CN110581921B - Control method and device for folding screen equipment - Google Patents

Control method and device for folding screen equipment Download PDF

Info

Publication number
CN110581921B
CN110581921B CN201910663258.2A CN201910663258A CN110581921B CN 110581921 B CN110581921 B CN 110581921B CN 201910663258 A CN201910663258 A CN 201910663258A CN 110581921 B CN110581921 B CN 110581921B
Authority
CN
China
Prior art keywords
preset application
preset
password
determined
folding screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910663258.2A
Other languages
Chinese (zh)
Other versions
CN110581921A (en
Inventor
田浩雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910663258.2A priority Critical patent/CN110581921B/en
Publication of CN110581921A publication Critical patent/CN110581921A/en
Application granted granted Critical
Publication of CN110581921B publication Critical patent/CN110581921B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • H04M1/0266Details of the structure or mounting of specific components for a display module assembly
    • H04M1/0268Details of the structure or mounting of specific components for a display module assembly including a flexible display panel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/16Details of telephonic subscriber devices including more than one display unit

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application relates to a control method and a device for folding screen equipment, wherein the method comprises the following steps: acquiring an included angle value between a first current screen and a second current screen of the folding screen device; determining whether the included angle value is within a preset safety angle; displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and hiding the preset application under the condition that the preset application is determined not to be located within the safety angle. By means of the scheme, the problem that data security is low due to the fact that the application cannot be effectively hidden is solved, and the technical effect of effectively improving data security and privacy of the folding screen device is achieved.

Description

Control method and device for folding screen equipment
Technical Field
The application relates to the field of equipment control, in particular to a method and a device for controlling folding screen equipment.
Background
With the continuous development of the internet, information security is becoming more and more important. As more and more people start using smart phones, the privacy of people is more and more threatened.
For example, if people around the user take the terminal of the user, the user may see the internal information of the application that the user does not want to see, which may cause data leakage of the user, or the data leakage of the user may be caused by loss of the terminal.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
In order to solve the technical problem or at least partially solve the technical problem, the application provides a control method and device for a folding screen device.
In a first aspect, the present application provides a method for controlling a folding screen device, including:
acquiring an included angle value between a first current screen and a second current screen of the folding screen device;
determining whether the included angle value is within a preset safety angle;
displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and hiding the preset application under the condition that the preset application is determined not to be located within the safety angle.
In one embodiment, acquiring a current included angle value between a first screen and a second screen of a folding screen device includes:
starting the folding screen device in response to a triggering operation on the folding screen device;
receiving an unlocking password input by a user;
and determining whether the unlocking password is correct, and acquiring an included angle value between the current first screen and the second screen of the folding screen device under the condition that the unlocking password is correct.
In one embodiment, displaying a preset application in the case that the preset application is determined to be located within the safety angle, and hiding the preset application in the case that the preset application is determined not to be located within the safety angle further includes:
calling a preset protection list;
and reading the preset application from the protection list.
In one embodiment, further comprising:
displaying a setting interface;
receiving a setting instruction input by a user on the setting interface, wherein the setting instruction carries the preset safety angle and the preset application;
and performing associated storage on the preset safety angle and the preset application.
In one embodiment, after the hiding the preset application in the case that it is determined that it is not within the safety angle, the method further includes:
receiving a password input by a user;
determining whether the input password is a standby password;
and displaying the preset application under the condition that the input password is determined to be a standby password.
In a second aspect, the present application provides a control apparatus for a folding screen device, including:
the acquisition module is used for acquiring an included angle value between a first current screen and a second current screen of the folding screen device;
the first determining module is used for determining whether the included angle value is within a preset safety angle or not;
and the display module is used for displaying the preset application under the condition that the preset application is determined to be positioned in the safety angle, and hiding the preset application under the condition that the preset application is determined not to be positioned in the safety angle.
In one embodiment, the obtaining module includes:
the starting unit is used for responding to the triggering operation of the folding screen equipment and starting the folding screen equipment;
the receiving unit is used for receiving an unlocking password input by a user;
and the obtaining unit is used for determining whether the unlocking password is correct or not, and obtaining the included angle value between the current first screen and the second screen of the folding screen device under the condition that the unlocking password is correct.
In one embodiment, the control device for a foldable screen apparatus further includes:
the calling module is used for displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and calling a preset protection list before the preset application under the condition that the preset application is determined not to be located within the safety angle;
and the reading unit is used for reading the preset application from the protection list.
In one embodiment, the control device for a foldable screen apparatus further includes:
the first display module is used for displaying a setting interface;
the first receiving module is used for receiving a setting instruction input by a user on the setting interface, wherein the setting instruction carries the preset safety angle and the preset application;
and the storage module is used for performing associated storage on the preset safety angle and the preset application.
In one embodiment, the control device for a foldable screen apparatus further includes:
the second receiving module is used for receiving a password input by a user after the preset application is hidden under the condition that the password is determined not to be positioned in the safety angle;
the second determination module is used for determining whether the input password is a standby password or not;
and the second display module is used for displaying the preset application under the condition that the input password is determined to be the standby password.
In a third aspect, the present application provides a folding screen device comprising: the control device of the folding screen equipment.
In a fourth aspect, the present application provides a network device, comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
In a fifth aspect, the present application provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the above method.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
according to the method provided by the embodiment of the application, whether the device is located within the preset safety angle is determined according to the included angle value between the current first screen and the current second screen of the folding screen device, if the device is located within the safety angle, the set application can be displayed, and if the device is not located within the safety angle, the set application can be hidden.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a flowchart of a method for controlling a folding screen device according to an embodiment of the present disclosure;
fig. 2 is a flowchart of another method of a control method of a folding screen device according to an embodiment of the present application;
fig. 3 is a schematic view of a folding included angle of a folding screen device according to an embodiment of the present application;
fig. 4 is a block diagram of a control device of a folding screen device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to solve the problem that some applications cannot be hidden in the existing intelligent device, and therefore the content which the user does not want others to see can be seen by others, in this example, a control method is provided for associating the display of the applications with the folding angle of the folding screen to control some applications which do not want to be displayed to be hidden, considering the particularity that the display can be based on the folding screen device.
Fig. 1 is a control method for a folding screen device according to an embodiment of the present application, which may include the following steps:
step 101: acquiring an included angle value between a first current screen and a second current screen of the folding screen device;
that is, since it is a folding screen device, the screen is composed of two screens, and can also be considered to be composed of two parts of one screen. Which may be referred to as a first screen and a second screen. The angle between the two screens can be identified, and therefore, the value of the angle between the first screen and the second screen can be obtained.
Step 102: determining whether the included angle value is within a preset safety angle;
the user may preset a safety angle, for example: the safety angle range is 90-100 degrees, namely, the numerical range of 90-100 degrees is used as the safety angle range. However, it should be noted that the above listed safety angle is only an exemplary description, and may be specifically set according to the needs and habits of the user when actually implementing, and the application is not limited thereto.
Step 103: displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and hiding the preset application under the condition that the preset application is determined not to be located within the safety angle.
Specifically, a preset application list may be set for the security angle, for example, the application list corresponding to 90-100 degrees includes application a and application B. Then application a and application B may be displayed if the current pinch value is determined to be between 90-100 degrees, and if not between 90-100 degrees, application a and application B are hidden and not displayed.
In the above embodiment, whether the included angle value between the current first screen and the second screen of the folding screen device is within the preset safety angle is determined, if the included angle value is within the safety angle, the set application can be displayed, and if the included angle value is not within the safety angle, the set application is hidden.
For the device itself, an unlock password may be provided, and only if the user correctly enters the password, the device will be displayed and operational. Therefore, before an included angle value between a first current screen and a second current screen of the folding screen device is obtained, the folding screen device can be started in response to a trigger operation on the folding screen device; receiving an unlocking password input by a user; and only if the unlocking password is determined to be correct, acquiring an included angle value between the current first screen and the second screen of the folding screen device under the condition that the unlocking password is correct. That is, the angle of the folding screen is detected only after the user unlocks the mobile phone, and if the unlocking is not successful, the detection is necessary. Of course, if the device does not set the unlock password, the user may trigger the detection of the angle value by opening the phone.
Considering that there are various methods for starting an application for an operating system (e.g., waking up through other application processes, or inputting a corresponding command to start an interface, etc.), in order to avoid such situations, in this example, a protection list may be set at the bottom layer of the system, shielding is performed according to the protection list, when the system detects that an application is to be started, the corresponding protection list is searched, whether an included angle between two current screens passes through a security angle is judged, if the included angle does not fall into the security angle, the system layer returns directly, and subsequent processes such as interface loading and displaying are rejected to be executed, so as to achieve the purpose of shielding illegal starting. Namely, under the condition that the security angle is determined to be within the security angle, displaying a preset application, and under the condition that the security angle is not determined to be within the security angle, hiding the preset application and then calling a preset protection list; and reading the preset application from the protection list.
The user may have the right to set, for which a setting interface may be displayed; receiving a setting instruction input by a user on the setting interface, wherein the setting instruction carries the preset safety angle and the preset application; and performing associated storage on the preset safety angle and the preset application. Namely, the user can set the safety angle and the preset application corresponding to the safety angle in the setting interface, and then the safety angle and the preset application are stored in an associated manner. In practical implementation, one included angle range may be set, or a plurality of included angles may be set, and different included angle ranges correspond to different protection lists. For example, a protection list a is set for an angle range a, and a protection list b is set for an angle range b, that is, different applications are protected for different angle ranges.
Considering that the preset angle is set sometimes, but the user forgets to the preset angle, the displayed application cannot be seen, for this reason, a spare password can be set, and if the user inputs the correct spare password, the limitation of the safety angle can be cancelled, and all the applications can be displayed. That is, in case it is determined that the password is not within the security angle, after hiding the preset application, a password input by a user may be received; determining whether the input password is a standby password; and displaying the preset application under the condition that the input password is determined to be a standby password.
The above method is described below with reference to a specific example, however, it should be noted that the specific example is only for better describing the present application and is not to be construed as limiting the present application.
In this example, whether to display or open some applications on the screen is judged by folding the included angle of the screen during unlocking, so as to achieve the encryption effect. By the method, the safety of some applications of the user can be effectively improved, and the possibility that the encrypted information is seen due to unlocking by other people is reduced.
Furthermore, a user can manually set an included angle range and corresponding applications, and when the user unlocks, the terminal device can determine whether to display or start the corresponding applications on the screen according to the included angle ranges of the two current screens, so that the purpose of hiding to protect data from being leaked is achieved.
Specifically, as shown in fig. 2, the method includes the following steps:
step 1: and setting an included angle range a and applications which are not hidden in the included angle range on a setting interface, and writing the application names into a protection list a. That is, as shown in fig. 3, if the angle between the two screens is within the angle range a, the applications in the protection list are displayed, and if the angle between the two screens is not within the angle range a, the applications in the protection list are hidden. In practical implementation, one included angle range may be set, or a plurality of included angles may be set, and different included angle ranges correspond to different protection lists. For example, a protection list a is set for an angle range a, and a protection list b is set for an angle range b, that is, different applications are protected for different angle ranges.
Step 2: and when the user unlocks, judging the current included angle, and if the included angle falls into the range a, displaying a hidden application icon on an interface for normal operation of the user. Further, the setting interface may be displayed simultaneously, and the previously set contents may be made visible and operable. The user can thus see how the settings were originally set, i.e. which applications are not visible, and further settings can be made. And if the included angle does not fall into the range a, hiding the corresponding application icon to make the application invisible to the user.
In practical implementation, user identity verification can be performed, different user identities can set different included angle ranges and hidden application lists, and therefore after a user unlocks the mobile phone, the mobile phone can determine identity information of the user through face recognition, fingerprints and the like so as to obtain corresponding settings of the user.
Further, the user can set a standby password, and under the condition that the included angle range does not fall into the range a, the user can display the hidden application icon by inputting the standby password.
In the above example, the reason for setting the protection list is that for the operating system, there are various methods for starting an application (for example, waking up through other application processes, or inputting a corresponding command to start an interface, etc.), in order to avoid the situations, in this example, shielding is performed according to the protection list at the bottom layer of the system, when the system detects that an application is to be started, the corresponding protection list is searched, whether the included angle between the two current screens passes through the angle a is judged, if the included angle does not fall into the angle a, the system layer directly returns, and the subsequent processes such as interface loading and displaying are rejected to achieve the purpose of shielding illegal starting.
