CN106502502A - A kind of method of locking applications and terminal - Google Patents

A kind of method of locking applications and terminal Download PDF

Info

Publication number
CN106502502A
CN106502502A CN201610930716.0A CN201610930716A CN106502502A CN 106502502 A CN106502502 A CN 106502502A CN 201610930716 A CN201610930716 A CN 201610930716A CN 106502502 A CN106502502 A CN 106502502A
Authority
CN
China
Prior art keywords
icon
lock
application program
locking
touch operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610930716.0A
Other languages
Chinese (zh)
Inventor
李海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610930716.0A priority Critical patent/CN106502502A/en
Publication of CN106502502A publication Critical patent/CN106502502A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Automation & Control Theory (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a kind of method of locking applications and terminal, wherein, methods described includes:If there is the icon of application program on current operation interface, when predeterminable area execution first touch operation of the user at the current operation interface is detected, hiding lock icon is recalled;The lock icon is dragged according to the second touch operation of user input, the movement locus of the lock icon is separated and is filled the icon corresponding to the application program that locking is needed on the current operation interface, to lock the application program.Embodiment of the present invention terminal recalls hiding lock icon by detecting user when the predeterminable area at current operation interface executes the first touch operation;And lock icon is dragged according to the second touch operation of user input so as to movement locus separates and fills the icon corresponding to application program, and then locking applications, facilitates user to select and locking applications, and then protects privacy of user.

