WO2018053819A1 - 离线管理应用程序使用时间的方法、及终端设备 - Google Patents

离线管理应用程序使用时间的方法、及终端设备 Download PDF

Info

Publication number
WO2018053819A1
WO2018053819A1 PCT/CN2016/099991 CN2016099991W WO2018053819A1 WO 2018053819 A1 WO2018053819 A1 WO 2018053819A1 CN 2016099991 W CN2016099991 W CN 2016099991W WO 2018053819 A1 WO2018053819 A1 WO 2018053819A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
time
setting
authentication
duration
Prior art date
Application number
PCT/CN2016/099991
Other languages
English (en)
French (fr)
Inventor
于双鑫
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to BR112019005714-5A priority Critical patent/BR112019005714B1/pt
Priority to EP16916558.6A priority patent/EP3508997B1/en
Priority to AU2016424054A priority patent/AU2016424054B2/en
Priority to CA3037973A priority patent/CA3037973C/en
Priority to PCT/CN2016/099991 priority patent/WO2018053819A1/zh
Priority to EP23155519.4A priority patent/EP4220452A3/en
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201680080593.4A priority patent/CN108604265B/zh
Priority to US16/336,293 priority patent/US10824439B2/en
Priority to JP2019515983A priority patent/JP6736766B2/ja
Priority to CN202011472705.5A priority patent/CN112560001B/zh
Publication of WO2018053819A1 publication Critical patent/WO2018053819A1/zh
Priority to US17/011,134 priority patent/US11537408B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/24Resetting means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method for offline management of application usage time, and a terminal device.
  • parents have a need for children to use the App for parental control or "child locks.” If the unlocked “key” is carried by the parent, the “child lock” effect will be more effective.
  • the method of offline management APP usage time is mainly: the time control function provided by the children's App.
  • the specific implementation process is: the module has a built-in control time range module, in which the system authority of the mobile phone or the tablet is usually not obtained, that is, the logic time is judged by reading the system time.
  • the above technical solution can bypass the time control setting of the App by modifying the system time, and the effectiveness is low; in addition, the control of the use time is not flexible.
  • the embodiments of the present invention provide a method for offline management of application usage time, and a terminal device. Used to manage the usage time of the app flexibly and efficiently in an offline scenario.
  • the embodiment of the invention provides a method for offlinely managing application usage time, including:
  • the target application corresponding to the application icon belongs to an application that is set with a time control rule, accumulating the actual usage duration of the target application;
  • the time control rule includes: duration setting and extension setting Set
  • the prompt time limit is insufficient; if the extension setting is set to yes, further prompting whether an extended time is required;
  • the usage time is extended if the identity authentication is passed, otherwise the target application is exited and locked after the actual usage duration reaches the duration setting.
  • the display of the application icons on the desktop does not necessarily need to manage the use time.
  • Those applications that need to manage the use time are set with the time control rule, which is called the target application; in this embodiment, the accumulated Timing should be understood as the cumulative time that the target application is used, that is, the target application is closed and reused after being used, then the total time of the previous and the last time is accumulated.
  • the embodiment of the present invention is not unique. limited.
  • the above identity authentication is preferably implemented by using fingerprint authentication to prevent the time control scheme from being invalid due to password leakage.
  • the above extension setting refers to a setting for extending the usage time, and may generally include: resetting the usage time, or increasing the duration setting; as long as it is a way for the target application to obtain a longer usage time, this is possible.
  • the embodiments of the invention are not limited to this.
  • the extended setting includes: a reset setting or a delay setting
  • the extending the usage time if the identity authentication is passed includes: if the extension is set to the reset setting, resetting the accumulated timing after determining that the identity authentication is passed; if the extension is set to the delay setting, determining the identity After the authentication is passed, the length of time is set to be specified.
  • the reset setting is a method of clearing the accumulated time to zero
  • the delay setting is to increase the length of time that the target application can use. It is convenient to control the user to extend the use time. Although the usage time has been extended, there is a reminder in the middle that it is still possible to remind the user to reduce the use of the target application. If the current target application is not the creator of the authentication method, then the authentication will not be obtained to obtain an extended usage time, so that the control of the usage time can be achieved. This allows for the consideration of two different types of users using the target application in the terminal device.
  • the time control rule further includes: an interval setting;
  • the method further includes:
  • the target application of the application displays no information indicating the countdown of the difference between the duration and the actual length of use as the starting point.
  • This embodiment further sets the time control rule to include the interval setting, because some target applications can set a shorter duration setting, and need to avoid frequent use, so adding the interval setting can achieve better results.
  • the embodiment of the present invention further provides a setting scheme of the time control rule, which is specifically as follows: before the target application corresponding to the application icon is started after the application icon is clicked The method further includes:
  • the embodiment of the present invention further provides an implementation scheme for starting a scenario based on different management interfaces and using different control policies, as follows: the management setting interface of the display application is after the user authentication is passed. Display a list of apps, including:
  • the management interface of the application After receiving the application time management instruction on the setting management interface, displaying the management interface of the application; if the management interface of the application is started for the first time, the application list is directly displayed, and the authentication setting is received; if this is not the first time
  • the user authentication is performed by using the authentication mode specified by the authentication setting, and the application list is displayed after the user authentication is passed.
  • the embodiment of the present invention may preferably use fingerprint authentication to avoid the use of passwords being stolen.
  • fingerprint authentication may set different finger fingerprints, which may be commonly used fingers, as follows:
  • the authentication setting includes fingerprint authentication;
  • the fingerprint authentication includes: setting a fingerprint authentication of a finger.
  • the embodiment of the present invention further provides an implementation scheme for displaying a desktop and entering an application management solution in an application scenario in which a time control rule is first set, as follows: Before starting the management interface of the application, directly displaying the application list, the method further includes:
  • the lock screen interface is displayed, and after the lock screen authentication is passed, the terminal device is executed. Display the desktop after the move.
  • the embodiment of the present invention further provides an implementation scheme for conveniently viewing the time control rule on the application icon displayed on the desktop, as follows: the displaying the application icon on the desktop includes:
  • the application icon is an icon corresponding to the target application that is set with the time control rule, displaying the annotation identifier on the application icon;
  • the time control rule is displayed if an instruction to click the tag identifier is received.
  • the second embodiment of the present invention further provides a terminal device, including:
  • a display unit configured to display a desktop after the terminal device is started, and display an application icon on the desktop
  • An application control unit configured to start a target application corresponding to the application icon after the application icon is clicked;
  • a timing unit configured to: when the target application corresponding to the application icon belongs to an application that is set with a time control rule, accumulate the actual usage duration of the target application; the time control rule includes: duration Set and extend the settings;
  • a prompting unit configured to: if the difference between the duration setting and the actual usage duration is less than a predetermined threshold, the prompt time quota is insufficient; if the extension setting is set to yes, further prompting whether an extended time is required;
  • the application control unit is further configured to perform identity authentication after receiving an instruction that requires an extended time, and extend the usage time if the identity authentication is passed, otherwise, after the actual use duration reaches the duration setting, the device is exited and locked.
  • the target application is further configured to perform identity authentication after receiving an instruction that requires an extended time, and extend the usage time if the identity authentication is passed, otherwise, after the actual use duration reaches the duration setting, the device is exited and locked.
  • the extended setting includes: a reset setting or a delay setting
  • the application control unit is configured to extend the usage time if the identity authentication is passed: if the extension is set to a reset setting, resetting the accumulated timing after determining that the identity authentication is passed; if the extension is set to a delay
  • the setting lengthens the time specified by the duration setting after determining that the identity authentication is passed.
  • the time control rule further includes: an interval setting;
  • the application control unit is further configured to determine whether the interval between the current startup time and the last shutdown time of the target program is consistent with the target application corresponding to the application icon after the application icon is clicked. Interval setting, if yes, executing after the application icon is clicked And moving the target application corresponding to the application icon to control the display unit to display the prompt information of the countdown starting from the difference between the duration and the actual use duration.
  • the display unit is further configured to display an application setting interface of the application before the target application corresponding to the application icon is started after the application icon is clicked, and the user authentication is passed. After displaying the application list;
  • the terminal device further includes:
  • a receiving unit configured to receive the target application selected by the user, and receive the time control rule for the target program
  • the display unit is further configured to display a time control rule of the target application in a display area of the application icon of the application list.
  • the display unit is configured to display an application setting interface of the application, and display the application list after the user is authenticated, including: displaying the application after receiving the application time management instruction on the setting management interface The management interface; if the management interface of the application is started for the first time, the application list is directly displayed, and the authentication setting is received; if the management interface of the application is not started for the first time, the authentication setting is used.
  • the specified authentication mode is used for user authentication, and the application list is displayed after the user authentication is passed.
  • the authentication setting includes fingerprint authentication
  • the fingerprint authentication includes: setting a fingerprint authentication of a finger.
  • the display unit is further configured to display the lock screen after the terminal device starts before directly displaying the application list, if the management interface of the application is started for the first time.
  • the interface is executed on the display desktop after the lock screen authentication is passed.
  • the displaying unit configured to display an application icon on the desktop, includes:
  • the application icon is an icon corresponding to the target application to which the time control rule is set, displaying the annotation identifier on the application icon; if receiving the instruction to click the annotation identifier, displaying the time control rule .
  • a time control rule is set for the target application, the time control rule includes the duration setting and the extended setting, and the accumulated time is used for timing, thereby avoiding the use of the system time to cause security. Less sexual problem; can be set by duration
  • the user can control the use time at the same time, and the extended setting method limits the use time of the non-authenticated user to the target application on the one hand, and ensures the normal use of the authenticated user and reminds the use time on the other hand;
  • the application can set the time control rules independently. Therefore, the usage time of the App can be managed flexibly and efficiently in an offline scenario.
  • FIG. 1 is a schematic structural diagram of a system according to an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 11 is a schematic diagram of an operation interface according to an embodiment of the present invention.
  • FIG. 13 is a schematic flowchart of a method according to an embodiment of the present invention.
  • FIG. 14 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 15 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 16 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 17 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • the embodiment of the invention provides for freely controlling the usage time of any App on the terminal device through the App Time Manager (ATM) without the need for networking.
  • Absolute App usage duration and interval duration are used as timing criteria to avoid system time modification bypassing control.
  • ATM management authority authentication can call the system lock screen password.
  • the APP used in the mobile phone is taken as an example for illustration. It can be understood that the technical solution of the embodiment of the present invention can also be applied to other terminal devices other than the mobile phone, such as a personal computer, a tablet computer, or the like. Terminal Equipment. In the following embodiment, the following aspects will be described in detail:
  • the system structure of the embodiment of the present invention includes:
  • ATM permission setting App foreground running timing module, App time management module, App time quota prompting module, App locking module, and privilege control module;
  • the ATM permission setting is the input part of the system structure
  • the App time limit prompt module is a module for controlling output, and the output prompt information includes: an alarm, a pop-up window, and an automatic lock screen prompt;
  • the App Locking Module is the result of time control processing, including: exiting the running app, locking the time prompt, and so on.
  • App front-end running timing module regularly report the running time slice of the foreground app.
  • App time management module add, delete and change the management App and management mode, and store the accumulated usage time of the app.
  • App time limit prompt module call the alarm interface; provide material management of the lock screen interface.
  • App lock module call to exit the App program interface; start the App lock program; prompt duration when the excess is unavailable
  • ATM permission settings Initialize permission settings.
  • Privilege Control Module Authentication authority that intervenes in time-managed apps to provide reset or delay capabilities.
  • the user activates the mobile phone, then enters the mobile phone all settings management interface, and finds the menu of the "application time manager".
  • the ATM inlet as noted in Figure 2 below.
  • the time control rules shown in Figure 7 include: a duration of 40 minutes, an interval of 5 minutes, and a reset prompt and a time delay prompt.
  • the application icon App1 is displayed as "managed" and the contents of the above time control rule.
  • the application is reset or delayed. Prompt reset or delay. Confirm or set after authentication is required.
  • the rights interaction includes process one and process two, and the two processes are juxtaposed, and at least one process is to be executed. As shown in Figure 12, it includes:
  • the ATM permission setting calls the system lock screen module, sets the system password lock screen, and the permission authentication can use the lock screen password.
  • the system lock screen module returns the result after determining that the setting is successful.
  • the ATM permission setting invokes the system fingerprint module, sets a fingerprint as the authentication credential, and uses the specified fingerprint as the authentication credential.
  • the time control rule sets the duration and interval, and the reset or delay is set to Yes.
  • the management system interaction process for App1 usage time is as follows, as shown in FIG. 13, including:
  • the terminal At time t1, the terminal displays that the foreground is reporting time t1 when using App1.
  • the foreground running timing module reports the time slice t2-t1 at time t2, and the difference is transmitted to the time management module, and the time management module records that the application 1 has used the t2-t1 time.
  • App1 is used to exit at time t3, and the terminal displays that the foreground sends a t3 to the foreground running timing module; the foreground running timing module records the exit time point t3, which is different from the last reported time slice time t2, and is transmitted to the time management module. At this time, the time management module records that App1 shares the t3-t1 time.
  • App1 is used again, and the terminal displays that the foreground reports to the time management module t4;
  • the time management module first determines whether the last use exit to the current use time difference satisfies the time interval setting, that is, whether t4-t3 is smaller than the use interval. If it is satisfied, it is allowed to use, and the prompt "countdown XX minutes XX seconds" is not satisfied. This embodiment assumes that the subsequent flow is continued.
  • the foreground running timing module reports t5-t4 to the time management module at time t5, and the time management module records that the remaining time of App1 is less than T1 and is reported to the time limit prompting module;
  • the time limit prompt module popup window prompts the user that the time balance is less than T1.
  • App1 uses T1 time again, and the foreground running timing module reports t6-t5 to the time management module at time t6, the time management module records the quota is full, and sends a prompt with zero remaining time to the locking module;
  • the locking module sends a reset or delay query to the privilege control module, and the privilege control module pops up to prompt the user whether to reset or delay.
  • Reset or delay setting needs to be authenticated first. After passing, it can continue to be used. If no, return the indication of locking App1 to the locking module. The locking module locks App1 and exits App1.
  • an independent setting and use time management manner can be performed for each App to make management more free. It can help improve the self-control of consumers who spend less time in the entertainment app time. Parents can also be provided with a fingerprint "key" that is carried around, which is more effective for children's time control on mobile devices.
  • the embodiment of the invention further provides a terminal device, as shown in FIG. 14, comprising:
  • a display unit 1401 configured to display a desktop after the terminal device is started, and display an application icon on the desktop;
  • the application control unit 1402 is configured to start a target application corresponding to the application icon after the application icon is clicked;
  • the timing unit 1403 is configured to: when the target application corresponding to the application icon belongs to the application that is set with the time control rule, accumulate the actual usage duration of the target application; the time control rule includes: Duration setting and extension setting;
  • the prompting unit 1404 is configured to: if the difference between the duration setting and the actual usage duration is less than a predetermined threshold, the prompt time quota is insufficient; if the extension setting is set to yes, further prompting whether an extended time is required;
  • the application control unit 1402 is further configured to perform identity authentication after receiving an instruction that requires an extended time, and extend the usage time if the identity authentication is passed, otherwise exit and lock after the actual usage duration reaches the duration setting.
  • the target application is further configured to perform identity authentication after receiving an instruction that requires an extended time, and extend the usage time if the identity authentication is passed, otherwise exit and lock after the actual usage duration reaches the duration setting.
  • the extended setting includes: a reset setting or a delay setting
  • the application control unit 1402 is configured to: if the identity authentication is passed, extending the usage time includes: if the extension is set to a reset setting, resetting the accumulated timing after determining that the identity authentication is passed; if the extension is set to be extended The time setting is to extend the time specified by the duration setting after determining that the identity authentication is passed.
  • the time control rule further includes: an interval setting;
  • the application control unit 1402 is further configured to start and start after the application icon is clicked Before determining, by using the target application corresponding to the icon, determining whether the interval between the current startup time and the last shutdown time of the target program meets the interval setting, and if yes, executing the The target application corresponding to the application icon controls whether the display unit 1401 displays the cue information of the countdown starting from the difference between the duration and the actual use duration.
  • the display unit 1401 is further configured to display a management setting interface of the application before the target application corresponding to the application icon is started after the application icon is clicked, and display an application list after the user passes the authentication;
  • the terminal device further includes:
  • the receiving unit 1501 is configured to receive the target application selected by the user, and receive the time control rule for the target program.
  • the display unit 1401 is further configured to display a time control rule of the target application in a display area of the application icon of the application list.
  • the display unit 1401 is configured to display a management setting interface of the application, and display the application list after the user is authenticated, including: displaying the management interface of the application after receiving the application time management instruction on the setting management interface; If the management interface of the application is started for the first time, the application list is directly displayed, and the authentication setting is received; if the management interface of the application is not started for the first time, the authentication specified by the authentication setting is used.
  • the method performs user authentication and displays the application list after the user authentication is passed.
  • the authentication setting includes fingerprint authentication
  • the fingerprint authentication includes: setting a fingerprint authentication of a finger.
  • the display unit 1401 is further configured to display the lock screen interface after the terminal device is started, if the management interface of the application is started for the first time, and the lock screen is displayed after the terminal device is started. After the authentication is passed, the display is performed on the display desktop.
  • the displaying unit 1401 for displaying an application icon on the desktop, includes:
  • the application icon is an icon corresponding to the target application to which the time control rule is set, displaying the annotation identifier on the application icon; if receiving the instruction to click the annotation identifier, displaying the time control rule .
  • the embodiment of the present invention further provides another terminal device, as shown in FIG. 16, comprising: a display screen 1601, an input and output device 1602, a processor 1603, and a memory 1604; wherein, the memory 1604 can Any data for storing the terminal device may also be used to provide a cache required by the processor 1603 to perform data processing;
  • the processor 1603 is configured to: execute: display a desktop after the terminal device is started, display an application icon on the desktop; and start a target application corresponding to the application icon after the application icon is clicked; If the target application corresponding to the application icon belongs to an application that is set with a time control rule, accumulating the actual usage duration of the target application; the time control rule includes: duration setting and extension setting If the difference between the duration setting and the actual usage duration is less than a predetermined threshold, the prompt time limit is insufficient; if the extension setting is set to yes, further prompting whether an extended time is required; if receiving After the instruction of the extended time is used for identity authentication, if the identity authentication is passed, the usage time is extended. Otherwise, after the actual use duration reaches the duration setting, the target application is exited and locked.
  • the extended setting includes: a reset setting or a delay setting
  • the processor 1603 is configured to control execution: if the identity authentication is passed, extending the usage time includes: if the extension is set to a reset setting, resetting the accumulated timing after determining that the identity authentication is passed; if the extension is set For the delay setting, the specified time is set to be extended after the identity authentication is determined to pass.
  • time control rule further includes: an interval setting
  • the processor 1603 is further configured to: control to determine an interval between the current startup time and the last shutdown time of the target program before the target application corresponding to the application icon is started after the application icon is clicked Whether the interval setting is met, if yes, the target application corresponding to the application icon is started after the application icon is clicked, and the difference between the duration setting and the actual usage duration is A reminder message for the countdown of the starting point.
  • the processor 1603 is further configured to: execute: display an application setting interface of the application before the target application corresponding to the application icon is started after the application icon is clicked, and display after the user passes the authentication Application List;
  • the processor 1603 is configured to control execution: display a management setting boundary of the application In the face, after the user authentication is passed, the application list is displayed, including:
  • the management interface of the application After receiving the application time management instruction on the setting management interface, displaying the management interface of the application; if the management interface of the application is started for the first time, the application list is directly displayed, and the authentication setting is received; if this is not the first time
  • the user authentication is performed by using the authentication mode specified by the authentication setting, and the application list is displayed after the user authentication is passed.
  • the authentication setting includes fingerprint authentication
  • the fingerprint authentication includes: setting a fingerprint authentication of a finger.
  • the processor 1603 is configured to control execution: if the management interface of the application is started for the first time, the application list is directly displayed, and the method further includes:
  • the lock screen interface is displayed.
  • the desktop is displayed after the terminal device is started.
  • the processor 1603 is configured to control execution: displaying an application icon on the desktop includes:
  • the application icon is an icon corresponding to the target application that is set with the time control rule, displaying the annotation identifier on the application icon;
  • the time control rule is displayed if an instruction to click the tag identifier is received.
  • the embodiment of the present invention further provides another terminal device.
  • the terminal device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal device is used as a mobile phone as an example:
  • FIG. 17 is a block diagram showing a partial structure of a mobile phone related to a terminal device according to an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 1710, a memory 1720, an input unit 1730, a display unit 1740, a sensor 1750, an audio circuit 1760, a wireless fidelity (WiFi) module 1770, and a processor 1780. And power supply 1790 and other components.
  • RF radio frequency
  • the RF circuit 1710 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the processor 1780 processes the data. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 1710 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 1710 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • the memory 1720 can be used to store software programs and modules, and the processor 1780 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1720.
  • the memory 1720 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1720 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1730 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 1730 may include a touch panel 1731 and other input devices 1732.
  • the touch panel 1731 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1731 or near the touch panel 1731. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 1731 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1780 is provided and can receive commands from the processor 1780 and execute them. In addition, resistive, capacitive, infrared, and surface acoustics can be used.
  • the touch panel 1731 is implemented in various types such as waves.
  • the input unit 1730 may also include other input devices 1732. Specifically, other input devices 1732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1740 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 1740 can include a display panel 1741.
  • the display panel 1741 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1731 can cover the display panel 1741. After the touch panel 1731 detects a touch operation thereon or nearby, the touch panel 1731 transmits to the processor 1780 to determine the type of the touch event, and then the processor 1780 according to the touch event. The type provides a corresponding visual output on display panel 1741.
  • the touch panel 1731 and the display panel 1741 are two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1731 and the display panel 1741 may be integrated. Realize the input and output functions of the phone.
  • the handset can also include at least one type of sensor 1750, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1741 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1741 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • An audio circuit 1760, a speaker 1761, and a microphone 1762 can provide an audio interface between the user and the handset.
  • the audio circuit 1760 can transmit the converted electrical data of the received audio data to the speaker 1761, and convert it into a sound signal output by the speaker 1761; on the other hand, the microphone 1762 converts the collected sound signal into an electrical signal, by the audio circuit 1760. After receiving, it is converted into audio data, and then processed by the audio data output processor 1780, sent to the other mobile phone via the RF circuit 1710, or outputted to the memory 1720 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone through the WiFi module 1770 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
  • FIG. 17 shows the WiFi module 1770, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 1780 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1720, and invoking data stored in the memory 1720, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 1780 may include one or more processing units; preferably, the processor 1780 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1780.
  • the handset also includes a power source 1790 (such as a battery) that powers the various components.
  • a power source 1790 (such as a battery) that powers the various components.
  • the power source can be logically coupled to the processor 1780 via a power management system to manage charging, discharging, and power management functions through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the steps performed by the terminal device in the above embodiment may be based on the hardware configuration shown in FIG.
  • terminal devices are only divided according to functional logic, but are not limited to the above-mentioned divisions, as long as the corresponding functions can be implemented; in addition, the specific names of the functional units are only for the purpose of facilitating mutual differentiation, and It is not intended to limit the scope of the invention.
  • the storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

本发明实施例公开了离线管理应用程序使用时间的方法、及终端设备,其中方法包括:在应用图标被点击后启动与应用图标对应的目标应用程序;若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;若所述时长设定与所述实际使用时长的差值小于预定阈值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。可以灵活并且有效的管理App的使用时间。

Description

离线管理应用程序使用时间的方法、及终端设备 技术领域
本发明涉及通信技术领域,特别涉及一种离线管理应用程序使用时间的方法、及终端设备。
背景技术
人们在手机上所花费的时间越来越多。这些用户中存在未留意或未有效控制应用(Application,App)使用时间的人群,他们对App的时间管理存在强烈需求。例如:用户手机上看视频,本来是打算随意浏览10分钟变成了全神贯注的半小时。
另外,家长存在对小孩子使用App进行家长控制或“童锁”的需求。如果解锁的“钥匙”是家长随身携带的,那么“童锁”效果会更有效。
目前离线管理APP使用时间的方法主要为:儿童类App自带的时间控制功能。具体实现过程是:App内置控制时间范围的模块,在这些时间范围内通常无法获得手机或平板的系统权限,也就是通过读取系统时间来进行逻辑判断。
以上技术方案,通过修改系统时间就可以绕过App的时间控制设定,有效性较低;另外,对使用时间控制不灵活。
发明内容
有鉴于此,本发明实施例提供了一种离线管理应用程序使用时间的方法、及终端设备。用于在离线场景下,灵活并且有效的管理App的使用时间。
本发明实施例提供了一种离线管理应用程序使用时间的方法,包括:
终端设备启动后显示桌面,在所述桌面上显示应用图标;
在所述应用图标被点击后启动与所述应用图标对应的目标应用程序;
若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;
若所述时长设定与所述实际使用时长的差值小于预定阈值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;
若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。
在以上实施例例中,桌面上显示应用图标并不一定都需要管理使用时间,那些需要管理使用时间的应用被设置了时间控制规则,则称为目标应用程序;在本实施例中,累计的计时应该理解为目标应用程序被使用的累计时间,也就是说:目标应用程序被使用后关闭再次使用,那么会累计前一次和后一次的总时间,至于如何实现累计本发明实施例不作唯一性限定。上述身份认证优选使用指纹认证的方式实现,防止因密码泄露导致时间控制方案失效。上述延长设定是指对使用时间进行延长的设置,通常可以包括:重置使用时间,或者,增加时长设定;只要是能够让目标应用程序获得更长使用时间的方式都是可以的,本发明实施例对此不予唯一性限定。
在一个可选的实现方式中,所述延长设定包括:重置设定或延时设定;
所述若身份认证通过则延长使用时间包括:若所述延长设定为重置设定,在确定身份认证通过后重置累计计时;若所述延长设定为延时设定,在确定身份认证通过后延长所述时长设定指定的时间。
在本实施例中,重置设定是将累计的时间清零重新计时的方式,延时设定则是增加目标应用程序可以使用的时长。可以方便控制用户延长使用时间。虽然使用时间被延长了,但是中间有一次提醒,仍然可以达到提醒用户减少使用目标应用程序的目的。如果当前使用目标应用程序的不是认证方式的设定者,那么将不能通过身份认证从而获得延长使用时间,因此可以实现使用时间的控制。从而兼顾两种不同类型的使用者使用终端设备中的目标应用程序。
在一个可选的实现方式中,所述时间控制规则还包括:间隔设置;
在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,所述方法还包括:
确定所述目标程序本次启动时刻与上次关闭时刻的间隔时间是否符合所述间隔设置,若是则执行所述在所述应用图标被点击后启动与所述应用图标对 应的目标应用程序,否显示以所述时长设定与所述实际使用时长的差值为起点的倒计时的提示信息。
本实施例进一步设定了时间控制规则中包含间隔设置,这是因为一些目标应用程序可以设置较短的时长设定,需要避免频繁被使用,因此加入间隔设置可以达到较好的效果。
在一个可选的实现方式中,本发明实施例进一步还提供了时间控制规则的设置方案,具体如下:,所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,所述方法还包括:
显示应用程序的管理设置界面,在用户认证通过后显示应用列表;
接收所述用户选择的所述目标应用程序,接收对所述目标程序的所述时间控制规则;
在所述应用列表的所述应用图标的显示区域中显示所述目标应用的时间控制规则。
在一个可选的实现方式中,本发明实施例还提供了基于不同的管理界面启动场景,使用不同的控制策略的实现方案,如下:所述显示应用程序的管理设置界面,在用户认证通过后显示应用列表,包括:
在设置管理界面接收到应用时间管理指令后,显示应用程序的管理界面;若本次为首次启动所述应用程序的管理界面,则直接显示应用列表,并接收认证设定;若本次非首次启动所述应用程序的管理界面,则使用所述认证设定指定的认证方式进行用户认证,在用户认证通过后显示应用列表。
在一个可选的实现方式中,本发明实施例可以优选使用指纹认证,避免使用密码被窃取的情况,另外,指纹认证可以设定不同的手指指纹,通常可以是不常用的手指,具体如下:所述认证设定包括指纹认证;
所述指纹认证包含:设定手指的指纹认证。
在一个可选的实现方式中,本发明实施例进一步还提供了在初次设定时间控制规则的应用场景下,显示桌面并进入应用程序管理解决的实现方案,如下:所述若本次为首次启动所述应用程序的管理界面,则直接显示应用列表之前,所述方法还包括:
终端设备启动后显示锁屏界面,在锁屏认证通过后,执行所述终端设备启 动后显示桌面。
在一个可选的实现方式中,本发明实施例还提供了在桌面上显示的应用图标上方便地查看时间控制规则的实现方案,如下:所述在所述桌面上显示应用图标包括:
若所述应用图标为被设置了时间控制规则的目标应用程序所对应的图标,则在所述应用图标上显示标注标识;
若接收到点击所述标注标识的指令,则显示所述时间控制规则。
二方面本发明实施例还提供了一种终端设备,包括:
显示单元,用于在所述终端设备启动后显示桌面,在所述桌面上显示应用图标;
应用控制单元,用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序;
计时单元,用于若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;
提示单元,用于若所述时长设定与所述实际使用时长的差值小于预定阈值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;
所述应用控制单元,还用于若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。
在一个可选的实现方式中,所述延长设定包括:重置设定或延时设定;
所述应用控制单元,用于若身份认证通过则延长使用时间包括:若所述延长设定为重置设定,在确定身份认证通过后重置累计计时;若所述延长设定为延时设定,在确定身份认证通过后延长所述时长设定指定的时间。
在一个可选的实现方式中,所述时间控制规则还包括:间隔设置;
所述应用控制单元,还用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,确定所述目标程序本次启动时刻与上次关闭时刻的间隔时间是否符合所述间隔设置,若是则执行所述在所述应用图标被点击后启 动与所述应用图标对应的目标应用程序,否控制所述显示单元显示以所述时长设定与所述实际使用时长的差值为起点的倒计时的提示信息。
在一个可选的实现方式中,所述显示单元,还用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,显示应用程序的管理设置界面,在用户认证通过后显示应用列表;
所述终端设备还包括:
接收单元,用于接收所述用户选择的所述目标应用程序,接收对所述目标程序的所述时间控制规则;
所述显示单元,还用于在所述应用列表的所述应用图标的显示区域中显示所述目标应用的时间控制规则。
在一个可选的实现方式中,所述显示单元,用于显示应用程序的管理设置界面,在用户认证通过后显示应用列表,包括:在设置管理界面接收到应用时间管理指令后,显示应用程序的管理界面;若本次为首次启动所述应用程序的管理界面,则直接显示应用列表,并接收认证设定;若本次非首次启动所述应用程序的管理界面,则使用所述认证设定指定的认证方式进行用户认证,在用户认证通过后显示应用列表。
在一个可选的实现方式中,所述认证设定包括指纹认证;
所述指纹认证包含:设定手指的指纹认证。
在一个可选的实现方式中,所述显示单元,还用于所述若本次为首次启动所述应用程序的管理界面,则直接显示应用列表之前,在所述终端设备启动后显示锁屏界面,在锁屏认证通过后,执行在所述显示桌面。
在一个可选的实现方式中,所述显示单元,用于在所述桌面上显示应用图标包括:
若所述应用图标为被设置了时间控制规则的目标应用程序所对应的图标,则在所述应用图标上显示标注标识;若接收到点击所述标注标识的指令,则显示所述时间控制规则。
从以上技术方案可以看出,具有以下优点:针对目标应用程序设置有时间控制规则,时间控制规则包含了时长设定以及延长设定,使用累计时间的方式进行计时,避免了采用系统时间导致安全性较低的问题;通过时长设定可以方 便用户使用的同时控制使用时间,另外通过延长设定的方式一方面限制非认证用户对目标应用的使用时间,另一方面保证了认证用户的正常使用并提醒使用时长;另外,对于每个目标应用程序可以分别独立设定时间控制规则。因此可以在离线场景下,灵活并且有效的管理App的使用时间。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例系统架构示意图;
图2为本发明实施例操作界面示意图;
图3为本发明实施例操作界面示意图;
图4为本发明实施例操作界面示意图;
图5为本发明实施例操作界面示意图;
图6为本发明实施例操作界面示意图;
图7为本发明实施例操作界面示意图;
图8为本发明实施例操作界面示意图;
图9为本发明实施例操作界面示意图;
图10为本发明实施例操作界面示意图;
图11为本发明实施例操作界面示意图;
图12为本发明实施例方法流程示意图;
图13为本发明实施例方法流程示意图;
图14为本发明实施例终端设备结构示意图;
图15为本发明实施例终端设备结构示意图;
图16为本发明实施例终端设备结构示意图;
图17为本发明实施例终端设备结构示意图。
具体实施方式
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
本发明实施例提供在无需连网情况下,通过App时间管理器(App Time Manager,ATM)自由管控终端设备上任意App的使用时间。采用绝对的App使用时长和间隔时长作为计时标准,避免系统时间的修改绕过管控。ATM的管理权限认证可调用系统锁屏密码,对于支持指纹的设备更推荐使用系统特定指纹作为认证凭据,解决了家长手机锁屏密码易泄露的问题。
在以下实施例中,将以手机中使用的APP为例进行举例说明,可以理解的是本发明实施例的技术方案还可以应用在手机以外的其他终端设备,例如:个人电脑、平板电脑或者其他终端设备。一下实施例,将分别就如下几个方面进行详细说明:
一、本发明实施例的系统结构,如图1所示包括:
ATM权限设置、App前台运行计时模块、App时间管理模块、App时间额度提示模块、App锁定模块,以及特权控制模块;
其中,ATM权限设置是作为系统结构的输入部分;
App时间额度提示模块是控制输出的模块,输出提示信息包括:闹铃、弹窗,以及自动以锁屏提示等;
App锁定模块则是时间控制的处理结果,包括:退出运行中的App,锁定时间提示等。
二、以上图1所示的系统结构中各模块详细说明如下:
App前台运行计时模块:定时上报前台App的运行时间片。
App时间管理模块:对管理的App和管理方式进行增删改查,存储App累计使用时间。
App时间额度提示模块:调用闹钟接口;提供锁屏界面的素材管理。
App锁定模块:调用退出App程序接口;启动App锁定程序;提示时长用时超额不可用状态
ATM权限设置:初始化权限设定。
特权控制模块:认证权限,对进行时间管理的App进行干预,提供重置或延时功能。
三、基于用户侧的关键流程举例:
第一步:
如图2所示,用户启动手机,然后进入手机全部设置管理界面,找到“应用时间管理器”的菜单。如下图2中标注的ATM入口。
第二步:
用户初次使用时,如图3所示,可以直接进入权限模块管理页面进行权限设置;具体可以是通过开关控制选择权限控制方式,带有指纹的设备推荐使用指纹认证。指纹或数字密码认证均可以通过调用手机系统相关模块实现。
如果用户打开指纹开关,会弹出选择对话框,然后选择具体哪个指纹,如下图4所示。
第三步:
如图5所示进入ATM页面,选择“应用管理”后,如图6所示进入手机ATM应用管理界面,显示App应用列表,点击App1进入App1的管理设置页面,如图7所示的App1的ATM设置。
第四步:
设置App的时间控制规则,以下图App1为例,时长、间隔需要设定数值并选择时间单位。重置提示和延时提示选择,只提供“是”或“否”选项。
在图7所示的时间控制规则包括:使用时长40分钟,使用间隔5分钟,以及重置提示和延时提示均为否。
设定完成回到“ATM应用管理”界面效果如图8所示。
在应用图标App1显示为“已管理”以及上述时间控制规则的内容。
第五步:
假设App1设定被管理并且使用一次后,在手机桌面上显示如图9所示。App1右上角标注圈A,代表被ATM程序管理。点击图标,如图10所示可见ATM信息剩余时长,和使用间隔倒计时。
第六步:
如图11所示,App使用时长到期退出前,对于设置过重置或延时的App, 提示重置或延时。需要认证后进行确认或设定。
四、权限相关的交互过程:
在本实施例中,权限交互包括过程一和过程二,这两个过程是并列的,至少有一个过程要执行到。如图12所示,包括:
过程一,ATM权限设置调用系统锁屏模块,设置系统密码锁屏,权限认证可使用锁屏密码。系统锁屏模块在确定设置成功后返回结果。
过程二,ATM权限设置调用系统指纹模块,设置某个指纹作为认证凭据,使用指定指纹作为认证凭据。
五、计时和管理交互:
以App1为例,其时间控制规则设置了时长和间隔两种方式,并且重置或延时被设置为是,对App1使用时间的管理系统交互过程如下,如图13所示,包括:
1301:t1时刻终端显示前台在使用App1时上报时刻t1。
1302:前台运行计时模块在t2时刻上报时间片t2-t1,差值传给时间管理模块,时间管理模块记录App1已用t2-t1时间。
1303:App1使用在时刻t3退出,终端显示前台向前台运行计时模块发送t3;前台运行计时模块记录退出时间点t3,与上次上报时间片时刻t2作差,传给时间管理模块。此时时间管理模块记录App1共用t3-t1时间。
1304:App1再次使用,终端显示前台向时间管理模块上报t4;
1305:时间管理模块先判断上次使用退出到本次使用时间差是否满足时间间隔设定,即t4-t3是否小于使用间隔。若满足则允许使用,不满足提示“倒计时XX分XX秒”。本实施例假定满足继续后续流程。
1306:在App1使用一段时间后,前台运行计时模块在t5时刻上报t5-t4给时间管理模块,时间管理模块记录App1剩余时间不足T1,上报给时间额度提示模块;
1307:时间额度提示模块弹窗提示用户时间余额不足T1。
1308:App1再次使用了T1时间,前台运行计时模块在t6时刻上报t6-t5给时间管理模块,时间管理模块记录额度已满,发送剩余时间为零的提示给锁定模块;
1309:锁定模块发送重置或延时询问给特权控制模块,特权控制模块弹窗提示用户是否重置或延时。
1310:重置或延时设定需要先进行权限认证,通过后,可以继续使用;如果选择否,那么返回锁定App1的指示给锁定模块,锁定模块锁定App1并退出App1。
本发明实施例,可以针对每个App进行独立的设定使用时间管理方式,使管理更自由。可以帮助提高自制力不强的消费者在娱乐性App时间花费控制力。还可以为家长提供了随身携带的指纹“钥匙”,对孩子在移动设备上的时间管控更有效。
本发明实施例还提供了一种终端设备,如图14所示,包括:
显示单元1401,用于在所述终端设备启动后显示桌面,在所述桌面上显示应用图标;
应用控制单元1402,用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序;
计时单元1403,用于若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;
提示单元1404,用于若所述时长设定与所述实际使用时长的差值小于预定阈值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;
所述应用控制单元1402,还用于若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。
可选地,所述延长设定包括:重置设定或延时设定;
所述应用控制单元1402,用于若身份认证通过则延长使用时间包括:若所述延长设定为重置设定,在确定身份认证通过后重置累计计时;若所述延长设定为延时设定,在确定身份认证通过后延长所述时长设定指定的时间。
可选地,所述时间控制规则还包括:间隔设置;
所述应用控制单元1402,还用于在所述应用图标被点击后启动与所述应 用图标对应的目标应用程序之前,确定所述目标程序本次启动时刻与上次关闭时刻的间隔时间是否符合所述间隔设置,若是则执行所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序,否控制所述显示单元1401显示以所述时长设定与所述实际使用时长的差值为起点的倒计时的提示信息。
进一步地,所述显示单元1401,还用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,显示应用程序的管理设置界面,在用户认证通过后显示应用列表;
如图15所示,所述终端设备还包括:
接收单元1501,用于接收所述用户选择的所述目标应用程序,接收对所述目标程序的所述时间控制规则;
所述显示单元1401,还用于在所述应用列表的所述应用图标的显示区域中显示所述目标应用的时间控制规则。
可选地,所述显示单元1401,用于显示应用程序的管理设置界面,在用户认证通过后显示应用列表,包括:在设置管理界面接收到应用时间管理指令后,显示应用程序的管理界面;若本次为首次启动所述应用程序的管理界面,则直接显示应用列表,并接收认证设定;若本次非首次启动所述应用程序的管理界面,则使用所述认证设定指定的认证方式进行用户认证,在用户认证通过后显示应用列表。
可选地,所述认证设定包括指纹认证;
所述指纹认证包含:设定手指的指纹认证。
进一步地,所述显示单元1401,还用于所述若本次为首次启动所述应用程序的管理界面,则直接显示应用列表之前,在所述终端设备启动后显示锁屏界面,在锁屏认证通过后,执行在所述显示桌面。
可选地,所述显示单元1401,用于在所述桌面上显示应用图标包括:
若所述应用图标为被设置了时间控制规则的目标应用程序所对应的图标,则在所述应用图标上显示标注标识;若接收到点击所述标注标识的指令,则显示所述时间控制规则。
本发明实施例还提供了另一种终端设备,如图16所示,包括:显示屏1601、输入输出设备1602、处理器1603以及存储器1604;其中,存储器1604可以 用于存储终端设备的任意数据,还可以用于提供处理器1603执行数据处理过程中所需的缓存;
其中,所述处理器1603,用于控制执行:在终端设备启动后显示桌面,在所述桌面上显示应用图标;在所述应用图标被点击后启动与所述应用图标对应的目标应用程序;若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;若所述时长设定与所述实际使用时长的差值小于预定阈值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。
可选地,所述延长设定包括:重置设定或延时设定;
所述处理器1603,用于控制执行:若身份认证通过则延长使用时间包括:若所述延长设定为重置设定,在确定身份认证通过后重置累计计时;若所述延长设定为延时设定,在确定身份认证通过后延长所述时长设定指定的时间。
进一步地,所述时间控制规则还包括:间隔设置;
所述处理器1603,还用于控制执行:在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,确定所述目标程序本次启动时刻与上次关闭时刻的间隔时间是否符合所述间隔设置,若是则执行所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序,否显示以所述时长设定与所述实际使用时长的差值为起点的倒计时的提示信息。
进一步地,所述处理器1603,还用于控制执行:在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,显示应用程序的管理设置界面,在用户认证通过后显示应用列表;
接收所述用户选择的所述目标应用程序,接收对所述目标程序的所述时间控制规则;
在所述应用列表的所述应用图标的显示区域中显示所述目标应用的时间控制规则。
可选地,所述处理器1603,用于控制执行:显示应用程序的管理设置界 面,在用户认证通过后显示应用列表,包括:
在设置管理界面接收到应用时间管理指令后,显示应用程序的管理界面;若本次为首次启动所述应用程序的管理界面,则直接显示应用列表,并接收认证设定;若本次非首次启动所述应用程序的管理界面,则使用所述认证设定指定的认证方式进行用户认证,在用户认证通过后显示应用列表。
可选地,所述认证设定包括指纹认证;
所述指纹认证包含:设定手指的指纹认证。
进一步地,所述处理器1603,用于控制执行:若本次为首次启动所述应用程序的管理界面,则直接显示应用列表之前,所述方法还包括:
终端设备启动后显示锁屏界面,在锁屏认证通过后,执行所述终端设备启动后显示桌面。
可选地,所述处理器1603,用于控制执行:在所述桌面上显示应用图标包括:
若所述应用图标为被设置了时间控制规则的目标应用程序所对应的图标,则在所述应用图标上显示标注标识;
若接收到点击所述标注标识的指令,则显示所述时间控制规则。
本发明实施例还提供了另一种终端设备,如图17所示,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该终端设备可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,以终端设备为手机为例:
图17示出的是与本发明实施例提供的终端设备相关的手机的部分结构的框图。参考图17,手机包括:射频(Radio Frequency,RF)电路1710、存储器1720、输入单元1730、显示单元1740、传感器1750、音频电路1760、无线保真(wireless fidelity,WiFi)模块1770、处理器1780、以及电源1790等部件。本领域技术人员可以理解,图17中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图17对手机的各个构成部件进行具体的介绍:
RF电路1710可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1780处理;另外,将设计上行的数据发送给基站。通常,RF电路1710包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1710还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。
存储器1720可用于存储软件程序以及模块,处理器1780通过运行存储在存储器1720的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1720可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1720可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元1730可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1730可包括触控面板1731以及其他输入设备1732。触控面板1731,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1731上或在触控面板1731附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1731可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1780,并能接收处理器1780发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声 波等多种类型实现触控面板1731。除了触控面板1731,输入单元1730还可以包括其他输入设备1732。具体地,其他输入设备1732可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元1740可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1740可包括显示面板1741,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1741。进一步的,触控面板1731可覆盖显示面板1741,当触控面板1731检测到在其上或附近的触摸操作后,传送给处理器1780以确定触摸事件的类型,随后处理器1780根据触摸事件的类型在显示面板1741上提供相应的视觉输出。虽然在图17中,触控面板1731与显示面板1741是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1731与显示面板1741集成而实现手机的输入和输出功能。
手机还可包括至少一种传感器1750,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1741的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1741和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路1760、扬声器1761,传声器1762可提供用户与手机之间的音频接口。音频电路1760可将接收到的音频数据转换后的电信号,传输到扬声器1761,由扬声器1761转换为声音信号输出;另一方面,传声器1762将收集的声音信号转换为电信号,由音频电路1760接收后转换为音频数据,再将音频数据输出处理器1780处理后,经RF电路1710以发送给比如另一手机,或者将音频数据输出至存储器1720以便进一步处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块1770可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图17示出了WiFi模块1770,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器1780是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1720内的软件程序和/或模块,以及调用存储在存储器1720内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1780可包括一个或多个处理单元;优选的,处理器1780可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1780中。
手机还包括给各个部件供电的电源1790(比如电池),优选的,电源可以通过电源管理系统与处理器1780逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。
以上实施例中由终端设备所执行的步骤可以基于图17所示的硬件结构。
值得注意的是,上述终端设备只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的具体名称也只是为了便于相互区分,并不用于限制本发明的保护范围。
另外,本领域普通技术人员可以理解实现上述各方法实施例中的全部或部分步骤是可以通过程序来指令相关的硬件完成,相应的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明实施例揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。

Claims (16)

  1. 一种离线管理应用程序使用时间的方法,其特征在于,包括:
    终端设备启动后显示桌面,在所述桌面上显示应用图标;
    在所述应用图标被点击后启动与所述应用图标对应的目标应用程序;
    若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;
    若所述时长设定与所述实际使用时长的差值小于预定阈值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;
    若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。
  2. 根据权利要求1所述方法,其特征在于,
    所述延长设定包括:重置设定或延时设定;
    所述若身份认证通过则延长使用时间包括:若所述延长设定为重置设定,在确定身份认证通过后重置累计计时;若所述延长设定为延时设定,在确定身份认证通过后延长所述时长设定指定的时间。
  3. 根据权利要求1或2所述方法,其特征在于,所述时间控制规则还包括:间隔设置;
    在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,所述方法还包括:
    确定所述目标程序本次启动时刻与上次关闭时刻的间隔时间是否符合所述间隔设置,若是则执行所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序,否显示以所述时长设定与所述实际使用时长的差值为起点的倒计时的提示信息。
  4. 根据权利要求1或2所述方法,其特征在于,所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,所述方法还包括:
    显示应用程序的管理设置界面,在用户认证通过后显示应用列表;
    接收所述用户选择的所述目标应用程序,接收对所述目标程序的所述时间 控制规则;
    在所述应用列表的所述应用图标的显示区域中显示所述目标应用的时间控制规则。
  5. 根据权利要求4所述方法,其特征在于,所述显示应用程序的管理设置界面,在用户认证通过后显示应用列表,包括:
    在设置管理界面接收到应用时间管理指令后,显示应用程序的管理界面;若本次为首次启动所述应用程序的管理界面,则直接显示应用列表,并接收认证设定;若本次非首次启动所述应用程序的管理界面,则使用所述认证设定指定的认证方式进行用户认证,在用户认证通过后显示应用列表。
  6. 根据权利要求5所述方法,其特征在于,所述认证设定包括指纹认证;
    所述指纹认证包含:设定手指的指纹认证。
  7. 根据权利要求5所述方法,其特征在于,所述若本次为首次启动所述应用程序的管理界面,则直接显示应用列表之前,所述方法还包括:
    终端设备启动后显示锁屏界面,在锁屏认证通过后,执行所述终端设备启动后显示桌面。
  8. 根据权利要求1或2所述方法,其特征在于,所述在所述桌面上显示应用图标包括:
    若所述应用图标为被设置了时间控制规则的目标应用程序所对应的图标,则在所述应用图标上显示标注标识;
    若接收到点击所述标注标识的指令,则显示所述时间控制规则。
  9. 一种终端设备,其特征在于,包括:
    显示单元,用于在所述终端设备启动后显示桌面,在所述桌面上显示应用图标;
    应用控制单元,用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序;
    计时单元,用于若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;
    提示单元,用于若所述时长设定与所述实际使用时长的差值小于预定阈 值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;
    所述应用控制单元,还用于若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。
  10. 根据权利要求9所述终端设备,其特征在于,
    所述延长设定包括:重置设定或延时设定;
    所述应用控制单元,用于若身份认证通过则延长使用时间包括:若所述延长设定为重置设定,在确定身份认证通过后重置累计计时;若所述延长设定为延时设定,在确定身份认证通过后延长所述时长设定指定的时间。
  11. 根据权利要求9或10所述终端设备,其特征在于,所述时间控制规则还包括:间隔设置;
    所述应用控制单元,还用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,确定所述目标程序本次启动时刻与上次关闭时刻的间隔时间是否符合所述间隔设置,若是则执行所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序,否控制所述显示单元显示以所述时长设定与所述实际使用时长的差值为起点的倒计时的提示信息。
  12. 根据权利要求9或10所述终端设备,其特征在于,
    所述显示单元,还用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,显示应用程序的管理设置界面,在用户认证通过后显示应用列表;
    所述终端设备还包括:
    接收单元,用于接收所述用户选择的所述目标应用程序,接收对所述目标程序的所述时间控制规则;
    所述显示单元,还用于在所述应用列表的所述应用图标的显示区域中显示所述目标应用的时间控制规则。
  13. 根据权利要求12所述终端设备,其特征在于,
    所述显示单元,用于显示应用程序的管理设置界面,在用户认证通过后显示应用列表,包括:在设置管理界面接收到应用时间管理指令后,显示应用程 序的管理界面;若本次为首次启动所述应用程序的管理界面,则直接显示应用列表,并接收认证设定;若本次非首次启动所述应用程序的管理界面,则使用所述认证设定指定的认证方式进行用户认证,在用户认证通过后显示应用列表。
  14. 根据权利要求13所述终端设备,其特征在于,所述认证设定包括指纹认证;
    所述指纹认证包含:设定手指的指纹认证。
  15. 根据权利要求13所述终端设备,其特征在于,
    所述显示单元,还用于所述若本次为首次启动所述应用程序的管理界面,则直接显示应用列表之前,在所述终端设备启动后显示锁屏界面,在锁屏认证通过后,执行在所述显示桌面。
  16. 根据权利要求9或10所述终端设备,其特征在于,
    所述显示单元,用于在所述桌面上显示应用图标包括:
    若所述应用图标为被设置了时间控制规则的目标应用程序所对应的图标,则在所述应用图标上显示标注标识;若接收到点击所述标注标识的指令,则显示所述时间控制规则。
PCT/CN2016/099991 2016-09-24 2016-09-24 离线管理应用程序使用时间的方法、及终端设备 WO2018053819A1 (zh)

Priority Applications (11)

Application Number Priority Date Filing Date Title
EP16916558.6A EP3508997B1 (en) 2016-09-24 2016-09-24 Offline management method for application use time, and terminal device
AU2016424054A AU2016424054B2 (en) 2016-09-24 2016-09-24 Method for managing application program use time offline, and terminal device
CA3037973A CA3037973C (en) 2016-09-24 2016-09-24 Method for managing application program use time offline, and terminal device
PCT/CN2016/099991 WO2018053819A1 (zh) 2016-09-24 2016-09-24 离线管理应用程序使用时间的方法、及终端设备
EP23155519.4A EP4220452A3 (en) 2016-09-24 2016-09-24 Method for managing application program use time offline, and terminal device
BR112019005714-5A BR112019005714B1 (pt) 2016-09-24 2016-09-24 Método para um dispositivo eletrônico e dispositivo eletrônico para gerenciar tempo de uso de programa de aplicação offline
CN201680080593.4A CN108604265B (zh) 2016-09-24 2016-09-24 离线管理应用程序使用时间的方法、及终端设备
US16/336,293 US10824439B2 (en) 2016-09-24 2016-09-24 Method for managing application program use time offline, and terminal device
JP2019515983A JP6736766B2 (ja) 2016-09-24 2016-09-24 電子デバイス、方法、および、プログラム
CN202011472705.5A CN112560001B (zh) 2016-09-24 2016-09-24 离线管理应用程序使用时间的方法、及终端设备
US17/011,134 US11537408B2 (en) 2016-09-24 2020-09-03 Method for managing application program use time offline, and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/099991 WO2018053819A1 (zh) 2016-09-24 2016-09-24 离线管理应用程序使用时间的方法、及终端设备

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US16/336,293 A-371-Of-International US10824439B2 (en) 2016-09-24 2016-09-24 Method for managing application program use time offline, and terminal device
US17/011,134 Continuation US11537408B2 (en) 2016-09-24 2020-09-03 Method for managing application program use time offline, and terminal device

Publications (1)

Publication Number Publication Date
WO2018053819A1 true WO2018053819A1 (zh) 2018-03-29

Family

ID=61689802

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/099991 WO2018053819A1 (zh) 2016-09-24 2016-09-24 离线管理应用程序使用时间的方法、及终端设备

Country Status (8)

Country Link
US (2) US10824439B2 (zh)
EP (2) EP3508997B1 (zh)
JP (1) JP6736766B2 (zh)
CN (2) CN112560001B (zh)
AU (1) AU2016424054B2 (zh)
BR (1) BR112019005714B1 (zh)
CA (1) CA3037973C (zh)
WO (1) WO2018053819A1 (zh)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10789642B2 (en) 2014-05-30 2020-09-29 Apple Inc. Family accounts for an online content storage sharing service
US10558546B2 (en) * 2018-05-08 2020-02-11 Apple Inc. User interfaces for controlling or presenting device usage on an electronic device
CN110389803A (zh) * 2019-06-28 2019-10-29 北京小米移动软件有限公司 一种页面显示方法、装置、显示终端及存储介质
CN110816076A (zh) * 2019-09-29 2020-02-21 厦门喵宝科技有限公司 便携式打印机及其番茄钟实现方法、装置、设备、系统
CN110768835B (zh) * 2019-10-25 2022-03-25 杭州迪普科技股份有限公司 一种应用时长统计方法、装置、设备及存储介质
CN111460411B (zh) * 2020-04-17 2023-08-04 支付宝(杭州)信息技术有限公司 一种保持登录状态的方法及系统
US20230274032A1 (en) * 2020-07-03 2023-08-31 Ashley Carter System and method for controlling the amount of screen time of an individual
CN111857476B (zh) * 2020-07-17 2022-07-08 维沃移动通信有限公司 显示方法、装置及电子设备
CN112015488A (zh) * 2020-08-31 2020-12-01 中移(杭州)信息技术有限公司 专用终端的实现方法、电子设备和存储介质
CN112954462A (zh) * 2021-01-25 2021-06-11 海信视像科技股份有限公司 显示设备及应用运行时长的控制方法
CN116806334A (zh) * 2021-02-05 2023-09-26 松下电器(美国)知识产权公司 信息处理方法以及信息处理装置
CN114510177A (zh) * 2022-01-05 2022-05-17 维沃移动通信有限公司 定时提醒方法及其装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765993A (zh) * 2015-03-25 2015-07-08 广东欧珀移动通信有限公司 一种防沉迷的方法和装置
CN105120080A (zh) * 2015-07-23 2015-12-02 Tcl移动通信科技(宁波)有限公司 一种移动终端的防沉迷控制方法、系统及移动终端
CN105302598A (zh) * 2015-10-15 2016-02-03 广东欧珀移动通信有限公司 一种应用运行的定时管理方法及装置
US9374379B1 (en) * 2007-06-26 2016-06-21 Aol Inc. Application unlock
CN105955868A (zh) * 2016-05-05 2016-09-21 广东小天才科技有限公司 一种节制智能终端应用程序运行时间的方法及系统

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6607136B1 (en) 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
US20130226453A1 (en) * 2005-02-08 2013-08-29 Bryan Gardner Trussel Systems and methods for mobile communication integration
JP2007117125A (ja) * 2005-10-25 2007-05-17 Snk Playmore Corp ゲーム機及びゲームプログラム
KR101102342B1 (ko) * 2006-10-02 2012-01-03 엘지전자 주식회사 이동통신단말기의 애플리케이션 종료시간 설정방법,이동통신단말기의 애플리케이션 종료방법, 및 이를수행하기 위한 이동통신단말기
WO2009069655A1 (ja) * 2007-11-27 2009-06-04 Canon Denshi Kabushiki Kaisha 管理サーバ、クライアント端末、端末管理システム、端末管理方法、プログラム、及び、記録媒体
US10460085B2 (en) * 2008-03-13 2019-10-29 Mattel, Inc. Tablet computer
JP5241339B2 (ja) * 2008-06-17 2013-07-17 株式会社ソニー・コンピュータエンタテインメント 情報処理装置
US8997155B2 (en) * 2008-11-21 2015-03-31 Echostar Technologies L.L.C. Locally stored advertisements
US8793774B1 (en) * 2009-03-31 2014-07-29 Juniper Networks, Inc. Methods and apparatus for accessing a secure network segment
CN102377585A (zh) * 2010-08-10 2012-03-14 深圳市傲天通信有限公司 青少年网络防沉迷系统及其方法
EP2619704B1 (en) * 2010-09-24 2018-01-10 BlackBerry Limited Method and apparatus for differentiated access control
US9262595B2 (en) * 2010-10-29 2016-02-16 Qualcomm Incorporated Methods and systems for accessing licensable items in a geographic area
US20120209904A1 (en) 2011-02-12 2012-08-16 Huawei Technologies Co. Ltd. Timeout control method, apparatus, and system
US9111274B2 (en) * 2011-04-28 2015-08-18 Sony Corporation Payment processing
US9076020B2 (en) * 2011-05-13 2015-07-07 Microsoft Technology Licensing, Llc Protected mode for mobile communication and other devices
KR20140066258A (ko) 2011-09-26 2014-05-30 마이크로소프트 코포레이션 투시 근안 디스플레이에 대한 센서 입력에 기초한 비디오 디스플레이 수정
US9225717B1 (en) * 2013-03-14 2015-12-29 Emc Corporation Event-based data signing via time-based one-time authentication passcodes
US8972297B2 (en) * 2011-11-15 2015-03-03 Citibank, N.A. System and method for conducting a transaction at a financial transaction terminal using a mobile device
CN103188641A (zh) * 2011-12-28 2013-07-03 富泰华工业(深圳)有限公司 通讯管控系统及管控方法
CN103416040B (zh) 2012-08-29 2016-11-16 华为终端有限公司 终端控制方法和装置、以及终端
US20140096180A1 (en) * 2012-09-28 2014-04-03 Ansuya Negi System, devices, and methods for proximity-based parental controls
US9800429B2 (en) * 2013-03-15 2017-10-24 Smartbotics Inc. Adaptive home and commercial automation devices, methods and systems based on the proximity of controlling elements
US9154485B1 (en) * 2013-03-15 2015-10-06 Kaazing Corporation Authentication revalidation
KR102108439B1 (ko) * 2013-08-23 2020-05-08 삼성전자주식회사 휴대 장치 및 휴대 장치의 사용 제한 방법
US20150066762A1 (en) * 2013-08-28 2015-03-05 Geoffrey W. Chatterton Authentication system
US9223937B2 (en) * 2013-09-17 2015-12-29 Google Technology Holdings LLC Method and apparatus for extending an authentication timeout period
CN104980565A (zh) * 2014-04-09 2015-10-14 小米科技有限责任公司 终端防沉迷方法及装置
US11404146B2 (en) * 2014-05-30 2022-08-02 Apple Inc. Managing user information—data type extension
CN104133693B (zh) * 2014-07-10 2016-03-30 腾讯科技(深圳)有限公司 安装状态检测方法、装置及终端
KR20160071264A (ko) 2014-12-11 2016-06-21 엘지전자 주식회사 이동 단말기 및 그것의 제어방법
JPWO2016017035A1 (ja) * 2014-08-01 2017-05-25 シャープ株式会社 通信端末装置、その制御方法および制御プログラム
JP2016057845A (ja) * 2014-09-09 2016-04-21 三洋テクノソリューションズ鳥取株式会社 情報端末装置
CN104360852A (zh) * 2014-10-30 2015-02-18 北京数字天域科技股份有限公司 一种移动终端应用程序管理方法以及装置
US9875346B2 (en) * 2015-02-06 2018-01-23 Apple Inc. Setting and terminating restricted mode operation on electronic devices
CN104660821A (zh) * 2015-03-04 2015-05-27 深圳市中兴移动通信有限公司 控制终端使用时长的方法和移动终端
CN105278948B (zh) * 2015-06-24 2019-05-17 维沃移动通信有限公司 一种移动终端的控制方法及移动终端
US9842485B2 (en) * 2015-08-25 2017-12-12 Honeywell International Inc. Prognosticating panic situations and pre-set panic notification in a security system
CN105243322A (zh) * 2015-10-10 2016-01-13 深圳市金立通信设备有限公司 一种应用程序控制方法及终端
CN105446782A (zh) * 2015-12-24 2016-03-30 深圳市金立通信设备有限公司 一种终端应用的管理方法及终端
US10686899B2 (en) * 2016-04-06 2020-06-16 Snap Inc. Messaging achievement pictograph display system
CN105872247B (zh) * 2016-05-26 2018-01-19 广东欧珀移动通信有限公司 一种应用防沉迷的方法、装置及移动终端
US10957445B2 (en) * 2017-10-05 2021-03-23 Hill-Rom Services, Inc. Caregiver and staff information system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9374379B1 (en) * 2007-06-26 2016-06-21 Aol Inc. Application unlock
CN104765993A (zh) * 2015-03-25 2015-07-08 广东欧珀移动通信有限公司 一种防沉迷的方法和装置
CN105120080A (zh) * 2015-07-23 2015-12-02 Tcl移动通信科技(宁波)有限公司 一种移动终端的防沉迷控制方法、系统及移动终端
CN105302598A (zh) * 2015-10-15 2016-02-03 广东欧珀移动通信有限公司 一种应用运行的定时管理方法及装置
CN105955868A (zh) * 2016-05-05 2016-09-21 广东小天才科技有限公司 一种节制智能终端应用程序运行时间的方法及系统

Also Published As

Publication number Publication date
EP3508997A4 (en) 2019-08-07
CN108604265A (zh) 2018-09-28
US20200401419A1 (en) 2020-12-24
CN112560001A (zh) 2021-03-26
EP4220452A2 (en) 2023-08-02
CA3037973A1 (en) 2018-03-29
EP4220452A3 (en) 2023-09-20
EP3508997A1 (en) 2019-07-10
AU2016424054B2 (en) 2020-11-26
JP2019535074A (ja) 2019-12-05
AU2016424054A1 (en) 2019-05-02
BR112019005714A2 (pt) 2019-07-09
JP6736766B2 (ja) 2020-08-05
US20190220290A1 (en) 2019-07-18
US11537408B2 (en) 2022-12-27
CA3037973C (en) 2023-03-28
CN108604265B (zh) 2020-12-25
CN112560001B (zh) 2023-10-03
EP3508997B1 (en) 2023-04-19
BR112019005714B1 (pt) 2023-11-21
US10824439B2 (en) 2020-11-03

Similar Documents

Publication Publication Date Title
WO2018053819A1 (zh) 离线管理应用程序使用时间的方法、及终端设备
US11269981B2 (en) Information displaying method for terminal device and terminal device
EP3764253B1 (en) Method for quickly opening application or application function, and terminal
CN106778175B (zh) 一种界面锁定方法、装置和终端设备
CN106250223B (zh) 一种后台进程管理方法及终端设备
WO2015100569A1 (zh) 侧边菜单显示方法、装置和终端
KR101939008B1 (ko) 정보 추천 관리 방법, 디바이스 및 시스템
WO2018214748A1 (zh) 应用界面的显示方法、装置、终端及存储介质
WO2015055098A1 (en) Method and device for quick starting of application
CN108710806B (zh) 一种终端解锁方法、移动终端
CN104573437A (zh) 信息认证方法、装置和终端
WO2019095156A1 (zh) 一种信息搜索的方法、终端、网络设备和系统
KR20160088609A (ko) 전자 장치 및 전자 장치의 정보 공개 제어 방법
JP6974620B2 (ja) 通知メッセージ処理方法及び端末
WO2019090702A1 (zh) 一种终端的安全保护方法及装置
JP7125066B2 (ja) オフラインでアプリケーションプログラム使用時間を管理するための方法、および、端末デバイス
WO2020192415A1 (zh) 权限配置方法及终端设备
CN108681668A (zh) 设备管理器管理方法、装置以及移动终端
WO2019061248A1 (zh) 虚拟按键操作方法、终端、存储介质及计算机程序
CN116305087A (zh) 应用管理方法、智能终端及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16916558

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3037973

Country of ref document: CA

Ref document number: 2019515983

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112019005714

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 2016916558

Country of ref document: EP

Effective date: 20190405

ENP Entry into the national phase

Ref document number: 2016424054

Country of ref document: AU

Date of ref document: 20160924

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 112019005714

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20190322