CN108833673B - Method, apparatus, hardware apparatus and medium for restricting user operation - Google Patents
Method, apparatus, hardware apparatus and medium for restricting user operation Download PDFInfo
- Publication number
- CN108833673B CN108833673B CN201810437920.8A CN201810437920A CN108833673B CN 108833673 B CN108833673 B CN 108833673B CN 201810437920 A CN201810437920 A CN 201810437920A CN 108833673 B CN108833673 B CN 108833673B
- Authority
- CN
- China
- Prior art keywords
- area
- terminal
- time period
- user
- terminals
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012795 verification Methods 0.000 claims abstract description 68
- 230000005540 biological transmission Effects 0.000 claims description 14
- 238000012545 processing Methods 0.000 description 16
- 238000004891 communication Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72451—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a method, a device, a hardware device and a medium for limiting user operation. The method comprises the steps that a first area is generated on the terminal at the starting time of a first preset time period, and the first area covers all or part of a terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; wherein, at least two terminals in the plurality of terminals generate different sending information in the predetermined times of operations in the first area, but the sending information meets the verification requirement. Therefore, the operation of some users is avoided from being actually the operation of the same person at the same time, and the habit or the behavior of the user is more accurately known.
Description
Technical Field
The present invention relates to the field of computer technology, and more particularly, to a method, an apparatus, a hardware apparatus, and a medium for restricting user operations.
Background
With the development of living standards and smart phone technologies, smart phones become an indispensable part of people's daily life, and more people use smart phones.
The merchant side or the internet platform side meets the requirement, so that the client side limits the operation of the user.
Disclosure of Invention
In order to solve the problems in the prior art, an aspect of the present invention provides a method for limiting user operations, including: generating a first area on the terminal at the starting time of a first preset time period, wherein the first area covers all or part of a terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; wherein, at least two terminals in the plurality of terminals generate different sending information in the predetermined times of operations in the first area, but the sending information meets the verification requirement.
Another aspect of the present invention provides an apparatus for restricting a user operation, including: the terminal comprises a first generating module, a second generating module and a display module, wherein the first generating module is used for generating a first area on the terminal at the starting time of a first preset time period, and the first area covers all or part of a terminal screen; the first locking module is used for locking any operation in the first area after receiving the operation for the preset times performed by the user in the first area within a first preset time period; the second generation module is used for generating a second area in a second preset time period and enabling the first area to disappear if the sending information generated based on the operation of the preset times meets the verification requirement; wherein, at least two terminals in the plurality of terminals generate different sending information in the predetermined times of operations in the first area, but the sending information meets the verification requirement.
Yet another aspect of the present invention provides a hardware apparatus, comprising: a processor and a memory for storing executable instructions of the processor; wherein the processor is configured to: the above method is performed.
Yet another aspect of the present invention provides a computer readable storage medium having stored thereon at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by a processor to implement the above method.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
generating a first area in the terminal within a first preset time period, wherein the first area covers all or part of a terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; the method comprises the steps that at least two terminals in a plurality of terminals generate different sending information according with the verification requirements, wherein the sending information generated by the operations performed in the first area for the preset times is different, the operations received by the terminals operated by a plurality of users in the first preset time period can be effectively verified, the operations of different terminals are avoided being actually performed by the same user at the same time, the operations of all the users are performed under the equal and fair conditions, and meanwhile, the habits or behaviors of people using the users can be known more accurately through the operations of the users.
Drawings
Fig. 1 is a flowchart illustrating a method for limiting user operations according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating another method for limiting user operations according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a further method for limiting user operations according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for restricting user operations according to another embodiment of the present invention;
FIG. 5 is a flowchart illustrating a further method for limiting user operations according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a further method for restricting user operations according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of an apparatus for limiting user operations according to an embodiment of the present invention;
FIG. 8 is a schematic structural diagram of another apparatus for limiting user operations according to an embodiment of the present invention;
FIG. 9 is a schematic structural diagram of another apparatus for limiting user operations according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a hardware device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Referring to fig. 1, an embodiment of the present invention provides a method for limiting user operations, which includes the following steps:
And step 102, after receiving the operation of the user for the preset times in the first area within the first preset time period, locking any operation of the first area, wherein the sending information generated by the operation of the preset times in the first area by at least two terminals in the plurality of terminals is different but meets the verification requirement.
On the basis of the foregoing embodiment, as an optional embodiment, after the terminal generates the second area within the second predetermined time, the method further includes: and locking any operation in the second area after receiving the operation performed by the user for the predetermined times in the second predetermined time.
On the basis of the above embodiment, as an optional embodiment, after receiving a predetermined number of operations performed by the user in the first area within a first predetermined time period, locking in the first area after any operation, and before generating the second area by the terminal within a second predetermined time period, the method further includes: and generating a third area in the terminal within a third preset time, locking any operation in the third area, displaying a verification result whether the sending information generated based on the operation for a preset number of times meets the verification requirement in the third area, and disappearing the first area.
On the basis of the above embodiment, as an optional embodiment, after the first area receives a predetermined number of operations performed by the user within a first predetermined time period, and after any operation of locking in the first area, the method further includes: and if the transmission information generated based on the operation for the preset times does not meet the verification requirement, not receiving the operation of the user.
On the basis of the foregoing embodiment, as an optional embodiment, after the first area is generated on the terminal at the start time of the first predetermined time period, the method further includes: and displaying the identifier added to the first area in the first area.
The method provided by the embodiment of the invention generates a first area at the terminal by the starting time of a first preset time period, wherein the first area covers all or part of the terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; the method comprises the steps that at least two terminals in a plurality of terminals generate different sending information according with the verification requirements, wherein the sending information generated by the operations performed in the first area for the preset times is different, the operations received by the terminals operated by a plurality of users in the first preset time period can be effectively verified, the operations of different terminals are avoided being actually performed by the same user at the same time, the operations of all the users are performed under the equal and fair conditions, and meanwhile the habits or behaviors of the users can be known more accurately through the operations of the users.
The embodiment of the present invention provides a method for limiting user operations, which combines the contents of the first embodiment, with reference to fig. 2, and the method flow is as follows:
in step 201, a plurality of terminals generate a first area on each terminal at the starting time of a first predetermined time period, and the first area covers all or part of the terminal screen.
Specifically, after the user runs an APP (Application) installed on the terminal, a click operation is applied at a start button, thereby sending a request to the service module. The terminal receives a first instruction sent by the service module in response to the request, and then generates the first area at the starting time of the first preset time period, so that even if the request time sent by a certain user is different from that of other users, all the users can generate the first area at the same starting time. The first region is always displayed for a first predetermined period of time. The first area can be suspended on a desktop of the terminal, and can also be suspended on an interface displayed by the APP, and the interface is used as a background of the first area. The information displayed on the interface may be dynamic information, such as video, or static information, such as text, which is not limited in this embodiment. Preferably, the first area covers part of the desktop or the interface, so that the content which is interesting to the user or the content sent by other users or pushed by the service module can be displayed on other parts of the desktop or the interface. The first predetermined time period may be 10 seconds, and the first area is always displayed within 10 seconds, in other embodiments, the first predetermined time period may also be 12 seconds, which is not limited in this embodiment. The service module may be a server.
Specifically, the user can perform operations in the first area within a first predetermined time period, the number of operations is a predetermined number of times, and when the user completes the predetermined number of operations, any operation in the first area is locked, and at this time, no operation can be performed in the first area any more. The operation of the user may be a single click operation, a double click operation, a scroll operation, or a combination of multiple operations, such as a combination of a click operation and a recording operation, which is not limited in this embodiment. The predetermined number of times may be one time, or may be a plurality of times, such as two times or three times. The first area is divided into a plurality of operation areas, each operation area corresponds to one content and the content is different, for example, the lower half part of the first area is divided into a first operation area, a second operation area and a third operation area from top to bottom in sequence, 3 operation areas are distinguished, and when the operation areas correspond to three contents, the three operation areas correspond to the three contents. The correspondence relationship between the operation area of at least one of the two terminals among the plurality of terminals and the content is as follows: the first operation area corresponds to the first content, the second operation area corresponds to the second content, and the third operation area corresponds to the third content. The correspondence relationship between the operation area and the content of the other terminal of the at least two terminals among the plurality of terminals is as follows: the first operation area corresponds to the fourth content, the second operation area corresponds to the second content, and the third operation area corresponds to the third content.
When the operation of the preset times is one time, presetting a verification rule: and the fourth content and the first content both accord with the verification requirement, the second content and the third content do not accord with the verification requirement, a user completes one operation in the first operation area of the terminal, and then the sending information is generated based on the operation, wherein the sending information comprises the first content. And the other user completes one operation in the first operation area on the other terminal, and then generates sending information based on the operation, wherein the sending information comprises fourth content, so that the sending information is different and meets the verification requirement. When the predetermined number of operations is multiple times, the preset validation rule is a combination sequence of different contents, and the number of times is two, the preset validation rule may be: the first content is in front of the second content, the second content is in front of the fourth content, and the second content is in back of the second content, the first content, the second content and the third content and other combination sequences of the fourth content, the second content and the third content do not meet the verification requirements, a user firstly completes one operation in a first operation area on the terminal, and then completes one operation in a second operation area, and then the sending information is generated based on the two operations, wherein the sending information comprises the first content and the second content. And the other user completes one operation in the first operation area on the other terminal and then completes one operation in the second operation area, and then the sending information is generated based on the two operations and comprises the fourth content and the second content, so that the sending information is different and meets the verification requirements.
In step 203, if the transmission information generated based on the predetermined number of operations performed on the first area meets the verification requirement, the terminal meeting the verification requirement in the second predetermined time period generates a second area, and the first area disappears.
Specifically, after each terminal sends information, the service module verifies the received sent information according to a preset verification rule, judges whether the received sent information meets the verification requirement, and if the received sent information meets the verification requirement, sends a second instruction to the terminal corresponding to the sent information meeting the verification requirement, so that a second area is generated in the terminal within a second preset time period, and the first area disappears. The second area covers the terminal screen in whole or in part. For the setting position of the second area on the terminal, reference may be made to the above description about the first area, and details are not repeated here.
In order to enhance the experience of the user and to know whether the own operation meets the verification requirement, after step 202 and before step 203, referring to fig. 3, the method further includes:
and step 204, generating a third area in the terminal within a third preset time period, locking any operation in the third area, displaying a verification result whether the sending information generated based on the operation for a preset number of times meets the verification requirement in the third area, and eliminating the first area.
Specifically, after each terminal sends information, the service module verifies the received sent information according to a preset verification rule, judges whether the received sent information meets the verification requirement or not to obtain a verification result, generates a third instruction according to the verification result, enables a third area to be generated in the terminal within a third preset time period, locks any operation in the third area, displays the verification result, namely informs a user using the terminal, and the first area disappears.
In order to facilitate the user meeting the authentication requirement to continue the operation as in the first area, referring to fig. 4, after the terminal generates the second area within the second predetermined time period, the method further comprises:
and step 205, after receiving the operation performed by the user for the preset times in the second area in the second preset time period, locking any operation in the second area.
Specifically, the processing manner of this step may refer to the related description of step 202 in the above embodiment, and is not described herein again.
To facilitate screening users to disable continued operation by users that do not meet the authentication requirements, after step 202, referring to fig. 5, the method further comprises:
in step 207, if the transmission information generated based on the predetermined number of operations performed on the first area does not meet the verification requirement, the user operation is not received.
Specifically, if the transmission information generated based on the predetermined number of operations does not meet the verification requirement, the terminal may generate a second area within a second predetermined time, the first area disappears, and any operation of locking the second area within the second predetermined time is performed, and at this time, the operation of the user is not received; and the program can also be quitted, so that the user can not operate, namely, the operation of not receiving the user is realized.
In order to attract a user to operate at a terminal and improve the good experience of the user, before the user does not receive the operation of the user, the method further comprises the following steps: and judging whether the user has the permission to continue operating, if so, generating a second area and disappearing the first area in the terminal within a second preset time period, and locking any operation in the second area after receiving the operation of the user for a preset number of times in the second preset time period, otherwise, not receiving the operation of the user.
Due to the existence of such scenarios: at least two terminals generate different sending information in accordance with the verification requirement after performing the predetermined number of operations in the first area, and in order to avoid generating doubt without users, referring to fig. 6, after generating the first area on the terminal at the starting time of the first predetermined time period, the method further includes: the identifier added to the first area is displayed in the first area, step 208.
The method provided by the embodiment of the invention generates a first area on the terminal at the starting time of a first preset time period, wherein the first area covers all or part of a terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated by the terminal in second preset time, and the first area disappears; the method comprises the steps that at least two terminals in the plurality of terminals generate different sending information according to the verification requirements, wherein the sending information generated by the operation of the plurality of terminals for the preset times in the first area is different, the operation received by the plurality of terminals operated by the plurality of users in the first preset time period can be effectively verified, the operation of different terminals is avoided from being actually performed by the same user at the same time, the operation of all the users is performed under the equal and fair conditions, and meanwhile the habit or the behavior of the user can be known more accurately through the operation of the user.
Referring to fig. 7, an embodiment of the present invention provides an apparatus for limiting user operations, where the apparatus is configured to perform the method provided in the foregoing embodiment, and the method includes: a first generation module 301, a first locking module 302 and a second generation module 303.
Specifically, the first generating module 301 is configured to generate a first area on the terminal at a starting time of a first predetermined time period, where the first area covers all or part of the terminal screen.
The first locking module 302 is used for locking any operation of the first area after the first area receives the operation of the user for the preset times in the first preset time period;
the second generating module 303 is configured to generate a second area and a first area in the terminal within a second predetermined time period if the transmission information generated based on the predetermined number of operations meets the verification requirement, where at least two terminals in the plurality of terminals generate different transmission information but all of the transmission information generated by the predetermined number of operations performed in the first area meets the verification requirement.
As an alternative embodiment, referring to fig. 8, the apparatus further comprises: and a second locking module 304, configured to lock any operation performed in the second area after receiving the predetermined number of operations performed by the user in the second area within a second predetermined time period.
As an alternative embodiment, referring to fig. 9, the apparatus further comprises: a third generating module 305, configured to generate a third area in a third predetermined time period, lock any operation in the third area, display a verification result in the third area as to whether the transmission information generated based on the predetermined number of operations meets the verification requirement, and disappear the first area.
As an alternative embodiment, the apparatus further comprises: and the third locking module is used for not receiving the operation of the user if the sending information generated based on the operation of the preset times does not meet the verification requirement.
As an alternative embodiment, the apparatus further comprises: and the mark display module is used for displaying the mark added to the first area in the first area.
The processing manners of the first generating module 301, the first locking module 302, and the second generating module 303 may specifically refer to the related descriptions of steps 101 to 103 and 201 to 203 in the foregoing embodiment, the processing manner of the second locking module 305 may refer to the related description of step 205 in the foregoing embodiment, the processing manner of the third generating module 305 may refer to the related description of step 204 in the foregoing embodiment, the processing manner of the third locking module may refer to the related description of step 206 in the foregoing embodiment, and the processing manner of the mark displaying module may refer to the related description of step 207 in the foregoing embodiment, which is not described in detail herein.
The device provided by the embodiment of the invention generates a first area at the terminal by the starting time of a first preset time period, wherein the first area covers all or part of the terminal screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the terminal within a second preset time period, and the first area disappears; the method comprises the steps that at least two terminals in a plurality of terminals generate different sending information according with the verification requirements, wherein the sending information generated by the operations performed in the first area for the preset times is different, the operations received by the terminals operated by a plurality of users in the first preset time period can be effectively verified, the operations of different terminals are avoided being actually performed by the same user at the same time, the operations of all the users are performed under the equal and fair conditions, and meanwhile the habits or behaviors of the users can be known more accurately through the operations of the users.
An embodiment of the present invention provides a hardware device, where the hardware device may be configured to implement the method for limiting user operations provided in the foregoing embodiment, an application APP corresponding to the method runs on the hardware device, and an external representation form of the hardware device is a terminal, and the hardware device may be an electronic device such as a smart phone and a tablet computer that has a mobile phone operating system or is compatible with the mobile phone operating system, and the method includes: a processor and a memory for storing executable instructions for the processor.
In particular, the processor is configured to: generating a first area on the hardware device at a starting time of a first predetermined time period, the first area covering all or part of a hardware device screen; locking any operation in the first area after receiving a predetermined number of operations performed by a user in the first area within a first predetermined period of time; if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in the hardware device within a second preset time period, and the first area disappears; wherein, at least two hardware devices in the plurality of hardware devices generate different sending information for the operation of the predetermined times in the first area, and the sending information meets the verification requirement.
Assuming that the above is the first possible embodiment, a second possible embodiment provided on the basis of the first possible embodiment locks any operation in the second area after receiving a predetermined number of operations performed by the user in the second area within a second predetermined period of time.
In a third possible implementation form, which is provided on the basis of the first possible implementation form, the processor of the hardware apparatus is further configured to: and generating a third area by the hardware device within a third preset time period, wherein the first area disappears, locking any operation in the third area, and displaying a verification result whether the sending information generated based on the operation for a preset number of times meets the verification requirement in the third area.
In a fourth possible implementation provided on the basis of the second possible implementation, the processor of the hardware apparatus is further configured to: and if the transmission information generated based on the operation for the preset times does not meet the verification requirement, not receiving the operation of the user.
In a fifth possible embodiment provided on the basis of the first possible embodiment, the mark added to the first area is displayed in the first area. .
Fig. 10 is a block diagram illustrating a hardware device for implementing a method of restricting user operations according to an example embodiment. Referring to fig. 10, a hardware device may include one or more of the following components: processing component 401, memory 402, power component 403, multimedia component 404, audio component 405, input/output (I/O) interface 406, sensor component 407, and communication component 408.
The memory 402 is configured to store various types of data to support operations at the hardware apparatus 400. Examples of such data include instructions for any application or method operating on hardware device 400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 402 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power components 403 provide power to the various components of the hardware device 400. Power components 403 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for hardware device 400.
The multimedia component 404 includes a screen that provides an output interface between the hardware device 400 and a user. In some embodiments, the screen may include an LCD (Liquid Crystal Display) and a TP (Touch Panel). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 404 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the hardware apparatus 400 is in an operation mode, such as a shooting mode or a video mode or a scanning mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 405 is configured to output and/or input audio signals. For example, audio component 405 includes a Microphone (MIC) configured to receive external audio signals when hardware apparatus 400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 402 or transmitted via the communication component 408. In some embodiments, audio component 405 also includes a speaker for outputting audio signals.
The I/O interface 406 provides an interface between the processing component 401 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a login button, a submit button, and a scan button.
The sensor component 407 includes one or more sensors for providing various aspects of status assessment for the hardware device 400. For example, sensor component 407 may detect an open/closed state of hardware device 400, the relative positioning of components, such as a display and keypad of hardware device 400, the change in position of hardware device 400 or a component of hardware device 400, the presence or absence of user contact with hardware device 400, the orientation or acceleration/deceleration of hardware device 400, and the change in temperature of hardware device 400. The sensor assembly 407 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 407 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 407 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 408 is configured to facilitate wired or wireless communication between the hardware apparatus 400 and other devices. Hardware device 400 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 408 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the Communication component 408 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on an RFID (Radio Frequency Identification) technology, an IrDA (Infrared Data Association) technology, an UWB (Ultra Wideband) technology, a BT (Bluetooth) technology, and other technologies.
In an exemplary embodiment, the hardware apparatus 400 may be implemented by one or more ASICs (Application Specific Integrated circuits), DSPs (Digital Signal processors), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a computer readable storage medium is also provided, in which at least one instruction, at least one program, code set, or set of instructions is stored, which is loaded and executed by a processor to implement the above-described method of restricting user operations. Such as memory 402, including instructions executable by processor 410 of hardware device 400 to perform the methods described above. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The instructions in the storage medium, when executed by a processing component of the hardware device, enable the mobile hardware device to perform the above-described method of restricting user operations.
It will be appreciated by those skilled in the art that the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The embodiments disclosed above are therefore to be considered in all respects as illustrative and not restrictive. All changes which come within the scope of or equivalence to the invention are intended to be embraced therein.
Claims (12)
1. A method of limiting user operations, the method comprising:
generating a first area on the terminal at the starting time of a first preset time period, wherein the first area covers all or part of a terminal screen;
after receiving a predetermined number of operations performed by a user in the first area within the first predetermined time period, locking any operation in the first area;
if the sending information generated based on the operation of the preset times meets the verification requirement, a second area is generated in a second preset time period by the terminal, and the first area disappears;
and the terminal comprises a plurality of terminals, wherein at least two terminals in the plurality of terminals generate different sending information in the operation of the predetermined times in the first area, and the sending information meets the verification requirement.
2. The method of claim 1, wherein after the terminal generates the second region within the second predetermined time period, further comprising:
locking any operation in the second area after receiving the predetermined number of operations performed by the user in the second area within the second predetermined period of time.
3. The method of claim 2, wherein after the first region receives a predetermined number of operations performed by a user within the first predetermined time period, locking in after any operation of the first region, the method further comprises:
and if the sending information generated based on the operation of the preset times does not meet the verification requirement, not receiving the operation of the user.
4. The method of claim 1, wherein after generating the first region on the terminal at the start time of the first predetermined time period, the method further comprises: and displaying the identifier added to the first area in the first area.
5. An apparatus for limiting user operations, the apparatus comprising:
the terminal comprises a first generating module, a second generating module and a display module, wherein the first generating module is used for generating a first area on the terminal at the starting time of a first preset time period, and the first area covers all or part of a terminal screen;
the first locking module is used for locking any operation in the first area after receiving the operation of the user for the preset times in the first area within the first preset time period;
a second generating module, configured to generate a second area in a second predetermined time period by the terminal if the transmission information generated based on the predetermined number of operations meets a verification requirement, where the first area disappears;
and at least two terminals in the plurality of terminals generate different sending information according with the verification requirement when the terminals perform the operation for the preset times in the first area.
6. The apparatus of claim 5, further comprising:
and the second locking module is used for locking any operation in the second area after receiving the operation of the user for the preset times in the second area within the second preset time period.
7. The apparatus of claim 6, further comprising:
and the third locking module is used for not receiving the operation of the user if the sending information generated based on the operation of the preset times does not meet the verification requirement.
8. The apparatus of claim 5, further comprising:
and the mark display module is used for displaying the mark added to the first area in the first area.
9. A hardware apparatus, comprising: a processor and a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any of claims 1-4.
10. A computer readable storage medium having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by a processor to implement the method of any of claims 1 to 4.
11. A method of limiting user operations, the method comprising:
generating a first area on the terminal at the starting time of a first preset time period, wherein the first area covers all or part of a terminal screen;
after receiving a predetermined number of operations performed by a user in the first area within the first predetermined time period, locking any operation in the first area;
generating a third area in a third preset time period by the terminal, locking any operation in the third area, displaying a verification result whether the sending information generated based on the operation for the preset times meets the verification requirement in the third area, and enabling the first area to disappear;
if the sending information generated based on the operation of the preset times meets the verification requirement, generating a second area in a second preset time period by the terminal;
and the terminal comprises a plurality of terminals, wherein at least two terminals in the plurality of terminals generate different sending information in the operation of the predetermined times in the first area, and the sending information meets the verification requirement.
12. An apparatus for limiting user operations, the apparatus comprising:
the terminal comprises a first generating module, a second generating module and a display module, wherein the first generating module is used for generating a first area on the terminal at the starting time of a first preset time period, and the first area covers all or part of a terminal screen;
the first locking module is used for locking any operation in the first area after receiving the operation of the user for the preset times in the first area within the first preset time period;
a third generating module, configured to generate a third area in a third predetermined time period, lock any operation in the third area, and display, in the third area, a verification result indicating whether the transmission information generated based on the predetermined number of operations meets a verification requirement, where the first area disappears;
a second generating module, configured to generate a second area in a second predetermined time period by the terminal if the transmission information generated based on the predetermined number of operations meets a verification requirement;
and at least two terminals in the plurality of terminals generate different sending information according with the verification requirement when the terminals perform the operation for the preset times in the first area.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810437920.8A CN108833673B (en) | 2018-05-09 | 2018-05-09 | Method, apparatus, hardware apparatus and medium for restricting user operation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810437920.8A CN108833673B (en) | 2018-05-09 | 2018-05-09 | Method, apparatus, hardware apparatus and medium for restricting user operation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108833673A CN108833673A (en) | 2018-11-16 |
CN108833673B true CN108833673B (en) | 2021-02-19 |
Family
ID=64148650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810437920.8A Active CN108833673B (en) | 2018-05-09 | 2018-05-09 | Method, apparatus, hardware apparatus and medium for restricting user operation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108833673B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101051944A (en) * | 2006-04-06 | 2007-10-10 | 株式会社Ntt都科摩 | Mobile device and transmission restriction method |
CN102868814A (en) * | 2012-09-06 | 2013-01-09 | 惠州Tcl移动通信有限公司 | Mobile phone screen unlocking method and mobile phone |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0568082A (en) * | 1991-09-06 | 1993-03-19 | Nec Corp | Radio telephone set with limited dial function |
TW200409525A (en) * | 2002-11-26 | 2004-06-01 | Lite On Technology Corp | Voice identification method for cellular phone and cellular phone with voiceprint password |
EP2498210A1 (en) * | 2005-07-22 | 2012-09-12 | Kangaroo Media, Inc. | System and methods for enhancing the experience of spectators attending a live sporting event |
KR101685363B1 (en) * | 2010-09-27 | 2016-12-12 | 엘지전자 주식회사 | Mobile terminal and operation method thereof |
JP2014071828A (en) * | 2012-10-01 | 2014-04-21 | Fuji Xerox Co Ltd | Information processing apparatus, image forming apparatus, and program |
TW201333903A (en) * | 2013-04-16 | 2013-08-16 | Global Cloud Computing Corp | Cloud-end broadcast interactive teaching system and its method |
KR101667733B1 (en) * | 2015-05-04 | 2016-10-19 | 엘지전자 주식회사 | Mobile terminal and method for controlling the same |
CN105094664A (en) * | 2015-06-10 | 2015-11-25 | 小米科技有限责任公司 | Terminal device privacy protection method and apparatus |
JP6821933B2 (en) * | 2016-03-24 | 2021-01-27 | カシオ計算機株式会社 | Electronic equipment, communication equipment, control methods, and programs |
CN106502644A (en) * | 2016-09-23 | 2017-03-15 | 广州华多网络科技有限公司 | Direct broadcasting room electronics present gives display effect control method, device and equipment |
CN106952090A (en) * | 2017-02-27 | 2017-07-14 | 努比亚技术有限公司 | Payment verification device and method |
CN107330319B (en) * | 2017-06-29 | 2020-12-18 | 广东源泉科技有限公司 | Interaction control method, equipment and computer readable storage medium |
-
2018
- 2018-05-09 CN CN201810437920.8A patent/CN108833673B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101051944A (en) * | 2006-04-06 | 2007-10-10 | 株式会社Ntt都科摩 | Mobile device and transmission restriction method |
CN102868814A (en) * | 2012-09-06 | 2013-01-09 | 惠州Tcl移动通信有限公司 | Mobile phone screen unlocking method and mobile phone |
Also Published As
Publication number | Publication date |
---|---|
CN108833673A (en) | 2018-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106170004B (en) | Method and device for processing verification code | |
CN106453052B (en) | Message interaction method and device | |
US20170171321A1 (en) | Methods and devices for managing accounts | |
EP2988205A1 (en) | Method and device for transmitting image | |
EP2981116A1 (en) | Method and apparatus for accessing wi-fi network and computer program product | |
CN107959757B (en) | User information processing method and device, APP server and terminal equipment | |
CN107147815B (en) | Call processing method and device based on taxi taking | |
CN105446616A (en) | Screen display control method, apparatus and device | |
CN105100074A (en) | Data operation processing method, device and terminal equipment | |
CN105511739A (en) | Message prompting method and device | |
CN112463418A (en) | Cross-device information sharing method, device, medium and electronic device | |
CN108280342B (en) | Application synchronization method and device for application synchronization | |
CN109246094B (en) | User terminal verification method, device and storage medium | |
CN105704286A (en) | Communication information display method and device | |
CN106302342B (en) | User account switching method and device | |
CN106506808B (en) | Method and device for prompting communication message | |
CN106919302B (en) | Operation control method and device of mobile terminal | |
CN106550012B (en) | Monitoring method of intelligent equipment and intelligent equipment | |
CN106447747B (en) | Image processing method and device | |
CN109885360B (en) | Data processing method, device and storage medium | |
US20170201479A1 (en) | Group message display method, device and medium | |
CN110162366B (en) | Information display method and device, electronic equipment and storage medium | |
US9832342B2 (en) | Method and device for transmitting image | |
CN111541922A (en) | Method, device and storage medium for displaying interface input information | |
CN106791145A (en) | Short message management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 2nd Floor, Building 4, No. 18 North Third Ring West Road, Haidian District, Beijing, 2022 Patentee after: Tiktok Technology Co.,Ltd. Country or region after: China Address before: 100080 408, 4th floor, 51 Zhichun Road, Haidian District, Beijing Patentee before: BEIJING MICROLIVE VISION TECHNOLOGY Co.,Ltd. Country or region before: China |
|
CP03 | Change of name, title or address |