CN117201667A - Mode exit method and device, equipment and storage medium - Google Patents
Mode exit method and device, equipment and storage medium Download PDFInfo
- Publication number
- CN117201667A CN117201667A CN202311389390.1A CN202311389390A CN117201667A CN 117201667 A CN117201667 A CN 117201667A CN 202311389390 A CN202311389390 A CN 202311389390A CN 117201667 A CN117201667 A CN 117201667A
- Authority
- CN
- China
- Prior art keywords
- mode
- authentication information
- exit
- target authentication
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 129
- 230000004044 response Effects 0.000 claims abstract description 61
- 230000008569 process Effects 0.000 claims abstract description 31
- 238000012795 verification Methods 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 11
- 230000002159 abnormal effect Effects 0.000 claims description 10
- 238000010200 validation analysis Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 8
- 230000008901 benefit Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000009467 reduction Effects 0.000 description 3
- HRANPRDGABOKNQ-ORGXEYTDSA-N (1r,3r,3as,3br,7ar,8as,8bs,8cs,10as)-1-acetyl-5-chloro-3-hydroxy-8b,10a-dimethyl-7-oxo-1,2,3,3a,3b,7,7a,8,8a,8b,8c,9,10,10a-tetradecahydrocyclopenta[a]cyclopropa[g]phenanthren-1-yl acetate Chemical group C1=C(Cl)C2=CC(=O)[C@@H]3C[C@@H]3[C@]2(C)[C@@H]2[C@@H]1[C@@H]1[C@H](O)C[C@@](C(C)=O)(OC(=O)C)[C@@]1(C)CC2 HRANPRDGABOKNQ-ORGXEYTDSA-N 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000001815 facial effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000002688 persistence Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
Landscapes
- Telephone Function (AREA)
Abstract
The embodiment of the application discloses a mode exit method, a device, equipment and a storage medium, wherein the method comprises the following steps: when the terminal equipment is in a limiting mode, determining whether the authentication information is matched with target authentication information or not in response to input operation of the authentication information, wherein the target authentication information is information for performing mode exit authentication set for the limiting mode after the terminal equipment enters the limiting mode, and when the terminal equipment is in the limiting mode, an application program which can be used by the terminal equipment is a pre-configured application program and/or a use duration which can be used by the terminal equipment is a pre-configured use duration; and controlling the terminal equipment to exit the limiting mode under the condition that the authentication information is matched with the target authentication information. The limiting capability of the terminal equipment in the using process can be improved.
Description
Technical Field
The embodiment of the application relates to equipment security technology, and relates to, but is not limited to, a mode exit method and device, equipment and a storage medium.
Background
In the process of using a terminal device such as a mobile phone, in some scenarios, the user may not be the owner of the terminal device, and therefore, it is generally necessary to set a restriction mode, for example: child space, etc., to limit the length of time the device can be used, functions that can be used, etc.
The restriction mode adopted in the prior art is usually exited based on the password of the terminal device itself, for example: the screen locking password of the mobile phone.
However, in a practical scenario, if the child space is usually used by a person in a user, the screen locking password is also easily known, and the mode exit based on the screen locking password of the mobile phone may cause the terminal device to fail to achieve the effect of limiting the function use and the use duration, so that the limiting capability of the terminal device is poor.
Disclosure of Invention
In view of this, the mode exit method, device, equipment and storage medium provided by the embodiments of the present application can improve the restriction capability of the terminal equipment in the use process. The mode exit method, the mode exit device, the mode exit equipment and the storage medium provided by the embodiment of the application are realized in the following way:
the mode exit method provided by the embodiment of the application is applied to the terminal equipment and comprises the following steps:
when the terminal equipment is in a limiting mode, determining whether the authentication information is matched with target authentication information or not in response to input operation of the authentication information, wherein the target authentication information is information for performing mode exit authentication set for the limiting mode after the terminal equipment enters the limiting mode, and when the terminal equipment is in the limiting mode, an application program which can be used by the terminal equipment is a pre-configured application program and/or a use duration which can be used by the terminal equipment is a pre-configured use duration;
And controlling the terminal equipment to exit the limiting mode under the condition that the authentication information is matched with the target authentication information.
The embodiment of the application provides a mode exit device, which is applied to terminal equipment and comprises: a response module and an exit module;
the response module is used for responding to the input operation of the authentication information to determine whether the authentication information is matched with the target authentication information or not under the condition that the terminal equipment is in a limiting mode, wherein the target authentication information is information for performing mode exit authentication set for the limiting mode after the terminal equipment enters the limiting mode, and when the terminal equipment is in the limiting mode, an application program which can be used by the terminal equipment is a preconfigured application program and/or a use duration which can be used by the terminal equipment is a preconfigured use duration;
and the exit module is used for controlling the terminal equipment to exit the limiting mode under the condition that the authentication information is matched with the target authentication information.
The computer device provided by the embodiment of the application comprises a memory and a processor, wherein the memory stores a computer program capable of running on the processor, and the processor realizes the method of the embodiment of the application when executing the program.
The computer readable storage medium provided by the embodiments of the present application stores a computer program thereon, which when executed by a processor implements the method provided by the embodiments of the present application.
The mode exit method, the device, the equipment and the storage medium provided by the embodiment of the application can respond to the input operation of the authentication information to determine whether the authentication information is matched with the target authentication information or not under the condition that the terminal equipment is in the limiting mode, and further control the terminal equipment to exit the limiting mode under the condition that the authentication information is matched with the target authentication information. The target authentication information is information for performing mode exit authentication set for the limiting mode after the terminal equipment enters the limiting mode, and after the limiting mode is used for entering the limiting mode when the identity authentication is performed based on the target authentication information, the target authentication information for performing mode exit authentication set for the limiting mode can improve the limiting capability of the terminal equipment in the use process and avoid the reduction of the limiting capability caused by the leakage of the password of the terminal equipment.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic diagram showing a limiting mode according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a mode exit method according to an embodiment of the present application;
fig. 3 is a schematic flow chart of setting target authentication information in the mode exit method according to the embodiment of the present application;
FIG. 4 is a schematic flow chart of entering a management mode according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a management mode entry according to an embodiment of the present application;
FIG. 6 is a schematic diagram of another process for entering a management mode according to an embodiment of the present application;
FIG. 7 is a schematic diagram of another embodiment of the present application for entering a management mode;
FIG. 8 is another flow chart of a mode exit method according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a mode exit device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more apparent, the specific technical solutions of the present application will be described in further detail below with reference to the accompanying drawings in the embodiments of the present application. The following examples are illustrative of the application and are not intended to limit the scope of the application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the application only and is not intended to be limiting of the application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is to be understood that "some embodiments" can be the same subset or different subsets of all possible embodiments and can be combined with one another without conflict.
It should be noted that the term "first/second/third" in relation to embodiments of the present application is used to distinguish between similar or different objects, and does not represent a particular ordering of the objects, it being understood that the "first/second/third" may be interchanged with a particular order or sequencing, as permitted, to enable embodiments of the present application described herein to be implemented in an order other than that illustrated or described herein.
In the process of using a terminal device such as a mobile phone, in some scenarios, the user may not be the owner of the terminal device, and therefore, it is generally necessary to set a restriction mode, for example: the child space, the mobile phone body space, the friend access space and other modes of various feasible types are used for limiting the use duration of the equipment, the usable functions and other contents.
The restriction mode employed in the related art is generally exited based on the password of the terminal device itself, for example: a screen locking password of the mobile phone, a screen locking gesture of the mobile phone, and the like.
However, in an actual scenario, if the child space is usually used by a person in a user, authentication information for performing mode exit, such as a screen locking password or a screen locking gesture, is also easily known, if the mode exit is performed by using the screen locking password or the screen locking gesture based on the mobile phone, the terminal device may not achieve the effect of limiting the function use and the use duration, so that the limiting capability of the terminal device is poor.
In order to solve the above-mentioned problems in the prior art, an embodiment of the present application provides a mode exit method, and a display situation in an application scenario of the mode exit method is explained below.
Fig. 1 is a schematic display diagram of a limiting mode provided by an embodiment of the present application, referring to fig. 1, the limiting mode may be a mode of a terminal device, where the terminal device may include, but is not limited to, a mobile phone, a wearable device (such as a smart watch, a smart bracelet, a smart glasses, etc.), a tablet computer, a notebook computer, a vehicle-mounted terminal, a PC (Personal Computer, a personal computer), etc. The functions performed by the method may be performed by a processor in an electronic device invoking program code, which of course may be stored in a computer storage medium, where it is seen that the terminal device comprises at least a processor and a storage medium.
The terminal device may further include a display, through which a corresponding interface of the terminal device is displayed, where for the limiting mode, the displayed content may be displayed in addition to the content that may be displayed in the normal mode, and further, a limiting duration of the limiting mode may be displayed, for example: the time may be displayed by means of a countdown of the remaining time period, or may be displayed by the time period that has been used, without being particularly limited thereto.
For example, when the terminal device is in the restricted mode, the application program that can be used by the terminal device is a preconfigured application program, and/or the use duration that can be used by the terminal device is a preconfigured use duration.
The duration that the restriction mode can be used and the application that the restriction mode can be used may be preconfigured, and for the application that cannot be used, the application may not be displayed in the restriction mode, or the application that is currently unavailable is displayed in the restriction mode, etc., and fig. 1 shows an example of displaying that the application is currently unavailable and does not take the illustration as a restriction.
The restriction mode may include various types, such as: the terminal device is used for limiting the child space of the child, the user can give the terminal device to the child for use after entering the limiting mode, the child has the use duration and the limitation of the application program in use in the use process, and if the user does not want the child to use certain application programs, part of application programs can be set to be unusable in the child space in a pre-configuration mode, so that the purpose of limiting the child behavior is achieved.
In addition to child space, other types of restriction modes may be included, such as: in the case of maintaining a mobile phone, the mobile phone is handed to a mode used by other people, a special mode entered for restricting the user's own behavior, or any other mode for restricting the duration and/or application of use of the terminal device.
In the display interface shown in fig. 1, the remaining usage period of the restriction mode may be displayed in a countdown manner, and a prompt is given to the application a and the application B that are inaccessible in the mode.
In addition, when the terminal equipment is in the normal mode, if the terminal equipment is in the limiting mode, the terminal equipment can enter the limiting mode through authentication modes such as a screen locking password, a screen locking gesture or fingerprint information.
Since in an actual use scenario, the terminal device is usually handed to the object for use after the user determines to enter the restricted mode, for example: children, etc., and therefore, the use of a lock screen password, a lock screen gesture, etc. does not affect the restriction capability of the terminal device at the stage of entering the restriction mode.
The following further explains the specific implementation process of the mode exit method according to the embodiment of the present application based on the above explanation of the display interface of the limited mode of the terminal device.
Fig. 2 is a flowchart of a mode exit method according to an embodiment of the present application, referring to fig. 2, the method includes:
s210: in a case where the terminal device is in the restricted mode, it is determined whether the authentication information matches the target authentication information in response to an input operation of the authentication information.
The target authentication information is information for performing mode exit authentication, which is set for the limiting mode after the terminal equipment enters the limiting mode.
It should be noted that the terminal device being in the restricted mode means that the terminal device enters the restricted mode until the terminal device exits the restricted mode, during which the terminal device can be determined to be in the restricted mode.
The authentication information may be information for authentication, such as a password or a gesture input by a user of the terminal device; the target authentication information may be information stored in the terminal device in advance, for example, information for performing mode exit authentication set for the restricted mode after the terminal device enters the restricted mode.
The method comprises the steps that a limiting mode can be entered for multiple times, target authentication information can be correspondingly set when the limiting mode is entered for the first time, after the target authentication information is invalid or when the target authentication information is actively required to be modified, and after the limiting mode is entered, if the existing target authentication information exists, resetting is not needed; if the existing target authentication information does not exist, the target authentication information can be set.
It should be noted that, after the input operation of the authentication information is responded, whether the authentication information is matched with the target authentication information may be determined, where matching may refer to that the authentication information is the same as the target authentication information, or may refer to that there is a corresponding association relationship between the authentication information and the target authentication information, which is not limited in particular, and one of the ways may be selected according to the actual requirement for configuration.
For example, if the authentication information and the target authentication information are passwords, when the target authentication information is the same as the authentication information, it may be determined that the authentication information matches the target authentication information; accordingly, when the target authentication information is different from the authentication information, it can be determined that the authentication information does not match the target authentication information.
S220: and controlling the terminal equipment to exit the limiting mode under the condition that the authentication information is matched with the target authentication information.
The method comprises the steps that a corresponding result can be obtained by determining whether authentication information is matched with target authentication information, and under the condition that the authentication information is matched with the target authentication information, the terminal equipment is controlled to exit a limiting mode; accordingly, in the case where the authentication information does not match the target authentication information, the terminal device is kept in the restricted mode.
The above-mentioned process is a process of actively exiting the restricted mode, and in addition, after the use time of the restricted mode is long, the terminal device enters a screen-off state, and in the screen-off state, after the authentication of the target authentication information or the authentication of the user fingerprint is required, the screen-off can be released and the normal mode is restored.
In the mode exit method provided by the embodiment of the application, whether the authentication information is matched with the target authentication information or not can be determined in response to the input operation of the authentication information under the condition that the terminal equipment is in the limiting mode, and then the terminal equipment is controlled to exit the limiting mode under the condition that the authentication information is matched with the target authentication information. The target authentication information is information for performing mode exit authentication set for the limiting mode after the terminal equipment enters the limiting mode, and after the limiting mode is used for entering the limiting mode when the identity authentication is performed based on the target authentication information, the target authentication information for performing mode exit authentication set for the limiting mode can improve the limiting capability of the terminal equipment in the use process and avoid the reduction of the limiting capability caused by the leakage of the password of the terminal equipment.
The implementation process of entering the management mode and the corresponding setting performed in the management mode in the mode exit method provided in the embodiment of the present application are explained below.
Fig. 3 is a schematic flow chart of setting target authentication information in the mode exit method according to the embodiment of the present application, please refer to fig. 3, and the method further includes:
s310: in response to an entry operation of the management mode, it is determined that the terminal device enters the management mode.
Wherein the management mode is a device mode for setting the restriction mode.
It should be noted that, the management mode may be a sub-mode in the restricted mode, where the restricted mode may be set in association with the management mode, for example: setting the application program of limiting the use, setting the duration of limiting the use, setting the above-mentioned target authentication information, and the like.
The method for entering the management mode can comprise a plurality of methods, and the limiting mode can be set after entering the management mode in any mode.
S320: in a case where the terminal device is in the management mode, the target authentication information is determined in response to a setting operation for the target authentication information.
Wherein when it is determined that the terminal device is in the management mode, setting of the target authentication information may be performed, for example: a display interface may be configured in which a relevant prompt for a password input or gesture input may exist and target authentication information is determined based on an input operation by the user.
Example: if the password is selected to be input in the display interface, the target authentication information can be determined to be the corresponding password based on the password input by the user; if the gesture input is selected, a gesture corresponding to the target authentication information may be determined based on the gesture input by the user.
After the target authentication information is determined in the above manner, when the restriction mode is required to be exited, the input authentication information can be subjected to matching verification based on the determined target authentication information.
In the mode exit method provided by the embodiment of the application, the terminal equipment can be determined to enter the management mode in response to the entry operation of the management mode; in a case where the terminal device is in the management mode, the target authentication information is determined in response to a setting operation for the target authentication information. The target authentication information is set in the management mode, so that leakage of the target authentication information can be avoided, limiting capacity of the terminal equipment in the use process can be improved, and reduction of limiting capacity caused by leakage of passwords of the terminal equipment is avoided.
Possible implementations of entering the management mode in the mode exit method provided in the embodiment of the present application are explained below.
Fig. 4 is a schematic flow chart of entering a management mode according to an embodiment of the present application, referring to fig. 4, in response to an entering operation of the management mode, determining that a terminal device enters the management mode includes:
s410: an authentication prompt is generated in response to a triggering operation for a target control entering a management mode.
It should be noted that, since the management mode belongs to the sub-mode of the restriction mode, the above steps are first performed when the terminal device is in the restriction mode.
In the display interface of the restricted mode, a target control for entering the management mode may be provided, and an authentication prompt may be generated in response to a trigger operation for the target control for entering the management mode. Wherein the authentication prompt may be used to instruct the user to authenticate, for example: fingerprint verification, facial recognition verification, etc. may be performed to determine that the current user is the user himself.
After the authentication prompt is obtained, a corresponding authentication step may be performed, for example: in the case of fingerprint authentication, a user is required to input a corresponding fingerprint or the like.
S420: and responding to the identity information input operation aiming at the identity verification prompt, and determining that the terminal equipment enters a management mode under the condition that the identity information meets the verification condition.
The method comprises the steps of responding to the identity information input operation of a user aiming at an identity verification prompt, obtaining input content, and carrying out corresponding identity verification based on the input content.
It should be noted that, the manner of performing the authentication may be set according to actual requirements, for example: if the limited mode is a child space, the child may not have the operation capability of entering the management mode in the use process, and in this case, verification can be performed by setting information such as a screen locking password or a screen locking gesture; if the restriction mode is other, for example: the restricted target object may have an operation capability to enter the management mode, in which case authentication may be set by fingerprint, facial recognition, or other authentication information that the user alone can succeed in authentication, without being particularly restricted.
If the identity verification is successful, the identity information can be determined to meet the verification condition; accordingly, if the authentication fails, it may be determined that the authentication condition is not satisfied by the identity information.
In case the identity information satisfies the authentication condition, the terminal device may enter its corresponding management mode from the restricted mode.
In the mode exit method provided by the embodiment of the application, the identity verification prompt can be generated in response to the triggering operation of the target control for entering the management mode; and responding to the identity information input operation aiming at the identity verification prompt, and determining that the terminal equipment enters a management mode under the condition that the identity information meets the verification condition. The mode that the target control enters the management mode is one of the feasible modes, so that a user can conveniently set related information of the restriction mode, and operations such as resetting and updating can be performed on target authentication information, thereby improving the restriction capability of the terminal equipment, and corresponding authentication can be performed in the process of entering the management mode, thereby avoiding the condition that the target authentication information is modified and the like.
In the process of entering the management mode based on the above manner, the contents displayed on the display interface corresponding to the terminal device will be explained.
Fig. 5 is a schematic display diagram of entering a management mode according to an embodiment of the present application, referring to fig. 5, a corresponding target control 510 may be disposed on a display interface of the terminal device.
It should be noted that, the user may enter the management mode from the current limitation mode by triggering the target control 510, so as to perform the corresponding setting work on the limitation mode.
Another possible implementation of entering the management mode in the mode exit method provided in the embodiment of the present application is explained below.
Fig. 6 is another flow chart for entering a management mode according to an embodiment of the present application, referring to fig. 6, in response to an entering operation of the management mode, determining that a terminal device enters the management mode includes:
s610: and after the terminal equipment enters the preset duration of the limiting mode, generating an entry prompt of the management mode.
After the terminal device enters the limiting mode, a popup window can be displayed in the display interface after a preset time period, and the user is reminded whether to enter the management mode through the popup window.
For example, a popup window may be generated within 1 second after the terminal device enters the restricted mode, and a prompt text may be generated in the popup window, for example, "whether to enter the management mode for setting".
The preset time period can be set based on actual requirements.
S620: in response to a select entry operation for the entry prompt for the management mode, it is determined that the terminal device enters the management mode.
It should be noted that the entry into the management mode or the non-entry into the management mode may be selected according to the entry prompt of the management mode.
If the management mode is not selected to be entered, the management mode can be continuously maintained in the limit mode, and verification is performed according to authentication information set by default when the limit mode is exited; if the management mode is selected to be entered, the user can directly jump to the interface corresponding to the management mode.
In the actual use process, when entering the limiting mode, the user usually performs the operation by himself, so that the user can enter the management mode directly without repeated verification in the process; or, if the non-user himself is prevented from entering the management mode for security, the similar authentication process can be executed, and the management mode is entered after the current user is determined to be the user himself.
In the mode exit method provided by the embodiment of the application, after the preset duration of the terminal equipment entering the limiting mode, an entry prompt of the management mode can be generated; in response to a select entry operation for the entry prompt for the management mode, it is determined that the terminal device enters the management mode. The mode of entering the management mode based on the entering prompt after entering the preset duration of the limiting mode is one of the feasible modes, so that a user can conveniently and correspondingly set related information of the limiting mode, and operations such as resetting and updating the target authentication information can be performed, and the limiting capability of the terminal equipment is improved.
In the process of entering the management mode based on the above manner, the contents displayed on the display interface corresponding to the terminal device will be explained.
Fig. 7 is another display schematic diagram of entering the management mode according to the embodiment of the present application, referring to fig. 7, after entering the limiting mode for a preset period of time, an entry prompt 710 of the management mode may be displayed on the display interface of the terminal device.
It should be noted that, the user may select to enter the management mode or not enter the management mode by triggering the entry prompt 710 of the management mode, and if the user selects not to enter the management mode, the user may continue to enter the restriction mode; if the management mode is selected, the management mode may be entered from the restricted mode.
The relevant settings that can be made for the restricted mode when the terminal device is in the management mode are explained below, respectively.
In one embodiment, in case the terminal device is in the management mode, the method further comprises: the validation time of the target authentication information is determined in response to a setting operation for a duration corresponding to the target authentication information.
It should be noted that, while the user sets the target authentication information or after setting the target authentication information, the duration corresponding to the target authentication information may be set, where the duration of the target authentication information may refer to the effective time of the target authentication information, for example: if the duration of the target authentication information is set to 1 day, the restricted mode may be exited based on the target authentication information within one day after the completion of the setting, and after the duration is exceeded, the target authentication information is not validated, that is, the restricted mode may not be exited using the target authentication information.
When the effective duration of the target authentication information is set, a preset duration may be preconfigured, for example: 3 days; the user may change or remain unchanged the preset time period to determine the effective time of the target authentication information while determining the target authentication information or after confirming the target authentication information.
In one embodiment, if the validation time distance of the target authentication information fails to meet the preset time length under the condition that the terminal device is in the limiting mode, generating first prompt information, wherein the first prompt information is used for prompting that the validation time of the target authentication information is about to run out.
It should be noted that the preset time length may be set according to actual requirements, for example, may be exemplified after a time period of 90% of the total effective time period is consumed: if the target authentication information has a duration of 10 days, a first hint information may be generated on the ninth day.
Alternatively, the first prompt message may be generated one hour immediately before the failure, which is not particularly limited herein.
The prompting content of the first prompting information can be, for example, a similar word such as "target authentication information is invalid after X time", or a prompting voice, a prompting video, a time countdown mode and the like can be adopted as the first prompting information so as to prompt the user that the effective time of the target authentication information is about to be used up.
In one embodiment, in case the terminal device is in the management mode, the method further comprises: the number of times of validation of the target authentication information is determined in response to a setting operation for the corresponding number of times of persistence of the target authentication information.
In addition to the manner of setting the validation time, the manner of setting the validation times may also be adopted, and the duration times corresponding to the target authentication information may be set while the user sets the target authentication information or after the target authentication information is set, where the duration times of the target authentication information may refer to the times that the target authentication information may be used, for example: if the duration of the target authentication information is set to 10 times, when the target authentication information is in the limiting mode for 10 times after the setting is completed, the limiting mode can be exited based on the target authentication information, and the duration is consumed once when the limiting mode is exited once; after the duration is consumed, the target authentication information is not validated, i.e., the target authentication information cannot be used to exit the restricted mode.
In setting the number of times of validation of the target authentication information, a preset number of times may be preconfigured, for example: 3 times; the user may change or remain unchanged the preset number of times to determine the number of times of validation of the target authentication information while determining the target authentication information or after confirming the target authentication information.
In one embodiment, in the process that the terminal device exits the limiting mode, if the number of times of validation of the target authentication information is smaller than or equal to the preset number of times of validation, a second prompting message is generated, and the second prompting message is used for prompting that the number of times of validation of the target authentication information is about to run out.
It should be noted that, the preset number of times of validation may be set according to actual requirements, for example, after 90% of the total number of times of validation is consumed, which is illustrated by way of example: if the duration of the target authentication information is 10 times, the second hint information may be generated if the 9 th exit from the restricted mode.
Alternatively, the second prompting message may be generated in the case of exiting the restriction mode for the last time immediately before the failure, which is not particularly limited herein.
The prompting content of the second prompting information can be, for example, similar characters such as 'target authentication information is also invalid after X times', or prompting voice, prompting video, time countdown and other modes can be adopted as the second prompting information so as to prompt the user that the effective times of the target authentication information are about to be used up.
The following explains the implementation procedure of setting the exit mode of the restricted mode in the mode exit method provided in the embodiment of the present application.
Fig. 8 is another flow chart of a mode exit method according to an embodiment of the present application, referring to fig. 8, in a case that a terminal device is in a management mode, the method further includes:
s810: in response to a setting operation for the exit mode of the restriction mode, the exit mode of the restriction mode is determined.
Wherein the exit mode comprises at least one of the following: exit based on target authentication information, exit based on lock screen authentication information, and exit based on fingerprint information.
In the management mode, the exit mode of the restriction mode may be set, and the exit mode of the restriction mode may be determined in response to a setting operation for the exit mode of the restriction mode. Wherein, the exit mode can select one or more, and the default can exit based on the lock screen authentication information and the fingerprint information; the exit based on the target authentication information may be set by a selection operation of the user.
The step S210-S220 is based on the target authentication information, that is, the step S is based on the screen locking password or the screen locking gesture in the related art, the step S is based on the fingerprint information, that is, the step S is based on the fingerprint input by the user in advance, and in the actual selection, the step S is based on the fingerprint information, which can be a continuously effective mode, and the step S is based on one of the step S and the step S is based on the screen locking authentication information.
In a case where the terminal device is in the restricted mode, determining whether the authentication information matches the target authentication information in response to an input operation of the authentication information, includes:
S820: after determining that the exit mode of the restriction mode includes exiting based on the target authentication information, determining whether the authentication information matches the target authentication information in response to an input operation of the authentication information in a case where the terminal device is in the restriction mode.
It should be noted that, in the case where the exit mode selected by the user includes exiting based on the target authentication information, the step of S210 may be performed, that is, in the case where the terminal device is in the restricted mode, in response to the input operation of the authentication information, it is determined whether the authentication information matches the target authentication information.
For example, in the case of no target authentication information, the exit mode may be a lock screen based authentication information exit and a fingerprint based exit; after the target authentication information is set, the exit mode may be changed to exit based on the target authentication information and exit based on the fingerprint information.
In the mode exit method provided by the embodiment of the application, the exit mode of the limiting mode can be determined in response to the setting operation of the exit mode of the limiting mode; after determining that the exit mode of the restriction mode includes exiting based on the target authentication information, determining whether the authentication information matches the target authentication information in response to an input operation of the authentication information in a case where the terminal device is in the restriction mode. The mode exit flexibility can be improved through the selection of the exit mode of the limiting mode, so that the mode exit method is more suitable for different use scenes, and the applicability of the mode exit method is improved.
In one embodiment, after determining that the exit manner of the restricted mode includes exiting based on the target authentication information, the method further comprises: in the case that an abnormal event occurs in the terminal device, determining whether the target authentication information is damaged, the abnormal event including: the terminal equipment is abnormally shut down and the limiting mode is abnormally exited; if yes, the exit mode of the limiting mode is adjusted to be a preset exit mode, and third prompt information is generated, wherein the third prompt information is used for prompting that the exit mode of the limiting mode is changed.
It should be noted that, during the use of the terminal device, an abnormal event may occur due to external unreliability, for example: the terminal equipment is abnormally shut down and the limiting mode is abnormally exited; the abnormal shutdown of the terminal device may be, for example, shutdown caused by power failure of a battery, shutdown caused by certain application programs, or the like; the restricted mode abnormal exit may be, for example, a case where the restricted mode is exited by an unset exit manner.
Under the condition that the abnormal event occurs to the terminal equipment is determined, whether the target authentication information is damaged or not can be determined, and if the target authentication information is not damaged, a selected exit mode can be maintained; if damaged, the exit mode may be adjusted to a preset exit mode, for example: exit based on lock screen authentication information and exit based on fingerprint information.
And can generate a third prompt message, where the third prompt message can display, for example, a related text prompt such as "the exiting mode of the current limiting mode resumes default", and the like, and the third prompt message is not limited in detail herein.
In one embodiment, in case the terminal device is in a restricted mode, the method further comprises: and responding to the shutdown operation of the terminal equipment, generating a shutdown record, wherein the shutdown record is used for indicating the terminal equipment to shutdown under the condition of a limiting mode, and the shutdown record is a record which can not be actively deleted.
It should be noted that, in order to avoid the user forgetting the target authentication information, the restricted mode may be exited by a shutdown mode, for example: after the terminal equipment is powered off in the limiting mode, the terminal equipment can exit the limiting mode and is in a normal use mode.
In addition, in the case of shutdown, a shutdown record may be generated in response to a shutdown operation for the terminal device, and the shutdown record may record a specific shutdown time, for example, "a restricted mode is exited by shutdown at the time X".
It should be noted that, the shutdown record is a record which cannot be actively deleted, the record is automatically deleted after a preset time length is saved, and the preset time length can be set according to actual requirements. And, the shutdown record cannot be actively deleted by the user, and the user can actively view the shutdown record.
That is, when the user forgets the password or gesture corresponding to the target authentication information, the user can take a shutdown mode to exit the limiting mode, and because the shutdown record is saved in the shutdown process, the user can avoid the limitation that the user bypasses the limiting mode through shutdown by checking the shutdown record, and the completeness of the boundary condition processing of the exit method of the square mode can be improved.
One possible procedure of the mode exit method provided in the embodiment of the present application is explained as follows:
in the process of entering the limiting mode, a user can actively enter the limiting mode, then enter the limiting mode by setting preset time length or enter the management mode by setting an entering control, in the management mode, a mode exiting mode can be selected, if an authentication mode based on target authentication information exiting is selected, target authentication information, corresponding effective time length or effective times can be respectively set, and in addition, available application programs and available time length in the limiting mode can be correspondingly set.
After the setting is finished based on the mode, the device can be restored to a limiting mode, and in the limiting mode, if the device is used for a long time, the device enters a screen-off mode; if the terminal device exits based on the target authentication information, the terminal device may be controlled to exit the restriction mode if the authentication information matches the target authentication information.
It should be understood that, although the steps in the flowcharts described above are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described above may include a plurality of sub-steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of execution of the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with at least a part of the sub-steps or stages of other steps or other steps.
Based on the foregoing embodiments, the embodiments of the present application provide a mode exit device, where the mode exit device includes each module included, and each unit included in each module may be implemented by a processor; of course, the method can also be realized by a specific logic circuit; in an implementation, the processor may be a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
Fig. 9 is a schematic structural diagram of a mode exit device according to an embodiment of the present application, referring to fig. 9, the device includes: a response module 910 and an exit module 920;
a response module 910, configured to determine, in response to an input operation of the authentication information, whether the authentication information matches with target authentication information, where the target authentication information is information for performing mode exit authentication set for the restriction mode after the terminal device enters the restriction mode, where, in the case where the terminal device is in the restriction mode, an application that can be used by the terminal device is a preconfigured application, and/or a use duration that can be used by the terminal device is a preconfigured use duration;
and an exit module 920, configured to control the terminal device to exit the restricted mode if the authentication information matches the target authentication information.
In one embodiment, the response module 910 is further configured to determine, in response to an entry operation of a management mode, that the terminal device enters the management mode, where the management mode is a device mode for setting the restriction mode; in a case where the terminal device is in the management mode, the target authentication information is determined in response to a setting operation for the target authentication information.
In one embodiment, the response module 910 is further configured to generate an authentication prompt in response to a triggering operation for a target control entering a management mode; and responding to the identity information input operation aiming at the identity verification prompt, and determining that the terminal equipment enters a management mode under the condition that the identity information meets the verification condition.
In one embodiment, the response module 910 is specifically configured to generate an entry prompt of a management mode after a preset duration of the terminal device entering the limiting mode; and responding to the selected entry operation of the entry prompt for the management mode, and determining that the terminal equipment enters the management mode.
In one embodiment, the response module 910 is specifically configured to determine the effective time of the target authentication information in response to a setting operation for a duration corresponding to the target authentication information.
In one embodiment, the response module 910 is further configured to, when the terminal device is in the restricted mode, generate a first prompting message if the effective time distance of the target authentication information fails to meet the preset time length, where the first prompting message is used to prompt that the effective time of the target authentication information is about to be used up.
In one embodiment, the response module 910 is further configured to determine the number of validations of the target authentication information in response to a setting operation for the corresponding number of durations of the target authentication information.
In one embodiment, the response module 910 is further configured to generate, during the process of exiting the restricted mode, a second prompting message if the number of times of validation of the target authentication information is less than or equal to a preset number of times of validation, where the second prompting message is used to prompt that the number of times of validation of the target authentication information is about to be used up.
In one embodiment, the response module 910 is further configured to determine, in response to a setting operation for an exit manner of the restriction mode, where the exit manner includes at least one of: exiting based on the target authentication information, exiting based on lock screen authentication information, and exiting based on fingerprint information; after determining that the exit mode of the restricted mode includes exiting based on the target authentication information, determining whether the authentication information matches the target authentication information in response to an input operation of the authentication information in a case where the terminal device is in the restricted mode.
In one embodiment, the response module 910 is further configured to determine whether the target authentication information is damaged in a case where an abnormal event occurs in the terminal device, where the abnormal event includes: the terminal equipment is powered off abnormally and the limiting mode is exited abnormally; if yes, the exit mode of the limiting mode is adjusted to be a preset exit mode, and third prompting information is generated, wherein the third prompting information is used for prompting that the exit mode of the limiting mode is changed.
In one embodiment, the response module 910 is further configured to generate a shutdown record in response to a shutdown operation for the terminal device, where the shutdown record is used to instruct the terminal device to shutdown in the limited mode, and the shutdown record is a record that is not actively erasable.
The description of the apparatus embodiments above is similar to that of the method embodiments above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the embodiments of the apparatus of the present application, please refer to the description of the embodiments of the method of the present application.
It should be noted that, in the embodiment of the present application, the division of the modules by the mode exit device shown in fig. 9 is schematic, which is merely a logic function division, and other division manners may be adopted in actual implementation. In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units. Or in a combination of software and hardware.
It should be noted that, in the embodiment of the present application, if the method is implemented in the form of a software functional module, and sold or used as a separate product, the method may also be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partly contributing to the related art, embodied in the form of a software product stored in a storage medium, including several instructions for causing an electronic device to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, an optical disk, or other various media capable of storing program codes. Thus, embodiments of the application are not limited to any specific combination of hardware and software.
Fig. 10 is a schematic structural diagram of a computer device provided in an embodiment of the present application, and referring to fig. 10, an embodiment of the present application provides a computer device, which may be the above-mentioned terminal device, and an internal structure diagram of the computer device may be shown in fig. 10. The computer device includes a processor 1020, memory, and a network interface 1040 connected via a system bus 1010. Wherein the processor 1020 of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes nonvolatile storage medium 1031, internal memory 1032. The nonvolatile storage medium 1031 stores an operating system, computer programs, and databases. The internal memory 1032 provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing data. The network interface 1040 of the computer apparatus is for communicating with an external terminal through a network connection. Which when executed by the processor 1020, performs the above-described methods.
An embodiment of the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method provided in the above-described embodiment.
Embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the steps of the method provided by the method embodiments described above.
It will be appreciated by those skilled in the art that the structure shown in FIG. 10 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, the mode exit device provided by the present application may be implemented in the form of a computer program that is executable on a computer device as shown in fig. 10. The memory of the computer device may store the various program modules that make up the apparatus. The computer program of each program module causes a processor to carry out the steps of the method of each embodiment of the application described in the present specification.
It should be noted here that: the description of the storage medium and apparatus embodiments above is similar to that of the method embodiments described above, with similar benefits as the method embodiments. For technical details not disclosed in the storage medium, the storage medium and the device embodiments of the present application, please refer to the description of the method embodiments of the present application.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" or "some embodiments" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" or "in some embodiments" in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application. The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments. The foregoing description of various embodiments is intended to highlight differences between the various embodiments, which may be the same or similar to each other by reference, and is not repeated herein for the sake of brevity.
The term "and/or" is herein merely an association relation describing associated objects, meaning that there may be three relations, e.g. object a and/or object B, may represent: there are three cases where object a alone exists, object a and object B together, and object B alone exists.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments are merely illustrative, and the division of the modules is merely a logical function division, and other divisions may be implemented in practice, such as: multiple modules or components may be combined, or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or modules, whether electrically, mechanically, or otherwise.
The modules described above as separate components may or may not be physically separate, and components shown as modules may or may not be physical modules; can be located in one place or distributed to a plurality of network units; some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in each embodiment of the present application may be integrated in one processing unit, or each module may be separately used as one unit, or two or more modules may be integrated in one unit; the integrated modules may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read Only Memory (ROM), a magnetic disk or an optical disk, or the like, which can store program codes.
Alternatively, the above-described integrated units of the present application may be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partly contributing to the related art, embodied in the form of a software product stored in a storage medium, including several instructions for causing an electronic device to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage device, a ROM, a magnetic disk, or an optical disk.
The methods disclosed in the method embodiments provided by the application can be arbitrarily combined under the condition of no conflict to obtain a new method embodiment.
The features disclosed in the several product embodiments provided by the application can be combined arbitrarily under the condition of no conflict to obtain new product embodiments.
The features disclosed in the embodiments of the method or the apparatus provided by the application can be arbitrarily combined without conflict to obtain new embodiments of the method or the apparatus.
The foregoing is merely an embodiment of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (14)
1. A mode exit method, wherein the method is applied to a terminal device, the method comprising:
when the terminal equipment is in a limiting mode, determining whether the authentication information is matched with target authentication information or not in response to input operation of the authentication information, wherein the target authentication information is information for performing mode exit authentication set for the limiting mode after the terminal equipment enters the limiting mode, and when the terminal equipment is in the limiting mode, an application program which can be used by the terminal equipment is a preconfigured application program, and/or a use duration which can be used by the terminal equipment is a preconfigured use duration;
and controlling the terminal equipment to exit the limiting mode under the condition that the authentication information is matched with the target authentication information.
2. The method according to claim 1, wherein the method further comprises:
responding to an entering operation of a management mode, determining that the terminal equipment enters the management mode, wherein the management mode is an equipment mode for setting the limiting mode;
in a case where the terminal device is in the management mode, the target authentication information is determined in response to a setting operation for the target authentication information.
3. The method of claim 2, wherein the determining that the terminal device enters the management mode in response to the entering of the management mode comprises:
generating an identity verification prompt in response to a triggering operation for a target control entering a management mode;
and responding to the identity information input operation aiming at the identity verification prompt, and determining that the terminal equipment enters a management mode under the condition that the identity information meets the verification condition.
4. The method of claim 2, wherein the determining that the terminal device enters the management mode in response to the entering of the management mode comprises:
generating an entry prompt of a management mode after the terminal equipment enters the preset duration of the limiting mode;
And responding to the selected entry operation of the entry prompt for the management mode, and determining that the terminal equipment enters the management mode.
5. The method according to claim 2, wherein in case the terminal device is in the management mode, the method further comprises:
and determining the effective time of the target authentication information in response to a setting operation of the duration corresponding to the target authentication information.
6. The method of claim 5, wherein the method further comprises:
and under the condition that the terminal equipment is in a limiting mode, if the effective time distance of the target authentication information is invalid and meets the preset time length, generating first prompt information, wherein the first prompt information is used for prompting that the effective time of the target authentication information is about to be used up.
7. The method according to claim 2, wherein in case the terminal device is in the management mode, the method further comprises:
and determining the effective times of the target authentication information in response to the setting operation of the corresponding duration times of the target authentication information.
8. The method of claim 7, wherein the method further comprises:
And in the process that the terminal equipment exits the limiting mode, if the effective times of the target authentication information are smaller than or equal to the preset effective times, generating second prompt information, wherein the second prompt information is used for prompting that the effective times of the target authentication information are about to be used up.
9. The method according to claim 2, wherein in case the terminal device is in the management mode, the method further comprises:
determining an exit mode of the restriction mode in response to a setting operation of the exit mode for the restriction mode, the exit mode including at least one of: exiting based on the target authentication information, exiting based on lock screen authentication information, and exiting based on fingerprint information;
the determining whether the authentication information matches the target authentication information in response to an input operation of the authentication information in a case where the terminal device is in a restricted mode includes:
after determining that the exit mode of the restricted mode includes exiting based on the target authentication information, determining whether the authentication information matches the target authentication information in response to an input operation of the authentication information in a case where the terminal device is in the restricted mode.
10. The method of claim 9, wherein after determining the exit manner of the restricted mode comprises exiting based on the target authentication information, the method further comprises:
in the case that the terminal device generates an abnormal event, determining whether the target authentication information is damaged, the abnormal event including: the terminal equipment is powered off abnormally and the limiting mode is exited abnormally;
if yes, the exit mode of the limiting mode is adjusted to be a preset exit mode, and third prompting information is generated, wherein the third prompting information is used for prompting that the exit mode of the limiting mode is changed.
11. The method according to claim 1, wherein in case the terminal device is in the restricted mode, the method further comprises:
and responding to the shutdown operation of the terminal equipment, and generating a shutdown record, wherein the shutdown record is used for indicating the terminal equipment to shutdown under the condition of the limiting mode, and is a record which can not be actively deleted.
12. A mode exit apparatus, the apparatus being applied to a terminal device, the apparatus comprising: a response module and an exit module;
The response module is configured to determine, in response to an input operation of authentication information when the terminal device is in a restricted mode, whether the authentication information is matched with target authentication information, where the target authentication information is information for performing mode exit authentication set for the restricted mode after the terminal device enters the restricted mode, where, in the case where the terminal device is in the restricted mode, an application program that can be used by the terminal device is a preconfigured application program, and/or a use duration that can be used by the terminal device is a preconfigured use duration;
and the exit module is used for controlling the terminal equipment to exit the limiting mode under the condition that the authentication information is matched with the target authentication information.
13. A computer device comprising a memory and a processor, the memory storing a computer program executable on the processor, characterized in that the processor implements the steps of the method of any of claims 1 to 11 when the program is executed.
14. A computer readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the method according to any one of claims 1 to 11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311389390.1A CN117201667A (en) | 2023-10-24 | 2023-10-24 | Mode exit method and device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311389390.1A CN117201667A (en) | 2023-10-24 | 2023-10-24 | Mode exit method and device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117201667A true CN117201667A (en) | 2023-12-08 |
Family
ID=88998198
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311389390.1A Pending CN117201667A (en) | 2023-10-24 | 2023-10-24 | Mode exit method and device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117201667A (en) |
-
2023
- 2023-10-24 CN CN202311389390.1A patent/CN117201667A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10489612B2 (en) | Memory controller to verify authenticity of data | |
CN108572866B (en) | Application program management method, application program management device and mobile terminal | |
CN111373371A (en) | Terminal control method and device | |
CN108550033B (en) | Method and device for displaying unique identifier of digital object | |
CN109614785B (en) | Application operation control method and device, storage medium and electronic equipment | |
US7451478B2 (en) | Time managing system and method | |
CN107729775B (en) | Method and device for realizing switching between intelligent secret key equipment modes | |
CN111143830A (en) | Method and device for limiting application use, terminal equipment and storage medium | |
CN117201667A (en) | Mode exit method and device, equipment and storage medium | |
CN106951768B (en) | Fingerprint unlocking timeliness control method and device, mobile terminal and storage medium | |
JP2001117661A (en) | Portable information terminal equipment and program recording medium for the same | |
US11790059B1 (en) | Assigning new passcodes to electronic devices | |
CN111638917A (en) | Application start limiting method, device and storage medium | |
CN114615067A (en) | Group operation method, group operation device, electronic device and readable storage medium | |
JP2006011959A (en) | Information terminal device and user authentication method | |
CN111813456A (en) | Method and system for customizing boot logo | |
CN112989379A (en) | Key protection implementation method and device and electronic equipment | |
CN110688663A (en) | Execution command protection method and device, android device and storage medium | |
EP4443857A1 (en) | Device control method and apparatus, device, and storage medium | |
CN115658183B (en) | Method and device for controlling MCU, electronic equipment and storage medium | |
JP2004062283A (en) | Password management method of ic card, user authentication program and ic card | |
CN118378239B (en) | Account password setting method, device, medium and equipment for embedded Linux equipment | |
JP2013167946A (en) | Personal authentication method and information device using the same | |
CN111464294B (en) | Block chain data extraction method, device and storage medium | |
CN105868644A (en) | Method and apparatus for controlling Root function of mobile terminal and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |