WO2018053819A1 - 离线管理应用程序使用时间的方法、及终端设备 - Google Patents
离线管理应用程序使用时间的方法、及终端设备 Download PDFInfo
- Publication number
- WO2018053819A1 WO2018053819A1 PCT/CN2016/099991 CN2016099991W WO2018053819A1 WO 2018053819 A1 WO2018053819 A1 WO 2018053819A1 CN 2016099991 W CN2016099991 W CN 2016099991W WO 2018053819 A1 WO2018053819 A1 WO 2018053819A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- time
- setting
- authentication
- duration
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/24—Resetting means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04847—Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method for offline management of application usage time, and a terminal device.
- parents have a need for children to use the App for parental control or "child locks.” If the unlocked “key” is carried by the parent, the “child lock” effect will be more effective.
- the method of offline management APP usage time is mainly: the time control function provided by the children's App.
- the specific implementation process is: the module has a built-in control time range module, in which the system authority of the mobile phone or the tablet is usually not obtained, that is, the logic time is judged by reading the system time.
- the above technical solution can bypass the time control setting of the App by modifying the system time, and the effectiveness is low; in addition, the control of the use time is not flexible.
- the embodiments of the present invention provide a method for offline management of application usage time, and a terminal device. Used to manage the usage time of the app flexibly and efficiently in an offline scenario.
- the embodiment of the invention provides a method for offlinely managing application usage time, including:
- the target application corresponding to the application icon belongs to an application that is set with a time control rule, accumulating the actual usage duration of the target application;
- the time control rule includes: duration setting and extension setting Set
- the prompt time limit is insufficient; if the extension setting is set to yes, further prompting whether an extended time is required;
- the usage time is extended if the identity authentication is passed, otherwise the target application is exited and locked after the actual usage duration reaches the duration setting.
- the display of the application icons on the desktop does not necessarily need to manage the use time.
- Those applications that need to manage the use time are set with the time control rule, which is called the target application; in this embodiment, the accumulated Timing should be understood as the cumulative time that the target application is used, that is, the target application is closed and reused after being used, then the total time of the previous and the last time is accumulated.
- the embodiment of the present invention is not unique. limited.
- the above identity authentication is preferably implemented by using fingerprint authentication to prevent the time control scheme from being invalid due to password leakage.
- the above extension setting refers to a setting for extending the usage time, and may generally include: resetting the usage time, or increasing the duration setting; as long as it is a way for the target application to obtain a longer usage time, this is possible.
- the embodiments of the invention are not limited to this.
- the extended setting includes: a reset setting or a delay setting
- the extending the usage time if the identity authentication is passed includes: if the extension is set to the reset setting, resetting the accumulated timing after determining that the identity authentication is passed; if the extension is set to the delay setting, determining the identity After the authentication is passed, the length of time is set to be specified.
- the reset setting is a method of clearing the accumulated time to zero
- the delay setting is to increase the length of time that the target application can use. It is convenient to control the user to extend the use time. Although the usage time has been extended, there is a reminder in the middle that it is still possible to remind the user to reduce the use of the target application. If the current target application is not the creator of the authentication method, then the authentication will not be obtained to obtain an extended usage time, so that the control of the usage time can be achieved. This allows for the consideration of two different types of users using the target application in the terminal device.
- the time control rule further includes: an interval setting;
- the method further includes:
- the target application of the application displays no information indicating the countdown of the difference between the duration and the actual length of use as the starting point.
- This embodiment further sets the time control rule to include the interval setting, because some target applications can set a shorter duration setting, and need to avoid frequent use, so adding the interval setting can achieve better results.
- the embodiment of the present invention further provides a setting scheme of the time control rule, which is specifically as follows: before the target application corresponding to the application icon is started after the application icon is clicked The method further includes:
- the embodiment of the present invention further provides an implementation scheme for starting a scenario based on different management interfaces and using different control policies, as follows: the management setting interface of the display application is after the user authentication is passed. Display a list of apps, including:
- the management interface of the application After receiving the application time management instruction on the setting management interface, displaying the management interface of the application; if the management interface of the application is started for the first time, the application list is directly displayed, and the authentication setting is received; if this is not the first time
- the user authentication is performed by using the authentication mode specified by the authentication setting, and the application list is displayed after the user authentication is passed.
- the embodiment of the present invention may preferably use fingerprint authentication to avoid the use of passwords being stolen.
- fingerprint authentication may set different finger fingerprints, which may be commonly used fingers, as follows:
- the authentication setting includes fingerprint authentication;
- the fingerprint authentication includes: setting a fingerprint authentication of a finger.
- the embodiment of the present invention further provides an implementation scheme for displaying a desktop and entering an application management solution in an application scenario in which a time control rule is first set, as follows: Before starting the management interface of the application, directly displaying the application list, the method further includes:
- the lock screen interface is displayed, and after the lock screen authentication is passed, the terminal device is executed. Display the desktop after the move.
- the embodiment of the present invention further provides an implementation scheme for conveniently viewing the time control rule on the application icon displayed on the desktop, as follows: the displaying the application icon on the desktop includes:
- the application icon is an icon corresponding to the target application that is set with the time control rule, displaying the annotation identifier on the application icon;
- the time control rule is displayed if an instruction to click the tag identifier is received.
- the second embodiment of the present invention further provides a terminal device, including:
- a display unit configured to display a desktop after the terminal device is started, and display an application icon on the desktop
- An application control unit configured to start a target application corresponding to the application icon after the application icon is clicked;
- a timing unit configured to: when the target application corresponding to the application icon belongs to an application that is set with a time control rule, accumulate the actual usage duration of the target application; the time control rule includes: duration Set and extend the settings;
- a prompting unit configured to: if the difference between the duration setting and the actual usage duration is less than a predetermined threshold, the prompt time quota is insufficient; if the extension setting is set to yes, further prompting whether an extended time is required;
- the application control unit is further configured to perform identity authentication after receiving an instruction that requires an extended time, and extend the usage time if the identity authentication is passed, otherwise, after the actual use duration reaches the duration setting, the device is exited and locked.
- the target application is further configured to perform identity authentication after receiving an instruction that requires an extended time, and extend the usage time if the identity authentication is passed, otherwise, after the actual use duration reaches the duration setting, the device is exited and locked.
- the extended setting includes: a reset setting or a delay setting
- the application control unit is configured to extend the usage time if the identity authentication is passed: if the extension is set to a reset setting, resetting the accumulated timing after determining that the identity authentication is passed; if the extension is set to a delay
- the setting lengthens the time specified by the duration setting after determining that the identity authentication is passed.
- the time control rule further includes: an interval setting;
- the application control unit is further configured to determine whether the interval between the current startup time and the last shutdown time of the target program is consistent with the target application corresponding to the application icon after the application icon is clicked. Interval setting, if yes, executing after the application icon is clicked And moving the target application corresponding to the application icon to control the display unit to display the prompt information of the countdown starting from the difference between the duration and the actual use duration.
- the display unit is further configured to display an application setting interface of the application before the target application corresponding to the application icon is started after the application icon is clicked, and the user authentication is passed. After displaying the application list;
- the terminal device further includes:
- a receiving unit configured to receive the target application selected by the user, and receive the time control rule for the target program
- the display unit is further configured to display a time control rule of the target application in a display area of the application icon of the application list.
- the display unit is configured to display an application setting interface of the application, and display the application list after the user is authenticated, including: displaying the application after receiving the application time management instruction on the setting management interface The management interface; if the management interface of the application is started for the first time, the application list is directly displayed, and the authentication setting is received; if the management interface of the application is not started for the first time, the authentication setting is used.
- the specified authentication mode is used for user authentication, and the application list is displayed after the user authentication is passed.
- the authentication setting includes fingerprint authentication
- the fingerprint authentication includes: setting a fingerprint authentication of a finger.
- the display unit is further configured to display the lock screen after the terminal device starts before directly displaying the application list, if the management interface of the application is started for the first time.
- the interface is executed on the display desktop after the lock screen authentication is passed.
- the displaying unit configured to display an application icon on the desktop, includes:
- the application icon is an icon corresponding to the target application to which the time control rule is set, displaying the annotation identifier on the application icon; if receiving the instruction to click the annotation identifier, displaying the time control rule .
- a time control rule is set for the target application, the time control rule includes the duration setting and the extended setting, and the accumulated time is used for timing, thereby avoiding the use of the system time to cause security. Less sexual problem; can be set by duration
- the user can control the use time at the same time, and the extended setting method limits the use time of the non-authenticated user to the target application on the one hand, and ensures the normal use of the authenticated user and reminds the use time on the other hand;
- the application can set the time control rules independently. Therefore, the usage time of the App can be managed flexibly and efficiently in an offline scenario.
- FIG. 1 is a schematic structural diagram of a system according to an embodiment of the present invention.
- FIG. 2 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 3 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 4 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 5 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 6 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 7 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 8 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 9 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 10 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 11 is a schematic diagram of an operation interface according to an embodiment of the present invention.
- FIG. 13 is a schematic flowchart of a method according to an embodiment of the present invention.
- FIG. 14 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 15 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 16 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 17 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- the embodiment of the invention provides for freely controlling the usage time of any App on the terminal device through the App Time Manager (ATM) without the need for networking.
- Absolute App usage duration and interval duration are used as timing criteria to avoid system time modification bypassing control.
- ATM management authority authentication can call the system lock screen password.
- the APP used in the mobile phone is taken as an example for illustration. It can be understood that the technical solution of the embodiment of the present invention can also be applied to other terminal devices other than the mobile phone, such as a personal computer, a tablet computer, or the like. Terminal Equipment. In the following embodiment, the following aspects will be described in detail:
- the system structure of the embodiment of the present invention includes:
- ATM permission setting App foreground running timing module, App time management module, App time quota prompting module, App locking module, and privilege control module;
- the ATM permission setting is the input part of the system structure
- the App time limit prompt module is a module for controlling output, and the output prompt information includes: an alarm, a pop-up window, and an automatic lock screen prompt;
- the App Locking Module is the result of time control processing, including: exiting the running app, locking the time prompt, and so on.
- App front-end running timing module regularly report the running time slice of the foreground app.
- App time management module add, delete and change the management App and management mode, and store the accumulated usage time of the app.
- App time limit prompt module call the alarm interface; provide material management of the lock screen interface.
- App lock module call to exit the App program interface; start the App lock program; prompt duration when the excess is unavailable
- ATM permission settings Initialize permission settings.
- Privilege Control Module Authentication authority that intervenes in time-managed apps to provide reset or delay capabilities.
- the user activates the mobile phone, then enters the mobile phone all settings management interface, and finds the menu of the "application time manager".
- the ATM inlet as noted in Figure 2 below.
- the time control rules shown in Figure 7 include: a duration of 40 minutes, an interval of 5 minutes, and a reset prompt and a time delay prompt.
- the application icon App1 is displayed as "managed" and the contents of the above time control rule.
- the application is reset or delayed. Prompt reset or delay. Confirm or set after authentication is required.
- the rights interaction includes process one and process two, and the two processes are juxtaposed, and at least one process is to be executed. As shown in Figure 12, it includes:
- the ATM permission setting calls the system lock screen module, sets the system password lock screen, and the permission authentication can use the lock screen password.
- the system lock screen module returns the result after determining that the setting is successful.
- the ATM permission setting invokes the system fingerprint module, sets a fingerprint as the authentication credential, and uses the specified fingerprint as the authentication credential.
- the time control rule sets the duration and interval, and the reset or delay is set to Yes.
- the management system interaction process for App1 usage time is as follows, as shown in FIG. 13, including:
- the terminal At time t1, the terminal displays that the foreground is reporting time t1 when using App1.
- the foreground running timing module reports the time slice t2-t1 at time t2, and the difference is transmitted to the time management module, and the time management module records that the application 1 has used the t2-t1 time.
- App1 is used to exit at time t3, and the terminal displays that the foreground sends a t3 to the foreground running timing module; the foreground running timing module records the exit time point t3, which is different from the last reported time slice time t2, and is transmitted to the time management module. At this time, the time management module records that App1 shares the t3-t1 time.
- App1 is used again, and the terminal displays that the foreground reports to the time management module t4;
- the time management module first determines whether the last use exit to the current use time difference satisfies the time interval setting, that is, whether t4-t3 is smaller than the use interval. If it is satisfied, it is allowed to use, and the prompt "countdown XX minutes XX seconds" is not satisfied. This embodiment assumes that the subsequent flow is continued.
- the foreground running timing module reports t5-t4 to the time management module at time t5, and the time management module records that the remaining time of App1 is less than T1 and is reported to the time limit prompting module;
- the time limit prompt module popup window prompts the user that the time balance is less than T1.
- App1 uses T1 time again, and the foreground running timing module reports t6-t5 to the time management module at time t6, the time management module records the quota is full, and sends a prompt with zero remaining time to the locking module;
- the locking module sends a reset or delay query to the privilege control module, and the privilege control module pops up to prompt the user whether to reset or delay.
- Reset or delay setting needs to be authenticated first. After passing, it can continue to be used. If no, return the indication of locking App1 to the locking module. The locking module locks App1 and exits App1.
- an independent setting and use time management manner can be performed for each App to make management more free. It can help improve the self-control of consumers who spend less time in the entertainment app time. Parents can also be provided with a fingerprint "key" that is carried around, which is more effective for children's time control on mobile devices.
- the embodiment of the invention further provides a terminal device, as shown in FIG. 14, comprising:
- a display unit 1401 configured to display a desktop after the terminal device is started, and display an application icon on the desktop;
- the application control unit 1402 is configured to start a target application corresponding to the application icon after the application icon is clicked;
- the timing unit 1403 is configured to: when the target application corresponding to the application icon belongs to the application that is set with the time control rule, accumulate the actual usage duration of the target application; the time control rule includes: Duration setting and extension setting;
- the prompting unit 1404 is configured to: if the difference between the duration setting and the actual usage duration is less than a predetermined threshold, the prompt time quota is insufficient; if the extension setting is set to yes, further prompting whether an extended time is required;
- the application control unit 1402 is further configured to perform identity authentication after receiving an instruction that requires an extended time, and extend the usage time if the identity authentication is passed, otherwise exit and lock after the actual usage duration reaches the duration setting.
- the target application is further configured to perform identity authentication after receiving an instruction that requires an extended time, and extend the usage time if the identity authentication is passed, otherwise exit and lock after the actual usage duration reaches the duration setting.
- the extended setting includes: a reset setting or a delay setting
- the application control unit 1402 is configured to: if the identity authentication is passed, extending the usage time includes: if the extension is set to a reset setting, resetting the accumulated timing after determining that the identity authentication is passed; if the extension is set to be extended The time setting is to extend the time specified by the duration setting after determining that the identity authentication is passed.
- the time control rule further includes: an interval setting;
- the application control unit 1402 is further configured to start and start after the application icon is clicked Before determining, by using the target application corresponding to the icon, determining whether the interval between the current startup time and the last shutdown time of the target program meets the interval setting, and if yes, executing the The target application corresponding to the application icon controls whether the display unit 1401 displays the cue information of the countdown starting from the difference between the duration and the actual use duration.
- the display unit 1401 is further configured to display a management setting interface of the application before the target application corresponding to the application icon is started after the application icon is clicked, and display an application list after the user passes the authentication;
- the terminal device further includes:
- the receiving unit 1501 is configured to receive the target application selected by the user, and receive the time control rule for the target program.
- the display unit 1401 is further configured to display a time control rule of the target application in a display area of the application icon of the application list.
- the display unit 1401 is configured to display a management setting interface of the application, and display the application list after the user is authenticated, including: displaying the management interface of the application after receiving the application time management instruction on the setting management interface; If the management interface of the application is started for the first time, the application list is directly displayed, and the authentication setting is received; if the management interface of the application is not started for the first time, the authentication specified by the authentication setting is used.
- the method performs user authentication and displays the application list after the user authentication is passed.
- the authentication setting includes fingerprint authentication
- the fingerprint authentication includes: setting a fingerprint authentication of a finger.
- the display unit 1401 is further configured to display the lock screen interface after the terminal device is started, if the management interface of the application is started for the first time, and the lock screen is displayed after the terminal device is started. After the authentication is passed, the display is performed on the display desktop.
- the displaying unit 1401 for displaying an application icon on the desktop, includes:
- the application icon is an icon corresponding to the target application to which the time control rule is set, displaying the annotation identifier on the application icon; if receiving the instruction to click the annotation identifier, displaying the time control rule .
- the embodiment of the present invention further provides another terminal device, as shown in FIG. 16, comprising: a display screen 1601, an input and output device 1602, a processor 1603, and a memory 1604; wherein, the memory 1604 can Any data for storing the terminal device may also be used to provide a cache required by the processor 1603 to perform data processing;
- the processor 1603 is configured to: execute: display a desktop after the terminal device is started, display an application icon on the desktop; and start a target application corresponding to the application icon after the application icon is clicked; If the target application corresponding to the application icon belongs to an application that is set with a time control rule, accumulating the actual usage duration of the target application; the time control rule includes: duration setting and extension setting If the difference between the duration setting and the actual usage duration is less than a predetermined threshold, the prompt time limit is insufficient; if the extension setting is set to yes, further prompting whether an extended time is required; if receiving After the instruction of the extended time is used for identity authentication, if the identity authentication is passed, the usage time is extended. Otherwise, after the actual use duration reaches the duration setting, the target application is exited and locked.
- the extended setting includes: a reset setting or a delay setting
- the processor 1603 is configured to control execution: if the identity authentication is passed, extending the usage time includes: if the extension is set to a reset setting, resetting the accumulated timing after determining that the identity authentication is passed; if the extension is set For the delay setting, the specified time is set to be extended after the identity authentication is determined to pass.
- time control rule further includes: an interval setting
- the processor 1603 is further configured to: control to determine an interval between the current startup time and the last shutdown time of the target program before the target application corresponding to the application icon is started after the application icon is clicked Whether the interval setting is met, if yes, the target application corresponding to the application icon is started after the application icon is clicked, and the difference between the duration setting and the actual usage duration is A reminder message for the countdown of the starting point.
- the processor 1603 is further configured to: execute: display an application setting interface of the application before the target application corresponding to the application icon is started after the application icon is clicked, and display after the user passes the authentication Application List;
- the processor 1603 is configured to control execution: display a management setting boundary of the application In the face, after the user authentication is passed, the application list is displayed, including:
- the management interface of the application After receiving the application time management instruction on the setting management interface, displaying the management interface of the application; if the management interface of the application is started for the first time, the application list is directly displayed, and the authentication setting is received; if this is not the first time
- the user authentication is performed by using the authentication mode specified by the authentication setting, and the application list is displayed after the user authentication is passed.
- the authentication setting includes fingerprint authentication
- the fingerprint authentication includes: setting a fingerprint authentication of a finger.
- the processor 1603 is configured to control execution: if the management interface of the application is started for the first time, the application list is directly displayed, and the method further includes:
- the lock screen interface is displayed.
- the desktop is displayed after the terminal device is started.
- the processor 1603 is configured to control execution: displaying an application icon on the desktop includes:
- the application icon is an icon corresponding to the target application that is set with the time control rule, displaying the annotation identifier on the application icon;
- the time control rule is displayed if an instruction to click the tag identifier is received.
- the embodiment of the present invention further provides another terminal device.
- the terminal device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal device is used as a mobile phone as an example:
- FIG. 17 is a block diagram showing a partial structure of a mobile phone related to a terminal device according to an embodiment of the present invention.
- the mobile phone includes: a radio frequency (RF) circuit 1710, a memory 1720, an input unit 1730, a display unit 1740, a sensor 1750, an audio circuit 1760, a wireless fidelity (WiFi) module 1770, and a processor 1780. And power supply 1790 and other components.
- RF radio frequency
- the RF circuit 1710 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the processor 1780 processes the data. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 1710 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 1710 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
- GSM Global System of Mobile communication
- GPRS General Packet Radio Service
- the memory 1720 can be used to store software programs and modules, and the processor 1780 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1720.
- the memory 1720 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
- memory 1720 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- the input unit 1730 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
- the input unit 1730 may include a touch panel 1731 and other input devices 1732.
- the touch panel 1731 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1731 or near the touch panel 1731. Operation), and drive the corresponding connecting device according to a preset program.
- the touch panel 1731 may include two parts: a touch detection device and a touch controller.
- the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
- the processor 1780 is provided and can receive commands from the processor 1780 and execute them. In addition, resistive, capacitive, infrared, and surface acoustics can be used.
- the touch panel 1731 is implemented in various types such as waves.
- the input unit 1730 may also include other input devices 1732. Specifically, other input devices 1732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
- the display unit 1740 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
- the display unit 1740 can include a display panel 1741.
- the display panel 1741 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
- the touch panel 1731 can cover the display panel 1741. After the touch panel 1731 detects a touch operation thereon or nearby, the touch panel 1731 transmits to the processor 1780 to determine the type of the touch event, and then the processor 1780 according to the touch event. The type provides a corresponding visual output on display panel 1741.
- the touch panel 1731 and the display panel 1741 are two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1731 and the display panel 1741 may be integrated. Realize the input and output functions of the phone.
- the handset can also include at least one type of sensor 1750, such as a light sensor, motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1741 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1741 and/or when the mobile phone moves to the ear. Or backlight.
- the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
- vibration recognition related functions such as pedometer, tapping
- the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- An audio circuit 1760, a speaker 1761, and a microphone 1762 can provide an audio interface between the user and the handset.
- the audio circuit 1760 can transmit the converted electrical data of the received audio data to the speaker 1761, and convert it into a sound signal output by the speaker 1761; on the other hand, the microphone 1762 converts the collected sound signal into an electrical signal, by the audio circuit 1760. After receiving, it is converted into audio data, and then processed by the audio data output processor 1780, sent to the other mobile phone via the RF circuit 1710, or outputted to the memory 1720 for further processing.
- WiFi is a short-range wireless transmission technology.
- the mobile phone through the WiFi module 1770 can help users to send and receive e-mail, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
- FIG. 17 shows the WiFi module 1770, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
- the processor 1780 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1720, and invoking data stored in the memory 1720, The phone's various functions and processing data, so that the overall monitoring of the phone.
- the processor 1780 may include one or more processing units; preferably, the processor 1780 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
- the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1780.
- the handset also includes a power source 1790 (such as a battery) that powers the various components.
- a power source 1790 (such as a battery) that powers the various components.
- the power source can be logically coupled to the processor 1780 via a power management system to manage charging, discharging, and power management functions through the power management system.
- the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
- the steps performed by the terminal device in the above embodiment may be based on the hardware configuration shown in FIG.
- terminal devices are only divided according to functional logic, but are not limited to the above-mentioned divisions, as long as the corresponding functions can be implemented; in addition, the specific names of the functional units are only for the purpose of facilitating mutual differentiation, and It is not intended to limit the scope of the invention.
- the storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims (16)
- 一种离线管理应用程序使用时间的方法,其特征在于,包括:终端设备启动后显示桌面,在所述桌面上显示应用图标;在所述应用图标被点击后启动与所述应用图标对应的目标应用程序;若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;若所述时长设定与所述实际使用时长的差值小于预定阈值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。
- 根据权利要求1所述方法,其特征在于,所述延长设定包括:重置设定或延时设定;所述若身份认证通过则延长使用时间包括:若所述延长设定为重置设定,在确定身份认证通过后重置累计计时;若所述延长设定为延时设定,在确定身份认证通过后延长所述时长设定指定的时间。
- 根据权利要求1或2所述方法,其特征在于,所述时间控制规则还包括:间隔设置;在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,所述方法还包括:确定所述目标程序本次启动时刻与上次关闭时刻的间隔时间是否符合所述间隔设置,若是则执行所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序,否显示以所述时长设定与所述实际使用时长的差值为起点的倒计时的提示信息。
- 根据权利要求1或2所述方法,其特征在于,所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,所述方法还包括:显示应用程序的管理设置界面,在用户认证通过后显示应用列表;接收所述用户选择的所述目标应用程序,接收对所述目标程序的所述时间 控制规则;在所述应用列表的所述应用图标的显示区域中显示所述目标应用的时间控制规则。
- 根据权利要求4所述方法,其特征在于,所述显示应用程序的管理设置界面,在用户认证通过后显示应用列表,包括:在设置管理界面接收到应用时间管理指令后,显示应用程序的管理界面;若本次为首次启动所述应用程序的管理界面,则直接显示应用列表,并接收认证设定;若本次非首次启动所述应用程序的管理界面,则使用所述认证设定指定的认证方式进行用户认证,在用户认证通过后显示应用列表。
- 根据权利要求5所述方法,其特征在于,所述认证设定包括指纹认证;所述指纹认证包含:设定手指的指纹认证。
- 根据权利要求5所述方法,其特征在于,所述若本次为首次启动所述应用程序的管理界面,则直接显示应用列表之前,所述方法还包括:终端设备启动后显示锁屏界面,在锁屏认证通过后,执行所述终端设备启动后显示桌面。
- 根据权利要求1或2所述方法,其特征在于,所述在所述桌面上显示应用图标包括:若所述应用图标为被设置了时间控制规则的目标应用程序所对应的图标,则在所述应用图标上显示标注标识;若接收到点击所述标注标识的指令,则显示所述时间控制规则。
- 一种终端设备,其特征在于,包括:显示单元,用于在所述终端设备启动后显示桌面,在所述桌面上显示应用图标;应用控制单元,用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序;计时单元,用于若与所述应用图标对应的目标应用程序属于被设置了时间控制规则的应用程序,则对所述目标应用程序的实际使用时长进行累计计时;所述时间控制规则包括:时长设定以及延长设定;提示单元,用于若所述时长设定与所述实际使用时长的差值小于预定阈 值,则提示时间额度不足;若所述延长设定被设置为是,则进一步提示是否需要延长时间;所述应用控制单元,还用于若接收到需要延长时间的指令后进行身份认证,若身份认证通过则延长使用时间,否则在所述实际使用时长达到所述时长设定后,退出并锁定所述目标应用程序。
- 根据权利要求9所述终端设备,其特征在于,所述延长设定包括:重置设定或延时设定;所述应用控制单元,用于若身份认证通过则延长使用时间包括:若所述延长设定为重置设定,在确定身份认证通过后重置累计计时;若所述延长设定为延时设定,在确定身份认证通过后延长所述时长设定指定的时间。
- 根据权利要求9或10所述终端设备,其特征在于,所述时间控制规则还包括:间隔设置;所述应用控制单元,还用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,确定所述目标程序本次启动时刻与上次关闭时刻的间隔时间是否符合所述间隔设置,若是则执行所述在所述应用图标被点击后启动与所述应用图标对应的目标应用程序,否控制所述显示单元显示以所述时长设定与所述实际使用时长的差值为起点的倒计时的提示信息。
- 根据权利要求9或10所述终端设备,其特征在于,所述显示单元,还用于在所述应用图标被点击后启动与所述应用图标对应的目标应用程序之前,显示应用程序的管理设置界面,在用户认证通过后显示应用列表;所述终端设备还包括:接收单元,用于接收所述用户选择的所述目标应用程序,接收对所述目标程序的所述时间控制规则;所述显示单元,还用于在所述应用列表的所述应用图标的显示区域中显示所述目标应用的时间控制规则。
- 根据权利要求12所述终端设备,其特征在于,所述显示单元,用于显示应用程序的管理设置界面,在用户认证通过后显示应用列表,包括:在设置管理界面接收到应用时间管理指令后,显示应用程 序的管理界面;若本次为首次启动所述应用程序的管理界面,则直接显示应用列表,并接收认证设定;若本次非首次启动所述应用程序的管理界面,则使用所述认证设定指定的认证方式进行用户认证,在用户认证通过后显示应用列表。
- 根据权利要求13所述终端设备,其特征在于,所述认证设定包括指纹认证;所述指纹认证包含:设定手指的指纹认证。
- 根据权利要求13所述终端设备,其特征在于,所述显示单元,还用于所述若本次为首次启动所述应用程序的管理界面,则直接显示应用列表之前,在所述终端设备启动后显示锁屏界面,在锁屏认证通过后,执行在所述显示桌面。
- 根据权利要求9或10所述终端设备,其特征在于,所述显示单元,用于在所述桌面上显示应用图标包括:若所述应用图标为被设置了时间控制规则的目标应用程序所对应的图标,则在所述应用图标上显示标注标识;若接收到点击所述标注标识的指令,则显示所述时间控制规则。
Priority Applications (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP16916558.6A EP3508997B1 (en) | 2016-09-24 | 2016-09-24 | Offline management method for application use time, and terminal device |
AU2016424054A AU2016424054B2 (en) | 2016-09-24 | 2016-09-24 | Method for managing application program use time offline, and terminal device |
CA3037973A CA3037973C (en) | 2016-09-24 | 2016-09-24 | Method for managing application program use time offline, and terminal device |
PCT/CN2016/099991 WO2018053819A1 (zh) | 2016-09-24 | 2016-09-24 | 离线管理应用程序使用时间的方法、及终端设备 |
EP23155519.4A EP4220452A3 (en) | 2016-09-24 | 2016-09-24 | Method for managing application program use time offline, and terminal device |
BR112019005714-5A BR112019005714B1 (pt) | 2016-09-24 | 2016-09-24 | Método para um dispositivo eletrônico e dispositivo eletrônico para gerenciar tempo de uso de programa de aplicação offline |
CN201680080593.4A CN108604265B (zh) | 2016-09-24 | 2016-09-24 | 离线管理应用程序使用时间的方法、及终端设备 |
US16/336,293 US10824439B2 (en) | 2016-09-24 | 2016-09-24 | Method for managing application program use time offline, and terminal device |
JP2019515983A JP6736766B2 (ja) | 2016-09-24 | 2016-09-24 | 電子デバイス、方法、および、プログラム |
CN202011472705.5A CN112560001B (zh) | 2016-09-24 | 2016-09-24 | 离线管理应用程序使用时间的方法、及终端设备 |
US17/011,134 US11537408B2 (en) | 2016-09-24 | 2020-09-03 | Method for managing application program use time offline, and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/099991 WO2018053819A1 (zh) | 2016-09-24 | 2016-09-24 | 离线管理应用程序使用时间的方法、及终端设备 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/336,293 A-371-Of-International US10824439B2 (en) | 2016-09-24 | 2016-09-24 | Method for managing application program use time offline, and terminal device |
US17/011,134 Continuation US11537408B2 (en) | 2016-09-24 | 2020-09-03 | Method for managing application program use time offline, and terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018053819A1 true WO2018053819A1 (zh) | 2018-03-29 |
Family
ID=61689802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/099991 WO2018053819A1 (zh) | 2016-09-24 | 2016-09-24 | 离线管理应用程序使用时间的方法、及终端设备 |
Country Status (8)
Country | Link |
---|---|
US (2) | US10824439B2 (zh) |
EP (2) | EP3508997B1 (zh) |
JP (1) | JP6736766B2 (zh) |
CN (2) | CN112560001B (zh) |
AU (1) | AU2016424054B2 (zh) |
BR (1) | BR112019005714B1 (zh) |
CA (1) | CA3037973C (zh) |
WO (1) | WO2018053819A1 (zh) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10789642B2 (en) | 2014-05-30 | 2020-09-29 | Apple Inc. | Family accounts for an online content storage sharing service |
US10558546B2 (en) * | 2018-05-08 | 2020-02-11 | Apple Inc. | User interfaces for controlling or presenting device usage on an electronic device |
CN110389803A (zh) * | 2019-06-28 | 2019-10-29 | 北京小米移动软件有限公司 | 一种页面显示方法、装置、显示终端及存储介质 |
CN110816076A (zh) * | 2019-09-29 | 2020-02-21 | 厦门喵宝科技有限公司 | 便携式打印机及其番茄钟实现方法、装置、设备、系统 |
CN110768835B (zh) * | 2019-10-25 | 2022-03-25 | 杭州迪普科技股份有限公司 | 一种应用时长统计方法、装置、设备及存储介质 |
CN111460411B (zh) * | 2020-04-17 | 2023-08-04 | 支付宝(杭州)信息技术有限公司 | 一种保持登录状态的方法及系统 |
US20230274032A1 (en) * | 2020-07-03 | 2023-08-31 | Ashley Carter | System and method for controlling the amount of screen time of an individual |
CN111857476B (zh) * | 2020-07-17 | 2022-07-08 | 维沃移动通信有限公司 | 显示方法、装置及电子设备 |
CN112015488A (zh) * | 2020-08-31 | 2020-12-01 | 中移(杭州)信息技术有限公司 | 专用终端的实现方法、电子设备和存储介质 |
CN112954462A (zh) * | 2021-01-25 | 2021-06-11 | 海信视像科技股份有限公司 | 显示设备及应用运行时长的控制方法 |
CN116806334A (zh) * | 2021-02-05 | 2023-09-26 | 松下电器(美国)知识产权公司 | 信息处理方法以及信息处理装置 |
CN114510177A (zh) * | 2022-01-05 | 2022-05-17 | 维沃移动通信有限公司 | 定时提醒方法及其装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104765993A (zh) * | 2015-03-25 | 2015-07-08 | 广东欧珀移动通信有限公司 | 一种防沉迷的方法和装置 |
CN105120080A (zh) * | 2015-07-23 | 2015-12-02 | Tcl移动通信科技(宁波)有限公司 | 一种移动终端的防沉迷控制方法、系统及移动终端 |
CN105302598A (zh) * | 2015-10-15 | 2016-02-03 | 广东欧珀移动通信有限公司 | 一种应用运行的定时管理方法及装置 |
US9374379B1 (en) * | 2007-06-26 | 2016-06-21 | Aol Inc. | Application unlock |
CN105955868A (zh) * | 2016-05-05 | 2016-09-21 | 广东小天才科技有限公司 | 一种节制智能终端应用程序运行时间的方法及系统 |
Family Cites Families (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6607136B1 (en) | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
US20130226453A1 (en) * | 2005-02-08 | 2013-08-29 | Bryan Gardner Trussel | Systems and methods for mobile communication integration |
JP2007117125A (ja) * | 2005-10-25 | 2007-05-17 | Snk Playmore Corp | ゲーム機及びゲームプログラム |
KR101102342B1 (ko) * | 2006-10-02 | 2012-01-03 | 엘지전자 주식회사 | 이동통신단말기의 애플리케이션 종료시간 설정방법,이동통신단말기의 애플리케이션 종료방법, 및 이를수행하기 위한 이동통신단말기 |
WO2009069655A1 (ja) * | 2007-11-27 | 2009-06-04 | Canon Denshi Kabushiki Kaisha | 管理サーバ、クライアント端末、端末管理システム、端末管理方法、プログラム、及び、記録媒体 |
US10460085B2 (en) * | 2008-03-13 | 2019-10-29 | Mattel, Inc. | Tablet computer |
JP5241339B2 (ja) * | 2008-06-17 | 2013-07-17 | 株式会社ソニー・コンピュータエンタテインメント | 情報処理装置 |
US8997155B2 (en) * | 2008-11-21 | 2015-03-31 | Echostar Technologies L.L.C. | Locally stored advertisements |
US8793774B1 (en) * | 2009-03-31 | 2014-07-29 | Juniper Networks, Inc. | Methods and apparatus for accessing a secure network segment |
CN102377585A (zh) * | 2010-08-10 | 2012-03-14 | 深圳市傲天通信有限公司 | 青少年网络防沉迷系统及其方法 |
EP2619704B1 (en) * | 2010-09-24 | 2018-01-10 | BlackBerry Limited | Method and apparatus for differentiated access control |
US9262595B2 (en) * | 2010-10-29 | 2016-02-16 | Qualcomm Incorporated | Methods and systems for accessing licensable items in a geographic area |
US20120209904A1 (en) | 2011-02-12 | 2012-08-16 | Huawei Technologies Co. Ltd. | Timeout control method, apparatus, and system |
US9111274B2 (en) * | 2011-04-28 | 2015-08-18 | Sony Corporation | Payment processing |
US9076020B2 (en) * | 2011-05-13 | 2015-07-07 | Microsoft Technology Licensing, Llc | Protected mode for mobile communication and other devices |
KR20140066258A (ko) | 2011-09-26 | 2014-05-30 | 마이크로소프트 코포레이션 | 투시 근안 디스플레이에 대한 센서 입력에 기초한 비디오 디스플레이 수정 |
US9225717B1 (en) * | 2013-03-14 | 2015-12-29 | Emc Corporation | Event-based data signing via time-based one-time authentication passcodes |
US8972297B2 (en) * | 2011-11-15 | 2015-03-03 | Citibank, N.A. | System and method for conducting a transaction at a financial transaction terminal using a mobile device |
CN103188641A (zh) * | 2011-12-28 | 2013-07-03 | 富泰华工业(深圳)有限公司 | 通讯管控系统及管控方法 |
CN103416040B (zh) | 2012-08-29 | 2016-11-16 | 华为终端有限公司 | 终端控制方法和装置、以及终端 |
US20140096180A1 (en) * | 2012-09-28 | 2014-04-03 | Ansuya Negi | System, devices, and methods for proximity-based parental controls |
US9800429B2 (en) * | 2013-03-15 | 2017-10-24 | Smartbotics Inc. | Adaptive home and commercial automation devices, methods and systems based on the proximity of controlling elements |
US9154485B1 (en) * | 2013-03-15 | 2015-10-06 | Kaazing Corporation | Authentication revalidation |
KR102108439B1 (ko) * | 2013-08-23 | 2020-05-08 | 삼성전자주식회사 | 휴대 장치 및 휴대 장치의 사용 제한 방법 |
US20150066762A1 (en) * | 2013-08-28 | 2015-03-05 | Geoffrey W. Chatterton | Authentication system |
US9223937B2 (en) * | 2013-09-17 | 2015-12-29 | Google Technology Holdings LLC | Method and apparatus for extending an authentication timeout period |
CN104980565A (zh) * | 2014-04-09 | 2015-10-14 | 小米科技有限责任公司 | 终端防沉迷方法及装置 |
US11404146B2 (en) * | 2014-05-30 | 2022-08-02 | Apple Inc. | Managing user information—data type extension |
CN104133693B (zh) * | 2014-07-10 | 2016-03-30 | 腾讯科技(深圳)有限公司 | 安装状态检测方法、装置及终端 |
KR20160071264A (ko) | 2014-12-11 | 2016-06-21 | 엘지전자 주식회사 | 이동 단말기 및 그것의 제어방법 |
JPWO2016017035A1 (ja) * | 2014-08-01 | 2017-05-25 | シャープ株式会社 | 通信端末装置、その制御方法および制御プログラム |
JP2016057845A (ja) * | 2014-09-09 | 2016-04-21 | 三洋テクノソリューションズ鳥取株式会社 | 情報端末装置 |
CN104360852A (zh) * | 2014-10-30 | 2015-02-18 | 北京数字天域科技股份有限公司 | 一种移动终端应用程序管理方法以及装置 |
US9875346B2 (en) * | 2015-02-06 | 2018-01-23 | Apple Inc. | Setting and terminating restricted mode operation on electronic devices |
CN104660821A (zh) * | 2015-03-04 | 2015-05-27 | 深圳市中兴移动通信有限公司 | 控制终端使用时长的方法和移动终端 |
CN105278948B (zh) * | 2015-06-24 | 2019-05-17 | 维沃移动通信有限公司 | 一种移动终端的控制方法及移动终端 |
US9842485B2 (en) * | 2015-08-25 | 2017-12-12 | Honeywell International Inc. | Prognosticating panic situations and pre-set panic notification in a security system |
CN105243322A (zh) * | 2015-10-10 | 2016-01-13 | 深圳市金立通信设备有限公司 | 一种应用程序控制方法及终端 |
CN105446782A (zh) * | 2015-12-24 | 2016-03-30 | 深圳市金立通信设备有限公司 | 一种终端应用的管理方法及终端 |
US10686899B2 (en) * | 2016-04-06 | 2020-06-16 | Snap Inc. | Messaging achievement pictograph display system |
CN105872247B (zh) * | 2016-05-26 | 2018-01-19 | 广东欧珀移动通信有限公司 | 一种应用防沉迷的方法、装置及移动终端 |
US10957445B2 (en) * | 2017-10-05 | 2021-03-23 | Hill-Rom Services, Inc. | Caregiver and staff information system |
-
2016
- 2016-09-24 CN CN202011472705.5A patent/CN112560001B/zh active Active
- 2016-09-24 JP JP2019515983A patent/JP6736766B2/ja active Active
- 2016-09-24 US US16/336,293 patent/US10824439B2/en active Active
- 2016-09-24 WO PCT/CN2016/099991 patent/WO2018053819A1/zh unknown
- 2016-09-24 AU AU2016424054A patent/AU2016424054B2/en active Active
- 2016-09-24 EP EP16916558.6A patent/EP3508997B1/en active Active
- 2016-09-24 BR BR112019005714-5A patent/BR112019005714B1/pt active IP Right Grant
- 2016-09-24 EP EP23155519.4A patent/EP4220452A3/en active Pending
- 2016-09-24 CN CN201680080593.4A patent/CN108604265B/zh active Active
- 2016-09-24 CA CA3037973A patent/CA3037973C/en active Active
-
2020
- 2020-09-03 US US17/011,134 patent/US11537408B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9374379B1 (en) * | 2007-06-26 | 2016-06-21 | Aol Inc. | Application unlock |
CN104765993A (zh) * | 2015-03-25 | 2015-07-08 | 广东欧珀移动通信有限公司 | 一种防沉迷的方法和装置 |
CN105120080A (zh) * | 2015-07-23 | 2015-12-02 | Tcl移动通信科技(宁波)有限公司 | 一种移动终端的防沉迷控制方法、系统及移动终端 |
CN105302598A (zh) * | 2015-10-15 | 2016-02-03 | 广东欧珀移动通信有限公司 | 一种应用运行的定时管理方法及装置 |
CN105955868A (zh) * | 2016-05-05 | 2016-09-21 | 广东小天才科技有限公司 | 一种节制智能终端应用程序运行时间的方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
EP3508997A4 (en) | 2019-08-07 |
CN108604265A (zh) | 2018-09-28 |
US20200401419A1 (en) | 2020-12-24 |
CN112560001A (zh) | 2021-03-26 |
EP4220452A2 (en) | 2023-08-02 |
CA3037973A1 (en) | 2018-03-29 |
EP4220452A3 (en) | 2023-09-20 |
EP3508997A1 (en) | 2019-07-10 |
AU2016424054B2 (en) | 2020-11-26 |
JP2019535074A (ja) | 2019-12-05 |
AU2016424054A1 (en) | 2019-05-02 |
BR112019005714A2 (pt) | 2019-07-09 |
JP6736766B2 (ja) | 2020-08-05 |
US20190220290A1 (en) | 2019-07-18 |
US11537408B2 (en) | 2022-12-27 |
CA3037973C (en) | 2023-03-28 |
CN108604265B (zh) | 2020-12-25 |
CN112560001B (zh) | 2023-10-03 |
EP3508997B1 (en) | 2023-04-19 |
BR112019005714B1 (pt) | 2023-11-21 |
US10824439B2 (en) | 2020-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018053819A1 (zh) | 离线管理应用程序使用时间的方法、及终端设备 | |
US11269981B2 (en) | Information displaying method for terminal device and terminal device | |
EP3764253B1 (en) | Method for quickly opening application or application function, and terminal | |
CN106778175B (zh) | 一种界面锁定方法、装置和终端设备 | |
CN106250223B (zh) | 一种后台进程管理方法及终端设备 | |
WO2015100569A1 (zh) | 侧边菜单显示方法、装置和终端 | |
KR101939008B1 (ko) | 정보 추천 관리 방법, 디바이스 및 시스템 | |
WO2018214748A1 (zh) | 应用界面的显示方法、装置、终端及存储介质 | |
WO2015055098A1 (en) | Method and device for quick starting of application | |
CN108710806B (zh) | 一种终端解锁方法、移动终端 | |
CN104573437A (zh) | 信息认证方法、装置和终端 | |
WO2019095156A1 (zh) | 一种信息搜索的方法、终端、网络设备和系统 | |
KR20160088609A (ko) | 전자 장치 및 전자 장치의 정보 공개 제어 방법 | |
JP6974620B2 (ja) | 通知メッセージ処理方法及び端末 | |
WO2019090702A1 (zh) | 一种终端的安全保护方法及装置 | |
JP7125066B2 (ja) | オフラインでアプリケーションプログラム使用時間を管理するための方法、および、端末デバイス | |
WO2020192415A1 (zh) | 权限配置方法及终端设备 | |
CN108681668A (zh) | 设备管理器管理方法、装置以及移动终端 | |
WO2019061248A1 (zh) | 虚拟按键操作方法、终端、存储介质及计算机程序 | |
CN116305087A (zh) | 应用管理方法、智能终端及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16916558 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 3037973 Country of ref document: CA Ref document number: 2019515983 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112019005714 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2016916558 Country of ref document: EP Effective date: 20190405 |
|
ENP | Entry into the national phase |
Ref document number: 2016424054 Country of ref document: AU Date of ref document: 20160924 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112019005714 Country of ref document: BR Kind code of ref document: A2 Effective date: 20190322 |