Method for Managing Application Program Use Time Offline, and Terminal Device

ABSTRACT

A method for managing an application and a terminal device. The method includes: launching an application in response to an operation on the application received from a user, wherein a time limit is preset for the application, displaying a notification indicating that a use duration of the application reaches the time limit and a time extension is requested at a predetermined moment before the time limit expires, displaying an interface for an identity authentication after the time extension is selected by the user, and extending the use duration of the application when an identity authentication of the user succeeds. Thus the use duration of the application is manageable and controllable.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/336,293, filed on Mar. 25, 2019, which is a U.S. National Stage ofInternational Patent Application No. PCT/CN2016/099991, filed on Sep.24, 2016, both of which are hereby incorporated by reference in theirentireties.

TECHNICAL FIELD

The present invention relates to the field of communicationstechnologies, and in particular, to a method for managing an applicationprogram use time offline, and a terminal device.

BACKGROUND

People spend increasingly longer time on mobile phones. Among theseusers, a group of people do not pay attention to or do not effectivelycontrol application (Application, App) use times, and they have strongrequirements for App time management. For example, when watching videoson a mobile phone, a user plans to browse videos for 10 minutes butactually concentrates his or her attention completely for half an hour.

In addition, a holder of parental responsibility has a requirement forperforming parental control or “content lock” on App use of a child. Ifthe holder of parental responsibility takes along a “key” for unlocking,the “content lock” is more effective.

Currently, a method for managing an APP use time offline is mainly atime control function that a child App has. A specific implementationprocess is as follows: an App has a built-in module for controlling timeranges, within which usually system rights of a mobile phone or a tabletcomputer cannot be obtained. In other words, logic determining cannot beperformed by reading system time.

In the foregoing technical solution, a time control setting of the Appcan be bypassed by modifying the system time. Consequently,effectiveness is relatively low; and in addition, use time control isinflexible.

SUMMARY

In view of this, embodiments of the present invention provide a methodfor managing an application program use time offline, and a terminaldevice, to flexibly and effectively manage an App use time in an offlinescenario.

An embodiment of the present invention provides a method for managing anapplication program use time offline, including:

displaying a desktop after a terminal device is started, and displayingan application icon on the desktop;

starting, after the application icon is clicked, a target applicationprogram corresponding to the application icon;

if the target application program corresponding to the application iconis an application program in which a time control rule is set,performing cumulative timing on actual use duration of the targetapplication program, where the time control rule includes: a durationsetting and an extension setting;

if a difference between the duration setting and the actual use durationis less than a preset threshold, prompting that a time limit isinsufficient; and if the extension setting is set to yes, furtherdisplaying a message to indicate whether time extension is needed; and

if identity authentication is performed after an instruction indicatingthat the time extension is needed, extending a use time if the identityauthentication succeeds; otherwise, quitting and locking the targetapplication program after the actual use duration reaches the durationsetting.

In the foregoing embodiment, use time management is not all necessarywhen the application icon is displayed on the desktop; time controlrules are set for those applications that need the use time management,and the applications are referred to as target application programs. Inthis embodiment, the cumulative timing should be understood as acumulative time for which the target application program is used. Inother words, if the target application program is closed and used again,a total time of previous-time use and this-time use is accumulated. Howto implement the accumulation is not uniquely limited. The identityauthentication is preferentially implemented by using a fingerprintauthentication method, to prevent a time control solution from failingdue to password leakage. The extension setting is a setting forextending the use time, and may usually include: resetting the use time,or increasing the duration setting. Any manner can be used, providedthat the manner can enable the use time of the target applicationprogram to be longer. This is not uniquely limited in this embodiment ofthe present invention.

In an optional implementation, the extension setting includes: aresetting setting or a delay setting; and

the extending a use time if the identity authentication succeedsincludes: if the extension setting is the resetting setting, resettingthe cumulative timing after determining that the identity authenticationsucceeds; or if the extension setting is the delay setting, extending atime specified by the duration setting after determining that theidentity authentication succeeds.

In this embodiment, the resetting setting refers to a manner of settingan accumulated time to zero and performing timing again, and the delaysetting means increasing duration for which the target applicationprogram can be used. Use time extension of a user can be convenientlycontrolled. Although the use time is extended, there is a remindertherein. Therefore, an objective of reminding the user to reduce use ofthe target application program can still be achieved. If a person whocurrently uses the target application program is not a person who setsan authentication method, the identity authentication cannot succeed toextend the use time. Therefore, use time control can be implemented. Inthis way, balance is achieved between two different types of users whouse the target application program on the terminal device.

In an optional implementation, the time control rule further includes:an interval setting; and

before the starting, after the application icon is clicked, a targetapplication program corresponding to the application icon, the methodfurther includes:

determining whether a time interval between a this-time start moment anda last-time close moment of the target program complies with theinterval setting, and if yes, performing the starting, after theapplication icon is clicked, a target application program correspondingto the application icon; or if not, displaying prompt information ofcountdown whose start point is the difference between the durationsetting and the actual use duration.

In this embodiment, it is further set that the time control ruleincludes the interval setting. This is because a relatively shortduration setting may be set for some target application programs, andfrequent use of these target application programs needs to be avoided.Therefore, adding the interval setting can achieve a relatively goodeffect.

In an optional implementation, this embodiment of the present inventionfurther provides a time control rule setting solution, specifically asfollows: before the starting, after the application icon is clicked, atarget application program corresponding to the application icon, themethod further includes:

displaying an application program management and setting interface, anddisplaying an application list after a user is authenticated;

receiving the target application program selected by the user, andreceiving the time control rule for the target program; and

displaying the time control rule for the target application in a displayarea of the application icon in the application list.

In an optional implementation, this embodiment of the present inventionfurther provides an implementation solution that is based on differentmanagement interface start scenarios and that use different controlpolicies, as follows: the displaying an application program managementand setting interface, and displaying an application list after a useris authenticated includes:

displaying an application program management interface after receivingan application time management instruction on the setting and managementinterface; if this time is the first time for starting the applicationprogram management interface, directly displaying the application list,and receiving an authentication setting; or if this time is not thefirst time for starting the application program management interface,authenticating the user by using a method specified by theauthentication setting, and displaying the application list after theuser is authenticated.

In an optional implementation, in this embodiment of the presentinvention, fingerprint authentication may be preferably used, to preventa case in which a use password is stolen. In addition, in thefingerprint authentication, fingerprints of different fingers may beset, and usually the fingers may be fingers that are not frequentlyused, specifically as follows: the authentication setting includes thefingerprint authentication; and

the fingerprint authentication includes: setting fingerprintauthentication for a finger.

In an optional implementation, this embodiment of the present inventionfurther provides an implementation solution in which the desktop isdisplayed and then the application program management interface isdisplayed in an application scenario of setting the time control rulefor the first time, as follows: if this time is the first time forstarting the application program management interface, directlydisplaying the application list, and receiving an authenticationsetting, the method further includes:

displaying a lock screen interface after the terminal device is started,and after lock screen authentication succeeds, performing the displayinga desktop after a terminal device is started.

In an optional implementation, this embodiment of the present inventionfurther provides an implementation solution in which the time controlrule is conveniently viewed on the application icon displayed on thedesktop, as follows: the displaying an application icon on the desktopincludes:

displaying an annotation identifier on the application icon if theapplication icon is the icon corresponding to the target applicationprogram for which the time control rule is set; and

displaying the time control rule if receiving an instruction forclicking the annotation identifier.

According to a second aspect, an embodiment of the present inventionfurther provides a terminal device, including:

a display unit, configured to: display a desktop after the terminaldevice is started, and display an application icon on the desktop;

an application control unit, configured to start, after the applicationicon is clicked, a target application program corresponding to theapplication icon;

a timing unit, configured to: if the target application programcorresponding to the application icon is an application program in whicha time control rule is set, perform cumulative timing on actual useduration of the target application program, where the time control ruleincludes: a duration setting and an extension setting; and

a prompt unit, configured to: if a difference between the durationsetting and the actual use duration is less than a preset threshold,prompt that a time limit is insufficient; and if the extension settingis set to yes, further display a message to indicate whether timeextension is needed, where

the application control unit is further configured to: if identityauthentication is performed after an instruction indicating that thetime extension is needed, extend a use time if the identityauthentication succeeds; otherwise, quit and lock the target applicationprogram after the actual use duration reaches the duration setting.

In an optional implementation, the extension setting includes: aresetting setting or a delay setting; and

that the application control unit is configured to extend the use timeif the identity authentication succeeds includes: if the extensionsetting is the resetting setting, resetting the cumulative timing afterdetermining that the identity authentication succeeds; or if theextension setting is the delay setting, extending a time specified bythe duration setting after determining that the identity authenticationsucceeds.

In an optional implementation, the time control rule further includes:an interval setting; and

the application control unit is further configured to: before starting,after the application icon is clicked, the target application programcorresponding to the application icon, determine whether a time intervalbetween a this-time start moment and a last-time close moment of thetarget program complies with the interval setting, and if yes, performthe starting, after the application icon is clicked, the targetapplication program corresponding to the application icon; or if not,control the display unit to display prompt information of countdownwhose start point is the difference between the duration setting and theactual use duration.

In an optional implementation, the display unit is further configuredto: before the target application program corresponding to theapplication icon is started after the application icon is clicked,display an application program management and setting interface, anddisplay an application list after a user is authenticated;

the terminal device further includes:

a receiving unit, configured to: receive the target application programselected by the user, and receive the time control rule for the targetprogram; and

the display unit is further configured to display the time control rulefor the target application in a display area of the application icon inthe application list.

In an optional implementation, that the display unit is configured to:display the application program management and setting interface, anddisplay the application list after the user is authenticated includes:displaying an application program management interface after receivingan application time management instruction on the setting and managementinterface; if this time is the first time for starting the applicationprogram management interface, directly displaying the application list,and receiving an authentication setting; or if this time is not thefirst time for starting the application program management interface,authenticating the user by using a method specified by theauthentication setting, and displaying the application list after theuser is authenticated.

In an optional implementation, the authentication setting includesfingerprint authentication; and

the fingerprint authentication includes: setting fingerprintauthentication for a finger.

In an optional implementation, the display unit is further configuredto: before the if this time is the first time for starting theapplication program management interface, directly displaying theapplication list, and receiving an authentication setting, display alock screen interface after the terminal device is started, and afterlock screen authentication succeeds, perform the displaying a desktop.

In an optional implementation, that the display unit is configured todisplay the application icon on the desktop includes:

displaying an annotation identifier on the application icon if theapplication icon is the icon corresponding to the target applicationprogram for which the time control rule is set; and displaying the timecontrol rule if receiving an instruction for clicking the annotationidentifier.

It can be seen from the foregoing technical solutions that, there arethe following advantages: the time control rule is set for the targetapplication program, the time control rule includes the duration settingand the extension setting, and timing is performed in a cumulative timemanner, avoiding a problem that security is relatively low due to use ofsystem time. When the duration setting is used, not only use of the useris easy, but also the use time can be controlled. In addition, when anextension setting manner is used, on one hand, a target application usetime of an unauthenticated user is limited, and on the other hand,normal use of an authenticated user is ensured and the authenticateduser is reminded of use duration. In addition, a time control rule maybe separately and independently set for each target application program.Therefore, the App use time may be flexibly and effectively managed inthe offline scenario.

BRIEF DESCRIPTION OF DRAWINGS

To describe the technical solutions in the embodiments of the presentinvention more clearly, the following briefly describes the accompanyingdrawings required for describing the embodiments. Apparently, theaccompanying drawings in the following description show merely someembodiments of the present invention, and a person of ordinary skill inthe art may derive other drawings from these accompanying drawingswithout creative efforts.

FIG. 1 is a schematic diagram of a system architecture according to anembodiment of the present invention;

FIG. 2 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 3 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 4 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 5 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 6 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 7 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 8 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 9 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 10 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 11 is a schematic diagram of an operation interface according to anembodiment of the present invention;

FIG. 12 is a schematic flowchart of a method according to an embodimentof the present invention;

FIG. 13 is a schematic flowchart of a method according to an embodimentof the present invention;

FIG. 14 is a schematic structural diagram of a terminal device accordingto an embodiment of the present invention;

FIG. 15 is a schematic structural diagram of a terminal device accordingto an embodiment of the present invention;

FIG. 16 is a schematic structural diagram of a terminal device accordingto an embodiment of the present invention; and

FIG. 17 is a schematic structural diagram of a terminal device accordingto an embodiment of the present invention.

DESCRIPTION OF EMBODIMENTS

To make the objectives, technical solutions, and advantages of thepresent invention clearer, the following further describes the presentinvention in detail with reference to the accompanying drawings.Apparently, the described embodiments are merely some rather than all ofthe embodiments of the present invention. All other embodiments obtainedby a person of ordinary skill in the art based on the embodiments of thepresent invention without creative efforts shall fall within theprotection scope of the present invention.

The embodiments of the present invention provide a solution in which ause time of any App on a terminal device is freely managed andcontrolled by using an App time manager (App Time Manager, ATM) when noconnection to the Internet is needed. Absolute App use duration andabsolute interval duration are used as timing standards, to avoid that asystem time change bypasses management and control. ATM managementrights authentication may invoke a system lock screen password. For adevice with fingerprint support, using a system-specific fingerprint asan authentication credential is more recommended, so that a problem of aholder of parental responsibility that a mobile phone lock screenpassword is easy to be leaked is resolved.

In the following embodiment, an App used in a mobile phone is used as anexample for description. It can be understood that, the technicalsolutions in the embodiments of the present invention may further beapplied to another terminal device other than the mobile phone, forexample, a personal computer, a tablet computer, or another terminaldevice. The following embodiments respectively describe the followingaspects in detail:

1. As shown in FIG. 1, a system structure in the embodiments of thepresent invention includes:

an ATM rights setting, an App foreground run timing module, an App timemanagement module, an App time limit prompt module, an App lock module,and a privilege control module, where

the ATM rights setting is used as an input portion of the systemstructure;

the App time limit prompt module is an output control module, andoutputs prompt information, including: an alarm, a pop-up window,automatic lock screen prompt, and the like; and

the App lock module is a processing result of time control, including:quitting a running App, lock time prompt, or the like.

2. The modules in the system structure shown in FIG. 1 are described indetail as follows:

App foreground run timing module: periodically reporting a run timeslice of a foreground App;

App time management module: adding, deleting, changing, and checking amanaged App and a management manner, and storing an App cumulative usetime;

App time limit prompt module: invoking an alarm clock interface; andproviding material management of a lock screen interface;

App lock module: invoking an App program quitting interface; starting anApp lock program; and prompting that a use time exceeds a limit and isunavailable;

ATM rights setting: initiating a rights setting; and

privilege control module: authenticating rights, intervening with an Appthat performs time management, and providing a resetting or delayfunction.

3. An example of a key procedure that is based on a user side:

Step 1:

As shown in FIG. 2, a user starts a mobile phone, displays all settingand management interfaces of the mobile phone, and finds a menu “Apptime manager”, as shown by an ATM entry marked in FIG. 2.

Step 2:

In first-time use, as shown in FIG. 3, the user may directly display arights module management page to perform rights setting; andspecifically may select a rights control manner through switch control.For a device with a fingerprint, fingerprint authentication isrecommended. Both the fingerprint authentication and digital passwordauthentication may be implemented by invoking a module related to amobile phone system.

If the user switches on a fingerprint switch, a selection dialog boxpops up, and then the user selects a specific fingerprint, as shown inFIG. 4.

Step 3:

As shown in FIG. 5, an ATM page is displayed, and after “App management”is selected, an ATM application management interface of the mobile phoneis displayed as shown in FIG. 6. An App application list is displayed,and the user clicks App 1 to display a management and setting page of anApp 1. FIG. 7 shows an ATM setting of the App 1.

Step 4:

An App time control rule is set. Using an App 1 in the following figureas an example, for the duration and the interval, values need to be set,and time units need to be selected. For the selection of resettingprompt and delay prompt, only “Yes” and “No” options are provided.

The time control rule shown in FIG. 7 includes: a use time of 40minutes, a use interval of 5 minutes, and both the resetting prompt andthe delay prompt are No.

After the setting is completed, the “ATM App management” interface isdisplayed again. The effect is shown in FIG. 8.

On an application icon App 1, “Managed” and content of the time controlrule are displayed.

Step 5:

It is assumed that, after the App 1 setting is managed and used once,display on the desktop of the mobile phone is shown in FIG. 9. In anupper right corner of App 1, a circle A is marked, representing that theApp 1 is managed by an ATM program. The icon is clicked, and ATMinformation, namely, remaining duration and use interval countdown, isdisplayed, as shown in FIG. 10.

Step 6:

As shown in FIG. 11, before an App is quit because a use time expires,resetting or a delay is prompted if the resetting or the delay has beenset for the App. Confirmation or setting needs to be performed afterauthentication.

4. An interaction process related to rights:

In this embodiment, rights interaction includes a process 1 and aprocess 2. The two processes are collateral, and at least one processneeds to be performed. As shown in FIG. 12, the rights interactionincludes:

Process 1: The ATM rights setting invokes the system lock screen module,to set a system password lock screen. A lock screen password may be usedin rights authentication. The system lock screen module returns a resultafter determining that the setting succeeds.

Process 2: The ATM rights setting invokes the system fingerprint module,to set a fingerprint as an authentication credential, and use aspecified fingerprint as an authentication credential.

5. Timing and management interaction:

Using the App 1 as an example, two manners, namely, duration andinterval, are set for a time control rule of the App 1, and theresetting or the delay is set to Yes. As shown in FIG. 13, an App 1 usetime management system interaction process is as follows, including thefollowing steps:

1301: At a moment t1, when the App 1 is used, a terminal displayforeground reports the moment t1.

1302: The foreground run timing module reports a time slice t2−t1 at amoment t2, and transmits a difference to the time management module, andthe time management module records that the App 1 has been used for atime of t2−t1.

1303: Use of the App 1 is quit at a moment t3, and the terminal displayforeground sends t3 to the foreground run timing module; and theforeground run timing module records a quitting time point t3,calculates a difference between t3 and the moment t2 at which the timeslice is reported last time, and transmits the difference to the timemanagement module. In this case, the time management module records thatthe App 1 has been used for a total time of t3−t1.

1304: The App 1 is used again, the terminal display foreground reportst4 to the time management module.

1305: The time management module first determines whether a differencebetween the time at which the use is quit last time and the time ofthis-time use satisfies a time interval setting, that is, whether t4−t3is less than the use interval. If the difference satisfies the timeinterval setting, use is allowed; or if the difference does not satisfythe time interval setting, “Countdown XX minutes XX seconds” isprompted. In this embodiment, it is assumed that the differencesatisfies the time interval setting and a subsequent procedurecontinues.

1306: After the App 1 has been used for a period of time, the foregroundrun timing module reports t5−t4 to the time management module at amoment t5, and the time management module records that a remaining timefor the App 1 is less than T1, and reports this to the time limit promptmodule.

1307: The time limit prompt module displays a pop-up window promptingthat the remaining time of a user is less than T1.

1308: The App 1 is used again for a T1 time, the foreground run timingmodule reports t6−t5 to the time management module at a moment t6, andthe time management module records that a limit is reached, and sends,to the lock module, a message prompting that the remaining time is zero.

1309: The lock module sends a resetting or delay query to the privilegecontrol module, and the privilege control module displays a pop-upwindow prompting the user whether to reset or delay.

1310: A resetting or delay setting requires rights authentication to befirst performed, and after the authentication succeeds, use maycontinue; and if No is selected, an instruction for locking the App 1 isreturned to the lock module, and the lock module locks the App 1 andquits the App 1.

In this embodiment of the present invention, a use time managementmanner may be separately set for each App, to enable management to befreer. This helps a consumer who has weak self-discipline improve acapability of controlling a time spent on an entertaining App. Thisfurther provides a fingerprint “key” for a holder of parentalresponsibility to carry about, to more effectively manage and control atime spent by a child on a mobile device.

An embodiment of the present invention further provides a terminaldevice. As shown in FIG. 14, the terminal device includes:

a display unit 1401, configured to: display a desktop after the terminaldevice is started, and display an application icon on the desktop;

an application control unit 1402, configured to start, after theapplication icon is clicked, a target application program correspondingto the application icon;

a timing unit 1403, configured to: if the target application programcorresponding to the application icon is an application program in whicha time control rule is set, perform cumulative timing on actual useduration of the target application program, where the time control ruleincludes: a duration setting and an extension setting; and

a prompt unit 1404, configured to: if a difference between the durationsetting and the actual use duration is less than a preset threshold,prompt that a time limit is insufficient; and if the extension settingis set to yes, further display a message to indicate whether timeextension is needed, where

the application control unit 1402 is further configured to: if identityauthentication is performed after an instruction indicating that thetime extension is needed, extend a use time if the identityauthentication succeeds; otherwise, quit and lock the target applicationprogram after the actual use duration reaches the duration setting.

Optionally, the extension setting includes: a resetting setting or adelay setting; and

that the application control unit 1402 is configured to extend the usetime if the identity authentication succeeds includes: if the extensionsetting is the resetting setting, resetting the cumulative timing afterdetermining that the identity authentication succeeds; or if theextension setting is the delay setting, extending a time specified bythe duration setting after determining that the identity authenticationsucceeds.

Optionally, the time control rule further includes: an interval setting;and

the application control unit 1402 is further configured to: beforestarting, after the application icon is clicked, the target applicationprogram corresponding to the application icon, determine whether a timeinterval between a this-time start moment and a last-time close momentof the target program complies with the interval setting, and if yes,perform the starting, after the application icon is clicked, the targetapplication program corresponding to the application icon; or if not,control the display unit 1401 to display prompt information of countdownwhose start point is the difference between the duration setting and theactual use duration.

Further, the display unit 1401 is further configured to: before thetarget application program corresponding to the application icon isstarted after the application icon is clicked, display an applicationprogram management and setting interface, and display an applicationlist after a user is authenticated.

As shown in FIG. 15, the terminal device further includes:

a receiving unit 1501, configured to: receive the target applicationprogram selected by the user, and receive the time control rule for thetarget program; and

the display unit 1401 is further configured to display the time controlrule for the target application in a display area of the applicationicon in the application list.

Optionally, that the display unit 1401 is configured to: display theapplication program management and setting interface, and display theapplication list after the user is authenticated includes: displaying anapplication program management interface after receiving an applicationtime management instruction on the setting and management interface; ifthis time is the first time for starting the application programmanagement interface, directly displaying the application list, andreceiving an authentication setting; or if this time is not the firsttime for starting the application program management interface,authenticating the user by using a method specified by theauthentication setting, and displaying the application list after theuser is authenticated.

Optionally, the authentication setting includes fingerprintauthentication; and

the fingerprint authentication includes: setting fingerprintauthentication for a finger.

Further, the display unit 1401 is further configured to: before theapplication is started, if this time is the first time for starting theapplication program management interface, directly displaying theapplication list, and receiving an authentication setting, display alock screen interface after the terminal device is started, and afterlock screen authentication succeeds, perform the displaying a desktop.

Optionally, that the display unit 1401 is configured to display theapplication icon on the desktop includes:

displaying an annotation identifier on the application icon if theapplication icon is the icon corresponding to the target applicationprogram for which the time control rule is set; and displaying the timecontrol rule if receiving an instruction for clicking the annotationidentifier.

An embodiment of the present invention further provides another terminaldevice. As shown in FIG. 16, the terminal device includes: a displayscreen 1601, an input/output device 1602, a processor 1603, and a memory1604. The memory 1604 may be configured to store any data of theterminal device, and may further be configured to provide a cache neededin a process of data processing performed by the processor 1603.

The processor 1603 is configured to control and perform: displaying adesktop after a terminal device is started, and displaying anapplication icon on the desktop; starting, after the application icon isclicked, a target application program corresponding to the applicationicon; if the target application program corresponding to the applicationicon is an application program in which a time control rule is set,performing cumulative timing on actual use duration of the targetapplication program, where the time control rule includes: a durationsetting and an extension setting; if a difference between the durationsetting and the actual use duration is less than a preset threshold,prompting that a time limit is insufficient; and if the extensionsetting is set to yes, further displaying a message to indicate whethertime extension is needed; and if identity authentication is performedafter an instruction indicating that the time extension is needed,extending a use time if the identity authentication succeeds; otherwise,quitting and locking the target application program after the actual useduration reaches the duration setting.

Optionally, the extension setting includes: a resetting setting or adelay setting; and

that the processor 1603 is configured to control and perform: extendingthe use time if the identity authentication succeeds includes: if theextension setting is the resetting setting, resetting the cumulativetiming after determining that the identity authentication succeeds; orif the extension setting is the delay setting, extending a timespecified by the duration setting after determining that the identityauthentication succeeds.

Further, the time control rule further includes: an interval setting;and

the processor 1603 is further configured to control and perform: beforestarting, after the application icon is clicked, the target applicationprogram corresponding to the application icon, determining whether atime interval between a this-time start moment and a last-time closemoment of the target program complies with the interval setting, and ifyes, performing the starting, after the application icon is clicked, thetarget application program corresponding to the application icon; or ifnot, controlling the display unit to display prompt information ofcountdown whose start point is the difference between the durationsetting and the actual use duration.

Further, the processor 1603 is further configured to control andperform: before the target application program corresponding to theapplication icon is started after the application icon is clicked,displaying an application program management and setting interface, anddisplaying an application list after a user is authenticated;

receiving the target application program selected by the user, andreceiving the time control rule for the target program; and

displaying the time control rule for the target application in a displayarea of the application icon in the application list.

Optionally, that the processor 1603 is configured to control andperform: displaying the application program management and settinginterface, and displaying the application list after the user isauthenticated includes:

displaying an application program management interface after receivingan application time management instruction on the setting and managementinterface; if this time is the first time for starting the applicationprogram management interface, directly displaying the application list,and receiving an authentication setting; or if this time is not thefirst time for starting the application program management interface,authenticating the user by using a method specified by theauthentication setting, and displaying the application list after theuser is authenticated.

Optionally, the authentication setting includes fingerprintauthentication; and

the fingerprint authentication includes: setting fingerprintauthentication for a finger.

Further, before that the processor 1603 is configured to control andperform: if this time is the first time for starting the applicationprogram management interface, directly displaying the application list,and receiving an authentication setting, the method further includes:

displaying a lock screen interface after the terminal device is started,and after lock screen authentication succeeds, performing the displayinga desktop after a terminal device is started.

Optionally, that the processor 1603 is configured to control andperform: displaying the application icon on the desktop includes:

displaying an annotation identifier on the application icon if theapplication icon is the icon corresponding to the target applicationprogram for which the time control rule is set; and

displaying the time control rule if receiving an instruction forclicking the annotation identifier.

An embodiment of the present invention further provides another terminaldevice. As shown in FIG. 17, for ease of description, only parts relatedto the embodiments of the present invention are shown. For specifictechnical details that are not disclosed, refer to the method part ofthe embodiments of the present invention. The terminal device may be anyterminal device, including a mobile phone, a tablet computer, a PDA(Personal Digital Assistant, personal digital assistant), a POS (Pointof Sales, point of sales), an in-vehicle computer, or the like. Anexample in which the terminal device is a mobile phone is used:

FIG. 17 is a block diagram of a partial structure of a mobile phonerelated to a terminal device according to an embodiment of the presentinvention. Referring to FIG. 17, the mobile phone includes componentssuch as a radio frequency (Radio Frequency, RF) circuit 1710, a memory1720, an input unit 1730, a display unit 1740, a sensor 1750, an audiocircuit 1760, a wireless fidelity (wireless fidelity, Wi-Fi) module1770, a processor 1780, and a power supply 1790. A person skilled in theart may understand that the structure of the mobile phone shown in FIG.17 does not constitute a limitation on the mobile phone, and the mobilephone may include more or fewer components than those shown in thefigure, or some components may be combined, or different componentarrangements may be used.

The following specifically describes the components of the mobile phonewith reference to FIG. 17.

The RF circuit 1710 may be configured to: receive and send informationand receive and send a signal during a call process. Specifically, theRF circuit receives downlink information from a base station, thendelivers the downlink information to the processor 1780 for processing,and sends related uplink data to the base station. Usually, the RFcircuit 1710 includes, but is not limited to, an antenna, at least oneamplifier, a transceiver, a coupler, a low noise amplifier (Low NoiseAmplifier, LNA), a duplexer, and the like. In addition, the RF circuit1710 may also communicate with a network and another device throughwireless communication. The wireless communication may use anycommunication standard or protocol, which includes, but is not limitedto, a Global System for Mobile Communications (Global System for MobileCommunications, GSM), General Packet Radio Service (General Packet RadioService, GPRS), Code Division Multiple Access (Code Division MultipleAccess, CDMA), Wideband Code Division Multiple Access (Wideband CodeDivision Multiple Access, WCDMA), Long Term Evolution (Long TermEvolution, LTE), an email, a short messaging service (Short MessagingService, SMS), and the like.

The memory 1720 may be configured to store a software program andmodule. The processor 1780 runs the software program and module storedin the memory 1720, to perform various functional applications and dataprocessing of the mobile phone. The memory 1720 may mainly include aprogram storage area and a data storage area. The program storage areamay store an operating system, an application program required by atleast one function (such as a sound playback function and an imagedisplay function), and the like. The data storage area may store data(such as audio data and an address book) created based on use of themobile phone, and the like. In addition, the memory 1720 may include ahigh speed random access memory, and may further include a nonvolatilememory, such as at least one magnetic disk storage device, a flashmemory, or another volatile solid-state storage device.

The input unit 1730 may be configured to receive input digit orcharacter information, and generate keyboard signal input related to auser setting and function control of the mobile phone. Specifically, theinput unit 1730 may include a touch panel 1731 and another input device1732. The touch panel 1731, also referred to as a touchscreen, maycollect a touch operation of a user on or near the touch panel 1731(such as an operation of the user on the touch panel 1731 or near thetouch panel 1731 by using any suitable object or accessory such as afinger or a stylus), and drive a corresponding connection apparatusbased on a preset program. Optionally, the touch panel 1731 may includetwo parts: a touch detection apparatus and a touch controller. The touchdetection apparatus detects a touch position of the user, detects asignal generated by the touch operation, and transfers the signal to thetouch controller. The touch controller receives touch information fromthe touch detection apparatus, converts the touch information into touchpoint coordinates, and sends the touch point coordinates to theprocessor 1780. Moreover, the touch controller can receive and execute acommand sent from the processor 1780. In addition, the touch panel 1731may be implemented into a plurality of types such as a resistive,capacitive, infrared, or surface acoustic wave type touch panel. Inaddition to the touch panel 1731, the input unit 1730 may furtherinclude the another input device 1732. Specifically, the another inputdevice 1732 may include, but is not limited to, one or more of aphysical keyboard, a functional key (such as a volume control key or aswitch key), a trackball, a mouse, and a joystick.

The display unit 1740 may be configured to display information enteredby the user or information provided for the user, and various menus ofthe mobile phone. The display unit 1740 may include a display panel1741. Optionally, the display panel 1741 may be configured by using aliquid crystal display (Liquid Crystal Display, LCD), an organiclight-emitting diode (Organic Light-Emitting Diode, OLED), or the like.Further, the touch panel 1731 may cover the display panel 1741. Afterdetecting a touch operation on or near the touch panel 1731, the touchpanel 1731 transfers the touch operation to the processor 1780, todetermine the type of the touch event. Then, the processor 1780 providesa corresponding visual output on the display panel 1741 according to thetype of the touch event. Although, in FIG. 17, the touch panel 1731 andthe display panel 1741 are used as two separate parts to implement inputand input functions of the mobile phone, in some embodiments, the touchpanel 1731 and the display panel 1741 may be integrated to implement theinput and output functions of the mobile phone.

The mobile phone may further include at least one sensor 1750 such as anoptical sensor, a motion sensor, and other sensors. Specifically, theoptical sensor may include an ambient light sensor and a proximitysensor. The ambient light sensor may adjust luminance of the displaypanel 1741 based on brightness of ambient light. The proximity sensormay switch off the display panel 1741 and/or backlight when the mobilephone is moved to the ear. As one type of motion sensor, anaccelerometer sensor may detect magnitude of accelerations in variousdirections (usually on three axes), may detect magnitude and a directionof the gravity when static, and may be configured to identify anapplication of a mobile phone gesture (such as switchover betweenhorizontal and vertical screens, a related game, and magnetometerposture calibration), a function related to vibration recognition (suchas a pedometer and a knock), and the like. Other sensors such as agyroscope, a barometer, a hygrometer, a thermometer, and an infraredsensor, which may be configured in the mobile phone, are not furtherdescribed herein.

An audio frequency circuit 1760, a speaker 1761, and a microphone 1762may provide an audio interface between the user and the mobile phone.The audio frequency circuit 1760 may convert received audio data into anelectrical signal and transmit the electrical signal to the speaker1761. The speaker 1761 converts the electrical signal into a soundsignal for output. On the other hand, the microphone 1762 converts acollected sound signal into an electrical signal. The audio frequencycircuit 1760 receives the electrical signal and converts the electricalsignal into audio data, and outputs the audio data to the processor 1780for processing. Then, the processor 1780 sends the audio data to, forexample, another mobile phone by using the RF circuit 1710, or outputsthe audio data to the memory 1720 for further processing.

Wi-Fi is a short-range wireless transmission technology. The mobilephone may help, by using the Wi-Fi module 1770, the user receive andsend e-mails, browse a web page, access streaming media, and so on, andprovides wireless broadband Internet access for the user. Although FIG.17 shows the Wi-Fi module 1770, it may be understood that the Wi-Fimodule is not a necessary component of the mobile phone, and whenrequired, the Wi-Fi module may be omitted, provided that the scope ofthe essence of the present invention is not changed.

The processor 1780 is a control center of the mobile phone, and isconnected to various parts of the mobile phone by using variousinterfaces and lines. By running or executing the software programand/or module stored in the memory 1720, and invoking data stored in thememory 1720, the processor 1780 performs various functions and dataprocessing of the mobile phone, thereby performing overall monitoring onthe mobile phone. Optionally, the processor 1780 may include one or moreprocessing units. Preferably, the processor 1780 may integrate anapplication processor and a modem processor. The application processormainly processes an operating system, a user interface, an applicationprogram, and the like. The modem processor mainly processes wirelesscommunication. It may be understood that the foregoing modem processormay alternatively not be integrated into the processor 1780.

The mobile phone further includes a power supply 1790 (such as abattery) for supplying power to the components. Preferably, the powersupply may be logically connected to the processor 1780 by using a powermanagement system, thereby implementing functions such as charging,discharging, and power consumption management by using the powermanagement system.

Although not shown, the mobile phone may further include a camera, aBluetooth module, and the like, and details are not described herein.

The steps performed by the terminal device in the foregoing embodimentsmay be based on the hardware structure shown in FIG. 17.

It should be noted that, the terminal device division is merely logicalfunction division, but the present invention is not limited to theforegoing division, provided that corresponding functions can beimplemented. In addition, specific names of the functional units aremerely provided for the purpose of distinguishing the units from oneanother, but are not intended to limit the protection scope of thepresent invention.

In addition, a person of ordinary skill in the art may understand thatall or some of the steps of the method embodiments may be implemented bya program instructing relevant hardware. The program may be stored in acomputer readable storage medium. The storage medium may include: aread-only memory, a magnetic disk, or an optical disc.

The foregoing descriptions are merely example implementation manners ofthe present invention, but are not intended to limit the protectionscope of the present invention. Any variation or replacement readilyfigured out by a person skilled in the art within the technical scopedisclosed in the embodiments of the present invention shall fall withinthe protection scope of the present invention. Therefore, the protectionscope of the present invention shall be subject to the protection scopeof the claims.

What is claimed is:
 1. An electronic device, comprising: a display; atleast one processor; and a memory comprising instructions that whenexecuted by the at least one processor, cause the electronic device toperform, at least, the following: launching a first application;displaying a first prompt indicating that a first amount of usage timefor the first application reaches a first time limit preset for thefirst application and locking the first application; launching a secondapplication; displaying a second prompt indicating that a second amountof usage time for the second application reaches a second time limitpreset for the second application and locking the second application;receiving an instruction requesting time extension for the secondapplication; detecting a sequence of digits input on the electronicdevice for password authentication; and extending a time period of thesecond application in response to a determination that the detectedsequence of digits corresponds to a preset password.
 2. The electronicdevice according to claim 1, wherein the instructions, when executed bythe at least one processor, further cause the electronic device toperform: displaying an application time management interface comprisinga rights setting option and an application management option; receivinga first input for selecting the rights setting option; receiving, aftersaid selecting the rights setting option, the preset password based on asecond input; receiving a third input for selecting the applicationmanagement option; displaying, in response to said selecting theapplication management option, a plurality of applications installed inthe electronic device; receiving a fourth input for selecting the firstapplication from the plurality of applications; receiving, after saidselecting the first application, the first time limit for the firstapplication; receiving a fifth input for selecting the secondapplication from the plurality of applications; and receiving, aftersaid selecting the first application, the second time limit for thesecond application.
 3. The electronic device according to claim 1,wherein the instructions, when executed by the at least one processor,further cause the electronic device to perform displaying a third promptwhen a difference between the first time limit and the first amount ofusage time is less than or equal to a preset threshold.
 4. Theelectronic device according to claim 1, wherein the extending the timeperiod of the second application comprises extending the time period ofthe second application by a predetermined time.
 5. The electronic deviceaccording to claim 1, wherein the instructions, when executed by the atleast one processor, further cause the electronic device to performdisplaying a first icon corresponding to the first application bychanging a visual appearance of the first icon when the first amount ofusage time reaches the first time limit.
 6. The electronic deviceaccording to claim 1, wherein the extending the time period of thesecond application comprises resetting a use duration for the secondapplication.
 7. The electronic device according to claim 1, wherein aninterval is preset for the second application, and wherein theinstructions, when executed by the at least one processor, further causethe electronic device to perform determining that a duration between acurrent moment of said launching the second application and a previousmoment of closing the second application complies with the intervalbefore performing said launching the second application.
 8. Theelectronic device according to claim 1, wherein the instructions, whenexecuted by the at least one processor, further cause the electronicdevice to perform displaying a first identifier on a first iconcorresponding to the first application to indicate that the first timelimit is set for the first application.
 9. The electronic deviceaccording to claim 8, wherein the instructions, when executed by the atleast one processor, further cause the electronic device to performdisplaying the first time limit based on a sixth input on the firstidentifier.
 10. A method for an electronic device, comprising: launchinga first application; displaying a first prompt indicating that a firstamount of usage time for the first application reaches a first timelimit preset for the first application and locking the firstapplication; launching a second application; displaying a second promptindicating that a second amount of usage time for the second applicationreaches a second time limit preset for the second application andlocking the second application; receiving an instruction requesting timeextension for the second application; detecting a sequence of digitsinput on the electronic device for password authentication; andextending a time period of the second application in response to adetermination that the detected sequence of digits corresponds to apreset password.
 11. The method according to claim 10, furthercomprising: displaying an application time management interfacecomprising a rights setting option and an application management option;receiving a first input for selecting the rights setting option;receiving, after said selecting the rights setting option, the presetpassword based on a second input; receiving a third input for selectingthe application management option; displaying, in response to saidselecting the application management option, a plurality of applicationsinstalled in the electronic device; receiving a fourth input forselecting the first application from the plurality of applications;receiving, after said selecting the first application, the first timelimit for the first application; receiving a fifth input for selectingthe second application from the plurality of applications; andreceiving, after said selecting the first application, the second timelimit for the second application.
 12. The method according to claim 10,further comprising: displaying a third prompt when a difference betweenthe first time limit and the first amount of usage time is less than orequal to a preset threshold.
 13. The method according to claim 10,wherein the extending the time period of the second applicationcomprises extending the time period of the second application by apredetermined time.
 14. The method according to claim 10, wherein theextending the time period of the second application comprises resettinga use duration for the second application.
 15. The method according toclaim 10, further comprising: displaying a first icon corresponding tothe first application by changing a visual appearance of the first iconwhen the first amount of usage time reaches the first time limit. 16.The method according to claim 10, wherein an interval is preset for thesecond application, and wherein the method further comprises:determining that a duration between a current moment of said launchingthe second application and a previous moment of closing the secondapplication complies with the interval before performing said launchingthe second application.
 17. The method according to claim 10, furthercomprising: displaying a first identifier on a first icon correspondingto the first application to indicate that the first time limit is setfor the first application.
 18. The method according to claim 17, furthercomprising: displaying the first time limit based on a sixth input onthe first identifier.
 19. The method according to claim 10, wherein thefirst prompt and the second prompt are displayed in a form of a pop-upwindow.
 20. A non-transitory computer readable medium includinginstructions stored thereon, which, when executed by at least oneprocessor, cause an electronic device to perform the following:launching a first application; displaying a first prompt indicating thata first amount of usage time for the first application reaches a firsttime limit preset for the first application and locking the firstapplication; launching a second application; displaying a second promptindicating that a second amount of usage time for the second applicationreaches a second time limit preset for the second application andlocking the second application; receiving an instruction requesting timeextension for the second application; detecting a sequence of digitsinput on the electronic device for password authentication; andextending a time period of the second application in response todetermination that the detected sequence of digits corresponds to apreset password.