CN105844133A - Application opening method and system - Google Patents

Application opening method and system Download PDF

Info

Publication number
CN105844133A
CN105844133A CN201610156806.9A CN201610156806A CN105844133A CN 105844133 A CN105844133 A CN 105844133A CN 201610156806 A CN201610156806 A CN 201610156806A CN 105844133 A CN105844133 A CN 105844133A
Authority
CN
China
Prior art keywords
application
time parameter
setting value
time
judge
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610156806.9A
Other languages
Chinese (zh)
Other versions
CN105844133B (en
Inventor
谢涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610156806.9A priority Critical patent/CN105844133B/en
Publication of CN105844133A publication Critical patent/CN105844133A/en
Application granted granted Critical
Publication of CN105844133B publication Critical patent/CN105844133B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Abstract

The invention relates to an application opening method and system. The method comprises the following steps: detecting a touch operation which aims at the icon of a target application, wherein the target application is an application under a locking state; obtaining the operation frequency and the operation time parameter of the touch operation; judging whether the operation frequency is the same with an operation frequency set value used for opening the application under the locking state, and judging whether the operation time parameter is matched with a time parameter set value used for opening the application under the locking state or not; and if the operation frequency is the same with the operation frequency set value and the operation time parameter is matched with the time parameter set value, opening the target application. The scheme of the invention can be adopted to guarantee operation convenience while the safety of application data is improved.

Description

Application deployment method and system
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of application deployment method and system.
Background technology
At present, requisite electronics during the terminal such as mobile phone, panel computer has become as people's work and life Equipment.After user downloads, installs certain application, the figure of this application can be shown on the display interface of terminal Mark, user clicks on this icon just can enter this application, easy to operate.
This mode opening application brings many facilities to user, but, some are accessed to your account and close The application that code logs in, if not logging off, often clicking on the icon of this application in next time and still can enter Enter this application so that use data and privacy information in these application also exist compromised risk.And Log off mode if used, then need again when using application to re-enter every time account and password (or Person re-enters password), simple operation is the most relatively low.
Summary of the invention
It is an object of the invention to provide a kind of application deployment method and system, application data peace can improved The convenience of operation is ensured while full property.
The purpose of the present invention is achieved through the following technical solutions:
A kind of application deployment method, comprises the steps:
Detecting the touch control operation of the icon for intended application, wherein, described intended application is for being in locking shape The application of state;
Obtain number of operations and the operating time parameter of described touch control operation;
Judge described number of operations whether with the number of operations setting value phase opening the application being in the lock state With, and judge whether described operating time parameter sets with the time parameter opening the application being in the lock state Value matches;
If described number of operations is identical with described number of operations setting value and described operating time parameter with time described Between pre-set parameter match, then open described intended application.
System is opened in a kind of application, including:
Detection module, for detecting the touch control operation for intended application, wherein, described intended application is place Application in lock-out state;
Acquisition module, for obtaining number of operations and the operating time parameter of described touch control operation;
First judge module, for judge described number of operations whether with open the application that is in the lock state Number of operations setting value is identical;
Second judge module, for judge described operating time parameter whether with open be in the lock state should Time parameter setting value match;
Open module, be for the result of determination at described first judge module, described second judge module When being, open described intended application.
According to the scheme of the invention described above, it is the touch control operation detecting the icon for intended application, wherein, Described intended application is the application being in the lock state, and obtains number of operations and the operating time of this touch control operation Parameter, it is judged that described number of operations whether with the number of operations setting value phase opening the application being in the lock state With, and judge whether described operating time parameter sets with the time parameter opening the application being in the lock state Value matches, if described number of operations is identical with described number of operations setting value and described operating time parameter with Described time parameter setting value matches, then open described intended application, uses the solution of the present invention, when with When family needs to protect the data in certain application, after this application can be selected, the state of this application is switched to lock Determine state, so, only perform that number of operations is identical with described number of operations setting value and operating time ginseng The touch control operation that number matches with described time parameter setting value, just can open this application, it is ensured that this application The safety of middle data, as long as simultaneously as user performs number of operations and described number of operations setting value phase The touch control operation that same and operating time parameter matches with described time parameter setting value, it is possible to open corresponding Application, without re-entering account and password (or re-entering password), it is ensured that operation is just Victory.
Accompanying drawing explanation
Fig. 1 be the embodiment of the present invention one application deployment method realize schematic flow sheet one;
Fig. 2 be the embodiment of the present invention two application deployment method realize schematic flow sheet two;
Fig. 3 is the composition structural representation that system is opened in the application of the embodiment of the present invention three.
Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing and enforcement Example, is described in further detail the present invention.Should be appreciated that detailed description of the invention described herein Only in order to explain the present invention, do not limit protection scope of the present invention.
Embodiment one
The embodiment of the present invention provides one application deployment method, and Fig. 1 is that the application of the embodiment of the present invention one is opened Method realize schematic flow sheet one, as it is shown in figure 1, the application deployment method in this embodiment includes:
Step S101: detecting the touch control operation of the icon for intended application, wherein, described intended application is The application being in the lock state;
Here, described intended application include play application, chat application, note apply, Video Applications or Person pays application etc., and described intended application can download to terminal, can run after installing successfully in terminal;
Here, at least during described touch control operation can include clicking operation, slide, pressing operation Kind, but it is also not necessarily limited to this;
Detection and type identification to touch control operation, can refuse at this in the way of employing arbitrarily can be with realization Repeat;
Step S102: obtain number of operations and the operating time parameter of described touch control operation;
Here, described operating time parameter can include value interval time (can by operate for adjacent twice time Quarter determines), total time value (can be by the moment of first time touch control operation and the moment of last touch control operation Determine) at least one, but be also not necessarily limited to this;
Step S103: judge described number of operations whether with the number of operations opening the application being in the lock state Setting value is identical;
Step S104: judge described operating time parameter whether with the time opening the application being in the lock state Pre-set parameter matches;
Wherein, above-mentioned number of operations setting value and pre-set parameter can be that system default is arranged, it is possible to Being that user is arranged according to actual needs;
Step S105: open described intended application;
Specifically, the result of determination in step S103 and step S104 is when being, enters step S105, The most described number of operations is identical with described number of operations setting value and described operating time parameter and described time Pre-set parameter matches, then open described intended application.
Accordingly, according to the scheme of above-mentioned the present embodiment, it is the touch-control behaviour detecting the icon for intended application Making, wherein, described intended application is the application being in the lock state, and obtains the number of operations of this touch control operation With operating time parameter, it is judged that described number of operations is the most secondary with the operation opening the application being in the lock state Number setting values are identical, and judge described operating time parameter whether with open the application that is in the lock state time Between pre-set parameter match, if described number of operations is identical with described number of operations setting value and described operation Time parameter matches with described time parameter setting value, then open described intended application, uses the present invention's Scheme, when data during user needs to protect certain application, can select the shape of this application after this application State switches to lock-out state, so, only perform number of operations identical with described number of operations setting value and The touch control operation that operating time parameter matches with described time parameter setting value, just can open this application, protects Demonstrate,prove the safety of data in this application, as long as simultaneously as user performs number of operations and described operation time The number touch control operation that setting values are identical and operating time parameter matches with described time parameter setting value, so that it may To open corresponding application, without re-entering account and password (or re-entering password), it is ensured that The convenience of operation.
Above-mentioned judge whether described operating time parameter sets with the time parameter opening the application being in the lock state Definite value matches can different implementations, two kinds of concrete implementation modes given below:
Mode one:
This is achieved in that and includes very first time range of error and adjacent twice with described time parameter setting value As a example by the very first time interval setting value of operation;Described judge whether described operating time parameter is in opening The process that the time parameter setting value of the application of lock-out state matches can include step: judges described touch-control The time interval value of twice operation of arbitrary neighborhood in operation is the most equal with the difference of described time interval setting value In described very first time range of error;The most then judge that described operating time parameter is in locking with opening The time parameter setting value of the application of state matches;
Wherein, user can arrange very first time range of error according to actual needs, very first time interval sets Value, the time interval value of twice operation of arbitrary neighborhood in described touch control operation, can be by by described touch-control The moment of twice operation of arbitrary neighborhood in operation subtracts each other and obtains;
Such as, very first time range of error is 1 second, and very first time range of error is-0.2 second~0.2 second, institute Stating touch control operation is clicking operation, the icon of 3 intended application of user's adopting consecutive click chemical reaction, if the 2nd time and the 1st The difference of the time interval value of secondary clicking operation and 1 second in-0.2 second~0.2 second, and the 3rd time and the 2nd The difference of the time interval value of secondary clicking operation and 1 second also in-0.2 second~0.2 second, then judges described behaviour The time parameter setting value making time parameter and open the application being in the lock state matches then system, if the 2nd The difference of the secondary and time interval value of the clicking operation of the 1st time and 1 second not in-0.2 second~0.2 second, or The time interval value of the clicking operation of the 3rd time and the 2nd time and the difference of 1 second not in-0.2 second~0.2 second, Then judge described operating time parameter and do not open the time parameter setting value of the application being in the lock state not Join.
Mode two:
This is achieved in that and includes the second time error scope and twice operation of head and the tail with described unlocked time parameter The second time interval setting value as a example by, described judge whether described operating time parameter is in locking with opening The process that the time parameter setting value of the application of state matches can include step: judges described touch control operation In the time interval value of twice operation of head and the tail and the difference of the second time interval setting value whether described second In the range of time error;The most then judge described operating time parameter and open the application being in the lock state Time parameter setting value match.
Wherein, user can arrange the second time error scope according to actual needs, the second time interval sets Value, the time interval value of twice operation of head and the tail in described touch control operation, can be by by described touch control operation In moment of last operation subtract each other with the moment operated for the first time and obtain;
Such as, the second time error scope is 1.5 seconds, and very first time range of error is-0.3 second~0.3 second, Described touch control operation is clicking operation, the icon of 4 intended application of user's adopting consecutive click chemical reaction, if the 4th and the 1st The difference of the time interval value of secondary clicking operation and 1.5 seconds in-0.3 second~0.3 second, then judges described behaviour The time parameter setting value making time parameter and open the application being in the lock state matches then system, if the 4th The difference of the secondary and time interval value of the clicking operation of the 1st time and 1.5 seconds is not in-0.3 second~0.3 second, then The time parameter setting value judging described operating time parameter and open the application being in the lock state is not mated.
It should be noted that judge described operating time parameter whether with open the application that is in the lock state The implementation that time parameter setting value matches is not limited to above two mode.
Embodiment two
The embodiment of the present invention provides one application deployment method, and Fig. 2 is that the application of the embodiment of the present invention two is opened Method realize schematic flow sheet two, as in figure 2 it is shown, the application deployment method in this embodiment includes:
Step S201: obtain list of application, receives application and chooses instruction, chooses the selected institute of instruction according to described State the certain applications being in unlocked state in list of application, and selected application is switched to locking shape State;
Here, described list of application refers generally to the list of mounted whole application programs, Yong Huke in terminal To choose part application as required, the present embodiment scheme receives application and chooses instruction, according to described choosing The certain applications being in unlocked state in described list of application are selected in instruction fetch, and (i.e. Subscriber Application Barring Lock chooses one Divide application), and selected application is switched to lock-out state;
The opening of application being in unlocked state can realize in the way of employing is traditional, such as, beats after click Open;
Additionally, the application deployment method of the embodiment of the present invention can also include step: receive switching command, will The application that switching command is corresponding is switched to lock-out state from unlocked state, or should by corresponding for switching command It is switched to unlocked state with from lock-out state;So, user can control the state of each application flexibly;
In order to prevent the state of other people random change application, after instruction can being chosen receiving application, carry Show that user inputs password, when the password that user is inputted is consistent with the password prestored, according to described choosing The certain applications being in unlocked state in described list of application are selected in instruction fetch, and by selected application Switch to lock-out state;
Step S202: receive instruction is set, according to described arrange instruction arrange described number of operations setting value and Described time parameter setting value;
Here, described setting instructs data and the correspondence described time including corresponding described number of operations setting value The data of pre-set parameter, these data are that user is freely arranged;
In order to prevent, other people are random arranges corresponding parameter, can be after receiving and arranging instruction, and prompting is used Family input password, when the password that user is inputted is consistent with the password prestored, arranges finger according to described Order arranges described number of operations setting value and described time parameter setting value;
It should be noted that in actual applications, for having applied the in the case of of arranging with parameter of choosing, then Above-mentioned steps S201 and step S202 can be ignored, directly start to perform, for only from following step S203 Complete the situation that application is chosen, can directly start to perform from step S202, set for having only completed parameter Situation about putting, can start to perform from step S203 after execution of step S201;
Step S203: detecting the touch control operation of the icon for intended application, wherein, described intended application is The application being in the lock state;
Step S204: obtain number of operations and the operating time parameter of described touch control operation;
Step S205: judge described number of operations whether with the number of operations opening the application being in the lock state Setting value is identical;
Step S206: judge described operating time parameter whether with the time opening the application being in the lock state Pre-set parameter matches;
Step S207: if described number of operations is identical with described number of operations setting value and described operating time ginseng Number matches with described time parameter setting value, then open described intended application;
Specifically, the result of determination in step S205 and step S206 is when being, enters step S207, The most described number of operations is identical with described number of operations setting value and described operating time parameter and described time Pre-set parameter matches, then open described intended application.
Other technologies feature in the present embodiment is identical with above-described embodiment one, does not repeats them here.
Embodiment three
Application deployment method according to the present invention in above-described embodiment, the embodiment of the present invention also provides for a kind of answering With opening system.Fig. 3 is the composition structural representation that system is opened in the application of the embodiment of the present invention three.Fig. 3 Shown in be the application of the present invention structural representation of opening a preferable examples composition of system.According to not Same Consideration, when system is opened in the application implementing the present invention, can comprise shown in Fig. 3 All, it is also possible to only comprise a portion shown in Fig. 3.
System is opened in application in an embodiment wherein, can include the detection module 301 in Fig. 3, obtain Delivery block the 302, second judge module 304 and open module 305, wherein:
Detection module 301, for detecting the touch control operation for intended application, wherein, described intended application is The application being in the lock state;
Acquisition module 302, for obtaining number of operations and the operating time parameter of described touch control operation;
First judge module 303, for judge described number of operations whether with open the application being in the lock state Number of operations setting value identical;
Second judge module 304, for judging that whether described operating time parameter is in the lock state with opening The time parameter setting value of application matches;
Open module 305, equal for the result of determination at first judge module the 303, second judge module 304 During for being, open described intended application.
Application in an embodiment wherein opens system, as shown in Figure 3, it is also possible to include choosing module 306, wherein:
Choose module 306, be used for obtaining list of application, receive application and choose instruction, choose instruction according to described The certain applications being in unlocked state in selected described list of application, and selected application is switched to Lock-out state.
Application in an embodiment wherein opens system, as shown in Figure 3, it is also possible to include arranging module 307, wherein:
Module 307 is set, instruction is set for reception, instruction is set according to described described number of operations is set sets Definite value and described time parameter setting value.
Wherein in an embodiment, described time parameter setting value can include very first time range of error with And the very first time interval setting value of adjacent twice operation;
Second judge module 304 may determine that between the time of twice operation of arbitrary neighborhood in described touch control operation Every value with the difference of described time interval setting value the most all in described very first time range of error, if so, The time parameter setting value phase then judging described operating time parameter and open the application being in the lock state Join.
Wherein in an embodiment, described unlocked time parameter can include the second time error scope and head Second time interval setting value of twice operation of tail;
Second judge module 304 may determine that the time interval value of twice operation of head and the tail in described touch control operation With the difference of the second time interval setting value whether in the range of described second time error, the most then judge Described operating time parameter and the time parameter setting value opening the application being in the lock state match.
The terminal that the embodiment of the present invention provides, it is pointed out that: above application is opened to the description of system, Description with above-mentioned application deployment method is similar, and has the beneficial effect of above-mentioned application deployment method, For saving length, repeat no more;Therefore, the above application providing the embodiment of the present invention is opened in system not The ins and outs disclosed, refer to the description of the application deployment method of above-mentioned offer.
It will appreciated by the skilled person that all or part of flow process realizing in above-described embodiment method, Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating In machine read/write memory medium, as independent production marketing or use.Described program upon execution, can be held All or part of step of the embodiment of row such as above-mentioned each method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Ran Dom Access Memory, RAM) etc..
Or, if the above-mentioned integrated module of the present invention is using the form realization of software function module and as independent Production marketing or use time, it is also possible to be stored in a computer read/write memory medium.Based on so Understanding, the part that prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words can Embodying with the form with software product, this computer software product is stored in a storage medium, bag Include some instructions with so that a computer equipment (can be personal computer, server or network Equipment etc.) perform all or part of of method described in each embodiment of the present invention.And aforesaid storage medium bag Include: various Jie that can store program code such as movable storage device, ROM, RAM, magnetic disc or CD Matter.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, in certain embodiment the most in detail The part stated, may refer to the associated description of other embodiments.It is appreciated that the term " used in it One ", " second " etc. be used for distinguishing object in this article, but these objects should not be limited by these terms.Example As, without departing from the scope of the invention, the first judge module can be referred to as the second judge module, Second judge module is referred to as the first judge module.
In several embodiments provided herein, it should be understood that disclosed method and system, can To realize by another way.Apparatus embodiments described above is only schematically, such as, and institute Stating the division of module, be only a kind of logic function and divide, actual can have other dividing mode when realizing, As: multiple modules or assembly can be in conjunction with, or it is desirably integrated into another system, or some features can be neglected Slightly, or do not perform.It addition, the coupling each other of shown or discussed each ingredient or directly coupling Close or communication connection can be the INDIRECT COUPLING by some interfaces, equipment or module or communication connection, can Be electrical, machinery or other form.
It addition, each functional module in various embodiments of the present invention can be fully integrated in a processing module, Can also be that each module is individually as a module, it is also possible to two or more modules are integrated in one In individual module;Above-mentioned integrated module both can realize to use the form of hardware, it would however also be possible to employ hardware adds soft The form of part functional module realizes.
Each technical characteristic of embodiment described above can combine arbitrarily, for making description succinct, the most right The all possible combination of each technical characteristic in above-described embodiment is all described, but, if these skills There is not contradiction in the combination of art feature, is all considered to be the scope that this specification is recorded.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes more concrete and detailed, But can not therefore be construed as limiting the scope of the patent.It should be pointed out that, for this area For those of ordinary skill, without departing from the inventive concept of the premise, it is also possible to make some deformation and change Entering, these broadly fall into protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be with appended power Profit requires to be as the criterion.

Claims (10)

1. an application deployment method, it is characterised in that comprise the steps:
Detecting the touch control operation of the icon for intended application, wherein, described intended application is for being in locking shape The application of state;
Obtain number of operations and the operating time parameter of described touch control operation;
Judge described number of operations whether with the number of operations setting value phase opening the application being in the lock state With, and judge whether described operating time parameter sets with the time parameter opening the application being in the lock state Value matches;
If described number of operations is identical with described number of operations setting value and described operating time parameter with time described Between pre-set parameter match, then open described intended application.
Application deployment method the most according to claim 1, it is characterised in that further comprise the steps of:
Obtain list of application, receive application and choose instruction, choose the selected described list of application of instruction according to described In the certain applications being in unlocked state, and selected application is switched to lock-out state.
Application deployment method the most according to claim 1, it is characterised in that further comprise the steps of:
Reception arranges instruction, according to described arrange instruction arrange described number of operations setting value and the described time ginseng Number setting value.
Application deployment method the most according to claim 1, it is characterised in that described time parameter sets Value includes the very first time interval setting value of very first time range of error and adjacent twice operation;
Described judge whether described operating time parameter sets with the time parameter opening the application being in the lock state The process that definite value matches includes step:
Judge that the time interval value of twice operation of arbitrary neighborhood in described touch control operation sets with described time interval The difference of definite value is the most all in described very first time range of error;
The most then judge that described operating time parameter and the time parameter opening the application being in the lock state set Definite value matches.
Application deployment method the most according to claim 1, it is characterised in that described unlocked time parameter Including the second time error scope and the second time interval setting value of twice operation of head and the tail;
Described judge whether described operating time parameter sets with the time parameter opening the application being in the lock state The process that definite value matches includes step:
Judge time interval value and the second time interval setting value of twice operation of head and the tail in described touch control operation Difference whether in the range of described second time error;
The most then judge that described operating time parameter and the time parameter opening the application being in the lock state set Definite value matches.
6. system is opened in an application, it is characterised in that including:
Detection module, for detecting the touch control operation for intended application, wherein, described intended application is place Application in lock-out state;
Acquisition module, for obtaining number of operations and the operating time parameter of described touch control operation;
First judge module, for judge described number of operations whether with open the application that is in the lock state Number of operations setting value is identical;
Second judge module, for judge described operating time parameter whether with open be in the lock state should Time parameter setting value match;
Open module, be for the result of determination at described first judge module, described second judge module When being, open described intended application.
System is opened in application the most according to claim 6, it is characterised in that also include:
Choose module, be used for obtaining list of application, receive application and choose instruction, choose instruction choosing according to described The certain applications being in unlocked state in fixed described list of application, and selected application is switched to lock Determine state.
System is opened in application the most according to claim 6, it is characterised in that also include:
Module is set, instruction is set for reception, according to described arrange instruction arrange described number of operations set Value and described time parameter setting value.
System is opened in application the most according to claim 6, it is characterised in that described time parameter sets Value includes the very first time interval setting value of very first time range of error and adjacent twice operation;
Described second judge module judges the time interval value of twice operation of arbitrary neighborhood in described touch control operation With the difference of described time interval setting value the most all in described very first time range of error, the most then sentence Fixed described operating time parameter matches with the time parameter setting value opening the application being in the lock state.
System is opened in application the most according to claim 6, it is characterised in that described unlocked time is joined Number includes the second time error scope and the second time interval setting value of twice operation of head and the tail;
Described second judge module judges the time interval value and of twice operation of head and the tail in described touch control operation Whether the difference of two time interval setting values in the range of described second time error, the most then judges described Operating time parameter and the time parameter setting value opening the application being in the lock state match.
CN201610156806.9A 2016-03-18 2016-03-18 Using deployment method and system Expired - Fee Related CN105844133B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610156806.9A CN105844133B (en) 2016-03-18 2016-03-18 Using deployment method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610156806.9A CN105844133B (en) 2016-03-18 2016-03-18 Using deployment method and system

Publications (2)

Publication Number Publication Date
CN105844133A true CN105844133A (en) 2016-08-10
CN105844133B CN105844133B (en) 2019-04-02

Family

ID=56587330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610156806.9A Expired - Fee Related CN105844133B (en) 2016-03-18 2016-03-18 Using deployment method and system

Country Status (1)

Country Link
CN (1) CN105844133B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106937406A (en) * 2017-04-06 2017-07-07 深圳市晟碟半导体有限公司 A kind of method and system for accessing wireless network
CN108073342A (en) * 2017-11-08 2018-05-25 广东小天才科技有限公司 Method for operating application program, device, terminal and the storage medium of mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102866853A (en) * 2012-08-23 2013-01-09 广东欧珀移动通信有限公司 Method and device for operating and controlling application program of touch screen terminal
CN103558990A (en) * 2013-11-05 2014-02-05 广东欧珀移动通信有限公司 Method and system for rapidly opening or operating applications on mobile terminal
CN104035707A (en) * 2013-03-08 2014-09-10 三星电子(中国)研发中心 Terminal and rapid startup method for applications of terminal
CN105068847A (en) * 2015-08-26 2015-11-18 广东欧珀移动通信有限公司 Application program starting method and intelligent watch
CN105354029A (en) * 2015-11-04 2016-02-24 广州酷狗计算机科技有限公司 Application control method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102866853A (en) * 2012-08-23 2013-01-09 广东欧珀移动通信有限公司 Method and device for operating and controlling application program of touch screen terminal
CN104035707A (en) * 2013-03-08 2014-09-10 三星电子(中国)研发中心 Terminal and rapid startup method for applications of terminal
CN103558990A (en) * 2013-11-05 2014-02-05 广东欧珀移动通信有限公司 Method and system for rapidly opening or operating applications on mobile terminal
CN105068847A (en) * 2015-08-26 2015-11-18 广东欧珀移动通信有限公司 Application program starting method and intelligent watch
CN105354029A (en) * 2015-11-04 2016-02-24 广州酷狗计算机科技有限公司 Application control method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106937406A (en) * 2017-04-06 2017-07-07 深圳市晟碟半导体有限公司 A kind of method and system for accessing wireless network
CN106937406B (en) * 2017-04-06 2019-12-17 深圳市晟碟半导体有限公司 Method and system for accessing wireless network
CN108073342A (en) * 2017-11-08 2018-05-25 广东小天才科技有限公司 Method for operating application program, device, terminal and the storage medium of mobile terminal

Also Published As

Publication number Publication date
CN105844133B (en) 2019-04-02

Similar Documents

Publication Publication Date Title
CN104050417B (en) A kind of method and device detected in mobile terminal to application state
CN106096349A (en) A kind of method quickly opening application based on screen locking and mobile terminal
CN105824657B (en) A kind of method and mobile terminal for showing application program
CN104111728A (en) Electronic device and voice command input method based on operation gestures
CN105573778A (en) Method for starting application program and terminal
CN105892820A (en) Icon display management method and device
CN109085976A (en) Interface hidden method and device
CN108459794A (en) A kind of interactive operation processing method and processing device of button-free screen
CN106127012A (en) A kind of method of unlocked by fingerprint and terminal
CN105955769A (en) Method and apparatus for starting multimedia application
CN105511828A (en) Double-screen display method and terminal equipment
CN105844133A (en) Application opening method and system
CN105117138A (en) Method and device for shielding screen locking of operating system and mobile terminal
CN106648737A (en) Application control method and device, and mobile terminal
CN106203174A (en) Application information processing method and device and electronic equipment
CN106126206A (en) A kind of information processing method and electronic equipment
CN106126377A (en) The method and device of system start-up
CN105159764A (en) Control method for application switching of mobile terminal and mobile terminal
CN107450806A (en) Shortcut menu display methods, mobile terminal and the device with store function
CN104750369B (en) The control method and device of rapid switch in a kind of intelligent terminal
CN105759969B (en) Control method, device and the mobile terminal of mobile terminal
CN106302531A (en) Safety protection method and device and terminal equipment
CN106559550A (en) SIM management method and electronic installation
CN104715173A (en) Desktop software filtering system
CN107340963A (en) A kind of information processing method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190402