CN105930061A - Shielding method for function keys and terminal - Google Patents

Shielding method for function keys and terminal Download PDF

Info

Publication number
CN105930061A
CN105930061A CN201610338574.9A CN201610338574A CN105930061A CN 105930061 A CN105930061 A CN 105930061A CN 201610338574 A CN201610338574 A CN 201610338574A CN 105930061 A CN105930061 A CN 105930061A
Authority
CN
China
Prior art keywords
function key
operation information
terminal
user
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610338574.9A
Other languages
Chinese (zh)
Inventor
何小明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Wireless Technology Co Ltd
Priority to CN201610338574.9A priority Critical patent/CN105930061A/en
Publication of CN105930061A publication Critical patent/CN105930061A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention provides a shielding method for function keys and a terminal. The method comprises the following steps: acquiring operation information of a user; judging whether the operation information is operation information of the function keys of the terminal or not; if the operation information is the operation information of the function keys of the terminal, discarding the operation information in order to shield operations of the user on the function keys of the terminal; and if the operation information is not the operation information of the function keys of the terminal, performing operations according to the operation information. Through adoption of the shielding method and the terminal, the operations on the function keys of the terminal can be shielded, so that the problem of error operations caused by non-active operations of the user on the function keys in an operation process of the user is solved.

Description

The screen method of a kind of function key and terminal
Technical field
The present invention relates to control technical field, particularly relate to screen method and the terminal of a kind of function key.
Background technology
Along with popularizing of intelligent terminal, various application are more and more abundanter, and user can use should It is used for entertaining or learning, but non-active to function key of some users can be produced during user operation The maloperation that operation causes, such as: touch or clicked what return function key caused in operation Maloperation, or the maloperation etc. that amendment is set that the non-active operation of user causes.
Summary of the invention
In view of this, the embodiment of the present invention provides screen method and the terminal of a kind of function key, in order to solve The maloperation that the user that in prior art, user produces in operation operation non-active to function key causes Problem.
For achieving the above object, on the one hand, embodiments provide the shielding of a kind of function key Method, described method includes:
Obtain the operation information of user;
Judge that whether described operation information be the operation information of the function key of terminal;
If the operation information of the function key of described terminal, then abandon described operation information, to shield State user's operation to the function key of described terminal;
If not the operation information of the function key of described terminal, then grasp according to described operation information Make.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, Before obtaining the operation information of user, described method also includes:
The function key shielding option of described terminal is provided for described user;
Determine the function key that described user selectes, the state switching of the described function key described user selected To masked state.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, sentence Whether disconnected described operation information is the operation information of the function key of described terminal, including:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal Breath.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, sentence Whether disconnected described operation information is the operation information of the function key being in masked state in described terminal, including:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key The operation information of the function key of state.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute The function key stating terminal includes:
The entity function key of described terminal and virtual functions key.
The operation shield of the function key to terminal can be fallen by the embodiment of the present invention, thus avoid The user produced during the user operation problem to the maloperation that the non-active operation of function key causes.
For achieving the above object, on the other hand, the embodiment of the present invention also provides for a kind of terminal, described Terminal includes:
Acquisition module, for obtaining the operation information of user;
Judge module, for judging that whether described operation information be the operation information of the function key of described terminal;
Processing module, if the operation information of the function key of described terminal, is used for abandoning described operation letter Breath, to shield the described user operation to the function key of described terminal;
Described processing module, if not the operation information of the function key of described terminal, is additionally operable to according to institute State operation information to operate.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute State terminal, also include:
Option mod, before obtaining the operation information of user, for providing described terminal for described user Function key shielding option;
Determine module, for determining the function key that described user selectes;
Handover module, the state of the described function key for described user being selected is switched to masked state.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute State judge module, specifically for:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal Breath.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute State judge module, also particularly useful for:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key The operation information of the function key of state.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute The function key stating terminal includes:
The entity function key of described terminal and virtual functions key.
The operation shield of the function key to terminal can be fallen by the embodiment of the present invention, thus avoid The user produced during the user operation problem to the maloperation that the non-active operation of function key causes.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that under, Accompanying drawing during face describes is some embodiments of the present invention, for those of ordinary skill in the art, On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the screen method of a kind of function key in the embodiment of the present invention one;
Fig. 2 is the structural representation of a kind of terminal in the embodiment of the present invention two.
Detailed description of the invention
In order to be better understood from technical scheme, below in conjunction with the accompanying drawings the embodiment of the present invention is carried out Describe in detail.
It will be appreciated that described embodiment a part of embodiment that is only the present invention rather than whole Embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative labor The all other embodiments obtained under dynamic premise, broadly fall into the scope of protection of the invention.
The term used in embodiments of the present invention be only merely for describe specific embodiment purpose, rather than It is intended to limit the present invention.Singulative used in the embodiment of the present invention and appended claims " a kind of ", " described " and " being somebody's turn to do " is also intended to include most form, unless context clearly shows that it His implication.
Depend on linguistic context, word as used in this " if " can be construed to " ... time " Or " when ... " or " in response to determining " or " in response to detection ".Similarly, depend on linguistic context, Phrase " if it is determined that " or " if detection (condition of statement or event) " can be construed to " when When determining " or " in response to determining " or " when detecting (condition of statement or event) " or " response In detection (condition of statement or event) ".
Embodiment one
In order to solve user's operation non-active to function key that user in prior art produces in operation The problem of the maloperation caused, the embodiment of the present invention one proposes the screen method of a kind of function key, specifically As it is shown in figure 1, said method comprising the steps of:
Step 101, obtains the operation information of user.
It should be noted that terminal involved in the embodiment of the present invention can include but not limited to individual's meter Calculation machine (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), radio hand-held equipment, panel computer (Tablet Computer), mobile phone, MP3 player, MP4 player etc..
Concrete, terminal can be according to the operation information realization user operation to corresponding function key of user.
Wherein, present terminal starts the function key invalid pattern of operation of terminal.
Step 102, it is judged that whether described operation information is the operation information of the function key of terminal.If The operation information of the function key of described terminal, then perform step 103, if not the function of described terminal The operation information of key, then perform step 104.
Step 103, abandons described operation information, to shield described user to the function key of described terminal Operation.
Step 104, operates according to described operation information.
Wherein, the function key of described terminal includes:
The entity function key of described terminal and virtual functions key.
Concrete, the function key of terminal refers to the function key of terminal self, and nonterminal is logical after installing application Crossing the function key that application obtains, the function key of terminal can realize the function key to terminal control, it is achieved right The function key of terminal control can be entity function key and the virtual functions key of terminal, such as: entity function Key includes: HOME key, return key, the entity function key that terminal can be controlled by volume adjusting key etc., Virtual functions key includes: each the virtual merit that can be configured terminal or control in the various menu of terminal Can key, such as: system setup menu in terminal and drop-down menu etc., it should be noted that the present invention carries To the function key of terminal be different from the function key of application, wherein, the function key of terminal was capable of end The control of end, can also realize the control to application, such as: volume adjusting key is permissible in some cases Control the volume of application, but the function key of application can only realize the control to application, but cannot realize Control to terminal.
Function key in terminal operates under invalid pattern, in order to avoid the mistake of terminal function key is grasped by user Make, it is therefore desirable to determine that whether the operation information of user be the operation information of terminal function key, only exist After determining the operation information whether operation information be terminal function key, just can determine that the operation of user Whether is effectively operation, if the operation information of the function key of described terminal, then operation information is invalid Operation, needs to abandon described operation information, does not the most process this operation information, thus shield user Operation to terminal function key, further, it is to avoid the user maloperation to terminal function key, if It not the operation information of the function key of described terminal, be then effectively operation, need the operation information to user Processing, further, according to said method, user is in the process and terminal using application Time under the pattern that function key operation is invalid, terminal can realize any to apply by the function key of application Operation, but the function key of terminal cannot be used, user so can be made in the mistake that application is operated Journey avoids due to the problem of the maloperations such as user's exiting that the non-active operation of function key is caused.
In order to ensure that user can use the function key of part terminal, with user-friendly, use obtaining Before the operation information at family, described method also includes:
The function key shielding option of described terminal is provided for described user;
Determine the function key that described user selectes, the state switching of the described function key described user selected To masked state.
Concrete, after terminal provides the user the shielding option of terminal function key, user can select to need Function key to be shielded, after user determines the selected function key needing shielding, terminal is by corresponding merit Can be switched to masked state by key, wherein, the state of terminal function key includes: masked state and unmasked shape State, user cannot meet with a response when operating the function key being under masked state, masked state Can also include: Semi-shielded state and complete masked state, under Semi-shielded state, user is in some situation Can meet with a response after corresponding function key can be operated down, but be in complete masked state Function key user then cannot obtain any response after operating, wherein it is possible under double masked state The function key situation that carries out operating can determine according to practical situation.
Judge that whether described operation information be the operation information of the function key of described terminal, including:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal Breath.
Concrete, the operation of the function key being in masked state is not done any response by terminal, but right The function key being in non-shielding state needs to respond, it is therefore desirable to judge whether operation information is institute State the operation information of the function key being in masked state in terminal, so that terminal determines according to operation information be Masking operation is also in response to operation.
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal Breath, including:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key The operation information of the function key of state.
Concrete, non-shielding state can also be gone out owing to terminal function key may be at masked state, therefore, Terminal is it needs to be determined that user is the function key to masked state is operated, or to non-shielding state Function key is operated, and responds so that terminal is determined according to operation information or shields.
Such as: when the function key that user selects shielding is HOME key, user is to other-end function key When carrying out operating or the function key of the application in terminal is operated, need after terminal obtains operation information To carry out the operation response of correspondence according to this operation information, but if this operation information is that user is to HOME During the operation of key, terminal needs to abandon this operation information, to reach to shield the behaviour that HOME key is carried out by user Make.
The operation shield of the function key to terminal can be fallen by the embodiment of the present invention, thus avoid The user produced during the user operation problem to the maloperation that the non-active operation of function key causes.
Embodiment two
The present invention implements two examples and is given further and realizes each step and the terminal of method in said method embodiment Embodiment, as described in Figure 2, its terminal provided by the embodiment of the present invention block chart is set, described Terminal includes:
Acquisition module 21, for obtaining the operation information of user;
Judge module 22, for judging that whether described operation information be the operation letter of the function key of described terminal Breath;
Processing module 23, if the operation information of the function key of described terminal, is used for abandoning described operation Information, to shield the described user operation to the function key of described terminal;
Described processing module 23, if not the operation information of the function key of described terminal, is additionally operable to basis Described operation information operates.
Described terminal, also includes:
Option mod, before obtaining the operation information of user, for providing described terminal for described user Function key shielding option;
Determine module, for determining the function key that described user selectes;
Handover module, the state of the described function key for described user being selected is switched to masked state.
Described judge module, specifically for:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal Breath.
Described judge module, also particularly useful for:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key The operation information of the function key of state.
The function key of described terminal includes:
The entity function key of described terminal and virtual functions key.
Owing to each module in the embodiment of the present invention two is able to carry out the method shown in Fig. 1, the present invention implements The part that example two does not describes in detail, refers to the related description to Fig. 1.
The operation shield of the function key to terminal can be fallen by the embodiment of the present invention, thus avoid The user produced during the user operation problem to the maloperation that the non-active operation of function key causes.
One of ordinary skill in the art will appreciate that: realize all or part of step of above-mentioned each method embodiment Suddenly can be completed by the hardware that programmed instruction is relevant.Aforesaid program can be stored in a computer can Read in storage medium.This program upon execution, performs to include the step of above-mentioned each method embodiment;And Aforesaid storage medium includes: ROM, RAM, magnetic disc or CD etc. are various can store program code Medium.
Device embodiment described above is only schematically, the list wherein illustrated as separating component Unit can be or may not be physically separate, and the parts shown as unit can be or also Can not be physical location, i.e. may be located at a place, or at least two network can also be distributed to On unit.Some or all of module therein can be selected according to the actual needs real to realize the present invention Execute the purpose of example scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, i.e. It is appreciated that and implements.
Last it is noted that various embodiments above is only in order to illustrate technical scheme, rather than right It limits;Although the present invention being described in detail with reference to foregoing embodiments, this area common Skilled artisans appreciate that the technical scheme described in foregoing embodiments still can be repaiied by it Change, or the most some or all of technical characteristic is carried out equivalent;And these are revised or replace Change, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (10)

1. the screen method of a function key, it is characterised in that described method includes:
Obtain the operation information of user;
Judge that whether described operation information be the operation information of the function key of terminal;
If the operation information of the function key of described terminal, then abandon described operation information, to shield State user's operation to the function key of described terminal;
If not the operation information of the function key of described terminal, then operate according to described operation information.
2. method as claimed in claim 1, it is characterised in that before obtaining the operation information of user, Described method also includes:
The function key shielding option of described terminal is provided for described user;
Determine the function key that described user selectes, the state switching of the described function key described user selected To masked state.
3. method as claimed in claim 2, it is characterised in that judge whether described operation information is described The operation information of the function key of terminal, including:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal Breath.
4. method as claimed in claim 3, it is characterised in that judge whether described operation information is described Terminal is in the operation information of the function key of masked state, including:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key The operation information of the function key of state.
5. method as described in Claims 1-4 is arbitrary, it is characterised in that the function key bag of described terminal Include:
The entity function key of described terminal and virtual functions key.
6. a terminal, it is characterised in that described terminal includes:
Acquisition module, for obtaining the operation information of user;
Judge module, for judging that whether described operation information be the operation information of the function key of described terminal;
Processing module, if the operation information of the function key of described terminal, is used for abandoning described operation letter Breath, to shield the described user operation to the function key of described terminal;
Described processing module, if not the operation information of the function key of described terminal, is additionally operable to according to institute State operation information to operate.
7. terminal as claimed in claim 6, it is characterised in that described terminal, also includes:
Option mod, before obtaining the operation information of user, for providing described terminal for described user Function key shielding option;
Determine module, for determining the function key that described user selectes;
Handover module, the state of the described function key for described user being selected is switched to masked state.
8. terminal as claimed in claim 7, it is characterised in that described judge module, specifically for:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal Breath.
9. terminal as claimed in claim 8, it is characterised in that described judge module, also particularly useful for:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key The operation information of the function key of state.
10. terminal as described in claim 6 to 9 is arbitrary, it is characterised in that the function key of described terminal Including:
The entity function key of described terminal and virtual functions key.
CN201610338574.9A 2016-05-20 2016-05-20 Shielding method for function keys and terminal Pending CN105930061A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610338574.9A CN105930061A (en) 2016-05-20 2016-05-20 Shielding method for function keys and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610338574.9A CN105930061A (en) 2016-05-20 2016-05-20 Shielding method for function keys and terminal

Publications (1)

Publication Number Publication Date
CN105930061A true CN105930061A (en) 2016-09-07

Family

ID=56840936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610338574.9A Pending CN105930061A (en) 2016-05-20 2016-05-20 Shielding method for function keys and terminal

Country Status (1)

Country Link
CN (1) CN105930061A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164039A (en) * 2011-12-16 2013-06-19 希姆通信息技术(上海)有限公司 Terminal device and control method
CN103905633A (en) * 2012-12-30 2014-07-02 比亚迪股份有限公司 Mobile terminal and use method thereof
WO2014162570A1 (en) * 2013-04-04 2014-10-09 パイオニア株式会社 Display control device, display control method, display control program, and computer-readable recording medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164039A (en) * 2011-12-16 2013-06-19 希姆通信息技术(上海)有限公司 Terminal device and control method
CN103905633A (en) * 2012-12-30 2014-07-02 比亚迪股份有限公司 Mobile terminal and use method thereof
WO2014162570A1 (en) * 2013-04-04 2014-10-09 パイオニア株式会社 Display control device, display control method, display control program, and computer-readable recording medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《电脑编程技巧与维护》杂志社: "《Visual C/C++编程精选集锦 网络与通信分册》", 31 May 2003, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN105912260B (en) The startup method and mobile terminal of a kind of application program
CN104035702B (en) A kind of method preventing intelligent terminal's maloperation and intelligent terminal
CN106569707A (en) Touch control screen-based touch control shielding method and terminal
CN103150113B (en) A kind of display content selecting method for touch screen and device
CN107992263A (en) A kind of information sharing method and mobile terminal
CN108091333A (en) Sound control method and Related product
CN105912263A (en) One-hand operating method and system for mobile terminal
CN106775666A (en) A kind of application icon display methods and terminal
CN105867766A (en) Sound volume adjustment method and terminal
CN110515871A (en) A kind of interrupt method, device and FPGA and storage medium
CN108121493A (en) Display control method and related product
CN105100281B (en) A kind of method and apparatus of remote control mobile terminal
CN102520867B (en) Automobile navigation system and navigation method thereof
CN107918509A (en) Software shortcut prompting method to set up, device and readable storage medium storing program for executing
CN105930156A (en) Terminal control method and terminal
CN107347111A (en) The control method and terminal of terminal
CN107450804A (en) A kind of method and terminal for responding touch control operation
CN104636506A (en) Method and device for adding home pages in intelligent terminal
CN103164131B (en) A kind of unlock method of electronic equipment and electronic equipment
CN107145221A (en) A kind of information processing method and electronic equipment
CN105843401A (en) Screen reading instruction input method and device based on camera
CN101770310A (en) Touch processing method and touch processing device
CN105868010A (en) Application calling method and terminal
CN105930061A (en) Shielding method for function keys and terminal
CN104750401A (en) Touch method and related device as well as terminal equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160907

RJ01 Rejection of invention patent application after publication