Based on the same inventive concept, the embodiment of the present invention further provides a control device for a folding screen device, as described in the following embodiments. Because the principle of the control device for the folding screen equipment for solving the problems is similar to the control method for the folding screen equipment, the implementation of the control device for the folding screen equipment can refer to the implementation of the control method for the folding screen equipment, and repeated parts are not described again. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated. Fig. 4 is a block diagram of a structure of a control device of a folding screen apparatus according to an embodiment of the present invention, as shown in fig. 4, the control device may include: an acquisition module 401, a first determination module 402, and a display module 403, the structure of which will be described below.
An obtaining module 401, configured to obtain an included angle value between a current first screen and a current second screen of a folding screen device;
a first determining module 402, configured to determine whether the included angle value is within a preset safety angle;
a display module 403, configured to display a preset application if it is determined that the preset application is located within the safety angle, and hide the preset application if it is determined that the preset application is not located within the safety angle.
In an embodiment, the obtaining module 401 may include: the starting unit is used for responding to the triggering operation of the folding screen equipment and starting the folding screen equipment; the receiving unit is used for receiving an unlocking password input by a user; and the obtaining unit is used for determining whether the unlocking password is correct or not, and obtaining the included angle value between the current first screen and the second screen of the folding screen device under the condition that the unlocking password is correct.
In one embodiment, the control device of the screen folding apparatus may further include: the calling module is used for displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and calling a preset protection list before the preset application under the condition that the preset application is determined not to be located within the safety angle; and the reading module is used for reading the preset application from the protection list.
In one embodiment, the control device of the screen folding apparatus may further include: the first display module is used for displaying a setting interface; the first receiving module is used for receiving a setting instruction input by a user on the setting interface, wherein the setting instruction carries the preset safety angle and the preset application; and the storage module is used for performing associated storage on the preset safety angle and the preset application.
In one embodiment, the control device of the screen folding apparatus may further include: the second receiving module is used for receiving a password input by a user after the preset application is hidden under the condition that the password is determined not to be positioned in the safety angle; the second determination module is used for determining whether the input password is a standby password or not; and the second display module is used for displaying the preset application under the condition that the input password is determined to be the standby password.
An embodiment of the present application further provides a specific implementation manner of an electronic device, which is capable of implementing all steps in the control method of the folding screen device in the foregoing embodiment, where the electronic device specifically includes the following contents: a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the processor is configured to call a computer program in the memory, and when executing the computer program, the processor implements all the steps in the control method for a folding screen device in the foregoing embodiment, for example, when executing the computer program, the processor implements the following steps:
step 1: acquiring an included angle value between a first current screen and a second current screen of the folding screen device;
step 2: determining whether the included angle value is within a preset safety angle;
and step 3: displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and hiding the preset application under the condition that the preset application is determined not to be located within the safety angle.
It can be known from the above description that, in the embodiment of the present application, whether the included angle value between the current first screen and the current second screen of the folding screen device is located within the preset security angle is determined, if the included angle value is at the security angle, the set application may be displayed, and if the included angle value is not at the security angle, the set application may be hidden.
An embodiment of the present application further provides a computer-readable storage medium capable of implementing all the steps in the folding screen device control method in the foregoing embodiment, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, implements all the steps in the folding screen device control method in the foregoing embodiment, for example, when the processor executes the computer program, implements the following steps:
step 1: acquiring an included angle value between a first current screen and a second current screen of the folding screen device;
step 2: determining whether the included angle value is within a preset safety angle;
and step 3: displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and hiding the preset application under the condition that the preset application is determined not to be located within the safety angle.
It can be known from the above description that, in the embodiment of the present application, whether the included angle value between the current first screen and the current second screen of the folding screen device is located within the preset security angle is determined, if the included angle value is at the security angle, the set application may be displayed, and if the included angle value is not at the security angle, the set application may be hidden.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Although the present application provides method steps as described in an embodiment or flowchart, additional or fewer steps may be included based on conventional or non-inventive efforts. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or client product executes, it may execute sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the embodiments or methods shown in the figures.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a vehicle-mounted human-computer interaction device, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Although embodiments of the present description provide method steps as described in embodiments or flowcharts, more or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or end product executes, it may execute sequentially or in parallel (e.g., parallel processors or multi-threaded environments, or even distributed data processing environments) according to the method shown in the embodiment or the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the embodiments of the present description, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of multiple sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The embodiments of this specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The described embodiments may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment. In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of an embodiment of the specification. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
The above description is only an example of the embodiments of the present disclosure, and is not intended to limit the embodiments of the present disclosure. Various modifications and variations to the embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present specification should be included in the scope of the claims of the embodiments of the present specification.

Claims (9)

1. A folding screen device control method is characterized by comprising the following steps:
acquiring an included angle value between a first current screen and a second current screen of the folding screen device;
determining whether the included angle value is within a preset safety angle;
displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and hiding the preset application under the condition that the preset application is determined not to be located within the safety angle;
the method further comprises the following steps:
simultaneously displaying a setting interface, wherein the setting interface comprises set contents;
receiving a setting instruction input by a user on the setting interface, wherein the setting instruction carries the preset safety angle and the preset application;
performing associated storage on the preset safety angle and the preset application;
wherein, in case it is determined that the predetermined application is not located within the security angle, after hiding the predetermined application, further comprising:
receiving a password input by a user;
determining whether the input password is a standby password;
and displaying the preset application under the condition that the input password is determined to be a standby password.
2. The method of claim 1, wherein obtaining the current angle value between the first screen and the second screen of the folding screen device comprises:
starting the folding screen device in response to a triggering operation on the folding screen device;
receiving an unlocking password input by a user;
and determining whether the unlocking password is correct, and acquiring an included angle value between the current first screen and the second screen of the folding screen device under the condition that the unlocking password is correct.
3. The method of claim 1, wherein displaying a preset application if determined to be within the security angle, and hiding the preset application if determined not to be within the security angle further comprises:
calling a preset protection list;
and reading the preset application from the protection list.
4. A folding screen device control apparatus, comprising:
the acquisition module is used for acquiring an included angle value between a first current screen and a second current screen of the folding screen device;
the first determining module is used for determining whether the included angle value is within a preset safety angle or not;
the display module is used for displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and hiding the preset application under the condition that the preset application is determined not to be located within the safety angle;
the first display module is used for simultaneously displaying a setting interface, and the setting interface comprises set contents;
the first receiving module is used for receiving a setting instruction input by a user on the setting interface, wherein the setting instruction carries the preset safety angle and the preset application;
the storage module is used for storing the preset safety angle and the preset application in an associated manner;
the second receiving module is used for receiving a password input by a user after the preset application is hidden under the condition that the password is determined not to be positioned in the safety angle;
the second determination module is used for determining whether the input password is a standby password or not;
and the second display module is used for displaying the preset application under the condition that the input password is determined to be the standby password.
5. The apparatus of claim 4, wherein the obtaining module comprises:
the starting unit is used for responding to the triggering operation of the folding screen equipment and starting the folding screen equipment;
the receiving unit is used for receiving an unlocking password input by a user;
and the obtaining unit is used for determining whether the unlocking password is correct or not, and obtaining the included angle value between the current first screen and the second screen of the folding screen device under the condition that the unlocking password is correct.
6. The apparatus of claim 4, further comprising:
the calling module is used for displaying a preset application under the condition that the preset application is determined to be located within the safety angle, and calling a preset protection list before the preset application under the condition that the preset application is determined not to be located within the safety angle;
and the reading module is used for reading the preset application from the protection list.
7. A folding screen device comprising: a folding screen device control apparatus according to any one of claims 4 to 6.
8. A network device, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 3 when executing the computer program.
9. A non-transitory computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the method of any one of claims 1 to 3.
CN201910663258.2A 2019-07-22 2019-07-22 Control method and device for folding screen equipment Active CN110581921B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910663258.2A CN110581921B (en) 2019-07-22 2019-07-22 Control method and device for folding screen equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910663258.2A CN110581921B (en) 2019-07-22 2019-07-22 Control method and device for folding screen equipment

Publications (2)

Publication Number Publication Date
CN110581921A CN110581921A (en) 2019-12-17
CN110581921B true CN110581921B (en) 2020-12-15

Family

ID=68810435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910663258.2A Active CN110581921B (en) 2019-07-22 2019-07-22 Control method and device for folding screen equipment

Country Status (1)

Country Link
CN (1) CN110581921B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143905B (en) * 2019-12-25 2023-08-18 康佳集团股份有限公司 Protection method of folding screen equipment, storage medium and processor
CN115906145A (en) * 2021-09-22 2023-04-04 华为技术有限公司 Equipment control method and related device
CN116156050A (en) * 2023-02-23 2023-05-23 维沃移动通信有限公司 Display method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107728901A (en) * 2017-10-24 2018-02-23 广东欧珀移动通信有限公司 interface display method, device and terminal
CN109815676A (en) * 2019-01-29 2019-05-28 维沃移动通信有限公司 A kind of private space operating method and terminal device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009049512A (en) * 2007-08-14 2009-03-05 Toshiba Corp Screen display processing apparatus and method
KR102342555B1 (en) * 2014-11-10 2021-12-23 엘지전자 주식회사 Mobile terminal and control method thereof
CN107656666B (en) * 2016-07-26 2020-09-25 北京小米移动软件有限公司 Mobile terminal and scrolling speed determination method
CN108089907A (en) * 2017-12-28 2018-05-29 努比亚技术有限公司 A kind of method of control terminal, terminal and computer readable storage medium
CN109032406A (en) * 2018-07-10 2018-12-18 维沃移动通信有限公司 A kind of control method and mobile terminal
CN109241775B (en) * 2018-11-09 2021-01-08 维沃移动通信有限公司 Privacy protection method and terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107728901A (en) * 2017-10-24 2018-02-23 广东欧珀移动通信有限公司 interface display method, device and terminal
CN109815676A (en) * 2019-01-29 2019-05-28 维沃移动通信有限公司 A kind of private space operating method and terminal device

Also Published As

Publication number Publication date
CN110581921A (en) 2019-12-17

Similar Documents

Publication Publication Date Title
EP3547604B1 (en) Method and apparatus for security question generation and identity verification
CN110581921B (en) Control method and device for folding screen equipment
US11403375B2 (en) Permission management system, permission management method, and electronic device
KR101622300B1 (en) Limiting the functionality of a software program based on a security model
CN106648384B (en) Service calling method and device
EP3472784B1 (en) Payment information processing method, apparatus, and user device
CN108376335B (en) Payment method, device and equipment
CN106227585B (en) Application program starting method, device and equipment
CN105760737A (en) Control method for applications and terminal
EP3089068A1 (en) Application program management method, device, terminal, and computer storage medium
CN110889691B (en) Information display method, device and equipment
CN107622203A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN104077512A (en) Personnel information safety management method and management device
WO2017008348A1 (en) Data card switching control method and apparatus, and terminal device
CN106599115B (en) Data protection method, device and terminal
CN108550033B (en) Method and device for displaying unique identifier of digital object
US11790344B2 (en) Method and apparatus for displaying identification code of application
CN110555302A (en) Unlocking method and device and electronic equipment
CN109981873B (en) Address book permission opening method and device and electronic equipment
CN107392010B (en) Root operation execution method and device, terminal equipment and storage medium
CN107483534B (en) Service processing method and device
CN105988780A (en) Window background implementing method and device
CN115879090A (en) Account login method and device, electronic equipment and storage medium
CN111813475A (en) Dynamic information display method based on negative one-screen combination with face recognition
CN105740738A (en) Mobile terminal display method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant