CN105095743B - Method and device for setting locking strategy and electronic equipment - Google Patents

Method and device for setting locking strategy and electronic equipment Download PDF

Info

Publication number
CN105095743B
CN105095743B CN201510571459.1A CN201510571459A CN105095743B CN 105095743 B CN105095743 B CN 105095743B CN 201510571459 A CN201510571459 A CN 201510571459A CN 105095743 B CN105095743 B CN 105095743B
Authority
CN
China
Prior art keywords
locking
target application
application program
strategy
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510571459.1A
Other languages
Chinese (zh)
Other versions
CN105095743A (en
Inventor
彭钟裔
李盛伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201510571459.1A priority Critical patent/CN105095743B/en
Publication of CN105095743A publication Critical patent/CN105095743A/en
Application granted granted Critical
Publication of CN105095743B publication Critical patent/CN105095743B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses a method and a device for setting a locking strategy and electronic equipment, relates to the information processing technology, and can simplify the setting process of the locking strategy of an application program. The method for setting the locking strategy comprises the following steps: acquiring unlocking operation information of a user on a target application program in a terminal within a preset time period; when the unlocking operation information meets a trigger condition, determining a locking recommendation strategy of the target application program; and setting the locking strategy of the target application program as the locking recommendation strategy. The method and the device are suitable for the locking strategy setting technology of the application program.

Description

Method and device for setting locking strategy and electronic equipment
Technical Field
The present invention relates to information processing technologies, and in particular, to a method and an apparatus for setting a locking policy, and an electronic device.
Background
With the development of terminal technology, the technology of application lock is largely used to protect the privacy security of the application. Typically, the user needs to enter an unlock password each time the application is unlocked. Frequent input of the unlock password may cause inconvenience to the user in using the application. Thus, the user typically desires to select an appropriate locking strategy to simplify the current unlocking operation.
However, in the process of implementing the present invention, the inventor finds that the setting mode of the existing locking policy is more complicated, thereby affecting the use experience of the user.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for setting a lock policy, and an electronic device, which can simplify a setting process of a lock policy of an application.
In order to achieve the above purpose, the embodiment of the invention adopts the following technical scheme:
in a first aspect, a method for setting a locking policy in an embodiment of the present invention includes:
acquiring unlocking operation information of a user on a target application program in a terminal within a preset time period;
when the unlocking operation information meets a trigger condition, determining a locking recommendation strategy of the target application program;
and setting the locking strategy of the target application program as the locking recommendation strategy.
Optionally, the obtaining of the unlocking operation information of the user on the target application program within the predetermined time period includes:
acquiring the unlocking times of the target application program by the user in the preset time period; or,
and acquiring the unlocking times of the screen of the terminal and the unlocking times of the target application program of the user in the preset time period.
Optionally, when the unlocking operation information meets a trigger condition, determining a lock recommendation policy of the target application includes:
when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value, determining a locking recommendation strategy; or when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are greater than or equal to a second threshold value, determining a locking recommendation strategy; and the unlocking times of the target application program set in the lock recommendation strategy are less than the currently set unlocking times of the target application program.
Further, the determining the lock recommendation policy includes:
acquiring a current locking strategy of the target application program, and storing currently set unlocking times of the target application program in the current locking strategy;
if the current unlocking strategy is locking after exiting the application program every time, when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value, determining that a locking recommended strategy is locking after the terminal screen is locked or locking after a preset time interval after the terminal screen is locked;
if the current unlocking strategy is to lock after the terminal locks the screen, when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining that the recommended locking strategy is to lock after a preset time interval after the terminal locks the screen.
Still further, the acquiring the current locking policy of the target application includes:
acquiring the setting information of the target application program in the terminal;
and analyzing the setting information to acquire the current locking strategy of the target application program.
Optionally, the setting the lock policy of the target application to the lock recommendation policy includes:
prompting the user for the lock recommendation policy;
and after receiving the confirmation message of the user for the locking recommendation strategy, setting the locking strategy of the target application program as the locking recommendation strategy.
As another embodiment, further, the method further comprises:
and setting the locking strategy of the application program in the terminal as the locking recommendation strategy.
In the foregoing another embodiment, further setting the lock policy of the application program in the terminal as the lock recommendation policy includes:
prompting the user for the lock recommendation policy;
and after receiving the confirmation message of the user to the locking recommendation strategy, setting the locking strategy applied in the terminal as the locking recommendation strategy.
On the other hand, an apparatus for setting a locking policy according to an embodiment of the present invention includes:
the information acquisition unit is used for acquiring unlocking operation information of a user on a target application program in the terminal within a preset time period;
the policy acquisition unit is used for determining a locking recommendation policy of the target application program when the unlocking operation information meets a trigger condition;
and the strategy setting unit is used for setting the locking strategy of the target application program as the locking recommendation strategy.
Optionally, the information obtaining unit is specifically configured to obtain the number of times that the user unlocks the target application program within the predetermined time period; or acquiring the unlocking times of the screen of the terminal and the unlocking times of the target application program by the user in the preset time period.
Optionally, the policy obtaining unit is specifically configured to,
and when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value or when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining a locking recommendation strategy, wherein the unlocking times of the target application program set in the locking recommendation strategy are smaller than the currently set unlocking times of the target application program.
Further, the policy obtaining unit includes:
the first acquisition module is used for acquiring the current locking strategy of the target application program, and the currently set unlocking times of the target application program are stored in the current locking strategy;
the policy obtaining module is configured to determine, if the current unlocking policy is locking after exiting from the application program every time, that the recommended locking policy is locking after the terminal locks the screen or locking after a predetermined time interval after the terminal locks the screen when the number of times of unlocking the target application program within the predetermined time period is greater than or equal to a first threshold; if the current unlocking strategy is to lock after the terminal locks the screen, when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining that the recommended locking strategy is to lock after a preset time interval after the terminal locks the screen.
Still further, the first obtaining module includes:
the information acquisition submodule is used for acquiring the setting information of the target application program in the terminal;
and the analysis submodule is used for analyzing the setting information and acquiring the current locking strategy of the target application program.
Optionally, the policy setting unit includes:
the prompting module is used for prompting the locking recommendation strategy to the user;
and the setting module is used for setting the locking strategy of the target application program as the locking recommendation strategy after receiving the confirmation message of the user on the locking recommendation strategy.
As another embodiment, the policy setting unit is further configured to set a lock policy of an application in the terminal as the lock recommendation policy.
In the foregoing another embodiment, further, the prompting module is further configured to prompt the user for the lock recommendation policy; the setting module is further configured to set the locking policy applied in the terminal as the locking recommendation policy after receiving the confirmation message of the user on the locking recommendation policy.
In a third aspect, an electronic device according to an embodiment of the present invention includes:
the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing the steps of:
acquiring unlocking operation information of a user on a target application program in a terminal within a preset time period;
when the unlocking operation information meets a trigger condition, determining a locking recommendation strategy of the target application program;
and setting the locking strategy of the target application program as the locking recommendation strategy.
As can be seen from the above description, with the embodiments of the present invention, when the information of the unlocking operation of the user on the target application program in the terminal, which is acquired within the predetermined time period, satisfies the trigger condition, the lock recommendation policy is determined, and the lock policy of the target application program is set as the lock recommendation policy. Therefore, the recommendation strategy of the target application program for locking can be determined and set again according to the unlocking operation information of the user, and the operation is simple and convenient, so that the scheme of the embodiment of the invention avoids the defect of multiple steps of setting the locking strategy in the prior art, thereby simplifying the setting process of the locking strategy of the application program.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of a method for setting a locking policy according to a first embodiment of the present invention;
FIG. 2 is a flowchart of a method for setting a locking policy according to a second embodiment of the present invention;
FIG. 3 is a diagram illustrating a user being prompted to lock a recommended policy in accordance with a second embodiment of the present invention;
FIG. 4 is a diagram illustrating an apparatus for setting a locking policy according to a third embodiment of the present invention;
FIG. 5 is a diagram illustrating a policy obtaining unit according to a third embodiment of the present invention;
FIG. 6 is a diagram illustrating a policy setting unit according to a third embodiment of the present invention;
fig. 7 is a schematic view of an electronic device according to a fourth embodiment of the invention.
Detailed Description
A method and an apparatus for setting a locking policy according to an embodiment of the present invention are described in detail below with reference to the accompanying drawings. It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a method for setting a locking policy according to a first embodiment of the present invention may be executed by a terminal, and includes:
and 11, acquiring unlocking operation information of the target application program in the terminal by the user in a preset time period.
In the process of using the terminal by a user, some application programs are pre-installed in the terminal, and the user can download some application programs in the process of using the terminal. The target application referred to herein refers to any application on the terminal. For example, an application program such as an address book on a terminal may be used as a target application program.
In this step, the unlocking operation information may include the number of times that the user unlocks the target application program, or may also include both the number of times that the user unlocks the screen of the terminal and the number of times that the target application program is unlocked. Therefore, in this step, the number of times of unlocking the target application program by the user is mainly obtained within the predetermined time period, or the number of times of unlocking the screen of the terminal by the user and the number of times of unlocking the target application program are mainly obtained.
In a specific application, the number of times of unlocking the target application program and the number of times of unlocking the terminal screen can be respectively counted by utilizing a counting function in the terminal. And when the situation that the target application program is unlocked by the user is detected, adding 1 to the unlocking times corresponding to the target application program. And when the situation that the user unlocks the terminal screen is detected, adding 1 to the unlocking times of the terminal screen corresponding to the target application program. The preset time period may be set arbitrarily, for example, to 3 minutes. Of course, the preset time period may also be selected from other time periods, or set according to the needs of the user.
And step 12, when the unlocking operation information meets the triggering condition, determining a locking recommendation strategy.
In the embodiment of the present invention, two thresholds are set: the first threshold and the second threshold may be the same or different, and both may be set arbitrarily. The first threshold value is the upper limit value of the unlocking times of the target application program in the preset time period, and the second threshold value is the upper limit value of the unlocking times of the target application program and the screen of the terminal in the preset time period. And when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value, triggering and determining a locking recommendation strategy. Or, when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are greater than or equal to a second threshold value, triggering and determining a locking recommendation strategy. In the embodiment of the invention, the principle of determining the locking recommendation strategy for the user is as follows: and the unlocking times of the target application program set in the determined locking recommendation strategy are less than the currently set unlocking times of the target application program.
In a specific application, the locking policy of the target application program generally has the following types:
the first type of policy: unlocking is needed when the target application program is opened every time, namely locking is carried out after the application program is quitted every time; the second type of strategy is as follows: the target application program is unlocked only once before the screen of the terminal is closed, and the target application program is locked immediately after the screen of the terminal is closed, namely the terminal is locked after the screen is locked; the third type of policy: the target application program is unlocked only once before the screen of the terminal is closed, and the target application program is locked after a preset time (which can be set arbitrarily, for example, 5 minutes) after the screen of the terminal is closed, that is, after a preset time interval after the screen of the terminal is locked, the target application program is locked.
Among the setting information of the target application, there is generally setting information of the lock policy. Therefore, the current locking policy of the target application program can be obtained by acquiring and analyzing the setting information of the target application program, wherein the currently set unlocking times of the target application program are stored in the current locking policy. For example, the setting information of the lock policy may record an initial lock policy in initial settings of the target application program, or a lock policy in which a user changes the initial settings of the target application program after downloading the target application program. Both the initial locking policy and the user-modified locking policy may be used as the current locking policy herein and may be selected from the above three types of locking policies. Of course, with the diversification of the user requirements, the locking strategy can be further expanded. However, in any case, the selection of the locking strategy can be made based on the principles of the embodiments of the present invention.
According to the above description, when determining the lock recommendation policy, the current lock policy of the target application may be first obtained by reading the setting information of the target application. And then, determining a locking recommendation strategy according to the current locking strategy.
Specifically, if the current locking policy is the first type of policy, the determined locking recommendation policy is the second type of policy or the third type of policy. In this case, the second type of policy or the third type of policy is specifically selected, default setting can be arbitrarily set, and the second type of policy and the third type of policy can be recommended to the user at the same time, so that the user can select which locking policy to use. And if the current locking strategy is the second type of strategy, determining the locking recommendation strategy to be a third type of strategy. If the current locking policy is the third type policy, the interval time may be reset based on the third type policy, and the reset interval time may be set longer.
And step 13, setting the locking strategy of the target application program as the locking recommendation strategy.
After the locking recommendation strategy is determined, the locking strategy of the terminal can be directly set as the locking recommendation strategy. Of course, in order to further improve the user experience, the user may be prompted with the lockout recommendation policy in this step, and the user may confirm whether to select the lockout recommendation policy. And when the user selects the locking recommendation strategy, sending a confirmation message to the terminal. And after receiving the confirmation message of the user for the locking recommendation strategy, setting the locking strategy of the target application program as the locking recommendation strategy.
As can be seen from the above description, in the embodiment of the present invention, since the recommended locking policy for the target application can be determined and set again according to the unlocking operation information of the user, and the operation is simple and convenient, the scheme of the embodiment of the present invention avoids the defect of multiple steps in setting the locking policy in the prior art, thereby simplifying the setting process of the locking policy of the application, and improving the user experience.
As shown in fig. 2, a method for setting a locking policy according to a second embodiment of the present invention includes:
and step 21, setting the first threshold and the second threshold.
Wherein, the meaning of the first threshold value and the second threshold value can refer to the description of the first embodiment. In this embodiment, the first threshold is set 5 times and the second threshold is set 6 times.
And step 22, obtaining the current unlocking strategy of the target application program.
It is assumed that the obtained current unlocking strategy is locking after the terminal locks the screen.
And 23, acquiring unlocking operation information of the target application program in the terminal by the user in a preset time period.
For example, the number of times of unlocking the screen of the terminal and the number of times of unlocking the target application by the user within 3 minutes are acquired in this step. It is assumed that the acquired number of times of unlocking the screen of the terminal and the number of times of unlocking the target application are 7 times.
And step 24, when the unlocking operation information meets the triggering condition, determining a locking recommendation strategy of the target application program.
Since the number of times of unlocking the screen of the terminal and the number of times of unlocking the target application acquired in step 22 are 7 times and greater than the second threshold 6 times, the lock recommendation policy of the target application may be determined.
According to the description of the first embodiment, according to the current unlocking policy obtained in step 22, the locking recommendation policy may be determined to be locking after a predetermined time after the terminal locks the screen. It is assumed in this embodiment that the locking is performed after an interval of 3 minutes after the terminal locks the screen
And step 25, prompting the locking recommendation strategy to the user. Specifically, the lock recommendation policy may be displayed on a screen of the terminal.
And step 26, setting the locking policy of the target application program as the locking recommendation policy after receiving the confirmation message of the user on the locking recommendation policy.
And 27, setting the locking strategy of the application program in the terminal as the locking recommendation strategy.
In order to facilitate the user operation, in this embodiment, the user may be further prompted to set the locking policy of other applications of the terminal as the locking recommendation policy. Specifically, in this step, the lock recommendation policy is prompted to the user, and after a confirmation message of the user on the lock recommendation policy is received, the lock policy applied in the terminal is set as the lock recommendation policy.
For example, the obtained current locking policy of the target application program, which is the "microblog", is the second type of locking policy, that is, the "microblog" is unlocked only once before the screen of the terminal is closed, and the "microblog" is locked immediately after the screen of the terminal is closed. According to the description of the second embodiment, it is detected that the continuous action of locking the screen and unlocking the 'microblog' by the user within 3 minutes exceeds 7 times. Therefore, the third type of locking policy is determined as the locking recommendation policy, that is, the locking recommendation policy is "automatically lock the application after locking the screen for 3 minutes". Meanwhile, as shown in fig. 3, the user is prompted with a lock recommendation policy "lock the screen for 3 minutes and then automatically lock the application" and a current lock policy "lock the screen and then automatically lock". If the user selects a locking recommendation strategy, setting the locking strategy of the microblog as the locking recommendation strategy; otherwise, the current locking strategy is continuously maintained.
In addition, the following information can be simultaneously presented in fig. 3: "automatically lock all applications after locking the screen for 3 minutes", which means that it is desirable to set the locking policies of all applications except for "microblog" as the locking recommendation policies. If the user selects the locking recommendation strategy, setting the locking strategies of all the application programs except the microblog as the locking recommendation strategy; otherwise, the current locking strategy is continuously maintained.
As can be seen from the above description, in the embodiment of the present invention, since the recommended locking policy for the target application can be determined and set again according to the unlocking operation information of the user, and the operation is simple and convenient, the scheme of the embodiment of the present invention avoids the defect of multiple steps in setting the locking policy in the prior art, thereby simplifying the setting process of the locking policy of the application, and improving the user experience. Meanwhile, the unlocking strategy of other application programs can be set as the locking recommendation strategy, and the setting of the locking strategy of other application programs by a user is simplified.
As shown in fig. 4, an apparatus for setting a locking policy according to a third embodiment of the present invention includes:
an information obtaining unit 41, configured to obtain information of an unlocking operation performed by a user on a target application in a terminal within a predetermined time period; a policy obtaining unit 42, configured to determine a recommended locking policy of the target application program when the unlocking operation information satisfies a trigger condition; a policy setting unit 43, configured to set the lock policy of the target application as the lock recommendation policy.
In a specific application, the information obtaining unit 41 is specifically configured to obtain the number of times of unlocking the target application program by the user within the predetermined time period; or acquiring the unlocking times of the screen of the terminal and the unlocking times of the target application program by the user in the preset time period.
Wherein, the policy obtaining unit 42 is specifically configured to,
and when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value or when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining a locking recommendation strategy, wherein the unlocking times of the target application program set in the locking recommendation strategy are smaller than the currently set unlocking times of the target application program.
Specifically, as shown in fig. 5, the policy obtaining unit 42 may include: a first obtaining module 421, configured to obtain a current locking policy of the target application, where a currently set number of times of unlocking the target application is stored in the current locking policy; a policy obtaining module 422, configured to determine, if the current unlocking policy is locking after exiting from the application program each time, that the recommended locking policy is locking after the terminal locks the screen or locking after a predetermined time interval after the terminal locks the screen when the number of times of unlocking the target application program within the predetermined time period is greater than or equal to a first threshold; if the current unlocking strategy is to lock after the terminal locks the screen, when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining that the recommended locking strategy is to lock after a preset time interval after the terminal locks the screen.
Wherein the first obtaining module 421 includes: the information acquisition submodule is used for acquiring the setting information of the target application program in the terminal; and the analysis submodule is used for analyzing the setting information and acquiring the current locking strategy of the target application program.
To further improve the user experience, as shown in fig. 6, the policy setting unit 43 includes:
a prompting module 431, configured to prompt the user with the lock recommendation policy; a setting module 432, configured to set the locking policy of the target application program as the locking recommendation policy after receiving a confirmation message of the user on the locking recommendation policy.
In addition, in order to facilitate the user to set the lock policy of other applications in the terminal, the policy setting unit 43 is further configured to set the lock policy of the application in the terminal as the lock recommendation policy. At this time, the prompting module 431 is further configured to prompt the user of the lock recommendation policy; the setting module 432 is further configured to set the locking policy applied in the terminal as the locking recommendation policy after receiving the confirmation message of the user on the locking recommendation policy.
The working principle of the device according to the embodiment of the present invention can refer to the description of the foregoing method embodiment. The device of the embodiment of the invention can be located in a terminal, such as a mobile phone, a tablet computer and the like.
As can be seen from the above description, in the embodiment of the present invention, since the recommended locking policy for the target application can be determined and set again according to the unlocking operation information of the user, and the operation is simple and convenient, the scheme of the embodiment of the present invention avoids the defect of multiple steps in setting the locking policy in the prior art, thereby simplifying the setting process of the locking policy of the application, and further improving the user experience.
In addition, as shown in fig. 7, a fourth embodiment of the present invention further provides an electronic device, including:
the device comprises a shell 71, a processor 72, a memory 73, a circuit board 74 and a power circuit 75, wherein the circuit board 74 is arranged in a space enclosed by the shell, and the processor 72 and the memory 73 are arranged on the circuit board 74; a power supply circuit 75 for supplying power to each circuit or device of the electronic apparatus; the memory 73 is used to store executable program code; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing the steps of:
acquiring unlocking operation information of a user on a target application program in a terminal within a preset time period;
when the unlocking operation information meets a trigger condition, determining a locking recommendation strategy of the target application program;
and setting the locking strategy of the target application program as the locking recommendation strategy.
For the specific execution process of the above steps by the processor 72 and the steps further executed by the processor 72 by running the executable program code, reference may be made to the description of the foregoing embodiments of the present invention, which is not described herein again.
According to the electronic device provided by the embodiment of the invention, when the unlocking operation information of the target application program in the terminal, which is acquired by the user in the preset time period, meets the trigger condition, the locking recommendation strategy is determined, and the locking strategy of the target application program is set as the locking recommendation strategy. Therefore, the recommendation strategy of the target application program for locking can be determined and set again according to the unlocking operation information of the user, and the operation is simple and convenient, so that the scheme of the embodiment of the invention avoids the defect of multiple steps of setting the locking strategy in the prior art, thereby simplifying the setting process of the locking strategy of the application program.
The electronic device exists in a variety of forms, including but not limited to:
(1) a mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such terminals include: smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) Ultra mobile personal computer device: the equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include: PDA (Personal Digital Assistant), MID (Mobile Internet Device), and UMPC (Ultra-Mobile Personal computer) devices, etc., such as iPad.
(3) A portable entertainment device: such devices can display and play multimedia content. This type of device comprises: audio, video players (e.g., ipods), handheld game consoles, electronic books, and smart toys and portable car navigation devices.
(4) A server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic devices with data interaction functions.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (11)

1. A method of setting a locking policy, comprising:
acquiring unlocking operation information of a user on a target application program in a terminal within a preset time period;
when the unlocking operation information meets a trigger condition, determining a locking recommendation strategy of the target application program;
setting the locking policy of the target application program as the locking recommendation policy;
the determining the lock recommendation policy of the target application includes:
acquiring a current locking strategy of the target application program, and storing currently set unlocking times of the target application program in the current locking strategy;
if the current unlocking strategy is locking after exiting the application program every time, when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value, determining that a locking recommended strategy is locking after the terminal screen is locked or locking after a preset time interval after the terminal screen is locked;
if the current unlocking strategy is to lock after the terminal locks the screen, when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining that the recommended locking strategy is to lock after a preset time interval after the terminal locks the screen.
2. The method of claim 1, wherein obtaining the information of the user's unlocking operation on the target application within the predetermined time period comprises:
acquiring the unlocking times of the target application program by the user in the preset time period; or,
and acquiring the unlocking times of the screen of the terminal and the unlocking times of the target application program of the user in the preset time period.
3. The method according to claim 1 or 2, wherein the determining the lock recommendation policy of the target application when the unlock operation information satisfies a trigger condition comprises:
when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value, determining a locking recommendation strategy; or when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are greater than or equal to a second threshold value, determining a locking recommendation strategy;
and the unlocking times of the target application program set in the lock recommendation strategy are less than the currently set unlocking times of the target application program.
4. The method of claim 1, wherein obtaining the current locking policy of the target application comprises:
acquiring the setting information of the target application program in the terminal;
and analyzing the setting information to acquire the current locking strategy of the target application program.
5. The method of claim 1, wherein setting the lock policy of the target application to the lock recommendation policy comprises:
prompting the user for the lock recommendation policy;
and after receiving the confirmation message of the user for the locking recommendation strategy, setting the locking strategy of the target application program as the locking recommendation strategy.
6. An apparatus for setting a locking policy, comprising:
the information acquisition unit is used for acquiring unlocking operation information of a user on a target application program in the terminal within a preset time period;
the policy acquisition unit is used for determining a locking recommendation policy of the target application program when the unlocking operation information meets a trigger condition;
the strategy setting unit is used for setting the locking strategy of the target application program as the locking recommendation strategy;
the policy acquisition unit includes:
the first acquisition module is used for acquiring the current locking strategy of the target application program, and the currently set unlocking times of the target application program are stored in the current locking strategy;
the policy obtaining module is configured to determine, if the current unlocking policy is locking after exiting from the application program every time, that the recommended locking policy is locking after the terminal locks the screen or locking after a predetermined time interval after the terminal locks the screen when the number of times of unlocking the target application program within the predetermined time period is greater than or equal to a first threshold; if the current unlocking strategy is to lock after the terminal locks the screen, when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining that the recommended locking strategy is to lock after a preset time interval after the terminal locks the screen.
7. The apparatus according to claim 6, wherein the information obtaining unit is specifically configured to obtain the number of times of unlocking the target application program by the user within the predetermined time period; or acquiring the unlocking times of the screen of the terminal and the unlocking times of the target application program by the user in the preset time period.
8. The apparatus according to claim 6 or 7, wherein the policy obtaining unit is specifically configured to,
and when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value or when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining a locking recommendation strategy, wherein the unlocking times of the target application program set in the locking recommendation strategy are smaller than the currently set unlocking times of the target application program.
9. The apparatus of claim 8, wherein the first obtaining module comprises:
the information acquisition submodule is used for acquiring the setting information of the target application program in the terminal;
and the analysis submodule is used for analyzing the setting information and acquiring the current locking strategy of the target application program.
10. The apparatus of claim 6, wherein the policy setting unit comprises:
the prompting module is used for prompting the locking recommendation strategy to the user;
and the setting module is used for setting the locking strategy of the target application program as the locking recommendation strategy after receiving the confirmation message of the user on the locking recommendation strategy.
11. An electronic device, comprising:
the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing the steps of:
acquiring unlocking operation information of a user on a target application program in a terminal within a preset time period;
when the unlocking operation information meets a trigger condition, determining a locking recommendation strategy of the target application program;
setting the locking policy of the target application program as the locking recommendation policy;
the determining the lock recommendation policy of the target application includes:
acquiring a current locking strategy of the target application program, and storing currently set unlocking times of the target application program in the current locking strategy;
if the current unlocking strategy is locking after exiting the application program every time, when the unlocking times of the target application program in the preset time period are larger than or equal to a first threshold value, determining that a locking recommended strategy is locking after the terminal screen is locked or locking after a preset time interval after the terminal screen is locked;
if the current unlocking strategy is to lock after the terminal locks the screen, when the unlocking times of the screen of the terminal and the unlocking times of the target application program in the preset time period are larger than or equal to a second threshold value, determining that the recommended locking strategy is to lock after a preset time interval after the terminal locks the screen.
CN201510571459.1A 2015-09-09 2015-09-09 Method and device for setting locking strategy and electronic equipment Expired - Fee Related CN105095743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510571459.1A CN105095743B (en) 2015-09-09 2015-09-09 Method and device for setting locking strategy and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510571459.1A CN105095743B (en) 2015-09-09 2015-09-09 Method and device for setting locking strategy and electronic equipment

Publications (2)

Publication Number Publication Date
CN105095743A CN105095743A (en) 2015-11-25
CN105095743B true CN105095743B (en) 2018-09-25

Family

ID=54576152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510571459.1A Expired - Fee Related CN105095743B (en) 2015-09-09 2015-09-09 Method and device for setting locking strategy and electronic equipment

Country Status (1)

Country Link
CN (1) CN105095743B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106293730A (en) * 2016-08-03 2017-01-04 珠海市魅族科技有限公司 A kind of determination method of screen locking time and terminal
CN106384029A (en) * 2016-09-22 2017-02-08 乐视控股(北京)有限公司 Terminal screen-locking setting processing method and apparatus
CN106529264B (en) * 2016-10-19 2019-05-21 Oppo广东移动通信有限公司 Using locking and unlocking method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392157A (en) * 2014-11-18 2015-03-04 深圳市腾讯计算机***有限公司 Method and device for locking screen by using passwords
CN104834846A (en) * 2015-05-22 2015-08-12 广东欧珀移动通信有限公司 Equipment unlocking method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201351285A (en) * 2012-06-07 2013-12-16 Askey Computer Corp Method for protecting firmware being updated

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392157A (en) * 2014-11-18 2015-03-04 深圳市腾讯计算机***有限公司 Method and device for locking screen by using passwords
CN104834846A (en) * 2015-05-22 2015-08-12 广东欧珀移动通信有限公司 Equipment unlocking method and device

Also Published As

Publication number Publication date
CN105095743A (en) 2015-11-25

Similar Documents

Publication Publication Date Title
US10515203B2 (en) Method and system for improving security of a mobile terminal
CN105447368B (en) A kind of control method and user terminal of user terminal access permission
CN105227321B (en) Information processing method, server and client
CN105701414A (en) Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment
CN105574437B (en) Method and device for protecting privacy information and electronic equipment
CN106815509B (en) Multimedia file protection method and device and electronic equipment
CN106681717B (en) Terminal application program management method and device and electronic equipment
CN107832595B (en) Locking method and related equipment
CN108038398B (en) Two-dimensional code analysis capability test method and device and electronic equipment
CN105471811A (en) Privacy space processing method and privacy space processing device
CN105095743B (en) Method and device for setting locking strategy and electronic equipment
CN106250182B (en) File processing method and device and electronic equipment
CN111159685A (en) User account management method and device, intelligent device and storage medium
CN103200320B (en) Unlocking method and unlocking device through whack-a-mole
CN107391987B (en) Application protection method and device based on biological feature recognition and electronic equipment
CN105512526B (en) The quick release method and device of terminal device
CN105491153A (en) Sharing method and device and mobile terminal
US20170164047A1 (en) Method and electronic device for restricting video playing
US20170195425A1 (en) Method and Electronic Device for Remotely Locking a Mobile Terminal
CN107347055B (en) User information processing method and device, storage medium and server
CN108737346B (en) Password verification method and device, server and communication system
CN106648656B (en) Message deleting method and device and electronic equipment
CN113099453A (en) Authentication method, device and equipment for access server and readable storage medium
CN106453947A (en) Rapid dialing method and device and electronic equipment
CN107463821B (en) Information processing method and related product

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180925