CN107797841B - Window control method and device, terminal equipment and storage medium - Google Patents

Window control method and device, terminal equipment and storage medium Download PDF

Info

Publication number
CN107797841B
CN107797841B CN201711165654.XA CN201711165654A CN107797841B CN 107797841 B CN107797841 B CN 107797841B CN 201711165654 A CN201711165654 A CN 201711165654A CN 107797841 B CN107797841 B CN 107797841B
Authority
CN
China
Prior art keywords
event
interface window
pop
user
window pop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711165654.XA
Other languages
Chinese (zh)
Other versions
CN107797841A (en
Inventor
林志泳
杜冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711165654.XA priority Critical patent/CN107797841B/en
Publication of CN107797841A publication Critical patent/CN107797841A/en
Application granted granted Critical
Publication of CN107797841B publication Critical patent/CN107797841B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application discloses a window control method, a window control device, terminal equipment and a storage medium, wherein the method comprises the steps of starting an bulletproof window mode according to a received user operation instruction; when an interface window pop-up event is detected, acquiring data information associated with the interface window pop-up event; and if the interface window popup event is determined to be not triggered by the user according to the data information, the response to the interface window popup event is forbidden, so that the influence of the popup window on the user is reasonably and effectively avoided, the user operation is simplified, the operating efficiency of the terminal equipment is improved, and the power consumption of the terminal equipment is reduced.

Description

Window control method and device, terminal equipment and storage medium
Technical Field
The present disclosure relates to computer technologies, and in particular, to a window control method and apparatus, a terminal device, and a storage medium.
Background
With the increase of the popularity of the terminal devices, more and more users use the terminal devices to execute various functions to meet their own needs, such as reading text, watching video, listening to music, playing games, etc., and with the continuous powerful functions of the terminal devices, various system applications and third-party application programs installed therein are also increasing.
In the prior art, an application program installed on the terminal equipment pops up a window under the condition that a user is unaware of the application program, so that the use of the user is influenced, the window control mode of the existing terminal interface has defects, the operation complexity of the user is increased, the processing efficiency of the terminal equipment is reduced, and the power consumption is improved.
Disclosure of Invention
The invention provides a window control method, a window control device, terminal equipment and a storage medium, which reasonably and effectively avoid the influence of a popup window on a user, simplify the operation of the user, improve the operation efficiency of the terminal equipment and reduce the power consumption of the terminal equipment.
In a first aspect, an embodiment of the present application provides a window control method, including:
opening an bulletproof window mode according to a received user operation instruction;
when an interface window pop-up event is detected, acquiring data information associated with the interface window pop-up event;
and if the interface window pop-up event is determined to be not triggered by the user according to the data information, prohibiting the response of the interface window pop-up event.
In a second aspect, an embodiment of the present application further provides a window control apparatus, including:
the protection opening module is used for opening the bulletproof window mode according to the received user operation instruction;
the data information determining module is used for acquiring data information associated with an interface window pop-up event when the interface window pop-up event is detected;
and the response processing module is used for forbidding to respond to the interface window pop-up event if the interface window pop-up event is determined to be not triggered by the user according to the data information.
In a third aspect, an embodiment of the present application further provides a terminal device, including: the window control system comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the window control method according to the embodiment of the application.
In a fourth aspect, an embodiment of the present application further provides a storage medium containing terminal device executable instructions, where the terminal device executable instructions are used to execute the window control method according to the embodiment of the present application when executed by a terminal device processor.
According to the scheme, the bulletproof window mode is started according to the received user operation instruction, when an interface window popup event is detected, data information related to the interface window popup event is acquired, if the interface window popup event is determined to be not triggered by a user according to the data information, the response to the interface window popup event is forbidden, the influence of the popup window on the user is reasonably and effectively avoided, the user operation is simplified, the operation efficiency of the terminal device is improved, and the power consumption of the terminal device is reduced.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a window control method according to an embodiment of the present application;
FIG. 2 is a flow chart of another window control method provided by the embodiment of the invention;
FIG. 3 is a flow chart of another window control method provided in the embodiments of the present application;
fig. 4 is a block diagram of a window control apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are for purposes of illustration and not limitation. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Fig. 1 is a flowchart of a window control method provided in an embodiment of the present application, which is applicable to control an interface display window of a terminal device, where the method may be executed by the terminal device provided in the embodiment of the present application, and a window control device of the terminal device may be implemented in a software and/or hardware manner, as shown in fig. 1, a specific scheme provided in this embodiment is as follows:
and S101, opening a bulletproof window mode according to the received user operation instruction.
At present, an intelligent system is an intelligent terminal operating system platform with the largest user group, an intelligent terminal is the most important electronic device which is most commonly used by many users at present, the users often install various third-party applications, the use of the third-party applications is much less standard, some applications often pop up various interfaces on the background, advertisement windows and the like influence the normal use of the users, the existing android system does not have a method for effectively preventing the third-party applications from popping up windows or interfaces on the background, most of the intercepting methods need the users to set various strategies, or the popping up windows are intercepted through various operations of the users, and the intercepting is mistaken.
In the Android system, the system manages the system and all applied windows through a window management service (windowmanager service, WMS for short), including various window information, window layers, window drawing, window animation, whether a window is visible, window transparency, window display and the like.
In one embodiment, the bulletproof window mode is started according to the received user operation instruction. The bulletproof window mode is a bulletproof window control mode which is set to prevent the influence of accidents and illegal bulletproof windows, and the bulletproof window mechanism of the application is operated after the terminal equipment enters the bulletproof window mode. Specifically, the user operation instruction may be a defined preset operation instruction, for example, when the user performs a double-click on a certain interface a (or slides up from the bottom, slides down from the top, or the like), all interfaces of the application b to which the interface a belongs enter the bulletproof window mode.
S102, when the interface window pop-up event is detected, acquiring data information associated with the interface window pop-up event.
And executing a corresponding program to realize the corresponding popup after the popup event of the interface window is triggered. In an embodiment, a management and control mechanism is added to a window management service to implement and run the scheme of the application, a listener is first set in the window management service to monitor a window pop-up event, for example, an android operating system is taken as an example, the method call events of Dialog and PopUpWindow can be monitored, and the detection of the interface window pop-up event is determined after the method of Dialog or PopUpWindow is determined to be called. When an interface window pop-up event is detected, acquiring data information associated with the interface window pop-up event, wherein the associated data information can be recorded serial operation links related to the pop-up event, or time information responding to user touch operation before the interface window pop-up event is triggered, and the like. In one embodiment, after the bulletproof window mode is opened, the click operation of the user can be monitored correspondingly, the time of the click operation of the user is recorded, and the operation link triggered by the click operation is called when the popup event of the interface window is triggered.
And step S103, if the interface window pop-up event is determined to be not triggered by the user according to the data information, the response to the interface window pop-up event is forbidden.
And determining whether the interface window pop-up event is manually triggered by the user through the data information obtained in the step S102, if so, not limiting, and if not, forbidding to respond to the interface window pop-up event. For example, a judgment mechanism may be added to the window management service, and after determining that the current interface window pop-up event is not triggered by the user, the interface window pop-up event is shielded or logged off. Optionally, when the data information is a recorded operation link, correspondingly, if it is determined that the interface window pop-up event is not triggered by the user according to the operation link, the response to the interface window pop-up event is prohibited; and when the recorded data information is time information of user touch operation, correspondingly, if the interface window pop-up event is determined to be not triggered by the user according to the time information and the application program information, the response to the interface window pop-up event is forbidden.
It should be noted that, in the present application, the manners of determining whether the interface window pop-up event is manually triggered by the user are not limited to the two manners, and are not limited to the two manners being used alone or in combination to determine.
According to the content, the bulletproof window mode is started according to the received user operation instruction, when an interface window popup event is detected, data information related to the interface window popup event is obtained, if the interface window popup event is determined to be non-user-triggered according to the data information, response to the interface window popup event is forbidden, the influence of the popup window which is not triggered by the user on the user is reasonably and effectively avoided, the user operation is simplified, the operation efficiency of the terminal device is improved, and the power consumption of the terminal device is reduced.
In one embodiment, after the current interface popup event is determined to be not manually triggered by a user, whether the interface popup event is triggered by an application program currently running in the foreground can be further determined, and if so, the interface popup event can not be intercepted correspondingly.
Fig. 2 is a flowchart of another window control method provided in the embodiment of the present application, and optionally, the acquiring data information associated with the interface window pop-up event includes: acquiring an operation link for triggering the pop-up event of the interface window; correspondingly, if the interface window pop-up event is determined to be not triggered by the user according to the data information, the prohibiting responding to the interface window pop-up event includes: and if the interface window pop-up event is determined to be not triggered by the user according to the operation link, prohibiting the response of the interface window pop-up event. As shown in fig. 2, the technical solution is as follows:
step S201, opening the bulletproof window mode according to the received user operation instruction.
Step S202, when the interface window pop-up event is detected, an operation link triggering the interface window pop-up event is obtained.
In an embodiment, after the bulletproof window mode is opened, an operation link triggered by a user click operation is recorded, for example, by taking an android operating system as an example, a processing link generated in response to the user click operation is recorded by a window management service, an application activity management service and an input service in the operating system to generate the operation link. Specifically, the background service triggered and started by the click operation and the caller record are recorded in sequence, accordingly, the record hierarchy can be adaptively limited, such as 3 layers, 5 layers or 10 layers, and the number of the limited layers can be determined by the server and pushed to the terminal device.
Step S203, judging whether the interface window pop-up event is triggered by the user or not according to the operation link, if not, executing step S204, and if so, executing step S205.
Illustratively, triggering a started background service and a caller according to a recorded click operation to judge whether a current interface window pop-up event is associated with the click operation, optionally, obtaining a service process and a caller for triggering the interface window pop-up event, if the service process and the caller for triggering the interface window pop-up event are judged to be in a recorded operation link triggered by the user click operation, determining that the interface window pop-up event is manually triggered by the user, otherwise, determining that the interface window pop-up event is not manually triggered by the user.
And step S204, prohibiting responding to the interface window pop-up event.
And step S205, allowing to respond to the interface window pop-up event.
According to the method, whether the current interface window pop-up event is associated with the previous interface click event or not is judged by recording the operation link generated by the user click event, if not, the interface window pop-up event is not manually triggered by the user, so that the accurate judgment of whether the interface window pop-up event is manually triggered by the user is realized, the interface window pop-up events which are manually triggered by the non-user, such as illegal users, third parties and the like can be accurately shielded and intercepted, the user operation is simplified, the user is prevented from being manually closed again, the operation efficiency of the terminal equipment is improved, and the power consumption of the terminal equipment is reduced.
Fig. 3 is a flowchart of another window control method provided in the embodiment of the present application, where optionally, the acquiring data information associated with the interface window pop-up event includes: and acquiring time information for responding to the touch operation of the user before the pop-up event of the interface window is triggered. The acquiring data information associated with the interface window pop-up event further comprises: acquiring application program information corresponding to user touch operation responded before the interface window pop-up event is triggered; correspondingly, if the interface window pop-up event is determined to be not triggered by the user according to the data information, the prohibiting responding to the interface window pop-up event includes: and if the interface window pop-up event is determined to be not triggered by the user according to the time information and the application program information, prohibiting the response of the interface window pop-up event. As shown in fig. 3, the technical solution is as follows:
step S301, opening the bulletproof window mode according to the received user operation instruction.
Step S302, when an interface window pop-up event is detected, acquiring time information and application program information of response user touch operation before the interface window pop-up event is triggered.
In one embodiment, after the bulletproof window mode is opened, time information of a click operation of a user and an execution application program corresponding to the click operation are recorded, for example, taking an android operating system as an example, when it is monitored that interface controls such as a button and a list respond to the click operation, a current time point is recorded, and an identifier of the application program of the click operation interface is correspondingly obtained.
Step S303, determining whether the interface window pop-up event is triggered by the user according to the time information and the application program information, if not, executing step S304, and if so, executing step S305.
In an embodiment, when the data information is time information and application information, determining whether the current interface popup event is manually triggered may be setting a time threshold, if the time from the last recorded click operation to the time when the interface popup event is triggered is greater than the preset threshold (for example, 60 seconds), and the application corresponding to the recorded click operation is not an application running on the current interface, determining that the interface popup event is not manually triggered by the user, and otherwise, determining that the interface popup event is manually triggered by the user.
And S304, prohibiting responding to the interface window pop-up event.
And step S305, allowing to respond to the interface window pop-up event.
According to the method, the time generated by the user click event and the corresponding application program are recorded to judge whether the current interface window pop-up event is associated with the previous interface click event or not, if the current interface window pop-up event is not associated with the previous interface click event, the interface window pop-up event is not manually triggered by the user, so that the accurate judgment of whether the interface window pop-up event is manually triggered by the user is realized, the illegal interface window pop-up event, which is manually triggered by the third party and other non-users, can be accurately shielded and intercepted, the user operation is simplified, the user is prevented from being manually closed again, the operation efficiency of the terminal equipment is improved, and the power consumption of the terminal equipment is reduced.
In a possible embodiment, before the prohibiting the response to the interface window pop-up event, the method further includes: determining an application program which initiates the interface window pop-up event; the prohibiting the response to the interface window pop-up event includes: and if the identifier of the application program is recorded in the blacklist, prohibiting responding to the interface window pop-up event. By introducing a black-and-white list mechanism, the popup window control is further optimized, and for example, if it is determined that the identifier of the application program which initiates the popup window is already recorded in the blacklist, the popup window initiated by the application program can be directly intercepted. The blacklist establishing process can be that the terminal device counts the pop-up window frequency of the self-installed application program, if the pop-up window frequency meets a preset condition (such as 20 times/week), the corresponding application program identifier is added into the blacklist, the blacklist establishing process can be automatically generated by a machine, and manual black pulling control by a user is not needed.
In a possible embodiment, before the opening the bulletproof window mode according to the received user operation instruction, the method further includes: and receiving a blacklist of the application program which is sent by the server or other terminal equipment and is forbidden to respond to the popup, wherein the blacklist is determined according to the popup information pushed by one or more terminal equipment. The server can collect blacklists acquired by different terminal devices and intelligently send the blacklists to the terminal devices without establishing blacklist control, and a blacklist mechanism of a single terminal device is enabled to be more complete based on big data optimization.
Fig. 4 is a block diagram of a window control apparatus according to an embodiment of the present application, where the apparatus is configured to execute a window control method according to the foregoing embodiment, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 4, the apparatus specifically includes: a guard opening module 101, a data information determination module 102 and a response processing module 103, wherein,
and the protection opening module 101 is configured to open the bulletproof window mode according to the received user operation instruction.
In the Android system, the system manages the system and all applied windows through a window management service (windowmanager service, WMS for short), including various window information, window layers, window drawing, window animation, whether a window is visible, window transparency, window display and the like.
In one embodiment, the bulletproof window mode is started according to the received user operation instruction. The bulletproof window mode is a bulletproof window control mode which is set to prevent the influence of accidents and illegal bulletproof windows, and the bulletproof window mechanism of the application is operated after the terminal equipment enters the bulletproof window mode. Specifically, the user operation instruction may be a defined preset operation instruction, for example, when the user performs a double-click on a certain interface a (or slides up from the bottom, slides down from the top, or the like), all interfaces of the application b to which the interface a belongs enter the bulletproof window mode.
The data information determining module 102 is configured to, when an interface window pop-up event is detected, obtain data information associated with the interface window pop-up event.
And executing a corresponding program to realize the corresponding popup after the popup event of the interface window is triggered. In an embodiment, a management and control mechanism is added to a window management service to implement and run the scheme of the application, a listener is first set in the window management service to monitor a window pop-up event, for example, an android operating system is taken as an example, the method call events of Dialog and PopUpWindow can be monitored, and the detection of the interface window pop-up event is determined after the method of Dialog or PopUpWindow is determined to be called. When an interface window pop-up event is detected, acquiring data information associated with the interface window pop-up event, wherein the associated data information can be recorded serial operation links related to the pop-up event, or time information responding to user touch operation before the interface window pop-up event is triggered, and the like. In one embodiment, after the bulletproof window mode is opened, the click operation of the user can be monitored correspondingly, the time of the click operation of the user is recorded, and the operation link triggered by the click operation is called when the popup event of the interface window is triggered.
And the response processing module 103 is configured to prohibit a response to the interface window pop-up event if it is determined that the interface window pop-up event is not triggered by the user according to the data information.
And after the data information is obtained, determining whether the interface window pop-up event is manually triggered by a user, if so, not limiting, and if not, forbidding to respond to the interface window pop-up event. For example, a judgment mechanism may be added to the window management service, and after determining that the current interface window pop-up event is not triggered by the user, the interface window pop-up event is shielded or logged off. Optionally, when the data information is a recorded operation link, correspondingly, if it is determined that the interface window pop-up event is not triggered by the user according to the operation link, the response to the interface window pop-up event is prohibited; and when the recorded data information is time information of user touch operation, correspondingly, if the interface window pop-up event is determined to be not triggered by the user according to the time information and the application program information, the response to the interface window pop-up event is forbidden.
It should be noted that, in the present application, the manners of determining whether the interface window pop-up event is manually triggered by the user are not limited to the two manners, and are not limited to the two manners being used alone or in combination to determine.
According to the content, the bulletproof window mode is started according to the received user operation instruction, when an interface window popup event is detected, data information related to the interface window popup event is obtained, if the interface window popup event is determined to be non-user-triggered according to the data information, response to the interface window popup event is forbidden, the influence of the popup window which is not triggered by the user on the user is reasonably and effectively avoided, the user operation is simplified, the operation efficiency of the terminal device is improved, and the power consumption of the terminal device is reduced.
In a possible embodiment, the data information determining module 102 is specifically configured to:
acquiring an operation link for triggering the pop-up event of the interface window;
the response processing module 103 is specifically configured to:
and if the interface window pop-up event is determined to be not triggered by the user according to the operation link, prohibiting the response of the interface window pop-up event.
In one possible embodiment, the data information determination module 102 is further configured to:
and before the operation link triggering the interface window pop-up event is obtained, recording a processing link generated by responding to the click operation of the user through a window management service, an application activity management service and an input service in an operation system to generate the operation link.
In a possible embodiment, the data information determining module 102 is specifically configured to:
and acquiring time information for responding to the touch operation of the user before the pop-up event of the interface window is triggered.
In one possible embodiment, the data information determination module 102 is further configured to:
acquiring application program information corresponding to user touch operation responded before the interface window pop-up event is triggered;
the response processing module 103 is specifically configured to:
and if the interface window pop-up event is determined to be not triggered by the user according to the time information and the application program information, prohibiting the response of the interface window pop-up event.
In one possible embodiment, the data information determination module 102 is further configured to:
determining an application program initiating the interface window pop-up event before the prohibiting of responding to the interface window pop-up event;
the response processing module 103 is specifically configured to:
and if the identifier of the application program is recorded in the blacklist, prohibiting responding to the interface window pop-up event.
In one possible embodiment, the data information determination module 102 is further configured to:
before the bulletproof window mode is opened according to the received user operation instruction, a blacklist of application programs which are sent by a server or other terminal equipment and are forbidden to respond to the bulletproof window is received, and the blacklist is determined according to the popup window information pushed by one or more terminal equipment.
In this embodiment, a terminal device is provided on the basis of the foregoing embodiments, and fig. 5 is a schematic structural diagram of a terminal device provided in an embodiment of the present application, and as shown in fig. 5, the terminal device 200 includes: memory 201, processor (CPU) 202, peripheral interfaces 203, RF (Radio Frequency) circuitry 205, audio circuitry 206, speaker 211, power management chip 208, input/output (I/O) subsystem 209, touch screen 212, other input/control devices 210, and external port 204, which communicate via one or more communication buses or signal lines 207.
It should be understood that the illustrated terminal device 200 is only one example of a terminal device, and that the terminal device 200 may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The following describes in detail a terminal device for rights management of multi-open applications provided in this embodiment, where the terminal device is a smart phone as an example.
A memory 201, the memory 201 being accessible by the CPU202, the peripheral interface 203, and the like, the memory 201 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other volatile solid state storage devices.
A peripheral interface 203, said peripheral interface 203 may connect input and output peripherals of the device to the CPU202 and the memory 201.
An I/O subsystem 209, the I/O subsystem 209 may connect input and output peripherals on the device, such as a touch screen 212 and other input/control devices 210, to the peripheral interface 203. The I/O subsystem 209 may include a display controller 2091 and one or more input controllers 2092 for controlling the other input/control devices 210. Where one or more input controllers 2092 receive electrical signals from or transmit electrical signals to other input/control devices 210, the other input/control devices 210 may include physical buttons (push buttons, rocker buttons, etc.), dials, slide switches, joysticks, click wheels. It is noted that the input controller 2092 may be coupled to any one of: a keyboard, an infrared port, a USB interface, and a pointing device such as a mouse.
A touch screen 212, the touch screen 212 being an input interface and an output interface between the user terminal and the user, displaying visual output to the user, which may include graphics, text, icons, video, and the like.
The display controller 2091 within the I/O subsystem 209 receives electrical signals from the touch screen 212 or transmits electrical signals to the touch screen 212. The touch screen 212 detects a contact on the touch screen, and the display controller 2091 converts the detected contact into an interaction with a user interface object displayed on the touch screen 212, i.e., implements a human-machine interaction, and the user interface object displayed on the touch screen 212 may be an icon for running a game, an icon networked to a corresponding network, or the like. It is worth mentioning that the device may also comprise a light mouse, which is a touch sensitive surface that does not show visual output, or an extension of the touch sensitive surface formed by the touch screen.
The RF circuit 205 is mainly used to establish communication between the mobile phone and the wireless network (i.e., network side), and implement data reception and transmission between the mobile phone and the wireless network. Such as sending and receiving short messages, e-mails, etc. In particular, the RF circuitry 205 receives and transmits RF signals, also referred to as electromagnetic signals, through which the RF circuitry 205 converts electrical signals to or from electromagnetic signals and communicates with communication networks and other devices. RF circuitry 205 may include known circuitry for performing these functions including, but not limited to, an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC (CODEC) chipset, a Subscriber Identity Module (SIM), and so forth.
The audio circuit 206 is mainly used to receive audio data from the peripheral interface 203, convert the audio data into an electric signal, and transmit the electric signal to the speaker 211.
And a speaker 211 for reproducing the voice signal received by the handset from the wireless network through the RF circuit 205 into sound and playing the sound to the user.
And the power management chip 208 is used for supplying power and managing power to the hardware connected with the CPU202, the I/O subsystem and the peripheral interface.
The window control device of the terminal device and the terminal device provided in the above embodiments may execute the window control method of the terminal device provided in any embodiment of the present invention, and have corresponding functional modules and beneficial effects for executing the method. For details of the technology not described in detail in the above embodiments, reference may be made to a window control method of a terminal device provided in any embodiment of the present invention.
Embodiments of the present application further provide a storage medium containing terminal device executable instructions, which when executed by a terminal device processor, are configured to perform a window control method, where the method includes:
opening an bulletproof window mode according to a received user operation instruction;
when an interface window pop-up event is detected, acquiring data information associated with the interface window pop-up event;
and if the interface window pop-up event is determined to be not triggered by the user according to the data information, prohibiting the response of the interface window pop-up event.
In a possible embodiment, the acquiring data information associated with the interface window pop-up event includes:
acquiring an operation link for triggering the pop-up event of the interface window;
correspondingly, if the interface window pop-up event is determined to be not triggered by the user according to the data information, the prohibiting responding to the interface window pop-up event includes:
and if the interface window pop-up event is determined to be not triggered by the user according to the operation link, prohibiting the response of the interface window pop-up event.
In a possible embodiment, before the obtaining an operation link triggering the interface window pop-up event, the method further includes:
and recording a processing link generated in response to the clicking operation of the user through a window management service, an application activity management service and an input service in an operating system to generate an operating link.
In a possible embodiment, the acquiring data information associated with the interface window pop-up event includes:
and acquiring time information for responding to the touch operation of the user before the pop-up event of the interface window is triggered.
In a possible embodiment, the acquiring data information associated with the interface window pop-up event further includes:
acquiring application program information corresponding to user touch operation responded before the interface window pop-up event is triggered;
correspondingly, if the interface window pop-up event is determined to be not triggered by the user according to the data information, the prohibiting responding to the interface window pop-up event includes:
and if the interface window pop-up event is determined to be not triggered by the user according to the time information and the application program information, prohibiting the response of the interface window pop-up event.
In a possible embodiment, before the prohibiting the response to the interface window pop-up event, the method further includes:
determining an application program which initiates the interface window pop-up event;
the prohibiting the response to the interface window pop-up event includes:
and if the identifier of the application program is recorded in the blacklist, prohibiting responding to the interface window pop-up event.
In a possible embodiment, before the opening the bulletproof window mode according to the received user operation instruction, the method further includes:
and receiving a blacklist of the application program which is sent by the server or other terminal equipment and is forbidden to respond to the popup, wherein the blacklist is determined according to the popup information pushed by one or more terminal equipment.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the operations of the window control method described above, and may also perform related operations in the window control method provided in any embodiment of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. The window control method is characterized by comprising the following steps:
opening an bulletproof window mode according to a received user operation instruction;
when an interface window pop-up event is detected, acquiring an operation link for triggering the interface window pop-up event;
acquiring a service process and a caller for triggering the interface window pop-up event, if the service process and the caller for triggering the interface window pop-up event are judged to exist in the operation link triggered by the recorded user click operation, determining that the interface window pop-up event is manually triggered by the user, otherwise, determining that the interface window pop-up event is not manually triggered by the user;
if the interface window pop-up event is determined to be not triggered by the user according to the operation link, the response to the interface window pop-up event is forbidden;
further comprising: and if the interface window pop-up event is determined to be not triggered by the user according to the operation link and is triggered by the application program operated by the current foreground, not intercepting the interface window pop-up event.
2. The method of claim 1, wherein inhibiting the response to the interface window pop-up event if the interface window pop-up event is determined to be non-user triggered based on the operational link comprises:
and if the interface window pop-up event is determined to be not triggered by the user according to the operation link, prohibiting the response of the interface window pop-up event.
3. The method according to claim 2, wherein before the obtaining the operation link triggering the interface window pop-up event, further comprising:
and recording a processing link generated in response to the clicking operation of the user through a window management service, an application activity management service and an input service in an operating system to generate an operating link.
4. The method of claim 1,
the method further comprises the following steps:
when the interface window pop-up event is detected,
and acquiring time information for responding to the touch operation of the user before the pop-up event of the interface window is triggered.
5. The method of claim 4,
the method further comprises the following steps:
when the interface window pop-up event is detected, acquiring application program information corresponding to the user touch operation responded before the interface window pop-up event is triggered;
correspondingly, if the interface window pop-up event is determined to be not triggered by the user according to the operation link, the prohibiting responding to the interface window pop-up event includes:
and if the interface window pop-up event is determined to be not triggered by the user according to the time information and the application program information, prohibiting the response of the interface window pop-up event.
6. The method of any of claims 1-5, further comprising, prior to said disabling the response to the interface window pop-up event:
determining an application program which initiates the interface window pop-up event;
the prohibiting the response to the interface window pop-up event includes:
and if the identifier of the application program is recorded in the blacklist, prohibiting responding to the interface window pop-up event.
7. The method of claim 6, wherein before the opening the bulletproof window mode according to the received user operation instruction, the method further comprises:
and receiving a blacklist of the application program which is sent by the server or other terminal equipment and is forbidden to respond to the popup, wherein the blacklist is determined according to the popup information pushed by one or more terminal equipment.
8. A window control apparatus, comprising:
the protection opening module is used for opening the bulletproof window mode according to the received user operation instruction;
the data information determining module is used for acquiring an operation link triggering an interface window pop-up event when the interface window pop-up event is detected; the response processing module is used for acquiring a service process and a caller for triggering the interface window pop-up event, if the service process and the caller for triggering the interface window pop-up event are judged to be in a recorded operation link triggered by the user click operation, the interface window pop-up event is determined to be manually triggered by the user, and if the service process and the caller for triggering the interface window pop-up event are not manually triggered by the user;
the response processing module is further used for prohibiting responding to the interface window pop-up event if the interface window pop-up event is determined to be not triggered by the user according to the operation link; and the response processing module is further configured to determine whether the interface window pop-up event is triggered by the currently foreground-running application program if it is determined that the interface window pop-up event is not triggered by the user according to the operation link, and if so, not intercept the interface window pop-up event.
9. A terminal device, comprising: processor, memory and computer program stored on the memory and executable on the processor, characterized in that the processor implements the window control method according to any of claims 1-7 when executing the computer program.
10. A storage medium containing terminal device-executable instructions, which when executed by a terminal device processor, are configured to perform the window control method of any one of claims 1-7.
CN201711165654.XA 2017-11-21 2017-11-21 Window control method and device, terminal equipment and storage medium Active CN107797841B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711165654.XA CN107797841B (en) 2017-11-21 2017-11-21 Window control method and device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711165654.XA CN107797841B (en) 2017-11-21 2017-11-21 Window control method and device, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN107797841A CN107797841A (en) 2018-03-13
CN107797841B true CN107797841B (en) 2021-11-05

Family

ID=61535382

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711165654.XA Active CN107797841B (en) 2017-11-21 2017-11-21 Window control method and device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN107797841B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600824A (en) * 2018-04-28 2018-09-28 维沃移动通信有限公司 A kind of record screen method and terminal device
CN108762554B (en) * 2018-05-18 2021-09-17 北京硬壳科技有限公司 Touch event response method and device
CN109078331B (en) * 2018-07-19 2021-09-21 广州华多网络科技有限公司 Analog key detection method and device, computer equipment and storage medium
CN111159599A (en) * 2019-12-26 2020-05-15 珠海格力电器股份有限公司 Method, device, electronic equipment and storage medium for processing advertisement
CN111966562A (en) * 2020-07-21 2020-11-20 北京视博云信息技术有限公司 Monitoring method and device of cloud platform and readable storage medium
CN113282361B (en) * 2021-04-21 2022-09-23 荣耀终端有限公司 Window processing method and electronic equipment
CN114071172B (en) * 2021-11-11 2024-03-01 广州方硅信息技术有限公司 Processing method, device, server and storage medium for continuous delivery of gifts in live broadcast
CN114071213A (en) * 2021-11-15 2022-02-18 深圳小湃科技有限公司 Set top box elastic frame intercepting method, device and storage medium
CN114268811B (en) * 2021-12-31 2024-04-19 广州方硅信息技术有限公司 Pop-up control method, device, equipment and storage medium for message bubbles in live broadcasting room

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236764A (en) * 2011-06-30 2011-11-09 北京邮电大学 Method and monitoring system for Android system to defend against desktop information attack
CN104123276A (en) * 2013-04-23 2014-10-29 腾讯科技(深圳)有限公司 Method, device and system for intercepting popup windows in browser
CN105590057A (en) * 2014-10-22 2016-05-18 腾讯科技(深圳)有限公司 Safety index evaluation method and device of webpage
CN105975380A (en) * 2016-05-26 2016-09-28 北京金山安全软件有限公司 Popup window processing method and device and electronic equipment
CN106126562A (en) * 2016-06-15 2016-11-16 广东欧珀移动通信有限公司 A kind of pop-up hold-up interception method and terminal
CN106357919A (en) * 2016-09-30 2017-01-25 珠海市魅族科技有限公司 Crank call interception method and device thereof
CN107231434A (en) * 2017-07-10 2017-10-03 北京小米移动软件有限公司 The control method and device of terminal device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070300178A1 (en) * 2006-06-21 2007-12-27 Mcardle James M Handling of secondary pop-ups or pop-behinds within a web browser

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236764A (en) * 2011-06-30 2011-11-09 北京邮电大学 Method and monitoring system for Android system to defend against desktop information attack
CN104123276A (en) * 2013-04-23 2014-10-29 腾讯科技(深圳)有限公司 Method, device and system for intercepting popup windows in browser
CN105590057A (en) * 2014-10-22 2016-05-18 腾讯科技(深圳)有限公司 Safety index evaluation method and device of webpage
CN105975380A (en) * 2016-05-26 2016-09-28 北京金山安全软件有限公司 Popup window processing method and device and electronic equipment
CN106126562A (en) * 2016-06-15 2016-11-16 广东欧珀移动通信有限公司 A kind of pop-up hold-up interception method and terminal
CN106357919A (en) * 2016-09-30 2017-01-25 珠海市魅族科技有限公司 Crank call interception method and device thereof
CN107231434A (en) * 2017-07-10 2017-10-03 北京小米移动软件有限公司 The control method and device of terminal device

Also Published As

Publication number Publication date
CN107797841A (en) 2018-03-13

Similar Documents

Publication Publication Date Title
CN107797841B (en) Window control method and device, terminal equipment and storage medium
CN107748685B (en) Application program starting control method and device, terminal equipment and storage medium
CN107943650B (en) Application program control method and device, storage medium and terminal
CN107844342B (en) Control method and device for keeping application program alive, storage medium and mobile terminal
CN107783803B (en) System optimization method and device of intelligent terminal, storage medium and intelligent terminal
CN108153647B (en) Log processing method and device, terminal equipment and storage medium
CN109840418B (en) Jump control method and device for application program, storage medium and terminal
US11138956B2 (en) Method for controlling display of terminal, storage medium, and electronic device
US10956176B2 (en) Processing method, device and storage medium for implementing automatic startup
CN107943269B (en) Scheduling job control method, device, terminal equipment and storage medium
CN107422916B (en) Touch operation response method and device, storage medium and terminal
CN109408465B (en) File attribution information recording method, device, storage medium and terminal
EP3486823B1 (en) System notification service control method, apparatus, terminal device, and storage medium
CN107861759A (en) Window control method, apparatus, terminal device and storage medium
CN107844341B (en) Process starting control method and device, storage medium and mobile terminal
CN107070670B (en) Method, device and terminal equipment for controlling broadcast sender to send broadcast message
CN106937258B (en) A kind of control method of broadcast, device and mobile terminal
CN107957913A (en) Associate management-control method, device, storage medium and the mobile terminal started
US11405499B2 (en) Do-not-disturb method and terminal
CN107885588B (en) Application service control method and device, storage medium and mobile terminal
CN107423064A (en) Message treatment method, device, terminal device and storage medium
CN106936826B (en) Registration method and device of broadcast receiver and terminal equipment
CN107943268B (en) Scheduling job control method, device, terminal equipment and storage medium
CN108170576B (en) Log processing method and device, terminal equipment and storage medium
WO2019080738A1 (en) Game application program control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant