Detailed Description
The technical scheme of the application is further explained by the specific implementation mode in combination with the attached drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The terminal equipment can comprise a smart phone, a tablet personal computer and other equipment with an operating system, if the terminal equipment is lost, people who find the terminal equipment can also charge the terminal equipment through an interface with a uniform format, and then continue to use the terminal equipment, so that charging verification is added to the charging operation of the terminal equipment, and identity verification can be performed on a user who executes the charging operation.
Fig. 1 is a schematic flowchart of a charging management method according to an embodiment of the present disclosure, where the method may be executed by a charging management apparatus, where the apparatus may be implemented by software and/or hardware, and may be generally integrated in a terminal device, or may be integrated in other devices installed with an operating system. As shown in fig. 1, the method includes:
and S110, starting charging verification when the charging operation of the terminal equipment is detected.
The charging operation of the terminal device may be an operation of charging a battery of the terminal device by an external power supply, and the charging operation may be an operation of charging or an operation of performing charging.
The operation to be performed for charging, i.e. the connection between the battery of the terminal device and the external power supply, is ready for establishing, but the charging line is not connected yet. The external power supply can be an external other terminal, a mobile power supply or commercial power. The charging operation may be a wired charging operation or a wireless charging operation. For example, the battery of the terminal device and the external power source may be connected through a charging line, so that the external power source may charge the battery of the terminal device through the charging line. The charging operation may also be a wireless charging operation.
The charging verification may be verification for determining an identity of a user performing a charging operation; the charging verification may be password verification, fingerprint verification, face recognition verification, or the like, and the type of the charging verification may be set according to system setting or user setting, or may be set according to practical application, which is not limited herein. Illustratively, the starting of the charging verification may be displaying a dialog box for receiving information to be verified on a screen of the terminal device.
S111, receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification.
The information to be verified corresponds to the charging verification, and exemplarily, if the charging verification is password verification, the information to be verified is password information input by a user; and if the charging verification is the face identification verification, the information to be verified is a picture shot by the user through a camera of the terminal equipment. Whether the information to be verified passes the charging verification can be judged according to preset verification preset information, and if the information to be verified is matched with the verification preset information, the information to be verified passes the charging verification is determined; otherwise, the information to be verified fails the charging verification, and the verification fails.
Illustratively, if the charging verification is password verification, password information to be verified input by a user is received, the password information to be verified is matched with preset password information, and if the two password information are the same, the password information to be verified is determined to pass the charging verification. And if the two pieces of password information are different, determining that the password information to be verified does not pass the charging verification.
And S112, if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden.
The prohibiting of the charging operation of the terminal device may be disconnecting a charging line, and may include disconnecting a charging line to which a connection has been established, or maintaining an unconnected state of an unconnected charging line. For example, if it is detected that the charging operation of the terminal device is an operation in which the terminal device is performing charging, i.e., the external power supply and the battery of the terminal device have established a connection, the connected charging line may be disconnected. If it is detected that the charging operation of the terminal device is an operation in which the terminal device is about to perform charging, an unconnected state of the unconnected charging line is maintained.
The charging verification is started when the charging operation of the terminal equipment is detected, so that the identity verification of a user who executes the charging operation can be identified, and if the identity of the user is not authenticated, the terminal equipment is forbidden to be charged. Users that are not authenticated may be users that are not trusted by the administrator of the terminal device, e.g., users that the administrator does not have an authorized guest identity; or a person who picks up the terminal device after the administrator loses the terminal device; and may also be a suspect of stealing terminal equipment.
The unauthorized user cannot charge the terminal device, and if the user does not have the authorized visitor identity, the terminal device cannot be charged, so that the management of the charging function of the terminal device by an administrator can be optimized. For example, if the terminal device is a tablet and the administrator is a parent, the parent may set the charging verification in order to avoid their child using the tablet for a long time. When the electric quantity of the terminal equipment is low, a child wants to charge the terminal equipment, the tablet computer cannot be charged due to the fact that charging verification cannot be passed, and then the tablet computer cannot be used continuously, so that management of the charging function of the parent on the terminal equipment can be optimized, and the time of the child using the tablet computer is controlled.
If the terminal equipment is lost, besides the protection of the starting password of the terminal equipment, a layer of verification protection on charging is added when the charging operation is executed, and unauthorized users cannot use the terminal equipment and cannot charge the terminal equipment. By optimizing the management of the charging function of the terminal equipment, the safety of the terminal equipment can be enhanced, unauthorized users cannot illegally acquire the content in the terminal equipment, and the loss of administrators of the terminal equipment is avoided. In addition, the user who finds out the terminal device cannot continue to use the terminal device because the user cannot charge the terminal device, and further, the possibility that the user returns the terminal device to the administrator of the terminal device may be increased.
Optionally, the prohibiting the charging operation of the terminal device may include: and controlling the charging switch module to be switched off. The charging switch module may include a power management Integrated Circuit (IC), and the battery of the terminal device is connected to the external power supply through the power management Integrated Circuit, and is disconnected through the control of the power management Integrated Circuit, so that the external power supply cannot charge the battery of the terminal device through the power management Circuit, thereby controlling the charging function of the terminal device, and optimizing the management of the charging function of the terminal device by a manager.
Correspondingly, if the information to be verified passes the charging verification, the verification is passed, and the charging operation of the terminal equipment is allowed. The operation of charging may be continued or the charging line may be connected.
According to the charging management method provided by the embodiment of the application, when the charging operation of the terminal equipment is detected, the charging verification is started; receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification; and if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden. By adopting the technical scheme, the charging verification can be added to the charging operation of the terminal equipment, so that the management of the charging function of the terminal equipment by an administrator is optimized.
Fig. 2 is a schematic flow chart of another charging management method provided in an embodiment of the present application, where on the basis of the technical solution provided in the embodiment, a charging operation of a terminal device is detected to be optimized, and optionally, as shown in fig. 2, the method includes:
and S120, continuously detecting the charging interface of the terminal equipment.
And S121, starting charging verification when the charging interface is detected to be accessed by a power supply.
The external power supply supplies power to the battery of the terminal equipment through the charging interface, so that when the external power supply is connected to the charging interface of the terminal equipment through continuous detection of the charging interface of the terminal equipment, the charging operation of the terminal equipment is detected at the first time, and then the charging verification can be started at the first time.
The charge interface of the terminal device is continuously detected, and the charge interface of the terminal device can be detected once every preset time. The charging verification can be started when the power supply pin on the charging interface is detected to have a starting potential. The starting potential may be a voltage value at the time of the external power supply being turned on, for example, 3.3V or 5V.
Illustratively, if the charging interface is a Universal Serial Bus (USB) interface, the charge verification is initiated upon detecting an initiating potential on a Bus power (Vbus) pin on the USB interface.
Fig. 3 is a schematic view of a charging management method according to an embodiment of the present application, for example, as shown in fig. 3, one end of a chargingline 01 is being inserted into a charging interface of aterminal device 00, and the other end of the chargingline 01 is connected to an external power supply (not shown). Fig. 4 is a scene schematic diagram of another charging management method provided in the embodiment of the present application, and as shown in fig. 4, one end of a chargingline 01 is inserted into a charging interface of aterminal device 00, and the charging interface establishes connection with an external power supply through the chargingline 01, it is detected that a power supply is connected to the charging interface, and at this time, it may be determined that theterminal device 00 is performing a charging operation, and then charging verification is started. The charging verification shown in fig. 4 is password verification, and aninterface 02 of the charging verification is sent to a screen of theterminal device 00 for displaying, so that a user can input information to be verified through theinterface 02 of the charging verification.
Through the charging interface of the continuous detection terminal equipment and when detecting that the power is accessed on the charging interface, the charging verification is started, the access of an external power supply can be detected at the first time, the charging verification is started quickly, and the operating efficiency of the charging function of the user management terminal equipment is improved.
And S122, receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification.
And S123, if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden.
For the above-mentioned specific implementation of the operations, reference may be made to the above-mentioned related description, and further description is omitted here.
Fig. 5 is a schematic flow chart of another charging management method provided in an embodiment of the present application, where on the basis of the technical solution provided in the embodiment, an operation of continuously detecting a charging interface of a terminal device is optimized, and optionally, as shown in fig. 5, the method includes:
and S130, acquiring the current position of the terminal equipment.
The current position may be a current geographical position of the terminal device, and the current position of the terminal device may be obtained through a positioning module of the terminal device. The Positioning module of the terminal device may be a Global Positioning System (GPS) module, and the position information of the GPS module may be determined through communication between the GPS module and a Positioning satellite, so that the current position of the terminal device may be determined according to the position information.
The current position of the terminal equipment can be determined according to the wireless signals acquired by the terminal equipment; illustratively, the current location of the terminal device may be determined from Wi-Fi (Wireless-Fidelity) signals acquired by the terminal device.
S131, if the current position does not belong to the target range, executing the operation of continuously detecting the charging interface of the terminal equipment.
The target range may be a set of geographical locations where an administrator of the terminal device is frequently present, such as the administrator's company, residence, or friend's house. The frequently-occurring geographic position can be determined through historical position information acquired by a positioning module of the terminal equipment, and then the target range can be determined. The target range may also be determined at the administrator's option.
If the current position does not belong to the target range, namely the current position is not a geographical position frequently appeared by an administrator, and the current environment of the terminal device is possibly an unsafe environment, the operation of continuously detecting the charging interface of the terminal device is executed, so that the charging verification can be further started when the charging interface is detected to have power access. And if the current position of the terminal equipment is judged to be within the geographical position range frequently appearing by the administrator, the charging verification can be determined not to be started in the current environment, the operation of continuously detecting the charging interface of the terminal equipment is not required to be executed, and the power consumption of the terminal equipment is reduced.
And S132, starting charging verification when the charging interface is detected to have power access.
S133, receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification.
And S134, if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden.
For the above-mentioned specific implementation of the operations, reference may be made to the above-mentioned related description, and further description is omitted here.
Fig. 6 is a schematic flow chart of another charging management method provided in an embodiment of the present application, and on the basis of the technical solution provided in any of the above embodiments, as shown in fig. 6, optionally, the method includes:
and S140, starting charging verification when the charging operation of the terminal equipment is detected.
S141, receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification.
And S142, if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden.
For the above-mentioned specific implementation of the operations, reference may be made to the above-mentioned related description, and further description is omitted here.
And S143, starting the charging verification again, returning to execute the operation of receiving the information to be verified input by the user and judging whether the information to be verified passes the charging verification.
The re-initiated charging verification may be performed in the same verification manner as the charging verification described in operation S140; the re-initiated charging verification may also be a different verification manner from the charging verification in operation S140. For example, if the charging verification in operation S140 is a password verification manner and the user fails to pass the charging verification in operation S140 because the user forgets correct password information, the re-enabled charging verification may be selected as another verification manner, such as a face recognition verification manner, so that the identity of the user passes the verification.
If the user performs the charging verification in operation S140, the verification fails due to the misoperation, and if the user needs to restart the charging verification, the user needs to disconnect the connection between the battery of the terminal device and the external power supply to perform the charging verification again, so that inconvenience is brought to the user' S operation, and the user needs to repeatedly plug and unplug the charging wire, so that the loss of the charging wire is accelerated. And through forbidding terminal equipment's the operation of charging after, the charging verification is started again, verifies user's identity again promptly, can take place the maloperation at the user and lead to verifying the failure after, the charging verification is started again, avoids the user to pull out repeatedly and inserts the charging wire, reduces the loss of charging wire.
Optionally, if the number of times of verification failure reaches a set number of times, sending user preset information to a screen of the terminal device for displaying.
The number of times of verification failures includes a verification failure corresponding to the charge verification of operation S140, and a number of times of verification failures corresponding to the charge verification restarted in operation S143. The set number of times may be a system setting or an administrator setting. If the number of times of the verification failure reaches the set number of times, the user who continuously attempts the verification but continuously fails the verification may not be the administrator or the user trusted by the administrator, and further, the user preset information may be sent to a screen of the terminal device for displaying.
The user preset information may be user preset information set by an administrator according to needs of the administrator. Exemplarily, if the terminal device is a tablet computer, the corresponding administrator is a parent, the child wants to use the tablet computer for a long time, and the child continuously tries to perform charging verification because the tablet computer cannot be charged, so that when the number of times of verification failure reaches a set number of times, the user preset information preset by the parent is sent to a screen of the tablet computer to be displayed, and the user preset information can be a text reminding information "little bright and you can not play the tablet computer any more" to prompt and warn the child, thereby further optimizing the management of the terminal device by the administrator.
Optionally, if the number of times of the verification failure reaches the set number of times, the current position of the terminal device may also be obtained, and the current position and the prompt information are sent to the target account of the administrator.
