CN106250131B - Shortcut operation shielding method and device - Google Patents

Shortcut operation shielding method and device Download PDF

Info

Publication number
CN106250131B
CN106250131B CN201610597393.8A CN201610597393A CN106250131B CN 106250131 B CN106250131 B CN 106250131B CN 201610597393 A CN201610597393 A CN 201610597393A CN 106250131 B CN106250131 B CN 106250131B
Authority
CN
China
Prior art keywords
shortcut operation
shortcut
use information
shielding
target terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610597393.8A
Other languages
Chinese (zh)
Other versions
CN106250131A (en
Inventor
王柯
祁连山
王乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610597393.8A priority Critical patent/CN106250131B/en
Publication of CN106250131A publication Critical patent/CN106250131A/en
Application granted granted Critical
Publication of CN106250131B publication Critical patent/CN106250131B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure discloses a shortcut operation shielding method and device, and belongs to the technical field of terminals. The method comprises the following steps: collecting use information of shortcut operations in each reference terminal, wherein the use information comprises the times of mistakenly touching each shortcut operation; determining shortcut operation meeting preset conditions according to the use information; the preset conditions include: the number of times of false touch is higher than a first threshold value, or the number of times of false touch is ranked at the top n, wherein n is a positive integer; generating a shortcut operation shielding list containing each determined shortcut operation; and providing the shortcut operation shielding list to a target terminal, wherein the target terminal shields each shortcut operation in the shortcut operation shielding list. The problem that a user may mistakenly touch the shortcut operation to trigger the terminal to execute the wrong response is solved; the effect of shielding the shortcut operation with higher false touch probability according to the shortcut operation touched by the mistake in each reference terminal and further reducing the misoperation is achieved.

Description

Shortcut operation shielding method and device
Technical Field
The disclosure relates to the technical field of terminals, and in particular relates to a shortcut operation shielding method and device.
Background
In order to facilitate the use of the user, a shortcut operation is usually set in the terminal, and the user can trigger the terminal to quickly execute a certain task through the shortcut operation.
For example, in a cell phone, the user may zoom the interface by retracting a finger, or, in a lock screen interface, turn on the camera by sliding down. For another example, in a desktop computer, the user may undo by ctrl + z, toggle the input method by ctrl + shift, and so on.
Disclosure of Invention
In order to overcome the problems in the related art, embodiments of the present disclosure provide a shortcut masking method and apparatus. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided a shortcut operation masking method, including:
collecting use information of shortcut operations in each reference terminal, wherein the use information comprises the times of mistakenly touching each shortcut operation;
determining shortcut operation meeting preset conditions according to the use information; the preset conditions include: the number of times of false touch is higher than a first threshold value, or the number of times of false touch is ranked at the top n, wherein n is a positive integer;
generating a shortcut operation shielding list containing each determined shortcut operation;
and providing the shortcut operation shielding list to a target terminal, wherein the target terminal shields each shortcut operation in the shortcut operation shielding list.
Optionally, the determining, according to the usage information, a shortcut operation that meets a preset condition includes:
counting the total number of times of mistakenly touching each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times larger than the first threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked at the top n bits as the shortcut operation meeting the preset condition.
Optionally, the usage information further includes the number of times each shortcut operation is used, and the determining, according to the usage information, the shortcut operation that meets a preset condition further includes:
counting the total number of times of using each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times smaller than a second threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked m after as the shortcut operation meeting the preset condition, wherein m is a positive integer.
Optionally, the providing the shortcut operation mask list to the target terminal includes:
detecting whether the shortcut operation shielding list is the same as a history generated shortcut operation shielding list or not;
and if the detection results are different, providing the shortcut operation shielding list for the target terminal.
In a second aspect, a shortcut operation masking method is provided, where the method includes:
counting the use information of each shortcut operation in the reference terminal, wherein the use information comprises the number of times that each shortcut operation is touched by mistake;
reporting the use information to a server, wherein the use information is used for indicating the server to determine shortcut operations meeting preset conditions according to the use information, generating a shortcut operation shielding list according to each determined shortcut operation, providing the shortcut operation shielding list for a target terminal, and shielding each shortcut operation in the shortcut operation shielding list by the target terminal; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, and n is a positive integer.
Optionally, the counting usage information of each shortcut operation in the terminal includes:
receiving a trigger signal for triggering shortcut operation;
and if a closing signal is received in a preset time period, adding 1 to the number of times of mistakenly touching the shortcut operation, wherein the closing signal is a signal for closing the operation triggered by the trigger signal.
Optionally, the counting usage information of each shortcut operation in the terminal includes:
counting the number of times each shortcut operation is used;
the reporting the usage information to a server includes:
and reporting the use information carrying the used times of each shortcut operation to the server.
In a third aspect, there is provided a quick-action shielding device, the device comprising:
the collecting module is configured to collect the use information of the shortcut operations in each reference terminal, and the use information comprises the number of times that each shortcut operation is touched by mistake;
the determining module is configured to determine shortcut operations meeting preset conditions according to the use information collected by the collecting module; the preset conditions include: the number of times of false touch is higher than a first threshold value, or the number of times of false touch is ranked at the top n, wherein n is a positive integer;
the generating module is configured to generate a shortcut operation shielding list containing the determined shortcut operations;
the providing module is configured to provide the shortcut operation mask list generated by the generating module for a target terminal, and the target terminal masks each shortcut operation in the shortcut operation mask list.
Optionally, the determining module is further configured to:
counting the total number of times of mistakenly touching each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times larger than the first threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked at the top n bits as the shortcut operation meeting the preset condition.
Optionally, the determining module is further configured to:
counting the total number of times of using each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times smaller than a second threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked m after as the shortcut operation meeting the preset condition, wherein m is a positive integer.
Optionally, the providing module includes:
the detection submodule is configured to detect whether the shortcut operation shielding list is the same as a history generated shortcut operation shielding list or not;
and the providing submodule is configured to provide the shortcut operation mask list for the target terminal if the detection results of the detection submodules are different.
In a fourth aspect, there is provided a quick-action shielding device, the device comprising:
the statistical module is configured to count the use information of each shortcut operation in the reference terminal, wherein the use information comprises the number of times that each shortcut operation is touched by mistake;
the reporting module is configured to report the use information to a server, wherein the use information is used for indicating the server to determine shortcut operations meeting preset conditions according to the use information, generating a shortcut operation shielding list according to each determined shortcut operation, and providing the shortcut operation shielding list for a target terminal, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, and n is a positive integer.
Optionally, the statistical module includes:
the receiving submodule is configured to receive a trigger signal for triggering shortcut operation;
and the counting submodule is configured to add 1 to the number of times of mistakenly touching the shortcut operation when a closing signal is received in a preset time period, wherein the closing signal is a signal for closing the operation triggered by the trigger signal.
Optionally, the counting module is further configured to count the number of times each shortcut operation is used;
the reporting module is further configured to report usage information carrying the number of times that each shortcut operation is used to the server.
In a fifth aspect, there is provided a quick-action shielding device, the device comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
collecting use information of shortcut operations in each reference terminal, wherein the use information comprises the times of mistakenly touching each shortcut operation;
determining shortcut operation meeting preset conditions according to the use information; the preset conditions include: the number of times of false touch is higher than a first threshold value, or the number of times of false touch is ranked at the top n, wherein n is a positive integer;
generating a shortcut operation shielding list containing each determined shortcut operation;
and providing the shortcut operation shielding list to a target terminal, wherein the target terminal shields each shortcut operation in the shortcut operation shielding list.
In a sixth aspect, there is provided a quick-action shielding device, the device comprising:
counting the use information of each shortcut operation in the reference terminal, wherein the use information comprises the number of times that each shortcut operation is touched by mistake;
reporting the use information to a server, wherein the use information is used for indicating the server to determine shortcut operations meeting preset conditions according to the use information, generating a shortcut operation shielding list according to each determined shortcut operation, providing the shortcut operation shielding list for a target terminal, and shielding each shortcut operation in the shortcut operation shielding list by the target terminal; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, and n is a positive integer.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
the method comprises the steps that using information including the number of times of mistaken touch of each shortcut operation in a reference terminal is collected, the shortcut operation with the number of times of mistaken touch exceeding a first threshold or the number of times of mistaken touch ranked at the top n is determined according to the using information, a shortcut operation shielding list including the determined shortcut operations is generated, the shortcut operation shielding list is provided for a target terminal, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the problem that a user may mistakenly touch the shortcut operation to trigger the terminal to execute the wrong response is solved; the effect of shielding the shortcut operation with higher false touch probability according to the shortcut operation touched by the mistake in each reference terminal and further reducing the misoperation is achieved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a schematic illustration of an implementation environment to which various exemplary embodiments of the present disclosure are directed;
FIG. 2 is a flow diagram illustrating a shortcut masking method in accordance with an exemplary embodiment;
FIG. 3A is a flow diagram illustrating a shortcut masking method in accordance with another exemplary embodiment;
FIG. 3B is a flow diagram illustrating another shortcut masking method in accordance with another exemplary embodiment;
FIG. 4 is a block diagram illustrating a shortcut shielding device in accordance with an exemplary embodiment;
FIG. 5 is a block diagram illustrating another shortcut shielding device in accordance with another exemplary embodiment;
FIG. 6 is a block diagram illustrating a shortcut shielding device in accordance with an exemplary embodiment;
FIG. 7 is a block diagram illustrating a shortcut shielding device in accordance with an exemplary embodiment;
FIG. 8 is a block diagram illustrating a shortcut shielding device in accordance with an exemplary embodiment;
FIG. 9 is a block diagram illustrating a shortcut shielding device in accordance with an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Referring to fig. 1, a schematic diagram of an implementation environment related to a shortcut masking method according to various embodiments of the present invention is shown. As shown in fig. 1, the implementation environment includes: a reference terminal 110, a server 120 and a target terminal 130.
The reference terminal 110 and the target terminal 130 may be terminals such as a mobile phone, a tablet computer, an e-reader, a desktop computer, and the like. Optionally, the reference terminal 110 and the target terminal 130 are the same type of terminal. For example, the reference terminal 110 and the target terminal 130 are both mobile phones or both desktop computers, which is not limited in this embodiment. In addition, there may be a plurality of reference terminals 110 and a plurality of target terminals 130, and the number of the reference terminals 110 and the target terminals 130 is not limited in this embodiment (only 2 reference terminals 110 and one target terminal 130 are taken as an example in the figure). In addition, the reference terminal 110 and the target terminal 130 may be connected to the server 120 through a wired or wireless network in actual implementation.
The server 120 may be one server or a server cluster including a plurality of servers.
Referring to fig. 2, a flowchart of a method for masking a shortcut operation according to an embodiment of the present invention is shown, where the shortcut operation masking method is used in the implementation environment shown in fig. 1 for example. As shown in fig. 2, the shortcut operation masking method may include:
in step 201, the reference terminal counts usage information of each shortcut operation in the reference terminal, where the usage information includes the number of times that each shortcut operation is touched by mistake.
In step 202, the reference terminal reports the usage information to the server.
In step 203, the server collects usage information of the shortcut operations in the respective reference terminals, the usage information including the number of times that the respective shortcut operations are touched by mistake.
In step 204, the server determines a shortcut operation meeting a preset condition according to the usage information; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, and n is a positive integer.
In step 205, the server generates a shortcut mask list containing the determined respective shortcut operations.
In step 206, the server provides a shortcut operation mask list to the target terminal, and the target terminal masks each shortcut operation in the shortcut operation mask list.
In summary, in the shortcut operation shielding method provided in this embodiment, usage information including the number of times that each shortcut operation is touched by mistake in the reference terminal is collected, the shortcut operation whose number of times that the shortcut operation is touched by mistake exceeds the first threshold or is ranked n top is determined according to the usage information, a shortcut operation shielding list including the determined shortcut operations is generated, the shortcut operation shielding list is provided to the target terminal, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the problem that a user may mistakenly touch the shortcut operation to trigger the terminal to execute the wrong response is solved; the effect of shielding the shortcut operation with higher false touch probability according to the shortcut operation touched by the mistake in each reference terminal and further reducing the misoperation is achieved.
Referring to fig. 3A, a flowchart of a method for masking a shortcut operation according to another embodiment of the present invention is shown, and this embodiment is still illustrated by using the shortcut operation masking method in the implementation environment shown in fig. 1. As shown in fig. 3A, the shortcut operation masking method may include:
in step 301, the reference terminal receives a trigger signal that triggers a shortcut operation.
In the process that the user uses the reference terminal, when the shortcut operation is needed to trigger the reference terminal to execute a certain task, the user can apply a trigger signal for triggering the shortcut operation in the reference terminal, and correspondingly, the reference terminal can receive the trigger signal.
The shortcut operation refers to an operation of triggering the reference terminal to quickly execute a certain task. For example, when the reference terminal is a mobile phone, the shortcut operation may include: the method comprises the steps of quickly starting application operation through a preset gesture in a screen locking interface, unlocking operation of unlocking a mobile phone through a circle in the screen locking interface, zooming operation of contracting a finger zooming display interface, quick screen capturing operation of shaking the mobile phone and the like. For another example, when the reference terminal is a computer, the shortcut operation may include: an undo operation of ctrl + z, a switch operation of ctrl + shift to switch the input method, a selection operation of selecting a desktop display option in the taskbar, and the like.
In step 302, if the close signal is received within the preset time period, the reference terminal adds 1 to the number of times of the shortcut operation being touched by mistake.
After the reference terminal receives the trigger signal, if the closing signal is received within a preset time period, the shortcut operation is a false touch operation, and at this time, the reference terminal may add 1 to the number of times of false touch of the shortcut operation. The closing signal is a signal of an operation triggered by the closing trigger signal, and the preset time period is a time period with the duration less than the preset duration. E.g., less than 2S.
For example, the mobile phone receives a sliding signal sliding downwards in the screen locking interface, and after the camera is turned on, the mobile phone receives a closing signal for closing the camera in 2S, at this time, the mobile phone can determine the misoperation of the current operation position, and at this time, the mobile phone can add 1 to the number of times of false touch of shortcut operation for turning on the camera through sliding downwards.
Alternatively, the reference terminal may count the number of times the shortcut operation is touched by mistake in a fixed period of time, for example, count the number of times the shortcut operation is touched by mistake in the past day. Please refer to table 1, which shows the number of times that each shortcut operation in the mobile phone is touched by mistake when the reference terminal is the mobile phone.
Figure BDA0001060243830000071
Figure BDA0001060243830000081
TABLE 1
In step 303, the reference terminal reports the usage information carrying the number of times the shortcut operation was touched by mistake to the server.
And after counting the times of mistaken touch of the shortcut operation in a fixed time period, the reference terminal reports the use information carrying the times to the server.
For example, taking a fixed time period as one day, when the time reaches 24:00, the reference terminal reports the counted number of times of the shortcut operation being touched by mistake to the server. Optionally, after the number of times is reported to the server, the number of times may be set to 0.
In step 304, the server collects usage information of shortcut operations in the respective reference terminals.
After the reference terminal reports the use information to the server, the server can correspondingly receive the use information reported by the reference terminal. The use information comprises the number of times of mistakenly touching each shortcut operation.
When there are multiple reference terminals, the server may receive and obtain the usage information reported by each reference terminal.
In step 305, the server counts the total number of times each shortcut operation is touched by mistake according to the usage information.
The server can count the total number of times of mistakenly touching each shortcut operation according to the received use information reported by each reference terminal. Optionally, the server may calculate a sum of times that the same shortcut operation is touched by mistake in the usage information reported by each reference terminal.
In step 306, the server determines the shortcut operation corresponding to the total number of times greater than the first threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked at the top n bits as the shortcut operation meeting the preset condition.
The first threshold is a preset value. In practice, the server may update the first threshold value at predetermined time intervals, or the server may update the first threshold value according to a change in the number of reference terminals.
For example, taking the example that the server updates the first threshold value according to the change of the number of the reference terminals, when the number of the reference terminals is 2000, the first threshold value may be updated to 2000 × 2 — 4000. Where the coefficient 2 represents the maximum number of allowed false touches.
n is an integer. For example, if the number of shortcut operations in the shortcut operation mask list is 5, then n is 5.
In addition, when n shortcut operations are taken, this embodiment is only to rank the shortcut operations in the order from high to low according to the total number of times, and then select the shortcut operation ranked on the top n bits, optionally, the server may also rank the shortcut operations in the order from low to high according to the total number of times, and select the shortcut operation ranked on the top n bits, which is not limited in this embodiment.
In step 307, the server generates a shortcut mask list containing the determined respective shortcut operations.
In step 308, the server provides a shortcut operation mask list to the target terminal, and the target terminal masks each shortcut operation in the shortcut operation mask list.
Optionally, the server may provide the shortcut operation mask list to the target terminal when the target terminal leaves the factory.
Optionally, this step may include:
first, whether the shortcut operation mask list is the same as the history generated shortcut operation mask list is detected.
And secondly, if the detection results are different, providing a shortcut operation shielding list for the target terminal.
If the detection results are different, the server may provide the shortcut operation mask list to the target terminal in order to enable the target terminal to use the latest shortcut operation mask list.
After the target terminal receives the shortcut operation shielding list, each shortcut operation in the list can be shielded. Certainly, in actual implementation, the user of the target terminal may not shield each shortcut operation in the list according to the use requirement of the user, which is not limited in this embodiment.
In the above embodiment, the reference terminal is only taken as a mobile phone, optionally, the reference terminal may also be a tablet computer, a desktop computer, or other types of terminals, which is not limited in this embodiment.
To sum up, in the shortcut operation shielding method provided in this embodiment, usage information including the number of times that each shortcut operation is touched by mistake in a reference terminal is collected, the shortcut operation whose number of times that the touched by mistake exceeds a first threshold or whose number of times that the touched by mistake is ranked at the top n is determined according to the usage information, a shortcut operation shielding list including the determined shortcut operations is generated, the shortcut operation shielding list is provided for a target terminal, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the problem that a user may mistakenly touch the shortcut operation to trigger the terminal to execute the wrong response is solved; the effect of shielding the shortcut operation with higher false touch probability according to the shortcut operation touched by the mistake in each reference terminal and further reducing the misoperation is achieved.
It should be noted that, in the above embodiment, only the usage information including the number of times that the shortcut operation is touched by mistake is reported when the reference terminal reports the usage information to the server, and optionally, referring to fig. 3B, before the reference terminal reports the usage information to the server, the reference terminal may further perform the following steps:
in step 309, the reference terminal counts the number of times each shortcut operation is used.
Accordingly, step 303 may be replaced with: and reporting the use information carrying the use times of each shortcut operation and the times of mistaken touch of the shortcut operation to a server.
After receiving the usage information, the step of determining the shortcut operation meeting the preset condition according to the usage information may further include the following step, that is, the shortcut operation blocking method may further include the following step:
in step 310, the server counts the total number of times each shortcut operation is used according to the usage information.
In step 311, the server determines the shortcut operation corresponding to the total number of times smaller than the second threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked m after as the shortcut operation meeting the preset condition, wherein m is a positive integer.
Step 310 and step 311 are similar to step 305 and step 306 in the above embodiment, respectively, and this embodiment is not described herein again. In addition, this embodiment is only illustrated by first performing step 305 and step 306, and then performing step 310 and step 311, optionally, the server may also perform step 310 and step 311 at the same time, or first perform step 310 and step 311, and then perform step 305 and step 306, which is not limited in this embodiment.
The shortcut operation corresponding to the total times smaller than the second threshold is determined to be the shortcut operation meeting the preset condition, or the shortcut operation ranked m top is determined to be the shortcut operation meeting the preset condition, that is, the shortcut operation not frequently used is determined to be the shortcut operation meeting the preset condition, so that a shortcut operation shielding list containing the shortcut operation not frequently used is generated, and the trouble of the user caused by the shortcut operation not frequently used is avoided.
It should be noted that, in the above embodiment, the steps related to the reference terminal side may be implemented separately as the shortcut operation blocking method on the reference terminal side, and the steps related to the server side may be implemented separately as the shortcut operation blocking method on the server side.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Referring to fig. 4, a block diagram of a shortcut shielding apparatus according to an exemplary embodiment of the present invention is shown, and this embodiment is illustrated by using the shortcut shielding apparatus in the server 120 shown in fig. 1. As shown in fig. 4, the apparatus may include: a collection module 410, a determination module 420, a generation module 430, and a provision module 440.
A collecting module 410 configured to collect usage information of shortcut operations in each reference terminal, the usage information including the number of times each shortcut operation is touched by mistake;
a determining module 420 configured to determine a shortcut operation that satisfies a preset condition according to the usage information collected by the collecting module 410; the preset conditions include: the number of times of false touch is higher than a first threshold value, or the number of times of false touch is ranked at the top n, wherein n is a positive integer;
a generating module 430 configured to generate a shortcut operation mask list containing the determined respective shortcut operations;
a providing module 440, configured to provide the shortcut operation mask list generated by the generating module 430 to a target terminal, where the target terminal masks each shortcut operation in the shortcut operation mask list.
In summary, in the shortcut operation shielding apparatus provided in this embodiment, usage information including the number of times that each shortcut operation is touched by mistake in a reference terminal is collected, the shortcut operation whose number of times that the shortcut operation is touched by mistake exceeds a first threshold or is ranked n top of the number of times that the shortcut operation is touched by mistake is determined according to the usage information, a shortcut operation shielding list including the determined shortcut operations is generated, the shortcut operation shielding list is provided to a target terminal, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the problem that a user may mistakenly touch the shortcut operation to trigger the terminal to execute the wrong response is solved; the effect of shielding the shortcut operation with higher false touch probability according to the shortcut operation touched by the mistake in each reference terminal and further reducing the misoperation is achieved.
Referring to fig. 5, a block diagram of a shortcut shielding apparatus according to an exemplary embodiment of the present invention is shown, and this embodiment is illustrated by using the shortcut shielding apparatus in the server 120 shown in fig. 1. As shown in fig. 5, the apparatus may include: a collection module 510, a determination module 520, a generation module 530, and a provision module 540.
A collecting module 510 configured to collect usage information of shortcut operations in each reference terminal, the usage information including the number of times each shortcut operation is touched by mistake;
a determining module 520 configured to determine a shortcut operation that satisfies a preset condition according to the usage information collected by the collecting module 510; the preset conditions include: the number of times of false touch is higher than a first threshold value, or the number of times of false touch is ranked at the top n, wherein n is a positive integer;
a generating module 530 configured to generate a shortcut mask list containing the determined respective shortcut operations;
a providing module 540, configured to provide the shortcut operation mask list generated by the generating module 530 to a target terminal, where the target terminal masks each shortcut operation in the shortcut operation mask list.
Optionally, the determining module 520 is further configured to:
counting the total number of times of mistakenly touching each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times larger than the first threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked at the top n bits as the shortcut operation meeting the preset condition.
Optionally, the determining module 520 is further configured to:
counting the total number of times of using each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times smaller than a second threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked m after as the shortcut operation meeting the preset condition, wherein m is a positive integer.
Optionally, the providing module 540 includes:
a detection submodule 541 configured to detect whether the shortcut operation mask list is the same as a history-generated shortcut operation mask list;
the providing submodule 542 is configured to provide the shortcut operation mask list to the target terminal if the detection results of the detection submodules 541 are different.
In summary, in the shortcut operation shielding apparatus provided in this embodiment, usage information including the number of times that each shortcut operation is touched by mistake in a reference terminal is collected, the shortcut operation whose number of times that the shortcut operation is touched by mistake exceeds a first threshold or is ranked n top of the number of times that the shortcut operation is touched by mistake is determined according to the usage information, a shortcut operation shielding list including the determined shortcut operations is generated, the shortcut operation shielding list is provided to a target terminal, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the problem that a user may mistakenly touch the shortcut operation to trigger the terminal to execute the wrong response is solved; the effect of shielding the shortcut operation with higher false touch probability according to the shortcut operation touched by the mistake in each reference terminal and further reducing the misoperation is achieved.
Referring to fig. 6, a block diagram of a shortcut shielding device according to an exemplary embodiment of the present invention is shown, and this embodiment is illustrated by using the shortcut shielding device in the reference terminal 110 shown in fig. 1. As shown in fig. 6, the apparatus may include: a statistic module 610 and a reporting module 620.
The statistical module 610 is configured to count the use information of each shortcut operation in the reference terminal, where the use information includes the number of times that each shortcut operation is touched by mistake;
a reporting module 620, configured to report the usage information to a server, where the usage information is used to instruct the server to determine, according to the usage information, a shortcut operation that meets a preset condition, generate a shortcut operation shielding list according to each determined shortcut operation, and provide the shortcut operation shielding list to a target terminal, where the target terminal shields each shortcut operation in the shortcut operation shielding list; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, and n is a positive integer.
In summary, in the shortcut operation shielding apparatus provided in this embodiment, by reporting usage information including the number of times that each shortcut operation is touched by mistake to the server, the server may determine, according to the usage information reported by each reference terminal, a shortcut operation whose number of times that the shortcut operation is touched by mistake exceeds the first threshold or is ranked n top of the number of times that the shortcut operation is touched by mistake, generate a shortcut operation shielding list including the determined shortcut operations, provide the shortcut operation shielding list to the target terminal, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the problem that a user may mistakenly touch the shortcut operation to trigger the terminal to execute the wrong response is solved; the effect of shielding the shortcut operation with higher false touch probability according to the shortcut operation touched by the mistake in each reference terminal and further reducing the misoperation is achieved.
Referring to fig. 7, a block diagram of a shortcut shielding device according to an exemplary embodiment of the present invention is shown, and this embodiment is illustrated by using the shortcut shielding device in the reference terminal 110 shown in fig. 1. As shown in fig. 7, the apparatus may include: a statistic module 710 and a reporting module 720.
The statistical module 710 is configured to count usage information of each shortcut operation in the reference terminal, where the usage information includes the number of times that each shortcut operation is touched by mistake;
a reporting module 720, configured to report the usage information to a server, where the usage information is used to instruct the server to determine, according to the usage information, shortcut operations that meet preset conditions, generate a shortcut operation mask list according to each determined shortcut operation, and provide the shortcut operation mask list to a target terminal, where the target terminal masks each shortcut operation in the shortcut operation mask list; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, and n is a positive integer.
Optionally, the statistic module 710 includes:
a receiving submodule 711 configured to receive a trigger signal that triggers a shortcut operation;
and the counting submodule 712 is configured to add 1 to the number of times that the shortcut operation is touched by mistake when a closing signal is received within a preset time period, where the closing signal is a signal for closing the operation triggered by the trigger signal.
Optionally, the counting module 710 is further configured to count the number of times that each shortcut operation is used;
the reporting module 720 is further configured to report the usage information carrying the number of times that each shortcut operation is used to the server.
In summary, in the shortcut operation shielding apparatus provided in this embodiment, by reporting usage information including the number of times that each shortcut operation is touched by mistake to the server, the server may determine, according to the usage information reported by each reference terminal, a shortcut operation whose number of times that the shortcut operation is touched by mistake exceeds the first threshold or is ranked n top of the number of times that the shortcut operation is touched by mistake, generate a shortcut operation shielding list including the determined shortcut operations, provide the shortcut operation shielding list to the target terminal, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the problem that a user may mistakenly touch the shortcut operation to trigger the terminal to execute the wrong response is solved; the effect of shielding the shortcut operation with higher false touch probability according to the shortcut operation touched by the mistake in each reference terminal and further reducing the misoperation is achieved.
It should be noted that, when the shortcut shielding apparatus provided in the foregoing embodiment implements the shortcut shielding function, only the division of each function module is illustrated, and in practical applications, the function distribution may be completed by different function modules according to actual needs, that is, the content structure of the device is divided into different function modules, so as to complete all or part of the functions described above.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
An exemplary embodiment of the present disclosure further provides a shortcut shielding apparatus, which can implement the shortcut shielding method on the server side provided by the present disclosure. The shortcut operation shielding device includes: a processor, and a memory for storing processor-executable instructions.
Wherein the processor is configured to:
collecting use information of shortcut operations in each reference terminal, wherein the use information comprises the times of mistakenly touching each shortcut operation;
determining shortcut operation meeting preset conditions according to the use information; the preset conditions include: the number of times of false touch is higher than a first threshold value, or the number of times of false touch is ranked at the top n, wherein n is a positive integer;
generating a shortcut operation shielding list containing each determined shortcut operation;
and providing the shortcut operation shielding list to a target terminal, wherein the target terminal shields each shortcut operation in the shortcut operation shielding list.
An exemplary embodiment of the present disclosure further provides a shortcut shielding apparatus, which can implement the shortcut shielding method on the reference terminal side provided by the present disclosure. The shortcut operation shielding device includes: a processor, and a memory for storing processor-executable instructions.
Wherein the processor is configured to:
counting the use information of each shortcut operation in the reference terminal, wherein the use information comprises the number of times that each shortcut operation is touched by mistake;
reporting the use information to a server, wherein the use information is used for indicating the server to determine shortcut operations meeting preset conditions according to the use information, generating a shortcut operation shielding list according to each determined shortcut operation, providing the shortcut operation shielding list for a target terminal, and shielding each shortcut operation in the shortcut operation shielding list by the target terminal; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, and n is a positive integer.
FIG. 8 is a block diagram illustrating a shortcut shielding device in accordance with an exemplary embodiment. The apparatus 800 may be implemented as all or part of the server 120 shown in fig. 1.
Referring to FIG. 8, apparatus 800 includes a processing component 822, which further includes one or more processors and memory resources, represented by memory 832, for storing instructions, such as application programs, that are executable by processing component 822. The application programs stored in memory 832 may include one or more modules that each correspond to a set of instructions. Further, the processing component 822 is configured to execute instructions to perform the shortcut operation blocking method on the server side provided by the above-described embodiments.
The device 800 may also include a power component 826 configured to perform power management of the device 800, a wired or wireless network interface 850 configured to connect the device 800 to a network, and an input/output (I/O) interface 858. The apparatus 800 may operate based on an operating system stored in the memory 832, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
FIG. 9 is a block diagram illustrating a shortcut shielding device in accordance with an exemplary embodiment. The apparatus 900 may be implemented as all or part of the reference terminal 110 shown in fig. 1.
Referring to fig. 9, apparatus 900 may include one or more of the following components: processing component 902, memory 904, power component 906, multimedia component 908, audio component 910, input/output (I/O) interface 912, sensor component 914, and communication component 916.
The processing component 902 generally controls overall operation of the device 900, such as operations associated with display, data communication, camera operations, and recording operations. Processing components 902 may include one or more processors 918 to execute instructions to perform all or a portion of the steps of the methods described above. Further, processing component 902 can include one or more modules that facilitate interaction between processing component 902 and other components. For example, the processing component 902 can include a multimedia module to facilitate interaction between the multimedia component 908 and the processing component 902.
The memory 904 is configured to store various types of data to support operation at the apparatus 900. Examples of such data include instructions, messages, pictures, videos, etc. for any application or method operating on device 900. The memory 904 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 906 provides power to the various components of the device 900. The power components 906 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the device 900.
The multimedia component 908 includes a screen that provides an output interface between the device 900 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 908 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 900 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 910 is configured to output and/or input audio signals. For example, audio component 910 includes a Microphone (MIC) configured to receive external audio signals when apparatus 900 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 904 or transmitted via the communication component 916. In some embodiments, audio component 910 also includes a speaker for outputting audio signals.
The I/O interface 912 provides an interface between the processing component 902 and peripheral interface modules, which may be keyboards, click wheels, buttons, speakers, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 914 includes one or more sensors for providing status assessment of various aspects of the apparatus 900. For example, sensor assembly 914 may detect an open/closed state of device 900, the relative positioning of components, such as a display of device 900, the change in position of device 900 or a component of device 900, the presence or absence of user contact with device 900, the orientation or acceleration/deceleration of device 900, and the change in temperature of device 900. The sensor assembly 914 may include a proximity sensor configured to detect the presence of a nearby object in the absence of any physical contact. The sensor assembly 914 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 914 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 916 is configured to facilitate communications between the apparatus 900 and other devices in a wired or wireless manner. The apparatus 900 may access a wireless network based on a communication standard, such as Wi-Fi, 2G, or 3G, or a combination thereof. In an exemplary embodiment, the communication component 916 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 916 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 900 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the shortcut masking method at the reference terminal side in the above-described embodiments.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 904 comprising instructions, executable by the processor 918 of the device 900 to perform the payment method described above is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (16)

1. A shortcut masking method, comprising:
collecting use information of shortcut operations in each reference terminal, wherein the use information comprises the times of mistakenly touching each shortcut operation;
determining shortcut operation meeting preset conditions according to the use information; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, n is a positive integer, and the first threshold is a numerical value updated according to the change of the number of the reference terminals;
generating a shortcut operation shielding list containing each determined shortcut operation;
and when the target terminal leaves the factory, providing the shortcut operation shielding list for the target terminal, and shielding each shortcut operation in the shortcut operation shielding list by the target terminal.
2. The method according to claim 1, wherein the determining, according to the usage information, a shortcut operation that satisfies a preset condition includes:
counting the total number of times of mistakenly touching each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times larger than the first threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked at the top n bits as the shortcut operation meeting the preset condition.
3. The method according to claim 1, wherein the usage information further includes a number of times each shortcut operation is used, and the determining of the shortcut operation satisfying a preset condition according to the usage information further includes:
counting the total number of times of using each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times smaller than a second threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked m after as the shortcut operation meeting the preset condition, wherein m is a positive integer.
4. The method according to any one of claims 1 to 3, wherein the providing the shortcut operation mask list to the target terminal comprises:
detecting whether the shortcut operation shielding list is the same as a history generated shortcut operation shielding list or not;
and if the detection results are different, providing the shortcut operation shielding list for the target terminal.
5. A shortcut masking method, comprising:
counting the use information of each shortcut operation in the reference terminal, wherein the use information comprises the number of times that each shortcut operation is touched by mistake;
reporting the use information to a server, wherein the use information is used for indicating the server to determine shortcut operations meeting preset conditions according to the use information, generating a shortcut operation shielding list according to each determined shortcut operation, providing the shortcut operation shielding list for a target terminal when the target terminal leaves a factory, and shielding each shortcut operation in the shortcut operation shielding list by the target terminal; the preset conditions include: the number of times of false touches is higher than a first threshold, or the number of times of false touches is ranked at the top n, n is a positive integer, and the first threshold is a numerical value updated according to the change of the number of the reference terminals.
6. The method according to claim 5, wherein the counting the usage information of each shortcut operation in the reference terminal comprises:
receiving a trigger signal for triggering shortcut operation;
and if a closing signal is received in a preset time period, adding 1 to the number of times of mistakenly touching the shortcut operation, wherein the closing signal is a signal for closing the operation triggered by the trigger signal.
7. The method according to claim 5, wherein the counting usage information of each shortcut operation in the reference terminal further comprises:
counting the number of times each shortcut operation is used;
the reporting the usage information to a server includes:
and reporting the use information carrying the used times of each shortcut operation to the server.
8. A quick action shielding device, comprising:
the collecting module is configured to collect the use information of the shortcut operations in each reference terminal, and the use information comprises the number of times that each shortcut operation is touched by mistake;
the determining module is configured to determine shortcut operations meeting preset conditions according to the use information collected by the collecting module; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, n is a positive integer, and the first threshold is a numerical value updated according to the change of the number of the reference terminals;
the generating module is configured to generate a shortcut operation shielding list containing the determined shortcut operations;
the providing module is configured to provide the shortcut operation mask list generated by the generating module to a target terminal when the target terminal leaves a factory, and the target terminal masks each shortcut operation in the shortcut operation mask list.
9. The apparatus of claim 8, wherein the determination module is further configured to:
counting the total number of times of mistakenly touching each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times larger than the first threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked at the top n bits as the shortcut operation meeting the preset condition.
10. The apparatus of claim 8, wherein the determination module is further configured to:
counting the total number of times of using each shortcut operation according to the use information;
determining the shortcut operation corresponding to the total times smaller than a second threshold as the shortcut operation meeting the preset condition; or ranking the shortcut operations according to the sequence of the total times from high to low, and determining the shortcut operation ranked m after as the shortcut operation meeting the preset condition, wherein m is a positive integer.
11. The apparatus of any one of claims 8 to 10, wherein the providing module comprises:
the detection submodule is configured to detect whether the shortcut operation shielding list is the same as a history generated shortcut operation shielding list or not;
and the providing submodule is configured to provide the shortcut operation mask list for the target terminal if the detection results of the detection submodules are different.
12. A quick action shielding device, comprising:
the statistical module is configured to count the use information of each shortcut operation in the reference terminal, wherein the use information comprises the number of times that each shortcut operation is touched by mistake;
the reporting module is configured to report the use information to a server, wherein the use information is used for indicating the server to determine shortcut operations meeting preset conditions according to the use information, generating a shortcut operation shielding list according to each determined shortcut operation, and providing the shortcut operation shielding list for a target terminal when the target terminal leaves a factory, and the target terminal shields each shortcut operation in the shortcut operation shielding list; the preset conditions include: the number of times of false touches is higher than a first threshold, or the number of times of false touches is ranked at the top n, n is a positive integer, and the first threshold is a numerical value updated according to the change of the number of the reference terminals.
13. The apparatus of claim 12, wherein the statistics module comprises:
the receiving submodule is configured to receive a trigger signal for triggering shortcut operation;
and the counting submodule is configured to add 1 to the number of times of mistakenly touching the shortcut operation when a closing signal is received in a preset time period, wherein the closing signal is a signal for closing the operation triggered by the trigger signal.
14. The apparatus of claim 12,
the counting module is also configured to count the number of times each shortcut operation is used;
the reporting module is further configured to report usage information carrying the number of times that each shortcut operation is used to the server.
15. A quick action shielding device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
collecting use information of shortcut operations in each reference terminal, wherein the use information comprises the times of mistakenly touching each shortcut operation;
determining shortcut operation meeting preset conditions according to the use information; the preset conditions include: the number of times of false touch is higher than a first threshold, or the number of times of false touch is ranked at the top n, n is a positive integer, and the first threshold is a numerical value updated according to the change of the number of the reference terminals;
generating a shortcut operation shielding list containing each determined shortcut operation;
and when the target terminal leaves the factory, providing the shortcut operation shielding list for the target terminal, and shielding each shortcut operation in the shortcut operation shielding list by the target terminal.
16. A quick action shielding device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to:
counting the use information of each shortcut operation in the reference terminal, wherein the use information comprises the number of times that each shortcut operation is touched by mistake;
reporting the use information to a server, wherein the use information is used for indicating the server to determine shortcut operations meeting preset conditions according to the use information, generating a shortcut operation shielding list according to each determined shortcut operation, providing the shortcut operation shielding list for a target terminal when the target terminal leaves a factory, and shielding each shortcut operation in the shortcut operation shielding list by the target terminal; the preset conditions include: the number of times of false touches is higher than a first threshold, or the number of times of false touches is ranked at the top n, n is a positive integer, and the first threshold is a numerical value updated according to the change of the number of the reference terminals.
CN201610597393.8A 2016-07-26 2016-07-26 Shortcut operation shielding method and device Active CN106250131B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610597393.8A CN106250131B (en) 2016-07-26 2016-07-26 Shortcut operation shielding method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610597393.8A CN106250131B (en) 2016-07-26 2016-07-26 Shortcut operation shielding method and device

Publications (2)

Publication Number Publication Date
CN106250131A CN106250131A (en) 2016-12-21
CN106250131B true CN106250131B (en) 2020-07-03

Family

ID=57604805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610597393.8A Active CN106250131B (en) 2016-07-26 2016-07-26 Shortcut operation shielding method and device

Country Status (1)

Country Link
CN (1) CN106250131B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108683809B (en) * 2018-05-09 2020-11-10 珠海格力电器股份有限公司 Screen locking method, device and system
CN112118389A (en) * 2020-08-14 2020-12-22 深圳传音控股股份有限公司 Control method, terminal and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7552400B1 (en) * 2003-05-20 2009-06-23 Google Inc. System and method for navigating within a graphical user interface without using a pointing device
CN102147732A (en) * 2011-05-18 2011-08-10 深圳市五巨科技有限公司 Method and device for automatically setting desktop shortcut keys on mobile terminal
CN103186246A (en) * 2011-12-29 2013-07-03 北京搜狗科技发展有限公司 Method and device for solving shortcut key conflict
CN103885668A (en) * 2012-12-20 2014-06-25 航天信息股份有限公司 Method and device for implementing custom shortcut keys on android platform
CN104378682A (en) * 2014-11-14 2015-02-25 乐视致新电子科技(天津)有限公司 Key counting method based on android system and smart television based on android system
CN105260284A (en) * 2015-10-19 2016-01-20 上海斐讯数据通信技术有限公司 Method for monitoring using behaviors of users of mobile terminals

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7757185B2 (en) * 2006-01-06 2010-07-13 Apple Inc. Enabling and disabling hotkeys
TWI416368B (en) * 2009-01-19 2013-11-21 Nuvoton Technology Corp Keyboard mouse switch and switching method thereof
CN102778969B (en) * 2011-05-13 2015-12-09 联想移动通信科技有限公司 Touch-type mobile terminal and operation method thereof
CN102346596B (en) * 2011-11-14 2013-11-13 宇龙计算机通信科技(深圳)有限公司 Touch operation processing method and terminal
CN103309588B (en) * 2013-06-19 2015-12-23 广东欧珀移动通信有限公司 A kind of method, Apparatus and system preventing mobile terminal maloperation
CN103686354B (en) * 2013-12-04 2017-01-11 青岛海信电器股份有限公司 Smart television terminal and method for counting reporting key use behaviors
CN103744593B (en) * 2013-12-30 2017-05-17 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for preventing mis-operation of mobile terminal
CN104765559A (en) * 2015-03-24 2015-07-08 深圳市金立通信设备有限公司 Misoperation preventing method
CN105549849A (en) * 2015-12-15 2016-05-04 小米科技有限责任公司 Method and device for processing misoperation instruction

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7552400B1 (en) * 2003-05-20 2009-06-23 Google Inc. System and method for navigating within a graphical user interface without using a pointing device
CN102147732A (en) * 2011-05-18 2011-08-10 深圳市五巨科技有限公司 Method and device for automatically setting desktop shortcut keys on mobile terminal
CN103186246A (en) * 2011-12-29 2013-07-03 北京搜狗科技发展有限公司 Method and device for solving shortcut key conflict
CN103885668A (en) * 2012-12-20 2014-06-25 航天信息股份有限公司 Method and device for implementing custom shortcut keys on android platform
CN104378682A (en) * 2014-11-14 2015-02-25 乐视致新电子科技(天津)有限公司 Key counting method based on android system and smart television based on android system
CN105260284A (en) * 2015-10-19 2016-01-20 上海斐讯数据通信技术有限公司 Method for monitoring using behaviors of users of mobile terminals

Also Published As

Publication number Publication date
CN106250131A (en) 2016-12-21

Similar Documents

Publication Publication Date Title
CN106020784B (en) Application message display method and device and terminal
JP6393840B2 (en) Information display method, apparatus, program, and recording medium
CN106293283B (en) Key triggering method and device and terminal
CN105183364A (en) Application switching method, application switching device and application switching equipment
CN107390932B (en) Edge false touch prevention method and device and computer readable storage medium
CN106919629B (en) Method and device for realizing information screening in group chat
EP3232301B1 (en) Mobile terminal and virtual key processing method
CN107132949B (en) Anti-interference method, device, terminal and storage medium
CN104461236A (en) Method and device for displaying application icons
CN111104001B (en) Method and device for preventing screen from being touched mistakenly, mobile terminal and storage medium
US20220300141A1 (en) Detection method, device, and electronic equipment
CN106919283A (en) The touch event processing method of terminal, device and terminal
CN106951299A (en) The operating method and device of application program
CN106547462B (en) Photographing control method and device and mobile terminal
CN105323152A (en) Message processing method, device and equipment
CN112905035B (en) Touch screen control method and device and computer storage medium
CN106250131B (en) Shortcut operation shielding method and device
CN107402677B (en) Method and device for recognizing finger lifting in touch operation and terminal
CN107423757B (en) Clustering processing method and device
CN109710152B (en) Event processing method and device and storage medium
CN107203279B (en) Keyword prompting method and device
CN107203315B (en) Click event processing method and device and terminal
US20220147244A1 (en) Method and device for touch operation, and storage medium
CN113093932B (en) Touch detection processing method and device, terminal equipment and storage medium
CN114185444B (en) Touch screen error touch prevention method, device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant