WO2015180384A1 - 一种处理儿童模式的方法和装置 - Google Patents
一种处理儿童模式的方法和装置 Download PDFInfo
- Publication number
- WO2015180384A1 WO2015180384A1 PCT/CN2014/089217 CN2014089217W WO2015180384A1 WO 2015180384 A1 WO2015180384 A1 WO 2015180384A1 CN 2014089217 W CN2014089217 W CN 2014089217W WO 2015180384 A1 WO2015180384 A1 WO 2015180384A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- list
- function
- account
- target application
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/101—Collaborative creation, e.g. joint development of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B5/00—Electrically-operated educational appliances
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B7/00—Electrically-operated teaching apparatus or devices working with questions and answers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/21—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present disclosure relates to the field of Internet technologies, and in particular, to a method and apparatus for processing a child mode.
- the use of the application can be controlled by the child in the following manner: Specifically, a child mode is provided, and the parent turns on the child mode by inputting a password. Once the child mode is turned on, the corresponding application cannot be started, and only the input is correct. The password can be turned off in child mode to launch the app.
- the inventors have found that the related art has at least the following problem: in the child mode, preventing the startup of the corresponding application can prevent the child from being exposed to the content that should not be contacted, but the corresponding application cannot be normal at this time. use.
- embodiments of the present disclosure provide a method and apparatus for processing a child mode, which may not affect the normal use of the application in the child mode.
- the technical solution is as follows:
- a method for cross-domain data acquisition comprising:
- the method further includes:
- the to-be-displayed content in the target application includes a preset first character, performing mask display processing on the first character in the to-be-displayed content.
- the method further includes:
- the to-be-displayed content in the target application includes a preset first character
- the to-be-displayed content is sent to the first terminal.
- the method further includes:
- the content of the operation is sent to the first terminal.
- the content of the operation is sent to the first terminal, including:
- the execution content of the first function is sent to the first terminal.
- the method further includes:
- the local account is prevented from communicating with an account other than the account that allows communication.
- the method further includes:
- the target account If the attribute information of the target account satisfies the preset adding condition, the target account is added as a contact, and if the attribute information of the target account does not satisfy the preset adding condition, the adding the contact instruction is rejected.
- the method further includes:
- the method further includes:
- the method further includes:
- an apparatus for cross-domain data acquisition comprising:
- a receiving module configured to receive a list of allowed use functions or a list of prohibited use functions of the target application sent by the first terminal;
- a determining module configured to determine, according to the list of allowed use functions or the list of prohibited use functions, a function allowed in the target application
- a display module configured to display the allowed function in a child mode of the target application.
- the display module is further configured to:
- the to-be-displayed content in the target application includes a preset first character, performing mask display processing on the first character in the to-be-displayed content.
- a sending module is further included for:
- the to-be-displayed content in the target application includes a preset first character
- the to-be-displayed content is sent to the first terminal.
- a sending module is further included for:
- the content of the operation is sent to the first terminal.
- the sending module is configured to:
- the execution content of the first function is sent to the first terminal.
- a blocking module for:
- the local account is prevented from communicating with an account other than the account that allows communication.
- the target account If the attribute information of the target account satisfies the preset adding condition, the target account is added as a contact, and if the attribute information of the target account does not satisfy the preset adding condition, the adding the contact instruction is rejected.
- an execution module is further included for:
- a sending module is further included for:
- an apparatus for cross-domain data acquisition comprising:
- a memory for storing processor executable instructions
- processor is configured to:
- Some of the benefits of the present disclosure may include:
- receiving the permission use function list or the prohibition use function list of the target application sent by the first terminal determining the function allowed in the target application according to the permitted use function list or the prohibition use function list, in the target application In the child mode of the program, the allowed functions are displayed, and in this way, the normal use of the application can be prevented in the child mode.
- FIG. 1 is a flow chart showing a method of processing a child mode, according to an exemplary embodiment.
- FIG. 2a is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 2b is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 2c is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 2d is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 2e is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 2f is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 2g is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 2h is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 2i is a schematic diagram of a terminal interface display according to an exemplary embodiment.
- FIG. 3 is a schematic structural diagram of a device for processing a child mode according to an exemplary embodiment.
- FIG. 4 is a schematic structural diagram of a terminal according to an exemplary embodiment.
- Embodiments of the present disclosure provide a method and apparatus for processing a child mode, which will be described in detail below with reference to the accompanying drawings.
- the embodiment of the present disclosure provides a method for processing a child mode. As shown in FIG. 1 , the process flow of the method may include the following steps:
- step 101 the list of allowed use functions or the list of prohibited use functions of the target application sent by the first terminal are received.
- step 102 the functions allowed in the target application are determined according to the list of permitted use functions or the list of prohibited use functions.
- step 103 the allowed function is displayed in the child mode of the target application.
- receiving the permission use function list or the prohibition use function list of the target application sent by the first terminal determining the function allowed in the target application according to the permitted use function list or the prohibition use function list, in the target application In the child mode of the program, the allowed functions are displayed, and in this way, the normal use of the application can be prevented in the child mode.
- the embodiment of the present disclosure provides a method for processing a child mode.
- the execution body of the method may be a terminal device (which may be referred to as a second terminal), such as a mobile terminal, a tablet computer, or the like, and the second terminal may be a terminal used by a child.
- the first terminal mentioned below may be a terminal used by a parent.
- This embodiment uses a mobile phone as an execution host as an example to describe the solution in detail. In the case of other execution entities, the details are not described in this embodiment.
- step 101 the list of allowed use functions or the list of prohibited use functions of the target application sent by the first terminal is received, and the method of the embodiment may be used in the second terminal.
- the target application may be various types of applications installed on the second terminal, such as instant messaging software, web browsing software, video viewing software, and the like.
- the list of allowed features can be a list of features that are allowed to be used in the target application, including at least one allowed feature.
- the Prohibited Uses feature list can be a list of features that are prohibited from being used in the target application, including at least one prohibited feature.
- the first terminal and the second terminal may both be installed with a target application.
- the target application may provide a parental control function.
- the first terminal after the user (ie, the parent) activates the parental control function, the first terminal may display a function list of the target application, and the function list may include the target application. All features, such as instant messaging, adding contacts, joining groups, and more. Parents can select the allowed function in the function list to compose the function list, and send the list of allowed function to the second terminal. Alternatively, the parent can select the forbidden function in the function list to form a list of prohibited use functions. Send to the second terminal using the function list.
- the list of functions provided by the system includes instant messaging, adding contacts, joining groups, and more.
- the first terminal user selects the allowed functions from the function list, including the instant messaging function, and adds the contact function. can.
- the instant messaging function and the add contact function are combined to allow a function list to be sent to the second terminal.
- step 102 the function allowed in the target application is determined according to the permitted use function list or the prohibited use function list, and the method of the embodiment can be used in the wireless terminal device.
- the second terminal may acquire a function in the permitted function list as a function permitted to be used, and allow a function other than the function list to be used as a function that is not allowed to be used.
- the second terminal can acquire a function other than the function list in the target application, as a function permitted to be used.
- step 103 in the child mode of the target application, the functions allowed to be used are displayed, and the method of the present embodiment can be used in the wireless terminal device.
- a button for turning on the child mode can be set in the target application, and the user (ie, the parent) can click the button to turn on the child mode, and set the mode to turn off the password.
- the target application can display the permission.
- the execution button of the function used is as shown in Fig. 2a. At this time, the execution buttons of other functions may not be displayed. Of course, the execution buttons of other functions can also be displayed based on different settings of the parent.
- some characters in the information displayed in the second terminal may also be masked, and the corresponding processing may be: when detecting that the content to be displayed in the target application includes a preset In the first character, the first character in the content to be displayed is subjected to mask display processing, and the method in this embodiment can be used in the wireless terminal device.
- the first character may be a sensitive word or a word that is not suitable for children to read.
- the target application provides a first character configuration interface
- the parent inputs characters (ie, the first character) that need to be shielded for the child, and the input characters are combined into the first character list, and the first The character list is sent to the second terminal, and the second terminal stores the first character in the list.
- the first character in the content to be displayed may be processed by a special display effect, for example, the first character is replaced by “*”, and then displayed in the first On the second terminal device, as shown in Figure 2b.
- some characters displayed by the second terminal may also be notified to the parent of the child, and the corresponding processing may be: when detecting that the content to be displayed in the target application includes a preset In the first character, the content to be displayed is sent to the first terminal, and the method in this embodiment can be used in the wireless terminal device.
- the target application provides a first character configuration interface
- the parent inputs characters that need to be shielded for the child, inputs the characters into the first character list, and sends the first character list to the second character list.
- the terminal the second terminal stores the first character in the list.
- the second terminal sends the to-be-displayed content to the first terminal, and may send the displayed entire page to the first terminal, or may correspondingly
- the paragraph or statement in which the character is located is sent entirely to the first terminal, as shown in Figure 2c.
- the specified operation of the child in the application may also be reported, and the corresponding processing may be: when it is detected that the operation performed by the target application meets the preset reporting condition, The content of the operation is sent to the first terminal, and the method of the embodiment can be used in the wireless terminal device.
- the reporting condition may be set by the parent in the first terminal, and notified to the second terminal for recording, and the corresponding reporting condition may be various, for example, the reporting condition may be communicating with a specified account, or Is the operation of adding a contact, and so on.
- the second terminal sends the content of the operation to the first terminal, as shown in FIG. 2d, for example, sending the message content of the instant messaging to the first terminal. Or send the content shared by the circle of friends to the first terminal.
- the reporting condition is to communicate with a specified account, and when the login account of the second terminal (ie, the child's account) communicates with the designated account, the second terminal sends the content of the corresponding communication message to the first a terminal.
- the foregoing preset reporting condition may be: performing a preset function in the application, and the corresponding processing may be: when detecting that the target application performs the preset first function, performing the content of the first function Send to the first terminal.
- the first function may be set by the parent in the first terminal, and notified to the second terminal, where the second terminal stores, and the second terminal detects the target application to perform the first function, and performs the first function.
- the execution content is sent to the first terminal.
- the first function may be a communication function, and the corresponding execution content may be the content of the communication, or the first function may be a function of adding a contact, and the corresponding execution content may be account information added as a target account of the contact.
- the contact of the child communication may also be restricted, and the corresponding processing may be as follows:
- Step 1 Receive a list of allowed communication accounts or a list of prohibited communication accounts sent by the first terminal, and the method in this embodiment may be used in the wireless terminal device.
- the page of the parental control function may further include a button of the communication account setting function, and after the parent clicks the button, the first terminal may be triggered to obtain the contact of the login account (ie, the child's account) of the second terminal from the server. a list in which the child's friend account is recorded, and the parent may select an account allowing communication in the contact list to form a list of allowed communication accounts to be sent to the second terminal, or the parent may be in the contact list. Select an account that prohibits communication, and form a list of prohibited communication accounts to be sent to the second terminal.
- Step 2 Determine the account that allows communication according to the list of allowed communication accounts or the list of prohibited communication accounts.
- the second terminal acquires an account in the allowed communication account list from the first terminal as an account that allows communication, allows an account other than the communication account list to be an account that does not allow communication, or the second terminal acquires the prohibition.
- the account in the list of communication accounts will prohibit accounts other than the list of communication accounts as accounts that allow communication.
- Step 3 Prevent the local account from communicating with an account other than the account that allows communication.
- the target The application can pop up a message indicating that communication is not possible, as shown in Figure 2e.
- Step 1 When the add contact instruction is received, the attribute information of the target account corresponding to the add contact instruction is obtained, and the method in this embodiment may be used in the wireless terminal device.
- the target account corresponding to the add contact instruction is an account that the child is prepared to add as a contact. Attribute information It is the age, school, gender or occupation of the target account.
- Step 2 If the attribute information of the target account satisfies the preset adding condition, the target account is added as a contact, and if the attribute information of the target account does not satisfy the preset adding condition, the contact instruction is refused to be added, and the method in this embodiment is used. Can be used in the second terminal.
- the parent may set the adding condition in the first terminal, as shown in FIG. 2f, and notify the second terminal to be stored by the second terminal.
- the addition condition may be the same as the child's school, or the age is within a certain range, and the like. These additions can be set to be invisible to children.
- the second terminal receives the added contact instruction input by the child, if added If the attribute information of the target account satisfies the adding condition, the target account is added as a contact, and if the attribute information of the target account does not satisfy the adding condition, the target account is refused to be added as a contact.
- the child may also be approved by the parent when adding the friend, and the corresponding processing may be as follows:
- Step 1 When receiving the add contact instruction, obtain an account identifier of the target account corresponding to the add contact instruction, and send an add contact request carrying the account identifier to the first terminal, and the method in this embodiment may be used for wireless In the terminal device.
- the second terminal when another user requests to add the child's account as a contact, the child agrees to add, or the child actively adds another user's account as a contact, the second terminal receives the added contact instruction input by the child. At this time, the second terminal may obtain an account identifier of the target account corresponding to the add contact instruction, and send an add contact request carrying the account identifier to the first terminal, where the request may also carry the account information of the target account, such as Gender, age, school, etc., as shown in Figure 2g.
- Step 2 When receiving the permission message sent by the first terminal, adding the target account as a contact; or, when receiving the rejection message sent by the first terminal, rejecting the adding the contact instruction.
- the first terminal when the first terminal receives the add contact request carrying the account identifier, the first terminal may display an add contact request window, and the account identifier of the target account may be displayed in the window, and the corresponding account information may also be displayed, and the permission may be displayed.
- Add button and prohibit add button if the parent allows, you can click the allow add button to trigger the first terminal to generate an allow message and send it to the second terminal, or if the parent refuses, you can click the disable button to trigger the first terminal to generate The message is rejected and sent to the second terminal.
- Step 1 Displaying other functions than those allowed in the target application, the method of this embodiment can be used in the wireless terminal device.
- Step 2 When receiving an execution instruction of the second function of the other function, send a function execution request carrying the identifier information of the second function to the first terminal.
- the first terminal when the first terminal receives the function execution request of the second function sent by the second terminal, the first terminal may display a function execution request window, the window may display the identification information of the target function, and may display the permission to use the button and It is forbidden to use the button.
- the user can click the allow button to trigger the first terminal to generate an allow message and send it to the second terminal.
- the user can click the disable button to trigger the first A terminal generates a rejection message and sends the message to the second terminal.
- Step 3 When receiving the permission message sent by the first terminal, performing the second function; or, when receiving the rejection message sent by the first terminal, rejecting the execution of the instruction.
- the terminal of the child may also report the location, the route, and the like to the parent's terminal, and the corresponding processing may be: when the preset trigger event occurs, sending the local to the first terminal.
- the location information or the motion line information, the method of this embodiment can be used in a wireless terminal device.
- the trigger event may be set by the parent in the first terminal, and notified to the second terminal for recording, or may be pre-configured in the application, and the corresponding trigger event may be reaching a preset time period, or reaching a certain pre- Set the time and so on.
- the second terminal may obtain the current location information and send the information to the first terminal, or may obtain the motion line information in the latest period of time and send the information to the first terminal, where the first terminal receives the location information or After moving the line information, the corresponding position or motion line can be displayed on the map, as shown in Figure 2i.
- receiving the permission use function list or the prohibition use function list of the target application sent by the first terminal determining the function allowed in the target application according to the permitted use function list or the prohibition use function list, in the target application In the child mode of the program, the allowed functions are displayed, and in this way, the normal use of the application can be prevented in the child mode.
- an embodiment of the present disclosure further provides a device for processing a child mode. As shown in FIG. 3, the device includes:
- the receiving module 310 is configured to receive a list of allowed use functions or a list of prohibited use functions of the target application sent by the first terminal;
- a determining module 320 configured to determine, according to the allowed use function list or the forbidden use function list, a function allowed in the target application
- the display module 330 is configured to display the allowed function in the child mode of the target application.
- the display module 330 is further configured to:
- the to-be-displayed content in the target application includes a preset first character, performing mask display processing on the first character in the to-be-displayed content.
- a sending module is further included for:
- the to-be-displayed content in the target application includes a preset first character
- the to-be-displayed content is sent to the first terminal.
- a sending module is further included for:
- the content of the operation is sent to the first terminal.
- the sending module is configured to:
- the execution content of the first function is sent to the first terminal.
- a blocking module for:
- the local account is prevented from communicating with an account other than the account that allows communication.
- the target account If the attribute information of the target account satisfies the preset adding condition, the target account is added as a contact, and if the attribute information of the target account does not satisfy the preset adding condition, the adding the contact instruction is rejected.
- an execution module is further included for:
- a sending module is further included for:
- receiving the permission use function list or the prohibition use function list of the target application sent by the first terminal determining the function allowed in the target application according to the permitted use function list or the prohibition use function list, in the target application In the child mode of the program, the allowed functions are displayed, and in this way, the normal use of the application can be prevented in the child mode.
- FIG. 4 is a block diagram of a terminal 800 for processing a child mode, according to an exemplary embodiment.
- terminal 800 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
- terminal 800 can include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, And a communication component 816.
- Processing component 802 typically controls the overall operation of terminal 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 802 can include one or more processors 820 to execute instructions to perform all or part of the steps of the above described methods.
- processing component 802 can include one or more modules to facilitate interaction between component 802 and other components.
- processing component 802 can include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
- Memory 804 is configured to store various types of data to support operation at terminal 800. Examples of such data include instructions for any application or method operating on terminal 800, contact data, phone book data, messages, pictures, videos, and the like.
- the memory 804 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable.
- SRAM static random access memory
- EEPROM electrically erasable programmable read only memory
- EPROM Electrically erasable programmable read only memory
- PROM Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Disk Disk or Optical Disk.
- Power component 806 provides power to various components of terminal 800.
- Power component 806 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for terminal 800.
- the multimedia component 808 includes a screen that provides an output interface between the terminal 800 and the user.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 808 includes a front camera and/or a rear camera. When the terminal 800 is in an operation mode such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
- the audio component 810 is configured to output and/or input an audio signal.
- the audio component 810 includes a microphone (MIC) that is configured to receive an external audio signal when the terminal 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 804 or transmitted via communication component 816.
- the audio component 810 also includes a speaker for outputting an audio signal.
- the I/O interface 812 provides an interface between the processing component 802 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
- Sensor assembly 814 includes one or more sensors for providing terminal 800 with various aspects of status assessment.
- sensor component 814 can detect an open/closed state of terminal 800, relative positioning of components, such as the display and keypad of terminal 800, and sensor component 814 can also detect terminal 800 or terminal 800. The position of the components changes, the presence or absence of contact of the user with the terminal 800, the orientation of the terminal 800 or acceleration/deceleration, and the temperature of the terminal 800.
- Sensor assembly 814 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor assembly 814 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 816 is configured to facilitate wired or wireless communication between terminal 800 and other devices.
- the terminal 800 can access a wireless network based on a communication standard such as WiFi, 2G or 3G, or a combination thereof.
- the communication component 816 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
- the communication component 816 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- terminal 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- non-transitory computer readable storage medium comprising instructions, such as a memory 804 comprising instructions executable by processor 820 of terminal 800 to perform the above method.
- the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
- a non-transitory computer readable storage medium when instructions in the storage medium are executed by a processor of a mobile terminal, enabling the mobile terminal to perform a method of cross-domain data acquisition, the method comprising:
- the method further includes:
- the to-be-displayed content in the target application includes a preset first character, performing mask display processing on the first character in the to-be-displayed content.
- the method further includes:
- the to-be-displayed content in the target application includes a preset first character
- the to-be-displayed content is sent to the first terminal.
- the method further includes:
- the content of the operation is sent to the first terminal.
- the operation performed by the target application is detected to meet a preset reporting condition
- the The content of the operation is sent to the first terminal, including:
- the execution content of the first function is sent to the first terminal.
- the method further includes:
- the local account is prevented from communicating with an account other than the account that allows communication.
- the method further includes:
- the target account If the attribute information of the target account satisfies the preset adding condition, the target account is added as a contact, and if the attribute information of the target account does not satisfy the preset adding condition, the adding the contact instruction is rejected.
- the method further includes:
- the method further includes:
- the method further includes:
- receiving the permission use function list or the prohibition use function list of the target application sent by the first terminal determining the function allowed in the target application according to the permitted use function list or the prohibition use function list, in the target application In the child mode of the program, the allowed functions are displayed, and in this way, the normal use of the application can be prevented in the child mode.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Economics (AREA)
- Educational Technology (AREA)
- Educational Administration (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Primary Health Care (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Automation & Control Theory (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (21)
- 一种处理儿童模式的方法,其特征在于,所述方法包括:接收第一终端发送的目标应用程序的允许使用功能列表或禁止使用功能列表;根据所述允许使用功能列表或所述禁止使用功能列表,确定所述目标应用程序中允许使用的功能;在所述目标应用程序的儿童模式下,显示所述允许使用的功能。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当检测到所述目标应用程序中的待显示内容包括预设的第一字符时,对所述待显示内容中的第一字符进行屏蔽显示处理。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当检测到所述目标应用程序中的待显示内容包括预设的第一字符时,将所述待显示内容发送给所述第一终端。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当检测到所述目标应用程序执行的操作满足预设的上报条件时,将所述操作的内容发送给所述第一终端。
- 根据权利要求4所述的方法,其特征在于,所述当检测到所述目标应用程序执行的操作满足预设的上报条件时,将所述操作的内容发送给所述第一终端,包括:当检测到所述目标应用程序执行预设的第一功能时,将所述第一功能的执行内容发送给所述第一终端。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:接收所述第一终端发送的允许通讯账户列表或禁止通讯账户列表;根据所述允许通讯账户列表或所述禁止通讯账户列表,确定允许通讯的账户;阻止本地账户与所述允许通讯的账户之外的账户进行通讯。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当接收到添加联系人指令时,获取所述添加联系人指令对应的目标账户的属性信息;如果所述目标账户的属性信息满足预设的添加条件,则添加所述目标账户为联系人,如果所述目标账户的属性信息不满足预设的添加条件,则拒绝所述添加联系人指令。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当接收到添加联系人指令时,获取所述添加联系人指令对应的目标账户的账户标识,并向所述第一终端发送携带有所述账户标识的添加联系人请求;当接收到所述第一终端发送的允许消息时,添加所述目标账户为联系人;或者,当接收到所述第一终端发送的拒绝消息时,拒绝所述添加联系人指令。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:显示所述目标应用程序中允许使用的功能之外的其它功能;当接收到所述其它功能中的第二功能的执行指令时,向所述第一终端发送携带有所述 第二功能的标识信息的功能执行请求;当接收到所述第一终端发送的允许消息时,执行所述第二功能;或者,当接收到所述第一终端发送的拒绝消息时,拒绝所述执行指令。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:当预设的触发事件发生时,向所述第一终端发送本地的位置信息或运动线路信息。
- 一种处理儿童模式的装置,其特征在于,所述装置包括:接收模块,用于接收第一终端发送的目标应用程序的允许使用功能列表或禁止使用功能列表;确定模块,用于根据所述允许使用功能列表或所述禁止使用功能列表,确定所述目标应用程序中允许使用的功能;显示模块,用于在所述目标应用程序的儿童模式下,显示所述允许使用的功能。
- 根据权利要求11所述的装置,其特征在于,所述显示模块,还用于:当检测到所述目标应用程序中的待显示内容包括预设的第一字符时,对所述待显示内容中的第一字符进行屏蔽显示处理。
- 根据权利要求11所述的装置,其特征在于,还包括发送模块,用于:当检测到所述目标应用程序中的待显示内容包括预设的第一字符时,将所述待显示内容发送给所述第一终端。
- 根据权利要求11所述的装置,其特征在于,还包括发送模块,用于:当检测到所述目标应用程序执行的操作满足预设的上报条件时,将所述操作的内容发送给所述第一终端。
- 根据权利要求14所述的装置,其特征在于,所述发送模块,用于:当检测到所述目标应用程序执行预设的第一功能时,将所述第一功能的执行内容发送给所述第一终端。
- 根据权利要求11所述的装置,其特征在于,还包括阻止模块,用于:接收所述第一终端发送的允许通讯账户列表或禁止通讯账户列表;根据所述允许通讯账户列表或所述禁止通讯账户列表,确定允许通讯的账户;阻止本地账户与所述允许通讯的账户之外的账户进行通讯。
- 根据权利要求11所述的装置,其特征在于,还包括添加模块,用于:当接收到添加联系人指令时,获取所述添加联系人指令对应的目标账户的属性信息;如果所述目标账户的属性信息满足预设的添加条件,则添加所述目标账户为联系人,如果所述目标账户的属性信息不满足预设的添加条件,则拒绝所述添加联系人指令。
- 根据权利要求11所述的装置,其特征在于,还包括添加模块,用于:当接收到添加联系人指令时,获取所述添加联系人指令对应的目标账户的账户标识,并向所述第一终端发送携带有所述账户标识的添加联系人请求;当接收到所述第一终端发送的允许消息时,添加所述目标账户为联系人;或者,当接 收到所述第一终端发送的拒绝消息时,拒绝所述添加联系人指令。
- 根据权利要求11所述的装置,其特征在于,还包括执行模块,用于:显示所述目标应用程序中允许使用的功能之外的其它功能;当接收到所述其它功能中的第二功能的执行指令时,向所述第一终端发送携带有所述第二功能的标识信息的功能执行请求;当接收到所述第一终端发送的允许消息时,执行所述第二功能;或者,当接收到所述第一终端发送的拒绝消息时,拒绝所述执行指令。
- 根据权利要求11所述的装置,其特征在于,还包括发送模块,用于:当预设的触发事件发生时,向所述第一终端发送本地的位置信息或运动线路信息。
- 一种处理儿童模式的装置,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:接收第一终端发送的目标应用程序的允许使用功能列表或禁止使用功能列表;根据所述允许使用功能列表或所述禁止使用功能列表,确定所述目标应用程序中允许使用的功能;在所述目标应用程序的儿童模式下,显示所述允许使用的功能。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR112015001768A BR112015001768A2 (pt) | 2014-05-30 | 2014-10-22 | método e dispositivo para processamento de modo infantil |
JP2016522256A JP6101866B2 (ja) | 2014-05-30 | 2014-10-22 | こどもモード処理方法、装置、プログラム、及び記録媒体 |
MX2015000617A MX362082B (es) | 2014-05-30 | 2014-10-22 | Metodo y dispositivo para procesar el modo niños. |
KR1020147035953A KR20160001594A (ko) | 2014-05-30 | 2014-10-22 | 어린이 모드 처리 방법, 장치, 프로그램 및 기록매체 |
RU2015102688A RU2628258C2 (ru) | 2014-05-30 | 2014-10-22 | Способ и устройство для обработки детского режима |
US14/597,224 US10003599B2 (en) | 2014-05-30 | 2015-01-15 | Method and terminal device for kid mode |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410240563.8 | 2014-05-30 | ||
CN201410240563.8A CN104063655B (zh) | 2014-05-30 | 2014-05-30 | 一种处理儿童模式的方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/597,224 Continuation US10003599B2 (en) | 2014-05-30 | 2015-01-15 | Method and terminal device for kid mode |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015180384A1 true WO2015180384A1 (zh) | 2015-12-03 |
Family
ID=51551363
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/089217 WO2015180384A1 (zh) | 2014-05-30 | 2014-10-22 | 一种处理儿童模式的方法和装置 |
Country Status (9)
Country | Link |
---|---|
US (1) | US10003599B2 (zh) |
EP (2) | EP2950257A1 (zh) |
JP (1) | JP6101866B2 (zh) |
KR (1) | KR20160001594A (zh) |
CN (1) | CN104063655B (zh) |
BR (1) | BR112015001768A2 (zh) |
MX (1) | MX362082B (zh) |
RU (1) | RU2628258C2 (zh) |
WO (1) | WO2015180384A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194817A (zh) * | 2018-07-25 | 2019-01-11 | 刘鸿强 | 一种数据处理方法及系统 |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10055567B2 (en) | 2014-05-30 | 2018-08-21 | Apple Inc. | Proximity unlock and lock operations for electronic devices |
CN104063655B (zh) | 2014-05-30 | 2019-08-06 | 小米科技有限责任公司 | 一种处理儿童模式的方法和装置 |
US10789642B2 (en) | 2014-05-30 | 2020-09-29 | Apple Inc. | Family accounts for an online content storage sharing service |
CN105701378A (zh) * | 2014-11-24 | 2016-06-22 | 中兴通讯股份有限公司 | 一种终端设备控制方法及装置 |
US9875346B2 (en) * | 2015-02-06 | 2018-01-23 | Apple Inc. | Setting and terminating restricted mode operation on electronic devices |
CN107643977B (zh) * | 2015-03-25 | 2021-04-02 | Oppo广东移动通信有限公司 | 防沉迷的方法及相关产品 |
US10409967B2 (en) * | 2015-06-16 | 2019-09-10 | HAH, Inc. | Method and system for control of computing devices |
CN105119812B (zh) * | 2015-08-26 | 2018-05-18 | 小米科技有限责任公司 | 在聊天界面更改表情符号的方法、装置及终端设备 |
CN105515946B (zh) * | 2015-12-02 | 2019-12-13 | 广东小天才科技有限公司 | 一种添加联系人方法与系统 |
CN105574713A (zh) * | 2016-02-01 | 2016-05-11 | 博学乐教(北京)教育科技有限公司 | 时间行为管理器 |
US10216944B2 (en) * | 2016-03-25 | 2019-02-26 | Getac Technology Corporation | Method for executing access control over electronic device and electronic device capable of executing access control |
CN105740728B (zh) * | 2016-03-30 | 2020-09-29 | 洋浦盒子数码网络科技有限公司 | 移动终端、数据加密或解密方法 |
CN107295495B (zh) * | 2016-03-31 | 2022-03-04 | 中兴通讯股份有限公司 | 主副卡业务订购方法、装置及通信系统 |
CN107305612A (zh) * | 2016-04-25 | 2017-10-31 | 奇酷软件(深圳)有限公司 | 应用程序的管理方法、管理装置和终端 |
CN106503591A (zh) * | 2016-09-30 | 2017-03-15 | 维沃移动通信有限公司 | 一种移动终端媒体数据的屏蔽方法和移动终端 |
EP3349158A1 (en) * | 2017-01-16 | 2018-07-18 | Sony Interactive Entertainment Inc. | Online interaction control method |
US10754986B2 (en) * | 2017-03-24 | 2020-08-25 | Cover Communications, Llc. | Communication device with selectively shared access modes and incoming communication |
CN107103220B (zh) * | 2017-04-11 | 2019-12-03 | 广东小天才科技有限公司 | 一种终端设备的触屏检测方法、装置及终端设备 |
US10558546B2 (en) | 2018-05-08 | 2020-02-11 | Apple Inc. | User interfaces for controlling or presenting device usage on an electronic device |
CN108681427B (zh) * | 2018-05-28 | 2020-06-30 | 维沃移动通信有限公司 | 一种访问权限控制的方法及终端设备 |
CN109672777B (zh) * | 2018-10-29 | 2023-06-02 | 百度在线网络技术(北京)有限公司 | 终端设备控制方法、装置及设备 |
CN109614552A (zh) * | 2018-12-17 | 2019-04-12 | 广东小天才科技有限公司 | 一种引导式搜索方法及引导式搜索系统 |
US11363137B2 (en) | 2019-06-01 | 2022-06-14 | Apple Inc. | User interfaces for managing contacts on another electronic device |
WO2023038884A1 (en) * | 2021-09-08 | 2023-03-16 | Via Science, Inc. | Permissible code analysis |
KR102753272B1 (ko) * | 2022-04-28 | 2025-01-14 | 주식회사 카카오 | 피보호자 계정의 친구 목록을 관리하기 위한 서버 및 서버의 동작 방법 |
US12254330B2 (en) | 2022-05-13 | 2025-03-18 | Samsung Electronics Co., Ltd. | Electronic device and method for controlling execution of application based on execution sequence of applications |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101640765A (zh) * | 2008-07-30 | 2010-02-03 | 深圳市爱美家电子科技有限公司 | 一种电视机遥控器及其工作方法 |
CN101753702A (zh) * | 2008-12-15 | 2010-06-23 | 康佳集团股份有限公司 | 一种移动终端的情景模式实现方法、系统及移动终端 |
CN101764853A (zh) * | 2008-11-21 | 2010-06-30 | 北京携友聚信信息技术有限公司 | 在线通讯录管理伸延服务的方法和系统 |
CN104063655A (zh) * | 2014-05-30 | 2014-09-24 | 小米科技有限责任公司 | 一种处理儿童模式的方法和装置 |
Family Cites Families (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8918840B2 (en) * | 2002-12-26 | 2014-12-23 | Better Dating Bureau, Inc. | Systems and methods for identity-based communication gate for social networks |
GB2396709A (en) | 2002-12-27 | 2004-06-30 | Ttpcomm Ltd | Method of Filtering Messages |
US20050058972A1 (en) * | 2003-08-27 | 2005-03-17 | Mcdole Michael E. | Method for censorship |
GB2406749B (en) | 2003-09-30 | 2007-06-13 | Christopher Paul Giavotto | Mobile communication control system |
US20060259543A1 (en) * | 2003-10-06 | 2006-11-16 | Tindall Paul G | Method and filtering text messages in a communication device |
CN100456705C (zh) * | 2005-09-09 | 2009-01-28 | 刘红健 | 一种互联网多媒体通讯的监视系统及监视方法 |
EP1798659A1 (en) * | 2005-12-19 | 2007-06-20 | Axalto SA | Personal token with parental control |
JP4912946B2 (ja) * | 2006-06-21 | 2012-04-11 | シャープ株式会社 | データ受信装置、サーバ装置、およびそれらの制御方法、制御プログラム、ならびにデータ送受信装置 |
US20080020803A1 (en) | 2006-07-18 | 2008-01-24 | Motorola, Inc. | Methods and devices for restricting access to mobile communication device functionality |
JP4915203B2 (ja) * | 2006-10-16 | 2012-04-11 | 日本電気株式会社 | 携帯端末設定システム、携帯端末設定方法および携帯端末設定プログラム |
US8015174B2 (en) * | 2007-02-28 | 2011-09-06 | Websense, Inc. | System and method of controlling access to the internet |
US7869792B1 (en) * | 2007-03-13 | 2011-01-11 | Sprint Spectrum L.P. | Handset based dynamic parental controls |
US7809797B2 (en) * | 2007-04-06 | 2010-10-05 | Symantec Corporation | Parental control using social metrics system and method |
US20080254767A1 (en) * | 2007-04-10 | 2008-10-16 | Sharp Laboratories Of America, Inc. | System and method for limiting access to features in a mobile telecommunications device |
US8046839B2 (en) * | 2007-04-13 | 2011-10-25 | Qualcomm Incorporated | Mobile unit parental control |
CN201118703Y (zh) * | 2007-06-19 | 2008-09-17 | 华为技术有限公司 | 对通讯终端发送或接收的信息进行过滤的装置 |
US20090197569A1 (en) * | 2008-02-04 | 2009-08-06 | Zobeideh Gaznaghi | System and method for enhancing security for a mobile electronic device operated by a child |
US10460085B2 (en) * | 2008-03-13 | 2019-10-29 | Mattel, Inc. | Tablet computer |
CN101340210A (zh) * | 2008-08-11 | 2009-01-07 | 宇龙计算机通信科技(深圳)有限公司 | 一种多终端捆绑式的通信方法及通信终端 |
EP2377089A2 (en) * | 2008-12-05 | 2011-10-19 | Social Communications Company | Managing interactions in a network communications environment |
CN101901232A (zh) * | 2009-05-31 | 2010-12-01 | 西门子(中国)有限公司 | 用于处理网页数据的方法和装置 |
JP5458816B2 (ja) * | 2009-11-12 | 2014-04-02 | 日本電気株式会社 | 通信管理システム、通信管理方法、通信管理プログラムおよびプログラム記録媒体 |
US8798610B2 (en) * | 2010-03-26 | 2014-08-05 | Intel Corporation | Method and apparatus for bearer and server independent parental control on smartphone, managed by the smartphone |
CN101834949B (zh) | 2010-05-14 | 2013-03-27 | 董家植 | 一种手机智能化应用方案 |
JP2012021851A (ja) * | 2010-07-13 | 2012-02-02 | Kyocera Corp | 携帯端末及び制御方法 |
JP4979800B2 (ja) * | 2010-09-21 | 2012-07-18 | 株式会社コナミデジタルエンタテインメント | ゲームシステム並びにゲーム装置及びこれに用いるゲームプログラム |
US20120158468A1 (en) * | 2010-12-20 | 2012-06-21 | Wheeler Clair F | Method Of Providing Access Management In An Electronic Apparatus |
JP2012216944A (ja) * | 2011-03-31 | 2012-11-08 | Nec Casio Mobile Communications Ltd | 携帯通信端末、通信制御システム及び通信システムの制御方法 |
US20120291102A1 (en) * | 2011-05-09 | 2012-11-15 | Google Inc. | Permission-based administrative controls |
US8718633B2 (en) * | 2011-07-13 | 2014-05-06 | Qualcomm Incorporated | Intelligent parental controls for wireless devices |
US8699998B2 (en) * | 2011-08-10 | 2014-04-15 | Qualcomm Incorporated | Controlling text messages on a mobile device |
US8571538B2 (en) | 2011-08-10 | 2013-10-29 | Qualcomm Incorporated | Web-based parental controls for wireless devices |
KR101828306B1 (ko) | 2011-10-18 | 2018-02-13 | 삼성전자 주식회사 | 휴대 단말기의 운영 방법 및 장치 |
CN103136472B (zh) | 2011-11-29 | 2016-08-31 | 腾讯科技(深圳)有限公司 | 一种防应用程序窃取隐私的方法及移动设备 |
CN103188227A (zh) * | 2011-12-29 | 2013-07-03 | 北京网秦天下科技有限公司 | 一种对移动设备进行家长控制的方法和系统 |
JP5895267B2 (ja) * | 2012-07-31 | 2016-03-30 | ハッピーミール株式会社 | アプリケーションプログラム |
CN103347116A (zh) | 2012-11-09 | 2013-10-09 | 北京深思洛克软件技术股份有限公司 | 一种在智能手机中设置多安全模式的系统和方法 |
CN103108082B (zh) | 2013-01-24 | 2014-06-04 | 北京航空航天大学 | 智能手机多用户模式权限管理方法及权限管理系统 |
CN103442330A (zh) * | 2013-06-28 | 2013-12-11 | 北京小米科技有限责任公司 | 一种位置通知的方法及装置 |
CN103442141B (zh) | 2013-08-27 | 2016-11-16 | 努比亚技术有限公司 | 一键进入安全模式的方法 |
US20150095014A1 (en) * | 2013-09-27 | 2015-04-02 | Cellco Partnership D/B/A Verizon Wireless | Method and apparatus for providing content screening and rating |
-
2014
- 2014-05-30 CN CN201410240563.8A patent/CN104063655B/zh active Active
- 2014-10-22 BR BR112015001768A patent/BR112015001768A2/pt not_active IP Right Cessation
- 2014-10-22 RU RU2015102688A patent/RU2628258C2/ru active
- 2014-10-22 MX MX2015000617A patent/MX362082B/es active IP Right Grant
- 2014-10-22 JP JP2016522256A patent/JP6101866B2/ja active Active
- 2014-10-22 WO PCT/CN2014/089217 patent/WO2015180384A1/zh active Application Filing
- 2014-10-22 KR KR1020147035953A patent/KR20160001594A/ko not_active Ceased
-
2015
- 2015-01-15 US US14/597,224 patent/US10003599B2/en active Active
- 2015-04-07 EP EP15162675.1A patent/EP2950257A1/en not_active Withdrawn
- 2015-04-07 EP EP21177484.9A patent/EP3893182A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101640765A (zh) * | 2008-07-30 | 2010-02-03 | 深圳市爱美家电子科技有限公司 | 一种电视机遥控器及其工作方法 |
CN101764853A (zh) * | 2008-11-21 | 2010-06-30 | 北京携友聚信信息技术有限公司 | 在线通讯录管理伸延服务的方法和系统 |
CN101753702A (zh) * | 2008-12-15 | 2010-06-23 | 康佳集团股份有限公司 | 一种移动终端的情景模式实现方法、系统及移动终端 |
CN104063655A (zh) * | 2014-05-30 | 2014-09-24 | 小米科技有限责任公司 | 一种处理儿童模式的方法和装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194817A (zh) * | 2018-07-25 | 2019-01-11 | 刘鸿强 | 一种数据处理方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
RU2015102688A (ru) | 2016-08-20 |
EP2950257A1 (en) | 2015-12-02 |
JP6101866B2 (ja) | 2017-03-22 |
MX2015000617A (es) | 2016-06-28 |
CN104063655B (zh) | 2019-08-06 |
CN104063655A (zh) | 2014-09-24 |
US10003599B2 (en) | 2018-06-19 |
KR20160001594A (ko) | 2016-01-06 |
MX362082B (es) | 2019-01-07 |
BR112015001768A2 (pt) | 2017-07-04 |
EP3893182A1 (en) | 2021-10-13 |
RU2628258C2 (ru) | 2017-08-15 |
US20150350215A1 (en) | 2015-12-03 |
JP2016527614A (ja) | 2016-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015180384A1 (zh) | 一种处理儿童模式的方法和装置 | |
US10152207B2 (en) | Method and device for changing emoticons in a chat interface | |
CN104506410B (zh) | 即时通讯的方法和装置 | |
US10509540B2 (en) | Method and device for displaying a message | |
US10425403B2 (en) | Method and device for accessing smart camera | |
WO2016192323A1 (zh) | 视频通信方法及装置 | |
US20170289181A1 (en) | Payment method, apparatus and medium | |
WO2017045311A1 (zh) | 短信读取方法及装置 | |
JP6464261B2 (ja) | 応答拡張機能を表示する方法及び装置 | |
US10523494B2 (en) | Method and apparatus for processing network failure | |
WO2017045302A1 (zh) | 信息收集方法和装置 | |
US20180035154A1 (en) | Method, Apparatus, and Storage Medium for Sharing Video | |
WO2016065750A1 (zh) | 事项内容显示方法及装置 | |
CN105898573B (zh) | 多媒体文件播放方法及装置 | |
WO2017219497A1 (zh) | 消息生成方法及装置 | |
CN105708609A (zh) | 用户打鼾的提示方法、装置及系统 | |
CN105511739A (zh) | 消息提醒方法及装置 | |
WO2018049609A1 (zh) | 权限控制方法及装置 | |
CN104360875B (zh) | 隐私模式启动方法和装置 | |
WO2017118046A1 (zh) | 信息发送方法及装置 | |
CN108984098B (zh) | 基于社交软件的信息显示的控制方法及装置 | |
US20160349947A1 (en) | Method and device for sending message | |
US20170201479A1 (en) | Group message display method, device and medium | |
US20160055621A1 (en) | Method and device for transmitting image | |
CN105100135A (zh) | 一种设置网络共享的方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2016522256 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20147035953 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2015/000617 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2015102688 Country of ref document: RU Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14892941 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015001768 Country of ref document: BR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14892941 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 112015001768 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150127 |