WO2019024603A1 - 终端及儿童模式实现方法、计算机可读存储介质 - Google Patents
终端及儿童模式实现方法、计算机可读存储介质 Download PDFInfo
- Publication number
- WO2019024603A1 WO2019024603A1 PCT/CN2018/090410 CN2018090410W WO2019024603A1 WO 2019024603 A1 WO2019024603 A1 WO 2019024603A1 CN 2018090410 W CN2018090410 W CN 2018090410W WO 2019024603 A1 WO2019024603 A1 WO 2019024603A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- child
- mobile terminal
- information
- child mode
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Definitions
- the present invention relates to the field of mobile terminal technologies, and in particular, to a child mode implementation method for a mobile terminal, a mobile terminal, and a computer readable storage medium.
- mobile terminals such as smart phones have become a necessity in people's daily lives.
- children may encounter situations in which they use mobile terminals.
- children's operation of the mobile terminal may cause misoperation, which causes a certain loss.
- the current mobile terminal cannot avoid the loss;
- the uncontrolled use of the mobile terminal by the child may affect the healthy development of the body and mind, such as long-term use of vision. Declining, it is currently impossible to give certain protection to children of mobile terminals.
- the present invention provides a method for implementing a child mode of a mobile terminal, the method includes: acquiring biometric information of the user; determining whether the user is a child according to the biometric information; if yes, entering a child mode; acquiring an operation instruction in the child mode; Determine whether the operation instruction is allowed; if so, execute the operation instruction.
- the present invention provides a mobile terminal, the mobile terminal includes: a first acquiring unit, configured to acquire biometric information of the user; and a first determining unit, configured to determine, according to the biometric information, whether the age of the user is a child; When the first determining unit determines that the user is a child, enters the child mode; the second obtaining unit is configured to acquire an operation instruction in the child mode; the second determining unit is configured to determine whether the operation instruction is allowed; and the executing unit is configured to: When the second determination unit determines that the operation instruction is permitted, the operation instruction is executed.
- the present invention provides a mobile terminal comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, the processor implementing the steps of the method when executing the computer program.
- the present invention provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the steps of the above method.
- FIG. 1 is a schematic flow chart of an embodiment of a method for implementing a child mode of a mobile terminal according to the present invention
- FIG. 2 is a schematic flowchart of an embodiment of a mode triggering method of a mobile terminal according to the present invention
- FIG. 3 is a schematic flow chart of another embodiment of a method for implementing a child mode of a mobile terminal according to the present invention.
- FIG. 4 is a schematic flow chart of an embodiment of a method for calling a mobile terminal application according to the present invention.
- FIG. 5 is a schematic flowchart of an embodiment of a network connection method of a mobile terminal according to the present invention.
- FIG. 6 is a schematic flow chart of an embodiment of a method for controlling a mobile terminal according to the present invention.
- FIG. 7 is a schematic structural diagram of hardware of an embodiment of a mobile terminal according to the present invention.
- FIG. 8 is a schematic diagram showing the software structure of an embodiment of a mobile terminal according to the present invention.
- first”, “second”, and “third” in the present invention are used for descriptive purposes only, and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, features defining “first”, “second”, and “third” may include at least one of the features, either explicitly or implicitly.
- the meaning of "a plurality” is at least two, such as two, three, etc., unless specifically defined otherwise. All directional indications (such as up, down, left, right, front, back, %) in the embodiments of the present invention are only used to explain the relative positional relationship between components in a certain posture (as shown in the drawing).
- references to "an embodiment” herein mean that a particular feature, structure, or characteristic described in connection with the embodiments can be included in at least one embodiment of the invention.
- the appearances of the phrases in various places in the specification are not necessarily referring to the same embodiments, and are not exclusive or alternative embodiments that are mutually exclusive. Those skilled in the art will understand and implicitly understand that the embodiments described herein can be combined with other embodiments.
- the method of the present invention is applied to a mobile terminal, mainly for a case where a child uses a mobile terminal, and in order to avoid loss caused by a child's misoperation to the mobile terminal, and to protect a child using the mobile terminal.
- the child mode is set in the mobile terminal of the present invention, and the present invention proposes various methods of using the mobile terminal in the child mode.
- FIG. 1 is a schematic flowchart diagram of an embodiment of a method for implementing a child mode of a mobile terminal according to the present invention. Among them, the mobile terminal in the child mode judges whether it is allowed before the operation instruction is executed, and prevents the child from performing an operation that is not allowed.
- FIG. 2 is a schematic flowchart diagram of an embodiment of a mode triggering method of a mobile terminal according to the present invention.
- the mobile terminal detects the touch operation by acquiring a user image to trigger the child mode, so that the mobile terminal is in the child mode to avoid problems caused by child misoperation.
- FIG. 3 is a schematic flowchart diagram of another embodiment of a method for implementing a child mode of a mobile terminal according to the present invention.
- the applications in the mobile mode of the child mode are divided into different categories, and the different types of applications have different usage durations to prevent children from using the game application excessively.
- FIG. 4 is a schematic flowchart of an embodiment of a method for calling a mobile terminal application according to an embodiment of the present invention, wherein an application in a mobile terminal in a child mode is invoked according to an overall number of applications to improve a usage experience in a child mode.
- FIG. 5 is a schematic flowchart of an embodiment of a network connection method of a mobile terminal according to an embodiment of the present invention, wherein a mobile terminal in a child mode determines whether to perform a network connection according to a blacklist of a network interface to prevent a child from connecting to a payment network interface or moving. Network Interface.
- FIG. 6 is a schematic flowchart diagram of an embodiment of a method for controlling a mobile terminal according to the present invention.
- the mobile terminal in the child mode can acquire user usage information, such as usage time. If the usage time exceeds the preset time, a lock screen operation is performed to protect the child's eyes.
- Figures 1 - 6 describe various situations that may occur when a mobile terminal having a child mode is in use, and Figures 1 - 6 are described in detail below.
- FIG. 1 is a schematic flowchart of a method for implementing a child mode of a mobile terminal according to an embodiment of the present invention.
- the method for implementing a child mode in this embodiment includes the following steps.
- S11 Acquire biometric information of the user.
- the biometric information may be iris information, face image, fingerprint information, and the like.
- the mobile terminal can obtain the fingerprint information through the fingerprint identification module, and obtain the fingerprint information when the fingerprint is unlocked.
- the iris information or the face image can also be obtained through the camera.
- the periodic opening is used in this embodiment.
- the front camera acquires the user's iris information or face image, wherein the iris information is acquired by the iris camera.
- the acquired biometric information is used to determine whether the user is a child in the following step S12. Therefore, the biometric information acquired by the mobile terminal in this embodiment is processed by the background, especially when the camera acquires iris information or a face image.
- the mobile terminal automatically turns on the front camera to acquire the iris information or the face image of the user, and then judges in the background of the mobile terminal, that is, the acquisition or judgment process is not displayed on the display screen.
- S12 Determine whether the user is a child according to the biometric information.
- the biometric information obtained in the above step S11 is used to determine whether the user is a child. Taking fingerprint information as an example, this step determines whether the user has children in multiple ways.
- the mobile terminal can store the pre-stored information of the user, and the pre-stored information is associated with the age information, the acquired fingerprint information is matched with the pre-stored information, the pre-stored information matching the fingerprint information is found, and the age information is obtained in response.
- the child who is under 12 years old is judged to be a child.
- Another method is to analyze the obtained fingerprint information, obtain at least one of the width, the area, the sharpness, and the number of wrinkles of the fingerprint, determine the age of the user according to the specific fingerprint condition, and then determine Whether the user is a child.
- the child's age is small, the body is still growing and developing, the child's finger length and width are smaller than the adult, the child's fingerprint is also smaller than the adult's fingerprint, so the child's fingerprint line width, coverage area, The number of wrinkles is also smaller than the width, coverage area, and wrinkle of the fingerprint of the adult's fingerprint, and the child has less experience in using the fingerprint recognition function, and the finger movement may occur when the fingerprint is recognized, resulting in unclear fingerprints. Therefore, the terminal can determine at least one of the width, the coverage area, the sharpness, and the number of wrinkles of the fingerprint of the fingerprint to determine whether the user is a child.
- the acquired biometric information is iris information or a face image
- the method similar to the fingerprint information described above may also be used for the determination.
- the mobile terminal can only obtain the unlocked If the user's biometric information is changed when the mobile terminal is used, if the current user does not touch the fingerprint identification module, it is difficult to detect the biometric information of the current user.
- the iris information or the face image may be further combined to determine, that is, after the fingerprint information is obtained in step S11, if the user is not a child, the front camera is periodically turned on during use of the mobile terminal. To obtain iris information or a face image, and then determine whether the user is a child according to the iris information or the face image, and when the user is determined to be a child, the user biometric information is no longer acquired.
- the mobile terminal After the mobile terminal determines in step S12 that the user is a child, the mobile terminal automatically enters a specific use environment, that is, enters a child mode, and the child mode may be a preset scene mode in the mobile terminal, which may be pre-delivered in the mobile terminal. Settings can also be set by the user.
- the mobile terminal can be personalized according to the child mode, for example, disabling certain operations in the mobile terminal, changing the display manner of the mobile terminal, etc. The following steps specifically describe how various operations in the child mode are implemented.
- the mobile terminal After entering the child mode, the user performs related operations, and the mobile terminal acquires an operation instruction, and the operation instruction can be issued by a physical key on the mobile terminal or a virtual key on the display screen, and the operation instruction includes a communication instruction, an installation instruction of the application, an opening instruction, or Unload command, sound adjustment command, exit child mode command, etc.
- the mobile terminal In the child mode, after obtaining the operation instruction, the mobile terminal does not immediately execute the operation instruction, but determines whether the operation instruction is allowed in this step S15. If not, the operation instruction is not executed, if allowed Then, the process proceeds to step S16, and the operation instruction is executed.
- the operation instruction is the exit child mode instruction
- it is determined that the exit child mode instruction is allowed the user is prompted to input a password, and after receiving the password input by the user, executing the exit child mode instruction, exiting Child mode.
- the password can be in various forms, for example, a fingerprint password, a face password, an iris password, a voice password, a numeric password, a pattern password, a mixed password of letters and numbers, and the like.
- the mobile terminal determines whether the instruction is permitted. If the determination result is YES, the sound adjustment instruction is executed to increase or decrease the sound.
- the mobile terminal determines whether the installation instruction is allowed. If the determination result is yes, the terminal prompts the user to input a password, and the terminal receives the password input by the user, and then installs in response to the installation instruction.
- the app can be in a variety of ways. For application-related operations, the mobile terminal can make decisions based on the type of application, such as operating instructions for financial applications.
- the embodiment After acquiring the biometric information of the user by using the fingerprint, the embodiment determines that the user enters the child mode when the user is a child according to the biometric information, acquires an operation instruction in the child mode, and executes an operation instruction by determining that the operation instruction is allowed.
- the mobile terminal of the present invention enters the child mode after determining that the user is a child, and judges the user's operation instruction in the child mode to avoid the risk problem caused by the child's misoperation.
- FIG. 2 is a schematic flowchart of a mode triggering method of a mobile terminal according to an embodiment of the present invention.
- the example mode triggering method includes the following steps.
- S21 Monitor a touch operation on the touch screen of the mobile terminal to obtain touch information generated under the touch operation.
- the touch operation on the touch screen can be detected in real time or periodically.
- the touch information generated under the touch operation is obtained, that is, on the touch screen. Touch information.
- a touch information can be obtained; if multiple touch operations occur on the touch screen for a period of time, multiple touch information is acquired; If a continuous touch operation occurs on the touch screen for a period of time, multiple touch information of the continuous touch operation is acquired at a preset time interval.
- step S21 It is determined whether the touch information obtained in step S21 satisfies a preset condition, and if yes, step S23 is performed. If the plurality of touch information is acquired in step S21, the plurality of touch information may be calculated to obtain an average touch information.
- the touch information acquired in step S21 may be a touch area.
- the touch area is determined. If the touch area is smaller than the area threshold, the touch information is considered to satisfy the preset condition.
- the method of the embodiment is used to trigger the child mode, that is, when the child uses the mobile terminal, the child mode is triggered, and the child's finger is small, and the touch area of the touch screen is small, so in this embodiment, Touch the area to judge.
- a plurality of touch areas are acquired in step S21, an average value of the plurality of touch areas may be calculated, or a median of the plurality of touch areas may be taken, and then the touch is further determined in this step S22. Whether the average value of the area is smaller than the area threshold, and if so, the touch information satisfies the preset condition.
- the touch area of the touch screen is elliptical, the lengths of the long axis and the short axis of the touch area can be obtained, and then the touch area is calculated according to the two lengths.
- the touch information may also be a contact interval. If the contact interval is less than the distance threshold, the touch information is considered to satisfy the preset condition. Specifically, when the child uses the mobile terminal to perform multi-touch, the child's palm is small, and thus the distance between the contacts is also small, that is, the determination can be made according to the contact interval in this embodiment. When multiple contacts appear, the distance between adjacent contacts is taken. For the case of multiple contact spacing, the average of the multiple contact intervals is also averaged or taken.
- the camera of the mobile terminal is further turned on in the embodiment, and further determining whether the user is a child according to the user image.
- the touch information is used to determine whether it is a child, a false positive may occur.
- the child is easily misjudged according to the touched area. Therefore, in this embodiment, it is further determined according to the user image. Compared with the case of directly determining the image according to the user, in this embodiment, the camera does not need to be turned on in real time or periodically, and the acquisition of the user image can be realized with a small power consumption.
- S24 Determine, according to the image of the user, whether the touch operation is a child operation.
- step S24 according to the user image acquired in the above step S23, it is determined whether the touch operation is a child operation, and the user image can be matched with the pre-stored image, wherein each pre-stored image is associated with an age information, which is associated with the matched pre-stored image.
- the age information determines whether the touch operation is a child operation.
- the user image may also be analyzed to acquire features of the user image to determine the age corresponding to the user image, thereby determining whether the touch operation is a child operation.
- step S24 After determining that the touch operation is a child operation in this step S24, the following step S25 is performed.
- the mobile terminal When the mobile terminal triggers the child mode, it enters the child mode. After entering the child mode, the implementation of the child mode can refer to the situation shown in FIG. 1.
- the embodiment Compared with the user entry into the child mode according to the user biometric information in FIG. 1 , the embodiment provides another way of entering the child mode, that is, when the mobile terminal acquires the touch information, it is determined whether the operation may be performed by the child, if possible. And further determining according to the user image to improve the accuracy of the determination of the mobile terminal.
- the present invention proposes the use of the application in terms of usage time and mutual calling.
- FIG. 3 is a schematic flowchart of another embodiment of a method for implementing a child mode of a mobile terminal according to the present invention.
- the method for implementing a child mode in this embodiment includes the following steps.
- the child mode can be entered according to the user biometric information as described in the embodiment of FIG. 1, or the child mode can be received by the virtual key or the physical key in the normal mode, and Enter the child mode according to the user's operation information.
- a physical shortcut key may be set in the mobile terminal, and when the physical shortcut key detects the pressing operation, the mobile terminal enters the child mode.
- An entry can also be set in the system of the mobile terminal, for example, an icon is set as a child mode entry on the control center page, and the user can click on the icon to enter the child mode.
- the operation information of the user may be received by the touch screen, for example, the size of the touch finger, the distance between the touch fingers, and if the finger is small or the spacing is small, the child is considered to enter For the child mode, please refer to the situation described in the embodiment of FIG. 2 .
- S32 Acquire category information of the application in the child mode, and obtain the available duration of the application according to the category information.
- S33 Record the usage time of the application. If the usage time exceeds the available time, disable the application.
- steps S32 and S33 can be performed simultaneously or sequentially.
- the usage time of the application is recorded, and the available time of the application is obtained.
- the category information is first acquired, and then the available time length is acquired according to the category information.
- the category information may include a game class, a video class, a learning class, and the like.
- the available time of the game-like application is generally set to 30 minutes
- the available time of the video-like application is set to 40 minutes
- the available time of the application of the learning class is set. It is 45 minutes.
- the category of the above application may be set by the user autonomously, or the category of the application in the application market may be obtained during download and installation, and the acquired category is used as the category of the application in the mobile terminal.
- the terminal determines that the category information of the application is a game category, and according to the category information of the game category.
- the available time to get the application of the game class is set to 30 minutes, that is, the application time of the app is 30 minutes;
- the terminal monitors that the application used by the user is Youku, the terminal determines that the category information of the application is a video class, and the available time of the application that obtains the video class according to the category information of the video class is set to 40 minutes. That is, the application available for Youku is 40 minutes long;
- the terminal monitors that the application used by the user is a dictionary
- the terminal determines that the category information of the application is a learning class.
- the available time of the application that acquires the learning class according to the category information of the learning class is set to 45. Minutes, that is, the application of the dictionary is available for 45 minutes.
- the terminal monitors the usage time of the application, that is, the usage time of the application recorded in the child mode as described in step S33.
- the usage time of the application that is, the usage time of the application recorded in the child mode as described in step S33.
- One way is to accumulate the record usage time and accumulate the time when the user uses the application in the child mode, that is, the user records the total usage time of the application in the current child mode. When the user exits the application, it will not Re-record the usage time, of course, after the user exits the child mode, it will be re-recorded. If the cumulative usage time of the application in child mode exceeds the available duration of the program, the application is disabled.
- the terminal when the user opens the application of happy music in the child mode, the terminal obtains the category information of the application as a game class, and the available time of the game application is 30 minutes, when the user is in the child mode. Under the program of happy music, the terminal records the user's first use of the program for 10 minutes. If the user quits the program and does not exit the child mode, then the user uses the happy music program for the second time. The usage time is continuously recorded on a 10 minute basis, that is, the accumulated usage time is up to 30 minutes, and the happy music elimination application is disabled.
- Another way is to record the usage time in a single recording, recording the time each time the user uses the application, that is, re-recording the usage time after exiting the application. For example, when the user uses happy music in the child mode, the terminal records that the user uses the program for the first time for 10 minutes. If the user quits the program and then the user uses the program for the second time, the usage time is re-recorded. It won't accumulate in 10 minutes.
- the application is disabled, meaning that the application can no longer be operated in the child space.
- the time of using the mobile terminal by the user may be controlled according to the available duration of the application.
- FIG. 4 is a schematic flowchart of a method for calling a mobile terminal application according to an embodiment of the present invention.
- the calling method of the application includes the following steps.
- the method of entering the child mode in this step may adopt the method in the above embodiment, and details are not described herein.
- the application of the mobile terminal is started, that is, the mobile terminal starts the application.
- the application in the child mode is an application that is accessible in the child mode, and the application outside the child mode is an application that is inaccessible in the child mode.
- S43 Determine whether the number of applications in the child mode is less than a first threshold.
- step S45 it is determined whether the number of applications in the child mode is less than the first threshold. If yes, step S45 is performed to execute the call instruction, that is, when the application mode is small in the child mode, the call is allowed, thereby improving the user experience.
- step S43 it may also be determined whether the application outside the child mode corresponding to the calling instruction is callable, for example, the user can set the payment application to be invokable, and for the calling application of the payment application, the calling instruction may not be directly executed. , step S43 is not performed. If it is a callable application, the determination in step S43 is performed.
- step S44 in addition to performing the determination in this step S43, when there are many applications to be called, it is necessary to further perform step S44.
- S44 Determine whether the number of applications outside the currently invoked child mode is less than a second threshold.
- step S45 is performed, that is, when the number of called applications is large, the calling instruction is not executed.
- the number of times the application outside the child mode is called may be recorded, and if the number of times of the call exceeds the third threshold, the application outside the child mode is set as the application in the child mode, that is, Apps that are frequently used outside of child mode are automatically set to applications within child mode.
- This embodiment controls the invocation of the child mode application according to the number of applications in the child mode to improve the user experience.
- FIG. 5 is a schematic flowchart of a network connection method of a mobile terminal according to an embodiment of the present invention.
- the embodiment network connection method includes the following steps.
- the method for entering the child mode in this embodiment may adopt the method in the foregoing embodiment, and details are not described herein.
- the mobile terminal When a network connection is required in the child mode, the mobile terminal receives a network connection command.
- S53 Determine whether the network interface corresponding to the network connection instruction is in a preset network interface blacklist.
- the network interface blacklist is pre-configured.
- this step S53 it is determined whether the network interface corresponding to the network connection command is in the blacklist of the network interface. If yes, proceed to step S54, and the network connection is not performed. Command; if not, execute the network connection command.
- the network interface blacklist may include a payment network interface. If the network interface is a payment network interface, the network connection instruction is not executed, and the connection to the payment network interface in the child mode may be restricted, so as to avoid deduction by mistake.
- the network interface blacklist may also include a mobile network interface. If the network interface is a mobile network interface, the network connection command is not executed, and the connection of the mobile network interface may be restricted, so as to avoid using the carrier network, causing excessive traffic usage.
- the blacklist of the network interface may be a blacklist set by the user, or may be continuously updated during use of the mobile terminal.
- the preset blacklist may not be comprehensive enough, so after executing the network connection command in step S55, the following step S56 is performed.
- S56 Determine whether the content of the webpage after the network interface has sensitive information.
- the content of the webpage after the network interface is further analyzed. If there is sensitive information in the webpage content, the process proceeds to step S57, and the network interface is added to the blacklist to update the blacklist.
- the blacklist can be saved in the mobile terminal or saved in the cloud server. Sensitive information can be payment information or network sensitive words.
- the network connection command is executed, and the network interface can be saved to count the number of connections of the network interface. If the number of times exceeds a certain threshold, the network interface can be placed in the whitelist. Relative to the blacklist, the whitelist includes network interfaces that can be connected with confidence.
- step S53 After receiving the network connection command in step S52, it is further determined in step S53 whether the network interface corresponding to the network connection instruction is in the network white list, and if so, executing the network connection instruction, and after determining the network interface without performing step S56 Whether the content of the webpage has sensitive information.
- the blacklist of the network interface is preset. When the network connection is required in the child mode, whether the network connection is determined according to the blacklist of the network interface, thereby preventing the child from misoperation and connecting to the payment website or the sensitive website.
- FIG. 6 is a schematic flowchart of a method for controlling the mobile terminal of the present invention. Includes the following steps.
- the method of entering the child mode in this step may adopt the method of entering the child mode in the foregoing embodiment, and details are not described herein.
- S62 Acquire usage information of the mobile terminal.
- S63 The display screen of the mobile terminal performs corresponding operations according to the usage information.
- the above steps S62 and S63 perform response adjustment according to the usage of the display screen of the mobile terminal.
- the usage information of the mobile terminal may be the usage time.
- the usage time of the mobile terminal is recorded in step S62, and then it is determined in step S63 whether the recorded usage time exceeds the preset time, and if so, the display screen performs a lock screen operation.
- the usage time can be judged according to the brightness time, and the time of the bright screen in the child space can be accumulated and the time of each bright screen can be recorded.
- the usage information may also be the distance between the mobile terminal and the user.
- step S62 the distance from the user is obtained by the distance sensor of the mobile terminal, and then the distance and the preset threshold are compared in step S63. If the distance is less than the preset threshold, the display screen is displayed. Perform a black screen operation; if the distance is greater than or equal to the preset threshold, the display screen performs a bright screen operation.
- the distance sensor emits infrared light and then receives the reflected infrared light to obtain the distance between the mobile terminal and the user.
- the usage information may also be the usage time of each application in the mobile terminal.
- the usage time of the application is recorded in step S62, and then it is determined in step S63 whether the usage time of each application exceeds the preset time corresponding to the application, and if so, the display screen performs Lock screen operation.
- the recording and judgment of the application use time can be referred to the embodiment shown in FIG.
- the usage information may also be the brightness of the environment in which the mobile terminal is currently located, the current ambient brightness is acquired according to the light sensor in step S62, and then the display screen performs the brightness adjustment operation in step S63.
- the usage information may also be a change in the tilt angle of the mobile terminal.
- the content of the 3D display may be adjusted according to the tilt angle.
- the display screen can be controlled according to a single type of usage information, and the operation of the display screen can be controlled according to multiple types of usage information.
- step S62 not only the usage time is acquired, but also the distance between the mobile terminal and the user is acquired, and the time and distance are determined and monitored.
- the usage time does not exceed the preset time, if the distance is less than the preset threshold, the black screen is displayed. If it is greater than or equal to the preset threshold, it will be bright; if the usage time exceeds the preset time, the screen will be locked.
- the display screen of the mobile terminal performs the corresponding operation according to the usage situation in the child mode, and the display screen can be adjusted for different usage situations, so as to be more suitable for the user to use, for example, when the usage time is too long, the lock screen operation is performed. Ensure the user's health with the eyes.
- the above method can be implemented by a mobile terminal, specifically, a step of a method is represented by a computer program, a software structure is constructed to implement the computer program, and the computer program is executed by using a hardware device to implement the above method.
- the present invention also provides a computer readable storage medium in which a computer program is stored.
- the steps of the above method are implemented when the computer program is executed by the processor.
- the computer readable storage medium may be a USB flash drive, an optical disk, a server, or the like.
- FIG. 7 is a schematic structural diagram of hardware of an embodiment of a mobile terminal according to the present invention.
- the mobile terminal 100 of the present embodiment includes a processor 11 and a memory 12, in which a computer program is stored, and the processor 11 can implement the steps of the above method when executing the computer program.
- the mobile terminal 100 further includes a sensor 13 and an input unit 14 , and the sensor 13 may be a combination of one or more of a fingerprint recognition module, an iris camera, and the like; Used to input information, including touch panels and operating buttons or other input devices.
- the processor 11 determines whether the user is a child according to the biometric information, and if so, enters the child mode; the input unit 14 acquires an operation instruction in the child mode, and processes The device 11 then determines whether the operation instruction is permitted, and if permitted, executes the operation instruction.
- Memory 12 provides storage support during this process, such as the ability to store biometric information, operational instructions, and the like.
- the mobile terminal 100 of the present embodiment can implement all the steps in the method shown in FIG. 1.
- the mobile terminal 100 may further include an RF circuit, a display unit, an audio circuit, a wifi module, a power source, and the like.
- the RF circuit, the display unit, the audio circuit, and the wifi module are respectively connected to the processor 11; the power source is used to supply power to the entire mobile terminal 100.
- the RF circuit is used for transmitting and receiving signals
- the display unit may include a display panel or the like.
- the speaker and the microphone are connected to the processor through the audio circuit for receiving and receiving the sound signal; the wifi module is used for receiving and Send wifi signal.
- FIG. 8 is a schematic diagram of a software structure of an embodiment of a mobile terminal according to the present invention.
- the mobile terminal 200 of this embodiment includes a first acquiring unit 21, configured to acquire biometric information of the user.
- the first determining unit 22 is configured to determine, according to the biometric information, whether the age of the user is a child, and the mode unit 23 is configured to enter the child mode when the first determining unit 22 determines that the user is a child; the second acquiring unit 24, for obtaining an operation instruction in the child mode; a second determination unit 25, configured to determine whether the operation instruction is permitted; and an execution unit 26, configured to execute the operation instruction when the second determination unit 25 determines that the operation instruction is permitted.
- the mobile terminal 200 of the embodiment further includes a cryptographic unit 27, and after the second obtaining unit 24 acquires the installation instruction of the application or exits the child mode instruction, the second determining unit 25 determines that the installation instruction or the exiting child mode instruction is Allowed, at this time, the cryptographic unit 27 prompts the user to input a password and receives the password input by the user; after the password is correct, the execution unit 26 executes the operation instruction.
- Each of the above units can implement various steps in the implementation method of the child mode shown in FIG. 1 , and details are not described herein.
- the mobile terminal 200 has a child mode, and in the child mode, the operation instruction can be selectively executed, and the operation instruction that may cause loss can be executed, thereby avoiding the loss caused by the child's misoperation to a certain extent.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Telephone Function (AREA)
Abstract
本发明提供了一种移动终端的儿童模式实现方法、移动终端及计算机可读存储介质,该实现方法包括:获取用户的生物特征信息;根据生物特征信息判断用户是否为儿童;若是,则进入儿童模式;获取儿童模式下的操作指令;判断操作指令是否被允许;若是,则执行操作指令。通过上述方式,本发明方法能够限制移动终端中的操作以避免儿童误操作导致的损失。
Description
本发明涉及移动终端技术领域,特别是涉及一种移动终端的儿童模式实现方法、移动终端及计算机可读存储介质。
目前,智能手机等移动终端已经成为人们日常生活中的必需品。在日常生活中,可能遇到儿童使用移动终端的情况。一方面儿童操作移动终端可能产生误操作,而造成一定的损失,当前移动终端无法避免该损失;另一方面,儿童无节制的使用移动终端会影响其身心的健康发展,例如长时间使用造成视力下降,当前无法对使移动终端的儿童给出一定的保护。
【发明内容】
本发明提供一种移动终端的儿童模式实现方法,该实现方法包括:获取用户的生物特征信息;根据生物特征信息判断用户是否为儿童;若是,则进入儿童模式;获取儿童模式下的操作指令;判断操作指令是否被允许;若是,则执行操作指令。
本发明提供一种移动终端,该移动终端包括:第一获取单元,用于获取用户的生物特征信息;第一判断单元,用于根据生物特征信息判断用户的年龄是否为儿童;模式单元,用于在第一判断单元判断用户为儿童时,进入儿童模式;第二获取单元,用于获取儿童模式下的操作指令;第二判断单元,用于判断操作指令是否被允许;执行单元,用于在第二判断单元判断操作指令被允许时,执行操作指令。
本发明提供一种移动终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行计算机程序时实现上述方法的步骤。
本发明提供一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现上述方法的步骤。
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明移动终端的儿童模式实现方法一实施例的流程示意图;
图2是本发明移动终端的模式触发方法一实施例的流程示意图;
图3是本发明移动终端的儿童模式实现方法另一实施例的流程示意图;
图4是本发明移动终端应用程序的调用方法一实施例的流程示意图;
图5是本发明移动终端的网络连接方法一实施例的流程示意图;
图6是本发明移动终端的控制方法一实施例的流程示意图;
图7是本发明移动终端一实施例的硬件结构示意图;
图8是本发明移动终端一实施例的软件结构示意图。
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明中的术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”、“第三”的特征可以明示或者隐含地包括至少一个该特征。本发明的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。本发明实施例中所有方向性指示(诸如上、下、左、右、前、后……)仅用于解释在某一特定姿态(如附图所示)下各部件之间的相对位置关系、运动情况等,如果该特定姿态发生改变时,则该方向性指示也相应地随之改变。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本发明的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
本发明的方法应用于移动终端中,主要针对儿童使用移动终端时的情况,为了避免儿童对移动终端误操作造成的损失,并能够对使用移动终端的儿童进行保护。具体来说,在本发明的移动终端中设置儿童模式,本发明提出移动终端在儿童模式下的多种使用方法。
如图1,本发明移动终端的儿童模式实现方法一实施例的流程示意图。其中,处于儿童模式的移动终端在执行操作指令之前会判断其是否被允许,避免儿童进行不被允许的操作。
如图2,本发明移动终端的模式触发方法一实施例的流程示意图。其中,移动终端通过检测触控操作,并获取用户图像进行判断以触发儿童模式,使得移动终端处于儿童模式下,以避免儿童误操作导致的问题。
如图3,本发明移动终端的儿童模式实现方法另一实施例的流程示意图。其中,处于儿童模式的移动终端中的应用被分为不同类别,而对于不同类别的应用具有不同的使用时长,以防止儿童过多的使用游戏类应用。
如图4,本发明移动终端应用程序的调用方法一实施例的流程示意图,其中,处于儿童模式下移动终端中的应用程序根据应用程序总体数量进行调用,以提高儿童模式下使用体验。
如图5,本发明移动终端的网络连接方法一实施例的流程示意图,其中,处于儿童模式下的移动终端根据网络接口黑名单来判断是否进行网络连接,以避免儿童连接到支付网络接口或移动网络接口。
如图6,本发明移动终端的控制方法一实施例的流程示意图。其中,处于儿童模式下的移动终端能够获取用户使用信息,例如使用时间,若使用时间超出预设时间,则进行锁屏操作,以保护儿童眼睛。
图1-图6对具有儿童模式的移动终端在使用时可能出现的各种情况进行了描述,下面对图1-图6进行详细说明。
请参阅图1,图1是本发明一种移动终端的儿童模式实现方法一实施例的流程示意图,本实施例儿童模式的实现方法包括以下步骤。
S11:获取用户的生物特征信息。
生物特征信息可以是虹膜信息、人脸图像、指纹信息等。本步骤S11中移动终端可以通过指纹识别模块获取到指纹信息,在指纹解锁时获取到指纹信息;还可通过摄像头获取虹膜信息或人脸图像,为节省功耗,本实施例中采用周期性的开启前置摄像头获取用户的虹膜信息或人脸图像,其中,虹膜信息由虹膜摄像头获取。
所获取的生物特征信息用于在后面步骤S12中判断用户是否为儿童,因此本实施例移动终端中获取生物特征信息都是由后台进行处理,特别是对于摄像头获取虹膜信息或人脸图像的情况,在移动终端被使用时,移动终端会自动开启前置摄像头获取用户的虹膜信息或人脸图像,然后在移动终端后台进行判断,即不会在显示屏上显示获取或判断过程。
S12:根据生物特征信息判断用户是否为儿童。
上述步骤S11中所获取到的生物特征信息用于判断用户是否为儿童,以指纹信息为例,本步骤判断用户是否为儿童有多种方式。
一种方式是,移动终端中可保存有用户的预存信息,且预存信息关联有年龄信息,将所获取的指纹信息与预存信息进行匹配,找到与指纹信息匹配的预存信息,并响应得到年龄信息,从而判断用户是否为儿童,本实施例中将年龄在12岁以下的判断为儿童。
另一种方式是,对所获取到的指纹信息进行分析,获得指纹的纹线的宽窄、面积、清晰度、皱褶数量中的至少一者,根据具体的指纹情况来判断用户年龄,继而判断用户是否为儿童。具体来说,儿童的年龄小,身体还在生长发育的过程,儿童的手指长度、宽度都小于成年人,儿童的指纹也小于成年人的指纹,因此儿童指纹的纹线的宽窄、覆盖面积、皱褶数量也小于成年人的指纹的纹线的宽窄、覆盖面积、皱褶数量,而且儿童使用指纹识别功能的经验少,进行指纹识别时可能会出现手指移动等情况导致指纹不清晰。因此,终端可以获取到的指纹的纹线的宽窄、覆盖面积、清晰度、皱褶数量中的至少一个来判断用户是否为儿童。
若所获取的生物特征信息为虹膜信息或人脸图像,也可采用上述类似于指纹信息的方式进行判断。
对于通过指纹信息进行判断的情况,由于指纹信息一般由指纹识别模块获取,且用户较多情况是在解锁时才会触摸到指纹识别模块,因此在实际应用中,移动终端仅能获取到解锁的用户的生物特征信息,若在移动终端被使用时用户发生变换,若当前用户不去接触指纹识别模块,则较难检测出当前用户的生物特征信息。
因此本实施例中可进一步结合虹膜信息或人脸图像进行判断,即在步骤S11中获取到指纹信息进行判断后,若用户不为儿童,则在移动终端使用过程中周期性开启前置摄像头,以获取虹膜信息或人脸图像,然后根据虹膜信息或人脸图像判断用户是否为儿童,当判断用户为儿童时,不再获取用户生物特征信息。
S13:进入儿童模式。
移动终端在上述步骤S12中判断出该用户为儿童后,移动终端自动进入特定的使用环境,即进入儿童模式,儿童模式可为移动终端中一预设的情景模式,可以在移动终端出厂是预先设置,也可以由用户设置。移动终端可以对应儿童模式进行个性化的设置,例如对移动终端中的某些操作进行禁用,对移动终端的显示方式进行更改等,以下步骤则是具体描述儿童模式下的各类操作如何实现。
S14:获取儿童模式下的操作指令。
在进入儿童模式后,用户进行相关操作,移动终端则获取操作指令,操作指令可以通过移动终端上物理键或显示屏上虚拟键发出,操作指令包括通信指令,应用程序的安装指令、开启指令或卸载指令,声音的调节指令,退出儿童模式指令等。
S15:判断操作指令是否被允许。
儿童模式下,移动终端在获取到操作指令后,并不立即执行操作指令,而是在本步骤S15中判断该操作指令是否被允许,若不被允许,则不执行该操作指令,若被允许,则进入步骤S16,执行该操作指令。
S16:执行操作指令。
对于上述步骤S15-S16,具体来说,当操作指令为退出儿童模式指令时,判断出退出儿童模式指令被允许,则提示用户输入密码,接收用户输入的密码后,执行退出儿童模式指令,退出儿童模式。密码的形式可以是多种,例如,指纹密码、人脸密码、虹膜密码、声音密码、数字密码、图案密码、字母与数字的混合密码等。
当操作指令为声音调节指令时,移动终端判断该指令是否是被允许的,若判断结果为是,则执行声音调节指令,将声音调大或调小。
当操作指令为应用程序的安装指令,移动终端判断该安装指令是否是被允许的,若判断结果为是,则终端会提示用户输入密码,终端接收用户所输入的密码后,响应该安装指令安装该应用程序。同样,密码可为多种方式。对于与应用程序相关的操作,移动终端可根据应用程序的类别进行判断,例如对于财务类应用的操作指令都不允许。
本实施例通过指纹获取用户的生物特征信息后,根据该生物特征信息判断用户是儿童时进入儿童模式,在儿童模式下获取操作指令,通过判断操作指令被允许的,则执行操作指令。本发明移动终端在判断用户为儿童后进入到儿童模式,并在儿童模式中对用户的操作指令进行判断,以避免儿童的误操作导致的风险问题。
对于具有儿童模式的移动终端,如何进入儿童模式,本发明提出一种移动终端的模式触发方法,请参阅图2,图2是本发明移动终端的模式触发方法一实施例的流程示意图,本实施例模式触发方法包括以下步骤。
S21:监测移动终端触控屏上的触控操作,获取在触控操作下产生的触控信息。
本步骤中可实时监测或周期性检测触控屏上的触控操作,当监测到触控屏上发生触控操作时,获取该触控操作下产生的触控信息,即触控屏上的触控信息。
若在一段时间内,触控屏上只发生一个触控操作,则获取一个触控信息即可;若一段时间内,触控屏上发生多个触控操作,则获取多个触控信息;若一段时间内,触控屏上发生连续触控操作,则以预设时间间隔获取连续触控操作的多个触控信息。
S22:判断触控信息是否满足预设条件。
判断步骤S21中所获得的触控信息是否满足预设条件,若满足则执行步骤S23。若步骤S21中获取了多个触控信息,则可对多个触控信息进行计算处理,得到一平均触控信息。
步骤S21中所获取的触控信息可以是触摸面积,在步骤S22中则对触摸面积进行判断,若触摸面积小于面积阈值,则认为触控信息满足预设条件。具体来说,本实施例方法用于触发儿童模式,即当儿童使用移动终端时触发儿童模式,而儿童手指较小,其与触控屏接触的触摸面积较小,因此在本实施例中根据触摸面积进行判断。
对于多个触控信息的情况,在步骤S21中获取到多个触摸面积,可以计算多个触摸面积 的平均值,也可以取多个触摸面积的中值,然后在本步骤S22中再判断触摸面积的平均值是否小于面积阈值,若是,则触控信息满足预设条件。
对于触摸面积的获取,由于手指在触控屏的触控区域为椭圆形,因此可获取触控区域长轴和短轴的长度,然后根据两长度计算出触摸面积。
触控信息还可以是触点间隔,若触点间隔小于距离阈值,则认为触控信息满足预设条件。具体来说,当儿童使用移动终端进行多点触控时,儿童手掌较小,因此各个触点之间的距离也较小,即本实施例中也可根据触点间隔进行判断。当出现多个触点时,获取相邻触点之间的距离。对于多个触点间隔的情况,同样对多个触点间隔取平均或取中值。
S23:开启移动终端的摄像头,获取用户图像。
当判断触摸信息满足预设条件后,本实施例中进一步开启移动终端的摄像头,根据用户图像进一步判断用户是否为儿童。
若仅用触摸信息判断是否为儿童,则较大可能出现误判的情况,例如当成人用指尖触控时,则根据触摸面积很容易被误判称儿童。因此本实施例中进一步根据用户图像来判断。相较于直接根据用户图像来判断的情况,本实施例中无需实时或周期性开启摄像头,能够以较小的功耗实现用户图像的获取。
S24:根据用户图像判断触控操作是否为儿童操作。
本步骤S24中根据上述步骤S23中获取的用户图像判断触控操作是否为儿童操作,可以将用户图像与预存图像进行匹配,其中每一预存图像关联有一年龄信息,根据匹配的预存图像所关联的年龄信息判断触控操作是否为儿童操作。也可以对用户图像进行分析,获取用户图像的特征,以判断该用户图像对应的年龄,从而判断触控操作是否为儿童操作。
在本步骤S24中判断触控操作为儿童操作后,进行以下步骤S25。
S25:触发儿童模式。
移动终端触发儿童模式即进入到儿童模式,在进入到儿童模式后,儿童模式的实现方式可参考图1所示的情况。
相较于图1中根据用户生物特征信息进入儿童模式,本实施例提供另一种进入儿童模式的方式,即移动终端获取到触控信息时,即判断该操作是否可能为儿童操作,若可能,则进一步根据用户图像进行判断,以提高移动终端判断准确度。
在进入到儿童模式后,对于儿童模式中应用程序该如何使用,本发明提出了应用程序在使用时间和相互调用两个方面的使用方法。
对于使用时间方面,请参阅图3,图3是本发明移动终端的儿童模式实现方法另一实施例的流程示意图,本实施例儿童模式实现方法包括以下步骤。
S31:进入儿童模式。
本步骤进入儿童模式有多种方式,可以采用如图1实施例中所述的根据用户生物特征信息进入儿童模式,也可在一般模式下通过虚拟键或物理键接收指令进入儿童模式,还可根据用户的操作信息进入儿童模式。
对于根据生物特征信息进入儿童模式,可参考图1实施例中所述的情况,具体不再赘述。
对于在一般模式下接收指令进入儿童模式,具体可在移动终端中设置一物理快捷键,当该物理快捷键检测到按压操作时,移动终端进入到儿童模式。还可在移动终端的系统中设置一入口,例如在控制中心页面设置一图标作为儿童模式入口,用户点击该图标则可进入儿童模式。
对于根据用户的操作信息进入儿童模式,具体可由触控屏接收用户的操作信息,例如触控手指的大小,触控手指间的距离,若手指较小或间距较小,则认为是儿童,进入儿童模式,具体可参考图2实施例中所述情况。
S32:获取儿童模式下应用程序的类别信息,根据类别信息获取应用程序的可用时长。
S33:记录应用程序的使用时间,若使用时间超出可用时长,则禁用应用程序。
上述步骤S32和S33可同时进行,也可先后进行,在开始使用应用程序时,则开始记录应用程序的使用时间,并获取应用程序的可用时长。
本实施例中在儿童模式下,针对不同的应用程序,设置有不同的使用时间,因此在步骤S32中,首先获取类别信息,然后根据类别信息获取可用时长。其中,类别信息可以包括游戏类、视频类、学习类等等。为保护儿童眼睛,避免儿童长时间使用移动终端,一般将游戏类的应用程序的可用时长设置为30分钟,视频类的应用程序的可用时长设置为40分钟,学习类的应用程序的可用时长设置为45分钟。
上述应用程序的类别可以由用户自主设置,也可以在下载安装时获取该应用程序在应用市场中的类别,以所获取的类别作为本移动终端中应用程序的类别。
更为具体的,在儿童模式下,例如,当终端监控到用户使用的应用程序是开心消消乐时,终端会判断出此应用程序的类别信息为游戏类,此时根据游戏类这个类别信息获取到游戏类的应用程序的可用时长设置为30分钟,即得到开心消消乐这个应用程序的可用时长为30分钟;
当终端监控到用户使用的应用程序是优酷时,终端会判断出此应用程序的类别信息为视频类,此时根据视频类这个类别信息获取到视频类的应用程序的可用时长设置为40分钟,即得到优酷这个应用程序的可用时长为40分钟;
当终端监控到用户使用的应用程序是有道词典时,终端会判断出此应用程序的类别信息为学习类,此时根据学习类这个类别信息获取到学习类的应用程序的可用时长设置为45分钟,即得到有道词典这个应用程序的可用时长为45分钟。
基于上述应用程序可用时长信息,终端会监控应用程序的使用时间,即步骤S33中所述的记录在儿童模式下该应用程序的使用时间。记录使用时间可采用多种方式。
一种方式是累积记录使用时间,累积记录用户在儿童模式下使用该应用程序的时间,即用户所记录的是应用程序在当前儿童模式下的全部使用时间,当用户退出应用程序时,不会重新记录使用时间,当然在用户退出儿童模式后会重新记录。若儿童模式下该应用程序的累计使用时间超出该程序的可用时长,则禁用该应用程序。
例如,当用户在儿童模式下打开开心消消乐这个应用程序时,终端获取到该应用程序的类别信息为游戏类,即可得到游戏类应用程序的可用时长为30分钟,当用户在儿童模式下使用开心消消乐这个程序,终端记录用户第一次使用该程序的时间为10分钟,若用户退出该程序且未退出儿童模式,接着用户第二次使用开心消消乐这个程序时,在10分钟基础上继续记录使用时间,即累计使用时间一直到30分钟后,即禁用该开心消消乐应用程序。
另一种方式是单次记录使用时间,记录用户每次使用该应用程序的时间,即在退出该应用程序后,重新记录使用时间。例如用户在儿童模式下使用开心消消乐时,终端记录用户第一次使用该程序的时间为10分钟,若用户退出该程序,接着用户第二次使用该程序时,则重新记录使用时间,而不会在10分钟上累计。
在使用时间超过可用时长后,则禁用应用程序,即在儿童空间中无法再进行该应用程序 的相关操作。
本实施例实现方法中,用户在使用儿童模式下移动终端中的应用程序时,可以根据应用程序的可用时长来控制用户使用该移动终端的时间。
对于相互调用方面,请参阅图4,图4是本发明移动终端应用程序的调用方法一实施例的流程示意图,本实施例应用程序的调用方法包括以下步骤。
S41:进入儿童模式,开启儿童模式内的一应用程序。
本步骤中进入儿童模式的方法可采用上述实施例中的方法,具体不再赘述。儿童模式下开始使用移动终端的应用程序,即移动终端开启该应用程序。
儿童模式内的应用程序为在儿童模式下可访问的应用程序,相应儿童模式外的应用程序为儿童模式下不可访问的应用程序。
S42:在所开启的应用程序中,获取儿童模式外的应用程序的调用指令。
当在儿童模式下使用应用程序时,可能会出现调用其他应用程序的情况。例如在儿童使用移动终端时,中途家长可能会临时使用儿童模式下的社交应用,且需要调用支付应用。
S43:判断儿童模式内的应用程序的数量是否小于第一阈值。
本步骤中判断儿童模式内的应用程序数量是否小于第一阈值,若是则进行步骤S45,执行调用指令,即当儿童模式下应用程序较少时,允许进行调用,从而提高用户体验。
当然,在步骤S43之前,还可判断调用指令对应的儿童模式外的应用程序是否为可调用,例如用户可设置支付应用为不可调用,则对于支付应用的调用情况,则可直接不执行调用指令,不进行步骤S43。若为可调用的应用程序,则进行步骤S43中的判断。
此外,除了进行本步骤S43的判断,当需要调用的应用程序较多时,则需进一步进行步骤S44。
S44:判断当前被调用的儿童模式外的应用程序的数量是否小于第二阈值。
判断被调用的应用程序的数量是否小于第二阈值,若是,则进行步骤S45,即当被调用应用程序的数量较多时,不执行调用指令。
S45:执行调用指令。
此外,本实施例中可对儿童模式外的应用程序的被调用次数进行记录,若被调用次数超过第三阈值,则将儿童模式外的应用程序设置为儿童模式内的应用程序,即对于在儿童模式外经常使用的应用程序,自动将其设置为儿童模式内的应用程序。
本实施例根据儿童模式内应用程序的数量来对儿童模式外应用程序的调用进行控制,以提高用户体验。
除了应用方面,对于儿童模式下的网络连接,本发明也提出一种移动终端的网络连接方法,具体请参阅图5,图5是本发明移动终端的网络连接方法一实施例的流程示意图,本实施例网络连接方法包括以下步骤。
S51:进入儿童模式。
本实施例中进入儿童模式的方法可采用上述实施例中的方法,具体不再赘述。
S52:接收网络连接指令。
当在儿童模式下需要进行网络连接时,移动终端会接收到网络连接指令。
S53:判断网络连接指令对应的网络接口是否在预设的网络接口黑名单中。
S54:不执行网络连接指令。
S55:执行网络连接指令。
本实施例的移动终端中预设有网络接口黑名单,在本步骤S53中会判断该网络连接指令对应的网络接口是否在网络接口黑名单中,若在,则进行步骤S54,不执行网络连接指令;若不在,则执行网络连接指令。
例如,网络接口黑名单可以包括支付网络接口,若网络接口为支付网络接口,则不执行网络连接指令,可限制儿童模式下对支付网络接口的连接,以免误操作进行扣费。
网络接口黑名单还可包括移动网络接口,若网络接口为移动网络接口,则不执行网络连接指令,可限制移动网络接口的连接,以免使用到运营商网络,造成流量使用过多。
网络接口黑名单可以是由用户设置的黑名单,也可以是在移动终端的使用过程中不断更新建立的。预设的黑名单可能不够全面,因此在步骤S55执行网络连接指令后,进行以下步骤S56。
S56:判断网络接口后的网页内容是否存在敏感信息。
进一步分析网络接口后的网页内容,若网页内容中存在敏感信息,则进行步骤S57,将该网络接口添加到黑名单中,从而更新该黑名单。黑名单可以保存在移动终端中,也可保存在云服务器中。敏感信息可以是支付信息,也可以是网络敏感词等。
S57:将网络接口添加到网络接口黑名单中。
上述步骤中若网络接口不在黑名单中,则执行网络连接指令,还可保存该网络接口,以统计该网络接口的连接次数,若次数超过一定阈值,则可将该网络接口放置到白名单中,相对于黑名单,白名单中包括可以放心连接的网络接口。
当步骤S52中接收网络连接指令后,进一步在步骤S53中判断该网络连接指令对应的网络接口是否在网络白名单中,若在,则执行网络连接指令,且不进行步骤S56判断该网络接口后的网页内容是否存在敏感信息。
本实施例中预设网络接口黑名单,在儿童模式下需要进行网络连接时,根据网络接口黑名单来判断是否进行网络连接,从而避免儿童误操作而连接到支付网站或敏感网站上。
儿童模式下,在使用移动终端时,还可根据使用情况对移动终端进行相应控制,如图6所示,图6是本发明移动终端的控制方法一实施例的流程示意图,本实施例控制方法包括以下步骤。
S61:移动终端进入儿童模式。
本步骤进入儿童模式的方法可采用前述实施例中进入儿童模式的方法,具体不再赘述。
S62:获取移动终端的使用信息。
S63:移动终端的显示屏根据使用信息进行相应的操作。
上述步骤S62、S63即根据移动终端的显示屏根据其使用情况进行响应调整。
移动终端的使用信息可以是使用时间,步骤S62中记录移动终端的使用时间,然后在步骤S63中判断所记录的使用时间是否超过预设时间,若是,则显示屏进行锁屏操作。使用时间可以根据亮屏时间判断,可累积记录儿童空间下的亮屏时间,也可记录每次亮屏的时间。
使用信息还可以是移动终端与用户的距离,步骤S62中通过移动终端的距离传感器获取其与用户的距离,然后在步骤S63中比较距离与预设阈值,若距离小于预设阈值,则显示屏进行黑屏操作;若距离大于或等于预设阈值,则显示屏进行亮屏操作。具体来说,距离传感器是采用发出红外光线,然后接收反射回去的红外光线,从而获得移动终端与用户的距离。
使用信息还可是移动终端中各个应用的使用时间,步骤S62中记录应用的使用时间,然后在步骤S63中判断每个应用的使用时间是否超过该应用对应的预设时间,若是,则显示屏 进行锁屏操作。应用使用时间的记录及判断可参阅图3所示的实施例。
使用信息还可以是移动终端当前所处环境的亮度,步骤S62中根据光线传感器获取到当前环境亮度,然后在步骤S63中显示屏进行亮度调节操作。
使用信息还可是移动终端的倾斜角度变化,当显示屏进行3D显示时,可根据倾斜角度对3D显示的内容进行相应调整。
本实施例中可以根据单类使用信息来控制显示屏进行相应操作,还可根据多类使用信息控制显示屏的操作。例如在步骤S62中,不仅仅获取使用时间,还获取移动终端与用户的距离,同时监控判断使用时间和距离的情况,在使用时间未超出预设时间时,若距离小于预设阈值,则黑屏,若大于等于预设阈值,则亮屏;在使用时间超出预设时间时,则锁屏。
本实施例中,在儿童模式下移动终端的显示屏根据使用情况进行对应操作,能够针对不同使用情况调节显示屏,以更适于用户使用,例如在使用时间过长时,进行锁屏操作,保证用户健康用眼。
上述方法均可通过移动终端实现,具体来说,通过一段计算机程序来表示方法的步骤,构建软件结构以实现该计算机程序,并利用硬件设备来执行该计算机程序从而实现上述方法。
对于计算机程序,以软件形式实现并作为独立的产品销售或使用时,可存储在一个电子设备可读取存储介质中,即,本发明还提供一种计算机可读存储介质,其中存储有计算机程序,该计算机程序被处理器执行时实现上述方法的步骤。计算机可读存储介质可以为U盘、光盘、服务器等。
对于硬件结构,请参阅图7,图7是本发明移动终端一实施例的硬件结构示意图。本实施例移动终端100包括处理器11和存储器12,存储器12中存储有计算机程序,处理器11在执行计算机程序时能够实现上述方法的步骤。
具体来说,相对于图1所示的儿童模式实现方法,移动终端100还包括传感器13、输入单元14,传感器13可以是指纹识别模组、虹膜摄像头等一个或多个的组合;输入单元14用于输入信息,可以包括触控面板以及操作按键或其他输入设备。本实施例移动终端100中传感器13在获取到用户的生物特征信息后,处理器11根据生物特征信息判断用户是否为儿童,若是则进入儿童模式;输入单元14获取儿童模式下的操作指令,处理器11再判断操作指令是否被允许,若被允许,则执行操作指令。在此过程中存储器12提供存储支持,例如能够存储生物特征信息、操作指令等。
类似于上述过程,本实施例移动终端100能够实现图1所示方法中的所有步骤。
进一步的,移动终端100中还可包括RF电路、显示单元、音频电路、wifi模块以及电源等。其中,RF电路、显示单元、音频电路以及wifi模块分别与处理器11连接;电源用于为整个移动终端100提供电能。具体而言,RF电路用于接发信号,显示单元则可以包括显示面板等,扬声器以及传声器(或者麦克风)通过音频电路与处理器连接,用于接发声音信号;wifi模块则用于接收和发射wifi信号。
对于软件结构,上述不同的方法对应不同的程序数据,相应的需要构建不同的软件结构。例如对于图1所示的儿童模式实现方法,本发明提出一种移动终端,具体请参阅图8,图8是本发明移动终端一实施例的软件结构示意图。
本实施例移动终端200包括第一获取单元21,用于获取用户的生物特征信息。第一判断单元22,用于根据生物特征信息判断所述用户的年龄是否为儿童;模式单元23,用于在第一判断单元22判断所述用户为儿童时,进入儿童模式;第二获取单元24,用于获取儿童模式 下的操作指令;第二判断单元25,用于判断操作指令是否被允许;执行单元26,用于在第二判断单元25判断操作指令被允许时,执行操作指令。
进一步的,本实施例移动终端200还包括密码单元27,第二获取单元24获取到应用程序的安装指令或退出儿童模式指令后,第二判断单元25判断安装指令或退出儿童模式指令均为被允许的,此时密码单元27提示用户输入密码,并接收用户所输入的密码;密码无误后执行单元26执行操作指令。
上述各个单元能够实现图1所示儿童模式实现方法中的各个步骤,具体不再赘述。
本实施例移动终端200中具有儿童模式,并且在儿童模式中能够对操作指令进行选择性的执行,能够不执行可能造成损失的操作指令,从而在一定程度上避免儿童误操作导致的损失。
以上所述仅为本发明的实施方式,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
Claims (20)
- 一种移动终端的儿童模式实现方法,其特征在于,所述实现方法包括:获取用户的生物特征信息;根据所述生物特征信息判断所述用户是否为儿童;若是,则进入儿童模式;获取所述儿童模式下的操作指令;判断所述操作指令是否被允许;若是,则执行所述操作指令。
- 根据权利要求1所述的实现方法,其特征在于,所述实现方法进一步包括:获取所述儿童模式下应用程序的安装指令;判断所述应用程序的安装指令是否被允许;若是,则提示用户输入密码;接收用户所输入的密码后,执行所述安装指令。
- 根据权利要求1所述的实现方法,其特征在于,所述实现方法进一步包括:获取所述儿童模式下的退出儿童模式指令;判断所述退出儿童模式指令被允许,提示用户输入密码;接收用户所输入的密码后,执行退出儿童模式指令。
- 根据权利要求1所述的实现方法,其特征在于,所述生物特征信息包括指纹,所述根据所述生物特征信息判断所述用户是否为儿童,包括:根据所述指纹的纹线的宽窄、覆盖面积、清晰度、皱褶数量中的至少一者判断所述用户是否为儿童。
- 根据权利要求1所述的实现方法,其特征在于,所述根据所述生物特征信息判断所述用户是否为儿童,包括:将所述生物特征信息与预存信息进行匹配,根据匹配的预存信息所对应的年龄信息判断所述用户是否为儿童。
- 根据权利要求1所述的实现方法,其特征在于,所述实现方法进一步包括:获取用户的指纹信息;根据所述指纹信息判断所述用户是否为儿童;若是,则进入儿童模式;若否,则获取当前用户的虹膜信息或人脸图像;根据所述虹膜信息或人脸图像判断所述当前用户是否为儿童;若是,则进入儿童模式。
- 根据权利要求6所述的实现方法,其特征在于,所述获取当前用户的虹膜信息或人脸图像,包括:周期性获取当前用户的虹膜信息或人脸图像。
- 一种移动终端,其特征在于,所述移动终端包括:第一获取单元,用于获取用户的生物特征信息;第一判断单元,用于根据所述生物特征信息判断所述用户的年龄是否为儿童;模式单元,用于在所述第一判断单元判断所述用户为儿童时,进入儿童模式;第二获取单元,用于获取所述儿童模式下的操作指令;第二判断单元,用于判断所述操作指令是否被允许;执行单元,用于在所述第二判断单元判断所述操作指令被允许时,执行所述操作指令。
- 根据权利要求8所述的移动终端,其特征在于,所述移动终端还包括密码单元;所述第二获取单元用于获取到应用程序的安装指令,所述第二判断单元用于判断安装指令是否被允许,所述密码单元用于提示用户输入密码,并接收用户所输入的密码。
- 根据权利要求8所述的移动终端,其特征在于,所述移动终端还包括密码单元;所述第二获取单元用于获取到应用程序的退出儿童模式指令,所述第二判断单元用于判断退出儿童模式指令是否被允许,所述密码单元用于提示用户输入密码,并接收用户所输入的密码。
- 根据权利要求8所述的移动终端,其特征在于,所述第一获取单元获取用户的生物特征信息包括指纹,所述第一判断单元具体用于根据所述指纹的纹线的宽窄、覆盖面积、清晰度、皱褶数量中的至少一者判断所述用户是否为儿童。
- 根据权利要求8所述的移动终端,其特征在于,所述第一判断单元具体用于将所述生物特征信息与预存信息进行匹配,根据匹配的预存信息所对应的年龄信息判断所述用户是否为儿童。
- 根据权利要求8所述的移动终端,其特征在于,所述第一获取单元获取用户的生物特征信息包括虹膜信息或人脸图像。
- 一种移动终端,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时,实现方法包括:获取用户的生物特征信息;根据所述生物特征信息判断所述用户是否为儿童;若是,则进入儿童模式;获取所述儿童模式下的操作指令;判断所述操作指令是否被允许;若是,则执行所述操作指令。
- 根据权利要求14所述的移动终端,其特征在于,所述实现方法进一步包括:获取所述儿童模式下应用程序的安装指令;判断所述应用程序的安装指令是否被允许;若是,则提示用户输入密码;接收用户所输入的密码后,执行所述安装指令。
- 根据权利要求14所述的移动终端,其特征在于,所述实现方法进一步包括:获取所述儿童模式下的退出儿童模式指令;判断所述退出儿童模式指令被允许,提示用户输入密码;接收用户所输入的密码后,执行退出儿童模式指令。
- 根据权利要求14所述的移动终端,其特征在于,所述生物特征信息包括指纹,所述根据所述生物特征信息判断所述用户是否为儿童,包括:根据所述指纹的纹线的宽窄、覆盖面积、清晰度、皱褶数量中的至少一者判断所述用户是否为儿童。
- 根据权利要求14所述的移动终端,其特征在于,所述根据所述生物特征信息判断所述用户是否为儿童,包括:将所述生物特征信息与预存信息进行匹配,根据匹配的预存信息所对应的年龄信息判断所述用户是否为儿童。
- 根据权利要求14所述的移动终端,其特征在于,所述实现方法进一步包括:获取用户的指纹信息;根据所述指纹信息判断所述用户是否为儿童;若是,则进入儿童模式;若否,则获取当前用户的虹膜信息或人脸图像;根据所述虹膜信息或人脸图像判断所述当前用户是否为儿童;若是,则进入儿童模式。
- 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1-7中任一项所述方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710636109.8 | 2017-07-31 | ||
CN201710636109.8A CN107392056A (zh) | 2017-07-31 | 2017-07-31 | 终端及儿童模式实现方法、计算机可读存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019024603A1 true WO2019024603A1 (zh) | 2019-02-07 |
Family
ID=60342318
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/090410 WO2019024603A1 (zh) | 2017-07-31 | 2018-06-08 | 终端及儿童模式实现方法、计算机可读存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107392056A (zh) |
WO (1) | WO2019024603A1 (zh) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110446109A (zh) * | 2019-08-01 | 2019-11-12 | 珠海格力电器股份有限公司 | 用于防止终端播放视频时被误触的方法、存储介质及终端 |
US10963129B2 (en) | 2017-05-15 | 2021-03-30 | Apple Inc. | Displaying a scrollable list of affordances associated with physical activities |
US10978195B2 (en) | 2014-09-02 | 2021-04-13 | Apple Inc. | Physical activity and workout monitor |
US10987028B2 (en) | 2018-05-07 | 2021-04-27 | Apple Inc. | Displaying user interfaces associated with physical activities |
US11148007B2 (en) | 2016-06-11 | 2021-10-19 | Apple Inc. | Activity and workout updates |
US11216119B2 (en) | 2016-06-12 | 2022-01-04 | Apple Inc. | Displaying a predetermined view of an application |
US11277485B2 (en) | 2019-06-01 | 2022-03-15 | Apple Inc. | Multi-modal activity tracking user interface |
US11317833B2 (en) | 2018-05-07 | 2022-05-03 | Apple Inc. | Displaying user interfaces associated with physical activities |
US11331007B2 (en) | 2016-09-22 | 2022-05-17 | Apple Inc. | Workout monitor interface |
US11404154B2 (en) | 2019-05-06 | 2022-08-02 | Apple Inc. | Activity trends and workouts |
US11446548B2 (en) | 2020-02-14 | 2022-09-20 | Apple Inc. | User interfaces for workout content |
US11580867B2 (en) | 2015-08-20 | 2023-02-14 | Apple Inc. | Exercised-based watch face and complications |
US11896871B2 (en) | 2022-06-05 | 2024-02-13 | Apple Inc. | User interfaces for physical activity information |
US11931625B2 (en) | 2021-05-15 | 2024-03-19 | Apple Inc. | User interfaces for group workouts |
US11977729B2 (en) | 2022-06-05 | 2024-05-07 | Apple Inc. | Physical activity information user interfaces |
US11996190B2 (en) | 2013-12-04 | 2024-05-28 | Apple Inc. | Wellness aggregator |
US12080421B2 (en) | 2013-12-04 | 2024-09-03 | Apple Inc. | Wellness aggregator |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107392056A (zh) * | 2017-07-31 | 2017-11-24 | 广东欧珀移动通信有限公司 | 终端及儿童模式实现方法、计算机可读存储介质 |
CN108153478A (zh) * | 2018-01-19 | 2018-06-12 | 北京小米移动软件有限公司 | 终端的触摸处理方法及终端 |
CN108762840A (zh) * | 2018-05-24 | 2018-11-06 | 努比亚技术有限公司 | 穿戴设备模式选择方法、穿戴设备及计算机可读存储介质 |
CN109976703B (zh) * | 2019-04-04 | 2022-05-24 | 广东美的厨房电器制造有限公司 | 指引说明方法、计算机可读存储介质和烹饪设备 |
CN110442296A (zh) * | 2019-07-26 | 2019-11-12 | 惠州Tcl移动通信有限公司 | 功能模式控制方法、装置、移动终端和存储介质 |
CN110619202A (zh) * | 2019-09-19 | 2019-12-27 | Oppo广东移动通信有限公司 | 应用程序的注册方法、装置、终端及存储介质 |
CN110909332B (zh) * | 2019-11-15 | 2022-03-04 | 美的集团股份有限公司 | 防止误操作设备的方法及装置 |
CN110851811B (zh) * | 2019-11-15 | 2022-02-15 | 美的集团股份有限公司 | 防止误操作设备的方法及装置 |
CN111125663B (zh) * | 2019-11-27 | 2022-04-19 | 宇龙计算机通信科技(深圳)有限公司 | 儿童模式的控制方法、装置、存储介质及终端 |
CN112860170A (zh) * | 2021-02-23 | 2021-05-28 | 深圳市沃特沃德信息有限公司 | 智能手表控制方法、智能手表、计算机设备和存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103986835A (zh) * | 2014-05-23 | 2014-08-13 | 深圳市中兴移动通信有限公司 | 一种移动终端及其多用户场景切换的方法和装置 |
US20140359750A1 (en) * | 2013-05-29 | 2014-12-04 | Research In Motion Limited | Associating Distinct Security Modes with Distinct Wireless Authenticators |
CN106502727A (zh) * | 2016-09-30 | 2017-03-15 | 维沃移动通信有限公司 | 一种应用程序的控制方法及移动终端 |
CN107392056A (zh) * | 2017-07-31 | 2017-11-24 | 广东欧珀移动通信有限公司 | 终端及儿童模式实现方法、计算机可读存储介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103353928A (zh) * | 2013-05-20 | 2013-10-16 | 北京百纳威尔科技有限公司 | 基于指纹识别的终端模式选择方法及系统 |
CN105224838B (zh) * | 2015-09-28 | 2018-02-09 | 广东欧珀移动通信有限公司 | 一种基于人脸识别的用户权限控制方法和系统 |
CN105574378A (zh) * | 2015-12-09 | 2016-05-11 | 小米科技有限责任公司 | 终端控制方法及终端控制装置 |
CN106953975B (zh) * | 2017-03-21 | 2020-03-31 | 广东小天才科技有限公司 | 智能终端运行管理方法、装置及智能终端 |
-
2017
- 2017-07-31 CN CN201710636109.8A patent/CN107392056A/zh active Pending
-
2018
- 2018-06-08 WO PCT/CN2018/090410 patent/WO2019024603A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140359750A1 (en) * | 2013-05-29 | 2014-12-04 | Research In Motion Limited | Associating Distinct Security Modes with Distinct Wireless Authenticators |
CN103986835A (zh) * | 2014-05-23 | 2014-08-13 | 深圳市中兴移动通信有限公司 | 一种移动终端及其多用户场景切换的方法和装置 |
CN106502727A (zh) * | 2016-09-30 | 2017-03-15 | 维沃移动通信有限公司 | 一种应用程序的控制方法及移动终端 |
CN107392056A (zh) * | 2017-07-31 | 2017-11-24 | 广东欧珀移动通信有限公司 | 终端及儿童模式实现方法、计算机可读存储介质 |
Cited By (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11996190B2 (en) | 2013-12-04 | 2024-05-28 | Apple Inc. | Wellness aggregator |
US12080421B2 (en) | 2013-12-04 | 2024-09-03 | Apple Inc. | Wellness aggregator |
US12094604B2 (en) | 2013-12-04 | 2024-09-17 | Apple Inc. | Wellness aggregator |
US11424018B2 (en) | 2014-09-02 | 2022-08-23 | Apple Inc. | Physical activity and workout monitor |
US10978195B2 (en) | 2014-09-02 | 2021-04-13 | Apple Inc. | Physical activity and workout monitor |
US11798672B2 (en) | 2014-09-02 | 2023-10-24 | Apple Inc. | Physical activity and workout monitor with a progress indicator |
US11908343B2 (en) | 2015-08-20 | 2024-02-20 | Apple Inc. | Exercised-based watch face and complications |
US11580867B2 (en) | 2015-08-20 | 2023-02-14 | Apple Inc. | Exercised-based watch face and complications |
US11918857B2 (en) | 2016-06-11 | 2024-03-05 | Apple Inc. | Activity and workout updates |
US11148007B2 (en) | 2016-06-11 | 2021-10-19 | Apple Inc. | Activity and workout updates |
US11161010B2 (en) | 2016-06-11 | 2021-11-02 | Apple Inc. | Activity and workout updates |
US11660503B2 (en) | 2016-06-11 | 2023-05-30 | Apple Inc. | Activity and workout updates |
US11216119B2 (en) | 2016-06-12 | 2022-01-04 | Apple Inc. | Displaying a predetermined view of an application |
US12036018B2 (en) | 2016-09-22 | 2024-07-16 | Apple Inc. | Workout monitor interface |
US11439324B2 (en) | 2016-09-22 | 2022-09-13 | Apple Inc. | Workout monitor interface |
US11331007B2 (en) | 2016-09-22 | 2022-05-17 | Apple Inc. | Workout monitor interface |
US10963129B2 (en) | 2017-05-15 | 2021-03-30 | Apple Inc. | Displaying a scrollable list of affordances associated with physical activities |
US12039146B2 (en) | 2017-05-15 | 2024-07-16 | Apple Inc. | Displaying a scrollable list of affordances associated with physical activities |
US11429252B2 (en) | 2017-05-15 | 2022-08-30 | Apple Inc. | Displaying a scrollable list of affordances associated with physical activities |
US11103161B2 (en) | 2018-05-07 | 2021-08-31 | Apple Inc. | Displaying user interfaces associated with physical activities |
US11712179B2 (en) | 2018-05-07 | 2023-08-01 | Apple Inc. | Displaying user interfaces associated with physical activities |
US11317833B2 (en) | 2018-05-07 | 2022-05-03 | Apple Inc. | Displaying user interfaces associated with physical activities |
US10987028B2 (en) | 2018-05-07 | 2021-04-27 | Apple Inc. | Displaying user interfaces associated with physical activities |
US11972853B2 (en) | 2019-05-06 | 2024-04-30 | Apple Inc. | Activity trends and workouts |
US11791031B2 (en) | 2019-05-06 | 2023-10-17 | Apple Inc. | Activity trends and workouts |
US11404154B2 (en) | 2019-05-06 | 2022-08-02 | Apple Inc. | Activity trends and workouts |
US11277485B2 (en) | 2019-06-01 | 2022-03-15 | Apple Inc. | Multi-modal activity tracking user interface |
US11979467B2 (en) | 2019-06-01 | 2024-05-07 | Apple Inc. | Multi-modal activity tracking user interface |
CN110446109A (zh) * | 2019-08-01 | 2019-11-12 | 珠海格力电器股份有限公司 | 用于防止终端播放视频时被误触的方法、存储介质及终端 |
US11638158B2 (en) | 2020-02-14 | 2023-04-25 | Apple Inc. | User interfaces for workout content |
US11985506B2 (en) | 2020-02-14 | 2024-05-14 | Apple Inc. | User interfaces for workout content |
US11716629B2 (en) | 2020-02-14 | 2023-08-01 | Apple Inc. | User interfaces for workout content |
US11611883B2 (en) | 2020-02-14 | 2023-03-21 | Apple Inc. | User interfaces for workout content |
US11564103B2 (en) | 2020-02-14 | 2023-01-24 | Apple Inc. | User interfaces for workout content |
US11452915B2 (en) | 2020-02-14 | 2022-09-27 | Apple Inc. | User interfaces for workout content |
US11446548B2 (en) | 2020-02-14 | 2022-09-20 | Apple Inc. | User interfaces for workout content |
US11938376B2 (en) | 2021-05-15 | 2024-03-26 | Apple Inc. | User interfaces for group workouts |
US11931625B2 (en) | 2021-05-15 | 2024-03-19 | Apple Inc. | User interfaces for group workouts |
US11992730B2 (en) | 2021-05-15 | 2024-05-28 | Apple Inc. | User interfaces for group workouts |
US11896871B2 (en) | 2022-06-05 | 2024-02-13 | Apple Inc. | User interfaces for physical activity information |
US11977729B2 (en) | 2022-06-05 | 2024-05-07 | Apple Inc. | Physical activity information user interfaces |
US12023567B2 (en) | 2022-06-05 | 2024-07-02 | Apple Inc. | User interfaces for physical activity information |
Also Published As
Publication number | Publication date |
---|---|
CN107392056A (zh) | 2017-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019024603A1 (zh) | 终端及儿童模式实现方法、计算机可读存储介质 | |
CN107249084B (zh) | 移动终端及程序调用方法、计算机可读存储介质 | |
US10075445B2 (en) | Methods and devices for permission management | |
EP3232299B1 (en) | Physical key component, terminal, and touch response method and device | |
US11443019B2 (en) | Methods and devices for fingerprint unlocking | |
CN107395889B (zh) | 降低移动终端功耗的方法、装置、存储介质及移动终端 | |
US10129044B2 (en) | Method and apparatus for controlling smart device | |
EP3073708B1 (en) | A method and a terminal for controlling a smart home device | |
EP3331226B1 (en) | Method and device for reading messages | |
US20190318736A1 (en) | Method for voice controlling, terminal device, cloud server and system | |
CN107292158A (zh) | 移动终端及模式触发方法、计算机可读存储介质 | |
WO2019157804A1 (zh) | 指纹解锁方法及装置 | |
RU2675401C2 (ru) | Способ, устройство и система определения состояния сна | |
US20180039819A1 (en) | Method and device for identity verification | |
US20190171805A9 (en) | Unlocking method and apparatus, and storage medium | |
CN107480497A (zh) | 移动终端及儿童模式实现方法、计算机可读存储介质 | |
WO2019101096A1 (zh) | 安全验证的方法、装置及移动终端 | |
CN110413148B (zh) | 防误触检测方法、装置、设备以及存储介质 | |
EP4020199A1 (en) | Method and apparatus for reading and writing clipboard information and storage medium | |
CN107437018B (zh) | 移动终端及其控制方法、计算机可读存储介质 | |
CN107454257A (zh) | 移动终端及网络连接方法、计算机可读存储介质 | |
CN110166618A (zh) | 屏幕控制方法及装置 | |
CN114664009A (zh) | 解锁方法、装置、电子设备、存储介质及智能门锁 | |
CN108491834A (zh) | 指纹识别方法及装置 | |
WO2018049611A1 (zh) | 权限控制方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18841353 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18841353 Country of ref document: EP Kind code of ref document: A1 |