CN105930061A - Shielding method for function keys and terminal - Google Patents
Shielding method for function keys and terminal Download PDFInfo
- Publication number
- CN105930061A CN105930061A CN201610338574.9A CN201610338574A CN105930061A CN 105930061 A CN105930061 A CN 105930061A CN 201610338574 A CN201610338574 A CN 201610338574A CN 105930061 A CN105930061 A CN 105930061A
- Authority
- CN
- China
- Prior art keywords
- function key
- operation information
- terminal
- user
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04847—Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention provides a shielding method for function keys and a terminal. The method comprises the following steps: acquiring operation information of a user; judging whether the operation information is operation information of the function keys of the terminal or not; if the operation information is the operation information of the function keys of the terminal, discarding the operation information in order to shield operations of the user on the function keys of the terminal; and if the operation information is not the operation information of the function keys of the terminal, performing operations according to the operation information. Through adoption of the shielding method and the terminal, the operations on the function keys of the terminal can be shielded, so that the problem of error operations caused by non-active operations of the user on the function keys in an operation process of the user is solved.
Description
Technical field
The present invention relates to control technical field, particularly relate to screen method and the terminal of a kind of function key.
Background technology
Along with popularizing of intelligent terminal, various application are more and more abundanter, and user can use should
It is used for entertaining or learning, but non-active to function key of some users can be produced during user operation
The maloperation that operation causes, such as: touch or clicked what return function key caused in operation
Maloperation, or the maloperation etc. that amendment is set that the non-active operation of user causes.
Summary of the invention
In view of this, the embodiment of the present invention provides screen method and the terminal of a kind of function key, in order to solve
The maloperation that the user that in prior art, user produces in operation operation non-active to function key causes
Problem.
For achieving the above object, on the one hand, embodiments provide the shielding of a kind of function key
Method, described method includes:
Obtain the operation information of user;
Judge that whether described operation information be the operation information of the function key of terminal;
If the operation information of the function key of described terminal, then abandon described operation information, to shield
State user's operation to the function key of described terminal;
If not the operation information of the function key of described terminal, then grasp according to described operation information
Make.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation,
Before obtaining the operation information of user, described method also includes:
The function key shielding option of described terminal is provided for described user;
Determine the function key that described user selectes, the state switching of the described function key described user selected
To masked state.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, sentence
Whether disconnected described operation information is the operation information of the function key of described terminal, including:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal
Breath.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, sentence
Whether disconnected described operation information is the operation information of the function key being in masked state in described terminal, including:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key
The operation information of the function key of state.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute
The function key stating terminal includes:
The entity function key of described terminal and virtual functions key.
The operation shield of the function key to terminal can be fallen by the embodiment of the present invention, thus avoid
The user produced during the user operation problem to the maloperation that the non-active operation of function key causes.
For achieving the above object, on the other hand, the embodiment of the present invention also provides for a kind of terminal, described
Terminal includes:
Acquisition module, for obtaining the operation information of user;
Judge module, for judging that whether described operation information be the operation information of the function key of described terminal;
Processing module, if the operation information of the function key of described terminal, is used for abandoning described operation letter
Breath, to shield the described user operation to the function key of described terminal;
Described processing module, if not the operation information of the function key of described terminal, is additionally operable to according to institute
State operation information to operate.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute
State terminal, also include:
Option mod, before obtaining the operation information of user, for providing described terminal for described user
Function key shielding option;
Determine module, for determining the function key that described user selectes;
Handover module, the state of the described function key for described user being selected is switched to masked state.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute
State judge module, specifically for:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal
Breath.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute
State judge module, also particularly useful for:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key
The operation information of the function key of state.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, institute
The function key stating terminal includes:
The entity function key of described terminal and virtual functions key.
The operation shield of the function key to terminal can be fallen by the embodiment of the present invention, thus avoid
The user produced during the user operation problem to the maloperation that the non-active operation of function key causes.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality
Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that under,
Accompanying drawing during face describes is some embodiments of the present invention, for those of ordinary skill in the art,
On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the screen method of a kind of function key in the embodiment of the present invention one;
Fig. 2 is the structural representation of a kind of terminal in the embodiment of the present invention two.
Detailed description of the invention
In order to be better understood from technical scheme, below in conjunction with the accompanying drawings the embodiment of the present invention is carried out
Describe in detail.
It will be appreciated that described embodiment a part of embodiment that is only the present invention rather than whole
Embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative labor
The all other embodiments obtained under dynamic premise, broadly fall into the scope of protection of the invention.
The term used in embodiments of the present invention be only merely for describe specific embodiment purpose, rather than
It is intended to limit the present invention.Singulative used in the embodiment of the present invention and appended claims
" a kind of ", " described " and " being somebody's turn to do " is also intended to include most form, unless context clearly shows that it
His implication.
Depend on linguistic context, word as used in this " if " can be construed to " ... time "
Or " when ... " or " in response to determining " or " in response to detection ".Similarly, depend on linguistic context,
Phrase " if it is determined that " or " if detection (condition of statement or event) " can be construed to " when
When determining " or " in response to determining " or " when detecting (condition of statement or event) " or " response
In detection (condition of statement or event) ".
Embodiment one
In order to solve user's operation non-active to function key that user in prior art produces in operation
The problem of the maloperation caused, the embodiment of the present invention one proposes the screen method of a kind of function key, specifically
As it is shown in figure 1, said method comprising the steps of:
Step 101, obtains the operation information of user.
It should be noted that terminal involved in the embodiment of the present invention can include but not limited to individual's meter
Calculation machine (Personal Computer, PC), personal digital assistant (Personal Digital
Assistant, PDA), radio hand-held equipment, panel computer (Tablet Computer), mobile phone,
MP3 player, MP4 player etc..
Concrete, terminal can be according to the operation information realization user operation to corresponding function key of user.
Wherein, present terminal starts the function key invalid pattern of operation of terminal.
Step 102, it is judged that whether described operation information is the operation information of the function key of terminal.If
The operation information of the function key of described terminal, then perform step 103, if not the function of described terminal
The operation information of key, then perform step 104.
Step 103, abandons described operation information, to shield described user to the function key of described terminal
Operation.
Step 104, operates according to described operation information.
Wherein, the function key of described terminal includes:
The entity function key of described terminal and virtual functions key.
Concrete, the function key of terminal refers to the function key of terminal self, and nonterminal is logical after installing application
Crossing the function key that application obtains, the function key of terminal can realize the function key to terminal control, it is achieved right
The function key of terminal control can be entity function key and the virtual functions key of terminal, such as: entity function
Key includes: HOME key, return key, the entity function key that terminal can be controlled by volume adjusting key etc.,
Virtual functions key includes: each the virtual merit that can be configured terminal or control in the various menu of terminal
Can key, such as: system setup menu in terminal and drop-down menu etc., it should be noted that the present invention carries
To the function key of terminal be different from the function key of application, wherein, the function key of terminal was capable of end
The control of end, can also realize the control to application, such as: volume adjusting key is permissible in some cases
Control the volume of application, but the function key of application can only realize the control to application, but cannot realize
Control to terminal.
Function key in terminal operates under invalid pattern, in order to avoid the mistake of terminal function key is grasped by user
Make, it is therefore desirable to determine that whether the operation information of user be the operation information of terminal function key, only exist
After determining the operation information whether operation information be terminal function key, just can determine that the operation of user
Whether is effectively operation, if the operation information of the function key of described terminal, then operation information is invalid
Operation, needs to abandon described operation information, does not the most process this operation information, thus shield user
Operation to terminal function key, further, it is to avoid the user maloperation to terminal function key, if
It not the operation information of the function key of described terminal, be then effectively operation, need the operation information to user
Processing, further, according to said method, user is in the process and terminal using application
Time under the pattern that function key operation is invalid, terminal can realize any to apply by the function key of application
Operation, but the function key of terminal cannot be used, user so can be made in the mistake that application is operated
Journey avoids due to the problem of the maloperations such as user's exiting that the non-active operation of function key is caused.
In order to ensure that user can use the function key of part terminal, with user-friendly, use obtaining
Before the operation information at family, described method also includes:
The function key shielding option of described terminal is provided for described user;
Determine the function key that described user selectes, the state switching of the described function key described user selected
To masked state.
Concrete, after terminal provides the user the shielding option of terminal function key, user can select to need
Function key to be shielded, after user determines the selected function key needing shielding, terminal is by corresponding merit
Can be switched to masked state by key, wherein, the state of terminal function key includes: masked state and unmasked shape
State, user cannot meet with a response when operating the function key being under masked state, masked state
Can also include: Semi-shielded state and complete masked state, under Semi-shielded state, user is in some situation
Can meet with a response after corresponding function key can be operated down, but be in complete masked state
Function key user then cannot obtain any response after operating, wherein it is possible under double masked state
The function key situation that carries out operating can determine according to practical situation.
Judge that whether described operation information be the operation information of the function key of described terminal, including:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal
Breath.
Concrete, the operation of the function key being in masked state is not done any response by terminal, but right
The function key being in non-shielding state needs to respond, it is therefore desirable to judge whether operation information is institute
State the operation information of the function key being in masked state in terminal, so that terminal determines according to operation information be
Masking operation is also in response to operation.
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal
Breath, including:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key
The operation information of the function key of state.
Concrete, non-shielding state can also be gone out owing to terminal function key may be at masked state, therefore,
Terminal is it needs to be determined that user is the function key to masked state is operated, or to non-shielding state
Function key is operated, and responds so that terminal is determined according to operation information or shields.
Such as: when the function key that user selects shielding is HOME key, user is to other-end function key
When carrying out operating or the function key of the application in terminal is operated, need after terminal obtains operation information
To carry out the operation response of correspondence according to this operation information, but if this operation information is that user is to HOME
During the operation of key, terminal needs to abandon this operation information, to reach to shield the behaviour that HOME key is carried out by user
Make.
The operation shield of the function key to terminal can be fallen by the embodiment of the present invention, thus avoid
The user produced during the user operation problem to the maloperation that the non-active operation of function key causes.
Embodiment two
The present invention implements two examples and is given further and realizes each step and the terminal of method in said method embodiment
Embodiment, as described in Figure 2, its terminal provided by the embodiment of the present invention block chart is set, described
Terminal includes:
Acquisition module 21, for obtaining the operation information of user;
Judge module 22, for judging that whether described operation information be the operation letter of the function key of described terminal
Breath;
Processing module 23, if the operation information of the function key of described terminal, is used for abandoning described operation
Information, to shield the described user operation to the function key of described terminal;
Described processing module 23, if not the operation information of the function key of described terminal, is additionally operable to basis
Described operation information operates.
Described terminal, also includes:
Option mod, before obtaining the operation information of user, for providing described terminal for described user
Function key shielding option;
Determine module, for determining the function key that described user selectes;
Handover module, the state of the described function key for described user being selected is switched to masked state.
Described judge module, specifically for:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal
Breath.
Described judge module, also particularly useful for:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key
The operation information of the function key of state.
The function key of described terminal includes:
The entity function key of described terminal and virtual functions key.
Owing to each module in the embodiment of the present invention two is able to carry out the method shown in Fig. 1, the present invention implements
The part that example two does not describes in detail, refers to the related description to Fig. 1.
The operation shield of the function key to terminal can be fallen by the embodiment of the present invention, thus avoid
The user produced during the user operation problem to the maloperation that the non-active operation of function key causes.
One of ordinary skill in the art will appreciate that: realize all or part of step of above-mentioned each method embodiment
Suddenly can be completed by the hardware that programmed instruction is relevant.Aforesaid program can be stored in a computer can
Read in storage medium.This program upon execution, performs to include the step of above-mentioned each method embodiment;And
Aforesaid storage medium includes: ROM, RAM, magnetic disc or CD etc. are various can store program code
Medium.
Device embodiment described above is only schematically, the list wherein illustrated as separating component
Unit can be or may not be physically separate, and the parts shown as unit can be or also
Can not be physical location, i.e. may be located at a place, or at least two network can also be distributed to
On unit.Some or all of module therein can be selected according to the actual needs real to realize the present invention
Execute the purpose of example scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, i.e.
It is appreciated that and implements.
Last it is noted that various embodiments above is only in order to illustrate technical scheme, rather than right
It limits;Although the present invention being described in detail with reference to foregoing embodiments, this area common
Skilled artisans appreciate that the technical scheme described in foregoing embodiments still can be repaiied by it
Change, or the most some or all of technical characteristic is carried out equivalent;And these are revised or replace
Change, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.
Claims (10)
1. the screen method of a function key, it is characterised in that described method includes:
Obtain the operation information of user;
Judge that whether described operation information be the operation information of the function key of terminal;
If the operation information of the function key of described terminal, then abandon described operation information, to shield
State user's operation to the function key of described terminal;
If not the operation information of the function key of described terminal, then operate according to described operation information.
2. method as claimed in claim 1, it is characterised in that before obtaining the operation information of user,
Described method also includes:
The function key shielding option of described terminal is provided for described user;
Determine the function key that described user selectes, the state switching of the described function key described user selected
To masked state.
3. method as claimed in claim 2, it is characterised in that judge whether described operation information is described
The operation information of the function key of terminal, including:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal
Breath.
4. method as claimed in claim 3, it is characterised in that judge whether described operation information is described
Terminal is in the operation information of the function key of masked state, including:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key
The operation information of the function key of state.
5. method as described in Claims 1-4 is arbitrary, it is characterised in that the function key bag of described terminal
Include:
The entity function key of described terminal and virtual functions key.
6. a terminal, it is characterised in that described terminal includes:
Acquisition module, for obtaining the operation information of user;
Judge module, for judging that whether described operation information be the operation information of the function key of described terminal;
Processing module, if the operation information of the function key of described terminal, is used for abandoning described operation letter
Breath, to shield the described user operation to the function key of described terminal;
Described processing module, if not the operation information of the function key of described terminal, is additionally operable to according to institute
State operation information to operate.
7. terminal as claimed in claim 6, it is characterised in that described terminal, also includes:
Option mod, before obtaining the operation information of user, for providing described terminal for described user
Function key shielding option;
Determine module, for determining the function key that described user selectes;
Handover module, the state of the described function key for described user being selected is switched to masked state.
8. terminal as claimed in claim 7, it is characterised in that described judge module, specifically for:
Judge that whether described operation information be the operation letter of the function key being in masked state in described terminal
Breath.
9. terminal as claimed in claim 8, it is characterised in that described judge module, also particularly useful for:
Obtain the state of function key corresponding to described operation information;
Operate whether information is to be in shielding shape in described terminal described in condition adjudgement according to described function key
The operation information of the function key of state.
10. terminal as described in claim 6 to 9 is arbitrary, it is characterised in that the function key of described terminal
Including:
The entity function key of described terminal and virtual functions key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610338574.9A CN105930061A (en) | 2016-05-20 | 2016-05-20 | Shielding method for function keys and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610338574.9A CN105930061A (en) | 2016-05-20 | 2016-05-20 | Shielding method for function keys and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105930061A true CN105930061A (en) | 2016-09-07 |
Family
ID=56840936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610338574.9A Pending CN105930061A (en) | 2016-05-20 | 2016-05-20 | Shielding method for function keys and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105930061A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164039A (en) * | 2011-12-16 | 2013-06-19 | 希姆通信息技术(上海)有限公司 | Terminal device and control method |
CN103905633A (en) * | 2012-12-30 | 2014-07-02 | 比亚迪股份有限公司 | Mobile terminal and use method thereof |
WO2014162570A1 (en) * | 2013-04-04 | 2014-10-09 | パイオニア株式会社 | Display control device, display control method, display control program, and computer-readable recording medium |
-
2016
- 2016-05-20 CN CN201610338574.9A patent/CN105930061A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164039A (en) * | 2011-12-16 | 2013-06-19 | 希姆通信息技术(上海)有限公司 | Terminal device and control method |
CN103905633A (en) * | 2012-12-30 | 2014-07-02 | 比亚迪股份有限公司 | Mobile terminal and use method thereof |
WO2014162570A1 (en) * | 2013-04-04 | 2014-10-09 | パイオニア株式会社 | Display control device, display control method, display control program, and computer-readable recording medium |
Non-Patent Citations (1)
Title |
---|
《电脑编程技巧与维护》杂志社: "《Visual C/C++编程精选集锦 网络与通信分册》", 31 May 2003, 科学出版社 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105912260B (en) | The startup method and mobile terminal of a kind of application program | |
CN104035702B (en) | A kind of method preventing intelligent terminal's maloperation and intelligent terminal | |
CN106569707A (en) | Touch control screen-based touch control shielding method and terminal | |
CN103150113B (en) | A kind of display content selecting method for touch screen and device | |
CN107992263A (en) | A kind of information sharing method and mobile terminal | |
CN108091333A (en) | Sound control method and Related product | |
CN105912263A (en) | One-hand operating method and system for mobile terminal | |
CN106775666A (en) | A kind of application icon display methods and terminal | |
CN105867766A (en) | Sound volume adjustment method and terminal | |
CN110515871A (en) | A kind of interrupt method, device and FPGA and storage medium | |
CN108121493A (en) | Display control method and related product | |
CN105100281B (en) | A kind of method and apparatus of remote control mobile terminal | |
CN102520867B (en) | Automobile navigation system and navigation method thereof | |
CN107918509A (en) | Software shortcut prompting method to set up, device and readable storage medium storing program for executing | |
CN105930156A (en) | Terminal control method and terminal | |
CN107347111A (en) | The control method and terminal of terminal | |
CN107450804A (en) | A kind of method and terminal for responding touch control operation | |
CN104636506A (en) | Method and device for adding home pages in intelligent terminal | |
CN103164131B (en) | A kind of unlock method of electronic equipment and electronic equipment | |
CN107145221A (en) | A kind of information processing method and electronic equipment | |
CN105843401A (en) | Screen reading instruction input method and device based on camera | |
CN101770310A (en) | Touch processing method and touch processing device | |
CN105868010A (en) | Application calling method and terminal | |
CN105930061A (en) | Shielding method for function keys and terminal | |
CN104750401A (en) | Touch method and related device as well as terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160907 |
|
RJ01 | Rejection of invention patent application after publication |