Description

A kind of method of locking applications and terminal
Technical field
The present invention relates to electronic technology field, more particularly to a kind of method of locking applications and terminal.
Background technology
Nowadays the popularity more and more higher of intelligent terminal, people nearly all be unable to do without intelligence eventually in life or work End.Due to the specificity of intelligent terminal, people leave corresponding vestige in meeting during use, for example, photograph in photograph album Chat record and message registration in piece, social networking application etc..Although in prior art be by arrange applied cryptography realize right The locking of application program, but, the program also needs to be set in the application, and simultaneously not all application program is all carried Lock function.
Content of the invention
The embodiment of the present invention provides a kind of method of locking applications and terminal, facilitates user to select and lock application journey Sequence, to protect privacy of user.
In a first aspect, embodiments providing a kind of method of locking applications, methods described includes:
If there is the icon of application program on current operation interface, when detecting user in the pre- of the current operation interface If region executes the first touch operation, hiding lock icon is recalled;
The lock icon is dragged according to the second touch operation of user input, make the movement locus of the lock icon every Break and fill the icon corresponding to the application program for needing to lock on the current operation interface, to lock the application program.
On the other hand, a kind of terminal is embodiments provided, and the terminal includes:
Unit is transferred, if for the icon that there is application program on current operation interface, working as described when user is detected When the predeterminable area of front operation interface executes the first touch operation, hiding lock icon is recalled;
Lock cell, drags the lock icon for the second touch operation according to user input, makes the locking figure Target movement locus separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock The application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden Private.
Description of the drawings
In order to be illustrated more clearly that embodiment of the present invention technical scheme, embodiment will be described below needed for be used Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for this area general For logical technical staff, on the premise of not paying creative work, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is a kind of schematic flow diagram of the method for locking applications provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of the method for locking applications that another embodiment of the present invention is provided;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided;
Fig. 5 is overall plan schematic diagram of the present invention;
Fig. 6 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided.
Specific embodiment
Accompanying drawing in below in conjunction with the embodiment of the present invention, to the embodiment of the present invention in technical scheme carry out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.It is based on this Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art Example, belongs to the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " including " and "comprising" are indicated The presence of described feature, entirety, step, operation, element and/or component, but it is not precluded from one or more of the other feature, whole The presence or interpolation of body, step, operation, element, component and/or its set.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, and otherwise " one " of singulative, " one " and " being somebody's turn to do " is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to the one or more any combinations in the associated item that lists and be possible to combine, and combine including these.
As in this specification and in the appended claims as use, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true Fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In implementing, the terminal described in the embodiment of the present invention including but not limited to such as has touch sensitive surface Other of the mobile phone of (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc are just Portable device.It is to be further understood that in certain embodiments, the equipment not portable communication device, but have and touch Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal for including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, for example following in one or more:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be executed in terminal can be public using at least one of such as touch sensitive surface Physical user-interface device.Can adjust among applications and/or in corresponding application programs and/or change and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal (for example, is touched Sensing surface) the various application programs that can support with user interface directly perceived and transparent for a user.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow diagram of the method for locking applications provided in an embodiment of the present invention. The executive agent for being locked the method for application program in the present embodiment is terminal, and the terminal can be smart mobile phone, panel computer Deng mobile terminal, or Intelligent worn device, such as bracelet and intelligent watch.As shown in figure 1, the method for locking applications Comprise the following steps:
S110:If there is the icon of application program on current operation interface, when detecting user in current operation circle When the predeterminable area in face executes the first touch operation, hiding lock icon is recalled.
In step s 110, file boundary in opened condition of the current operation interface for the desktop or storage icon of terminal Face.
It should be noted that the icon of the application program that can carry for terminal of the icon of application program, User Defined The photo scaling figure of setting, the icon of the application program that is downloaded by application market, file or function shortcut.Preset areas Domain can be the curved surface side of the peripheral blank position, the touch-screen side of terminal or terminal surface touch-screen of the icon.
For example, predeterminable area is the outline line of the gap position or single icon between two icons to outside icon Direction position.
It is understood that predeterminable area according to use habit or can like self-defined setting by user, select in user When selecting predeterminable area, can select dragging lock icon under pattern in predeterminable area carries out the selection of predeterminable area, or is working as All positions for being set to predeterminable area are selected in front operation interface as predeterminable area, wherein all predeterminable areas that are set to Position is the region that icon is not blocked.User after predeterminable area is selected and determines predeterminable area under pattern, when exiting preset areas When pattern is selected in domain, lock icon is hidden automatically.
In the present embodiment, the first touch operation is user touch behaviour by finger or articulations digitorum manus on a terminal screen Make, first touch operation can be click, double-click, multi-hit, long by or slidably reciprocating in the Preset Time.
It is understood that lock icon can be including multiple, as the first touch operation is used for transferring hiding lock Determine icon, corresponding first touch operation can also include multiple, each touch operation is corresponding with each lock icon, Or the one kind in multiple lock icons is transferred in same touch operation at random.
S120:The lock icon is dragged according to the second touch operation of user input, the motion of the lock icon is made Track separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock the application Program.
In the step s 120, the second touch operation can be slide of the user on terminal touch screen curtain, for example, Horizontal direction on terminal touch screen curtain along icon is slided or the vertical direction along icon on terminal touch screen curtain slides.
Step S120 is specifically included:The lock icon is dragged according to the second touch operation of user input, the lock is made The movement locus for determining icon needs the icon corresponding to the application program of locking on the current operation interface;To locking figure Target movement locus is filled, and the icon corresponding to the application program for needing locking is separated into two parts icon; Calculate the original pixel value and two parts icon of icon corresponding to the application program pixel and, and to described original Pixel value is compared with the pixel sum of two parts icon;Determine whether to lock the application journey according to comparative result Sequence.
So that second touches the slide that behaviour is user on terminal touch screen curtain as an example, the track of slide and dragging The movement locus of lock icon coincides.User is filled out to the movement locus of lock icon while lock icon is dragged Fill, when the icon corresponding to the movement locus of lock icon needs the application program that locks on the current operation interface, by In filling effect so that the icon corresponding to the application program for needing locking is separated into two parts icon by movement locus, lead to The original pixel value and the pixel sum of two parts icon for calculating the icon corresponding to application program is crossed, and compares original pixel value The pixel sum of two parts icon whether is equal to, locking applications are determined whether according to comparative result.
It is understood that the locking figure that lock icon can be voluntarily selected according to hobby from default picture library for user Mark, lock icon can be the image of the image of zip form or sealing strips.
Fig. 5 shows the overall plan of the present invention, as shown in figure 5, image of the lock icon for zip form, user is at end The movement locus of the lock icon should be filled in the form of slide fastener image while being input into the second touch operation on end, And the icon corresponding to the application program for needing locking is separated into two parts icon, and wherein, the width of the slide fastener image Width of the degree less than the icon corresponding to the application program.
It is understood that when the second touch operation of user input is continuous sliding action, due to dragging locking Icon persistently slides in current interface, therefore during the second touch operation lock icon movement locus can successively every Break and fill the icon corresponding to the application program for needing to lock on multiple current operation interfaces.At the dragging lock icon When screen edge locations, carry out corresponding page turning, so using page turning after interface as new current interface, for user after Continue the lock icon is persistently dragged in new current interface and carry out the locking of application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden Private.
Fig. 2 is referred to, Fig. 2 is a kind of exemplary flow of the method for locking applications that another embodiment of the present invention is provided Figure.It is terminal by the executive agent of anti-theft recording method in the present embodiment, the terminal can be that smart mobile phone, panel computer etc. are mobile Terminal, or Intelligent worn device, such as bracelet and intelligent watch.As shown in Fig. 2 the method for locking applications include with Lower step:
S210:If there is the icon of application program on current operation interface, when detecting user in current operation circle When the predeterminable area in face executes the first touch operation, hiding lock icon is recalled.
In step S210, current operation interface is the desktop of terminal or the file for depositing icon boundary in opened condition Face.
It should be noted that the icon of the application program that can carry for terminal of the icon of application program, User Defined The photo scaling figure of setting, the icon of the application program that is downloaded by application market, file or function shortcut.Preset areas Domain can be the curved surface side of the peripheral blank position, the touch-screen side of terminal or terminal surface touch-screen of the icon.
For example, predeterminable area is the outline line of the gap position or single icon between two icons to outside icon Direction position.
It is understood that predeterminable area according to use habit or can like self-defined setting by user, select in user When selecting predeterminable area, can select dragging lock icon under pattern in predeterminable area carries out the selection of predeterminable area, or is working as All positions for being set to predeterminable area are selected in front operation interface as predeterminable area, wherein all predeterminable areas that are set to Position is the region that icon is not blocked.User after predeterminable area is selected and determines predeterminable area under pattern, when exiting preset areas When pattern is selected in domain, lock icon is hidden automatically.
In the present embodiment, the first touch operation is user touch behaviour by finger or articulations digitorum manus on a terminal screen Make, first touch operation can be click, double-click, multi-hit, long by or slidably reciprocating in the Preset Time.
It is understood that lock icon can be including multiple, as the first touch operation is used for transferring hiding lock Determine icon, corresponding first touch operation can also include multiple, each touch operation is corresponding with each lock icon, Or the one kind in multiple lock icons is transferred in same touch operation at random.
S220:The lock icon is dragged according to the second touch operation of user input, the motion of the lock icon is made Track separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock the application Program.
In step S220, the second touch operation can be slide of the user on terminal touch screen curtain, for example, Horizontal direction on terminal touch screen curtain along icon is slided or the vertical direction along icon on terminal touch screen curtain slides.
Step S220 is specifically included:The lock icon is dragged according to the second touch operation of user input, the lock is made The movement locus for determining icon needs the icon corresponding to the application program of locking on the current operation interface;To locking figure Target movement locus is filled, and the icon corresponding to the application program for needing locking is separated into two parts icon; Calculate the original pixel value and two parts icon of icon corresponding to the application program pixel and, and to described original Pixel value is compared with the pixel sum of two parts icon;Determine whether to lock the application journey according to comparative result Sequence.
It should be noted that the original pixel value of the icon corresponding to application program is equal to lock icon through described current Need during the icon corresponding to the application program for locking, to fill the area of the icon pixel and two parts icon in operation interface Pixel sum.
It is understood that when user drags the track of lock icon generation through icon, then the icon is corresponding should It is the application program for needing locking with program, i.e., the track that user's dragging lock icon is generated is used for description to needing locking to answer Selection with program.
In the present embodiment, the locking figure that lock icon can be voluntarily selected according to hobby from default picture library for user Mark, lock icon can be the image of the image of zip form or sealing strips.
So that lock icon is for the image of zip form as an example, should be with while user is input into the second touch operation in terminal The form of slide fastener image is filled to the movement locus of the lock icon, and will be right for the application program institute for needing locking The icon that answers separates into two parts icon, and wherein, the width of the slide fastener image is less than the icon corresponding to the application program Width.
S230:The lock icon is returned to initial position by the 3rd touch operation according to user input, to unlock quilt The application program of locking.
In step S230, the 3rd touch operation can be the inverse of the partial traces section of the movement locus for dragging lock icon To operation, or the contrary operation for the second touch operation.
For example, the movement locus for dragging lock icon have passed through two icons, and corresponding part orbit segment is two icons In the locked icon of any one icon the path that covers of movement locus.
Again for example, the second touch operation is that finger slides into the right side of screen from the left side of screen to user on a terminal screen Side, corresponding 3rd touch operation are that finger slides into the left side of screen from the right of screen to user on a terminal screen.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden Private.
The lock icon is returned to by initial position by the 3rd touch operation of user input, locked to unlock Application program, it is achieved that the quick lock in and quick release to application program.
Refer to Fig. 3, Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention, terminal in the present embodiment 100 each units for including are used for executing each step in the corresponding embodiments of Fig. 1, specifically refer to the corresponding realities of Fig. 1 and Fig. 1 The associated description in example is applied, is not repeated herein.Specifically:
Terminal 100 includes:Transfer unit 10 and lock cell 20.Used as one embodiment of the invention, lock cell 20 can be with Including the first performance element 21, the second performance element 22, computing unit 23 and judging unit 24.Specifically:
Unit 10 is transferred, if for the icon that there is application program on current operation interface, when detecting user described When the predeterminable area at current operation interface executes the first touch operation, hiding lock icon is recalled.
Such as, if transferring unit 10 for the icon that there is application program on current operation interface, exist when user is detected When the predeterminable area at the current operation interface executes the first touch operation, hiding lock icon is recalled.
Lock cell 20, drags the lock icon for the second touch operation according to user input, makes the locking The movement locus of icon separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock The fixed application program.
Such as, lock cell 20 drags the lock icon according to the second touch operation of user input, makes the locking The movement locus of icon separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock The fixed application program.
Further, lock cell 20 can include the first performance element 21, the second performance element 22, computing unit 23 with And judging unit 24.Specifically:
First performance element 21, drags the lock icon for the second touch operation according to user input, makes described The movement locus of lock icon needs the icon corresponding to the application program of locking on the current operation interface.
Second performance element 22, for being filled to the movement locus of lock icon, needs answering for locking by described Separate into two parts icon with the icon corresponding to program.
Computing unit 23, for calculating the original pixel value and two parts figure of the icon corresponding to the application program Target pixel and, and the pixel sum to the original pixel value with two parts icon is compared.
Judging unit 24, for determining whether to lock the application program according to comparative result.
Such as, the first performance element 21, drags the lock icon for the second touch operation according to user input, makes The movement locus of the lock icon needs the icon corresponding to the application program of locking on the current operation interface;The Two performance elements 22, for being filled to the movement locus of lock icon, will be right for the application program institute for needing locking The icon that answers separates into two parts icon;Computing unit 23, for calculating the original image of the icon corresponding to the application program The pixel of element value and two parts icon and, and the pixel sum to the original pixel value with two parts icon carries out Relatively;Judging unit 24, for determining whether to lock the application program according to comparative result.
Further, judging unit 24 is specifically for if the original pixel value is more than the pixel of two parts icon Sum, then lock the application program, otherwise, does not lock the application program.
Such as, judging unit 24 specifically for, if the original pixel value more than two parts icon pixel sum, The application program is then locked, otherwise, the application program is not locked.
Further, image of the lock icon for zip form, the second performance element 22 is specifically for slide fastener figure The form of picture is filled to the movement locus of the lock icon, by the figure corresponding to the application program for needing locking Mark separates into two parts icon, and the width of wherein described slide fastener image is less than the width of the icon corresponding to the application program.
Such as, image of the lock icon for zip form, the second performance element 22 is specifically for slide fastener image Form is filled to the movement locus of the lock icon, by described need locking application program corresponding to icon every Two parts icon is broken into, the width of wherein described slide fastener image is less than the width of the icon corresponding to the application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden Private.
Fig. 4 is referred to, Fig. 4 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided, in the present embodiment The each unit that terminal 200 includes is used for executing each step in the corresponding embodiments of Fig. 2, specifically refers to Fig. 2 and Fig. 2 corresponding Embodiment in associated description, do not repeat herein.Specifically:
Terminal 200 includes:Transfer unit 110, lock cell 120 and unlocking unit 130.Implement as the present invention one Example, lock cell 120 can include the first performance element 121, the second performance element 122, computing unit 123 and judging unit 124.Specifically:
Unit 110 is transferred, if for the icon that there is application program on current operation interface, when detecting user described When the predeterminable area at current operation interface executes the first touch operation, hiding lock icon is recalled.
Such as, if transferring unit 110 for the icon that there is application program on current operation interface, exist when user is detected When the predeterminable area at the current operation interface executes the first touch operation, hiding lock icon is recalled.
Lock cell 120, drags the lock icon for the second touch operation according to user input, makes the locking The movement locus of icon separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock The fixed application program.
Such as, lock cell 120 drags the lock icon according to the second touch operation of user input, makes the locking The movement locus of icon separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock The fixed application program.
Further, lock cell 120 can include the first performance element 121, the second performance element 122, computing unit 123 and judging unit 124.Specifically:
First performance element 121, drags the lock icon for the second touch operation according to user input, makes described The movement locus of lock icon needs the icon corresponding to the application program of locking on the current operation interface.
Second performance element 122, for being filled to the movement locus of lock icon, needs answering for locking by described Separate into two parts icon with the icon corresponding to program.
Computing unit 123, for calculating the original pixel value and described two parts of the icon corresponding to the application program The pixel of icon and, and the pixel sum to the original pixel value with two parts icon is compared.
Judging unit 124, for determining whether to lock the application program according to comparative result.
Such as, the first performance element 121, drags the lock icon for the second touch operation according to user input, The movement locus of the lock icon is made to need the icon corresponding to the application program of locking on the current operation interface; Second performance element 122, for being filled to the movement locus of lock icon, by the application program institute for needing locking Corresponding icon separates into two parts icon;Computing unit 123, for calculating the original of the icon corresponding to the application program The pixel of pixel value and two parts icon and, and the pixel sum to the original pixel value with two parts icon enters Row compares;Judging unit 124, for determining whether to lock the application program according to comparative result.
Further, judging unit 124 is specifically for if the original pixel value is more than the pixel of two parts icon Sum, then lock the application program, otherwise, does not lock the application program.
Such as, judging unit 124 specifically for, if the original pixel value more than two parts icon pixel it With then lock the application program, otherwise, do not lock the application program.
Further, image of the lock icon for zip form, the second performance element 122 is specifically for slide fastener The form of image is filled to the movement locus of the lock icon, by corresponding to the application program for needing locking Icon separates into two parts icon, and the width of wherein described slide fastener image is less than the width of the icon corresponding to the application program Degree.
Such as, image of the lock icon for zip form, the second performance element 122 is specifically for slide fastener image Form the movement locus of the lock icon is filled, by described need locking application program corresponding to icon Separate into two parts icon, the width of wherein described slide fastener image is less than the width of the icon corresponding to the application program.
The lock icon is returned to initial bit for the 3rd touch operation according to user input by unlocking unit 130 Put, to unlock locked application program.
Such as, the lock icon is returned to initial bit according to the 3rd touch operation of user input by unlocking unit 130 Put, to unlock locked application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden Private.
The lock icon is returned to by initial position by the 3rd touch operation of user input, locked to unlock Application program, it is achieved that the quick lock in and quick release to application program.
Referring to Fig. 6, Fig. 6 is a kind of terminal schematic block diagram that another embodiment of the present invention is provided.This enforcement as shown in Figure 6 Terminal 400 in example can include:One or more processors 401;One or more input equipments 402, one or more defeated Go out equipment 403 and memory 404.Above-mentioned processor 401, input equipment 402, output equipment 403 and memory 404 are by communication Bus 405 completes mutual communication.
Memory 404 is instructed for storage program.
If processor 401 is used on current operation interface the icon that there is application program, work as described when user is detected When the predeterminable area of front operation interface executes the first touch operation, hiding lock icon is recalled.
Processor 401 is used for dragging the lock icon according to the second touch operation of user input, makes the locking figure Target movement locus separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock The application program.
Processor 401 is additionally operable to, according to the 3rd touch operation of user input, the lock icon is returned to initial bit Put, to unlock locked application program.
Wherein, file interface in opened condition of the current operation interface for the desktop or storage icon of terminal, the lock Determine the image that icon is zip form.
Further, processor 401 is used for dragging the lock icon according to the second touch operation of user input, makes institute The movement locus for stating lock icon needs the icon corresponding to the application program of locking on the current operation interface;To lock The movement locus for determining icon is filled, and the icon corresponding to the application program for needing locking is separated into two parts figure Mark;Calculate the original pixel value and two parts icon of icon corresponding to the application program pixel and, and to described Original pixel value is compared with the pixel sum of two parts icon;Determine whether to lock the application according to comparative result Program.
Further, if processor 401 specifically for the original pixel value more than two parts icon pixel it With then lock the application program, otherwise, do not lock the application program.
Further, processor 401 is specifically for being entered to the movement locus of the lock icon in the form of slide fastener image Icon corresponding to the application program for needing locking is separated into two parts icon, wherein described slide fastener figure by row filling Width of the width of picture less than the icon corresponding to the application program.
Further, processor 401 is additionally operable to retract the lock icon according to the 3rd touch operation of user input To initial position, to unlock locked application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden Private.
It should be appreciated that in embodiments of the present invention, alleged processor 401 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), special IC (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device can also be any conventional processor etc..
Input equipment 402 can include that Trackpad, fingerprint adopt sensor (for gathering the finger print information and fingerprint of user Directional information), camera, microphone etc., output equipment 403 can include display (LCD etc.), loudspeaker etc..
The memory 404 can include read-only storage and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited The information of storage device type.
In implementing, processor 401, input equipment 402 described in the embodiment of the present invention, output equipment 403 can Execute the reality described in the first embodiment and second embodiment of the backup method of communications records provided in an embodiment of the present invention Existing mode, also can perform the implementation of the terminal described by the embodiment of the present invention, will not be described here.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Unit and algorithm steps, can with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware With the interchangeability of software, composition and the step of each example is generally described in the above description according to function.This A little functions are executed with hardware or software mode actually, the application-specific and design constraint depending on technical scheme.Specially Industry technical staff can use different methods to realize described function to each specific application, but this realization is not It is considered as beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, which can be passed through Its mode is realized.For example, device embodiment described above is only schematically, for example division of the unit, only Only a kind of division of logic function, can have other dividing mode, for example multiple units or component tie when actually realizing Close or be desirably integrated into another system, or some features can be ignored, or do not execute.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection, or electricity, machinery or other forms connections.
Step in present invention method can carry out order adjustment according to actual needs, merge and delete.
Unit in embodiment of the present invention terminal can be merged according to actual needs, divides and be deleted.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, or two or more units are integrated in a unit.Above-mentioned integrated Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized and as independent production marketing or use using in the form of SFU software functional unit When, can be stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially The part that in other words prior art is contributed, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, use so that a computer including some instructions Equipment (can be personal computer, server, or network equipment etc.) executes the complete of each embodiment methods described of the invention Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or replacement should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right The protection domain of requirement is defined.

Claims (10)

1. a kind of method of locking applications, it is characterised in that methods described includes:
If there is the icon of application program on current operation interface, when detecting preset areas of the user at the current operation interface When domain executes the first touch operation, hiding lock icon is recalled;
The lock icon is dragged according to the second touch operation of user input, the movement locus of the lock icon is separated simultaneously The icon corresponding to the application program for needing to lock on the current operation interface is filled, to lock the application program.
2. the method for locking applications according to claim 1, it is characterised in that described according to the second of user input Touch operation drags the lock icon, the movement locus of the lock icon is separated and is filled on the current operation interface The icon corresponding to the application program of locking is needed, to lock the application program, including:
The lock icon is dragged according to the second touch operation of user input, the movement locus of the lock icon is made through institute State the icon corresponding to the application program for needing to lock on current operation interface;
The movement locus of lock icon is filled, the icon corresponding to the application program for needing locking is separated into Two parts icon;
Calculate the original pixel value and two parts icon of icon corresponding to the application program pixel and, and to described Original pixel value is compared with the pixel sum of two parts icon;
Determine whether to lock the application program according to comparative result.
3. the method for locking applications according to claim 2, it is characterised in that described determined according to comparative result be The no locking application program, including:
If the original pixel value locks the application program, otherwise, does not lock more than the pixel sum of two parts icon The fixed application program.
4. the method for locking applications according to claim 2, it is characterised in that the lock icon is zip form Image, the movement locus to lock icon is filled, by the figure corresponding to the application program for needing locking Mark separates into two parts icon, including:
The movement locus of the lock icon is filled in the form of slide fastener image, by the application journey for needing locking Icon corresponding to sequence separates into two parts icon, and the width of wherein described slide fastener image is less than corresponding to the application program The width of icon.
5. the method for the locking applications according to any one of Claims 1-4, it is characterised in that described according to user Second touch operation of input drags the lock icon, the movement locus of the lock icon is separated and is filled described current The icon corresponding to the application program of locking is needed in operation interface, also to include after locking the application program:
The lock icon is returned to initial position by the 3rd touch operation according to user input, to unlock locked application Program.
6. a kind of terminal, it is characterised in that the terminal includes:
Unit is transferred, if for the icon that there is application program on current operation interface, when detecting user in the current behaviour Make interface predeterminable area execute the first touch operation when, recall hiding lock icon;
Lock cell, drags the lock icon for the second touch operation according to user input, makes the lock icon Movement locus separates and fills the icon corresponding to the application program for needing locking on the current operation interface, described to lock Application program.
7. terminal according to claim 6, it is characterised in that the lock cell includes:
First performance element, drags the lock icon for the second touch operation according to user input, makes the locking figure Target movement locus needs the icon corresponding to the application program of locking on the current operation interface;
Second performance element, for being filled to the movement locus of lock icon, by the application program for needing locking Corresponding icon separates into two parts icon;
Computing unit, for calculating the picture of the original pixel value and two parts icon of the icon corresponding to the application program Element and, and the pixel sum to the original pixel value with two parts icon is compared;
Judging unit, for determining whether to lock the application program according to comparative result.
8. terminal according to claim 7, it is characterised in that the judging unit is specifically for if the original pixels Value then locks the application program, otherwise, does not lock the application program more than the pixel sum of two parts icon.
9. terminal according to claim 7, it is characterised in that image of the lock icon for zip form, described the Two performance elements specifically for, the movement locus of the lock icon is filled in the form of slide fastener image, will be described The icon corresponding to the application program of locking is needed to separate into two parts icon, the width of wherein described slide fastener image is less than described The width of the icon corresponding to application program.
10. the terminal according to any one of claim 6 to 9, it is characterised in that the terminal also includes:
The lock icon is returned to initial position for the 3rd touch operation according to user input by unlocking unit, to solve The locked application program of lock.
CN201610930716.0A 2016-10-31 2016-10-31 A kind of method of locking applications and terminal Pending CN106502502A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610930716.0A CN106502502A (en) 2016-10-31 2016-10-31 A kind of method of locking applications and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610930716.0A CN106502502A (en) 2016-10-31 2016-10-31 A kind of method of locking applications and terminal

Publications (1)

Publication Number Publication Date
CN106502502A true CN106502502A (en) 2017-03-15

Family

ID=58318733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610930716.0A Pending CN106502502A (en) 2016-10-31 2016-10-31 A kind of method of locking applications and terminal

Country Status (1)

Country Link
CN (1) CN106502502A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107896280A (en) * 2017-11-16 2018-04-10 珠海市魅族科技有限公司 Control method and device, the terminal and readable storage medium storing program for executing of a kind of application program
CN109358782A (en) * 2018-09-11 2019-02-19 北京达佳互联信息技术有限公司 Execution method, apparatus, electronic equipment and the storage medium of dynamic instruction
CN109725791A (en) * 2018-12-29 2019-05-07 惠州Tcl移动通信有限公司 A kind of processing method, mobile terminal and the storage medium of polishing desktop icons
CN112684952A (en) * 2020-12-18 2021-04-20 网易(杭州)网络有限公司 Video playing control method and device and electronic equipment

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030225758A1 (en) * 2002-05-16 2003-12-04 Makoto Yamasaki Method of managing casual storage field
CN101943993A (en) * 2010-08-26 2011-01-12 深圳桑菲消费通信有限公司 Method for unlocking and locking mobile terminal touch screen
US20110105193A1 (en) * 2009-10-30 2011-05-05 Samsung Electronics Co., Ltd. Mobile device supporting touch semi-lock state and method for operating the same
CN102541429A (en) * 2010-12-08 2012-07-04 Lg电子株式会社 Mobile terminal and controlling method thereof
CN102830907A (en) * 2012-07-13 2012-12-19 中兴通讯股份有限公司 Touch screen mobile terminal and method of mobile terminal for setting icon
CN102915205A (en) * 2012-11-14 2013-02-06 华为终端有限公司 Method for unlocking touch screen terminal and touch screen terminal
CN102981754A (en) * 2008-07-07 2013-03-20 Lg电子株式会社 Mobile terminal and operation control method thereof
US8707175B2 (en) * 2009-04-16 2014-04-22 Lg Electronics Inc. Mobile terminal and control method thereof
CN104020850A (en) * 2006-01-30 2014-09-03 苹果公司 Gesturing with a multipoint sensing device
CN104217151A (en) * 2014-09-11 2014-12-17 三星电子(中国)研发中心 Locking method for application of intelligent terminal and intelligent terminal
CN104503660A (en) * 2014-12-18 2015-04-08 厦门美图移动科技有限公司 Icon arranging method, device and mobile terminal
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030225758A1 (en) * 2002-05-16 2003-12-04 Makoto Yamasaki Method of managing casual storage field
CN104020850A (en) * 2006-01-30 2014-09-03 苹果公司 Gesturing with a multipoint sensing device
CN102981754A (en) * 2008-07-07 2013-03-20 Lg电子株式会社 Mobile terminal and operation control method thereof
US8707175B2 (en) * 2009-04-16 2014-04-22 Lg Electronics Inc. Mobile terminal and control method thereof
US20110105193A1 (en) * 2009-10-30 2011-05-05 Samsung Electronics Co., Ltd. Mobile device supporting touch semi-lock state and method for operating the same
CN101943993A (en) * 2010-08-26 2011-01-12 深圳桑菲消费通信有限公司 Method for unlocking and locking mobile terminal touch screen
CN102541429A (en) * 2010-12-08 2012-07-04 Lg电子株式会社 Mobile terminal and controlling method thereof
CN102830907A (en) * 2012-07-13 2012-12-19 中兴通讯股份有限公司 Touch screen mobile terminal and method of mobile terminal for setting icon
CN102915205A (en) * 2012-11-14 2013-02-06 华为终端有限公司 Method for unlocking touch screen terminal and touch screen terminal
CN104217151A (en) * 2014-09-11 2014-12-17 三星电子(中国)研发中心 Locking method for application of intelligent terminal and intelligent terminal
CN104503660A (en) * 2014-12-18 2015-04-08 厦门美图移动科技有限公司 Icon arranging method, device and mobile terminal
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
梁玉萍等: "《移动UI界面App设计Photoshop从新手到高手》", 30 November 2016 *
黄可臻等: "基于Android的隐私数据安全保护系统", 《信息网络安全》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107896280A (en) * 2017-11-16 2018-04-10 珠海市魅族科技有限公司 Control method and device, the terminal and readable storage medium storing program for executing of a kind of application program
CN107896280B (en) * 2017-11-16 2019-01-25 珠海市魅族科技有限公司 A kind of control method and device, terminal and readable storage medium storing program for executing of application program
CN109358782A (en) * 2018-09-11 2019-02-19 北京达佳互联信息技术有限公司 Execution method, apparatus, electronic equipment and the storage medium of dynamic instruction
CN109725791A (en) * 2018-12-29 2019-05-07 惠州Tcl移动通信有限公司 A kind of processing method, mobile terminal and the storage medium of polishing desktop icons
CN112684952A (en) * 2020-12-18 2021-04-20 网易(杭州)网络有限公司 Video playing control method and device and electronic equipment
CN112684952B (en) * 2020-12-18 2022-06-14 网易(杭州)网络有限公司 Video playing control method and device and electronic equipment

Similar Documents

Publication Publication Date Title
US20230409165A1 (en) User interfaces for widgets
US11842044B2 (en) Keyboard management user interfaces
AU2020259249B2 (en) Systems, methods, and user interfaces for interacting with multiple application windows
US20230282146A1 (en) Dynamic user interface with time indicator
US11921998B2 (en) Editing features of an avatar
US20190258373A1 (en) Scrollable set of content items with locking feature
EP2635954B1 (en) Notification group touch gesture dismissal techniques
US10775971B2 (en) Pinch gestures in a tile-based user interface
CN102037435B (en) Navigating among activities in a computing device
JP7076000B2 (en) Faster scrolling and selection
CN108121485A (en) A kind of icon method for sorting, terminal and computer readable storage medium
CN106502502A (en) A kind of method of locking applications and terminal
JPH07281864A (en) Method and equipment for facilitation of selection of icon
US11829591B2 (en) User interface for managing input techniques
CN107181858A (en) A kind of method and terminal for showing notification message
US11943559B2 (en) User interfaces for providing live video
AU2020223752B2 (en) Accelerated scrolling and selection
US12019863B2 (en) Techniques for selecting text
CN106775894A (en) The operation method and terminal of a kind of application program
CN106227626A (en) The backup method of a kind of communications records and terminal
US20240323313A1 (en) User interfaces for providing live video

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20210101

AD01 Patent right deemed abandoned