CN106502502A - A kind of method of locking applications and terminal - Google Patents
A kind of method of locking applications and terminal Download PDFInfo
- Publication number
- CN106502502A CN106502502A CN201610930716.0A CN201610930716A CN106502502A CN 106502502 A CN106502502 A CN 106502502A CN 201610930716 A CN201610930716 A CN 201610930716A CN 106502502 A CN106502502 A CN 106502502A
- Authority
- CN
- China
- Prior art keywords
- icon
- lock
- application program
- locking
- touch operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Automation & Control Theory (AREA)
- Human Computer Interaction (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a kind of method of locking applications and terminal, wherein, methods described includes:If there is the icon of application program on current operation interface, when predeterminable area execution first touch operation of the user at the current operation interface is detected, hiding lock icon is recalled;The lock icon is dragged according to the second touch operation of user input, the movement locus of the lock icon is separated and is filled the icon corresponding to the application program that locking is needed on the current operation interface, to lock the application program.Embodiment of the present invention terminal recalls hiding lock icon by detecting user when the predeterminable area at current operation interface executes the first touch operation;And lock icon is dragged according to the second touch operation of user input so as to movement locus separates and fills the icon corresponding to application program, and then locking applications, facilitates user to select and locking applications, and then protects privacy of user.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of method of locking applications and terminal.
Background technology
Nowadays the popularity more and more higher of intelligent terminal, people nearly all be unable to do without intelligence eventually in life or work
End.Due to the specificity of intelligent terminal, people leave corresponding vestige in meeting during use, for example, photograph in photograph album
Chat record and message registration in piece, social networking application etc..Although in prior art be by arrange applied cryptography realize right
The locking of application program, but, the program also needs to be set in the application, and simultaneously not all application program is all carried
Lock function.
Content of the invention
The embodiment of the present invention provides a kind of method of locking applications and terminal, facilitates user to select and lock application journey
Sequence, to protect privacy of user.
In a first aspect, embodiments providing a kind of method of locking applications, methods described includes:
If there is the icon of application program on current operation interface, when detecting user in the pre- of the current operation interface
If region executes the first touch operation, hiding lock icon is recalled;
The lock icon is dragged according to the second touch operation of user input, make the movement locus of the lock icon every
Break and fill the icon corresponding to the application program for needing to lock on the current operation interface, to lock the application program.
On the other hand, a kind of terminal is embodiments provided, and the terminal includes:
Unit is transferred, if for the icon that there is application program on current operation interface, working as described when user is detected
When the predeterminable area of front operation interface executes the first touch operation, hiding lock icon is recalled;
Lock cell, drags the lock icon for the second touch operation according to user input, makes the locking figure
Target movement locus separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock
The application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current
When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input
Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface
With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden
Private.
Description of the drawings
In order to be illustrated more clearly that embodiment of the present invention technical scheme, embodiment will be described below needed for be used
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for this area general
For logical technical staff, on the premise of not paying creative work, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is a kind of schematic flow diagram of the method for locking applications provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of the method for locking applications that another embodiment of the present invention is provided;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided;
Fig. 5 is overall plan schematic diagram of the present invention;
Fig. 6 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided.
Specific embodiment
Accompanying drawing in below in conjunction with the embodiment of the present invention, to the embodiment of the present invention in technical scheme carry out clear, complete
Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.It is based on this
Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art
Example, belongs to the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " including " and "comprising" are indicated
The presence of described feature, entirety, step, operation, element and/or component, but it is not precluded from one or more of the other feature, whole
The presence or interpolation of body, step, operation, element, component and/or its set.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, and otherwise " one " of singulative, " one " and " being somebody's turn to do " is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is
Refer to the one or more any combinations in the associated item that lists and be possible to combine, and combine including these.
As in this specification and in the appended claims as use, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
Fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In implementing, the terminal described in the embodiment of the present invention including but not limited to such as has touch sensitive surface
Other of the mobile phone of (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc are just
Portable device.It is to be further understood that in certain embodiments, the equipment not portable communication device, but have and touch
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal for including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, for example following in one or more:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be executed in terminal can be public using at least one of such as touch sensitive surface
Physical user-interface device.Can adjust among applications and/or in corresponding application programs and/or change and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal (for example, is touched
Sensing surface) the various application programs that can support with user interface directly perceived and transparent for a user.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow diagram of the method for locking applications provided in an embodiment of the present invention.
The executive agent for being locked the method for application program in the present embodiment is terminal, and the terminal can be smart mobile phone, panel computer
Deng mobile terminal, or Intelligent worn device, such as bracelet and intelligent watch.As shown in figure 1, the method for locking applications
Comprise the following steps:
S110:If there is the icon of application program on current operation interface, when detecting user in current operation circle
When the predeterminable area in face executes the first touch operation, hiding lock icon is recalled.
In step s 110, file boundary in opened condition of the current operation interface for the desktop or storage icon of terminal
Face.
It should be noted that the icon of the application program that can carry for terminal of the icon of application program, User Defined
The photo scaling figure of setting, the icon of the application program that is downloaded by application market, file or function shortcut.Preset areas
Domain can be the curved surface side of the peripheral blank position, the touch-screen side of terminal or terminal surface touch-screen of the icon.
For example, predeterminable area is the outline line of the gap position or single icon between two icons to outside icon
Direction position.
It is understood that predeterminable area according to use habit or can like self-defined setting by user, select in user
When selecting predeterminable area, can select dragging lock icon under pattern in predeterminable area carries out the selection of predeterminable area, or is working as
All positions for being set to predeterminable area are selected in front operation interface as predeterminable area, wherein all predeterminable areas that are set to
Position is the region that icon is not blocked.User after predeterminable area is selected and determines predeterminable area under pattern, when exiting preset areas
When pattern is selected in domain, lock icon is hidden automatically.
In the present embodiment, the first touch operation is user touch behaviour by finger or articulations digitorum manus on a terminal screen
Make, first touch operation can be click, double-click, multi-hit, long by or slidably reciprocating in the Preset Time.
It is understood that lock icon can be including multiple, as the first touch operation is used for transferring hiding lock
Determine icon, corresponding first touch operation can also include multiple, each touch operation is corresponding with each lock icon,
Or the one kind in multiple lock icons is transferred in same touch operation at random.
S120:The lock icon is dragged according to the second touch operation of user input, the motion of the lock icon is made
Track separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock the application
Program.
In the step s 120, the second touch operation can be slide of the user on terminal touch screen curtain, for example,
Horizontal direction on terminal touch screen curtain along icon is slided or the vertical direction along icon on terminal touch screen curtain slides.
Step S120 is specifically included:The lock icon is dragged according to the second touch operation of user input, the lock is made
The movement locus for determining icon needs the icon corresponding to the application program of locking on the current operation interface;To locking figure
Target movement locus is filled, and the icon corresponding to the application program for needing locking is separated into two parts icon;
Calculate the original pixel value and two parts icon of icon corresponding to the application program pixel and, and to described original
Pixel value is compared with the pixel sum of two parts icon;Determine whether to lock the application journey according to comparative result
Sequence.
So that second touches the slide that behaviour is user on terminal touch screen curtain as an example, the track of slide and dragging
The movement locus of lock icon coincides.User is filled out to the movement locus of lock icon while lock icon is dragged
Fill, when the icon corresponding to the movement locus of lock icon needs the application program that locks on the current operation interface, by
In filling effect so that the icon corresponding to the application program for needing locking is separated into two parts icon by movement locus, lead to
The original pixel value and the pixel sum of two parts icon for calculating the icon corresponding to application program is crossed, and compares original pixel value
The pixel sum of two parts icon whether is equal to, locking applications are determined whether according to comparative result.
It is understood that the locking figure that lock icon can be voluntarily selected according to hobby from default picture library for user
Mark, lock icon can be the image of the image of zip form or sealing strips.
Fig. 5 shows the overall plan of the present invention, as shown in figure 5, image of the lock icon for zip form, user is at end
The movement locus of the lock icon should be filled in the form of slide fastener image while being input into the second touch operation on end,
And the icon corresponding to the application program for needing locking is separated into two parts icon, and wherein, the width of the slide fastener image
Width of the degree less than the icon corresponding to the application program.
It is understood that when the second touch operation of user input is continuous sliding action, due to dragging locking
Icon persistently slides in current interface, therefore during the second touch operation lock icon movement locus can successively every
Break and fill the icon corresponding to the application program for needing to lock on multiple current operation interfaces.At the dragging lock icon
When screen edge locations, carry out corresponding page turning, so using page turning after interface as new current interface, for user after
Continue the lock icon is persistently dragged in new current interface and carry out the locking of application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current
When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input
Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface
With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden
Private.
Fig. 2 is referred to, Fig. 2 is a kind of exemplary flow of the method for locking applications that another embodiment of the present invention is provided
Figure.It is terminal by the executive agent of anti-theft recording method in the present embodiment, the terminal can be that smart mobile phone, panel computer etc. are mobile
Terminal, or Intelligent worn device, such as bracelet and intelligent watch.As shown in Fig. 2 the method for locking applications include with
Lower step:
S210:If there is the icon of application program on current operation interface, when detecting user in current operation circle
When the predeterminable area in face executes the first touch operation, hiding lock icon is recalled.
