CN108345486B - Interface covering method, equipment and readable medium - Google Patents

Interface covering method, equipment and readable medium Download PDF

Info

Publication number
CN108345486B
CN108345486B CN201810096762.4A CN201810096762A CN108345486B CN 108345486 B CN108345486 B CN 108345486B CN 201810096762 A CN201810096762 A CN 201810096762A CN 108345486 B CN108345486 B CN 108345486B
Authority
CN
China
Prior art keywords
interface
application
application program
covered
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810096762.4A
Other languages
Chinese (zh)
Other versions
CN108345486A (en
Inventor
吴培希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lianshang Network Technology Co Ltd
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN201810096762.4A priority Critical patent/CN108345486B/en
Publication of CN108345486A publication Critical patent/CN108345486A/en
Application granted granted Critical
Publication of CN108345486B publication Critical patent/CN108345486B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides an interface covering method, equipment and a readable medium, wherein the interface covering method comprises the following steps: detecting whether a first interface presented by a first application program is at least partially covered by a second interface of a second application program; and if the first interface of the first application program is covered by the second interface of the second application program, generating a third interface of the first application program so as to at least partially cover the second interface. That is, after receiving the second interfaces of other application programs, the current application program generates a third interface, and the third interface is used for at least partially covering the second interface, so as to prevent the user from performing misoperation on the second interface, thereby improving the user experience.

Description

Interface covering method, equipment and readable medium
Technical Field
The present application relates to the field of internet information processing technologies and computer technologies, and in particular, to an interface overlay method, device, and readable medium.
Background
In the running process of the application program on the terminal device, some other data often appears, such as interference popup windows popped up by other application programs, and the like, and the interference popup windows often cause harassment to the user, so that the use experience of the user is greatly influenced.
Based on the above, a scheme is needed to solve the problem of low use experience caused by disturbance of the application program in the running process to the user due to the interference popup.
Disclosure of Invention
In view of this, embodiments of the present application provide an interface overlay method, device and readable medium.
The embodiment of the application adopts the following technical scheme: the embodiment of the application provides an interface covering method, which comprises the following steps: detecting whether a first interface presented by a first application program is at least partially covered by a second interface of a second application program;
and if the first interface of the first application program is at least partially covered by the second interface of the second application program, generating a third interface of the first application program to at least partially cover the second interface.
The present application further provides an interface overlay device comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method as described above.
The present application further provides a computer readable medium having stored thereon computer readable instructions executable by a processor to implement the method as described above.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects: and when receiving second interfaces of other application programs, popping up a third interface by the current application program, wherein the third interface is used for at least partially covering the second interface so as to prevent the user from misoperation on the second interface, thereby improving the user experience.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of an interface coverage method according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of a process for determining an area of a first interface covered by a second interface in some embodiments of the present application;
FIG. 3 is a schematic flow chart illustrating a process for determining an area of a first interface covered by a second interface in accordance with further embodiments of the present disclosure;
FIG. 4 is a flow chart of a method of interface overlay in further embodiments of the present application;
FIG. 5 is a schematic diagram of a third interface overlaying only critical information in a second interface in some embodiments of the present application;
FIG. 6 is a schematic view of a third interface completely covering a second interface in some embodiments of the present application;
FIG. 7 is a schematic illustration of a first interface of a first application in some embodiments of the present application;
FIG. 8 is a schematic diagram illustrating a first interface of a first application being overlaid by a second interface in some embodiments of the present application;
FIG. 9 is a schematic diagram of the third interface having the same content as the first interface in some embodiments of the present application.
Detailed Description
In order to achieve the purpose of the present application, embodiments of the present application provide an interface covering method, device, and system, after receiving a second interface of another application, a third interface pops up from a current application, where the third interface is used to cover the second interface, so as to prevent a user from performing a misoperation on the second interface, thereby improving user experience.
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Some embodiments of the present application provide an interface covering method for a terminal, as shown in fig. 1, fig. 1 is a schematic flow chart of the interface covering method provided in the embodiments of the present application. The interface overlay method may be as follows. Firstly, detecting whether a first interface presented by a first application program is at least partially covered by a second interface of a second application program, as shown in step S101 in fig. 1; if the first interface of the first application program is at least partially covered by the second interface of the second application program, a third interface of the first application program is generated to at least cover the second interface, as shown in step S103 in fig. 1.
It should be noted that the terminals described in the embodiments of the present application include, but are not limited to: smart phones, tablet computers, PCs, and other various terminal devices.
Specifically, step S101 detects whether a first interface of a first application is at least partially covered by a second interface of a second application.
In this embodiment of the present application, the first application is a working foreground process, that is, the first application is a current application, and the second application is another application different from the first application. Further, the second application may be another application running in the background, or may be an application not running in the background. That is to say, when the first application program is running, the second application program pops up a second interface, and the second interface can be overlaid on a first interface currently presented by the first application program running in the foreground. When the second interface comprises the control, misoperation of the user can be caused, and therefore user experience is reduced.
In some embodiments of the present application, at least one or more combinations of a top-of-stack application permission, an auxiliary permission, and a screen recording permission may be used to determine whether the first application is covered by the second interface of the second application. Specifically, the top-stack application permission is also referred to as a permission to view other application programs, and what application program a foreground application program is can be determined by the top-stack application permission. The application program in the operation terminal can be simulated through the auxiliary authority. For example, the application program on the terminal can be operated through the auxiliary authority. The screen recording authority can acquire the pixel value of each pixel in the image of the current interface of the terminal. It should be noted that, in some embodiments of the present application, the required various rights are generally acquired before step S101 is executed. For example, any one or more combinations of the top-of-stack application authority, the auxiliary authority and the screen recording authority are acquired.
In some embodiments of the present application, it is determined whether a first interface currently presented by the first application is at least partially covered by a second interface of the second application by determining whether a foreground process of the first application is interrupted. In particular, when a foreground process of the first application is interrupted, it may be determined that a first interface currently presented by the first application is at least partially covered by a second interface of the second application.
In some embodiments of the present application, after it is determined that the first interface of the first application is at least partially covered by the second application, the second interface of the second application may be directly closed according to the auxiliary permission.
In some further embodiments of the present application, it may be further determined, through screen recording permission, whether a first interface currently presented by the first application is at least partially covered by a second interface of a second application. For example, a picture of a first interface currently presented by the first application program is obtained from an operating system of the terminal, and then a pixel value of each pixel in the first interface is obtained. And monitoring the pixel value of each pixel in the interface currently presented by the terminal through screen recording authority. And if the pixel value of the interface currently presented by the terminal is not matched with the pixel value of the first interface, determining that the first interface is at least partially covered.
In step S103, if the presented first interface of the first application is at least partially covered by the second interface of the second application, a third interface of the first application is generated to at least cover the second interface.
Specifically, when it is determined that the first interface presented by the first application is at least partially covered, the first application generates a third interface, and the third interface is used for at least covering the second interface.
In some embodiments, the third interface covers the full screen of the terminal. That is, in such embodiments, the area covered by the second interface may not need to be determined.
In some embodiments, prior to the first application generating the third interface, an area of the first interface of the first application covered by the second interface may be determined, and the third interface may be generated based on the determined area of coverage.
The manner in which the area covered by the second interface is determined may be varied.
In some embodiments, the area covered by the second interface currently generated by the second application may be determined by identifying the second application and based on data of the second interface that was historically generated by the second application.
For example, after determining that the first interface of the first application is at least partially covered by the second application, what application the second application is specific to may be determined by the top-of-stack application authority, so that the area covered by the second interface of the first interface may be determined according to the specific second application and the area displayed by the terminal in the history popup window of the second application.
It should be noted that, in the embodiments, the determined coverage area is inferred based on historical data. The embodiments can simplify the subsequent step of determining the area of the first interface covered by at least the second interface, thereby improving the processing efficiency, but the inference result may be wrong due to inaccuracy of the historical data or update of the second application program.
In some embodiments, the area of the first interface covered by the second interface may be determined by comparing the interface that the first interface should display with the interface that the terminal currently actually displays. Specifically, determining the area of the first interface covered by the second interface by the embodiments may include: firstly, acquiring first pixel values of at least part of pixels in the first interface; then obtaining a second pixel value of at least part of pixels of the interface currently presented by the terminal; and determining the area of the first interface covered by the second interface by comparing the first pixel value with the second pixel value.
In some embodiments, the area of the first interface covered by the second interface may be determined by combining data of the second interface generated by the second application program history and a comparison result between the first interface and an interface currently and actually displayed by the terminal.
The foregoing embodiments will be described below with reference to fig. 2 and 3 as examples.
FIG. 2 is a flow chart of a process for determining an area of a first interface covered by a second interface in some embodiments of the present application.
In step S202, an image of a first interface preset by a first application program is read.
In step S204, a first pixel value of each pixel in the image of the first interface is acquired. It should be noted that the image of the first interface is an image of an interface that the terminal should present currently.
In step S206, a second pixel value of each pixel in the image of the interface currently and actually presented by the terminal is obtained.
It should be noted that there is no absolute sequence between step S202 and step S206. Step S206 may be performed before step S202 and step S204.
In step S208, the first pixel value and the second pixel value are compared to determine whether the image of the interface that should be currently presented on the first interface matches the image of the interface that is currently and actually presented on the terminal, and if not, the process goes to step S210.
Step S210, determining the area of the first interface covered by at least the second interface according to the matching result. In general, a portion where a difference exists between the first interface and the interface currently and actually presented by the terminal may be determined according to the matching result, so as to determine an area of the first interface covered by at least the second interface.
Fig. 3 is a flow chart illustrating a process for determining an area of a first interface covered by a second interface in accordance with further embodiments of the present disclosure. In the embodiment shown in fig. 3, the pixel values of only a part of the pixels in the first interface may be determined, so as to determine the area covered by the second interface in the first interface.
In step S301, an image of a first interface preset by a first application is read.
In step S303, a first pixel value of a partial pixel of the image of the first interface is acquired.
Specifically, in this embodiment, the first pixel value of each pixel in the first setting area in the image of the first interface is acquired. The first setting area may be a key area of a first interface of the first application program, or an area where a second interface of the second application program obtained according to a big data model covers the first interface with a high probability. The area covered by the second interface can be determined according to the data of the second interface generated by the second terminal history.
Step S305, obtaining a second pixel value of the partial pixel in the interface currently and actually presented by the terminal. And the second pixel value is the actual pixel value of the part of pixels in the interface currently presented by the terminal.
Specifically, a second pixel value of each pixel in the first setting area in the interface currently presented by the terminal is obtained, that is, an actual pixel value of each pixel in the first setting area in the interface currently presented by the terminal.
It should be noted that there is no absolute sequence between step S301 and step S305. Step S305 may be performed before step S301 and step S303.
Step S307, comparing the first pixel value with the second pixel value to judge whether the first setting area of the image of the first interface which should be presented currently is matched with the first setting area of the image of the interface which is actually presented currently by the terminal, and if not, jumping to step S309.
Step S309, according to the matching result, determining the area of the first interface covered by the second interface.
After determining the area of the first interface covered by the second interface, the first application generates a third interface, which partially covers the second interface. It should be noted that the authority of the third interface is higher than or equal to the authority of the second interface, so as to ensure that the third interface can cover the second interface.
Specifically, if the authority of the third interface is the same as the authority of the second interface, the third interface is overlaid on the second interface because the second interface is generated before the third interface is generated. And if the authority of the third interface is higher than that of the second interface, the third interface can be directly covered on the second interface. That is, it can be ensured that the third interface can be overlaid on the second interface as long as it is ensured that the authority of the third interface is higher than or equal to the authority of the second interface.
In some embodiments of the present application, after determining the area of the first interface covered by the second interface, the size of the second interface is determined based on the area. In some embodiments of the present application, the size of the third interface generated by the first application is the same as that of the second interface, and the third interface covers the second interface, that is, in this embodiment, the third interface completely covers the second interface. In this case, the user cannot perform any operation on the second interface, so that the misoperation of the user on the second interface is avoided, and the user experience is improved. It should be noted that the third interface may be any filling content, and preferably, the filling color of the third interface is matched with the current interface color of the first application program, so as to reduce the influence of color difference on the user.
Further, preferably, the third interface is transparent, in this case, the third interface does not cover the content of the second interface, and the user can still see the content of the second interface, but because the third interface covers the second interface, the user still cannot operate the second interface, so that the user is prevented from performing misoperation on the second interface.
Furthermore, in this embodiment, when an area covered by the second interface in the first interface of the first application includes an operability control, the third interface includes the operability control, and a function of the operability control in the third interface is the same as a function of the operability control in the first interface of the first application. That is, when the user clicks the operability control in the third interface, the effect is the same as the effect of the user clicking the operability row control in the first interface of the first application program.
In some further embodiments of the present application, the third interface may cover only a preset region in the second interface, where the preset region is generated according to big data model statistics. Specifically, the area of the key information included in the second interface of the second application program in the second interface is statistically analyzed through a large number of models, and the area of the key information included in the second interface is set as the preset area. In this embodiment, the third interface only needs to cover the preset area in the second interface, that is, the third interface only needs to cover the key information in the second interface.
Specifically, the key information of the second interface includes but is not limited to: and the checking control, the determining control and the multi-level sub-option control of the second interface. In this embodiment, the size of the third interface is smaller than that of the second interface, and the third interface covers a pointing control, a determining control, or a multi-level sub-option control in the second interface.
That is to say, in this embodiment, the third interface only covers the check control, the determination control, or the multi-level sub-option control in the second interface, so as to prevent the user from performing a misoperation on the above various controls. However, for other areas of the second interface excluding the check control, the determination control, or the multi-level sub-option control, the user may operate the other areas to make the second interface exit the current interface, for example, click the other areas of the second interface or slide the other areas of the second interface, which may not only make the second interface exit the current interface, but also avoid the user's misoperation on the second interface, thereby further improving user experience.
Of course, in this embodiment, the third interface may be transparent or may not be transparent. Preferably, in some embodiments of the present application, the third interface is transparent, that is, a user can see various controls on the second interface, such as a pointing control, a determining control, a multi-sub-option control, and the like, but cannot operate the controls, and only can operate other areas of the second interface. Under the condition that the visual perception of the user is not influenced, the misoperation of the second interface by the user is avoided, and the user experience is improved.
Furthermore, in this embodiment, when an area of the first interface of the first application program covered by the second interface includes an operability control, the third interface includes the operability control, and a function of the operability control in the third interface is the same as a function of the operability control in the first application program. That is, when the user clicks the operability control in the third interface, the effect is the same as the effect of the user clicking the operability row control in the first interface of the first application program. It should be noted that, in this case, the third interface may be transparent or opaque.
Specifically, for example, when the operability control in the first interface of the first application is the same as the key information in the second interface, the third interface may be transparent. Specifically, for example, the second interface includes a determination control, and the area covered by the second interface in the first interface of the first application also includes a determination control, the third interface that pops up may be transparent, and the third interface also includes a determination control (i.e., the operability control), and further, the determination control in the third interface may be overlapped with the determination control in the second interface.
In still other embodiments of the present application, when a first interface of a first application is covered by a second interface of a second application, an interface that should be presented when the first application is not covered by the second application is obtained, and an interface that should be presented when the first application is not covered by the second application is the third interface. At this time, the content of the third interface is the same as the content of the first interface.
In this case, because the content of the third interface is consistent with that of the first interface of the first application program, the third interface completely covers the second interface, so that the user cannot see the content of the second interface and cannot operate the second interface, that is, the user is prevented from performing misoperation on the second interface, and the user experience is improved. Furthermore, because the third interface is consistent with the first interface of the first application program in content, the operation of the first application program by a user is not influenced, and the user experience is further improved.
In still other embodiments of the present application, the third interface may be generated by a third application. For example, the third interface may be a notification message of the third application, so that the second interface can be covered simply and quickly.
In the above embodiments of the present application, the second interface includes, but is not limited to, a top pop-up window, a desktop pop-up window, a bottom pop-up window, and the like. The third interface disappears as the second interface disappears.
In some further embodiments of the present application, before the first application pops up the third interface to cover the second interface, the method further comprises: and judging whether the second application program is in a white list. Specifically, as shown in fig. 4, fig. 4 is a flowchart of an interface covering method in further embodiments of the present application. Firstly, detecting whether a first interface presented by a first application program is at least partially covered by a second interface of a second application program, as shown in step S402 in fig. 4; if the first interface presented by the first application program is at least partially covered by the second interface of the second application program, determining whether the second application program is in a white list, as shown in step S404 in fig. 4; if the second application is not in the white list, a third interface is generated to at least partially cover the second interface, as shown in step S406 in fig. 4.
Specifically, the white list may include system applications. That is, in determining whether the second application is in the white list, it is determined whether the second interface is generated by the system application. And when the second application program is in the white list, receiving the second interface and not generating a third interface. And when the second application program is not in the white list, generating the third interface to at least partially cover the second interface.
Next, a specific application scenario will be exemplified. As shown in fig. 5, fig. 5 is a schematic diagram of a third interface only covering key information in a second interface in some embodiments of the present application. In this embodiment, the third interface is transparent, and there is no operability control in the portion of the first interface of the first application program covered by the second interface. In this embodiment, the second interface includes a determination control, and the user cannot operate the determination control in the second interface, that is, when the user clicks the area of the determination control in fig. 5, the click is invalid, but the user can cancel the second interface by sliding up the other area of the second interface except the determination control.
FIG. 6 is a schematic view of a third interface completely covering a second interface in some embodiments of the present disclosure. In this embodiment, the third interface is transparent, and a user can see all information in the second interface, but cannot perform any operation on the second interface, that is, cannot perform operations on various controls included in the second interface, such as a check control, a determination control, a multi-level sub-option control, and the like, for example, when the user clicks an area of the determination control in fig. 5, the click is invalid, or cannot perform operations on other areas of the second interface except the various controls, for example, the second interface cannot be cancelled by a slide-up operation.
FIG. 7 is a schematic diagram of a first interface of a first application in some embodiments of the present application. Fig. 8 is a schematic diagram illustrating a first interface of a first application being overlaid by a second interface in some embodiments of the application. Fig. 9 is a schematic diagram of a third interface with the same content as the first interface according to some embodiments of the present disclosure.
In this embodiment, the third interface is an interface that should be currently presented by the first application program. And the area covered by the second interface in the first application program comprises an operability control, the generated third interface also comprises the operability control, and the effect of the user on operating the operability control contained in the third interface is the same as the effect of the user on operating the operability control in the first interface of the first application program.
Specifically, when the user clicks the operability control in the first application before being covered by the second interface, the operability control is configured to jump to a specified page, that is, when the user clicks the operability control in the first interface, the operability control in the third interface is also configured to jump to the specified page after the third interface is generated.
Based on the same inventive concept, the embodiment of the present application further provides an interface overlay device, which includes a memory for storing computer program instructions and a processor for executing the program instructions, wherein when the computer program instructions are executed by the processor, the device is triggered to execute the method described above.
Based on the same inventive concept, the present application further provides a computer readable medium, which stores computer readable instructions executable by a processor to implement the method as described above.
In the interface covering method, the device and the readable medium provided by the embodiment of the application, whether a first interface presented by a first application program is at least partially covered by a second interface of a second application program is detected; and if the first interface of the first application program is at least partially covered by the second interface of the second application program, generating a third interface of the first application program so as to at least partially cover the second interface. And when receiving second interfaces of other application programs, popping up a third interface by the current application program, wherein the third interface is used for at least partially covering the second interface so as to prevent the user from misoperation on the second interface, thereby improving the user experience.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (14)

1. An interface covering method for a terminal is characterized by comprising the following steps:
detecting whether a first interface presented by a first application program is at least partially covered by a second interface of a second application program by adopting at least one or more combinations of stack top application authority, auxiliary authority and screen recording authority, wherein the second application program is other than the first application program;
if the first interface of the first application program is at least partially covered by the second interface of the second application program, generating a third interface of the first application program to at least partially cover the second interface;
the method further comprises the following steps:
determining a size of the second interface according to an area of the first interface covered by the second interface.
2. The interface overlay method of claim 1 wherein the authority of said third interface is higher than or equal to the authority of said second interface.
3. The interface overlay method of claim 1, wherein if the first interface of the first application is at least partially overlaid by the second interface of the second application, generating a third interface of the first application to at least partially overlay the second interface comprises:
and if the first interface of the first application program is at least partially covered by the second interface of the second application program and the second application program is not in the white list, generating a third interface of the first application program to at least partially cover the second interface.
4. The interface overlay method of claim 1 wherein detecting whether the first interface presented by the first application is at least partially overlaid by the second interface of the second application comprises:
and if the foreground process of the first application program is interrupted, determining whether a first interface presented by the first application program is at least partially covered by a second interface of a second application program.
5. The interface overlay method of claim 1, further comprising: and if the first interface of the first application program is at least partially covered by the second interface of the second application program, determining the area of the first interface covered by the second interface.
6. The interface overlay method of claim 5 wherein determining the area of the first interface covered by the second interface comprises:
acquiring first pixel values of at least part of pixels in the first interface;
acquiring second pixel values of at least part of pixels of an interface currently presented by the terminal;
and determining the area of the first interface covered by the second interface by comparing the first pixel value with the second pixel value.
7. The interface overlay method of claim 5 wherein when an operability control is included in the area of the first interface overlaid by the second interface, the operability control is included in the third interface.
8. The method of claim 1, wherein the third interface is the same size as the second interface.
9. The interface covering method according to claim 1, wherein the size of the third interface is smaller than that of the second interface, and the third interface covers a predetermined area of the second interface;
and the preset area of the second interface is determined according to the data of the second interface generated by the second application program history.
10. The interface covering method according to claim 8 or 9, wherein the third interface is transparent.
11. The interface overlay method of claim 1 wherein the content of the third interface is the same as the content of the first interface.
12. The interface overlay method of claim 1 wherein said second interface comprises: top pop-up window, desktop pop-up window and bottom pop-up window.
13. An interface overlay device, the device comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method of any of claims 1 to 12.
14. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the method of any one of claims 1 to 12.
CN201810096762.4A 2018-01-31 2018-01-31 Interface covering method, equipment and readable medium Active CN108345486B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810096762.4A CN108345486B (en) 2018-01-31 2018-01-31 Interface covering method, equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810096762.4A CN108345486B (en) 2018-01-31 2018-01-31 Interface covering method, equipment and readable medium

Publications (2)

Publication Number Publication Date
CN108345486A CN108345486A (en) 2018-07-31
CN108345486B true CN108345486B (en) 2021-05-07

Family

ID=62961025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810096762.4A Active CN108345486B (en) 2018-01-31 2018-01-31 Interface covering method, equipment and readable medium

Country Status (1)

Country Link
CN (1) CN108345486B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096874A (en) * 2019-03-15 2019-08-06 深圳壹账通智能科技有限公司 Program page security alarm method, apparatus, computer equipment and storage medium
CN110309647B (en) * 2019-06-28 2022-02-25 北京乐蜜科技有限责任公司 Processing method and device for application program, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101587436A (en) * 2008-05-22 2009-11-25 闪联信息技术工程中心有限公司 Method and system for regional restoration in embedded device
CN106028089A (en) * 2016-06-24 2016-10-12 武汉斗鱼网络科技有限公司 Method and device for shielding advertisement put on live video image
CN106156371A (en) * 2016-08-31 2016-11-23 浪潮(北京)电子信息产业有限公司 A kind of method and device realizing webpage complete background figure

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101587436A (en) * 2008-05-22 2009-11-25 闪联信息技术工程中心有限公司 Method and system for regional restoration in embedded device
CN106028089A (en) * 2016-06-24 2016-10-12 武汉斗鱼网络科技有限公司 Method and device for shielding advertisement put on live video image
CN106156371A (en) * 2016-08-31 2016-11-23 浪潮(北京)电子信息产业有限公司 A kind of method and device realizing webpage complete background figure

Also Published As

Publication number Publication date
CN108345486A (en) 2018-07-31

Similar Documents

Publication Publication Date Title
CN108376094B (en) Notification message display method and device, computer equipment and storage medium
CN110851299A (en) Automatic flow exception eliminating method, device, equipment and storage medium
CN108345486B (en) Interface covering method, equipment and readable medium
CN111212313A (en) Advertisement display method, device, storage medium and computer equipment
CN114341784A (en) Touch event processing method and device, mobile terminal and storage medium
CN109285524B (en) Liquid crystal display, display method thereof, terminal and computer readable storage medium
CN103870123A (en) Information processing method and electronic equipment
US20190095074A1 (en) Method for controlling the execution of a program configurable into a disabled state and enabled state
CN112506600A (en) Element positioning method of user interface, device, medium and electronic equipment thereof
CN109271228A (en) Interface function recognition methods, device and the electronic equipment of application
CN110688308A (en) Memory storage redundancy detection method and device, electronic equipment and readable storage medium
CN106971123B (en) A kind of terminal interface display methods and mobile terminal
CN111857857B (en) Interface display method, device and equipment
US8261238B2 (en) Shield for user interface testing
US9495729B2 (en) Display method and electronic device
US9389948B2 (en) Method and system for fixing loopholes
CN109543407B (en) Activity hijacking interception method and device
CN115688102A (en) Window processing method and device, processor and electronic equipment
CN107562260B (en) A kind of method and device of touch control
CN105631318B (en) A kind of acquisition methods and device of registration table key assignments
CN113395234B (en) Method and device for detecting flow hijacking of popularization information
CN109960559B (en) Message window management method of terminal application program and related device
US11989475B2 (en) Selecting a display with machine learning
CN112698983A (en) Data processing method and related device
CN114270298A (en) Touch event processing method and device, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant