CN105844133A - Application opening method and system - Google Patents
Application opening method and system Download PDFInfo
- Publication number
- CN105844133A CN105844133A CN201610156806.9A CN201610156806A CN105844133A CN 105844133 A CN105844133 A CN 105844133A CN 201610156806 A CN201610156806 A CN 201610156806A CN 105844133 A CN105844133 A CN 105844133A
- Authority
- CN
- China
- Prior art keywords
- application
- time parameter
- setting value
- time
- judge
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000001514 detection method Methods 0.000 claims description 5
- 230000008569 process Effects 0.000 claims description 5
- 241000208340 Araliaceae Species 0.000 claims description 3
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims description 3
- 235000003140 Panax quinquefolius Nutrition 0.000 claims description 3
- 235000008434 ginseng Nutrition 0.000 claims description 3
- 238000003860 storage Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 239000004615 ingredient Substances 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
Abstract
The invention relates to an application opening method and system. The method comprises the following steps: detecting a touch operation which aims at the icon of a target application, wherein the target application is an application under a locking state; obtaining the operation frequency and the operation time parameter of the touch operation; judging whether the operation frequency is the same with an operation frequency set value used for opening the application under the locking state, and judging whether the operation time parameter is matched with a time parameter set value used for opening the application under the locking state or not; and if the operation frequency is the same with the operation frequency set value and the operation time parameter is matched with the time parameter set value, opening the target application. The scheme of the invention can be adopted to guarantee operation convenience while the safety of application data is improved.
Description
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of application deployment method and system.
Background technology
At present, requisite electronics during the terminal such as mobile phone, panel computer has become as people's work and life
Equipment.After user downloads, installs certain application, the figure of this application can be shown on the display interface of terminal
Mark, user clicks on this icon just can enter this application, easy to operate.
This mode opening application brings many facilities to user, but, some are accessed to your account and close
The application that code logs in, if not logging off, often clicking on the icon of this application in next time and still can enter
Enter this application so that use data and privacy information in these application also exist compromised risk.And
Log off mode if used, then need again when using application to re-enter every time account and password (or
Person re-enters password), simple operation is the most relatively low.
Summary of the invention
It is an object of the invention to provide a kind of application deployment method and system, application data peace can improved
The convenience of operation is ensured while full property.
The purpose of the present invention is achieved through the following technical solutions:
A kind of application deployment method, comprises the steps:
Detecting the touch control operation of the icon for intended application, wherein, described intended application is for being in locking shape
The application of state;
Obtain number of operations and the operating time parameter of described touch control operation;
Judge described number of operations whether with the number of operations setting value phase opening the application being in the lock state
With, and judge whether described operating time parameter sets with the time parameter opening the application being in the lock state
Value matches;
If described number of operations is identical with described number of operations setting value and described operating time parameter with time described
Between pre-set parameter match, then open described intended application.
System is opened in a kind of application, including:
Detection module, for detecting the touch control operation for intended application, wherein, described intended application is place
Application in lock-out state;
Acquisition module, for obtaining number of operations and the operating time parameter of described touch control operation;
First judge module, for judge described number of operations whether with open the application that is in the lock state
Number of operations setting value is identical;
Second judge module, for judge described operating time parameter whether with open be in the lock state should
Time parameter setting value match;
Open module, be for the result of determination at described first judge module, described second judge module
When being, open described intended application.
According to the scheme of the invention described above, it is the touch control operation detecting the icon for intended application, wherein,
Described intended application is the application being in the lock state, and obtains number of operations and the operating time of this touch control operation
Parameter, it is judged that described number of operations whether with the number of operations setting value phase opening the application being in the lock state
With, and judge whether described operating time parameter sets with the time parameter opening the application being in the lock state
Value matches, if described number of operations is identical with described number of operations setting value and described operating time parameter with
Described time parameter setting value matches, then open described intended application, uses the solution of the present invention, when with
When family needs to protect the data in certain application, after this application can be selected, the state of this application is switched to lock
Determine state, so, only perform that number of operations is identical with described number of operations setting value and operating time ginseng
The touch control operation that number matches with described time parameter setting value, just can open this application, it is ensured that this application
The safety of middle data, as long as simultaneously as user performs number of operations and described number of operations setting value phase
The touch control operation that same and operating time parameter matches with described time parameter setting value, it is possible to open corresponding
Application, without re-entering account and password (or re-entering password), it is ensured that operation is just
Victory.
Accompanying drawing explanation
Fig. 1 be the embodiment of the present invention one application deployment method realize schematic flow sheet one;
Fig. 2 be the embodiment of the present invention two application deployment method realize schematic flow sheet two;
Fig. 3 is the composition structural representation that system is opened in the application of the embodiment of the present invention three.
Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing and enforcement
Example, is described in further detail the present invention.Should be appreciated that detailed description of the invention described herein
Only in order to explain the present invention, do not limit protection scope of the present invention.
Embodiment one
The embodiment of the present invention provides one application deployment method, and Fig. 1 is that the application of the embodiment of the present invention one is opened
Method realize schematic flow sheet one, as it is shown in figure 1, the application deployment method in this embodiment includes:
Step S101: detecting the touch control operation of the icon for intended application, wherein, described intended application is
The application being in the lock state;
Here, described intended application include play application, chat application, note apply, Video Applications or
Person pays application etc., and described intended application can download to terminal, can run after installing successfully in terminal;
Here, at least during described touch control operation can include clicking operation, slide, pressing operation
Kind, but it is also not necessarily limited to this;
Detection and type identification to touch control operation, can refuse at this in the way of employing arbitrarily can be with realization
Repeat;
Step S102: obtain number of operations and the operating time parameter of described touch control operation;
Here, described operating time parameter can include value interval time (can by operate for adjacent twice time
Quarter determines), total time value (can be by the moment of first time touch control operation and the moment of last touch control operation
Determine) at least one, but be also not necessarily limited to this;
Step S103: judge described number of operations whether with the number of operations opening the application being in the lock state
Setting value is identical;
Step S104: judge described operating time parameter whether with the time opening the application being in the lock state
Pre-set parameter matches;
Wherein, above-mentioned number of operations setting value and pre-set parameter can be that system default is arranged, it is possible to
Being that user is arranged according to actual needs;
Step S105: open described intended application;
Specifically, the result of determination in step S103 and step S104 is when being, enters step S105,
The most described number of operations is identical with described number of operations setting value and described operating time parameter and described time
Pre-set parameter matches, then open described intended application.
Accordingly, according to the scheme of above-mentioned the present embodiment, it is the touch-control behaviour detecting the icon for intended application
Making, wherein, described intended application is the application being in the lock state, and obtains the number of operations of this touch control operation
With operating time parameter, it is judged that described number of operations is the most secondary with the operation opening the application being in the lock state
Number setting values are identical, and judge described operating time parameter whether with open the application that is in the lock state time
Between pre-set parameter match, if described number of operations is identical with described number of operations setting value and described operation
Time parameter matches with described time parameter setting value, then open described intended application, uses the present invention's
Scheme, when data during user needs to protect certain application, can select the shape of this application after this application
State switches to lock-out state, so, only perform number of operations identical with described number of operations setting value and
The touch control operation that operating time parameter matches with described time parameter setting value, just can open this application, protects
Demonstrate,prove the safety of data in this application, as long as simultaneously as user performs number of operations and described operation time
The number touch control operation that setting values are identical and operating time parameter matches with described time parameter setting value, so that it may
To open corresponding application, without re-entering account and password (or re-entering password), it is ensured that
The convenience of operation.
Above-mentioned judge whether described operating time parameter sets with the time parameter opening the application being in the lock state
Definite value matches can different implementations, two kinds of concrete implementation modes given below:
Mode one:
This is achieved in that and includes very first time range of error and adjacent twice with described time parameter setting value
As a example by the very first time interval setting value of operation;Described judge whether described operating time parameter is in opening
The process that the time parameter setting value of the application of lock-out state matches can include step: judges described touch-control
The time interval value of twice operation of arbitrary neighborhood in operation is the most equal with the difference of described time interval setting value
In described very first time range of error;The most then judge that described operating time parameter is in locking with opening
The time parameter setting value of the application of state matches;
Wherein, user can arrange very first time range of error according to actual needs, very first time interval sets
Value, the time interval value of twice operation of arbitrary neighborhood in described touch control operation, can be by by described touch-control
The moment of twice operation of arbitrary neighborhood in operation subtracts each other and obtains;
Such as, very first time range of error is 1 second, and very first time range of error is-0.2 second~0.2 second, institute
Stating touch control operation is clicking operation, the icon of 3 intended application of user's adopting consecutive click chemical reaction, if the 2nd time and the 1st
The difference of the time interval value of secondary clicking operation and 1 second in-0.2 second~0.2 second, and the 3rd time and the 2nd
The difference of the time interval value of secondary clicking operation and 1 second also in-0.2 second~0.2 second, then judges described behaviour
The time parameter setting value making time parameter and open the application being in the lock state matches then system, if the 2nd
The difference of the secondary and time interval value of the clicking operation of the 1st time and 1 second not in-0.2 second~0.2 second, or
The time interval value of the clicking operation of the 3rd time and the 2nd time and the difference of 1 second not in-0.2 second~0.2 second,
Then judge described operating time parameter and do not open the time parameter setting value of the application being in the lock state not
Join.
Mode two:
This is achieved in that and includes the second time error scope and twice operation of head and the tail with described unlocked time parameter
The second time interval setting value as a example by, described judge whether described operating time parameter is in locking with opening
The process that the time parameter setting value of the application of state matches can include step: judges described touch control operation
In the time interval value of twice operation of head and the tail and the difference of the second time interval setting value whether described second
In the range of time error;The most then judge described operating time parameter and open the application being in the lock state
Time parameter setting value match.
Wherein, user can arrange the second time error scope according to actual needs, the second time interval sets
Value, the time interval value of twice operation of head and the tail in described touch control operation, can be by by described touch control operation
In moment of last operation subtract each other with the moment operated for the first time and obtain;
Such as, the second time error scope is 1.5 seconds, and very first time range of error is-0.3 second~0.3 second,
Described touch control operation is clicking operation, the icon of 4 intended application of user's adopting consecutive click chemical reaction, if the 4th and the 1st
The difference of the time interval value of secondary clicking operation and 1.5 seconds in-0.3 second~0.3 second, then judges described behaviour
The time parameter setting value making time parameter and open the application being in the lock state matches then system, if the 4th
The difference of the secondary and time interval value of the clicking operation of the 1st time and 1.5 seconds is not in-0.3 second~0.3 second, then
The time parameter setting value judging described operating time parameter and open the application being in the lock state is not mated.
It should be noted that judge described operating time parameter whether with open the application that is in the lock state
The implementation that time parameter setting value matches is not limited to above two mode.
Embodiment two
The embodiment of the present invention provides one application deployment method, and Fig. 2 is that the application of the embodiment of the present invention two is opened
Method realize schematic flow sheet two, as in figure 2 it is shown, the application deployment method in this embodiment includes:
Step S201: obtain list of application, receives application and chooses instruction, chooses the selected institute of instruction according to described
State the certain applications being in unlocked state in list of application, and selected application is switched to locking shape
State;
Here, described list of application refers generally to the list of mounted whole application programs, Yong Huke in terminal
To choose part application as required, the present embodiment scheme receives application and chooses instruction, according to described choosing
The certain applications being in unlocked state in described list of application are selected in instruction fetch, and (i.e. Subscriber Application Barring Lock chooses one
Divide application), and selected application is switched to lock-out state;
The opening of application being in unlocked state can realize in the way of employing is traditional, such as, beats after click
Open;
Additionally, the application deployment method of the embodiment of the present invention can also include step: receive switching command, will
The application that switching command is corresponding is switched to lock-out state from unlocked state, or should by corresponding for switching command
It is switched to unlocked state with from lock-out state;So, user can control the state of each application flexibly;
In order to prevent the state of other people random change application, after instruction can being chosen receiving application, carry
Show that user inputs password, when the password that user is inputted is consistent with the password prestored, according to described choosing
The certain applications being in unlocked state in described list of application are selected in instruction fetch, and by selected application
Switch to lock-out state;
Step S202: receive instruction is set, according to described arrange instruction arrange described number of operations setting value and
Described time parameter setting value;
Here, described setting instructs data and the correspondence described time including corresponding described number of operations setting value
The data of pre-set parameter, these data are that user is freely arranged;
In order to prevent, other people are random arranges corresponding parameter, can be after receiving and arranging instruction, and prompting is used
Family input password, when the password that user is inputted is consistent with the password prestored, arranges finger according to described
Order arranges described number of operations setting value and described time parameter setting value;
It should be noted that in actual applications, for having applied the in the case of of arranging with parameter of choosing, then
Above-mentioned steps S201 and step S202 can be ignored, directly start to perform, for only from following step S203
Complete the situation that application is chosen, can directly start to perform from step S202, set for having only completed parameter
Situation about putting, can start to perform from step S203 after execution of step S201;
Step S203: detecting the touch control operation of the icon for intended application, wherein, described intended application is
The application being in the lock state;
Step S204: obtain number of operations and the operating time parameter of described touch control operation;
Step S205: judge described number of operations whether with the number of operations opening the application being in the lock state
Setting value is identical;
Step S206: judge described operating time parameter whether with the time opening the application being in the lock state
Pre-set parameter matches;
Step S207: if described number of operations is identical with described number of operations setting value and described operating time ginseng
Number matches with described time parameter setting value, then open described intended application;
Specifically, the result of determination in step S205 and step S206 is when being, enters step S207,
The most described number of operations is identical with described number of operations setting value and described operating time parameter and described time
Pre-set parameter matches, then open described intended application.
Other technologies feature in the present embodiment is identical with above-described embodiment one, does not repeats them here.
Embodiment three
Application deployment method according to the present invention in above-described embodiment, the embodiment of the present invention also provides for a kind of answering
With opening system.Fig. 3 is the composition structural representation that system is opened in the application of the embodiment of the present invention three.Fig. 3
Shown in be the application of the present invention structural representation of opening a preferable examples composition of system.According to not
Same Consideration, when system is opened in the application implementing the present invention, can comprise shown in Fig. 3
All, it is also possible to only comprise a portion shown in Fig. 3.
System is opened in application in an embodiment wherein, can include the detection module 301 in Fig. 3, obtain
Delivery block the 302, second judge module 304 and open module 305, wherein:
Detection module 301, for detecting the touch control operation for intended application, wherein, described intended application is
The application being in the lock state;
Acquisition module 302, for obtaining number of operations and the operating time parameter of described touch control operation;
First judge module 303, for judge described number of operations whether with open the application being in the lock state
Number of operations setting value identical;
Second judge module 304, for judging that whether described operating time parameter is in the lock state with opening
The time parameter setting value of application matches;
Open module 305, equal for the result of determination at first judge module the 303, second judge module 304
During for being, open described intended application.
Application in an embodiment wherein opens system, as shown in Figure 3, it is also possible to include choosing module
306, wherein:
Choose module 306, be used for obtaining list of application, receive application and choose instruction, choose instruction according to described
The certain applications being in unlocked state in selected described list of application, and selected application is switched to
Lock-out state.
Application in an embodiment wherein opens system, as shown in Figure 3, it is also possible to include arranging module
307, wherein:
Module 307 is set, instruction is set for reception, instruction is set according to described described number of operations is set sets
Definite value and described time parameter setting value.
Wherein in an embodiment, described time parameter setting value can include very first time range of error with
And the very first time interval setting value of adjacent twice operation;
Second judge module 304 may determine that between the time of twice operation of arbitrary neighborhood in described touch control operation
Every value with the difference of described time interval setting value the most all in described very first time range of error, if so,
The time parameter setting value phase then judging described operating time parameter and open the application being in the lock state
Join.
Wherein in an embodiment, described unlocked time parameter can include the second time error scope and head
Second time interval setting value of twice operation of tail;
Second judge module 304 may determine that the time interval value of twice operation of head and the tail in described touch control operation
With the difference of the second time interval setting value whether in the range of described second time error, the most then judge
Described operating time parameter and the time parameter setting value opening the application being in the lock state match.
The terminal that the embodiment of the present invention provides, it is pointed out that: above application is opened to the description of system,
Description with above-mentioned application deployment method is similar, and has the beneficial effect of above-mentioned application deployment method,
For saving length, repeat no more;Therefore, the above application providing the embodiment of the present invention is opened in system not
The ins and outs disclosed, refer to the description of the application deployment method of above-mentioned offer.
It will appreciated by the skilled person that all or part of flow process realizing in above-described embodiment method,
Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating
In machine read/write memory medium, as independent production marketing or use.Described program upon execution, can be held
All or part of step of the embodiment of row such as above-mentioned each method.Wherein, described storage medium can be magnetic disc,
CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Ran
Dom Access Memory, RAM) etc..
Or, if the above-mentioned integrated module of the present invention is using the form realization of software function module and as independent
Production marketing or use time, it is also possible to be stored in a computer read/write memory medium.Based on so
Understanding, the part that prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words can
Embodying with the form with software product, this computer software product is stored in a storage medium, bag
Include some instructions with so that a computer equipment (can be personal computer, server or network
Equipment etc.) perform all or part of of method described in each embodiment of the present invention.And aforesaid storage medium bag
Include: various Jie that can store program code such as movable storage device, ROM, RAM, magnetic disc or CD
Matter.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, in certain embodiment the most in detail
The part stated, may refer to the associated description of other embodiments.It is appreciated that the term " used in it
One ", " second " etc. be used for distinguishing object in this article, but these objects should not be limited by these terms.Example
As, without departing from the scope of the invention, the first judge module can be referred to as the second judge module,
Second judge module is referred to as the first judge module.
In several embodiments provided herein, it should be understood that disclosed method and system, can
To realize by another way.Apparatus embodiments described above is only schematically, such as, and institute
Stating the division of module, be only a kind of logic function and divide, actual can have other dividing mode when realizing,
As: multiple modules or assembly can be in conjunction with, or it is desirably integrated into another system, or some features can be neglected
Slightly, or do not perform.It addition, the coupling each other of shown or discussed each ingredient or directly coupling
Close or communication connection can be the INDIRECT COUPLING by some interfaces, equipment or module or communication connection, can
Be electrical, machinery or other form.
It addition, each functional module in various embodiments of the present invention can be fully integrated in a processing module,
Can also be that each module is individually as a module, it is also possible to two or more modules are integrated in one
In individual module;Above-mentioned integrated module both can realize to use the form of hardware, it would however also be possible to employ hardware adds soft
The form of part functional module realizes.
Each technical characteristic of embodiment described above can combine arbitrarily, for making description succinct, the most right
The all possible combination of each technical characteristic in above-described embodiment is all described, but, if these skills
There is not contradiction in the combination of art feature, is all considered to be the scope that this specification is recorded.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes more concrete and detailed,
But can not therefore be construed as limiting the scope of the patent.It should be pointed out that, for this area
For those of ordinary skill, without departing from the inventive concept of the premise, it is also possible to make some deformation and change
Entering, these broadly fall into protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be with appended power
Profit requires to be as the criterion.
Claims (10)
1. an application deployment method, it is characterised in that comprise the steps:
Detecting the touch control operation of the icon for intended application, wherein, described intended application is for being in locking shape
The application of state;
Obtain number of operations and the operating time parameter of described touch control operation;
Judge described number of operations whether with the number of operations setting value phase opening the application being in the lock state
With, and judge whether described operating time parameter sets with the time parameter opening the application being in the lock state
Value matches;
If described number of operations is identical with described number of operations setting value and described operating time parameter with time described
Between pre-set parameter match, then open described intended application.
Application deployment method the most according to claim 1, it is characterised in that further comprise the steps of:
Obtain list of application, receive application and choose instruction, choose the selected described list of application of instruction according to described
In the certain applications being in unlocked state, and selected application is switched to lock-out state.
Application deployment method the most according to claim 1, it is characterised in that further comprise the steps of:
Reception arranges instruction, according to described arrange instruction arrange described number of operations setting value and the described time ginseng
Number setting value.
Application deployment method the most according to claim 1, it is characterised in that described time parameter sets
Value includes the very first time interval setting value of very first time range of error and adjacent twice operation;
Described judge whether described operating time parameter sets with the time parameter opening the application being in the lock state
The process that definite value matches includes step:
Judge that the time interval value of twice operation of arbitrary neighborhood in described touch control operation sets with described time interval
The difference of definite value is the most all in described very first time range of error;
The most then judge that described operating time parameter and the time parameter opening the application being in the lock state set
Definite value matches.
Application deployment method the most according to claim 1, it is characterised in that described unlocked time parameter
Including the second time error scope and the second time interval setting value of twice operation of head and the tail;
Described judge whether described operating time parameter sets with the time parameter opening the application being in the lock state
The process that definite value matches includes step:
Judge time interval value and the second time interval setting value of twice operation of head and the tail in described touch control operation
Difference whether in the range of described second time error;
The most then judge that described operating time parameter and the time parameter opening the application being in the lock state set
Definite value matches.
6. system is opened in an application, it is characterised in that including:
Detection module, for detecting the touch control operation for intended application, wherein, described intended application is place
Application in lock-out state;
Acquisition module, for obtaining number of operations and the operating time parameter of described touch control operation;
First judge module, for judge described number of operations whether with open the application that is in the lock state
Number of operations setting value is identical;
Second judge module, for judge described operating time parameter whether with open be in the lock state should
Time parameter setting value match;
Open module, be for the result of determination at described first judge module, described second judge module
When being, open described intended application.
System is opened in application the most according to claim 6, it is characterised in that also include:
Choose module, be used for obtaining list of application, receive application and choose instruction, choose instruction choosing according to described
The certain applications being in unlocked state in fixed described list of application, and selected application is switched to lock
Determine state.
System is opened in application the most according to claim 6, it is characterised in that also include:
Module is set, instruction is set for reception, according to described arrange instruction arrange described number of operations set
Value and described time parameter setting value.
System is opened in application the most according to claim 6, it is characterised in that described time parameter sets
Value includes the very first time interval setting value of very first time range of error and adjacent twice operation;
Described second judge module judges the time interval value of twice operation of arbitrary neighborhood in described touch control operation
With the difference of described time interval setting value the most all in described very first time range of error, the most then sentence
Fixed described operating time parameter matches with the time parameter setting value opening the application being in the lock state.
System is opened in application the most according to claim 6, it is characterised in that described unlocked time is joined
Number includes the second time error scope and the second time interval setting value of twice operation of head and the tail;
Described second judge module judges the time interval value and of twice operation of head and the tail in described touch control operation
Whether the difference of two time interval setting values in the range of described second time error, the most then judges described
Operating time parameter and the time parameter setting value opening the application being in the lock state match.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610156806.9A CN105844133B (en) | 2016-03-18 | 2016-03-18 | Using deployment method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610156806.9A CN105844133B (en) | 2016-03-18 | 2016-03-18 | Using deployment method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105844133A true CN105844133A (en) | 2016-08-10 |
CN105844133B CN105844133B (en) | 2019-04-02 |
Family
ID=56587330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610156806.9A Expired - Fee Related CN105844133B (en) | 2016-03-18 | 2016-03-18 | Using deployment method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105844133B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106937406A (en) * | 2017-04-06 | 2017-07-07 | 深圳市晟碟半导体有限公司 | A kind of method and system for accessing wireless network |
CN108073342A (en) * | 2017-11-08 | 2018-05-25 | 广东小天才科技有限公司 | Method for operating application program, device, terminal and the storage medium of mobile terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102866853A (en) * | 2012-08-23 | 2013-01-09 | 广东欧珀移动通信有限公司 | Method and device for operating and controlling application program of touch screen terminal |
CN103558990A (en) * | 2013-11-05 | 2014-02-05 | 广东欧珀移动通信有限公司 | Method and system for rapidly opening or operating applications on mobile terminal |
CN104035707A (en) * | 2013-03-08 | 2014-09-10 | 三星电子(中国)研发中心 | Terminal and rapid startup method for applications of terminal |
CN105068847A (en) * | 2015-08-26 | 2015-11-18 | 广东欧珀移动通信有限公司 | Application program starting method and intelligent watch |
CN105354029A (en) * | 2015-11-04 | 2016-02-24 | 广州酷狗计算机科技有限公司 | Application control method and apparatus |
-
2016
- 2016-03-18 CN CN201610156806.9A patent/CN105844133B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102866853A (en) * | 2012-08-23 | 2013-01-09 | 广东欧珀移动通信有限公司 | Method and device for operating and controlling application program of touch screen terminal |
CN104035707A (en) * | 2013-03-08 | 2014-09-10 | 三星电子(中国)研发中心 | Terminal and rapid startup method for applications of terminal |
CN103558990A (en) * | 2013-11-05 | 2014-02-05 | 广东欧珀移动通信有限公司 | Method and system for rapidly opening or operating applications on mobile terminal |
CN105068847A (en) * | 2015-08-26 | 2015-11-18 | 广东欧珀移动通信有限公司 | Application program starting method and intelligent watch |
CN105354029A (en) * | 2015-11-04 | 2016-02-24 | 广州酷狗计算机科技有限公司 | Application control method and apparatus |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106937406A (en) * | 2017-04-06 | 2017-07-07 | 深圳市晟碟半导体有限公司 | A kind of method and system for accessing wireless network |
CN106937406B (en) * | 2017-04-06 | 2019-12-17 | 深圳市晟碟半导体有限公司 | Method and system for accessing wireless network |
CN108073342A (en) * | 2017-11-08 | 2018-05-25 | 广东小天才科技有限公司 | Method for operating application program, device, terminal and the storage medium of mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105844133B (en) | 2019-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104050417B (en) | A kind of method and device detected in mobile terminal to application state | |
CN106096349A (en) | A kind of method quickly opening application based on screen locking and mobile terminal | |
CN105824657B (en) | A kind of method and mobile terminal for showing application program | |
CN104111728A (en) | Electronic device and voice command input method based on operation gestures | |
CN105573778A (en) | Method for starting application program and terminal | |
CN105892820A (en) | Icon display management method and device | |
CN109085976A (en) | Interface hidden method and device | |
CN108459794A (en) | A kind of interactive operation processing method and processing device of button-free screen | |
CN106127012A (en) | A kind of method of unlocked by fingerprint and terminal | |
CN105955769A (en) | Method and apparatus for starting multimedia application | |
CN105511828A (en) | Double-screen display method and terminal equipment | |
CN105844133A (en) | Application opening method and system | |
CN105117138A (en) | Method and device for shielding screen locking of operating system and mobile terminal | |
CN106648737A (en) | Application control method and device, and mobile terminal | |
CN106203174A (en) | Application information processing method and device and electronic equipment | |
CN106126206A (en) | A kind of information processing method and electronic equipment | |
CN106126377A (en) | The method and device of system start-up | |
CN105159764A (en) | Control method for application switching of mobile terminal and mobile terminal | |
CN107450806A (en) | Shortcut menu display methods, mobile terminal and the device with store function | |
CN104750369B (en) | The control method and device of rapid switch in a kind of intelligent terminal | |
CN105759969B (en) | Control method, device and the mobile terminal of mobile terminal | |
CN106302531A (en) | Safety protection method and device and terminal equipment | |
CN106559550A (en) | SIM management method and electronic installation | |
CN104715173A (en) | Desktop software filtering system | |
CN107340963A (en) | A kind of information processing method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190402 |