WO2017166781A1 - 一种应用程序锁定方法、装置及电子设备 - Google Patents

一种应用程序锁定方法、装置及电子设备 Download PDF

Info

Publication number
WO2017166781A1
WO2017166781A1 PCT/CN2016/102147 CN2016102147W WO2017166781A1 WO 2017166781 A1 WO2017166781 A1 WO 2017166781A1 CN 2016102147 W CN2016102147 W CN 2016102147W WO 2017166781 A1 WO2017166781 A1 WO 2017166781A1
Authority
WO
WIPO (PCT)
Prior art keywords
instruction
preset application
running instruction
application
delivery target
Prior art date
Application number
PCT/CN2016/102147
Other languages
English (en)
French (fr)
Inventor
李�真
Original Assignee
乐视控股(北京)有限公司
乐视移动智能信息技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 乐视控股(北京)有限公司, 乐视移动智能信息技术(北京)有限公司 filed Critical 乐视控股(北京)有限公司
Publication of WO2017166781A1 publication Critical patent/WO2017166781A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/38Concurrent instruction execution, e.g. pipeline or look ahead
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Definitions

  • the present application relates to the field of human-computer interaction, and in particular, to an application locking method, device, and electronic device.
  • the smart terminal lock screen is similar to the computer lock screen, including two ways, one is to cut off the screen power, and the other is to use the software to quickly and intelligently lock the screen.
  • the purpose of the lock screen is to protect the privacy of your computer or mobile phone, prevent misuse, and save power without shutting down the system software.
  • the existing screen locking method regardless of the locking principle, the result of the locking is usually that the user cannot open any application and can only access the unlocking interface; after unlocking, the user can enter the system desktop and access all the applications, thereby It can be seen that the existing screen locking method is less flexible and convenient.
  • an application locking method including:
  • the running instruction is intercepted when the delivery target of the running instruction is a preset application.
  • the method further comprises:
  • the running instruction is sent to the delivery target when the delivery target of the running instruction is not a preset application.
  • the predetermined coordinate range being a position at which the icon of the preset application is located.
  • the method before the monitoring receives the locking instruction, the method further includes:
  • the position where the icon of the preset application is located is taken as the predetermined coordinate range.
  • an application locking apparatus including:
  • a lock operation monitoring unit for monitoring whether a lock command is received
  • a running instruction monitoring unit configured to monitor whether a running instruction is received when receiving the locking instruction
  • a determining unit configured to determine, when the running instruction is received, whether the delivery target of the running instruction is a preset application
  • the intercepting unit is configured to intercept the running instruction when the delivery target of the running instruction is a preset application.
  • the method further comprises:
  • a transmitting unit configured to send the running instruction to the delivery target when the delivery target of the running instruction is not a preset application.
  • the running instruction is a user touch operation
  • the determining unit comprises:
  • a coordinate acquiring unit configured to acquire coordinates corresponding to a user touch operation
  • a coordinate determining unit configured to determine whether the coordinate is within a predetermined coordinate range, where the predetermined coordinate range is a location where an icon of the preset application is located.
  • the method further comprises:
  • a lock target determining unit configured to determine the preset application according to a user's selection
  • An icon location determining unit configured to determine a location where an icon of the preset application is located
  • a lock position determining unit configured to use a position where the icon of the preset application is located as the predetermined coordinate range.
  • An embodiment of the present application further provides an electronic device including at least one processor; and a memory communicably coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor The instruction is executed by the at least one processor, So that the at least one processor can: monitor whether a lock instruction is received; when receiving the lock instruction, monitor whether a run instruction is received; and when receiving the run instruction, determine whether the transfer target of the run instruction is a preset An application; when the delivery target of the running instruction is a preset application, intercepting the running instruction.
  • the at least one processor is further configured to: when the delivery target of the running instruction is not a preset application, send the running instruction to the delivery target.
  • the running instruction is a user touch operation
  • determining whether the delivery target of the running instruction is a preset application comprises: acquiring coordinates corresponding to a user touch operation; determining whether the coordinate is in a predetermined Within the coordinate range, the predetermined coordinate range is a location at which the icon of the preset application is located.
  • the at least one processor is further configured to: determine the preset application according to a user's selection; determine an icon of the preset application a location where the icon of the preset application is located as the predetermined coordinate range.
  • the embodiment of the present application further provides a non-transitory computer readable storage medium storing the computer executable instructions of the computer executable instructions, when executed by an electronic device, enabling the electronic device to: monitor whether Receiving a lock instruction; when receiving the lock instruction, monitoring whether the operation instruction is received; when receiving the operation instruction, determining whether the delivery target of the operation instruction is a preset application; when the delivery target of the operation instruction is The run command is intercepted when the application is preset.
  • the electronic device is further capable of: when the operating finger When the delivery target of the command is not a preset application, the running instruction is sent to the delivery target.
  • the running instruction is a user touch operation
  • determining whether the delivery target of the running instruction is a preset application comprises: acquiring coordinates corresponding to a user touch operation; determining whether the coordinate is in a predetermined Within the coordinate range, the predetermined coordinate range is a location at which the icon of the preset application is located.
  • the storage medium preferably, before the monitoring whether the locking instruction is received, the electronic device is further configured to: determine the preset application according to a user's selection; and determine that the icon of the preset application is located a location at which the icon of the preset application is located as the predetermined coordinate range.
  • the embodiment of the present application further provides a computer program product, the computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instruction is used by a computer When executed, the computer is caused to perform the aforementioned method.
  • the application locking method, device and electronic device provided by the basic application embodiment do not prohibit the user from accessing the system desktop after receiving the locking instruction, but monitor whether the running instruction for opening the application is received, and then determine the running instruction. Whether the delivery target is a preset application, and only when the delivery target is a preset application, the execution instruction is intercepted, thereby prohibiting the application from being preset, and the program can prohibit part of the application. Turning on the operation instead of locking the entire system allows the user to pre-customize which applications are locked, thereby increasing the flexibility and convenience of the locking operation.
  • FIG. 1 is a flowchart of an application locking method according to an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of an application locking apparatus according to an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of hardware of an electronic device according to an embodiment of the present disclosure.
  • connection or integral connection; may be mechanical connection or electrical connection; may be directly connected, may also be indirectly connected through an intermediate medium, or may be internal communication of two components, may be wireless connection, or may be wired connection.
  • connection or integral connection; may be mechanical connection or electrical connection; may be directly connected, may also be indirectly connected through an intermediate medium, or may be internal communication of two components, may be wireless connection, or may be wired connection.
  • This embodiment provides an application locking method, which can be performed in an intelligent terminal. As shown in FIG. 1 , the method includes:
  • the lock command may be provided by a user, specifically by using a lock button of the terminal, or setting a virtual button on the system desktop or the main interface, and a lock command occurs when the user clicks the lock button.
  • step S2 is performed, otherwise the monitoring is continued.
  • step S2 monitoring whether a running instruction is received. Specifically, after the lock instruction is received, the lock state is entered.
  • the lock state of the embodiment is different from the prior art.
  • the existing lock state is that only one unlock interface is provided, and the user cannot access or even see any application. Icon (the shortcut open icon on the system desktop); while the lock status of this solution can not provide an additional interface, only the current locked state is displayed, the user can see the normal system desktop, but at this point has begun to the user Access operations are monitored.
  • step S3 is performed, otherwise Continuous monitoring.
  • step S3 determining whether the delivery target of the running instruction is a preset application, wherein the preset application may be selected by the user before the locking operation, and the user may arbitrarily select the application in the terminal as the preset application, specifically For example, the user can select each time after the user provides the lock instruction, and the user can arbitrarily select the application to lock each time; or, before the lock, the user can uniformly set the preset application that needs to be locked, and locks The default application is then automatically determined.
  • step S4 is performed, otherwise step S5 is performed.
  • the application locking method provided by the basic application embodiment does not prohibit the user from accessing the system desktop after receiving the locking instruction, but monitors whether the running instruction for opening the application is received, and then determines whether the delivery target of the running instruction is a prior
  • the set application only intercepts the running command when the delivery target is a preset application, thereby preventing the preset application from being opened. This scheme can prohibit some applications from being opened, instead of By locking the entire system, users can pre-customize which applications are locked, which increases the flexibility and convenience of locking operations.
  • the run command may be a touch operation of a user.
  • the above step S3 may include:
  • S32 Determine whether the coordinate is within a predetermined coordinate range, where the predetermined coordinate range is a location where an icon of the preset application is located.
  • the scheme determines whether the user wants to open an application by monitoring the touch coordinates, without having to involve the system permission problem too much, and the implementation is less difficult and practical.
  • the method may further include:
  • S01 determining the preset application according to a user's selection, for example, providing an application form, where the user can select an application that needs to be disabled when locking;
  • S02. Determine a location where the icon of the preset application is located, that is, a location of an icon of the application on a system desktop.
  • an icon of the application on the desktop is relatively fixed. Therefore, there are various ways to determine the position of the icon, for example, finding an icon in the desktop according to the name of the application, and then determining the sub-coordinate range of the icon in the desktop coordinate range;
  • S03 The location where the icon of the preset application is located is used as the predetermined coordinate range, and then, after entering the locked state, real-time monitoring whether the user clicks on the predetermined coordinate range.
  • an application locking device As shown in FIG. 2, the device includes:
  • a lock operation monitoring unit 21 configured to monitor whether a lock instruction is received
  • the operation instruction monitoring unit 22 is configured to monitor whether a running instruction is received when receiving the locking instruction
  • the determining unit 23 is configured to determine, when the running instruction is received, the delivery destination of the running instruction Whether the target is a preset application;
  • the intercepting unit 24 is configured to intercept the running instruction when the delivery target of the running instruction is a preset application.
  • the application locking device provided by the embodiment is basically applied, after receiving the locking instruction, does not prohibit the user from accessing the system desktop, but monitors whether a running instruction for starting the application is received, and then determines whether the delivery target of the running instruction is a prior
  • the set application only intercepts the running command when the delivery target is a preset application, thereby preventing the preset application from being opened. This scheme can prohibit some applications from being opened, instead of By locking the entire system, users can pre-customize which applications are locked, which increases the flexibility and convenience of locking operations.
  • the method further comprises:
  • the transmitting unit 25 is configured to send the running instruction to the delivery target when the delivery target of the running instruction is not a preset application.
  • the running instruction is a user touch operation
  • the determining unit comprises:
  • a coordinate acquiring unit configured to acquire coordinates corresponding to a user touch operation
  • a coordinate determining unit configured to determine whether the coordinate is within a predetermined coordinate range, where the predetermined coordinate range is a location where an icon of the preset application is located.
  • the method further comprises:
  • a lock target determining unit configured to determine the preset application according to a user's selection
  • An icon location determining unit configured to determine a location where an icon of the preset application is located
  • a lock position determining unit configured to use a position where the icon of the preset application is located as the predetermined coordinate range.
  • the embodiment of the present application further provides an electronic device, including at least one processor 810; and a memory 800 communicably connected to the at least one processor 810; wherein the memory 800 stores An instruction executed by the at least one processor 810, the instructions being executed by the at least one processor 810 to enable the at least one processor 810 to: monitor whether a lock instruction is received; when a lock instruction is received, Monitoring whether a running instruction is received; determining, when the running instruction is received, whether the delivery target of the running instruction is a preset application; and when the delivery target of the running instruction is a preset application, intercepting the running instruction.
  • the electronic device also includes an input device 830 and an output device 840 that are electrically coupled to the memory 800 and the processor, the electrical connections preferably being connected by a bus.
  • the at least one processor is further configured to: when the delivery target of the running instruction is not a preset application, send the running instruction to the delivery target.
  • the running instruction is a user touch operation
  • determining whether the delivery target of the running instruction is a preset application comprises: acquiring coordinates corresponding to a user touch operation; determining the Whether the coordinates are within a predetermined coordinate range, the predetermined coordinate range being a position at which the icon of the preset application is located.
  • the at least one processor is further configured to: determine the preset application according to a user's selection; and determine the preset The location where the icon of the application is located; the location where the icon of the preset application is located is taken as the predetermined coordinate range.
  • Embodiments of the present application also provide a non-volatile computer storage medium storing the computer-executable instructions of computer-executable instructions, when executed by an electronic device, enabling the electronic device to: monitor whether it is received Locking instruction; when receiving the locking instruction, monitoring whether the running instruction is received; when receiving the running instruction, determining whether the delivery target of the running instruction is a preset application; when the delivery target of the running instruction is a preset The running instruction is intercepted when the application is in use.
  • the electronic device is further configured to: when the delivery target of the running instruction is not a preset application, send the running instruction to the delivery target.
  • the running instruction is a user touch operation
  • determining whether the delivery target of the running instruction is a preset application comprises: acquiring coordinates corresponding to a user touch operation; determining the Whether the coordinates are within a predetermined coordinate range, the predetermined coordinate range being a position at which the icon of the preset application is located.
  • the electronic device is further configured to: determine the preset application according to a user's selection; and determine the preset application The location where the icon is located; the location where the icon of the preset application is located is taken as the predetermined coordinate range.
  • the embodiment of the present application further provides a computer program product, the computer program product package A computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform the methods described in the preceding embodiments.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

本申请提供一种应用程序锁定方法、装置及电子设备,涉及人机交互领域,所述方法包括:监测是否接收到锁定指令;当接收到锁定指令时,监测是否接收到运行指令;当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。本方案可以禁止部分应用程序的开启操作,而非对整个系统进行锁定,用户可以预先自定义需要锁定的应用程序,由此可提高锁定操作的灵活性和便利性。

Description

一种应用程序锁定方法、装置及电子设备
交叉引用
本申请要求在2016年4月1日提交中国专利局、申请号为201610202127.0、发明名称为“一种应用程序锁定方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及人机交互领域,具体涉及一种应用程序锁定方法、装置及电子设备。
背景技术
随着智能终端的普及,很多用户利用锁屏软件来保护自己的终端隐私。智能终端锁屏与电脑锁屏相仿,包括有两种方式,一种是切断屏幕电源,一种是利用软件快速智能锁屏。锁屏的目的在于保护自己的电脑或手机隐私、防止误操作、在不关闭系统软件的情况下节省电量。
现有的屏幕锁定方式,无论锁定原理如何,锁定的结果通常是用户无法开启任何一个应用程序,只能访问解锁界面;而在解锁之后,用户可以进入系统桌面,访问所有的应用程序,由此可见,现有的屏幕锁定方式的灵活性和便利性较差。
发明内容
本申请要解决的是现有的屏幕锁定方式的灵活性和便利性较差的问题。
有鉴于此,本申请实施例提供一种应用程序锁定方法,包括:
监测是否接收到锁定指令;
当接收到锁定指令时,监测是否接收到运行指令;
当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;
当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
优选地,还包括:
当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
优选地,所述运行指令为用户触摸操作;所述判断所述运行指令的传递目标是否为预设应用程序,包括:
获取用户触摸操作对应的坐标;
判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
优选地,在所述监测是否接收到锁定指令之前,还包括:
根据用户的选择确定所述预设应用程序;
确定所述预设应用程序的图标所处的位置;
将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
相应地,本申请实施例还提供一种应用程序锁定装置,包括:
锁定操作监测单元,用于监测是否接收到锁定指令;
运行指令监测单元,用于当接收到锁定指令时,监测是否接收到运行指令;
判断单元,用于当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;
截获单元,用于当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
优选地,还包括:
传递单元,用于当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
优选地,所述运行指令为用户触摸操作;所述判断单元包括:
坐标获取单元,用于获取用户触摸操作对应的坐标;
坐标判断单元,用于判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
优选地,还包括:
锁定目标确定单元,用于根据用户的选择确定所述预设应用程序;
图标位置确定单元,用于确定所述预设应用程序的图标所处的位置;
锁定位置确定单元,用于将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
本申请实施例还提供了一种电子设备,包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行, 以使所述至少一个处理器能够:监测是否接收到锁定指令;当接收到锁定指令时,监测是否接收到运行指令;当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
上述的电子设备,优选地,使得所述至少一个处理器还能够:当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
上述的电子设备,优选地,所述运行指令为用户触摸操作,所述判断所述运行指令的传递目标是否为预设应用程序包括:获取用户触摸操作对应的坐标;判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
上述的电子设备,优选地,在所述监测是否接收到锁定指令之前,使得所述至少一个处理器还能够:根据用户的选择确定所述预设应用程序;确定所述预设应用程序的图标所处的位置;将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
本申请实施例还提供了一种非易失性计算机可读存储介质,所述存储介质存储有计算机可执行指令的所述计算机可执行指令,当由电子设备执行时使得电子设备能够:监测是否接收到锁定指令;当接收到锁定指令时,监测是否接收到运行指令;当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
上述的存储介质,优选地,使得所述电子设备还能够:当所述运行指 令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
上述的存储介质,优选地,所述运行指令为用户触摸操作,所述判断所述运行指令的传递目标是否为预设应用程序包括:获取用户触摸操作对应的坐标;判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
上述的存储介质,优选地,在所述监测是否接收到锁定指令之前,使得所述电子设备还能够:根据用户的选择确定所述预设应用程序;确定所述预设应用程序的图标所处的位置;将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在非易失性计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行前述方法。
根本申请实施例提供的应用程序锁定方法、装置及电子设备,当接收到锁定指令之后,不会禁止用户访问系统桌面,而监测是否接收到用于开启应用程序的运行指令,然后判定运行指令的传递目标是否为预先设定的应用程序,只有当传递目标是是预先设定的应用程序时,才将运行指令截获,进而实现禁止预先设定的应用程序开启,本方案可以禁止部分应用程序的开启操作,而非对整个系统进行锁定,用户可以预先自定义锁定哪些应用程序,由此可提高锁定操作的灵活性和便利性。
附图说明
为了更清楚地说明本申请具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例提供的应用程序锁定方法的流程图;
图2为本申请实施例提供的应用程序锁定装置的结构示意图;
图3为本申请实施例提供的电子设备的硬件结构示意图。
具体实施方式
下面将结合附图对本申请的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
在本申请的描述中,需要说明的是,术语“中心”、“上”、“下”、“左”、“右”、“竖直”、“水平”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本申请和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本申请的限制。此外,术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相 对重要性。
在本申请的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,还可以是两个元件内部的连通,可以是无线连接,也可以是有线连接。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。
此外,下面所描述的本申请不同实施方式中所涉及的技术特征只要彼此之间未构成冲突就可以相互结合。
实施例1
本实施例提供了一种应用程序锁定方法,该方法可以在智能终端中执行,如图1所示该方法包括:
S1,监测是否接收到锁定指令,锁定指令可以由用户提供,具体可以利用终端的锁定键实现,也可以在系统桌面或主界面设置虚拟按键,当用户点击锁定按键时即发生锁定指令。当接收到锁定指令时,执行步骤S2,否则继续监测。
S2,监测是否接收到运行指令。具体地,在接收到锁定指令后,即进入了锁定状态,本实施例的锁定状态与现有技术不同,现有的锁定状态是只提供一个解锁界面,用户不能访问甚至看不到任何应用程序的图标(系统桌面上的快捷开启图标);而本方案的锁定状态可以不提供额外的界面,只提示当前已进入锁定状态,用户可以看到正常的系统桌面,但此时已开始对用户的访问操作进行监测。当接收到运行指令时,执行步骤S3,否则 持续监测。
S3,判断所述运行指令的传递目标是否为预设应用程序,其中预设应用程序可以是用户在锁定操作之前选定的,用户可以任意选定终端中的应用程序作为预设应用程序,具体地,例如可以在每一次用户提供锁定指令之后进行选定,用户每次都可以任意选择应用程序进行锁定;或者,也可以在锁定之前,用户统一设定需要锁定的预设应用程序,在锁定之后自动确定预设应用程序。当所述运行指令的传递目标是预设应用程序时,执行步骤S4,否则执行步骤S5。
S4,截获所述运行指令,即不将运行指令传递给应用程序,进而禁止用户开启应用程序。
S5,将所述运行指令发送至所述传递目标,即将运行指令传递给应用程序,使应用程序正常打开。
根本申请实施例提供的应用程序锁定方法,当接收到锁定指令之后,不会禁止用户访问系统桌面,而监测是否接收到用于开启应用程序的运行指令,然后判定运行指令的传递目标是否为预先设定的应用程序,只有当传递目标是是预先设定的应用程序时,才将运行指令截获,进而实现禁止预先设定的应用程序开启,本方案可以禁止部分应用程序的开启操作,而非对整个系统进行锁定,用户可以预先自定义锁定哪些应用程序,由此可提高锁定操作的灵活性和便利性。
在具有触摸屏的终端中,所述运行指令可以是用户的触摸操作。上述步骤S3可以包括:
S31,获取用户触摸操作对应的坐标,即用户触摸屏幕的位置;
S32,判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。本方案通过监测触摸坐标的方式来判断用户是否要打开某一应用程序,而不必过多涉及系统权限问题,实现难度较低,实用性较强。
作为一个优选的实施方式,在步骤S1之前,还可以包括:
S01,根据用户的选择确定所述预设应用程序,例如可以提供一个应用程序表单,用户可以在其中选择锁定时需要禁止访问的应用程序;
S02,确定所述预设应用程序的图标所处的位置,即应用程序的图标在系统桌面上的位置,对于现有的智能终端系统,应用程序的图标在桌面上的位置是相对固定的,因此确定图标位置的方式有多种,例如根据应用程序的名称在桌面中查找图标,然后确定图标在桌面坐标范围中的子坐标范围即可;
S03,将所述预设应用程序的图标所处的位置作为所述预定坐标范围,进而在进入锁定状态后,实时监测用户是否点击了预定坐标范围。
实施例2
本申请实施例提供了一种应用程序锁定装置,如图2所示,该装置包括:
锁定操作监测单元21,用于监测是否接收到锁定指令;
运行指令监测单元22,用于当接收到锁定指令时,监测是否接收到运行指令;
判断单元23,用于当接收到运行指令时,判断所述运行指令的传递目 标是否为预设应用程序;
截获单元24,用于当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
根本申请实施例提供的应用程序锁定装置,当接收到锁定指令之后,不会禁止用户访问系统桌面,而监测是否接收到用于开启应用程序的运行指令,然后判定运行指令的传递目标是否为预先设定的应用程序,只有当传递目标是是预先设定的应用程序时,才将运行指令截获,进而实现禁止预先设定的应用程序开启,本方案可以禁止部分应用程序的开启操作,而非对整个系统进行锁定,用户可以预先自定义锁定哪些应用程序,由此可提高锁定操作的灵活性和便利性。
优选地,还包括:
传递单元25,用于当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
优选地,所述运行指令为用户触摸操作;所述判断单元包括:
坐标获取单元,用于获取用户触摸操作对应的坐标;
坐标判断单元,用于判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
优选地,还包括:
锁定目标确定单元,用于根据用户的选择确定所述预设应用程序;
图标位置确定单元,用于确定所述预设应用程序的图标所处的位置;
锁定位置确定单元,用于将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
实施例3
如图3所示,本申请实施例还提供了一种电子设备,包括至少一个处理器810;以及,与所述至少一个处理器810通信连接的存储器800;其中,所述存储器800存储有可被所述至少一个处理器810执行的指令,所述指令被所述至少一个处理器810执行,以使所述至少一个处理器810能够:监测是否接收到锁定指令;当接收到锁定指令时,监测是否接收到运行指令;当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。所述电子设备还包括与所述存储器800和所述处理器电连接的输入装置830和输出装置840,所述电连接优选为通过总线连接。
本实施例的所述电子设备,优选地,使得所述至少一个处理器还能够:当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
本实施例的所述电子设备,优选地,所述运行指令为用户触摸操作,所述判断所述运行指令的传递目标是否为预设应用程序包括:获取用户触摸操作对应的坐标;判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
本实施例的所述电子设备,优选地,在所述监测是否接收到锁定指令之前,使得所述至少一个处理器还能够:根据用户的选择确定所述预设应用程序;确定所述预设应用程序的图标所处的位置;将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
实施例4
本申请实施例还提供了一种非易失性计算机存储介质,所述存储介质存储有计算机可执行指令的所述计算机可执行指令,当由电子设备执行时使得电子设备能够:监测是否接收到锁定指令;当接收到锁定指令时,监测是否接收到运行指令;当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
本实施例的所述存储介质,优选地,使得所述电子设备还能够:当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
本实施例的所述存储介质,优选地,所述运行指令为用户触摸操作,所述判断所述运行指令的传递目标是否为预设应用程序包括:获取用户触摸操作对应的坐标;判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
本实施例的所述存储介质,优选地,在所述监测是否接收到锁定指令之前,使得所述电子设备还能够:根据用户的选择确定所述预设应用程序;确定所述预设应用程序的图标所处的位置;将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
实施例5
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品包 括存储在非易失性计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行前述实施例所述的方法。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,上述实施例仅仅是为清楚地说明所作的举例,而并非对实施方式的限定。对于所属领域的普通技术人员来说,在上述说明的基础上还可以做出其它不同形式的变化或变动。这里无需也无法对所有的实施方式予以穷举。而由此所引伸出的显而易见的变化或变动仍处于本申请的保护范围之中。

Claims (17)

  1. 一种应用程序锁定方法,其特征在于,包括:
    监测是否接收到锁定指令;
    当接收到锁定指令时,监测是否接收到运行指令;
    当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;
    当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
  2. 根据权利要求1所述的方法,其特征在于,还包括:
    当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
  3. 根据权利要求1或2所述的方法,其特征在于,所述运行指令为用户触摸操作;所述判断所述运行指令的传递目标是否为预设应用程序,包括:
    获取用户触摸操作对应的坐标;
    判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
  4. 根据权利要求3所述的方法,其特征在于,在所述监测是否接收到锁定指令之前,还包括:
    根据用户的选择确定所述预设应用程序;
    确定所述预设应用程序的图标所处的位置;
    将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
  5. 一种应用程序锁定装置,其特征在于,包括:
    锁定操作监测单元,用于监测是否接收到锁定指令;
    运行指令监测单元,用于当接收到锁定指令时,监测是否接收到运行指令;
    判断单元,用于当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;
    截获单元,用于当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
  6. 根据权利要求5所述的装置,其特征在于,还包括:
    传递单元,用于当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
  7. 根据权利要求5或6所述的装置,其特征在于,所述运行指令为用户触摸操作;所述判断单元包括:
    坐标获取单元,用于获取用户触摸操作对应的坐标;
    坐标判断单元,用于判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
  8. 根据权利要求7所述的装置,其特征在于,还包括:
    锁定目标确定单元,用于根据用户的选择确定所述预设应用程序;
    图标位置确定单元,用于确定所述预设应用程序的图标所处的位置;
    锁定位置确定单元,用于将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
  9. 一种电子设备,其特征在于,包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:
    监测是否接收到锁定指令;
    当接收到锁定指令时,监测是否接收到运行指令;
    当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;
    当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
  10. 根据权利要求9所述的电子设备,其特征在于,使得所述至少一个处理器还能够:当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
  11. 根据权利要求9或10所述的电子设备,其特征在于,所述运行指令为用户触摸操作,所述判断所述运行指令的传递目标是否为预设应用 程序包括:获取用户触摸操作对应的坐标;判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
  12. 根据权利要求11所述的电子设备,其特征在于,在所述监测是否接收到锁定指令之前,使得所述至少一个处理器还能够:根据用户的选择确定所述预设应用程序;确定所述预设应用程序的图标所处的位置;将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
  13. 一种非易失性计算机存储介质,其特征在于,所述存储介质存储有计算机可执行指令,所述计算机可执行指令当由电子设备执行时使得电子设备能够:
    监测是否接收到锁定指令;
    当接收到锁定指令时,监测是否接收到运行指令;
    当接收到运行指令时,判断所述运行指令的传递目标是否为预设应用程序;
    当所述运行指令的传递目标是预设应用程序时,截获所述运行指令。
  14. 根据权利要求13所述的存储介质,其特征在于,使得所述电子设备还能够:当所述运行指令的传递目标不是预设的应用程序时,将所述运行指令发送至所述传递目标。
  15. 根据权利要求13或14所述的存储介质,其特征在于,所述运 行指令为用户触摸操作,所述判断所述运行指令的传递目标是否为预设应用程序包括:获取用户触摸操作对应的坐标;判断所述坐标是否在预定坐标范围内,所述预定坐标范围是所述预设应用程序的图标所处的位置。
  16. 根据权利要求15所述的存储介质,其特征在于,在所述监测是否接收到锁定指令之前,使得所述电子设备还能够:根据用户的选择确定所述预设应用程序;确定所述预设应用程序的图标所处的位置;将所述预设应用程序的图标所处的位置作为所述预定坐标范围。
  17. 一种计算机程序产品,所述计算机程序产品包括存储在非易失性计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,其特征在于,当所述程序指令被计算机执行时,使所述计算机执行权利要求1-4中任一项所述的方法。
PCT/CN2016/102147 2016-04-01 2016-10-14 一种应用程序锁定方法、装置及电子设备 WO2017166781A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610202127.0A CN105892819A (zh) 2016-04-01 2016-04-01 一种应用程序锁定方法及装置
CN201610202127.0 2016-04-01

Publications (1)

Publication Number Publication Date
WO2017166781A1 true WO2017166781A1 (zh) 2017-10-05

Family

ID=57013317

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/102147 WO2017166781A1 (zh) 2016-04-01 2016-10-14 一种应用程序锁定方法、装置及电子设备

Country Status (2)

Country Link
CN (1) CN105892819A (zh)
WO (1) WO2017166781A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105892819A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种应用程序锁定方法及装置
CN106775189A (zh) * 2016-11-17 2017-05-31 上海斐讯数据通信技术有限公司 一种应用程序锁定方法及锁定系统
CN108171044A (zh) * 2017-12-28 2018-06-15 深圳豪客互联网有限公司 一种权限自动获取方法及装置
CN108509814B (zh) * 2018-03-29 2020-10-09 无锡睿勤科技有限公司 一种终端的锁定装置及锁定方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719953A (zh) * 2009-12-17 2010-06-02 宇龙计算机通信科技(深圳)有限公司 一种移动终端的操控方法、系统及移动终端
CN103336924A (zh) * 2013-07-03 2013-10-02 上海斐讯数据通信技术有限公司 用于移动终端应用程序的启动锁
US20140258937A1 (en) * 2013-03-11 2014-09-11 Samsung Electronics Co., Ltd. Method for controlling display and an electronic device thereof
CN105892819A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种应用程序锁定方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103853485B (zh) * 2012-12-07 2018-10-02 腾讯科技(深圳)有限公司 触摸屏解锁方法及终端
CN104331648A (zh) * 2014-11-24 2015-02-04 上海斐讯数据通信技术有限公司 应用的加锁系统、加锁方法、解锁系统及解锁方法
CN105389484A (zh) * 2015-12-23 2016-03-09 珠海格力电器股份有限公司 应用程序的权限控制方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719953A (zh) * 2009-12-17 2010-06-02 宇龙计算机通信科技(深圳)有限公司 一种移动终端的操控方法、系统及移动终端
US20140258937A1 (en) * 2013-03-11 2014-09-11 Samsung Electronics Co., Ltd. Method for controlling display and an electronic device thereof
CN103336924A (zh) * 2013-07-03 2013-10-02 上海斐讯数据通信技术有限公司 用于移动终端应用程序的启动锁
CN105892819A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种应用程序锁定方法及装置

Also Published As

Publication number Publication date
CN105892819A (zh) 2016-08-24

Similar Documents

Publication Publication Date Title
US10768736B2 (en) Method of processing fingerprint and electronic device thereof
EP3133894B1 (en) Method and apparatus for selecting terminal mode
KR102171082B1 (ko) 지문 처리 방법 및 그 전자 장치
WO2017166781A1 (zh) 一种应用程序锁定方法、装置及电子设备
EP2857967B1 (en) User interface management method and system
WO2017166623A1 (zh) 一种终端交互控制方法、装置及电子设备
EP2911084B1 (en) Service authorization methods and apparatuses
US9933878B2 (en) Operating a device having a touch-screen display
US11537408B2 (en) Method for managing application program use time offline, and terminal device
US8954736B2 (en) Limiting the functionality of a software program based on a security model
BR112014017739B1 (pt) Método, aparelho e dispositivo de processo de destravamento para um terminal
JP2017509277A (ja) スマート・ハードウェアデバイスの制御方法、装置、プログラム及び記録媒体
CN104866752B (zh) 一种应用保护方法及用户终端
TW201349012A (zh) 可攜式電子裝置解鎖系統及其解鎖方式設置方法
JP6858256B2 (ja) 決済アプリケーション分離方法および装置、ならびに端末
KR102282498B1 (ko) 디스플레이를 이용한 입력 처리 방법 및 장치
EP3293655B1 (en) Below the lock user interface with mixed authentication settings
EP3021250B1 (en) Electronic device and method for suggesting response manual in occurrence of denial
US10437978B2 (en) Enhancing security of a mobile device based on location or proximity to another device
WO2017185568A1 (zh) 一种管理应用程序的方法和装置
WO2017041608A1 (zh) 系统开关的锁定方法、装置和移动终端
WO2017101336A1 (zh) 快捷开关的控制方法及装置
US20180225457A1 (en) Enhancing security of a mobile device based on location or proximity to another device
WO2017166611A1 (zh) 一种媒体文件删除方法、装置和电子设备
JP6984387B2 (ja) 情報処理装置、アクセス制御方法、プログラムおよびシステム

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896551

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896551

Country of ref document: EP

Kind code of ref document: A1