WO2019033947A1 - Procédé, appareil et dispositif d'affichage d'interface, et support de stockage - Google Patents
Procédé, appareil et dispositif d'affichage d'interface, et support de stockage Download PDFInfo
- Publication number
- WO2019033947A1 WO2019033947A1 PCT/CN2018/098971 CN2018098971W WO2019033947A1 WO 2019033947 A1 WO2019033947 A1 WO 2019033947A1 CN 2018098971 W CN2018098971 W CN 2018098971W WO 2019033947 A1 WO2019033947 A1 WO 2019033947A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- interface
- login
- terminal device
- target button
- information
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
Definitions
- the present application relates to the field of computer technology, and in particular, to an interface display method, an interface display device, a terminal device, a storage medium, and an operating system for a terminal device.
- terminal devices With the advancement of terminal technologies, more and more users use terminal devices to perform various operations required. For example, users can watch video works, search information, play games, etc. by using terminal devices, and students can also use learning software on terminal devices. To learn, users can also work through terminal equipment.
- the technical problem to be solved by the embodiments of the present application is to provide an interface display method to improve data security.
- the embodiment of the present application further provides an interface display device, a terminal device, a storage medium, and an operating system, to ensure implementation and application of the foregoing method.
- the embodiment of the present application discloses an interface display method, including: displaying a login interface in full screen and disabling a target button, wherein the target button is used to exit the login interface; and the login information is obtained from the login interface. After confirming the verification according to the login information, the system interface is displayed.
- the embodiment of the present application further discloses an interface display device, including: a full screen disable module, configured to display a login interface in full screen and disable a target button, wherein the target button is used to exit the login interface; and the login module is used to The login interface obtains the login information, and the display module is configured to display the system interface after the verification is confirmed according to the login information.
- a full screen disable module configured to display a login interface in full screen and disable a target button, wherein the target button is used to exit the login interface
- the login module is used to The login interface obtains the login information
- the display module is configured to display the system interface after the verification is confirmed according to the login information.
- the embodiment of the present application further discloses a terminal device, including: one or more processors; and one or more machine-readable media having instructions stored thereon, when executed by the one or more processors, The terminal device is caused to perform the method as described in one or more of the embodiments of the present application.
- the embodiment of the present application further discloses one or more machine readable mediums having stored thereon instructions that, when executed by one or more processors, cause the terminal device to perform one or more of the embodiments as described in the embodiments of the present application. method.
- the embodiment of the present application further discloses an operating system for a terminal device, including: a full screen unit, displaying a login screen in full screen and disabling a target button, wherein the target button is used to exit the login interface;
- the login interface obtains the login information;
- the display unit displays the system interface after confirming the verification according to the login information.
- the embodiments of the present application include the following advantages:
- the login interface can be displayed in full screen and the target button is disabled, thereby prohibiting the login interface from being logged out.
- the login information is obtained in the login interface, and the system interface can be displayed after the verification is confirmed according to the login information, that is, the login is required.
- Use terminal devices to ensure data security and to manage devices.
- FIG. 1 is a schematic diagram of a login interface according to an embodiment of the present application
- FIG. 3 is a flow chart showing the steps of another embodiment of the interface display method of the present application.
- FIG. 4 is a schematic diagram of another login interface in the embodiment of the present application.
- FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
- FIG. 6 is a structural block diagram of an embodiment of an interface display device according to the present application.
- FIG. 7 is a structural block diagram of another embodiment of an interface display device of the present application.
- FIG. 8 is a schematic structural diagram of hardware of a terminal device according to an embodiment of the present disclosure.
- FIG. 9 is a schematic structural diagram of hardware of a terminal device according to another embodiment of the present disclosure.
- FIG. 10 is a schematic diagram of an operating system according to an embodiment of the present application.
- the terminal device refers to a device with an intelligent operating system, and the device can support audio, video, data, and the like, including a smart mobile terminal, such as a smart phone, a tablet computer, a smart wearable device, or Smart TV, personal computer and other equipment.
- Intelligent operating systems such as YunOS, IOS, Android, etc.
- the terminal device is a tablet computer and is used in the field of education, the school can use a tablet computer to assist students in learning, and the tablet computer can provide teaching functions.
- FIG. 1 a schematic diagram of a login interface of an embodiment of the present application is shown.
- the screen After the terminal device is powered on and the screen is unlocked, the screen will light up and the terminal device can be operated by the user. Therefore, the login interface can be displayed in full screen and the target button can be disabled. Therefore, the screen must be logged in to display the system interface after the screen is lit and the terminal device is available for user operation. Otherwise, the mobile terminal cannot be used, and the login interface cannot be used to display the system through other buttons.
- the login interface is displayed in full screen on the screen of the terminal device, and the login interface is used to assist the user to log in.
- the login interface may include a login control, and the login control is used to obtain login information, such as a username and a password, and the login control may include
- the window for obtaining the username and the window for obtaining the password may further include a login button for triggering the acquisition of the username and password.
- the target button of the terminal device is disabled, the target button is used to exit the login interface, the target button includes a physical button and a virtual button, and the virtual button may include a virtual button on the touch screen, an interface control, etc.
- the target button includes: a home button, a back button, an F1 button, etc., wherein the home button and the back button may be virtual buttons or physical buttons.
- the target button includes various buttons that can cause the login interface to be exited.
- the specific target button is determined according to the terminal device.
- the target button of the tablet computer may include a home button
- the target button of the notebook computer may include an F1 button, etc., in this embodiment, the login interface is exited. It means that the login interface is not displayed full screen on the screen, such as switching to other interfaces. Therefore, in the login interface of the full screen display, if the target button is triggered, since the target button has been disabled, the response operation corresponding to the target button is not executed, thereby prohibiting the login interface from being displayed in the non-login state.
- the login information can be received through the login control in the login interface, and then the login information is used for verification to confirm whether it is a registered user, and after confirming the verification according to the login information, the system interface is displayed.
- the system interface is an operable interface of the operating system in the terminal device, such as the main interface of the operating system (desktop interface), an interface of an application, etc., and the system interface may not include a login interface for disabling the target button.
- the target button can be re-enabled, that is, the response of each target button is restored after login, and the user can normally use the home button, the back button, the F1 button, and the like.
- the login interface can be displayed in full screen and the target button can be disabled, so that the login interface cannot be quit.
- the system interface can be displayed after verification according to the login information, that is, the system interface must be logged in to ensure the data security. And use it after logging in to facilitate management of the device.
- FIG. 2 a flow chart of steps of an embodiment of an interface display method of the present application is shown.
- Step 202 Display the login interface in full screen and disable the target button, wherein the target button is used to exit the login interface.
- Step 204 Obtain login information from the login interface.
- Step 206 After confirming the verification according to the login information, display the system interface.
- the login interface can be used to obtain login information, such as the login control of the login interface receiving the login information, and then obtaining the login information from the login control.
- the login information is used for verification, that is, whether it is a legitimate user, such as a registered user, etc., and the login information sending server can perform verification, and after confirming the verification according to the login information, the system interface can be displayed, thereby Perform the required operations in the interface, such as start learning software to learn, open office software for office, and so on.
- the target button can be re-enabled, that is, the response of each target button is restored after login, and the user can normally use the home button, the back button, the F1 button, and the like.
- the embodiment of the present application can be applied to a scenario used by a group of users such as a school or a company.
- the school, the company, and the like can uniformly purchase the terminal device, and the terminal device is installed with an operating system supporting the above interface display mode.
- Schools, companies, and other organizations can register terminal devices uniformly through management devices. Therefore, an organization can be regarded as a group.
- Each device can belong to only one organization, so that device information of each terminal device, such as devices, is recorded in the server. Description, device identification, affiliation, etc., wherein the affiliation can be characterized by an organization code, that is, an organization corresponds to an organization code, and then the organization code can be sent to each terminal device, for example, directly to the terminal device, or sent to the server through the server.
- the terminal device so that each terminal device stores an organization code, and based on the organization code, identifies a mechanism to which the terminal device belongs. Therefore, the mechanism code can also be used for verifying the terminal device and determining the mechanism to which the terminal
- the school, the company, and the like can also perform user registration through the management device to obtain the corresponding login information in batches.
- the server can generate login information of 100 users and return to the corresponding management. device.
- the number of user registrations and the number of device registrations of each organization may not be related, such as registering 50 terminal devices and 160 users.
- the user of the organization and the terminal device may also have no association relationship, that is, the terminal device corresponding to the login information is not specified. Therefore, after the login information of the user is obtained, the login information may be notified to the user if necessary, so that the user can log in based on the login information.
- Information uses terminal equipment.
- the setting event may be executed according to the setting instruction, where the setting instruction includes an unlocking instruction and/or a power-on instruction, the setting event includes an unlocking event and/or a power-on event, and the unlocking instruction is used to contact the terminal.
- the screen lock status of the device, the boot command is used to start the terminal device. Therefore, after the screen is started, the login screen can be called and the target button is determined, then the login screen is displayed in full screen, and the response to the target button is prohibited from being executed.
- FIG. 3 a flow chart of steps of another embodiment of the interface display method of the present application is shown.
- Step 302 executing a setting event according to the setting instruction.
- an unlocking instruction is received, and an unlocking event of the screen is performed according to the unlocking instruction.
- the unlocking event may be executed according to the unlocking instruction, for example, determining whether the unlocking parameter corresponds to the unlocking parameter is accurate, etc., and after performing the unlocking, the unlocking event is executed, and the unlocking event is performed.
- the screen is locked.
- the unlocking command can be set according to requirements, such as performing a gesture operation such as a screen swipe, and is sent after the password is input and verified.
- the power-on command is received, and the power-on event is executed according to the power-on command.
- the terminal device is in the shutdown state, it cannot be used. Therefore, if the power-on command is received, the power-on event is executed according to the power-on command, and the terminal device and its screen are activated according to the power-on event.
- Step 304 Determine whether an organization code is stored in the terminal device.
- the terminal device After the screen is started, it can be determined whether the organization code is stored in the terminal device, wherein the terminal device registered in the server stores the organization code of the corresponding organization to identify the organization, and if the terminal device does not store the mechanism The code may be unregistered or malfunctioning. Therefore, if yes, go to step 306; if no, go to step 318.
- step 306 the login interface is invoked and the target button is determined.
- Step 308 displaying the login interface in full screen, and prohibiting execution of the response to the target button.
- the login interface may be invoked, and the target button corresponding to the terminal device, such as a primary key (home key), a return key (back key), an F1 key, etc., may be caused to exit the login interface. Then, the login interface is displayed in full screen on the screen of the terminal device, and the response to the target button is prohibited from being executed, that is, the target button is disabled, and the response operation is not performed even if the target button receives the trigger, thereby keeping the login interface effective. To use the device after the user has logged in.
- the target button corresponding to the terminal device such as a primary key (home key), a return key (back key), an F1 key, etc.
- the interface of the target button is monitored by the hook program, and then the call to the target button is intercepted, thereby prohibiting the execution of the response to the target button; and if the login interface is displayed in full screen, The state of the target button is set to the invalid state (disable) at the system layer, so that no response or the like is performed for the trigger of the target button.
- the unlocking event is received by the lock screen application, so that the lock screen application can evoke the login interface, and after the screen unlocking event is monitored, the login interface is called and the target button is determined; the full screen display The login interface prohibits execution of a response to the target button.
- the operating system of the terminal device After receiving the power-on command, the operating system of the terminal device performs a boot event, and the underlying system monitors the boot event, and then invokes the login interface, after the boot event is detected, the login interface is invoked and the target button is determined; Log in to the interface and disable the response to the target button.
- Step 310 Obtain login information from the login interface.
- the user can enter login information in the login control of the login interface to obtain login information, such as user name and password, according to the login control.
- Step 312 Acquire a stored organization code, configure the login information and the organization code to form verification information, and send the verification information.
- the terminal device acquires the stored organization code, and then the organization code and the login information constitute verification information, and sends the verification information to the server.
- the server may determine the mechanism based on the organization code, and then check whether the login information in the verification information belongs to the organization, such as obtaining the login information set of the organization, and determining whether the login information in the verification information is in the login. In the information collection, if it is started, it passes the verification, otherwise the verification fails. The server can then return verification results for verification success or verification failure.
- Step 314 receiving the verification result. If the verification result is successful, step 316 is performed; if the verification result is failure, then return to step 308, continue to obtain login information, and display prompt information in the login interface to prompt verification identification, re-enter, and the like.
- step 316 the system interface is displayed.
- the system interface can be displayed, so that the user can use various functions in the terminal device, including the functions related to the organization, and can interact with the server to accept the assistance and management of the server.
- the school's terminal equipment can use learning software, access to teaching courses, etc.; the company's terminal equipment can use office software.
- step 318 a system interface for limiting functions is displayed.
- the terminal device may not be registered or has a fault.
- the system interface may be displayed, but the system interface is a system interface for restricting functions, that is, some of the functions cannot be used, and the limited function is It includes functions related to login, that is, some functions in the terminal device need to be used after login, for example, a function that requires a server to provide a service, and thus the terminal device cannot connect to the related server, and cannot obtain assistance and management of the server.
- the organization code is stored.
- the login information registered by the organization uses the terminal device. Therefore, the device code is not stored in the terminal device, and the user login is provided differently. Therefore, the function related to the login (registered user) cannot be used. Used, so some functions in the system interface displayed when the organization code is not stored are restricted.
- the login interface further includes a network control, where the network control is used to set a network, that is, the network control is provided with a network entry, and based on the network entry, the network connection interface can be jumped to the network.
- the connection interface can set the network to which the terminal device is connected, so that the terminal device accesses the network.
- An example is shown in FIG. 4 . Therefore, the triggering of the network control may be received, jumping to a network connection interface corresponding to the network control, and disabling the return key in the target button; obtaining networking information in the network connection interface, according to the Describe the networked information connection network; trigger the return key to return to the login interface.
- the network control is not a target button, and after receiving the trigger of the network control, may jump to a network connection interface corresponding to the network control, and after displaying the network connection interface, may cancel the target button
- the return key is disabled, that is, the return key can be used in this interface to return to the login interface.
- different target buttons are triggered under the network connection interface, that is, in the case of no login, the system interface is not bypassed under the network connection interface.
- network information such as the selected network identifier and network password is obtained, and then the network can be connected according to the network information, such as a Wifi network, a 4G network, or the like, or a password is connected to the wired network.
- Step 320 Receive a set gesture operation, and display a corresponding management interface according to the set gesture operation.
- Step 322 Obtain an administrative password from the management interface.
- the device may also be faulty. Therefore, when you need to perform maintenance and management operations on the device, you can display the system interface without logging in information, but display it through the management mode. For example, the device fails to be connected to the network, and the device fails to be used. In other cases, the organization can repair the terminal equipment to the manufacturer, and the manufacturer can display the system interface according to the management password.
- the stored management password is obtained from the server after the terminal device is registered, that is, when the organization registers the device, the server configures each device with an administrative password, which may be determined through certain calculation, or may be random.
- the generated management password can be generated by at least one combination of a number, an alphabetic symbol, and the like.
- the management password is also sent for storage.
- the management password can be based on a TKS (Trust KeyStore) service.
- TKS Turust KeyStore
- the TKS service has an encryption function, and can provide an interface for the stored application to read, preventing other applications from stealing the management password.
- the setting gesture can be received, and the setting gesture is a preset setting gesture for starting the management interface, for example, setting the gesture to continuous tap, Press and hold the interface, tap the top left corner of the title bar, tap the upper right corner of the title bar, long press the text in the title bar, etc.
- the corresponding management interface can be displayed to activate the management mode.
- the management interface includes a password control, and the password control user obtains an administrative password.
- Step 324 Determine whether the management password matches the management password stored in the terminal device.
- step 326 After receiving the management password, it can be determined whether the received management password matches the management password stored in the terminal device. If yes, go to step 326; if no, go back to step 322 to re-acquire the management password.
- the system interface is displayed.
- the verification verification is passed, and the system interface can be displayed, so that the terminal device can be repaired, such as detecting the reason that the network cannot be connected.
- the terminal device can periodically send the target data to the server, so that the server can synchronize the usage of the terminal device, which is convenient for management and monitoring.
- the target data includes at least: usage time information, usage content information, and usage status information.
- the usage time information includes a login time, an exit time, and a usage time of each application.
- the usage content information includes usage of each application in the terminal device, such as which applications are used, logs of each application, and the like; and the usage status information includes the terminal device. Status and status of the application, etc.
- Step 328 enabling the target button.
- the target button can be re-enabled, that is, the response of each target button is restored after login, and the user can normally use the home button, the back button, the F1 button, and the like. Or you can re-enable the target button after displaying the system interface based on the administrative password.
- the method of enabling is different. For example, if the target button is disabled by hook interception, the call of the target button is no longer intercepted after being enabled, or the corresponding button is intercepted after the target button is intercepted, and the response is executed; When the corresponding setting target button is in the invalid state, the setting target button is enabled (enable).
- the wireless network information may be preset in the terminal device, so that the device is automatically networked, automatically upgraded, and acquired under the premise of ensuring data security, thereby exempting the technical support personnel from configuring the local device. As shown in Figure 5.
- the default SSID (Service Set Identifier) and the network password of the known wireless network can be preset in the Wifi list of the operating system.
- the known wireless network can be a Wifi network, Bluetooth, NFC (Near Field Communication), and the like.
- the terminal device is purchased by the organization, the organization has a Known Wifi, that is, a WiFi router with the same SSID and password as the factory setting of the device.
- the system can directly connect to the same SSID and password WiFi router by using the Known Wifi setting, and connect to the Internet through the router.
- the initialization process can be performed, that is, the terminal device can automatically check the system upgrade through FOTA (Firmware Over The Air), and automatically install the compatible environment through the system service (such as the Android running plug-in). Configuration data such as Android Runtime Plug-in).
- the terminal device can automatically acquire the system configuration items preset in the server through the OMA (OPEN MOBILE ALLIANCE) protocol. Therefore, the process of the terminal device from booting to configuration completion does not require local manual intervention.
- the registration of the terminal device may be performed before the terminal device is automatically networked and upgraded, so that the organization code and the management password are delivered in the automatic network upgrade process.
- the terminal device is automatically networked, upgraded, and then registered by the organization, and then the server issues the organization code and the management password.
- the server can assign an institution code to each institution.
- the institution code of school A is 001
- the school A registers 50 terminal devices, and the 50 terminal devices are randomly allocated.
- the server can send the organization code 001 of the school A and the management password assigned thereto to the terminal device, so that the terminal device can store the organization code 001 and the management password.
- the server also sends the management password of each terminal device to the management device of the school A, so that the school A can manage the terminal device.
- school A can register for each student separately, and 226 login information can be obtained through registration. The login information can be assigned by the server.
- the student's student number can be used as the user name, and the server configures a password for each user name to determine the login information.
- the school A registers 50 users based on the terminal device and acquires 50 login information, and the students can share the terminal devices and the login information. After completing the registration of the user and the terminal device, the school A may distribute the terminal device to the student if the terminal device assists the teaching in the teaching process. After the student obtains the terminal device and starts, the terminal device displays the login interface in full screen and disables the target button. The student can input the login information distributed by the school into the login interface, and the terminal device generates the verification information according to the login information and the organization code 001, and sends the verification information to the server.
- the server can return the result of the verification.
- the system interface can be displayed in the terminal device, and the student can operate on the terminal device, such as the application of the corresponding auxiliary teaching.
- the target data of the terminal device can be acquired and synchronized to the server, so that the school can supervise the student using the terminal device based on the target data of the server.
- the administrator of the school or the maintenance personnel of the manufacturer can manage the mode through the management password, display the system interface in the management mode, and repair and manage the terminal device.
- the server can assign an organization code to each company.
- the company code of company B is 002
- the company B purchases 80 terminal devices, and the 80 terminal devices are started for the first time. It can be automatically networked, automatically upgraded and configured, and can be registered.
- the server randomly assigns the management password to the 80 terminal devices, that is, for each terminal device, the server can send the organization code 002 of the company B and the management password assigned thereto to the terminal device, so that the terminal device can store the organization code. 002 and administrative password.
- the server also sends the management password of each terminal device to the management device of company B, so that company B can manage the terminal device.
- the company B registers the user for the employee, and the server can randomly assign the login information, or the employee's job number can be registered as the user name, and the password can be obtained from the server.
- the terminal device can be distributed to the employee, and after the employee obtains the terminal device and starts, the terminal The device displays the login interface in full screen and disables the target button.
- the employee can input the login information distributed by the company to the login interface.
- the terminal device generates verification information according to the login information and the organization code 002, and sends the verification information to the server.
- the server confirms that the verification information passes the verification.
- the result of the verification pass can be returned, and then the system interface can be displayed in the terminal device, and the employee can operate on the terminal device, such as an application for starting a video conference.
- the target data of the terminal device can be acquired and synchronized to the server, so that the company can supervise the employee using the terminal device based on the target data of the server.
- the administrator of the company or the maintenance personnel of the manufacturer can manage the mode by managing the password, display the system interface in the management mode, and repair and manage the terminal device.
- the embodiment of the present application displays the login interface in full screen after the screen is started and disables the target button, that is, provides the flood screen mode, and the account login can be started after the terminal system is unlocked, and the full screen and key value management capabilities are provided, and the account cannot be skipped. Sign in to use the app.
- the organization code is an attribute possessed by the terminal device after registration, that is, the organization code can determine whether the terminal device is a registered device, and can provide system services and the like.
- the account of the embodiment of the present application is a toB account, that is, an organization (institution), so that the institution is related to the terminal device, and the organization and the login information (account) are related, so that the account can be associated with the terminal device and the login information, so that the account can be on the device. Login to use.
- the management password is sent and stored in the terminal device after registration, and the security of the management password is ensured by the TKS service.
- the management mode can be started by setting a gesture, and the system interface can be performed by managing the password. Maintenance and management configuration of the terminal equipment. Therefore, in an example, after the terminal device is powered on, restarted, or unlocked, the terminal device enters the flood screen mode, and the account (login information) is used as a system entry, and the unregistered user is not allowed to use the system, thereby facilitating the control of the device.
- the login of the login information involves problems such as network authentication. Therefore, when the system interface is required to be repaired but the login information cannot be used (or is not authorized), the login mode can be performed through the management mode, and the management mode can provide a comparison. Highly privileged administrators manage and use.
- the wireless network information is preset in the terminal device, so that the device is automatically networked, automatically upgraded, and acquired under the premise of ensuring data security, thereby realizing device configuration without human intervention.
- the embodiment of the present application further provides an interface display device, which is applied to a mobile terminal.
- FIG. 6 a structural block diagram of an embodiment of an interface display device of the present application is shown, which may specifically include the following modules:
- the full screen disable module 602 is configured to display the login interface in full screen and disable the target button, wherein the target button is used to exit the login interface;
- the login module 604 is configured to obtain login information from the login interface.
- the display module 606 is configured to display the system interface after the verification is verified according to the login information.
- the login interface can be displayed in full screen and the target button can be disabled, thereby prohibiting the login interface from being logged out.
- the login information is obtained on the login interface, and the system interface can be displayed after the verification is confirmed according to the login information, that is, the terminal device needs to be logged in, Keep data secure and easy to manage devices.
- FIG. 7 a structural block diagram of another embodiment of an interface display device of the present application is shown, which may specifically include the following modules:
- the startup module 608 is configured to execute a setting event according to the setting instruction.
- the full screen disable module 602 is configured to display the login interface in full screen and disable the target button, wherein the target button is used to exit the login interface;
- the login module 604 is configured to obtain login information from the login interface.
- the display module 606 is configured to display the system interface after the verification is verified according to the login information.
- the login module 604 is further configured to acquire the stored organization code, configure the login information and the organization code to form verification information, and send the verification information.
- the mechanism code is used to identify a mechanism to which the terminal device uniquely belongs, and the mechanism code is acquired from the server when the terminal device registers.
- the startup module 608 is configured to receive an unlocking instruction, and execute an unlocking event according to the unlocking instruction.
- the full screen disable module 602 is configured to invoke the login interface and determine the target button after listening to the unlock event of the screen; display the login interface in full screen, and prohibit execution of the response to the target button.
- the startup module 608 is configured to receive a booting instruction, and execute a booting event according to the booting instruction.
- the full screen disable module 602 is configured to invoke the login interface and determine the target button after the boot event is monitored; display the login interface in full screen, and prohibit execution of the response to the target button.
- the login interface includes a network control, and the network control is used to set a network.
- the device further includes: a networking module 610, configured to receive a trigger on the network control, and jump to a corresponding a network connection interface; obtaining networking information in the network connection interface, and connecting to the network according to the networking information.
- the networking module 610 is further configured to release the disable of the return key in the target button after displaying the network connection interface.
- the device further includes: a management login module 612, configured to receive a setting gesture operation, display a corresponding management interface according to the setting gesture operation; obtain a management password from the management interface; and the display module is configured to After the management password confirmation verification is passed, the system interface is displayed.
- a management login module 612 configured to receive a setting gesture operation, display a corresponding management interface according to the setting gesture operation; obtain a management password from the management interface; and the display module is configured to After the management password confirmation verification is passed, the system interface is displayed.
- the management login module 612 is further configured to determine whether the management password matches the management password stored in the terminal device, where the stored management password is obtained from the server after the terminal device is registered; if the management password is The management password stored in the terminal device matches, and the verification is confirmed.
- the startup module 608 is further configured to determine whether an organization code is stored in the terminal device; if the mechanism code is stored, the full screen disable module 602 is triggered; if the mechanism code is not stored, the display module 606 is triggered to display the restriction function.
- System interface where restricted functionality is associated with login.
- the embodiment of the present application can be applied to the field of education, and the terminal device includes a tablet computer.
- the device further includes a synchronization module 614, configured to collect target data in the terminal device, and synchronize the target data to the server, wherein the target data includes at least: usage time information, usage content information, and usage status information.
- a synchronization module 614 configured to collect target data in the terminal device, and synchronize the target data to the server, wherein the target data includes at least: usage time information, usage content information, and usage status information.
- the display module 606 is further configured to enable the target button.
- the embodiment of the present application further provides a non-volatile readable storage medium, where the storage medium stores one or more programs, and when the one or more modules are applied to the terminal device, the terminal may be The device executes the instructions of the method steps in the embodiment of the present application.
- a further optional embodiment comprising: one or more machine readable medium having stored thereon instructions that, when executed by one or more processors, cause the server to perform one or more of the embodiments of the present application
- the interface display method comprising: one or more machine readable medium having stored thereon instructions that, when executed by one or more processors, cause the server to perform one or more of the embodiments of the present application
- the interface display method comprising: one or more machine readable medium having stored thereon instructions that, when executed by one or more processors, cause the server to perform one or more of the embodiments of the present application The interface display method.
- FIG. 8 is a schematic structural diagram of hardware of a device according to an embodiment of the present disclosure.
- the device may include various devices such as a server, a terminal device, and a temperature control device.
- the terminal device may include an input device 80, a processor 81, an output device 82, a memory 83, and at least one communication bus 84.
- Communication bus 84 is used to implement a communication connection between the components.
- Memory 83 may include high speed RAM memory, and may also include non-volatile memory NVM, such as at least one disk memory, in which various programs may be stored for performing various processing functions and implementing the method steps of the present embodiments.
- the processor 81 may be, for example, a central processing unit (CPU), an application specific integrated circuit (ASIC), a digital signal processor (DSP), a digital signal processing device (DSPD), and a programmable logic.
- CPU central processing unit
- ASIC application specific integrated circuit
- DSP digital signal processor
- DSPD digital signal processing device
- programmable logic A device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component is implemented that is coupled to the input device 80 and output device 82 described above by a wired or wireless connection.
- PLD field programmable gate array
- controller microcontroller, microprocessor or other electronic component is implemented that is coupled to the input device 80 and output device 82 described above by a wired or wireless connection.
- the input device 80 may include multiple input devices, for example, at least one of a user-oriented user interface, a device-oriented device interface, a software programmable interface, a camera, and a sensor.
- the device-oriented device interface may be a wired interface for data transmission between the device and the device, or may be a hardware insertion interface (for example, a USB interface, a serial port, etc.) for data transmission between the device and the device.
- the user-oriented user interface may be, for example, a user-oriented control button, a voice input device for receiving voice input, and a touch-sensing device for receiving a user's touch input (eg, a touch screen with touch sensing function, touch
- the programmable interface of the software may be, for example, an input for the user to edit or modify the program, such as an input pin interface or an input interface of the chip; optionally, the transceiver may have Radio frequency transceiver chip, baseband processing chip, and transceiver antenna for communication functions.
- An audio input device such as a microphone can receive voice data.
- Output device 82 may include an output device such as a display, an audio, or the like.
- the processor of the terminal device includes functions for executing the modules of the data processing device in each device.
- the specific functions and technical effects may be referred to the foregoing embodiments, and details are not described herein again.
- FIG. 9 is a schematic structural diagram of hardware of a terminal device according to another embodiment of the present disclosure.
- Figure 9 is a specific embodiment of the implementation of Figure 8.
- the terminal device of this embodiment includes a processor 91 and a memory 92.
- the processor 91 executes the computer program code stored in the memory 92 to implement the interface display method of FIGS. 1 to 5 in the above embodiment.
- the memory 92 is configured to store various types of data to support operation at the terminal device. Examples of such data include instructions for any application or method operating on the terminal device, such as messages, pictures, videos, and the like.
- the memory 92 may include a random access memory (RAM), and may also include a non-volatile memory such as at least one disk storage.
- processor 91 is disposed in processing component 90.
- the terminal device may also include a communication component 93, a power component 94, a multimedia component 95, an audio component 96, an input/output interface 97 and/or a sensor component 98.
- the components and the like included in the terminal device are set according to actual requirements, which is not limited in this embodiment.
- Processing component 90 typically controls the overall operation of the terminal device.
- Processing component 90 may include one or more processors 91 to execute instructions to perform all or part of the steps of the above-described methods of Figures 1-5.
- processing component 90 can include one or more modules to facilitate interaction between component 90 and other components.
- processing component 90 can include a multimedia module to facilitate interaction between multimedia component 95 and processing component 90.
- Power component 94 provides power to various components of the terminal device.
- Power component 94 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal devices.
- the multimedia component 95 includes a display screen between the terminal device and the user that provides an output interface.
- the display screen can include a liquid crystal display (LCD) and a touch panel (TP). If the display includes a touch panel, the display can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the audio component 96 is configured to output and/or input an audio signal.
- audio component 96 includes a microphone (MIC) that is configured to receive an external audio signal when the terminal device is in an operational mode, such as a voice recognition mode.
- the received audio signal may be further stored in memory 92 or transmitted via communication component 93.
- audio component 96 also includes a speaker for outputting an audio signal.
- the input/output interface 97 provides an interface between the processing component 90 and the peripheral interface module, which may be a click wheel, a button, or the like. These buttons may include, but are not limited to, a volume button, a start button, and a lock button.
- Sensor assembly 98 includes one or more sensors for providing status assessment of various aspects to the terminal device.
- sensor component 98 can detect the open/closed state of the terminal device, the relative positioning of the components, and the presence or absence of contact of the user with the terminal device.
- Sensor assembly 98 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact, including detecting the distance between the user and the terminal device.
- the sensor assembly 98 can also include a camera or the like.
- Communication component 93 is configured to facilitate wired or wireless communication between the terminal device and other devices.
- the terminal device can access a wireless network based on a communication standard such as WiFi, 2G or 3G, or a combination thereof.
- the terminal device may include a SIM card slot for inserting the SIM card, so that the terminal device can log in to the GPRS network and establish communication with the server through the Internet.
- the communication component 93, the audio component 96, and the input/output interface 97 and the sensor component 98 involved in the embodiment of FIG. 9 can be implemented as an input device in the embodiment.
- a terminal device of this embodiment comprising: one or more processors; and one or more machine-readable media having stored thereon instructions, when executed by the one or more processors, The terminal device is caused to perform the method as described in one or more of the embodiments of the present application.
- the embodiment of the present application further provides an operating system for a terminal device.
- the operating system of the device includes: a full screen unit 1002, a login unit 1004, and a display unit 1006.
- the full screen unit 1002 displays the login interface in full screen and disables the target button, wherein the target button is used to exit the login interface.
- the login unit 1004 acquires login information from the login interface.
- the display unit 1006 displays the system interface after confirming the verification according to the login information.
- the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
- Embodiments of the present application are described with reference to flowcharts and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
- These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing terminal device to produce a machine such that instructions are executed by a processor of a computer or other programmable data processing terminal device
- Means are provided for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing terminal device to operate in a particular manner, such that instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the instruction device implements the functions specified in one or more blocks of the flow or in a flow or block diagram of the flowchart.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
L'invention concerne un procédé, un appareil et un dispositif d'affichage d'interface, et un support de stockage, pour améliorer la sécurité des données. Le procédé consiste à : afficher une interface d'ouverture de session en plein écran et désactiver une clé cible, la clé cible étant utilisée pour sortir de l'interface d'ouverture de session; acquérir des informations d'ouverture de session à partir de l'interface correspondante; et après confirmation, selon les informations d'ouverture de session, que la vérification est réussie, afficher une interface de système. Un équipement terminal peut être utilisé uniquement après ouverture de session, de sorte que la sécurité des données est assurée, et la gestion du dispositif facilitée.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710708980.4A CN109426705A (zh) | 2017-08-17 | 2017-08-17 | 一种界面显示方法、装置、设备和存储介质 |
CN201710708980.4 | 2017-08-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019033947A1 true WO2019033947A1 (fr) | 2019-02-21 |
Family
ID=65361772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/098971 WO2019033947A1 (fr) | 2017-08-17 | 2018-08-06 | Procédé, appareil et dispositif d'affichage d'interface, et support de stockage |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109426705A (fr) |
WO (1) | WO2019033947A1 (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210014674A1 (en) * | 2019-07-11 | 2021-01-14 | Slim Hmi Technology | Secure interaction system and communication display device |
CN111143227B (zh) * | 2019-12-31 | 2023-11-17 | 上海米哈游天命科技有限公司 | 一种数据操作方法、装置、终端及存储介质 |
CN112508507B (zh) * | 2020-11-17 | 2024-05-24 | 北京聚友大道科技发展有限公司 | 一种信息管理方法、装置和电子设备 |
CN114615377B (zh) * | 2020-11-25 | 2023-08-15 | 成都鼎桥通信技术有限公司 | 应用程序控制方法、装置及设备 |
CN113158172B (zh) * | 2021-02-26 | 2022-03-22 | 山东英信计算机技术有限公司 | 一种基于芯片的密码获取方法、装置、设备及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101730094A (zh) * | 2009-11-30 | 2010-06-09 | 广州市聚晖电子科技有限公司 | 一种终端设备接入安防系统业务平台及信息传送方法 |
CN104008318A (zh) * | 2013-02-26 | 2014-08-27 | 京瓷办公信息系统株式会社 | 图像形成系统和图像形成装置 |
CN105099676A (zh) * | 2014-04-18 | 2015-11-25 | 阿里巴巴集团控股有限公司 | 一种用户登录方法、用户终端及服务器 |
CN106972950A (zh) * | 2017-02-20 | 2017-07-21 | 上海赛印信息技术股份有限公司 | 质量信息服务端及包含其的质量信息管理系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727281A (zh) * | 2009-09-04 | 2010-06-09 | 丁贵 | 一种对计算机屏幕一键锁定的系统及方法 |
CN103095457B (zh) * | 2013-01-11 | 2016-03-23 | 广东欧珀移动通信有限公司 | 一种应用程序的登录、验证方法 |
CN105516368A (zh) * | 2016-02-03 | 2016-04-20 | 浪潮软件股份有限公司 | 一种云桌面客户端、服务器、实现云桌面的方法和系统 |
-
2017
- 2017-08-17 CN CN201710708980.4A patent/CN109426705A/zh active Pending
-
2018
- 2018-08-06 WO PCT/CN2018/098971 patent/WO2019033947A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101730094A (zh) * | 2009-11-30 | 2010-06-09 | 广州市聚晖电子科技有限公司 | 一种终端设备接入安防系统业务平台及信息传送方法 |
CN104008318A (zh) * | 2013-02-26 | 2014-08-27 | 京瓷办公信息系统株式会社 | 图像形成系统和图像形成装置 |
CN105099676A (zh) * | 2014-04-18 | 2015-11-25 | 阿里巴巴集团控股有限公司 | 一种用户登录方法、用户终端及服务器 |
CN106972950A (zh) * | 2017-02-20 | 2017-07-21 | 上海赛印信息技术股份有限公司 | 质量信息服务端及包含其的质量信息管理系统 |
Also Published As
Publication number | Publication date |
---|---|
CN109426705A (zh) | 2019-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12238239B1 (en) | Methods and devices for secure authentication to a compute device | |
WO2019033947A1 (fr) | Procédé, appareil et dispositif d'affichage d'interface, et support de stockage | |
US9921819B2 (en) | Persistent mobile device enrollment | |
US10581833B2 (en) | Electronic device and method for processing secure information | |
KR102276873B1 (ko) | 모바일 통신 디바이스 및 그 작동 방법 | |
US9338156B2 (en) | System and method for integrating two-factor authentication in a device | |
JP6386069B2 (ja) | 接続管理方法、装置、電子設備、プログラム、及び記録媒体 | |
CN113141610B (zh) | 将设备标识符和用户标识符相关联的设备盗窃防护 | |
WO2016023367A1 (fr) | Procédé, appareil et système de vérification d'accès | |
US20080120716A1 (en) | System and method for enhancing security of an electronic device | |
CN101794361A (zh) | 用基于位置的数据向平台提供附加的安全性的系统和方法 | |
US10320571B2 (en) | Techniques for authenticating devices using a trusted platform module device | |
CN108702413A (zh) | 一种验证码的输入方法及装置 | |
CN109214187B (zh) | 一种控制计算机启动的方法、装置和电子设备 | |
CN103455740B (zh) | 一种密码处理方法、装置及终端 | |
CN109413006A (zh) | 账号的处理方法、装置、设备和机器可读介质 | |
CN110598384A (zh) | 信息保护方法、信息保护装置及移动终端 | |
US10402557B2 (en) | Verification that an authenticated user is in physical possession of a client device | |
CN114647529A (zh) | 用于使用另一设备修复不可操作的辅助设备的技术 | |
CN107231338B (zh) | 网络连接方法、装置以及用于网络连接的装置 | |
CN102594815B (zh) | 登录操作系统前设置用户权限并执行相应操作的方法、装置 | |
KR20190052319A (ko) | 전자 장치 및 그의 제어 방법 | |
US20200311234A1 (en) | Electronic device security | |
CN113672886B (zh) | 提示方法和装置 | |
US20230161860A1 (en) | Using a digital badge to access managed devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18847077 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18847077 Country of ref document: EP Kind code of ref document: A1 |