, the first user can also control the installation situation of the application program on the second mobile terminal, so that the control of the second mobile terminal is further enhanced. Accordingly, the first mobile terminal may also determine application installation restriction information of the second mobile terminal, and may add the application installation information to the application control information.
Wherein the application installation restriction information may be used to instruct the second mobile terminal to prohibit installation of the application program. Alternatively, the application installation restriction information may be used to instruct the second mobile terminal to allow the application to be installed and to prohibit the application from being used after installation, or the application installation restriction information may be used to instruct the second mobile terminal to allow the application to be installed and to allow the application to be used after installation.
Optionally, the first mobile terminal displays three installation setting controls for the newly installed application program, which are used for indicating three different application installation information. The first mobile terminal may determine, in response to a selection operation of the first user for a target installation setting control of the three installation setting controls, information indicated by the target installation setting control as application installation restriction information of the second mobile terminal.
For example, referring to fig. 11, the first mobile terminal may display a new installed application setting control 15 on its application management setting interface, and the first mobile terminal may display a new installed application setting frame 16 in the form of a floating window in response to a touch operation of the first user on the new installed application setting control 15. The new installation application setting frame 16 may include: a post-installation free-use control 161, a post-installation application prohibited-use control 162, a control 163 that does not allow any applications to be installed, and a cancel control 164.
The application installation restriction information indicated by the post-installation freely-used control 161 is that the installation of the application is permitted and the use of the application is permitted after the installation, the application installation restriction information indicated by the post-installation prohibited-use control 162 is that the installation of the application is permitted and the use of the application is prohibited after the installation, and the application installation restriction information indicated by the control 163 that the installation of any application is not permitted is that the installation of the application is prohibited.
As can be seen from fig. 11, assuming that the first user touches the post-installation free-use control 161, the first mobile terminal may determine that the application is allowed to be installed and the application is allowed to be used after installation as the application installation restriction information of the second mobile terminal in response to the touch operation of the first user on the post-installation free-use control 161, and display a mark for selecting the control 161 behind the post-installation free-use control 161.
If the first user touches the cancel control 164, the first mobile terminal may return to the previous interface in response to the touch operation of the first user on the cancel control 164. As can also be seen from fig. 11, the first mobile terminal may also be displayed with an application uninstall control 17. The first mobile terminal may display an application uninstalling interface in response to a touch operation of the first user with respect to the application uninstalling control 17.
Step 305, the first mobile terminal sends the application control information to the second mobile terminal.
After determining the application control information of the second mobile terminal, the first mobile terminal can send the application control information to the second mobile terminal. Wherein the application control information may include: the first mobile terminal determines the application identifier of the limited application installed in the second mobile terminal and the limited use time duration thereof through the above steps 301 to 302. The application control information may be used for the second mobile terminal to control the operation duration of the limitation application according to the limitation use duration.
Optionally, the application control information may further include: at least one of limiting a disable period of the application program, limiting an available period of the application group, a disable period of the second mobile terminal, an available period of the second mobile terminal, and application installation restriction information of the second mobile terminal, for example, the application control information may further include: the disabled period of the limited application program, the limited application group availability period, the disabled period of the second mobile terminal, the availability period of the second mobile terminal, and the application installation restriction information of the second mobile terminal.
Optionally, after determining the application control information, the first mobile terminal may first send the application control information to the server. The server may then transmit the application control information to the second mobile terminal. And, the second mobile terminal cannot modify the application control information, whereby the control validity of the limitation application installed in the second mobile terminal can be ensured.
For a scenario in which the server first sends the application control information to the second mobile terminal, the server may receive an application control information acquisition request sent by the second mobile terminal, and may send the application control information to the second mobile terminal in response to the application control information acquisition request.
For a scenario in which the server sends the application control information to the second mobile terminal for a non-first time, for example, the first mobile terminal updates the application control information, and after detecting that the application control information is updated, the server may automatically send the updated application control information to the second mobile terminal.
After detecting that the application control information is updated, the server can automatically send the updated application control information to the second mobile terminal, so that the application control information received by the second mobile terminal is the latest, and the timeliness of controlling the application program installed in the second mobile terminal is effectively improved.
Step 306, in the running process of the limitation application program, or when receiving a start instruction for the limitation application program, if the second mobile terminal detects that the current time is in the forbidden time period of the limitation application program, the limitation application program is prohibited from running.
In this embodiment of the application, after receiving the application control information, if the second mobile terminal determines that the application identifier of the currently running application is the same as the application identifier of the restricted application in the application control information. Or, when the second mobile terminal receives a start instruction for a certain application program, the second mobile terminal determines that the application identifier of the application program is the same as the application identifier of the restricted application program in the application control information. The second mobile terminal may determine that the currently running application and the application to be run (i.e., the aforementioned certain application) are restricted applications. Thereafter, the second mobile terminal may detect whether the current time is in a disable period of the restricted application. If the second mobile terminal determines that the current time is in the forbidden period of the restricted application, the restricted application may be prohibited from running, that is, the currently running application is stopped from running, and the application to be run is prohibited from running.
If the second mobile terminal determines that the current time is not in the disabled period of the restricted application, that is, the current time is in the available period of the restricted application, the currently running restricted application may be continuously run. For the application program to be operated, the mobile terminal can operate the application program and count the operation time of the limited application program.
Wherein the application control information may include: limit the period of disablement of the application, limit the application identification of the application, and limit the length of use.
Optionally, when receiving a start instruction for the limitation application, if it is detected that the current time is the disabled time period of the limitation application, the second mobile terminal may further display a prompt message for prompting that the second user currently limits the unavailability of the application and limits the available time period of the application.
In the embodiment of the present application, the application information may further include a disable period of the mobile terminal. In this case, the second mobile terminal may further detect whether the current time is located in the disabled period of the mobile terminal before detecting whether the current time is in the disabled period of the restricted application.
In the running process of the limitation application program or when a starting instruction for the limitation application program is received, if the second mobile terminal detects that the current time is within the forbidden time period of the second mobile terminal, the running of the limitation application program can be prohibited. If the second mobile terminal detects that the current time is within the available period of the mobile terminal, the step of detecting whether the current time is within the disabled period of the restricted application may be performed.
Optionally, when receiving a start instruction for any of a plurality of restricted applications installed in the second mobile terminal, if the second mobile terminal detects that the current time is the disabled time period of the mobile terminal, a prompt message for prompting that the second user is unavailable at the current mobile terminal and prompting that the mobile terminal is available at the available time period may be displayed.
In the embodiment of the present application, for a scenario in which a start instruction for a restricted application is received, before detecting whether the current time is located in the disabled period of the mobile terminal, the second mobile terminal may further detect whether the restricted-use duration of the restricted application is 0, that is, whether the restricted application is a disabled application. If the second mobile terminal determines that the limited use duration of the limited application is 0, that is, the limited application is a forbidden application, the limited application can be directly stopped from running. If the second mobile terminal determines that the limited-use duration of the limited application is 0, that is, the limited application is not the forbidden application, the step of detecting whether the current time is in the forbidden period of the mobile terminal may be performed.
Optionally, after the second mobile terminal receives the start instruction of the restricted application, it is determined that the restricted application is the forbidden application, and a prompt message may be displayed to prompt the second user that the application is the forbidden application and the second mobile terminal cannot run the application.
For example, it is assumed that the application identifier of the limited application program included in the application control information received by the second mobile terminal and the usage limit duration thereof are respectively: b is applied, and the use time is limited to 30 min; c is applied, and the use duration is limited to be 0; applying e, and limiting the use time length to be 0; and f is applied, and the use time is limited to 30 min. Assuming that the second mobile terminal detects a start instruction for the application indicated by the application c, since the application indicated by the application c is a restricted application and the restricted usage duration of the restricted application is 0, that is, the application indicated by the application c is a forbidden application, the second mobile terminal may display the prompt interface shown in fig. 12.
As can be seen in FIG. 12, the prompt interface may include prompt information 18, and an exit control 19. The reminder 18 may be the text message "application disabled, application c disabled". In addition, the second mobile terminal may further display a desktop of the second mobile terminal in response to a touch operation of the second user on the exit control 19.
Assuming that the first mobile terminal determines that the available period of the second mobile terminal is 12:00-14:00 and 18:00-22:00, the available period of the restricted application is 20:00-22: 00. If the second mobile terminal receives the starting instruction for limiting the application program indicated by the application b, and the time for receiving the starting instruction is 10: 00.
Since the usage restriction duration of the restricted application indicated by the application b is not 0, the second mobile terminal may detect whether the time when the activation instruction is received is within the disabled period of the second mobile terminal. Since the current time 10:00 is within the disabled period of the second mobile terminal, the second mobile terminal may display the prompt interface shown in fig. 13. As can be seen from fig. 13, the prompt interface may include: a prompt 20, and an exit control 19. The prompt message 20 may be a text message "forbidden in time period, unavailable in current time period of the mobile phone server, available time period today: 12:00-14:00, 18:00-22:00".
If the time when the second mobile terminal receives the start instruction of the application program indicated by the application b is 19:00, since the current time 19:00 is within the available time period of the second mobile terminal, the second mobile terminal can detect whether the current time is in the disabled time period for limiting the application program. Since the current time 19:00 is within the disabled period of the restricted application, the mobile terminal may determine that the application cannot currently be run and may display the prompt interface shown in fig. 13. As can be seen from fig. 13, the prompt interface may include: a prompt 21, and an exit control 19. The reminder information 20 may be the text message "period disabled, application b is not available for the current period. The time period available today: 20:00-22:00".
And 307, if the second mobile terminal detects that the running time of the limited application program is greater than or equal to the limited use time, forbidding to run the limited application program.
After receiving a start instruction for a certain restricted application program, the second mobile terminal determines that the restricted application program is not a disabled program, and the current time when the start instruction is received is not in the disabled period of the restricted application program. The second mobile terminal may determine the restricted use period of the restriction application, may operate the restriction application, and may count the operation period of the restriction application.
In the process of running the limitation application program, the second mobile terminal can detect whether the use duration is greater than or equal to the use duration limitation of the limitation application program. If the second mobile terminal determines that the usage duration of the restricted application is greater than or equal to the restricted usage duration, the restricted application may be prohibited from running. If the second mobile terminal determines that the use duration of the limitation application program is less than the use duration of the limitation application program, the limitation application program can be continuously operated.
In an embodiment of the application, the first user may also establish an agreement with the second user, for example, the first user may arrange a task for the second user. The second user may obtain rewards for extending the usable time of the second mobile terminal, extending the limited application group usable time, and extending the limited use time of the limited application after completing the task arranged by the first user. Alternatively, the implementation may refer to steps 308 through 312 described below.
And 308, the first mobile terminal sends task information to the second mobile terminal.
In this embodiment, the first mobile terminal may further obtain task information used for indicating a task arranged for the second user by the first user, and may send the obtained task information to the second mobile terminal.
Alternatively, the first user may arrange one or more tasks for the second user every day, and the first user may input task information indicating the tasks to the first mobile terminal. Accordingly, the first mobile terminal can obtain the task information. The first mobile terminal may then send the task information to the second mobile terminal.
Optionally, the first mobile terminal may further send a specified duration to the second mobile terminal, where the specified duration may be a difference between the extended duration and the duration before the extension. The specified duration may be pre-stored in the first mobile terminal, or the specified duration may be determined by the first mobile terminal in response to a specified duration setting instruction of the first user. For example, the specified time period may be 10 min.
In this embodiment of the present application, the first mobile terminal may further send a target extension manner to the second mobile terminal, where the target extension manner may be: a manual extension mode or an automatic extension mode. Wherein, the manual extension mode can refer to: after the subsequent second mobile terminal sends a task completion response to the first mobile terminal, the first mobile terminal may extend the limited use duration of the limited application in response to the touch operation for the extension control. The automatic extension mode can be as follows: after the subsequent second mobile terminal sends a task completion response to the first mobile terminal, the first mobile terminal can directly prolong the use limiting time of the limiting application program when receiving the task completion response.
Optionally, the first mobile terminal may determine, in response to the extension mode setting instruction, a mode of extending the limited use duration. For example, the first mobile terminal may display two extension type controls indicating different extension manners, and the first mobile terminal may determine, as the target extension manner, the extension manner indicated by the target extension type control in response to a selection operation of the first user with respect to the target extension type control of the two extension type controls.
Step 309, the second mobile terminal displays the task information.
After receiving the task information, the second mobile terminal can display the task information so that a second user of the second mobile terminal can know the task to be completed.
For example, it is assumed that the task information received by the second mobile terminal includes: the task information used for indicating the task 1 of practicing music at 8 o ' clock to 9 o ' clock in the evening today, the task information used for indicating the task 2 of writing the job before 8 o ' clock, and the task information used for indicating the task 3 of practicing calligraphy at 1 hour this day. The second mobile terminal may display the task information shown in fig. 15 on its appointment interface.
As can also be seen from fig. 15, the extended usage time displayed by the second mobile terminal is 10min, and the extension manner (i.e., the redemption manner in fig. 15) is manual confirmation, i.e., manually extending the available time of the second mobile terminal, limiting the available time of the application group, and limiting the usage time of the application program.
It should be noted that the first user may also directly input the task information to the second mobile terminal. Accordingly, the second mobile terminal can directly acquire and display the task information in response to the operation of the first user for inputting the task information. In this case, the second mobile terminal may further determine and display the specified time period in response to a setting instruction of the first user for the specified time period. In addition, the second mobile terminal can also determine and display the target extension mode in response to a setting instruction of the first user for the extension mode.
And step 310, the second mobile terminal responds to the touch operation aiming at the task completion control and sends a task completion response to the first mobile terminal.
In this embodiment of the application, the second mobile terminal may further display a task completion control corresponding to the task. And after the second user finishes the task indicated by the task information, the second user can touch the task finishing control. Correspondingly, the second mobile terminal can respond to the touch operation aiming at the task completion control and send a task completion response to the first mobile terminal. Wherein the task completion response may be used to instruct the first mobile terminal to extend the limited-use duration of the limited application installed in the second mobile terminal.
Optionally, for a scenario where the first mobile terminal is provided with an available duration of the second mobile terminal and the available duration of the application group is limited, the task completion response may also be used to instruct the first mobile terminal to extend the available duration of the second mobile terminal and limit the available duration of the application group.
Optionally, for a scenario in which the number of tasks indicated by the task information is multiple, the second mobile terminal may display task completion controls corresponding to the multiple tasks one to one. And the second mobile terminal may send a task completion response to the first mobile terminal after receiving the touch operation for each task completion control.
For example, referring to fig. 15, the second mobile terminal may further display a completion control 22 and a cancel control 23 corresponding to each task information, and a progress control 24 for indicating progress of task completion. With continued reference to FIG. 15, the current second user has completed task 1 and task 2, and thus the word "completed 2/3" is displayed at progress control 24. If the second user completes the task 3, the second user may touch the completion control 22 at the task information corresponding to the task 3. Accordingly, the first mobile terminal may display a "completed" typeface in response to the second user's touch operation with respect to the completion control 22, and display a "earning rewards" control 25 upon determining that the second user has completed all tasks. Thereafter, the second user may touch the "earning reward" control 25, and accordingly, the second mobile terminal may send a task completion response to the first mobile terminal in response to the touch operation directed to the earning reward "control 25.
And 311, if the first mobile terminal receives a task completion response sent by the second mobile terminal, prolonging the limited use time.
After receiving the task completion response sent by the second mobile terminal, the first mobile terminal can prolong the use limiting time of the limiting application program. Optionally, the first mobile terminal may extend the usage-limited duration of the limitation application in the current statistical period, and the first mobile terminal may extend the usage-limited duration of the limitation application by a specified duration.
Optionally, the available duration of the second mobile terminal and the scenario of limiting the available duration of the application group are set for the first mobile terminal, and if the first mobile terminal receives a task completion response sent by the second mobile terminal, the available duration of the second mobile terminal may be further extended and the available duration of the application group is limited. Optionally, the first mobile terminal may extend the available duration of the second mobile terminal by the specified duration.
Optionally, if the target extension mode is a manual extension mode, the first mobile terminal may display an extension control after receiving the task response. And then, the first mobile terminal can respond to the touch operation of the first user for the extension control to extend the use limiting duration of the application program.
If the target extension mode is an automatic extension mode, the first mobile terminal can extend the use-limiting time of the limited application program after receiving the task response.
And step 312, the first mobile terminal sends the extended use-limiting duration to the second mobile terminal.
After the limited-use duration of the limited application program is extended, the first mobile terminal may send the extended limited-use duration to the second mobile terminal, so that the second mobile terminal updates the limited-use duration of the limited application program to the extended limited-use duration.
For example, if the target extension manner determined by the second mobile terminal is manual extension, as can be seen from fig. 15, the second mobile terminal may further display information of "waiting for guardian to confirm" in response to the touch operation directed to the "earning reward" control 25. And the second mobile terminal can display the information of the collected reward after receiving the prolonged use limiting time length sent by the first mobile terminal.
If the target extension mode determined by the second mobile terminal is automatic extension, as can be seen from fig. 16, after the second mobile terminal receives the touch operation for the "earning reward" control 25, and after receiving the limited usage duration sent by the first mobile terminal after putting into extension, the information of earning reward "is directly displayed.
As can also be seen in fig. 15 and 16, the second mobile terminal may also display a navigation control 26.
It should be noted that, in a scenario where the second mobile terminal receives the extended limited usage duration sent by the first mobile terminal, the implementation process of step 306 may further include: and if the second mobile terminal detects that the running time of the limited application program is greater than or equal to the prolonged limited use time, the second mobile terminal prohibits running the limited application program.
In the related art, in order to enable juveniles to reasonably use an entertainment application installed in a mobile terminal, guardians of the juveniles may set a limited use duration for the entertainment application. The mobile terminal can automatically lock the screen when the operation duration of the entertainment application program is determined to be longer than the limited use duration, namely, the mobile terminal is in a forbidden state. Therefore, on one hand, other non-entertainment applications of the mobile terminal are also in a disabled state, so that the normal use of the user is influenced, and the user experience is low. On the other hand, minors may alter the limited usage duration of the entertainment application, thus resulting in less effective control of the entertainment application.
By adopting the application control method of the mobile terminal provided in the embodiment of the present application, the first mobile terminal may determine the limited application installed in the second mobile terminal and the limited use duration of the limited application, and then may send the application identifier including the limited application and the application control information of the limited use duration of the limited application to the second mobile terminal, so that the second mobile terminal controls the operation duration of the limited application according to the limited use duration. The application control information is sent to the second mobile terminal by the first mobile terminal, and the second mobile terminal cannot change the application control information, so that the control effectiveness of the second mobile terminal on the application program is effectively ensured. And, since the second mobile terminal may prohibit the restricted application from being executed when it is determined that the execution duration of the restricted application is greater than or equal to the restricted-use duration, instead of having the entire second mobile terminal in the disabled state. Therefore, the control on the limited application program can be realized on the premise of not influencing the normal use of the user, and the user experience is improved.
It should be further noted that, the order of the steps of the application control method of the mobile terminal provided in the embodiment of the present application may be appropriately adjusted, and the steps may also be increased or decreased according to the situation. For example, step 303 and step 306 may be deleted as appropriate, step 304 may be deleted as appropriate, and steps 308 to 312 may also be deleted as appropriate. Alternatively, step 304 may be performed before step 303, step 303 may be performed before step 302, and steps 308 to 312 may be performed before step 303 or step 304. Any method that can be easily conceived by a person skilled in the art within the technical scope disclosed in the present application is covered by the protection scope of the present application, and thus the detailed description thereof is omitted.
To sum up, the embodiment of the present application provides an application control method for a mobile terminal, where a first mobile terminal may determine and send application control information to a second mobile terminal, and the second mobile terminal may further control and limit an operation duration of an application according to the application control information. Because the user of the first mobile terminal can directly control the use duration of the application program in the second mobile terminal through the first mobile terminal without directly setting the use duration on the second mobile terminal, the flexibility of controlling the application program installed in the second mobile terminal is effectively improved.
Fig. 17 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application. The mobile terminal may be configured to execute the application control method applied to the first mobile terminal provided in the above method embodiment. Referring to fig. 17, the mobile terminal 110 may include a processor 1101, the processor 1101 may be configured to:
determining a limited application program which is limited to be used in a second mobile terminal, wherein the second mobile terminal is a mobile terminal bound with the first mobile terminal;
determining the use limiting duration of the limiting application program;
sending application control information to the second mobile terminal, wherein the application control information comprises an application identifier for limiting an application program and a use limiting duration for limiting the application program;
the application control information is used for the second mobile terminal to control and limit the running time length of the application program according to the limited use time length.
Optionally, the mobile terminal 110 may further include: a display screen 131. The processor 1101 may be configured to:
controlling a display screen to display application identifications of a plurality of application programs installed in a second mobile terminal;
in response to a first selection operation of a first application identifier in application identifiers of a plurality of application programs, determining the application program indicated by the first application identifier as a first type of limited application program;
in response to a second selection operation aiming at a second application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the second application identifier as a second type of limited application program;
in response to the duration selection operation for the first type of limitation application program, determining the use-limitation duration of the first type of limitation application program;
the limited use duration of the second type of limited application is determined to be 0.
Optionally, the processor 1101 may further be configured to:
determining a disable period that restricts the application, the application control information further including the disable period;
controlling a display screen to display application identifications of a plurality of application programs except a target application set in the application programs installed in the second mobile terminal, wherein the target application set comprises a plurality of white list application programs;
the processor 1101 may also be configured to:
determining application programs except the first type of limited application programs and the second type of limited application programs from the displayed application programs indicated by the plurality of application identifiers as third type of limited application programs;
the usage-restricted duration of the third type restricted application is determined to be the duration of a period other than the disabled period.
Optionally, the processor 1101 may further be configured to:
determining a disable period that limits the application;
the application control information further includes a disable period.
Optionally, the processor 1101 may further be configured to:
sending task information to a second mobile terminal;
if a task completion response sent by the second mobile terminal is received, prolonging the use limiting time, wherein the task completion response is sent by the second mobile terminal after the task indicated by the task information is determined to be completed;
and sending the prolonged limited use time length to the second mobile terminal.
Optionally, the processor 1101 may further be configured to:
determining application installation limiting information of the second mobile terminal, wherein the installation limiting information is used for indicating that the second mobile terminal forbids installation of the application program, or allowing installation of the application program and forbidding use of the application program after installation, or allowing installation of the application program and allowing use of the application program after installation;
the application control information further includes: the installation restriction information is applied.
To sum up, the embodiment of the present application provides a mobile terminal, where a first mobile terminal may determine and send application control information to a second mobile terminal, and the second mobile terminal may further control and limit the running duration of an application according to the application control information. Because the user of the first mobile terminal can directly control the use duration of the application program in the second mobile terminal through the first mobile terminal without directly setting the use duration on the second mobile terminal, the flexibility of controlling the application program installed in the second mobile terminal is effectively improved.
The embodiment of the application also provides another mobile terminal, and the mobile terminal can be used for executing the application control method applied to the second mobile terminal in the method embodiment. As shown in fig. 17, the mobile terminal 110 may include a processor 1101, and the processor 1101 may be configured to:
receiving application control information from a first mobile terminal, the application control information comprising: limiting the application identifier of the application program and limiting the use duration of the application program;
and if the operation duration of the limited application program is detected to be greater than or equal to the limited use duration, the operation of the limited application program is forbidden.
Optionally, the application control information may further include: limiting a disable period for the application; the processor 1101 may also be configured to:
during the operation of the limitation application program or when a starting instruction for the limitation application program is received, if the current time is detected to be in the forbidden time period, the operation of the limitation application program is forbidden.
To sum up, the embodiment of the present application provides a mobile terminal, where a second mobile terminal may receive application control information sent by a first mobile terminal, and control, based on the application control information, an operation duration of a restricted application installed in the second mobile terminal. Because the user of the first mobile terminal can directly control the use duration of the application program in the second mobile terminal through the first mobile terminal without directly setting the use duration on the second mobile terminal, the flexibility of controlling the application program installed in the second mobile terminal is effectively improved.
Optionally, as shown in fig. 17, the mobile terminal 110 provided in this embodiment of the present application may further include: a display unit 130, a Radio Frequency (RF) circuit 150, an audio circuit 160, a wireless fidelity (Wi-Fi) module 170, a bluetooth module 180, a power supply 190, a camera 121, and a processor 1101.
The camera 121 may be used to capture still pictures or video, among other things. The object generates an optical picture through the lens and projects the optical picture to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensitive elements convert the light signals into electrical signals which are then passed to the processor 1101 for conversion into digital picture signals.
The processor 1101 is a control center of the mobile terminal 110, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the mobile terminal 110 and processes data by running or executing software programs stored in the memory 140 and calling data stored in the memory 140. In some embodiments, processor 1101 may include one or more processing units; the processor 1101 may also integrate an application processor, which mainly handles operating systems, user interfaces, applications, etc., and a baseband processor, which mainly handles wireless communications. It will be appreciated that the baseband processor described above may not be integrated into the processor 1101. In this application, the processor 1101 may run an operating system and an application program, may control a user interface display, and may implement the application control method applied to the first mobile terminal provided in this application embodiment, or implement the application control method applied to the second mobile terminal provided in this application embodiment. Additionally, processor 1101 is coupled to input unit and display unit 130.
The display unit 130 may be used to receive input numeric or character information and generate signal inputs related to user settings and function control of the mobile terminal 110, and optionally, the display unit 130 may also be used to display information input by the user or information provided to the user and a Graphical User Interface (GUI) of various menus of the mobile terminal 110. The display unit 130 may include a display screen 131 disposed on the front surface of the mobile terminal 110. The display screen 131 may be configured in the form of a liquid crystal display, a light emitting diode, or the like. The display unit 130 may be used to display various graphical user interfaces described herein.
The display unit 130 includes: a display screen 131 and a touch screen 132 disposed on the front of the mobile terminal 110. The display screen 131 may be used to display preview pictures. Touch screen 132 may collect touch operations on or near by the user, such as clicking a button, dragging a scroll box, and the like. The touch screen 132 may be covered on the display screen 131, or the touch screen 132 and the display screen 131 may be integrated to implement the input and output functions of the mobile terminal 110, and after the integration, the touch screen may be referred to as a touch display screen for short.
Memory 140 may be used to store software programs and data. The processor 1101 executes various functions of the mobile terminal 110 and data processing by executing software programs or data stored in the memory 140. The memory 140 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Memory 140 stores an operating system that enables mobile terminal 110 to operate. The memory 140 may store an operating system and various application programs, and may also store codes for executing the application control method applied to the first mobile terminal provided in the embodiment of the present application, or may store codes for executing the application control method applied to the second mobile terminal provided in the embodiment of the present application.
The RF circuit 150 may be used for receiving and transmitting signals during information transmission and reception or during a call, and may receive downlink data of a base station and then deliver the received downlink data to the processor 1101 for processing; the uplink data may be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
Audio circuitry 160, speaker 161, and microphone 162 may provide an audio interface between a user and mobile terminal 110. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161. The mobile terminal 110 may also be configured with a volume button for adjusting the volume of the sound signal. On the other hand, the microphone 162 converts the collected sound signal into an electrical signal, converts the electrical signal into audio data after being received by the audio circuit 160, and then outputs the audio data to the RF circuit 150 to be transmitted to, for example, another terminal or outputs the audio data to the memory 140 for further processing. In this application, the microphone 162 may capture the voice of the user.
Wi-Fi belongs to a short-distance wireless transmission technology, and the mobile terminal 110 may help a user to send and receive e-mails, browse webpages, access streaming media, and the like through the Wi-Fi module 170, which provides a wireless broadband internet access for the user.
And the Bluetooth module 180 is used for performing information interaction with other Bluetooth devices with Bluetooth modules through a Bluetooth protocol. For example, the mobile terminal 110 may establish a bluetooth connection with a wearable electronic device (e.g., a smart watch) also equipped with a bluetooth module through the bluetooth module 180, so as to perform data interaction.
Mobile terminal 110 also includes a power supply 190 (e.g., a battery) that powers the various components. The power supply may be logically coupled to the processor 1101 through a power management system to manage charging, discharging, and power consumption functions through the power management system. The mobile terminal 110 may also be configured with a power button for powering on and off the terminal, and locking the screen.
The mobile terminal 110 may include at least one sensor 1110, such as a motion sensor 11101, a distance sensor 11102, a fingerprint sensor 11103, and a temperature sensor 11104. Mobile terminal 110 may also be configured with other sensors such as gyroscopes, barometers, hygrometers, thermometers, and infrared sensors.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the mobile terminal and each device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Fig. 18 is a block diagram of a software structure of a mobile terminal according to an embodiment of the present application. The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the android system is divided into four layers, an application layer, an application framework layer, an android runtime (android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages. As shown in fig. 18, the application packages may include camera, gallery, calendar, phone call, map, navigation, WLAN, bluetooth, music, video, short message, etc. applications. The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 18, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, pictures, audio, calls made and received, browsing history and bookmarks, phone books, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
The phone manager is used to provide communication functions of the mobile terminal 110. Such as management of call status (including on, off, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, text information is prompted in the status bar, a prompt tone is given, the communication terminal vibrates, and an indicator light flashes.
The android runtime comprises a core library and a virtual machine. The android runtime is responsible for scheduling and management of the android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), media libraries (media libraries), three-dimensional graphics processing libraries (e.g., openGLES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still picture files, etc. The media library may support a variety of audio-video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, picture rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
An embodiment of the present application provides a computer-readable storage medium, in which instructions are stored, and when the instructions are executed on a computer, the instructions cause the computer to execute an application control method applied to a first mobile terminal, which is provided in the foregoing embodiment, for example, the application control method in the embodiment shown in fig. 2, or the application control method executed by the first mobile terminal in the embodiment shown in fig. 4.
An embodiment of the present application provides another computer-readable storage medium, which stores instructions that, when executed on a computer, cause the computer to execute an application control method applied to a second mobile terminal, which is provided in the foregoing embodiment, for example, the application control method in the embodiment shown in fig. 3, or the application control method executed by the second mobile terminal in the embodiment shown in fig. 4.
An embodiment of the present application further provides a computer program product including instructions, which, when the computer program product runs on a computer, causes the computer to execute the application control method applied to the first mobile terminal provided in the foregoing method embodiment, for example, the application control method in the embodiment shown in fig. 2, or the application control method executed by the first mobile terminal in the embodiment shown in fig. 4.
An embodiment of the present application further provides another computer program product including instructions, which, when the computer program product runs on a computer, causes the computer to execute the application control method applied to the second mobile terminal provided in the foregoing method embodiment, for example, the application control method in the embodiment shown in fig. 3, or the application control method executed by the second mobile terminal in the embodiment shown in fig. 4.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
It is to be understood that the term "at least one" in this application means one or more, and the term "plurality" in this application means two or more.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. An application control method of a mobile terminal is characterized by being applied to a first mobile terminal; the method comprises the following steps:
determining a limited application program which is limited to be used in a second mobile terminal, wherein the second mobile terminal is a mobile terminal bound with the first mobile terminal;
determining the use limit time of the limited application program;
sending application control information to the second mobile terminal, wherein the application control information comprises an application identifier of the limited application program and the use limiting duration of the limited application program;
and the application control information is used for controlling the running time of the limited application program by the second mobile terminal according to the limited use time.
2. The method of claim 1, wherein determining the restricted application restricted for use in the second mobile terminal comprises:
displaying application identifications of a plurality of application programs installed in the second mobile terminal;
in response to a first selection operation aiming at a first application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the first application identifier as a first type of limited application program;
in response to a second selection operation aiming at a second application identifier in the application identifiers of the plurality of application programs, determining the application program indicated by the second application identifier as a second type of limited application program;
the determining the limited use duration of the limited application program includes:
in response to a duration selection operation for the first type of limitation application program, determining a use-limitation duration of the first type of limitation application program;
and determining the limited use time length of the second type of limited application program to be 0.
3. The method of claim 2, further comprising:
determining a disable period for the restricted application, the application control information further comprising the disable period;
the displaying the application identifiers of the plurality of application programs installed in the second mobile terminal includes:
displaying application identifications of a plurality of application programs except for application programs belonging to a target application set in the application programs installed in the second mobile terminal, wherein the target application set comprises a plurality of white list application programs;
the determining of the restricted application program restricted for use in the second mobile terminal further includes:
determining the application programs except the first type of limited application programs and the second type of limited application programs from the application programs indicated by the displayed plurality of application identifications as third type of limited application programs;
the determining the limited use duration of the limited application program further includes:
determining the usage-restricted duration of the third type of restricted application as the duration of a period outside the disabled period.
4. The method of claim 1, further comprising:
determining a disable period for the restricted application;
the application control information further includes the disable period.
5. The method of any of claims 1 to 4, further comprising:
sending task information to the second mobile terminal;
if a task completion response sent by the second mobile terminal is received, prolonging the use limiting time, wherein the task completion response is sent by the second mobile terminal after the task indicated by the task information is determined to be completed;
and sending the prolonged limited use time length to the second mobile terminal.
6. The method of any of claims 1 to 4, further comprising:
determining application installation restriction information of the second mobile terminal, wherein the installation restriction information is used for indicating that the second mobile terminal prohibits installation of the application program, or allows installation of the application program and prohibits use of the application program after installation, or allows installation of the application program and permits use of the application program after installation;
the application control information further includes: the application installation restriction information.
7. An application control method of a mobile terminal is characterized by being applied to a second mobile terminal; the method comprises the following steps:
receiving application control information from a first mobile terminal, the application control information comprising: limiting the application identification of the application program and the limited use duration of the application program;
and if the running time of the limited application program is detected to be greater than or equal to the limited use time, the limited application program is forbidden to run.
8. The method of claim 7, wherein the applying the control information further comprises: limiting a disable period for the application; the method further comprises the following steps:
and in the running process of the limited application program or when a starting instruction for the limited application program is received, if the current time is detected to be in the forbidden time period, the limited application program is forbidden to run.
9. A mobile terminal, characterized in that the mobile terminal comprises a processor; the processor is configured to:
determining a limited application program which is limited to be used in a second mobile terminal, wherein the second mobile terminal is a mobile terminal bound with a first mobile terminal;
determining the use limit time of the limited application program;
sending application control information to the second mobile terminal, wherein the application control information comprises an application identifier of the limited application program and the use limiting duration of the limited application program;
and the application control information is used for controlling the running time of the limited application program by the second mobile terminal according to the limited use time.
10. A mobile terminal, characterized in that the mobile terminal comprises a processor; the processor is configured to:
receiving application control information from a first mobile terminal, the application control information comprising: limiting the application identification of the application program and the limited use duration of the application program;
and if the running time of the limited application program is detected to be greater than or equal to the limited use time, the limited application program is forbidden to run.
CN202010816908.5A 2020-08-14 2020-08-14 Mobile terminal and application control method thereof Pending CN112000932A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010816908.5A CN112000932A (en) 2020-08-14 2020-08-14 Mobile terminal and application control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010816908.5A CN112000932A (en) 2020-08-14 2020-08-14 Mobile terminal and application control method thereof

Publications (1)

Publication Number Publication Date
CN112000932A true CN112000932A (en) 2020-11-27

Family

ID=73472375

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010816908.5A Pending CN112000932A (en) 2020-08-14 2020-08-14 Mobile terminal and application control method thereof

Country Status (1)

Country Link
CN (1) CN112000932A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113163051A (en) * 2021-04-06 2021-07-23 青岛海信移动通信技术股份有限公司 Mobile terminal and control method thereof
CN113938510A (en) * 2021-09-29 2022-01-14 青岛海信移动通信技术股份有限公司 Terminal equipment and terminal control method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103648024A (en) * 2013-12-27 2014-03-19 深圳Tcl新技术有限公司 Method for monitoring running of application program of intelligent terminal
CN105187266A (en) * 2015-07-28 2015-12-23 小米科技有限责任公司 Information monitoring method and device
CN105681578A (en) * 2016-03-11 2016-06-15 深圳还是威健康科技有限公司 Mobile terminal remote control method and device
CN107197091A (en) * 2017-05-19 2017-09-22 广东小天才科技有限公司 Terminal control method, device, terminal device and computer-readable recording medium
CN108573135A (en) * 2018-04-23 2018-09-25 北京小米移动软件有限公司 Terminal management-control method, apparatus and system
CN108650305A (en) * 2018-04-23 2018-10-12 北京小米移动软件有限公司 Terminal management-control method, apparatus and system
CN110050438A (en) * 2016-12-12 2019-07-23 华为技术有限公司 A kind of right management method, relevant device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103648024A (en) * 2013-12-27 2014-03-19 深圳Tcl新技术有限公司 Method for monitoring running of application program of intelligent terminal
CN105187266A (en) * 2015-07-28 2015-12-23 小米科技有限责任公司 Information monitoring method and device
CN105681578A (en) * 2016-03-11 2016-06-15 深圳还是威健康科技有限公司 Mobile terminal remote control method and device
CN110050438A (en) * 2016-12-12 2019-07-23 华为技术有限公司 A kind of right management method, relevant device and system
CN107197091A (en) * 2017-05-19 2017-09-22 广东小天才科技有限公司 Terminal control method, device, terminal device and computer-readable recording medium
CN108573135A (en) * 2018-04-23 2018-09-25 北京小米移动软件有限公司 Terminal management-control method, apparatus and system
CN108650305A (en) * 2018-04-23 2018-10-12 北京小米移动软件有限公司 Terminal management-control method, apparatus and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113163051A (en) * 2021-04-06 2021-07-23 青岛海信移动通信技术股份有限公司 Mobile terminal and control method thereof
CN113163051B (en) * 2021-04-06 2022-04-22 青岛海信移动通信技术股份有限公司 Mobile terminal and control method thereof
CN113938510A (en) * 2021-09-29 2022-01-14 青岛海信移动通信技术股份有限公司 Terminal equipment and terminal control method

Similar Documents

Publication Publication Date Title
US9384014B2 (en) Mobile terminal and display controlling method therein
US20140179377A1 (en) Mobile electronic device having program notification function and program notification method thereof
US20220191318A1 (en) Recommendation Method and Terminal
EP2418833B1 (en) Method for controlling communication setting of mobile terminal and mobile terminal
CN111597004B (en) Terminal and user interface display method in application
CN112000932A (en) Mobile terminal and application control method thereof
CN111857531A (en) Mobile terminal and file display method thereof
CN113055585B (en) Thumbnail display method of shooting interface and mobile terminal
CN115269098A (en) Mobile terminal and display method thereof
CN113254132B (en) Application display method and related device
CN115460355A (en) Image acquisition method and device
CN113642010B (en) Method for acquiring data of extended storage device and mobile terminal
CN111399955B (en) Mobile terminal and interface display method of application program thereof
CN112328135A (en) Mobile terminal and application interface display method thereof
CN112817495A (en) Task processing method, terminal and equipment
CN112162675A (en) Mobile terminal and widget display method thereof
CN111787157A (en) Mobile terminal and operation response method thereof
CN113760164A (en) Display device and response method of control operation thereof
CN111159734A (en) Communication terminal and multi-application data inter-access processing method
CN112000411B (en) Mobile terminal and display method of recording channel occupation information thereof
CN112000409B (en) Mobile terminal and display method thereof
CN113179362B (en) Electronic device and image display method thereof
CN113742037A (en) Mobile terminal and application control method thereof
CN112312509A (en) Mobile terminal and network access method thereof
CN113741767A (en) Deep reading method and communication terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201127