CN113468490B - Screen locking method, device and equipment of terminal equipment - Google Patents

Screen locking method, device and equipment of terminal equipment Download PDF

Info

Publication number
CN113468490B
CN113468490B CN202010238759.9A CN202010238759A CN113468490B CN 113468490 B CN113468490 B CN 113468490B CN 202010238759 A CN202010238759 A CN 202010238759A CN 113468490 B CN113468490 B CN 113468490B
Authority
CN
China
Prior art keywords
screen locking
application software
terminal equipment
operation event
automatic screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010238759.9A
Other languages
Chinese (zh)
Other versions
CN113468490A (en
Inventor
王明宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN202010238759.9A priority Critical patent/CN113468490B/en
Publication of CN113468490A publication Critical patent/CN113468490A/en
Application granted granted Critical
Publication of CN113468490B publication Critical patent/CN113468490B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a screen locking method of terminal equipment, which comprises the following steps: receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software; after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment; and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment. The method is adopted to solve the problem of high complexity of computer use caused by unauthorized use of the computer in the prior art.

Description

Screen locking method, device and equipment of terminal equipment
Technical Field
The application relates to the technical field of computers, in particular to a screen locking method and device of terminal equipment, electronic equipment and storage equipment; the application also relates to another screen locking method of the terminal equipment.
Background
In order to meet the requirement of information security, the terminal equipment needs to implement personal domain account login, and screen locking is needed when the terminal equipment is not used. However, in some special situations, such as displaying public information, the terminal device (e.g., a public computer) needs to be in a working state all the time, and the terminal device has a risk of unauthorized use when the screen is not locked, which easily causes the problem of information security leakage.
In the prior art, in order to prevent unauthorized use of the terminal device when displaying information, an additional locking device, such as a lockable safe, is generally used to store the terminal device, which results in an increase in complexity and use cost of the terminal device.
The prior art has the problem of high complexity of using the terminal equipment in order to prevent the terminal equipment from being used unauthorized.
Disclosure of Invention
The application provides a screen locking method and device of terminal equipment, electronic equipment and storage equipment, and aims to solve the problem that in the prior art, the complexity of using a computer is high in order to prevent the computer from being used unauthorized.
The application provides a screen locking method of terminal equipment, which comprises the following steps:
Receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment;
and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment.
Optionally, after the automatic screen locking application software is started, detecting an operation event for the terminal device includes:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
Optionally, the preset authorization operation duration includes:
Default authorized operation duration set by the automatic screen locking application software; or alternatively
And receiving preset authorized operation duration input by the user through the display screen.
Optionally, the detecting an operation event for the terminal device includes:
The operation event for the terminal device is circularly detected until the operation event for the terminal device is detected.
Optionally, the loop detecting an operation event for the terminal device includes:
after each detection of an operational event for the terminal device, the operational event for the terminal device is detected again after a delay of a preset time interval.
Optionally, the method further comprises:
and recording starting time information and/or screen locking time information of the automatic screen locking application software.
Optionally, the method further comprises:
And sending the starting time information and/or the screen locking time information of the automatic screen locking application software as target information to preset electronic equipment for receiving the target information.
Optionally, the operation event for the terminal device includes at least one of the following types:
an operational event for a keyboard;
Aiming at the operation event of the mouse;
an operation event for the touch screen;
An operation event for the remote controller;
Remote operation event for application software installed on a terminal device.
The application also provides a screen locking device of the terminal equipment, which comprises:
the automatic screen locking application software starting unit is used for receiving triggering operation aiming at starting the automatic screen locking application software, and the automatic screen locking application software is started;
The operation event detection unit is used for detecting an operation event aiming at the terminal equipment after the automatic screen locking application software is started;
And the screen locking operation unit is used for carrying out screen locking operation on the terminal equipment when detecting an operation event aiming at the terminal equipment.
Optionally, the operation event detection unit is specifically configured to:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
Optionally, the preset authorization operation duration includes:
Default authorized operation duration set by the automatic screen locking application software; or alternatively
And receiving preset authorized operation duration input by the user through the display screen.
Optionally, the operation event detection unit is specifically configured to:
The operation event for the terminal device is circularly detected until the operation event for the terminal device is detected.
Optionally, the operation event detection unit is specifically configured to:
after each detection of an operational event for the terminal device, the operational event for the terminal device is detected again after a delay of a preset time interval.
Optionally, the screen locking device of the terminal device may further include:
the time information recording unit is used for recording the starting time information and/or the screen locking time information of the automatic screen locking application software.
Optionally, the screen locking device of the terminal device may further include:
And the target information sending unit is used for sending the starting time information and/or the screen locking time information of the automatic screen locking application software as target information to preset electronic equipment for receiving the target information.
Optionally, the operation event for the terminal device includes at least one of the following types:
an operational event for a keyboard;
Aiming at the operation event of the mouse;
an operation event for the touch screen;
An operation event for the remote controller;
Remote operation event for application software installed on a terminal device.
The present application also provides an electronic device including:
A processor; and
And the memory is used for storing a program of a screen locking method of the terminal equipment, and after the equipment is electrified and the program of the screen locking method of the terminal equipment is run through the processor, the following steps are executed:
Receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment;
and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment.
Optionally, after the automatic screen locking application software is started, detecting an operation event for the terminal device includes:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
Optionally, the preset authorization operation duration includes:
Default authorized operation duration set by the automatic screen locking application software; or alternatively
And receiving preset authorized operation duration input by the user through the display screen.
Optionally, the detecting an operation event for the terminal device includes:
The operation event for the terminal device is circularly detected until the operation event for the terminal device is detected.
Optionally, the loop detecting an operation event for the terminal device includes:
after each detection of an operational event for the terminal device, the operational event for the terminal device is detected again after a delay of a preset time interval.
Optionally, the electronic device further performs the following steps:
and recording starting time information and/or screen locking time information of the automatic screen locking application software.
Optionally, the electronic device further performs the following steps:
And sending the starting time information and/or the screen locking time information of the automatic screen locking application software as target information to preset electronic equipment for receiving the target information.
Optionally, the operation event for the terminal device includes at least one of the following types:
an operational event for a keyboard;
Aiming at the operation event of the mouse;
an operation event for the touch screen;
An operation event for the remote controller;
Remote operation event for application software installed on a terminal device.
The application also provides a storage device, which stores a program of the screen locking method of the terminal device, the program is run by a processor, and the following steps are executed:
Receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment;
and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment.
The application also provides a screen locking method of the terminal equipment, which comprises the following steps:
connecting terminal equipment with large screen equipment;
Starting automatic screen locking application software at the terminal equipment;
the data information displayed on the terminal equipment is put on the large screen equipment;
detecting an operation event aiming at the terminal equipment after the time length after the automatic screen locking application software is started reaches the preset authorized operation time length;
and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment.
Compared with the prior art, the application has the following advantages:
The application provides a screen locking method of terminal equipment, which is used for receiving triggering operation aiming at starting automatic screen locking application software, and starting the automatic screen locking application software; after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment; and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment. The screen locking method of the terminal equipment provided by the application ensures that the terminal equipment automatically locks the screen in a software mode when the terminal equipment is subjected to unauthorized use (an operation event aiming at the terminal equipment exists), and the risk of the terminal equipment for avoiding unauthorized use can be achieved without using extra hardware, thereby reducing the complexity of the terminal equipment, reducing the hardware cost and preventing the problem of information leakage.
Drawings
Fig. 1 is a flowchart of a screen locking method of a terminal device according to a first embodiment of the present application.
Fig. 2 is a flowchart of a preferred implementation of a screen locking method of a terminal device according to the first embodiment of the present application.
Fig. 3 is a schematic diagram of a screen locking device of a terminal device according to a second embodiment of the present application.
Fig. 4 is a schematic diagram of an electronic device according to a third embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. The present invention may be embodied in many other forms than those herein described, and those skilled in the art will readily appreciate that the present invention may be similarly embodied without departing from the spirit or essential characteristics thereof, and therefore the present invention is not limited to the specific embodiments disclosed below.
A first embodiment of the present application provides a screen locking method of a terminal device, which is described below with reference to fig. 1.
As shown in fig. 1, in step S101, a trigger operation for starting the auto-lock application software is received, and the auto-lock application software is started.
The terminal device may refer to various electronic devices including smart phones, tablet computers, laptop portable computers, desktop computers, and the like. The terminal device generally stores some secret information, and when unauthorized operation occurs, information leakage can be prevented by performing screen locking operation on the terminal device.
The automatic screen locking application software refers to a program for detecting an operation event of the terminal equipment and performing screen locking operation on the terminal equipment when the operation event is detected. The automatic screen locking application software can be realized by using python language, and also can be realized by using languages such as go, java and the like.
The receiving is aimed at starting the triggering operation of the automatic screen locking application software, the automatic screen locking application software is started, and the receiving user can be pointed to starting the triggering operation of the automatic screen locking application software, and the automatic screen locking application software is started. The triggering operation of the user for starting the automatic screen locking application software can be the operation of clicking a mouse on the icon of the automatic screen locking application software on the display screen by the user; the operation of starting the automatic screen locking application software by the user through a keyboard input command mode can be also performed, and the triggering operation aiming at starting the automatic screen locking application software can be performed.
For example, when the terminal device needs to be screen-locked by using the automatic screen-locking application software, the user can click an icon of the automatic screen-locking application software displayed on the terminal device by using a mouse, and the automatic screen-locking application software receives a trigger operation for starting the automatic screen-locking application software, and the automatic screen-locking application software is started.
As shown in fig. 1, in step S102, after the auto-lock application software is started, an operation event for the terminal device is detected.
The operation event for the terminal device may include any one or more of the following operation events:
an operational event for a keyboard;
Aiming at the operation event of the mouse;
an operation event for the touch screen;
An operation event for the remote controller;
Remote operation event for application software installed on a terminal device.
An operational event for a keyboard refers to any operational event for a keyboard, i.e., a triggering event for any one of the keys on the keyboard. The operation events for the mouse may include operation events of clicking left and right buttons of the mouse.
The remote operation event for the application software installed on the terminal device refers to an operation event for the application software installed on the terminal device on a device other than the terminal device through a network. For example, the terminal device is a tablet computer a, the devices other than the terminal device are tablet computers B, a user accesses the tablet computer a on the tablet computer B remotely, and starts a certain application software installed on the tablet computer a, so that an event of starting a certain application software installed on the tablet computer a on the tablet computer B remotely can be regarded as a remote operation event aiming at the application software installed on the terminal device. An event of remotely closing a certain application software installed on the tablet computer a on the tablet computer B may also be regarded as a remote operation event for the application software installed on the terminal device. In addition to the remote operation event for the application software installed on the terminal device, the remote operation event for the stored document on the terminal device may be also, for example, a copy event for the stored document on the terminal device or the like.
After the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment, and when the operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment, thereby preventing unauthorized use and avoiding information leakage.
As an implementation manner, after the automatic screen locking application software is started, a certain free operation time can be reserved for the user, and when the free operation time arrives, an operation event aiming at the terminal device is detected. The detecting an operation event for the terminal device includes:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
The preset authorization operation duration comprises the following steps:
Default authorized operation duration set by the automatic screen locking application software; or alternatively
And receiving preset authorized operation duration input by the user through the display screen.
When the automatic screen locking application software is started, an interface can be provided for a user to set the authorized operation duration, and when the duration after the automatic screen locking application software is started reaches the preset authorized operation duration (the duration for the user to freely operate the terminal equipment), the operation event aiming at the terminal equipment is detected; the auto-lock screen application may also set a default duration of authorized operations.
As an embodiment, the detecting an operation event for a terminal device includes:
The operation event for the terminal device is circularly detected until the operation event for the terminal device is detected.
In order to avoid that frequent detection tasks consume excessive CPU resources, a delay of a certain time is set after each detection of an operation event for the terminal device and when the operation event for the terminal device is not detected, and then the next detection is performed.
The loop detection for an operation event for a terminal device includes:
after each detection of an operational event for the terminal device, the operational event for the terminal device is detected again after a delay of a preset time interval.
For example, if the preset time interval is set to 2s, the operation event for the terminal device is detected again after the delay of the preset time interval after each detection of the operation event for the terminal device.
As shown in fig. 1, in step S103, when an operation event for a terminal device is detected, a screen locking operation is performed on the terminal device.
When the automatic screen locking application software detects an operation event aiming at the terminal equipment, the screen locking operation is carried out on the terminal equipment, so that the unauthorized use of the terminal equipment is effectively prevented, and the leakage of secret information is prevented.
After the automatic screen locking application software performs screen locking operation on the terminal equipment, the terminal equipment displays a screen locking interface, and the terminal equipment can be unlocked only when the authorized user inputs a password, so that information leakage is prevented.
Fig. 2 is a flowchart of a preferred implementation of a screen locking method of a terminal device according to a first embodiment of the present application.
As shown in fig. 2, in step S201, a trigger operation for starting the auto-lock application software is received, and the auto-lock application software is started.
As shown in fig. 2, in step S202, it is determined whether the duration after the start time of starting the auto-lock application software reaches the preset authorized operation duration, if so, step S203 is executed.
As shown in fig. 2, in step S203, the auto-lock application software starts detection, detecting an operation event for the terminal device.
As shown in fig. 2, in step S204, if an operation event for the terminal device is not detected, a predetermined time interval is delayed, and step S203 is performed.
As shown in fig. 2, in step S205, when an operation event for a terminal device is detected, a screen locking operation is performed on the terminal device.
As an implementation manner, the first embodiment of the present application may further include:
and recording starting time information and/or screen locking time information of the automatic screen locking application software.
As an implementation manner, in order to perform problem tracking, the second embodiment of the present application may further include:
And sending the starting time information and/or the screen locking time information of the automatic screen locking application software as target information to preset electronic equipment for receiving the target information.
In the implementation, the starting time information and/or the screen locking time information of the automatic screen locking application software can be used as target information to be sent to preset electronic equipment for receiving the target information through a third-party platform.
Specifically, the automatic screen locking application software sends the identification information of the electronic device for receiving the target information and the recorded starting time information and/or screen locking time information of the automatic screen locking application software to the third party platform, and then the third party platform sends the starting time information and/or screen locking time information of the automatic screen locking application software as the target information to the electronic device for receiving the target information.
Application scenarios of the screen locking method of the terminal device are described below.
Scene 1, when a user needs to use a notebook computer to display propaganda sheets of company products to audience in an exhibition, the user opens the propaganda sheets after starting the notebook computer; when the automatic screen locking application software installed on the desktop is clicked, and when the automatic screen locking application software is started, the operation event aiming at the terminal equipment is detected only when the time length after the automatic screen locking application software is started reaches the preset authorized operation time length (the preset authorized operation time length is the authorized operation time length which is set by the automatic screen locking application software by default, for example, 1 minute), and a user can connect the notebook computer with a projector or other large-screen equipment in the time of the authorized operation time length, and play propaganda sheets on the notebook computer through the projector or other large-screen equipment; and if a person clicks a key of a keyboard or a mouse, the automatic screen locking application software can detect an operation event aiming at the terminal equipment, screen locking operation is carried out on the terminal equipment, the notebook computer can be unlocked only by inputting a valid password by an authorized user after screen locking, the use right of the computer is obtained again, and leakage of private information is prevented.
Scene 2, when a user needs to use a notebook computer to display propaganda sheets of company products to spectators in an exhibition, after the user starts the notebook computer, opening the propaganda sheets, clicking automatic screen locking application software installed on a desktop, when the automatic screen locking application software is started, providing an operation interface for the user, setting authorization operation duration for the user, and when the duration after the automatic screen locking application software is started reaches the preset authorization operation duration (the duration for the user to freely operate terminal equipment), starting to detect operation events aiming at the terminal equipment, wherein the user can connect the notebook computer with a projector or other large-screen equipment in the duration of the authorization operation duration, and play the propaganda sheets on the notebook computer through the projector or other large-screen equipment; and if a person clicks a key of a keyboard or a mouse, the automatic screen locking application software can detect an operation event aiming at the terminal equipment, screen locking operation is carried out on the terminal equipment, the notebook computer can be unlocked only by inputting a valid password by an authorized user after screen locking, the use right of the computer is obtained again, and leakage of private information is prevented.
And 3, when the user A shows a video section to a colleague by using a notebook computer in a company, if the user A needs to leave for 20 minutes temporarily, the user A clicks an automatic screen locking application software installed on a desktop, the automatic screen locking application software is started, an operation event aiming at the notebook computer is detected after the automatic screen locking application software is started, and when the operation event aiming at the notebook computer is detected, the notebook computer can be unlocked only by an authorized user after screen locking, the use right of the computer is obtained again, and the leakage of private information is prevented.
The introduction of the screen locking method of the terminal equipment provided by the first embodiment of the application is completed, and the screen locking method of the terminal equipment provided by the first embodiment of the application ensures that the terminal equipment automatically locks the screen in a software mode when the terminal equipment is subjected to unauthorized use (an operation event aiming at the terminal equipment exists), the risk of the terminal equipment for unauthorized use can be avoided without using extra hardware, the complexity of the terminal equipment is reduced, the hardware cost is reduced, and the problem of information security leakage is prevented.
Corresponding to the screen locking method of the terminal equipment provided by the first embodiment of the application, the second embodiment of the application also provides a screen locking method device of the terminal equipment.
As shown in fig. 3, the screen locking device of the terminal device includes:
An automatic screen locking application software starting unit 301, configured to receive a triggering operation for starting the automatic screen locking application software, where the automatic screen locking application software starts;
An operation event detection unit 302, configured to detect an operation event for a terminal device after the automatic screen locking application software is started;
and a screen locking operation unit 303, configured to perform a screen locking operation on the terminal device when an operation event for the terminal device is detected.
As an embodiment, the operation event detection unit is specifically configured to:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
As an embodiment, the preset authorization operation duration includes:
Default authorized operation duration set by the automatic screen locking application software; or alternatively
And receiving preset authorized operation duration input by the user through the display screen.
As an embodiment, the operation event detection unit is specifically configured to:
The operation event for the terminal device is circularly detected until the operation event for the terminal device is detected.
As an embodiment, the operation event detection unit is specifically configured to:
after each detection of an operational event for the terminal device, the operational event for the terminal device is detected again after a delay of a preset time interval.
As an implementation manner, the screen locking device of the terminal device may further include:
the time information recording unit is used for recording the starting time information and/or the screen locking time information of the automatic screen locking application software.
As an implementation manner, the screen locking device of the terminal device may further include:
And the target information sending unit is used for sending the starting time information and/or the screen locking time information of the automatic screen locking application software as target information to preset electronic equipment for receiving the target information.
As an embodiment, the operation event for the terminal device includes at least one of the following types:
an operational event for a keyboard;
Aiming at the operation event of the mouse;
an operation event for the touch screen;
An operation event for the remote controller;
Remote operation event for application software installed on a terminal device.
It should be noted that, for the detailed description of the screen locking device of the terminal device provided in the second embodiment of the present application, reference may be made to the description related to the first embodiment of the present application, which is not repeated here.
Corresponding to the screen locking method of the terminal equipment provided by the first embodiment of the application, the third embodiment of the application also provides electronic equipment.
As shown in fig. 4, the electronic device includes:
A processor 401; and
A memory 402, configured to store a program of a screen locking method of a terminal device, and after the device is powered on and the program of the screen locking method of the terminal device is executed by the processor, perform the following steps:
Receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment;
and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment.
As an implementation manner, after the automatic screen locking application software is started, detecting an operation event for the terminal device includes:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
As an embodiment, the preset authorization operation duration includes:
Default authorized operation duration set by the automatic screen locking application software; or alternatively
And receiving preset authorized operation duration input by the user through the display screen.
As an embodiment, the detecting an operation event for a terminal device includes:
The operation event for the terminal device is circularly detected until the operation event for the terminal device is detected.
As an embodiment, the loop detection for an operation event for a terminal device includes:
after each detection of an operational event for the terminal device, the operational event for the terminal device is detected again after a delay of a preset time interval.
As an embodiment, the electronic device further performs the steps of:
and recording starting time information and/or screen locking time information of the automatic screen locking application software.
As an embodiment, the electronic device further performs the steps of:
And sending the starting time information and/or the screen locking time information of the automatic screen locking application software as target information to preset electronic equipment for receiving the target information.
As an embodiment, the operation event for the terminal device includes at least one of the following types:
an operational event for a keyboard;
Aiming at the operation event of the mouse;
an operation event for the touch screen;
An operation event for the remote controller;
Remote operation event for application software installed on a terminal device.
It should be noted that, for the detailed description of the electronic device provided in the third embodiment of the present application, reference may be made to the description related to the first embodiment of the present application, which is not repeated here.
Corresponding to the screen locking method of the terminal device provided in the first embodiment of the present application, the fourth embodiment of the present application further provides a storage device, where a program of the screen locking method of the terminal device is stored, and the program is executed by a processor, and performs the following steps:
Receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment;
and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment.
It should be noted that, for the detailed description of the storage device provided in the fourth embodiment of the present application, reference may be made to the description related to the first embodiment of the present application, which is not repeated here.
Corresponding to the screen locking method of the terminal device provided by the first embodiment of the present application, a fifth embodiment of the present application further provides a screen locking method of a terminal device, including:
connecting terminal equipment with large screen equipment;
Starting automatic screen locking application software at the terminal equipment;
the data information displayed on the terminal equipment is put on the large screen equipment;
detecting an operation event aiming at the terminal equipment after the time length after the automatic screen locking application software is started reaches the preset authorized operation time length;
and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment.
For example, when a user needs to use a notebook computer to show a trailer of a company product to a viewer at an exhibition, the user opens the trailer after starting the notebook computer; when the automatic screen locking application software installed on the desktop is clicked, and when the automatic screen locking application software is started, the operation event aiming at the terminal equipment is detected only when the time length after the automatic screen locking application software is started reaches the preset authorized operation time length (the preset authorized operation time length is the authorized operation time length which is set by the automatic screen locking application software by default, for example, 1 minute), and a user can connect the notebook computer with a projector or other large-screen equipment in the time of the authorized operation time length, and play propaganda sheets on the notebook computer through the projector or other large-screen equipment; and if a person clicks a key of a keyboard or a mouse, the automatic screen locking application software can detect an operation event aiming at the terminal equipment, screen locking operation is carried out on the terminal equipment, the notebook computer can be unlocked only by inputting a valid password by an authorized user after screen locking, the use right of the computer is obtained again, and leakage of private information is prevented.
While the application has been described in terms of preferred embodiments, it is not intended to be limiting, but rather, it will be apparent to those skilled in the art that various changes and modifications can be made herein without departing from the spirit and scope of the application as defined by the appended claims.
In one typical configuration, a computing device includes one or more processors (CPUs), memory-mapped input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer readable media, as defined herein, does not include non-transitory computer readable media (transmission media), such as modulated data signals and carrier waves.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.

Claims (11)

1. A screen locking method of a terminal device, comprising:
Receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment;
When an operation event aiming at terminal equipment is detected, performing screen locking operation on the terminal equipment;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment comprises the following steps:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
2. The method of claim 1, wherein the predetermined duration of the authorization operation comprises:
Default authorized operation duration set by the automatic screen locking application software; or alternatively
And receiving preset authorized operation duration input by the user through the display screen.
3. The method according to claim 1, wherein the detecting an operation event for a terminal device comprises:
The operation event for the terminal device is circularly detected until the operation event for the terminal device is detected.
4. A method according to claim 3, characterized in that the loop detection of an operation event for a terminal device comprises:
after each detection of an operational event for the terminal device, the operational event for the terminal device is detected again after a delay of a preset time interval.
5. The method as recited in claim 1, further comprising:
and recording starting time information and/or screen locking time information of the automatic screen locking application software.
6. The method as recited in claim 5, further comprising:
And sending the starting time information and/or the screen locking time information of the automatic screen locking application software as target information to preset electronic equipment for receiving the target information.
7. The method according to claim 1, characterized in that the operation event for the terminal device comprises at least one of the following types:
an operational event for a keyboard;
Aiming at the operation event of the mouse;
an operation event for the touch screen;
An operation event for the remote controller;
Remote operation event for application software installed on a terminal device.
8. A screen locking device of a terminal device, comprising:
the automatic screen locking application software starting unit is used for receiving triggering operation aiming at starting the automatic screen locking application software, and the automatic screen locking application software is started;
The operation event detection unit is used for detecting an operation event aiming at the terminal equipment after the automatic screen locking application software is started;
the screen locking operation unit is used for carrying out screen locking operation on the terminal equipment when an operation event aiming at the terminal equipment is detected;
the operation event detection unit is specifically configured to:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
9. An electronic device, comprising:
A processor; and
And the memory is used for storing a program of a screen locking method of the terminal equipment, and after the equipment is electrified and the program of the screen locking method of the terminal equipment is run through the processor, the following steps are executed:
Receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment;
When an operation event aiming at terminal equipment is detected, performing screen locking operation on the terminal equipment;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment comprises the following steps:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
10. A memory device, characterized in that,
A program of a screen locking method of a terminal device, the program being executed by a processor, the program executing the steps of:
Receiving triggering operation aiming at starting the automatic screen locking application software, and starting the automatic screen locking application software;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment;
When an operation event aiming at terminal equipment is detected, performing screen locking operation on the terminal equipment;
after the automatic screen locking application software is started, detecting an operation event aiming at the terminal equipment comprises the following steps:
When the duration after the starting time of starting the automatic screen locking application software reaches the preset authorized operation duration, the automatic screen locking application software detects an operation event aiming at the terminal equipment.
11. A screen locking method of a terminal device, comprising:
connecting terminal equipment with large screen equipment;
Starting automatic screen locking application software at the terminal equipment;
the data information displayed on the terminal equipment is put on the large screen equipment;
detecting an operation event aiming at the terminal equipment after the time length after the automatic screen locking application software is started reaches the preset authorized operation time length;
and when an operation event aiming at the terminal equipment is detected, performing screen locking operation on the terminal equipment.
CN202010238759.9A 2020-03-30 2020-03-30 Screen locking method, device and equipment of terminal equipment Active CN113468490B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010238759.9A CN113468490B (en) 2020-03-30 2020-03-30 Screen locking method, device and equipment of terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010238759.9A CN113468490B (en) 2020-03-30 2020-03-30 Screen locking method, device and equipment of terminal equipment

Publications (2)

Publication Number Publication Date
CN113468490A CN113468490A (en) 2021-10-01
CN113468490B true CN113468490B (en) 2024-05-03

Family

ID=77866186

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010238759.9A Active CN113468490B (en) 2020-03-30 2020-03-30 Screen locking method, device and equipment of terminal equipment

Country Status (1)

Country Link
CN (1) CN113468490B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500306A (en) * 2011-06-03 2014-01-08 北京奇虎科技有限公司 Client terminal program monitoring method and device and client terminal
CN105844182A (en) * 2016-03-16 2016-08-10 合肥联宝信息技术有限公司 Screen locking method and device of notebook computer and the notebook computer
CN106384041A (en) * 2016-08-24 2017-02-08 苏州佳世达电通有限公司 Mobile terminal screen lock method and mobile terminal
CN106611113A (en) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 Security environment construction method and apparatus
WO2017166872A1 (en) * 2016-04-01 2017-10-05 乐视控股(北京)有限公司 Method and apparatus for locking screen of mobile terminal, and electronic device
CN107885534A (en) * 2017-10-23 2018-04-06 深圳市金立通信设备有限公司 A kind of screen locking method, terminal and computer-readable medium
CN108319828A (en) * 2018-02-07 2018-07-24 北京小米移动软件有限公司 Screen locking management method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101828306B1 (en) * 2011-10-18 2018-02-13 삼성전자 주식회사 Method and apparatus for operating mobile terminal
CN105338177B (en) * 2015-09-30 2018-10-19 小米科技有限责任公司 message delay broadcasting method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500306A (en) * 2011-06-03 2014-01-08 北京奇虎科技有限公司 Client terminal program monitoring method and device and client terminal
CN106611113A (en) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 Security environment construction method and apparatus
CN105844182A (en) * 2016-03-16 2016-08-10 合肥联宝信息技术有限公司 Screen locking method and device of notebook computer and the notebook computer
WO2017166872A1 (en) * 2016-04-01 2017-10-05 乐视控股(北京)有限公司 Method and apparatus for locking screen of mobile terminal, and electronic device
CN106384041A (en) * 2016-08-24 2017-02-08 苏州佳世达电通有限公司 Mobile terminal screen lock method and mobile terminal
CN107885534A (en) * 2017-10-23 2018-04-06 深圳市金立通信设备有限公司 A kind of screen locking method, terminal and computer-readable medium
CN108319828A (en) * 2018-02-07 2018-07-24 北京小米移动软件有限公司 Screen locking management method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Android***下人机交互解锁屏功能的应用研究;贺建英;袁小艳;唐青松;;电子设计工程(13);全文 *
一种计算机软件锁屏技术;陈绍钧;高峥;;新乡学院学报(自然科学版)(03);全文 *

Also Published As

Publication number Publication date
CN113468490A (en) 2021-10-01

Similar Documents

Publication Publication Date Title
CN101529366B (en) Identification and visualization of trusted user interface objects
US9780947B1 (en) Computer programs, secret management methods and systems
WO2019095563A1 (en) Screen watermark display method and apparatus, computer device, and storage medium
US8194088B1 (en) Selective composite rendering
US20070277127A1 (en) Screensaver for individual application programs
US9621637B2 (en) Method, device and mobile terminal for controlling interface display
US8171546B2 (en) Keyboard security status check module and method
EP3472784B1 (en) Payment information processing method, apparatus, and user device
WO2020168899A1 (en) Method and device for exhibition of short video on lock screen of user device
US9275206B2 (en) Managing sensitive information
CN110727941A (en) Private data protection method and device, terminal equipment and storage medium
US7975309B2 (en) Systems and methods for securing data in an electronic apparatus
CN106293317B (en) Method and device for hiding message record and electronic equipment
US20240232417A1 (en) Object Movement Method, Apparatus and Electronic Device
US20090144649A1 (en) Systems, apparatus and methods for a messaging system
CN113468490B (en) Screen locking method, device and equipment of terminal equipment
US20160232373A1 (en) Method and apparatus for providing security information of user device
US9727748B1 (en) Apparatus, method, and computer program for providing document security
KR102149711B1 (en) An apparatus for detecting and preventing ransom-ware behavior using camouflage process, a method thereof and computer recordable medium storing program to perform the method
Ji et al. Mobile device management system with portable devices
US20180314815A1 (en) Hand-held electronic device with locking interface
CN112434327B (en) Information protection method and device and electronic equipment
WO2015043444A1 (en) Secure mode prompt method and mobile device for realizing the method
JP5816596B2 (en) Display control apparatus and display control method thereof
CN111813475A (en) Dynamic information display method based on negative one-screen combination with face recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40063927

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant