CN105893886A - System locking method and device - Google Patents
System locking method and device Download PDFInfo
- Publication number
- CN105893886A CN105893886A CN201610203794.0A CN201610203794A CN105893886A CN 105893886 A CN105893886 A CN 105893886A CN 201610203794 A CN201610203794 A CN 201610203794A CN 105893886 A CN105893886 A CN 105893886A
- Authority
- CN
- China
- Prior art keywords
- lock
- out state
- instruction
- foreground program
- currently
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides a system locking method and device, and relates to the field of man-machine interaction. The method comprises the following steps: monitoring whether a locking instruction is received or not; when the locking instruction is received, judging whether a foreground program which is run at the present time exists or not at present; if the foreground program which is run at the present time exists at present, entering a first locking state, wherein the first locking state comprises the steps of shielding all input instructions except an unlocking instruction, keeping a terminal screen at an opening state and keeping continual running of the foreground program. With the adoption of the system locking method and device, the flexibility and convenience of system locking operation can be improved.
Description
Technical field
The present invention relates to field of human-computer interaction, be specifically related to a kind of system lock method and device.
Background technology
Along with popularizing of intelligent terminal, a lot of users utilize screen locking software to protect the terminal privacy of oneself.
Intelligent terminal's screen locking is similar with computer screen lock, includes two ways, and one is turned off screen power supplies,
One is to utilize the quick, intelligent screen locking of software.The purpose of screen locking is to protect the computer of oneself or mobile phone hidden
Private, prevent maloperation, in the case of not closing a terminal, save electricity.
Existing screen locking mode, regardless of locking principle, the result of locking is typically to stop fortune
Row all programs, screen of closing a terminal, user can open screen access and unlock interface;And unlocking
Afterwards, user can enter system desktop, accesses all of application program, it can be seen that, existing
Motility and the convenience of screen locking mode are poor.
Summary of the invention
The present invention is to solve the motility of existing screen locking mode and the poor problem of convenience.
In view of this, the present invention provides a kind of system lock method, including:
Monitor whether to receive lock instruction;
When receiving lock instruction, it is judged that currently whether have the foreground program being currently running;
If currently there being the foreground program being currently running, then enter the first lock-out state, described first locking
State include shield except unlock instruction in addition to all input instruction, keep terminal screen be in opening,
Described foreground program is kept to continue to run with.
Preferably, also include:
If currently without the foreground program being currently running, then enter the second lock-out state, described second lock
Determine state and include close a terminal screen, shielding harness desktop.
The present invention also provides for another kind of system lock method, including:
Monitor whether to receive lock instruction;
When receiving lock instruction, to user feedback lock-out state option, lock-out state option includes
First lock-out state and the second lock-out state, and described first lock-out state and the second lock-out state
Locked content differs;
Monitor whether to receive the selected instruction that user provides;
When receiving the selected instruction that user provides, determine entrance the first lock according to described selected instruction
Determine state or the second lock-out state.
Preferably, described first lock-out state include shield except unlock instruction in addition to all input instruction,
Terminal screen is kept to be in opening, keep the foreground program being currently running to continue to run with.
Preferably, described second lock-out state includes close a terminal screen, shielding harness desktop, end
The foreground program being currently running.
Correspondingly, the present invention provides a kind of systems locking arrangement, including:
Monitoring means, is used for monitoring whether to receive lock instruction;
Whether judging unit, for when receiving lock instruction, it is judged that before being currently currently running
Platform program;
First lock cell, if for currently there being the foreground program being currently running, then enters the first locking
State, described first lock-out state includes all input instructions shielding in addition to unlocking instruction, keeps eventually
End screen is in opening, keeps described foreground program to continue to run with.
Preferably, also include:
Second lock cell, if for currently without the foreground program being currently running, then entering the second lock
Determining state, described second lock-out state includes close a terminal screen, shielding harness desktop.
The present invention also provides for another kind of systems locking arrangement, including:
First monitoring means, is used for monitoring whether to receive lock instruction;
Inquiry unit, for when receiving lock instruction, to user feedback lock-out state option, lock
Determine state options and include the first lock-out state and the second lock-out state, and described first lock-out state and
The locked content of the second lock-out state differs;
Second monitoring means, for monitoring whether to receive the selected instruction of user's offer;
Lock cell, for when receiving the selected instruction that user provides, according to described selected instruction
Determine entrance the first lock-out state or the second lock-out state.
Preferably, described first lock-out state include shield except unlock instruction in addition to all input instruction,
Terminal screen is kept to be in opening, keep the foreground program being currently running to continue to run with.
Preferably, described second lock-out state includes close a terminal screen, shielding harness desktop, end
The foreground program being currently running.
The first the system lock method and device provided according to the present invention, when monitoring lock instruction,
First determine whether currently whether have the foreground program being currently running, if currently there being the foreground program being currently running,
Then enter the first lock-out state, described first lock-out state include shield except unlock instruction in addition to all defeated
Enter instruction, keep terminal screen to be in opening, keep described foreground program to continue to run with, at this
Lock-out state foreground application can remain on, and user can normally show interior by viewing terminal screen
Hold and do not disturbed by maloperation, which thereby enhancing motility and the convenience of lock operation.
The second system lock method and device provided according to the present invention, when monitoring lock instruction,
To user feedback lock-out state option, lock-out state option includes the first lock-out state and the second locking shape
State, and content locked in two kinds of lock-out states differs, when receiving the choosing that user provides
When surely instructing, enter the one in two kinds of lock-out states according to the selection of user, which thereby enhance locking
The motility of operation and convenience.
Accompanying drawing explanation
In order to be illustrated more clearly that the specific embodiment of the invention or technical scheme of the prior art, under
The accompanying drawing used required in detailed description of the invention or description of the prior art will be briefly described by face,
It should be evident that the accompanying drawing in describing below is some embodiments of the present invention, general for this area
From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain according to these accompanying drawings
Obtain other accompanying drawing.
The flow chart of the system lock method that Fig. 1 provides for the embodiment of the present invention 1;
The flow chart of the system lock method that Fig. 2 provides for the embodiment of the present invention 2;
The structural representation of the systems locking arrangement that Fig. 3 provides for the embodiment of the present invention 3;
The structural representation of the systems locking arrangement that Fig. 4 provides for the embodiment of the present invention 4.
Detailed description of the invention
Below in conjunction with accompanying drawing, technical scheme is clearly and completely described, it is clear that
Described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on this
Embodiment in bright, those of ordinary skill in the art are obtained under not making creative work premise
Every other embodiment, broadly fall into the scope of protection of the invention.
As long as additionally, technical characteristic involved in invention described below difference embodiment that
The conflict of not constituting between this just can be combined with each other.
Embodiment 1
Present embodiments providing a kind of system lock method, the method can perform in intelligent terminal,
The method includes as shown in Figure 1:
S1, monitors whether to receive lock instruction, and lock instruction can be provided by user, the most permissible
The locking key utilizing terminal realizes, it is also possible to arrange virtual key in system desktop or main interface, when with
Lock instruction is there is in family when clicking on locking button.When receiving lock instruction, perform step S2,
Otherwise continue monitoring.
S2, it is judged that currently whether have the foreground program being currently running.The foreground of indication of the present invention and backstage
For being the desktop of relative visualized operation system, the program i.e. run at desktop is foreground program,
Foreground program run time user can perception, be all foreground program such as video player, browser etc..
And background program, it is that user can't see.It is known that existing operation system of smart phone all with
Time support foreground program run and background program run.Background program is also task level program, foreground journey
Sequence is also event handling level program.If currently having the foreground program being currently running, such as web browser
It is in opening, then performs step S3, otherwise perform step S4.
S3, enters the first lock-out state, and described first lock-out state includes shielding in addition to unlocking instruction
All input instructions, holding terminal screen are in opening, keep described foreground program to continue to run with.
The mode of masking instruction has multiple, such as, can intercept and capture instruction, it is also possible to disabling system input module etc.,
In this case, such as user touches the operation of screen, operation closing key, the behaviour of closedown screen power supplies
Make all to be shielded, only accept to unlock instruction, after receiving unblock instruction, then recover normal operating condition.Mesh
It is same mechanical key that the locking key of front most intelligent terminal conciliates locking key, and this programme can be existing
Terminal in perform, user can by same mechanical key send lock instruction and unlock instruct.
Certainly, owing to the lock-out state of this programme is different from existing lock-out state, so for the ease of user area
Point, it is also possible in existing terminal, set up the button of a lock instruction for sending this programme.
S4, enters the second lock-out state, and described second lock-out state includes close a terminal screen, shielding
System desktop, the second lock-out state is identical with existing lock-out state, i.e. this programme provides two kinds simultaneously
Lock-out state.
The system lock method provided according to embodiments of the present invention, when monitoring lock instruction, first
Judge currently whether have the foreground program being currently running, if currently having the foreground program being currently running, then
Entering the first lock-out state, described first lock-out state includes shielding all inputs in addition to unlocking instruction
Instruction, holding terminal screen are in opening, keep described foreground program to continue to run with, and lock at this
Determining state foreground application can remain on, user can normal viewing terminal screen display content
And do not disturbed by maloperation, which thereby enhance motility and the convenience of lock operation.
Embodiment 2
Present embodiments providing another kind of system lock method, the method can perform in intelligent terminal,
The method includes as shown in Figure 2:
S ' 1, monitors whether to receive lock instruction.Lock instruction can be provided by user, the most permissible
The locking key utilizing terminal realizes, it is also possible to arrange virtual key in system desktop or main interface, when with
Lock instruction is there is in family when clicking on locking button.The locking key of most intelligent terminal conciliates locking key
For same mechanical key, this programme can perform in existing terminal, and user can be by same
Individual mechanical key sends lock instruction and unlocks instruction.Certainly, owing to the lock-out state of this programme is with existing
There is lock-out state different, so distinguishing for the ease of user, it is also possible to set up one in existing terminal
The button of the individual lock instruction for sending this programme.
When receiving lock instruction, perform step S ' 2, otherwise to continue monitoring.
S ' 2, to user feedback lock-out state option, lock-out state option includes the first lock-out state and
Two lock-out states, and the locked content of described first lock-out state and the second lock-out state differs.
Such as can eject an options menu, wherein have two options.
S ' 3, monitors whether to receive the selected instruction that user provides, and i.e. waits that user selects a kind of locking
State;Perform when receiving the selected instruction that user provides step S ' 4, otherwise to continue monitoring.
S ' 4, determines entrance the first lock-out state or the second lock-out state according to described selected instruction.
The system lock method provided according to embodiments of the present invention, when monitoring lock instruction, Xiang Yong
Family feedback lock state options, lock-out state option includes the first lock-out state and the second lock-out state,
And content locked in two kinds of lock-out states differs, when receiving the selected finger that user provides
When making, enter the one in two kinds of lock-out states according to the selection of user, which thereby enhance lock operation
Motility and convenience.
As one preferred embodiment, described first lock-out state includes shielding in addition to unlocking instruction
All input instructions, keep terminal screen to be in opening, keep the foreground that is currently running
Program continues to run with.The mode of masking instruction has multiple, such as, can intercept and capture instruction, it is also possible to disabling
System input module etc., in this case, such as user touch screen operation, operation closing key,
The operation closing screen power supplies is all shielded, and only accepts to unlock instruction, then recovers after receiving unblock instruction
Normal operating condition.
Described second lock-out state includes closing a terminal screen, shielding harness desktop, end the most
The foreground program run, the second lock-out state can be identical with existing lock-out state.
Embodiment 3
The present embodiment provides a kind of systems locking arrangement, as it is shown on figure 3, this device includes:
Monitoring means 31, is used for monitoring whether to receive lock instruction;
Whether judging unit 32, for when receiving lock instruction, it is judged that currently have and to be currently running
Foreground program;
First lock cell 33, if for currently there being the foreground program being currently running, then enters the first lock
Determining state, described first lock-out state includes all input instructions shielding in addition to unlocking instruction, keeps
Terminal screen is in opening, keeps described foreground program to continue to run with.
The systems locking arrangement provided according to embodiments of the present invention, when monitoring lock instruction, first
Judge currently whether have the foreground program being currently running, if currently having the foreground program being currently running, then
Entering the first lock-out state, described first lock-out state includes shielding all inputs in addition to unlocking instruction
Instruction, holding terminal screen are in opening, keep described foreground program to continue to run with, and lock at this
Determining state foreground application can remain on, user can normal viewing terminal screen display content
And do not disturbed by maloperation, which thereby enhance motility and the convenience of lock operation.
As one preferred embodiment, this device also includes:
Second lock cell 34, if for currently without the foreground program being currently running, then entering second
Lock-out state, described second lock-out state includes close a terminal screen, shielding harness desktop.
Embodiment 4
The present invention provides another kind of systems locking arrangement, as it can be seen, this device includes:
First monitoring means 41, is used for monitoring whether to receive lock instruction;
Inquiry unit 42, for when receiving lock instruction, to user feedback lock-out state option,
Lock-out state option includes the first lock-out state and the second lock-out state, and described first lock-out state
Differ with the locked content of the second lock-out state;
Second monitoring means 43, for monitoring whether to receive the selected instruction of user's offer;
Lock cell 44, for when receiving the selected instruction that user provides, according to described selected finger
Order determines entrance the first lock-out state or the second lock-out state.
As one preferred embodiment, described first lock-out state includes shielding in addition to unlocking instruction
All input instructions, keep terminal screen to be in opening, keep the foreground that is currently running
Program continues to run with.
Described second lock-out state includes closing a terminal screen, shielding harness desktop, end the most
The foreground program run.
The systems locking arrangement provided according to embodiments of the present invention, when monitoring lock instruction, Xiang Yong
Family feedback lock state options, lock-out state option includes the first lock-out state and the second lock-out state,
And content locked in two kinds of lock-out states differs, when receiving the selected finger that user provides
When making, enter the one in two kinds of lock-out states according to the selection of user, which thereby enhance lock operation
Motility and convenience.
Obviously, above-described embodiment is only for clearly demonstrating example, and not to embodiment party
The restriction of formula.For those of ordinary skill in the field, the most also may be used
To make other changes in different forms.Here without also all of embodiment being given
With exhaustive.And the obvious change thus extended out or variation are still in the guarantor of the invention
Protect among scope.
Claims (10)
1. a system lock method, it is characterised in that including:
Monitor whether to receive lock instruction;
When receiving lock instruction, it is judged that currently whether have the foreground program being currently running;
If currently there being the foreground program being currently running, then enter the first lock-out state, described first lock
Determine state to include all input instructions shielding in addition to unlocking instruction, keep terminal screen to be in unlatching shape
State, described foreground program is kept to continue to run with.
Method the most according to claim 1, it is characterised in that also include:
If currently without the foreground program being currently running, then enter the second lock-out state, described second
Lock-out state includes close a terminal screen, shielding harness desktop.
3. a system lock method, it is characterised in that including:
Monitor whether to receive lock instruction;
When receiving lock instruction, to user feedback lock-out state option, lock-out state option bag
Include the first lock-out state and the second lock-out state, and described first lock-out state and the second lock-out state
Locked content differ;
Monitor whether to receive the selected instruction that user provides;
When receiving the selected instruction that user provides, determine entrance first according to described selected instruction
Lock-out state or the second lock-out state.
Method the most according to claim 3, it is characterised in that described first lock-out state bag
Include all inputs shielding in addition to unlocking instruction to instruct, keep terminal screen to be in opening, holding
The foreground program being currently running continues to run with.
Method the most according to claim 3, it is characterised in that described second lock-out state bag
Include screen of closing a terminal, shielding harness desktop, terminate the foreground program that is currently running.
6. a systems locking arrangement, it is characterised in that including:
Monitoring means, is used for monitoring whether to receive lock instruction;
Whether judging unit, for when receiving lock instruction, it is judged that currently have and to be currently running
Foreground program;
First lock cell, if for currently there being the foreground program being currently running, then enters the first lock
Determining state, described first lock-out state includes all input instructions shielding in addition to unlocking instruction, keeps
Terminal screen is in opening, keeps described foreground program to continue to run with.
Device the most according to claim 6, it is characterised in that also include:
Second lock cell, if for currently without the foreground program being currently running, then entering second
Lock-out state, described second lock-out state includes close a terminal screen, shielding harness desktop.
8. a systems locking arrangement, it is characterised in that including:
First monitoring means, is used for monitoring whether to receive lock instruction;
Inquiry unit, for when receiving lock instruction, to user feedback lock-out state option,
Lock-out state option includes the first lock-out state and the second lock-out state, and described first lock-out state
Differ with the locked content of the second lock-out state;
Second monitoring means, for monitoring whether to receive the selected instruction of user's offer;
Lock cell, for when receiving the selected instruction that user provides, according to described selected finger
Order determines entrance the first lock-out state or the second lock-out state.
Device the most according to claim 8, it is characterised in that described first lock-out state bag
Include all inputs shielding in addition to unlocking instruction to instruct, keep terminal screen to be in opening, holding
The foreground program being currently running continues to run with.
Device the most according to claim 8, it is characterised in that described second lock-out state bag
Include screen of closing a terminal, shielding harness desktop, terminate the foreground program that is currently running.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610203794.0A CN105893886A (en) | 2016-04-01 | 2016-04-01 | System locking method and device |
PCT/CN2016/102465 WO2017166789A1 (en) | 2016-04-01 | 2016-10-18 | System locking method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610203794.0A CN105893886A (en) | 2016-04-01 | 2016-04-01 | System locking method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105893886A true CN105893886A (en) | 2016-08-24 |
Family
ID=57012128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610203794.0A Pending CN105893886A (en) | 2016-04-01 | 2016-04-01 | System locking method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105893886A (en) |
WO (1) | WO2017166789A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682526A (en) * | 2016-12-14 | 2017-05-17 | 珠海格力电器股份有限公司 | Picture browsing limiting method and mobile terminal |
WO2017166789A1 (en) * | 2016-04-01 | 2017-10-05 | 乐视控股(北京)有限公司 | System locking method and apparatus |
CN113687925A (en) * | 2021-07-22 | 2021-11-23 | 成都鲁易科技有限公司 | Equipment operation processing method and device, storage medium and computer equipment |
CN114070659A (en) * | 2021-10-29 | 2022-02-18 | 深圳市优必选科技股份有限公司 | Equipment locking method and device and terminal equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102063241A (en) * | 2009-11-16 | 2011-05-18 | 英业达股份有限公司 | Handheld electronic device and unlocking method thereof |
JP2014075093A (en) * | 2012-10-05 | 2014-04-24 | Sharp Corp | Information processing terminal and program |
CN103793177A (en) * | 2014-02-28 | 2014-05-14 | 广州视源电子科技股份有限公司 | Interface processing method of touch screen device and touch screen device |
CN104142773A (en) * | 2013-05-06 | 2014-11-12 | 中兴通讯股份有限公司 | Terminal screen locking method and terminal |
CN105068867A (en) * | 2015-08-21 | 2015-11-18 | 广东欧珀移动通信有限公司 | Screen locking method and apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105893886A (en) * | 2016-04-01 | 2016-08-24 | 乐视控股(北京)有限公司 | System locking method and device |
-
2016
- 2016-04-01 CN CN201610203794.0A patent/CN105893886A/en active Pending
- 2016-10-18 WO PCT/CN2016/102465 patent/WO2017166789A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102063241A (en) * | 2009-11-16 | 2011-05-18 | 英业达股份有限公司 | Handheld electronic device and unlocking method thereof |
JP2014075093A (en) * | 2012-10-05 | 2014-04-24 | Sharp Corp | Information processing terminal and program |
CN104142773A (en) * | 2013-05-06 | 2014-11-12 | 中兴通讯股份有限公司 | Terminal screen locking method and terminal |
CN103793177A (en) * | 2014-02-28 | 2014-05-14 | 广州视源电子科技股份有限公司 | Interface processing method of touch screen device and touch screen device |
CN105068867A (en) * | 2015-08-21 | 2015-11-18 | 广东欧珀移动通信有限公司 | Screen locking method and apparatus |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017166789A1 (en) * | 2016-04-01 | 2017-10-05 | 乐视控股(北京)有限公司 | System locking method and apparatus |
CN106682526A (en) * | 2016-12-14 | 2017-05-17 | 珠海格力电器股份有限公司 | Picture browsing limiting method and mobile terminal |
CN113687925A (en) * | 2021-07-22 | 2021-11-23 | 成都鲁易科技有限公司 | Equipment operation processing method and device, storage medium and computer equipment |
CN113687925B (en) * | 2021-07-22 | 2023-09-29 | 成都鲁易科技有限公司 | Equipment operation processing method and device, storage medium and computer equipment |
CN114070659A (en) * | 2021-10-29 | 2022-02-18 | 深圳市优必选科技股份有限公司 | Equipment locking method and device and terminal equipment |
CN114070659B (en) * | 2021-10-29 | 2023-11-17 | 深圳市优必选科技股份有限公司 | Equipment locking method and device and terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2017166789A1 (en) | 2017-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103543936B (en) | A kind of touch screen terminal quick release enters the method and touch screen terminal of application | |
CN102981763B (en) | The method running application program under touch screen lock-out state | |
CN105893886A (en) | System locking method and device | |
CN105635483B (en) | A kind of processing method, device and storage medium operating mobile terminal | |
CN101882046A (en) | Touch screen unlocking method and system thereof and touch screen device | |
CN101587421A (en) | Unlock method and system of touch panel, and touch panel device | |
CN102981723B (en) | Unlocking method and unlocking device for mobile terminal and mobile terminal | |
CN103440445A (en) | Electronic equipment unlocking control method and system | |
CN101604223A (en) | A kind of unlock method of touch-screen, system and touch panel device | |
CN103064622A (en) | Screen unlocking method and device for mobile terminal | |
CN111966258B (en) | Permission setting method and device and electronic equipment | |
CN103605459A (en) | Fast application launching method and fast application launching terminal | |
KR100966073B1 (en) | Apparatus and method for managing terminal users | |
CN105094659A (en) | Method and terminal for operating applications based on gestures | |
CN102707888A (en) | Terminal control method and terminal | |
CN106250144A (en) | A kind of informing message display method and mobile terminal thereof | |
CN106295305A (en) | A kind of unlocking screen method and device of touch screen terminal | |
CN105278863A (en) | Time interval-based method for detecting and preventing misoperation, device and mobile terminal | |
CN102930196A (en) | Icon displaying method and communication terminal | |
CN106155489A (en) | The locking means of a kind of desktop application and device | |
CN104184874A (en) | Method for switching mobile phone modes based on multiple unlocking conditions, and mobile phone thereof | |
CN105892819A (en) | Method and device for locking application program | |
CN104035695A (en) | Information processing method and electronic device | |
CN106529264A (en) | Application locking and unlocking method and apparatus | |
CN105933506A (en) | Mobile terminal unlocking method, device, mobile terminal and earphone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160824 |
|
WD01 | Invention patent application deemed withdrawn after publication |