In step S210, current operation interface is the desktop of terminal or the file for depositing icon boundary in opened condition
Face.
It should be noted that the icon of the application program that can carry for terminal of the icon of application program, User Defined
The photo scaling figure of setting, the icon of the application program that is downloaded by application market, file or function shortcut.Preset areas
Domain can be the curved surface side of the peripheral blank position, the touch-screen side of terminal or terminal surface touch-screen of the icon.
For example, predeterminable area is the outline line of the gap position or single icon between two icons to outside icon
Direction position.
It is understood that predeterminable area according to use habit or can like self-defined setting by user, select in user
When selecting predeterminable area, can select dragging lock icon under pattern in predeterminable area carries out the selection of predeterminable area, or is working as
All positions for being set to predeterminable area are selected in front operation interface as predeterminable area, wherein all predeterminable areas that are set to
Position is the region that icon is not blocked.User after predeterminable area is selected and determines predeterminable area under pattern, when exiting preset areas
When pattern is selected in domain, lock icon is hidden automatically.
In the present embodiment, the first touch operation is user touch behaviour by finger or articulations digitorum manus on a terminal screen
Make, first touch operation can be click, double-click, multi-hit, long by or slidably reciprocating in the Preset Time.
It is understood that lock icon can be including multiple, as the first touch operation is used for transferring hiding lock
Determine icon, corresponding first touch operation can also include multiple, each touch operation is corresponding with each lock icon,
Or the one kind in multiple lock icons is transferred in same touch operation at random.
S220:The lock icon is dragged according to the second touch operation of user input, the motion of the lock icon is made
Track separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock the application
Program.
In step S220, the second touch operation can be slide of the user on terminal touch screen curtain, for example,
Horizontal direction on terminal touch screen curtain along icon is slided or the vertical direction along icon on terminal touch screen curtain slides.
Step S220 is specifically included:The lock icon is dragged according to the second touch operation of user input, the lock is made
The movement locus for determining icon needs the icon corresponding to the application program of locking on the current operation interface;To locking figure
Target movement locus is filled, and the icon corresponding to the application program for needing locking is separated into two parts icon;
Calculate the original pixel value and two parts icon of icon corresponding to the application program pixel and, and to described original
Pixel value is compared with the pixel sum of two parts icon;Determine whether to lock the application journey according to comparative result
Sequence.
It should be noted that the original pixel value of the icon corresponding to application program is equal to lock icon through described current
Need during the icon corresponding to the application program for locking, to fill the area of the icon pixel and two parts icon in operation interface
Pixel sum.
It is understood that when user drags the track of lock icon generation through icon, then the icon is corresponding should
It is the application program for needing locking with program, i.e., the track that user's dragging lock icon is generated is used for description to needing locking to answer
Selection with program.
In the present embodiment, the locking figure that lock icon can be voluntarily selected according to hobby from default picture library for user
Mark, lock icon can be the image of the image of zip form or sealing strips.
So that lock icon is for the image of zip form as an example, should be with while user is input into the second touch operation in terminal
The form of slide fastener image is filled to the movement locus of the lock icon, and will be right for the application program institute for needing locking
The icon that answers separates into two parts icon, and wherein, the width of the slide fastener image is less than the icon corresponding to the application program
Width.
S230:The lock icon is returned to initial position by the 3rd touch operation according to user input, to unlock quilt
The application program of locking.
In step S230, the 3rd touch operation can be the inverse of the partial traces section of the movement locus for dragging lock icon
To operation, or the contrary operation for the second touch operation.
For example, the movement locus for dragging lock icon have passed through two icons, and corresponding part orbit segment is two icons
In the locked icon of any one icon the path that covers of movement locus.
Again for example, the second touch operation is that finger slides into the right side of screen from the left side of screen to user on a terminal screen
Side, corresponding 3rd touch operation are that finger slides into the left side of screen from the right of screen to user on a terminal screen.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current
When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input
Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface
With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden
Private.
The lock icon is returned to by initial position by the 3rd touch operation of user input, locked to unlock
Application program, it is achieved that the quick lock in and quick release to application program.
Refer to Fig. 3, Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention, terminal in the present embodiment
100 each units for including are used for executing each step in the corresponding embodiments of Fig. 1, specifically refer to the corresponding realities of Fig. 1 and Fig. 1
The associated description in example is applied, is not repeated herein.Specifically:
Terminal 100 includes:Transfer unit 10 and lock cell 20.Used as one embodiment of the invention, lock cell 20 can be with
Including the first performance element 21, the second performance element 22, computing unit 23 and judging unit 24.Specifically:
Unit 10 is transferred, if for the icon that there is application program on current operation interface, when detecting user described
When the predeterminable area at current operation interface executes the first touch operation, hiding lock icon is recalled.
Such as, if transferring unit 10 for the icon that there is application program on current operation interface, exist when user is detected
When the predeterminable area at the current operation interface executes the first touch operation, hiding lock icon is recalled.
Lock cell 20, drags the lock icon for the second touch operation according to user input, makes the locking
The movement locus of icon separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock
The fixed application program.
Such as, lock cell 20 drags the lock icon according to the second touch operation of user input, makes the locking
The movement locus of icon separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock
The fixed application program.
Further, lock cell 20 can include the first performance element 21, the second performance element 22, computing unit 23 with
And judging unit 24.Specifically:
First performance element 21, drags the lock icon for the second touch operation according to user input, makes described
The movement locus of lock icon needs the icon corresponding to the application program of locking on the current operation interface.
Second performance element 22, for being filled to the movement locus of lock icon, needs answering for locking by described
Separate into two parts icon with the icon corresponding to program.
Computing unit 23, for calculating the original pixel value and two parts figure of the icon corresponding to the application program
Target pixel and, and the pixel sum to the original pixel value with two parts icon is compared.
Judging unit 24, for determining whether to lock the application program according to comparative result.
Such as, the first performance element 21, drags the lock icon for the second touch operation according to user input, makes
The movement locus of the lock icon needs the icon corresponding to the application program of locking on the current operation interface;The
Two performance elements 22, for being filled to the movement locus of lock icon, will be right for the application program institute for needing locking
The icon that answers separates into two parts icon;Computing unit 23, for calculating the original image of the icon corresponding to the application program
The pixel of element value and two parts icon and, and the pixel sum to the original pixel value with two parts icon carries out
Relatively;Judging unit 24, for determining whether to lock the application program according to comparative result.
Further, judging unit 24 is specifically for if the original pixel value is more than the pixel of two parts icon
Sum, then lock the application program, otherwise, does not lock the application program.
Such as, judging unit 24 specifically for, if the original pixel value more than two parts icon pixel sum,
The application program is then locked, otherwise, the application program is not locked.
Further, image of the lock icon for zip form, the second performance element 22 is specifically for slide fastener figure
The form of picture is filled to the movement locus of the lock icon, by the figure corresponding to the application program for needing locking
Mark separates into two parts icon, and the width of wherein described slide fastener image is less than the width of the icon corresponding to the application program.
Such as, image of the lock icon for zip form, the second performance element 22 is specifically for slide fastener image
Form is filled to the movement locus of the lock icon, by described need locking application program corresponding to icon every
Two parts icon is broken into, the width of wherein described slide fastener image is less than the width of the icon corresponding to the application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current
When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input
Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface
With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden
Private.
Fig. 4 is referred to, Fig. 4 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided, in the present embodiment
The each unit that terminal 200 includes is used for executing each step in the corresponding embodiments of Fig. 2, specifically refers to Fig. 2 and Fig. 2 corresponding
Embodiment in associated description, do not repeat herein.Specifically:
Terminal 200 includes:Transfer unit 110, lock cell 120 and unlocking unit 130.Implement as the present invention one
Example, lock cell 120 can include the first performance element 121, the second performance element 122, computing unit 123 and judging unit
124.Specifically:
Unit 110 is transferred, if for the icon that there is application program on current operation interface, when detecting user described
When the predeterminable area at current operation interface executes the first touch operation, hiding lock icon is recalled.
Such as, if transferring unit 110 for the icon that there is application program on current operation interface, exist when user is detected
When the predeterminable area at the current operation interface executes the first touch operation, hiding lock icon is recalled.
Lock cell 120, drags the lock icon for the second touch operation according to user input, makes the locking
The movement locus of icon separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock
The fixed application program.
Such as, lock cell 120 drags the lock icon according to the second touch operation of user input, makes the locking
The movement locus of icon separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock
The fixed application program.
Further, lock cell 120 can include the first performance element 121, the second performance element 122, computing unit
123 and judging unit 124.Specifically:
First performance element 121, drags the lock icon for the second touch operation according to user input, makes described
The movement locus of lock icon needs the icon corresponding to the application program of locking on the current operation interface.
Second performance element 122, for being filled to the movement locus of lock icon, needs answering for locking by described
Separate into two parts icon with the icon corresponding to program.
Computing unit 123, for calculating the original pixel value and described two parts of the icon corresponding to the application program
The pixel of icon and, and the pixel sum to the original pixel value with two parts icon is compared.
Judging unit 124, for determining whether to lock the application program according to comparative result.
Such as, the first performance element 121, drags the lock icon for the second touch operation according to user input,
The movement locus of the lock icon is made to need the icon corresponding to the application program of locking on the current operation interface;
Second performance element 122, for being filled to the movement locus of lock icon, by the application program institute for needing locking
Corresponding icon separates into two parts icon;Computing unit 123, for calculating the original of the icon corresponding to the application program
The pixel of pixel value and two parts icon and, and the pixel sum to the original pixel value with two parts icon enters
Row compares;Judging unit 124, for determining whether to lock the application program according to comparative result.
Further, judging unit 124 is specifically for if the original pixel value is more than the pixel of two parts icon
Sum, then lock the application program, otherwise, does not lock the application program.
Such as, judging unit 124 specifically for, if the original pixel value more than two parts icon pixel it
With then lock the application program, otherwise, do not lock the application program.
Further, image of the lock icon for zip form, the second performance element 122 is specifically for slide fastener
The form of image is filled to the movement locus of the lock icon, by corresponding to the application program for needing locking
Icon separates into two parts icon, and the width of wherein described slide fastener image is less than the width of the icon corresponding to the application program
Degree.
Such as, image of the lock icon for zip form, the second performance element 122 is specifically for slide fastener image
Form the movement locus of the lock icon is filled, by described need locking application program corresponding to icon
Separate into two parts icon, the width of wherein described slide fastener image is less than the width of the icon corresponding to the application program.
The lock icon is returned to initial bit for the 3rd touch operation according to user input by unlocking unit 130
Put, to unlock locked application program.
Such as, the lock icon is returned to initial bit according to the 3rd touch operation of user input by unlocking unit 130
Put, to unlock locked application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current
When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input
Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface
With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden
Private.
The lock icon is returned to by initial position by the 3rd touch operation of user input, locked to unlock
Application program, it is achieved that the quick lock in and quick release to application program.
Referring to Fig. 6, Fig. 6 is a kind of terminal schematic block diagram that another embodiment of the present invention is provided.This enforcement as shown in Figure 6
Terminal 400 in example can include:One or more processors 401;One or more input equipments 402, one or more defeated
Go out equipment 403 and memory 404.Above-mentioned processor 401, input equipment 402, output equipment 403 and memory 404 are by communication
Bus 405 completes mutual communication.
Memory 404 is instructed for storage program.
If processor 401 is used on current operation interface the icon that there is application program, work as described when user is detected
When the predeterminable area of front operation interface executes the first touch operation, hiding lock icon is recalled.
Processor 401 is used for dragging the lock icon according to the second touch operation of user input, makes the locking figure
Target movement locus separates and fills the icon corresponding to the application program for needing locking on the current operation interface, to lock
The application program.
Processor 401 is additionally operable to, according to the 3rd touch operation of user input, the lock icon is returned to initial bit
Put, to unlock locked application program.
Wherein, file interface in opened condition of the current operation interface for the desktop or storage icon of terminal, the lock
Determine the image that icon is zip form.
Further, processor 401 is used for dragging the lock icon according to the second touch operation of user input, makes institute
The movement locus for stating lock icon needs the icon corresponding to the application program of locking on the current operation interface;To lock
The movement locus for determining icon is filled, and the icon corresponding to the application program for needing locking is separated into two parts figure
Mark;Calculate the original pixel value and two parts icon of icon corresponding to the application program pixel and, and to described
Original pixel value is compared with the pixel sum of two parts icon;Determine whether to lock the application according to comparative result
Program.
Further, if processor 401 specifically for the original pixel value more than two parts icon pixel it
With then lock the application program, otherwise, do not lock the application program.
Further, processor 401 is specifically for being entered to the movement locus of the lock icon in the form of slide fastener image
Icon corresponding to the application program for needing locking is separated into two parts icon, wherein described slide fastener figure by row filling
Width of the width of picture less than the icon corresponding to the application program.
Further, processor 401 is additionally operable to retract the lock icon according to the 3rd touch operation of user input
To initial position, to unlock locked application program.
Such scheme, during by the icon that there is application program on current operation interface, when detecting user current
When the predeterminable area of operation interface executes the first touch operation, hiding lock icon is recalled;And second according to user input
Touch operation drags lock icon, and the movement locus of lock icon is separated and is filled needs locked to answer on current operation interface
With the icon corresponding to program, with locking applications, facilitate user to select and locking applications, and then protect user hidden
Private.
It should be appreciated that in embodiments of the present invention, alleged processor 401 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), special IC (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device can also be any conventional processor etc..
Input equipment 402 can include that Trackpad, fingerprint adopt sensor (for gathering the finger print information and fingerprint of user
Directional information), camera, microphone etc., output equipment 403 can include display (LCD etc.), loudspeaker etc..
The memory 404 can include read-only storage and random access memory, and to processor 401 provide instruction and
Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited
The information of storage device type.
In implementing, processor 401, input equipment 402 described in the embodiment of the present invention, output equipment 403 can
Execute the reality described in the first embodiment and second embodiment of the backup method of communications records provided in an embodiment of the present invention
Existing mode, also can perform the implementation of the terminal described by the embodiment of the present invention, will not be described here.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Unit and algorithm steps, can with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware
With the interchangeability of software, composition and the step of each example is generally described in the above description according to function.This
A little functions are executed with hardware or software mode actually, the application-specific and design constraint depending on technical scheme.Specially
Industry technical staff can use different methods to realize described function to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, which can be passed through
Its mode is realized.For example, device embodiment described above is only schematically, for example division of the unit, only
Only a kind of division of logic function, can have other dividing mode, for example multiple units or component tie when actually realizing
Close or be desirably integrated into another system, or some features can be ignored, or do not execute.In addition, shown or discussed phase
Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit
Connection, or electricity, machinery or other forms connections.
Step in present invention method can carry out order adjustment according to actual needs, merge and delete.
Unit in embodiment of the present invention terminal can be merged according to actual needs, divides and be deleted.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit
The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme
Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, or two or more units are integrated in a unit.Above-mentioned integrated
Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized and as independent production marketing or use using in the form of SFU software functional unit
When, can be stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially
The part that in other words prior art is contributed, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, use so that a computer including some instructions
Equipment (can be personal computer, server, or network equipment etc.) executes the complete of each embodiment methods described of the invention
Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or replacement should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
The protection domain of requirement is defined.
Claims (10)
1. a kind of method of locking applications, it is characterised in that methods described includes:
If there is the icon of application program on current operation interface, when detecting preset areas of the user at the current operation interface
When domain executes the first touch operation, hiding lock icon is recalled;
The lock icon is dragged according to the second touch operation of user input, the movement locus of the lock icon is separated simultaneously
The icon corresponding to the application program for needing to lock on the current operation interface is filled, to lock the application program.
2. the method for locking applications according to claim 1, it is characterised in that described according to the second of user input
Touch operation drags the lock icon, the movement locus of the lock icon is separated and is filled on the current operation interface
The icon corresponding to the application program of locking is needed, to lock the application program, including:
The lock icon is dragged according to the second touch operation of user input, the movement locus of the lock icon is made through institute
State the icon corresponding to the application program for needing to lock on current operation interface;
The movement locus of lock icon is filled, the icon corresponding to the application program for needing locking is separated into
Two parts icon;
Calculate the original pixel value and two parts icon of icon corresponding to the application program pixel and, and to described
Original pixel value is compared with the pixel sum of two parts icon;
Determine whether to lock the application program according to comparative result.
3. the method for locking applications according to claim 2, it is characterised in that described determined according to comparative result be
The no locking application program, including:
If the original pixel value locks the application program, otherwise, does not lock more than the pixel sum of two parts icon
The fixed application program.
4. the method for locking applications according to claim 2, it is characterised in that the lock icon is zip form
Image, the movement locus to lock icon is filled, by the figure corresponding to the application program for needing locking
Mark separates into two parts icon, including:
The movement locus of the lock icon is filled in the form of slide fastener image, by the application journey for needing locking
Icon corresponding to sequence separates into two parts icon, and the width of wherein described slide fastener image is less than corresponding to the application program
The width of icon.
5. the method for the locking applications according to any one of Claims 1-4, it is characterised in that described according to user
Second touch operation of input drags the lock icon, the movement locus of the lock icon is separated and is filled described current
The icon corresponding to the application program of locking is needed in operation interface, also to include after locking the application program:
The lock icon is returned to initial position by the 3rd touch operation according to user input, to unlock locked application
Program.
6. a kind of terminal, it is characterised in that the terminal includes:
Unit is transferred, if for the icon that there is application program on current operation interface, when detecting user in the current behaviour
Make interface predeterminable area execute the first touch operation when, recall hiding lock icon;
Lock cell, drags the lock icon for the second touch operation according to user input, makes the lock icon
Movement locus separates and fills the icon corresponding to the application program for needing locking on the current operation interface, described to lock
Application program.
7. terminal according to claim 6, it is characterised in that the lock cell includes:
First performance element, drags the lock icon for the second touch operation according to user input, makes the locking figure
Target movement locus needs the icon corresponding to the application program of locking on the current operation interface;
Second performance element, for being filled to the movement locus of lock icon, by the application program for needing locking
Corresponding icon separates into two parts icon;
Computing unit, for calculating the picture of the original pixel value and two parts icon of the icon corresponding to the application program
Element and, and the pixel sum to the original pixel value with two parts icon is compared;
Judging unit, for determining whether to lock the application program according to comparative result.
8. terminal according to claim 7, it is characterised in that the judging unit is specifically for if the original pixels
Value then locks the application program, otherwise, does not lock the application program more than the pixel sum of two parts icon.
9. terminal according to claim 7, it is characterised in that image of the lock icon for zip form, described the
Two performance elements specifically for, the movement locus of the lock icon is filled in the form of slide fastener image, will be described
The icon corresponding to the application program of locking is needed to separate into two parts icon, the width of wherein described slide fastener image is less than described
The width of the icon corresponding to application program.
10. the terminal according to any one of claim 6 to 9, it is characterised in that the terminal also includes:
The lock icon is returned to initial position for the 3rd touch operation according to user input by unlocking unit, to solve
The locked application program of lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610930716.0A CN106502502A (en) | 2016-10-31 | 2016-10-31 | A kind of method of locking applications and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610930716.0A CN106502502A (en) | 2016-10-31 | 2016-10-31 | A kind of method of locking applications and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106502502A true CN106502502A (en) | 2017-03-15 |
Family
ID=58318733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610930716.0A Pending CN106502502A (en) | 2016-10-31 | 2016-10-31 | A kind of method of locking applications and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106502502A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107896280A (en) * | 2017-11-16 | 2018-04-10 | 珠海市魅族科技有限公司 | Control method and device, the terminal and readable storage medium storing program for executing of a kind of application program |
CN109358782A (en) * | 2018-09-11 | 2019-02-19 | 北京达佳互联信息技术有限公司 | Execution method, apparatus, electronic equipment and the storage medium of dynamic instruction |
CN109725791A (en) * | 2018-12-29 | 2019-05-07 | 惠州Tcl移动通信有限公司 | A kind of processing method, mobile terminal and the storage medium of polishing desktop icons |
CN112684952A (en) * | 2020-12-18 | 2021-04-20 | 网易(杭州)网络有限公司 | Video playing control method and device and electronic equipment |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030225758A1 (en) * | 2002-05-16 | 2003-12-04 | Makoto Yamasaki | Method of managing casual storage field |
CN101943993A (en) * | 2010-08-26 | 2011-01-12 | 深圳桑菲消费通信有限公司 | Method for unlocking and locking mobile terminal touch screen |
US20110105193A1 (en) * | 2009-10-30 | 2011-05-05 | Samsung Electronics Co., Ltd. | Mobile device supporting touch semi-lock state and method for operating the same |
CN102541429A (en) * | 2010-12-08 | 2012-07-04 | Lg电子株式会社 | Mobile terminal and controlling method thereof |
CN102830907A (en) * | 2012-07-13 | 2012-12-19 | 中兴通讯股份有限公司 | Touch screen mobile terminal and method of mobile terminal for setting icon |
CN102915205A (en) * | 2012-11-14 | 2013-02-06 | 华为终端有限公司 | Method for unlocking touch screen terminal and touch screen terminal |
CN102981754A (en) * | 2008-07-07 | 2013-03-20 | Lg电子株式会社 | Mobile terminal and operation control method thereof |
US8707175B2 (en) * | 2009-04-16 | 2014-04-22 | Lg Electronics Inc. | Mobile terminal and control method thereof |
CN104020850A (en) * | 2006-01-30 | 2014-09-03 | 苹果公司 | Gesturing with a multipoint sensing device |
CN104217151A (en) * | 2014-09-11 | 2014-12-17 | 三星电子(中国)研发中心 | Locking method for application of intelligent terminal and intelligent terminal |
CN104503660A (en) * | 2014-12-18 | 2015-04-08 | 厦门美图移动科技有限公司 | Icon arranging method, device and mobile terminal |
CN104768148A (en) * | 2015-03-11 | 2015-07-08 | 浙江翼信科技有限公司 | Message encryption method and device |
-
2016
- 2016-10-31 CN CN201610930716.0A patent/CN106502502A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030225758A1 (en) * | 2002-05-16 | 2003-12-04 | Makoto Yamasaki | Method of managing casual storage field |
CN104020850A (en) * | 2006-01-30 | 2014-09-03 | 苹果公司 | Gesturing with a multipoint sensing device |
CN102981754A (en) * | 2008-07-07 | 2013-03-20 | Lg电子株式会社 | Mobile terminal and operation control method thereof |
US8707175B2 (en) * | 2009-04-16 | 2014-04-22 | Lg Electronics Inc. | Mobile terminal and control method thereof |
US20110105193A1 (en) * | 2009-10-30 | 2011-05-05 | Samsung Electronics Co., Ltd. | Mobile device supporting touch semi-lock state and method for operating the same |
CN101943993A (en) * | 2010-08-26 | 2011-01-12 | 深圳桑菲消费通信有限公司 | Method for unlocking and locking mobile terminal touch screen |
CN102541429A (en) * | 2010-12-08 | 2012-07-04 | Lg电子株式会社 | Mobile terminal and controlling method thereof |
CN102830907A (en) * | 2012-07-13 | 2012-12-19 | 中兴通讯股份有限公司 | Touch screen mobile terminal and method of mobile terminal for setting icon |
CN102915205A (en) * | 2012-11-14 | 2013-02-06 | 华为终端有限公司 | Method for unlocking touch screen terminal and touch screen terminal |
CN104217151A (en) * | 2014-09-11 | 2014-12-17 | 三星电子(中国)研发中心 | Locking method for application of intelligent terminal and intelligent terminal |
CN104503660A (en) * | 2014-12-18 | 2015-04-08 | 厦门美图移动科技有限公司 | Icon arranging method, device and mobile terminal |
CN104768148A (en) * | 2015-03-11 | 2015-07-08 | 浙江翼信科技有限公司 | Message encryption method and device |
Non-Patent Citations (2)
Title |
---|
梁玉萍等: "《移动UI界面App设计Photoshop从新手到高手》", 30 November 2016 * |
黄可臻等: "基于Android的隐私数据安全保护系统", 《信息网络安全》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107896280A (en) * | 2017-11-16 | 2018-04-10 | 珠海市魅族科技有限公司 | Control method and device, the terminal and readable storage medium storing program for executing of a kind of application program |
CN107896280B (en) * | 2017-11-16 | 2019-01-25 | 珠海市魅族科技有限公司 | A kind of control method and device, terminal and readable storage medium storing program for executing of application program |
CN109358782A (en) * | 2018-09-11 | 2019-02-19 | 北京达佳互联信息技术有限公司 | Execution method, apparatus, electronic equipment and the storage medium of dynamic instruction |
CN109725791A (en) * | 2018-12-29 | 2019-05-07 | 惠州Tcl移动通信有限公司 | A kind of processing method, mobile terminal and the storage medium of polishing desktop icons |
CN112684952A (en) * | 2020-12-18 | 2021-04-20 | 网易(杭州)网络有限公司 | Video playing control method and device and electronic equipment |
CN112684952B (en) * | 2020-12-18 | 2022-06-14 | 网易(杭州)网络有限公司 | Video playing control method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230409165A1 (en) | User interfaces for widgets | |
US11842044B2 (en) | Keyboard management user interfaces | |
AU2020259249B2 (en) | Systems, methods, and user interfaces for interacting with multiple application windows | |
US20230282146A1 (en) | Dynamic user interface with time indicator | |
US11921998B2 (en) | Editing features of an avatar | |
US20190258373A1 (en) | Scrollable set of content items with locking feature | |
EP2635954B1 (en) | Notification group touch gesture dismissal techniques | |
US10775971B2 (en) | Pinch gestures in a tile-based user interface | |
CN102037435B (en) | Navigating among activities in a computing device | |
JP7076000B2 (en) | Faster scrolling and selection | |
CN108121485A (en) | A kind of icon method for sorting, terminal and computer readable storage medium | |
CN106502502A (en) | A kind of method of locking applications and terminal | |
JPH07281864A (en) | Method and equipment for facilitation of selection of icon | |
US11829591B2 (en) | User interface for managing input techniques | |
CN107181858A (en) | A kind of method and terminal for showing notification message | |
US11943559B2 (en) | User interfaces for providing live video | |
AU2020223752B2 (en) | Accelerated scrolling and selection | |
US12019863B2 (en) | Techniques for selecting text | |
CN106775894A (en) | The operation method and terminal of a kind of application program | |
CN106227626A (en) | The backup method of a kind of communications records and terminal | |
US20240323313A1 (en) | User interfaces for providing live video |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20210101 |
|
AD01 | Patent right deemed abandoned |