The cloud account can be sent to the administrator, or the mailbox address set by the administrator can be sent to the administrator. Therefore, when the terminal equipment is possibly lost, the current position of the terminal equipment and the prompt message are sent to the administrator, so that the administrator can know that the terminal equipment is possibly lost and track the terminal equipment according to the current position.
Fig. 7 is a schematic flow chart of another charging management method provided in an embodiment of the present application, and on the basis of the technical solution provided in any of the above embodiments, as shown in fig. 7, optionally, the method includes:
and S150, starting charging verification when the charging operation of the terminal equipment is detected.
Reference may be made to the above description for specific embodiments, which are not repeated herein.
And S151, if the information to be verified input by the user is not received within the set time, prohibiting the charging operation of the terminal equipment.
If it is detected that the charging operation of the terminal device is a charging operation, after the charging verification is started, if the user has not input the information to be verified within the set time, the charging operation of the terminal device is prohibited, and the user continues to wait for receiving the information to be verified input by the user until the user inputs the information to be verified, and operation S152 is performed.
And if the information to be verified input by the user passes the charging verification, allowing the charging operation of the terminal equipment, and establishing a charging circuit between the external power supply and the battery of the terminal equipment again by controlling the charging switch module to be closed so as to start the charging function again.
By not receiving the information to be verified input by the user within the set time and prohibiting the charging operation of the terminal equipment, the operation of charging the terminal equipment can be interrupted when the time between the start of the charging verification and the passing of the charging verification by the user is longer than the set time, and the management of the charging function of the terminal equipment by an administrator is further enhanced.
It should be noted that if the to-be-authenticated information input by the user is received within the set time, operation S152 may be directly performed without performing operation S151.
S152, receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification.
S153, if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden.
For the above-mentioned specific implementation of the operations, reference may be made to the above-mentioned related description, and further description is omitted here.
Fig. 8 is a schematic flow chart of another charging management method provided in an embodiment of the present application, and on the basis of the technical solution provided in any of the above embodiments, as shown in fig. 8, optionally, the method includes:
and S160, detecting the charging operation of the terminal equipment, and starting charging verification.
S161, receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification.
And S162, if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden.
For the above-mentioned specific implementation of the operations, reference may be made to the above-mentioned related description, and further description is omitted here.
Reference may be made to the above description for specific embodiments, which are not repeated herein.
And S163, receiving a charging control command sent by the target remote terminal.
And S164, determining whether to allow the charging operation of the terminal equipment according to the charging control instruction.
The charging control command comprises a charging permission command or a charging prohibition command. And if the charging control instruction comprises a charging prohibition instruction, interrupting the charging operation of the terminal equipment according to the charging control instruction.
And if the charging control instruction comprises a charging allowing instruction, allowing the charging operation of the terminal equipment according to the charging control instruction.
The target remote terminal is another terminal authorized by an administrator of the terminal device, and illustratively, the administrator sends the charging control instruction on the other terminal through an administrator account of the administrator.
Optionally, before receiving the control instruction sent by the target remote end, the method further includes: and sending a charging request instruction to the target remote terminal. For example, after the user who performs the charging operation on the terminal device, the user sees the charging verification displayed on the terminal device, and the user does not know what the accurate verification information is, and cannot pass the charging verification, so the user can send a charging request instruction to the target remote terminal through the terminal device after the verification fails. And the administrator of the terminal equipment determines whether to send the charging control instruction or not according to the charging control instruction received by the target remote terminal.
For another example, the charging verification of the terminal device is face recognition or fingerprint recognition, when the administrator is not beside the terminal device, and the administrator must pass the charging verification only by the face image of the administrator or the fingerprint information of the administrator, so that the user trusted by the administrator cannot pass the charging verification even though the user obtains the trust of the administrator, at this time, the user can send a charging request instruction to the target remote end through the terminal device, the administrator receives the charging request instruction through the target remote end, the administrator can allow the charging operation of the terminal device through the charging permission instruction sent by the target remote end, and the user trusted by the administrator can continue to use the terminal device.
Optionally, the user may also select to communicate with the administrator through telephone communication or other manners instead of sending the charging request instruction to the target remote end through the terminal device, and the administrator may directly send the charging control instruction to the terminal device through the target remote end.
The administrator can remotely send a charging control instruction after the user fails to verify, and control to allow or interrupt the charging operation of the terminal device. Therefore, the administrator can conveniently control the charging function of the terminal device from the target remote end, and the management of the administrator on the charging function of the terminal device is further optimized.
Alternatively, operation S163 may be implemented before operation S161, and operation S163 may be implemented as a step parallel to operation S161, that is, after the charging operation of the terminal device is detected and the charging verification is started, the terminal device may wait to receive the information to be verified input by the user, and may also receive the charging control instruction sent by the target remote end. Namely, the administrator can actively send the charging control instruction to the terminal device through the target remote terminal, and the charging function of the terminal device can be actively and remotely managed by the administrator.
For example, the administrator is in a company and wants to control the terminal device in the home to charge, so that the administrator can use the terminal device with sufficient power when returning home; the administrator can send a charging control instruction to the terminal device at home through the management account logged in the smart phone of the administrator, so that the terminal device executes the charging operation. The information to be verified input by the user passes the charging verification, or the charging permission instruction sent by the target remote terminal is received, so that the terminal equipment can be controlled to be permitted to execute the charging operation.
Fig. 9 is a block diagram of a charging management apparatus according to an embodiment of the present application, where the charging management apparatus may execute a charging management method, and as shown in fig. 9, the charging management apparatus includes:
a chargingverification module 210, configured to start charging verification when a charging operation of the terminal device is detected;
theverification judging module 211 is configured to receive information to be verified input by a user, and judge whether the information to be verified passes the charging verification;
and the chargingcontrol module 212 is configured to disable the charging operation of the terminal device if the to-be-verified information fails the charging verification.
The charging management device provided in the embodiment of the application starts charging verification when the charging operation of the terminal equipment is detected; receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification; and if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden. By adopting the technical scheme, the charging verification can be added to the charging operation of the terminal equipment, so that the management of the charging function of the terminal equipment by an administrator is optimized.
Optionally, the charging verification module includes:
the interface detection unit is used for continuously detecting a charging interface of the terminal equipment;
and the verification starting unit is used for starting charging verification when detecting that the power supply is connected to the charging interface.
Optionally, the interface detecting unit includes:
a position obtaining subunit, configured to obtain a current position of the terminal device;
and the interface detection subunit is used for executing the operation of continuously detecting the charging interface of the terminal equipment if the current position does not belong to the target range.
Optionally, the method further comprises:
and the re-authentication module is used for re-starting the charging authentication after the charging of the terminal equipment is forbidden, returning and executing the information to be authenticated input by the receiving user, and judging whether the information to be authenticated passes the operation of the charging authentication.
Optionally, the method further comprises:
and the display module is used for sending the preset information of the user to a screen of the terminal equipment for displaying if the times of verification failure reach the set times.
Optionally, the method further comprises:
and the time judgment module is used for forbidding the charging operation of the terminal equipment if the information to be verified input by the user is not received within the set time after the charging verification is started.
Optionally, the method further comprises:
the remote receiving module is used for receiving a charging control instruction sent by a target remote terminal after the charging operation of the terminal equipment is forbidden;
and the remote control module is used for determining whether to allow the charging operation of the terminal equipment according to the charging control instruction.
The storage medium containing the computer-executable instructions provided by the embodiments of the present application is not limited to the charging management operation described above, and may also perform related operations in the charging management method provided by any embodiments of the present application.
Embodiments of the present application also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a method of charging management, the method comprising:
starting charging verification when the charging operation of the terminal equipment is detected;
receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification;
and if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
The embodiment of the application provides a terminal device, and the charging management device provided by the embodiment of the application can be integrated in the terminal device.
Fig. 10 is a schematic structural diagram of a terminal device according to an embodiment of the present application, and the embodiment of the present application provides aterminal device 30, which includes amemory 31, aprocessor 32, and a computer program stored in thememory 31 and executable on the processor, where the processor executes the computer program to implement the charging management method according to the foregoing embodiment. The terminal device provided by the embodiment of the application can add charging verification to the charging operation of the terminal device so as to optimize the management of the charging function of the terminal device by an administrator.
Fig. 11 is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 11, the terminal device may include: a casing (not shown), a touch screen (not shown), touch keys (not shown), amemory 301, a Central Processing Unit (CPU) 302 (also called a processor, hereinafter referred to as CPU), a circuit board (not shown), and a power circuit (not shown). The circuit board is arranged in a space enclosed by the shell; the CPU302 and thememory 301 are disposed on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the terminal equipment; thememory 301 is used for storing executable program codes; the CPU302 executes a computer program corresponding to the executable program code by reading the executable program code stored in thememory 301 to implement the steps of:
starting charging verification when the charging operation of the terminal equipment is detected;
receiving information to be verified input by a user, and judging whether the information to be verified passes the charging verification;
and if the information to be verified does not pass the charging verification, the verification fails, and the charging operation of the terminal equipment is forbidden.
The terminal device further includes:peripheral interface 303, RF (Radio Frequency)circuitry 305,audio circuitry 306,speakers 311,power management chip 308, input/output (I/O)subsystems 309,touch screen 312, other input/control devices 310, andexternal ports 304, which communicate via one or more communication buses orsignal lines 307.
It should be understood that the illustratedterminal device 300 is only one example of a terminal device, and that theterminal device 300 may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The following describes in detail the terminal device for implementing charging management provided in this embodiment, where the terminal device is a mobile phone as an example.
Amemory 301, thememory 301 being accessible by a CPU302, aperipheral interface 303, or the like, thememory 301 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other volatile solid state storage devices.
Aperipheral interface 303, saidperipheral interface 303 being capable of connecting input and output peripherals of the device to the CPU302 and thememory 301.
I/O subsystem 309, the I/O subsystem 309 may connect input and output peripherals on the device, such astouch screen 312 and other input/control devices 310, to theperipheral interface 303. The I/O subsystem 309 may include adisplay controller 3091 and one ormore input controllers 3092 for controlling other input/control devices 310. Where one ormore input controllers 3092 receive electrical signals from or send electrical signals to other input/control devices 310, the other input/control devices 310 may include physical buttons (push buttons, rocker buttons, etc.), dials, slide switches, joysticks, click wheels. It is noted that theinput controller 3092 may be connected to any of the following: a keyboard, an infrared port, a USB interface, and a pointing device such as a mouse.
Atouch screen 312, whichtouch screen 312 is an input interface and an output interface between the user terminal device and the user, displays visual output to the user, which may include graphics, text, icons, video, and the like.
Thedisplay controller 3091 in the I/O subsystem 309 receives electrical signals from thetouch screen 312 or transmits electrical signals to thetouch screen 312. Thetouch screen 312 detects a contact on the touch screen, and thedisplay controller 3091 converts the detected contact into an interaction with a user interface object displayed on thetouch screen 312, i.e., implements a human-machine interaction, and the user interface object displayed on thetouch screen 312 may be an icon for running a game, an icon networked to a corresponding network, or the like. It is worth mentioning that the device may also comprise a light mouse, which is a touch sensitive surface that does not show visual output, or an extension of the touch sensitive surface formed by the touch screen.
TheRF circuit 305 is mainly used to establish communication between the mobile phone and the wireless network (i.e., the network side), and implement data reception and transmission between the mobile phone and the wireless network. Such as sending and receiving short messages, e-mails, etc. In particular, theRF circuitry 305 receives and transmits RF signals, also referred to as electromagnetic signals, through which theRF circuitry 305 converts electrical signals to or from electromagnetic signals and communicates with communication networks and other devices.RF circuitry 305 may include known circuitry for performing these functions including, but not limited to, an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC (CODEC) chipset, a Subscriber Identity Module (SIM), and so forth.
Theaudio circuit 306 is mainly used to receive audio data from theperipheral interface 303, convert the audio data into an electric signal, and transmit the electric signal to thespeaker 311.
And aspeaker 311 for converting the voice signal received by the handset from the wireless network through theRF circuit 305 into sound and playing the sound to the user.
And thepower management chip 308 is used for supplying power and managing power to the hardware connected with the CPU302, the I/O subsystem, and the peripheral interface.
The terminal device provided by the embodiment of the application can add charging verification to the charging operation of the terminal device so as to optimize the management of the charging function of the terminal device by an administrator.
The charging management device, the storage medium and the terminal device provided in the above embodiments may execute the charging management method provided in any embodiment of the present application, and have corresponding functional modules and beneficial effects for executing the method. For the technical details not described in detail in the above embodiments, reference may be made to the charging management method provided in any embodiment of the present application.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.