[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN118394539A - Method for preventing machine locking from escaping and terminal equipment - Google Patents

Method for preventing machine locking from escaping and terminal equipment Download PDF

Info

Publication number
CN118394539A
CN118394539A CN202410545432.4A CN202410545432A CN118394539A CN 118394539 A CN118394539 A CN 118394539A CN 202410545432 A CN202410545432 A CN 202410545432A CN 118394539 A CN118394539 A CN 118394539A
Authority
CN
China
Prior art keywords
application
terminal device
mode
key
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410545432.4A
Other languages
Chinese (zh)
Inventor
周瑞洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202410545432.4A priority Critical patent/CN118394539A/en
Publication of CN118394539A publication Critical patent/CN118394539A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Program synchronisation; Mutual exclusion, e.g. by means of semaphores
    • G06F9/524Deadlock detection or avoidance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a method for preventing a machine from escaping and a terminal device, which relate to the technical field of terminals, and are applied to the terminal device with a non-forbidden navigation key mode, and a machine-locking application and a navigation key are arranged in an application layer, and the method for preventing the machine from escaping comprises the following steps: responding to the first operation, and controlling the application layer to enter a non-forbidden navigation key mode; responding to a machine locking mode instruction of the machine locking application, and informing an application layer to exit a non-forbidden navigation key mode; obtaining a forbidden policy based on a machine locking mode instruction of the machine locking application, and informing an application layer of forbidden navigation keys for the first time according to the forbidden policy; and refreshing the disabling strategy based on the machine locking mode instruction of the machine locking application, and informing the application layer of disabling the navigation key again according to the disabling strategy. According to the method and the device, the disabling strategy is refreshed after the machine locking mode of the terminal equipment is started, the navigation key is disabled again, and the navigation key is enabled to be disabled completely, so that the machine locking mode of the terminal equipment is prevented from escaping, the benefit of a provider is ensured, and the experience of the provider is improved.

Description

Method for preventing machine locking from escaping and terminal equipment
Technical Field
The application relates to the technical field of terminal equipment, in particular to a method for preventing a lock from escaping and terminal equipment.
Background
With the continuous development of times, the shopping modes of the terminal equipment are more and more. The method is suitable for partial users with poor payment capability in a short period.
When the user adopts the shopping mode, in order to prevent the phenomenon that the user refuses to pay due, the provider often sets a locking mode at the terminal device. When the payment period is reached and the user does not finish the payment, the machine locking mode is started, the navigation key is disabled, the terminal equipment only displays the payment page and cannot use other functions, or the terminal equipment can only support a small number of basic functions. However, the test finds that in an individual scenario, the terminal device can escape from the locking mode, so that the user can continue to use the terminal device normally, which results in that the provider cannot monitor the payment condition of the user through the locking mode, and the experience of the provider is seriously affected.
Therefore, a new solution is needed to solve the above-mentioned problems.
Disclosure of Invention
The application provides a method for preventing a machine locking mode from escaping and terminal equipment, wherein a disabling strategy is refreshed after the machine locking mode of the terminal equipment is started, so that the terminal equipment disables navigation keys again, and the navigation keys of the terminal equipment are enabled to be completely disabled, thereby preventing the machine locking mode of the terminal equipment from escaping, ensuring the benefits of suppliers and improving the experience of the suppliers.
In a first aspect, a method for preventing a lock from escaping is provided, and the method is applied to a terminal device with a non-forbidden navigation key mode, wherein the terminal device comprises a system framework layer and an application layer, and comprises the following steps: responding to the first operation, and controlling the application layer to enter a non-forbidden navigation key mode; responding to a machine locking mode instruction of the machine locking application, and informing an application layer to exit a non-forbidden navigation key mode; based on a machine locking mode instruction of the machine locking application, obtaining a disabling strategy, and informing an application layer of disabling a navigation key for the first time according to the disabling strategy; based on the locking mode instruction of the locking application, refreshing the disabling strategy, and informing the application layer of disabling the navigation key again according to the disabling strategy.
In the embodiment of the application, after the machine locking mode of the machine locking application is started, the system framework layer firstly informs the application layer to exit from the non-forbidden navigation key mode and then informs the application layer of forbidden navigation keys. However, the disabling of the navigation key according to the disabling policy for the first time may not be implemented because the disabling of the navigation key may be completed before the exiting of the non-disabling navigation key mode. When the disabling strategy is refreshed, and the navigation key is disabled again according to the disabling strategy, the application layer can determine to realize the disabling of the navigation key, the locking mode of the terminal equipment is prevented from being escaped, and the experience of the provider is improved.
With reference to the first aspect, in certain implementation manners of the first aspect, a method for preventing a lock from escaping further includes:
The application layer realizes the time node of exiting the non-disabled navigation key mode later than the time node of the application layer realizing the disabled navigation key.
In this implementation, although the system frame layer notifies the application layer that the instruction to exit the non-disabled navigation key mode is issued prior to the system frame layer notifying the application layer that the navigation key is disabled, because the callback time of the application layer to exit the non-disabled navigation key mode is longer, the application layer realizes a time node to exit the non-disabled navigation key mode later than the application layer realizes a time node to disable the navigation key. When the disabling strategy is refreshed again, the application layer can determine the disabling navigation key, and the locking mode of the terminal equipment is prevented from being escaped.
It should be understood that when the application layer exits the time node of the non-disabled navigation key mode, the situation that is earlier than the time node of the application layer disabled navigation key is also applicable to the method for preventing the lock from escaping.
With reference to the first aspect, in some implementations of the first aspect, a time node of the disabling policy is refreshed later than a time node at which the application layer implements exiting the non-disabled navigation key mode.
In this implementation, although the system frame layer notifies the application layer that the instruction to exit the non-disabled navigation key mode is issued prior to the system frame layer notifying the application layer that the navigation key is disabled, because the callback time of the application layer to exit the non-disabled navigation key mode is longer, the application layer realizes a time node to exit the non-disabled navigation key mode later than the application layer realizes a time node to disable the navigation key. When the disabling strategy is refreshed again, the disabling strategy is refreshed again after the application layer exits the non-disabling navigation key mode, the disabling navigation key is determined, and the machine locking mode of the terminal equipment is prevented from being escaped.
With reference to the first aspect, in certain implementations of the first aspect, the non-disabled navigation key mode includes a screen-fixed mode.
In this implementation, when the terminal device is a cellular phone, disabling the navigation mode may include a screen-fixed mode. That is, when the handset is in the screen-fixed mode, the disabled navigation mode is disabled. Illustratively, the navigation keys in the handset navigation mode generally include a back key, a home screen key, and a multi-tasking key.
With reference to the first aspect, in certain implementation manners of the first aspect, the terminal device further includes a locking application; responding to a locking mode instruction of a locking application, comprising: the lockdown application is started a lockdown mode and generates a lockdown mode instruction.
In this implementation, the lockdown application is illustratively enabled to cause the system framework layer to obtain lockdown mode instructions when the user does not perform some operation before some time node.
With reference to the first aspect, in certain implementations of the first aspect, the locking application is initiated a locking mode, including:
an unpaid scenario expires when the user purchases in an installment manner.
In this implementation, specifically, the mode in which the locking application in the application layer is started may be a scenario in which payment is not due when the user uses installment for shopping, so that the locking application starts the locking mode through the scenario, so that the system framework layer obtains the locking mode instruction.
With reference to the first aspect, in certain implementations of the first aspect, the navigation keys include a return key, a home screen key, and a multitasking key; disabling the policy includes disabling one or more of a return key, a home screen key, and a multitasking key.
In this implementation manner, when the terminal device is a mobile phone, the navigation key may include a return key, a home screen key and a multitasking key, so that according to actual situation needs, the disabling policy may include disabling one or more of the return key, the home screen key and the multitasking key, and further, only displaying the lock page by using the terminal device, other functions cannot be used, or only a small portion of basic functions can be used.
With reference to the first aspect, in certain implementation manners of the first aspect, the application layer is notified of disabling the navigation key according to the disabling policy, and the application layer is notified of disabling the navigation key again according to the disabling policy at a time interval of millisecond level.
In the implementation manner, the terminal equipment firstly notifies the application layer of the forbidden navigation key according to the forbidden policy and secondly notifies the application layer of the forbidden navigation key according to the forbidden policy, wherein the time interval between the first time of the forbidden navigation key and the second time of the forbidden navigation key is in the millisecond level, so that the influence of refreshing the forbidden policy again on the vision of a user can be reduced.
In a second aspect, there is provided a terminal device comprising: one or more processors, and memory; the memory is coupled to the one or more processors, the memory for storing computer program code comprising computer instructions that the one or more processors invoke to cause the terminal device to perform the method.
It should be appreciated that the extensions, definitions, explanations and illustrations of the relevant content in the first aspect described above also apply to the same content in the second aspect.
In a third aspect, a chip system is provided, the chip system being applied to a terminal device, the chip system comprising one or more processors for invoking computer instructions to cause the terminal device to perform the method.
In a fourth aspect, a computer readable storage medium is provided, comprising instructions which, when run on a terminal device, cause the terminal device to perform the method.
In a fifth aspect, there is provided a computer program product comprising: computer program code which, when run by a terminal device, causes the terminal device to perform any of the methods of preventing lock escape of the first aspect.
The embodiment of the application provides a method for preventing the escape of a machine lock, which is used for refreshing a disabling strategy after the machine lock mode of terminal equipment is started, so that the terminal equipment disables navigation keys again, and the navigation keys of the terminal equipment are enabled to be completely disabled, thereby preventing the machine lock mode of the terminal equipment from escaping, ensuring the benefits of suppliers and improving the experience of the suppliers.
In addition, the method for preventing the machine from escaping does not need to be changed or influence the detection mechanism of the terminal equipment, and the method for preventing the machine from escaping has small influence on the original functions of the terminal equipment.
Drawings
Fig. 1 is an interface schematic diagram of a terminal device in a normal working state according to an embodiment of the present application;
Fig. 2A is a schematic diagram of a relevant page in a terminal device locking state according to an embodiment of the present application;
FIG. 2B is a schematic diagram of an interface for the completion of the installment payment of the terminal device according to the embodiment of the present application;
Fig. 3A is a schematic diagram of a relevant page of a terminal device in a screen-fixed mode according to an embodiment of the present application;
fig. 3B is a schematic diagram of a relevant page that may be escaped when a terminal device provided in an embodiment of the present application is in a machine locking mode;
fig. 4 is a schematic structural diagram of a software system of a terminal device according to an embodiment of the present application;
FIG. 5 is a flowchart illustrating a method for preventing a lock from escaping according to an embodiment of the present application;
FIG. 6 is a flowchart illustrating a method for preventing a lock from escaping according to another embodiment of the present application;
FIG. 7 is a flowchart illustrating a method for preventing a lock from escaping according to another embodiment of the present application;
Fig. 8 is a hardware system of a terminal device according to an embodiment of the present application;
Fig. 9 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
1. International mobile equipment identity (international mobile equipment identity, IMEI), which is a tag for distinguishing mobile equipment in the field of terminal equipment technology, is typically stored in mobile equipment and can be used to monitor stolen or invalid mobile equipment. For example, the international mobile equipment identifier may be used to identify each individual mobile phone in a global system for mobile communications (global system for mobile communications, GSM) mobile network, which is equivalent to an identification number of the mobile phone, and each GSM mobile phone sold through a regular channel has a unique IMEI code, commonly referred to as "mobile phone serial number", and so on. The IMEI code is uniformly planned by the GSM society and authorizes each region to carry out organization allocation. The total length is generally 15 bits, and each bit only uses 0-9 digits.
2. Installments (pay by installments), in the field of terminal equipment technology, are actually a type of loan provided by a seller to a buyer, the seller being a creditor and the buyer being a debtor. The buyer can obtain the required goods or labor after paying only a small amount of goods, but the same goods or labor purchased by the installment method is paid more than the one-time payment due to the interest included in the later installment. The installment payment mode can enable sellers to complete sales promotion, and provides convenience for buyers. Installments are mostly applied to some production cycles, long use cycles or costly product transactions. Such as the outlets of the products of the plants, large vehicles, heavy machinery, etc. Currently, electronic products such as mobile phones, computers, cameras, etc. are also used.
3. The locking machine is a solution for purchasing terminal equipment by adopting an installment payment mode aiming at a user, but refusing to pay due. When the user does not pay for the expiration, the terminal device is locked in the locking mode, and after the locking, the terminal device can only use very few applications and functions such as locking applications, settings and the like. For example, when the terminal device is a mobile phone, only few functions such as a locking application, a setting, and a telephone can be generally used after the mobile phone is locked. Illustratively, the common implementation of the lock mode is: the provider of the terminal equipment provides the IMEI of the terminal equipment to the locking application manufacturer, the IMEI of the terminal equipment is added to a server of the locking application manufacturer, and when the terminal equipment is in a starting-up guide process, the terminal equipment automatically downloads a data link control (data link control, DLC) program and a locking application program, and the locking application program realizes the locking state of the terminal equipment through the DLC program.
4. The screen is used for displaying a screen interface of the terminal equipment so as to prompt the user to pay as soon as possible if the user refuses to pay by adopting an installment payment mode when the user purchases the terminal equipment.
For example, when the terminal device is a mobile phone, if the user does not pay due, the mobile phone screen will display a screen-in-touch interface as shown in fig. 2A (a). At this time, after the mobile phone is blocked, the application cannot be switched, and the main page cannot be returned, and only when the user finishes payment through the operation of the payment control in the blocking interface, the mobile phone can be normally used.
5. Screen fixing mode, in the technical field of terminal equipment, the screen fixing mode is used for fixing a screen, so that the terminal equipment can only use an application program which is currently running. If the screen fixing mode is adopted, the running application program is not stopped even if the user accidentally touches the touch button. The screen-fixed mode can effectively reduce the influence of unintentional operations of the user on the running application program. Even when the handset is borrowed for use by others, some of the functions remain locked. Especially, aiming at the situation that the child plays the parent mobile phone, the child can be effectively prevented from being randomly pressed and bumped on the parent mobile phone.
6. The mobile phone navigation triple keys refer to three navigation keys below the mobile phone in the technical field of terminal equipment, and each navigation key comprises a return key 13, a main screen key 12 and a multi-task key 11, as shown in fig. 1. The return key is used for clicking once, so that the page can be returned to the upper interface and is generally displayed through a triangle key. The function of the home screen key is to return to the desktop by clicking the key, typically through a circular key display, regardless of the interface currently in place. The function of the multitasking key is to click once on the multitasking key, and multiple tasks running in the background can be displayed, so as to enter or delete a certain task, and the tasks are displayed by a square key.
The foregoing is a simplified description of the terminology involved in the embodiments of the present application, and is not described in detail below.
Fig. 1 is an interface schematic diagram of a terminal device in a normal working state according to an embodiment of the present application.
When the user purchases the terminal device 100 by means of installment, the provider of the terminal device 100 may send the machine identification code of the terminal device 100 to the lockmachine application manufacturer in advance and add it to the server of the lockmachine application manufacturer. Thus, when the terminal device 100 is started for the first time, the locking application will be automatically downloaded to the desktop, so that the provider can realize payment monitoring of the terminal device 100 through the locking application. As shown in fig. 1, at this time, the locking application exists on the desktop of the terminal device 100 as only one application program, and does not affect the normal use of the terminal device 100.
Specifically, the display interface in the locking application displays the total amount of arrears, the number of installments, the amount of payment required per period, the remittance account, and the like of the terminal device 100. The terminal device 100 may continue normal use when the user remits the arrears into the designated money transfer account before the expiration of each installment.
Illustratively, as shown in fig. 1, the desktop of the terminal device 100 may be provided with a plurality of application programs, such as a clock, a calendar, a gallery, and the like. The bottom of the desktop of the terminal device 100 is also provided with a multi-tasking key 11, a home screen key 12 and a return key 13. The multi-task key 11 is used by the terminal device 100 to jump from the current page to one or more applications running in the background of the terminal device 100, and to enter or close a certain application. The home screen key 12 is used for the terminal device 100 to jump from the current page to the desktop of the terminal device 100. The return key 13 is used for the terminal device 100 to jump from the current page to the page that was last opened.
When the user does not complete payment before a certain payment expiration time, the locking application will be started in the locking mode, and the terminal device 100 will be "blocked" by the locking application, disabling the multi-task key 11, the home screen key 12 and the return key 13, so that the terminal device 100 cannot be used, or only a part of basic functions can be used, to prompt the user to pay back as soon as possible. When the user performs an operation to complete payment through the payment control on the "screen bar" interface, the terminal device 100 can be normally used.
The following is a brief description of the procedure for switching the "screen-up" interface and the terminal device from the lock mode back to the normal operation state, in conjunction with fig. 2A and 2B.
Fig. 2A is a schematic diagram of a relevant interface in a terminal device locking state according to an embodiment of the present application.
When the user does not complete payment before a certain period of payment expiration time, the locking application will be started in the locking mode to override the screen of the terminal device 100, and the terminal device 100 is limited due to the lack of payment. As shown in (a) of fig. 2A, the screen page 201 prompts the user "your cell phone is limited due to unpaid, please pay your unpaid balance using the following payment control, or use the payment code at any retail location. ". And, the payment control is displayed and the home screen key, the multitasking key and the return key are disabled, so that the terminal device 100 cannot be switched to other applications nor returned to the desktop, and cannot normally use other applications and pages.
Optionally, to prevent certain emergency situations for the user, basic functions may also be generally set on the "screen-in" page to address the emergency needs of the user. For example, a touch screen page 201 as shown in (a) of FIG. 2A, an emergency call control is arranged on the' screen of the fire control, the emergency call control is used for responding to the operation of a user and can realize the functions of calling a rescue phone and the like.
When the user clicks the payment control of the "screen of the" page, the user can jump to the payment page, such as the payment page 202 shown in fig. 2A (b), and the payment page 202 can display the payment object, payment amount, payment mode, and input password box. When the user inputs the payment password on the payment page, after completing the payment action, the machine locking application may control the terminal device 100 to exit from the payment page 202 and jump to the arrears page, such as the arrears page 203 shown in fig. 2A (c), and return the home screen key, the multitask key, and the return key of the terminal device 100 to normal use. The arrears page 203 may display the remaining time of the terminal device 100 from the next payment, the next payment deadline, and a payment control. When the user clicks the payment control in the arrears page 203, the next payment operation can be performed.
Alternatively, the user may complete the next payment in advance under the arrears page 203, or may not pay for the next payment, exit the arrears page 203 through the navigation key, and normally use other applications of the terminal device 100.
Fig. 2B is a schematic diagram of an interface for completing the installment payment of the terminal device according to an embodiment of the present application.
As shown in fig. 2B, when the user purchases the terminal device 100 in an installment manner and has completed the last installment, so that the purchase amount of the terminal device 100 for installment and the payment of interest are all completed, the prompt page 204 may be displayed. Through the prompt page 204, the user terminal device 100 is notified that the installment payment amount has been fully paid. The user can delete the locking application as required, and can also reserve the locking application for later use.
That is, when the user purchases the terminal device 100 by means of installment payment, the terminal device 100 automatically downloads the locking application during the first power-on process, and cannot be automatically unloaded before the user completely pays out the total shopping amount of the terminal device 100. Note that the lock application is an application program that is independent of other system applications of the terminal device 100. Under normal state, when a user of an installment payment node is not paid, the machine locking application can automatically start the machine locking mode, the screen page of the locking terminal equipment 100 can form a 'screen over screen' page, and the navigation key is disabled, so that other system applications cannot be used, or only a small part of basic applications can be used. Meanwhile, the screen reason and the payment control are displayed on the screen page to prompt the user to pay the current bill as soon as possible.
However, it was found by testing that when the terminal device 100 is in the screen-fixed mode, the terminal device 100 reaches a certain installment payment node, but the user does not pay, the lock application cannot disable the multi-task key because the setting of the screen-fixed mode is to disable the multi-task key. If the user presses the multi-task key at this time, the user can escape from the current "screen-up" page, so that the locking mode of the terminal device 100 can be escaped, and the provider cannot monitor the installment payment condition of the user through the locking mode, so that the user can normally use the terminal device 100 without payment due, and the income of the provider is seriously influenced.
The following describes in detail the problem that the terminal device can be escaped when the mode is started while in screen-fixed mode, in conjunction with fig. 3A-3B.
Fig. 3A is a schematic diagram of a relevant page of a terminal device in a screen-fixed mode according to an embodiment of the present application.
Illustratively, when the terminal apparatus 100 is in a normal operation state, for example, when a video screen is played, the terminal apparatus 100 may be brought into a screen-fixed mode by a screen-fixed control, such as the video page 301 shown in (a) in fig. 3A. It should be noted that, in the video page 301, the screen fixed control is in an open state, and the return key, the home screen key and the multi-task key in the navigation key can be used normally.
Illustratively, according to the actual needs of the user, the user may cause the terminal device 100 to enter a screen-fixed mode by clicking on a screen-fixed control, such as screen-fixed page 302 shown in (b) of fig. 3A. Note that, in the screen fixed page 302, the screen fixed control is in the off state, the return key and the home screen key in the navigation key are disabled, but the multitasking key may be used normally and is not allowed to be disabled. That is, when the terminal device 100 is in the screen-fixed mode, the multitasking page may be entered by clicking the multitasking key, and thus any task interface running in the background of the terminal device 100 may be entered through the multitasking page.
Fig. 3B is a schematic diagram of a relevant page that may be escaped when the terminal device is in the machine locking mode according to the embodiment of the present application.
Illustratively, the test finds that when the terminal device 100 is in the screen-fixed mode and the locking application is started in the locking mode, the terminal device 100 will enter the screen-fixed mode, i.e. enter the "screen-up" page, to prompt the user to complete the current debt as soon as possible. However, since the terminal device 100 is currently in the screen-fixed mode, and the screen-fixed mode prohibits disabling the multitasking key, which results in the lock application not disabling the multitasking key (the direct key) although displaying the "screen-up" page, the multitasking key still displays an abnormal page 303 as shown in fig. 3B, which prompts the user "you that the cell phone is limited due to unpaid, please pay your unpaid balance using the underlying payment control, or use the payment code at any retail location. ", a payment control is displayed. While the back key and home screen key are disabled or hidden, the multi-tasking key is still displayed as usable.
At this time, the user can jump to the multitasking page of the terminal device 100 by clicking the multitasking key, such as the multitasking page 304 shown in (B) of fig. 3B. In the multitasking page 304, a plurality of task pages showing that the terminal device 100 is running in the background are arranged, and a recycle control is provided below the plurality of task pages. The task pages are all reduced task windows, and a user can browse the task windows in sequence by sliding left and right or sliding up and down. In addition, the user can also close a certain task window by long-pressing the task window and pulling down to the recycling control.
At this time, the user may click on a task window to enter a corresponding task page, so that the "screen-up" page caused by the machine locking application may escape, for example, may click on a call window in the multitasking page, that is, may enter a call page, such as call page 305 shown in (c) in fig. 3B. In this call page 305, a user's recent call records, specifically, call objects, call time, call duration, and the like, may be displayed, for example. Wherein the multi-task key, the home screen key and the return key are displayed for normal use. For example, the user may jump to the desktop of the terminal device 100 by clicking the home screen key in the talk page 305, such as desktop 306 shown in (d) of FIG. 3B. Therefore, the provider cannot monitor the installment payment condition of the user through the machine locking mode, so that the user can normally use the terminal device 100 without paying due, and the benefit of the provider is seriously influenced.
In view of this, in order to solve the problem that in the embodiment of the present application, the terminal device 100 is in the screen-fixed mode, and the locking mode of the locking application is started and can be escaped, the present application provides a method for preventing the locking from escaping.
In addition, the method for preventing the machine from escaping does not need to be changed or influence the normal application program of the terminal equipment, and the method for preventing the machine from escaping has small influence on the original functions of the terminal equipment.
The type of the terminal device 100 is not particularly limited in the embodiment of the present application. In some embodiments, the terminal device 100 may be an IOT (internet of things ) device such as a cell phone, a wearable device (e.g., a smart bracelet, a smart watch, a headset, etc.), a tablet computer, a laptop computer (laptop), a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a cellular phone, a Personal Digital Assistant (PDA), an augmented reality (Augmented reality, AR) \virtual reality (VR) device, etc. For easy understanding, the following embodiments will be exemplified by taking the terminal device 100 as a mobile phone.
Based on the interface schematic diagram of the terminal device, a software system related to the terminal device is briefly introduced, and then a locking process of a locking application is described in combination with the software system.
Fig. 4 is a schematic structural diagram of a software system of a terminal device according to an embodiment of the present application. The terminal device may be the terminal device shown in fig. 1. As shown in fig. 4, the software system may include an application layer, a system framework layer (FWK), a system running layer, a hardware abstraction layer (hardwareabstractlayer, HAL), and a kernel layer. This will be specifically described below.
The application layer may include a series of application packages, such as desktop applications, contacts applications, conversation applications, short messages, gallery applications, video applications, calendars, cameras, navigation applications, map applications, bluetooth, WLAN, email clients, and the like.
It should be noted that the application layer may also include a lock-up application that monitors user installments.
Illustratively, the lockdown application may employ Trustonic lockdown application or PayJoy lockdown application.
The system framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs at the application layer. The system framework layer may include some predefined functions, such as functions for receiving events sent by the system framework layer.
In particular, the system framework layers may include view systems (Views), content providers (ContentProviders), resource managers (ResourceManager), notification managers (NotificationManager), activity managers (ACTIVITYMANAGER), window managers (Windows Manager), and the like.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The content provider allows applications to access data of another application (e.g., a contact database) or share their own data. The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the electronic device vibrates, and an indicator light blinks, etc.
The campaign manager is used to manage the application lifecycle and provide the usual navigation rollback functionality.
The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The system runtime layer includes a program library and a program runtime. For example, in the Android system, the libraries contain some C/C++ libraries that can be used by different components in the Android system. They provide services to developers through the Android application framework. The program runtime includes a core library that provides most of the functionality of the JAVA programming language core library.
The hardware abstraction layer is an interface layer between the hardware layer and the software layer for abstracting hardware. The hardware abstraction layer includes an audio-video interface, a call interface, a wireless fidelity (WIRELESS FIDELITY, wiFi) interface, and the like.
The kernel layer may include display drivers, camera drivers, sensor drivers, etc. for driving the associated hardware of the hardware layer, such as the display screen, camera, sensor, etc.
The following describes in detail the scheme of refreshing the disabling policy of the terminal device again after the power-on mode of the terminal device is started, with reference to fig. 5 to 7.
Fig. 5 is a flowchart of a method for preventing a lock from escaping according to an embodiment of the present application.
As shown in fig. 5, in one embodiment provided by the present application, a method for preventing a lock from escaping may include:
S5011, responding to a first operation initiated by a user, and sending a screen fixing mode instruction to a system framework layer by the first application.
Illustratively, in the embodiment of the present application, the first operation may be that the user may click on a screen-fixed control of a task page on the terminal device 100, so that the first application issues a screen-fixed mode instruction to the system frame layer, such as the video page 301 shown in (a) in fig. 3A.
It should be noted that, in the embodiment of the present application, the screen fixation mode is a non-disabled navigation key mode. For example, when the terminal device 100 is in the screen-fixed mode, the multitasking key is not allowed to be disabled.
Alternatively, the first application may be another application in the application layer other than the lock-up application, such as a video application, a game application, or the like.
S5012, the system framework layer informs the first application to enter a screen fixing mode according to the screen fixing mode instruction.
Illustratively, in the embodiment of the present application, the system framework layer inside the terminal device 100 obtains the screen fixing mode instruction of the first application, and invokes the corresponding program algorithm, thereby notifying the first application to enter the screen fixing mode.
S5013, the first application enters a screen fixation mode.
Illustratively, in the embodiment of the present application, when the first application receives an instruction to enter the screen fixing mode, an operation to enter the screen fixing mode is performed, such as the screen fixing page 302 shown in (b) of fig. 3A. When the screen page of the terminal device 100 enters the screen-fixed mode, it is indicated that the screen page cannot be switched or exited temporarily unless the user again performs an operation to exit the screen-fixed mode.
It should be noted that, in the embodiment of the present application, when the terminal device 100 is a mobile phone, the navigation key of the terminal device 100 may generally include a return key, a home screen key, a multi-task key, and the like. When the handset enters screen-fixed mode, it is generally not allowed to disable the multitasking key so that the user can control the handset screen by clicking on the multitasking interface.
Alternatively, in the application layer of the terminal device 100, the application layer may be generally implemented to enter the screen fixation mode using a SET IN SCREEN PINNING () procedure. Specifically, when the application layer of the terminal device 100 is required to enter the screen fixing mode, MSCREEN PINNING ACTIVE =true implementation may be adopted.
S5021, the locking application sends a locking mode instruction to the system framework layer.
Illustratively, in an embodiment of the present application, the lockdown application issues lockdown mode instructions to the system framework layer when the user does not perform something in the lockdown application within a specified time period, or does not complete payment within a specified time period, etc. For example, when a user purchases the terminal device 100 by means of installment, and the user does not pay at the expiration of a certain period, the locking application will start the locking mode and send a locking mode instruction to the system frame layer.
It should be understood that the application layer is a system application layer of the terminal device 100, and the application layer may include a lock application, a first application, and a plurality of other application programs. When the locking application enters a locking mode, the locking application locks the screen of other application programs in the application layer and prevents the other application programs from running.
Illustratively, the locking application may include a DLC program that is a locking control program inside the terminal device 100, and a locking application program that is a locking application program displayed on the desktop of the terminal device 100. The lock-up application is used to monitor the user's installment in real time when the user purchases the terminal device 100 using the installment method. When the user does not pay due, the locking application program is started to be in a locking mode, and the locking mode of the terminal equipment 100 is realized through the DLC program, so that the terminal equipment 100 presents a 'screen-up' page, and the user is reminded to pay as soon as possible.
S5022, the system framework layer informs the first application to exit from the screen fixing mode according to the machine locking mode instruction.
Illustratively, in the embodiment of the present application, when the system framework layer of the terminal device 100 receives a locking mode instruction of the locking application, the first application is notified to exit the non-disabled navigation key mode according to the locking mode instruction. For example, the first application is notified to exit the screen-fixed mode according to the lock mode instruction.
S5023, the first application exits the screen fixing mode.
Illustratively, in the embodiment of the present application, when the first application receives an instruction to exit the screen fixing mode, an operation to exit the screen fixing mode is performed.
It should be noted that, in the embodiment of the present application, when the system framework layer receives the locking mode instruction of the locking application, only the instruction of the first application to exit the screen fixing mode is sent, but it is not determined whether the first application has completely exited the screen fixing mode.
Alternatively, the first application exit screen fixing mode may be generally implemented using SET IN SCREEN PINNING () procedure within the application layer of the terminal device 100. Specifically, when the first application of the terminal device 100 is required to exit the screen-fixed mode, MSCREEN PINNING ACTIVE =false implementation may be adopted.
S5031, the system framework layer obtains a disabling strategy according to the machine locking mode instruction and informs the application layer of disabling the navigation key.
Illustratively, in the embodiment of the present application, the system framework layer also notifies the application layer to disable the navigation key according to the lock mode instruction. For example, when the terminal device 100 is a mobile phone, the system framework layer also notifies the application layer to start screen-up according to the lock mode instruction, and disables the return key, the home screen key, and the multi-tasking key.
S5032, the application layer disables the navigation key.
Illustratively, in the embodiment of the present application, when the first application receives the instruction to exit the disabled navigation key, the operation to exit the disabled navigation key is performed.
Alternatively, in the application layer of the terminal device 100, the application layer exit from the screen fixing mode may be generally implemented using a update Nav ButtonIcons () procedure.
However, in one embodiment of the present application, since the first application needs to forward the internal message three times to exit the screen-fixed mode, the running time is long, resulting in a long time for the application layer to completely exit the screen-fixed mode, even longer than the time for the application layer to disable the navigation key according to the disabling policy. That is, the time node at which the application layer exits the non-disabled navigation key mode is later than the time node at which the application layer disables the navigation key. In the embodiment of the application, the time node when the first application exits from the screen fixed mode is later than the time node when the application layer disables the navigation key. Therefore, the application layer firstly realizes the operation of disabling the navigation key according to the disabling strategy, but the application layer can not realize the effect of disabling the navigation key because the terminal device 100 is still in the screen fixed mode, and the state of disabling the navigation key can not be maintained all the time. Even if the first application has exited the screen-fixed mode later, the screen of the terminal device 100 maintains such a state that the navigation key cannot be disabled.
Fig. 6 is a flowchart of a method for preventing a lock from escaping according to another embodiment of the present application.
As shown in fig. 6, in one embodiment provided by the present application, a method for preventing a lock from escaping may include the following steps:
S5011, responding to a first operation initiated by a user, and sending a screen fixing mode instruction to a system framework layer by the first application.
Illustratively, in the embodiment of the present application, the first operation may be that the user may click on a screen-fixed control of a task page on the terminal device 100, so that the first application issues a screen-fixed mode instruction to the system frame layer, such as the video page 301 shown in (a) in fig. 3A.
It should be noted that, in the embodiment of the present application, the screen fixation mode is a non-disabled navigation key mode. For example, when the terminal device 100 is in the screen-fixed mode, the multitasking key is not allowed to be disabled.
Alternatively, the first application may be another application in the application layer other than the lock-up application, such as a video application, a game application, or the like.
S5012, the system framework layer informs the first application to enter a screen fixing mode according to the screen fixing mode instruction.
Illustratively, in the embodiment of the present application, the system framework layer inside the terminal device 100 obtains the screen fixing mode instruction of the first application, and invokes the corresponding program algorithm, thereby notifying the first application to enter the screen fixing mode.
S5013, the first application enters a screen fixation mode.
Illustratively, in the embodiment of the present application, when the first application receives an instruction to enter the screen fixing mode, an operation to enter the screen fixing mode is performed, such as the screen fixing page 302 shown in (b) of fig. 3A. When the screen page of the terminal device 100 enters the screen-fixed mode, it is indicated that the screen page cannot be switched or exited temporarily unless the user again performs an operation to exit the screen-fixed mode.
It should be noted that, in the embodiment of the present application, when the terminal device 100 is a mobile phone, the navigation key of the terminal device 100 may generally include a return key, a home screen key, a multi-task key, and the like. When the handset enters screen-fixed mode, it is generally not allowed to disable the multitasking key so that the user can control the handset screen by clicking on the multitasking interface.
Alternatively, in the application layer of the terminal device 100, the application layer may be generally implemented to enter the screen fixation mode using a SET IN SCREEN PINNING () procedure. Specifically, when the application layer of the terminal device 100 is required to enter the screen fixing mode, MSCREEN PINNING ACTIVE =true implementation may be adopted.
S5021, the locking application sends a locking mode instruction to the system framework layer.
Illustratively, in an embodiment of the present application, the lockdown application issues lockdown mode instructions to the system framework layer when the user does not perform something in the lockdown application within a specified time period, or does not complete payment within a specified time period, etc. For example, when a user purchases the terminal device 100 by means of installment, and the user does not pay at the expiration of a certain period, the locking application will start the locking mode and send a locking mode instruction to the system frame layer.
It should be understood that the application layer is a system application layer of the terminal device 100, and the application layer may include a lock application, a first application, and a plurality of other application programs. When the locking application enters a locking mode, the locking application locks the screen of other application programs in the application layer and prevents the other application programs from running.
Illustratively, the locking application may include a DLC program that is a locking control program inside the terminal device 100, and a locking application program that is a locking application program displayed on the desktop of the terminal device 100. The lock-up application is used to monitor the user's installment in real time when the user purchases the terminal device 100 using the installment method. When the user does not pay due, the locking application program is started to be in a locking mode, and the locking mode of the terminal equipment 100 is realized through the DLC program, so that the terminal equipment 100 presents a 'screen-up' page, and the user is reminded to pay as soon as possible.
S5022, the system framework layer informs the first application to exit from the screen fixing mode according to the machine locking mode instruction.
Illustratively, in the embodiment of the present application, when the system framework layer of the terminal device 100 receives a locking mode instruction of the locking application, the first application is notified to exit the non-disabled navigation key mode according to the locking mode instruction. For example, the first application is notified to exit the screen-fixed mode according to the lock mode instruction.
S5023, the first application exits the screen fixing mode.
Illustratively, in the embodiment of the present application, when the first application receives an instruction to exit the screen fixing mode, an operation to exit the screen fixing mode is performed.
Alternatively, the first application exit screen fixing mode may be generally implemented using SET IN SCREEN PINNING () procedure within the application layer of the terminal device 100. Specifically, when the first application of the terminal device 100 is required to exit the screen-fixed mode, MSCREEN PINNING ACTIVE =false implementation may be adopted.
S5024, the first application feeds back a signal for exiting the screen fixing mode.
Illustratively, in the embodiment of the present application, when the first application exits the screen-fixed mode, a signal is fed back to the system frame layer, so that the system frame layer determines that the first application has exited the screen-fixed mode.
S5031, the system framework layer obtains a disabling strategy according to the machine locking mode instruction and informs the application layer of disabling the navigation key.
Illustratively, in the embodiment of the present application, the system framework layer also notifies the application layer to disable the navigation key according to the lock mode instruction. For example, when the terminal device 100 is a mobile phone, the system framework layer also notifies the application layer to start screen-up according to the lock mode instruction, and disables the return key, the home screen key, and the multi-tasking key.
S5032, the application layer disables the navigation key.
Illustratively, in the embodiment of the present application, when the first application receives the instruction to exit the disabled navigation key, the operation to exit the disabled navigation key is performed.
Alternatively, in the application layer of the terminal device 100, the application layer exit from the screen fixing mode may be generally implemented using a update Nav ButtonIcons () procedure.
It should be noted that, in the embodiment of the present application, since it has been determined that the first application exits the screen fixing mode, the system framework layer may directly disable the navigation key in the application layer according to the disabling policy, and the problem that the navigation key cannot be disabled does not occur.
Illustratively, in another embodiment of the present application, it may further comprise: the system framework layer also determines whether the application layer disables the navigation key based on the feedback signal from the application layer. When the system framework layer determines that the application layer disables the navigation key according to the feedback signal of the application layer, the flow is ended. When the system framework layer cannot determine that the application layer disables the navigation key according to the feedback signal of the application layer, the disabling strategy can be refreshed again according to the disabling strategy, and the application layer is notified of disabling the navigation key again.
Fig. 7 is a flowchart of a method for preventing a lock from escaping according to another embodiment of the present application.
As shown in fig. 7, in one embodiment provided by the present application, a method for preventing a lock from escaping may include:
S5011, responding to a first operation initiated by a user, and sending a screen fixing mode instruction to a system framework layer by the first application.
Illustratively, in the embodiment of the present application, the first operation may be that the user may click on a screen-fixed control of a task page on the terminal device 100, so that the first application issues a screen-fixed mode instruction to the system frame layer, such as the video page 301 shown in (a) in fig. 3A.
It should be noted that, in the embodiment of the present application, the screen fixation mode is a non-disabled navigation key mode. For example, when the terminal device 100 is in the screen-fixed mode, the multitasking key is not allowed to be disabled.
Alternatively, the first application may be another application in the application layer other than the lock-up application, such as a video application, a game application, or the like.
S5012, the system framework layer informs the first application to enter a screen fixing mode according to the screen fixing mode instruction.
Illustratively, in the embodiment of the present application, the system framework layer inside the terminal device 100 obtains the screen fixing mode instruction of the first application, and invokes the corresponding program algorithm, thereby notifying the first application to enter the screen fixing mode.
S5013, the first application enters a screen fixation mode.
Illustratively, in the embodiment of the present application, when the first application receives an instruction to enter the screen fixing mode, an operation to enter the screen fixing mode is performed, such as the screen fixing page 302 shown in (b) of fig. 3A. When the screen page of the terminal device 100 enters the screen-fixed mode, it is indicated that the screen page cannot be switched or exited temporarily unless the user again performs an operation to exit the screen-fixed mode.
It should be noted that, in the embodiment of the present application, when the terminal device 100 is a mobile phone, the navigation key of the terminal device 100 may generally include a return key, a home screen key, a multi-task key, and the like. When the handset enters screen-fixed mode, it is generally not allowed to disable the multitasking key so that the user can control the handset screen by clicking on the multitasking interface.
Alternatively, in the application layer of the terminal device 100, the application layer may be generally implemented to enter the screen fixation mode using a SET IN SCREEN PINNING () procedure. Specifically, when the application layer of the terminal device 100 is required to enter the screen fixing mode, MSCREEN PINNING ACTIVE =true implementation may be adopted.
S5021, the locking application sends a locking mode instruction to the system framework layer.
Illustratively, in an embodiment of the present application, the lockdown application issues lockdown mode instructions to the system framework layer when the user does not perform something in the lockdown application within a specified time period, or does not complete payment within a specified time period, etc. For example, when a user purchases the terminal device 100 by means of installment, and the user does not pay at the expiration of a certain period, the locking application will start the locking mode and send a locking mode instruction to the system frame layer.
It should be understood that the application layer is a system application layer of the terminal device 100, and the application layer may include a lock application, a first application, and a plurality of other application programs. When the locking application enters a locking mode, the locking application locks the screen of other application programs in the application layer and prevents the other application programs from running.
Illustratively, the locking application may include a DLC program that is a locking control program inside the terminal device 100, and a locking application program that is a locking application program displayed on the desktop of the terminal device 100. The lock-up application is used to monitor the user's installment in real time when the user purchases the terminal device 100 using the installment method. When the user does not pay due, the locking application program is started to be in a locking mode, and the locking mode of the terminal equipment 100 is realized through the DLC program, so that the terminal equipment 100 presents a 'screen-up' page, and the user is reminded to pay as soon as possible.
S5022, the system framework layer informs the first application to exit from the screen fixing mode according to the machine locking mode instruction.
Illustratively, in the embodiment of the present application, when the system framework layer of the terminal device 100 receives a locking mode instruction of the locking application, the first application is notified to exit the non-disabled navigation key mode according to the locking mode instruction. For example, the first application is notified to exit the screen-fixed mode according to the lock mode instruction.
S5023, the first application exits the screen fixing mode.
Illustratively, in the embodiment of the present application, when the first application receives an instruction to exit the screen fixing mode, an operation to exit the screen fixing mode is performed.
It should be noted that, in the embodiment of the present application, when the system framework layer receives the locking mode instruction of the locking application, only the instruction of the first application to exit the screen fixing mode is sent, but it is not determined whether the first application has completely exited the screen fixing mode.
Alternatively, the first application exit screen fixing mode may be generally implemented using SET IN SCREEN PINNING () procedure within the application layer of the terminal device 100. Specifically, when the first application of the terminal device 100 is required to exit the screen-fixed mode, MSCREEN PINNING ACTIVE =false implementation may be adopted.
S5031, the system framework layer obtains a disabling strategy according to the machine locking mode instruction and informs the application layer of disabling the navigation key.
Illustratively, in the embodiment of the present application, the system framework layer also notifies the application layer to disable the navigation key according to the lock mode instruction. For example, when the terminal device 100 is a mobile phone, the system framework layer also notifies the application layer to start screen-up according to the lock mode instruction, and disables the return key, the home screen key, and the multi-tasking key.
S5032, the application layer disables the navigation key.
Illustratively, in the embodiment of the present application, when the first application receives the instruction to exit the disabled navigation key, the operation to exit the disabled navigation key is performed.
Alternatively, in the application layer of the terminal device 100, the application layer exit from the screen fixing mode may be generally implemented using a update Nav ButtonIcons () procedure.
S5041, the system framework layer also refreshes the disabling strategy according to the machine locking mode instruction, and informs the application layer of disabling the navigation key again.
Illustratively, in the embodiment of the present application, the system framework layer further refreshes the disabling policy according to the mode-locked instruction and notifies the first application to disable all navigation keys again.
S5042, the application layer disables the navigation key again.
Illustratively, in the embodiment of the present application, the application layer may further disable the navigation key again according to the disabling policy, so as to ensure that the navigation key of the terminal device 100 is completely disabled, and avoid the occurrence of the phenomenon of escaping the lock.
Within the application layer of the terminal device 100, the application layer exit screen fixation mode may be generally implemented using a update Nav ButtonIcons () procedure. In the embodiment of the application, the application layer completely exits from the screen fixed mode, that is MSCREEN PINNING ACTIVE =false, so that the aim of disabling the navigation key can be achieved by refreshing the disabling strategy again.
Illustratively, the terminal device 100 implementing the disable navigation key may appear to be hidden from the navigation keys on the screen page. For example, when the terminal device 100 is a mobile phone, a home screen key, a multi-tasking key, or a return key on a mobile phone page may be hidden.
The time interval between the application layer refresh disabling policy and the system frame layer notifying the application layer disabling navigation key is in the millisecond level, and the actual measurement is about 20ms, so that the user's vision is not affected.
Therefore, in the embodiment of the present application, when the terminal device 100 is in the screen-fixed mode and the locking application is started in the locking mode, the system framework layer notifies the application layer to exit the screen-fixed mode according to the locking mode instruction, and notifies the application layer to disable the navigation key. However, due to the longer running time of the application layer exiting the screen fixed mode, the time node of the application layer exiting the screen fixed mode is later than the time node of the application layer disabling the navigation key. Therefore, by adopting the embodiment of the application, the application layer can refresh the disabling strategy again, thereby ensuring that the application layer can determine the disabling navigation key.
The software system, the method for preventing the lock from escaping and the applicable scenario in several embodiments provided by the application are described above with reference to fig. 1 to 7. The hardware system and chip system of the terminal device to which the present application is applied will be described in detail with reference to fig. 8 to 9. It should be understood that the hardware system and the chip system in the embodiments of the present application may perform the methods of the foregoing embodiments of the present application, that is, specific working processes of the following various products may refer to corresponding processes in the foregoing method embodiments.
Fig. 8 is a hardware system of a terminal device according to an embodiment of the present application. The terminal device may be configured to implement the processing steps corresponding to the terminal device in the method for preventing the lock from escaping described in the foregoing method embodiment.
In the embodiment of the present application, the terminal device 100 may be a mobile phone shown in fig. 1, a tablet computer, a smart screen, a wearable electronic device, a vehicle-mounted electronic device, an augmented reality device, a Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a personal digital assistant (personal DIGITAL ASSISTANT, PDA) and other devices with a mirror image screen projection function, and the embodiment of the present application does not limit the specific type of the terminal device 100. The terminal equipment is enabled to disable the navigation keys again by refreshing the disabling strategy after the machine locking mode of the terminal equipment is started, so that the navigation keys of the terminal equipment are enabled to be disabled completely, the machine locking mode of the terminal equipment is prevented from escaping, the benefits of suppliers are ensured, and the experience of the suppliers is improved.
The terminal device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, a first antenna 1, a second antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
The configuration shown in fig. 8 does not constitute a specific limitation on the terminal device. In other embodiments of the application, the terminal device may include more or fewer components than those shown in fig. 8, or the terminal device may include a combination of some of the components shown in fig. 8, or the terminal device may include sub-components of some of the components shown in fig. 8. The components shown in fig. 8 may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units. For example, the processor 110 may include at least one of the following processing units: an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (IMAGE SIGNAL processor, ISP), a controller, a video codec, a digital signal processor (DIGITAL SIGNAL processor, DSP), a baseband processor, a neural-Network Processor (NPU). The different processing units may be separate devices or integrated devices. The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
The connection relationship between the modules shown in fig. 8 is only schematically illustrated, and does not constitute a limitation on the connection relationship between the modules of the terminal device. Alternatively, each module of the terminal device may also use a combination of multiple connection manners in the foregoing embodiments.
The charge management module 140 is used to receive power from a charger. The charging management module 140 may also supply power to the terminal device through the power management module 141 while charging the battery 142. The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 to power the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be used to monitor parameters such as battery capacity, battery cycle times, and battery state of health (e.g., leakage, impedance). Alternatively, the power management module 141 may be provided in the processor 110, or the power management module 141 and the charge management module 140 may be provided in the same device.
The wireless communication function of the terminal device may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, the baseband processor, and other devices. The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the terminal device may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas.
The mobile communication module 150 may provide a solution for wireless communication applied on a terminal device, such as at least one of the following: second generation (2 th generation, 2G) mobile communication solutions, third generation (3 th generation, 3G) mobile communication solutions, fourth generation (4 th generation, 5G) mobile communication solutions, fifth generation (5 th generation, 5G) mobile communication solutions.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through audio devices (e.g., speaker 170A, receiver 170B) or displays images or video through display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
Similar to the mobile communication module 150, the wireless communication module 160 may also provide wireless communication solutions applied on the terminal device, such as at least one of the following: wireless local area network (wireless local area networks, WLAN), bluetooth (BT), bluetooth low energy (bluetooth low energy, BLE), ultra Wide Band (UWB), global navigation satellite system (global navigation SATELLITE SYSTEM, GNSS), frequency modulation (frequency modulation, FM), near field communication (NEAR FIELD communication, NFC), infrared (IR) technologies.
In some embodiments, the antenna 1 of the terminal device is coupled to the mobile communication module 150 and the antenna 2 of the terminal device is coupled to the wireless communication module 160 so that the terminal device can communicate with the network and other terminal devices through wireless communication technology.
The external memory interface 120 may be used to connect an external memory card, such as a Secure Digital (SD) card, to enable expansion of the memory capabilities of the terminal device. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as music, video, etc. are stored in an external memory card.
The internal memory 121 may be used to store computer executable program code including instructions. The internal memory 121 may include a storage program area and a storage data area.
In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A may be of various types, such as a resistive pressure sensor, an inductive pressure sensor, or a capacitive pressure sensor. The capacitive pressure sensor may be a device comprising at least two parallel plates with conductive material, the capacitance between the electrodes changing when a force is applied to the pressure sensor 180A, the terminal device determining the strength of the pressure based on the change in capacitance. When a touch operation acts on the display screen 194, the terminal device detects the touch operation according to the pressure sensor 180A. The terminal device may also calculate the position of the touch based on the detection signal of the pressure sensor 180A. In some embodiments, touch operations that act on the same touch location, but at different touch operation strengths, may correspond to different operation instructions. For example: executing an instruction for checking the short message when the touch operation with the touch operation intensity smaller than the first pressure threshold acts on the short message application icon; and executing the instruction of newly creating the short message when the touch operation with the touch operation intensity being larger than or equal to the first pressure threshold acts on the short message application icon.
The fingerprint sensor 180H is used to collect a fingerprint. The terminal equipment can utilize the collected fingerprint characteristics to realize the functions of unlocking, accessing an application lock, photographing, answering an incoming call and the like.
The touch sensor 180K, also referred to as a touch device. The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a touch screen. The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor 180K may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the terminal device and at a different location than the display 194.
The keys 190 include a power-on key and an volume key. The keys 190 may be mechanical keys or touch keys. The terminal device can receive the key input signals and realize functions related to the case input signals.
Fig. 9 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
The dashed line in fig. 9 indicates that the unit or the module is optional, and the terminal device 100 may be used to implement the method for preventing the lock from escaping as described in the above method embodiment.
The terminal device 100 includes one or more processors 110, which one or more processors 110 may support the terminal device 100 to implement the methods in the method embodiments. The processor 110 may be a general purpose processor or a special purpose processor. For example, the processor 110 may be a central processing unit (central processing unit, CPU), a digital signal processor (DIGITAL SIGNAL processor, DSP), an Application Specific Integrated Circuit (ASIC), a field programmable gate array (field programmable GATE ARRAY, FPGA), or other programmable logic device such as discrete gates, transistor logic, or discrete hardware components.
The processor 110 may be configured to control the terminal device 100, execute a software program, and process data of the software program. The terminal device 100 may further comprise a communication unit 105 for enabling input (reception) and output (transmission) of signals.
For example, the terminal device 100 may be a chip, the communication unit 105 may be an input and/or output circuit of the chip, or the communication unit 105 may be a communication interface of the chip, which may be an integral part of the terminal device or other terminal devices. For another example, the terminal device 100 may be a terminal device, the communication unit 105 may be a transceiver of the terminal device, or the communication unit 105 may be a transceiver circuit of the terminal device.
The terminal device 100 may include one or more memories 102 having a program 104 stored thereon, the program 104 being executable by the processor 110 to generate instructions 103 such that the processor 110 performs the method for preventing lock escape described in the above method embodiments according to the instructions 103.
Optionally, the memory 102 may also have data stored therein. Alternatively, the processor 110 may also read data stored in the memory 102, which may be stored at the same memory address as the program 104, or which may be stored at a different memory address than the program 104.
The processor 110 and the memory 102 may be provided separately or may be integrated together; for example, integrated on a System On Chip (SOC) of the terminal device.
Illustratively, the memory 102 may be used to store the related program 104 of the method for preventing lock escape provided in the embodiment of the present application, and the processor 110 may be used to invoke the related program 104 of the method for preventing lock escape stored in the memory 102 at the time of upgrading, to execute the method for preventing lock escape of the embodiment of the present application. For example: the terminal equipment is enabled to disable the navigation keys again by refreshing the disabling strategy after the machine locking mode of the terminal equipment is started, so that the navigation keys of the terminal equipment are enabled to be disabled completely, the machine locking mode of the terminal equipment is prevented from escaping, the benefits of suppliers are ensured, and the experience of the suppliers is improved.
The present application also provides a computer program product which, when executed by the processor 110, implements a method for preventing lock escape according to any one of the method embodiments of the present application.
The computer program product may be stored in the memory 102, such as the program 104, and the program 104 is finally converted into an executable object file capable of being executed by the processor 110 through preprocessing, compiling, assembling, and linking processes.
The application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a computer implements the method for preventing the escape of a lock according to any one of the method embodiments of the application. The computer program may be a high-level language program or an executable object program.
Optionally, the computer readable storage medium is, for example, memory 102. The memory 102 may be volatile memory or nonvolatile memory, or the memory 102 may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an erasable programmable ROM (erasable PROM), an electrically erasable programmable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM) which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (STATIC RAM, SRAM), dynamic random access memory (DYNAMIC RAM, DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (doubledata RATE SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (ENHANCED SDRAM, ESDRAM), synchronous link dynamic random access memory (SYNCHLINK DRAM, SLDRAM), and direct memory bus random access memory (direct rambus RAM, DR RAM).
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working processes and technical effects of the apparatus and device described above may refer to corresponding processes and technical effects in the foregoing method embodiments, which are not described in detail herein.
In the several embodiments provided by the present application, the disclosed systems, devices, and methods may be implemented in other manners. For example, some features of the method embodiments described above may be omitted, or not performed. The above-described apparatus embodiments are merely illustrative, the division of units is merely a logical function division, and there may be additional divisions in actual implementation, and multiple units or components may be combined or integrated into another system. In addition, the coupling between the elements or the coupling between the elements may be direct or indirect, including electrical, mechanical, or other forms of connection.
It should be understood that, in various embodiments of the present application, the size of the sequence number of each process does not mean that the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
In addition, the terms "system" and "network" are often used interchangeably herein. The term "and/or" herein is merely one association relationship describing the associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In summary, the foregoing description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (11)

1. A method for preventing a lock from escaping, which is applied to a terminal device with a non-forbidden navigation key mode, wherein a lock application and a navigation key are arranged in an application layer, and the method comprises the following steps:
Responding to the first operation, and controlling the application layer to enter a non-forbidden navigation key mode;
Responding to a machine locking mode instruction of the machine locking application, and informing the application layer to exit the non-forbidden navigation key mode;
obtaining a disabling strategy based on the machine locking mode instruction of the machine locking application, and informing the application layer of disabling the navigation key for the first time according to the disabling strategy;
And refreshing the disabling strategy based on the machine locking mode instruction of the machine locking application, and informing the application layer of disabling the navigation key again according to the disabling strategy.
2. The method of preventing lock escape according to claim 1, further comprising:
And the application layer realizes the time node which exits the non-forbidden navigation key mode and is later than the time node which is realized by the application layer for the first time and forbidden navigation key.
3. A method of preventing escape of a lock according to claim 1 or 2, wherein the time node at which the disabling policy is refreshed is later than the time node at which the application layer implements exit from the non-disabled navigation key mode.
4. A method of preventing escape of a lock according to claim 1 or 2, wherein said non-disabled navigation key mode comprises a screen-fixed mode.
5. A method of preventing lockdown escape as defined in claim 1 or 2, wherein responding to lockdown mode instructions of the lockdown application comprises:
The lockdown application is started to lock down the machine mode and generates a lockdown mode instruction.
6. The method of preventing a lock from escaping according to claim 5, wherein the lock application is enabled with a lock mode comprising:
an unpaid scenario expires when the user purchases in an installment manner.
7. A method of preventing escape of a lock according to claim 1 or 2, wherein the navigation keys include a back key, a home screen key and a multi-tasking key;
the disabling policy includes disabling one or more of the return key, the home screen key, and the multi-tasking key.
8. A method of preventing escape of a lock according to claim 1 or 2, wherein the time interval between said notifying said application layer of disabling said navigation key and said notifying said application layer of disabling said navigation key again according to said disabling policy is in the order of milliseconds.
9. A terminal device, characterized in that the terminal device comprises: one or more processors, and memory;
The memory is coupled with the one or more processors, the memory for storing computer program code comprising computer instructions that are invoked by the one or more processors to cause the terminal device to perform the method of any of claims 1-8.
10. A chip system for application to a terminal device, the chip system comprising one or more processors for invoking computer instructions to cause the terminal device to perform the method of any of claims 1 to 8.
11. A computer readable storage medium comprising instructions which, when run on a terminal device, cause the terminal device to perform the method of any of claims 1 to 8.
CN202410545432.4A 2024-04-30 2024-04-30 Method for preventing machine locking from escaping and terminal equipment Pending CN118394539A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410545432.4A CN118394539A (en) 2024-04-30 2024-04-30 Method for preventing machine locking from escaping and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410545432.4A CN118394539A (en) 2024-04-30 2024-04-30 Method for preventing machine locking from escaping and terminal equipment

Publications (1)

Publication Number Publication Date
CN118394539A true CN118394539A (en) 2024-07-26

Family

ID=91999045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410545432.4A Pending CN118394539A (en) 2024-04-30 2024-04-30 Method for preventing machine locking from escaping and terminal equipment

Country Status (1)

Country Link
CN (1) CN118394539A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140283012A1 (en) * 2013-03-13 2014-09-18 Research In Motion Limited Method of locking an application on a computing device
CN105100256A (en) * 2015-08-10 2015-11-25 北京心驿科技有限公司 System and method for remotely controlling locking of mobile equipment
CN110337102A (en) * 2019-06-28 2019-10-15 阿里巴巴集团控股有限公司 Terminal locking method and device based on block chain
CN114615377A (en) * 2020-11-25 2022-06-10 成都鼎桥通信技术有限公司 Application program control method, device and equipment
CN116456324A (en) * 2023-06-14 2023-07-18 荣耀终端有限公司 Terminal control method and device, mobile terminal and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140283012A1 (en) * 2013-03-13 2014-09-18 Research In Motion Limited Method of locking an application on a computing device
CN105100256A (en) * 2015-08-10 2015-11-25 北京心驿科技有限公司 System and method for remotely controlling locking of mobile equipment
CN110337102A (en) * 2019-06-28 2019-10-15 阿里巴巴集团控股有限公司 Terminal locking method and device based on block chain
CN114615377A (en) * 2020-11-25 2022-06-10 成都鼎桥通信技术有限公司 Application program control method, device and equipment
CN116456324A (en) * 2023-06-14 2023-07-18 荣耀终端有限公司 Terminal control method and device, mobile terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN108845856B (en) Object-based synchronous updating method and device, storage medium and equipment
US10354244B2 (en) Method, apparatus and system for processing payment request for virtual commodities on open network platform
US9875109B2 (en) Method and apparatus for generating user adaptive application in mobile terminal
US10979867B2 (en) Electronic device and method for operating same
CN105376719A (en) Information pushing method and device
CN111857464A (en) Information display method and device, electronic equipment and readable storage medium
US20150161592A1 (en) Method for payment using membership card and electronic device thereof
EP4345669A1 (en) User privacy protection method and apparatus
CN111352719A (en) Transaction book-keeping service data processing method, device and system
CN116156044A (en) Equipment cooperation method and related device
CN114327087A (en) Input event processing method and device, electronic equipment and storage medium
CN118394539A (en) Method for preventing machine locking from escaping and terminal equipment
KR20120091551A (en) Mobile terminal and method for controlling the same
CN114862398A (en) Distributed safety equipment-based risk control method and related device
KR20150008232A (en) An terminal appratus, a method for operating it and a server apparatus
US20130304635A1 (en) Mobile terminal and controlling method thereof
CN113050936B (en) Front-end data processing method and device based on integrated development environment
CN114066370A (en) Inventory service calling method, device, equipment, storage medium and program product
CN112559081A (en) Data loading method, device, equipment and computer readable storage medium
KR20220022282A (en) Electronic device for providing website related to marketing and method for operation thereof
CN113950043A (en) Communication method, communication apparatus, storage medium, and terminal
CN114531493B (en) Request processing method and device, electronic equipment and storage medium
CN118079382A (en) Game service management method and electronic device
CN110569037A (en) Data writing method and device
CN114519407B (en) Display control method, display control device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination