CN108549823A - The polygonal color application method and device, electronic equipment of terminal - Google Patents

The polygonal color application method and device, electronic equipment of terminal Download PDF

Info

Publication number
CN108549823A
CN108549823A CN201810317729.XA CN201810317729A CN108549823A CN 108549823 A CN108549823 A CN 108549823A CN 201810317729 A CN201810317729 A CN 201810317729A CN 108549823 A CN108549823 A CN 108549823A
Authority
CN
China
Prior art keywords
space
user
private
active user
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810317729.XA
Other languages
Chinese (zh)
Other versions
CN108549823B (en
Inventor
谭春宏
张俊
张伟杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810317729.XA priority Critical patent/CN108549823B/en
Publication of CN108549823A publication Critical patent/CN108549823A/en
Application granted granted Critical
Publication of CN108549823B publication Critical patent/CN108549823B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application involves the polygonal color application methods and device, electronic equipment, computer readable storage medium of a kind of terminal.This method includes:It is respectively provided with role identification for all the elements at least two user's spaces;For the privately owned exclusive privately owned mark of curriculum offering at least two user's space;When entering active user space, it obtains content corresponding with the role identification under the active user space, be supplied to user's use into active user space, and in other all user's spaces will there is the tagged content of private to make hidden processing in active user space.Content in user's space corresponding with user role can be shown, can the privately owned exclusive content in other users space be subjected to hidden processing again, the content for avoiding getting other users space by the system function of high permission in active user space, leads to the privacy leakage in other users space.

Description

The polygonal color application method and device, electronic equipment of terminal
Technical field
This application involves field of terminal technology, more particularly to the polygonal color application method and device, electronics of a kind of terminal Equipment, computer readable storage medium.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc. Different demands.
Currently, the polygonal color of intelligent terminal using more and more common, how to prevent the privacy content between polygonal color reveal at For important problem.
Invention content
The embodiment of the present application provides a kind of polygonal color application method of terminal, device, electronic equipment, computer-readable storage Medium, can be to avoid getting the content in other users space in active user space.
A kind of polygonal color application method of terminal, be applied to at least two user's spaces system, described at least two A user's space belongs to different use roles;The method includes:
It is respectively provided with role identification for all the elements at least two user's space;
For the privately owned exclusive privately owned mark of curriculum offering at least two user's space;
When entering active user space, obtains content corresponding with the role identification under the active user space, carries The user for being fed into active user space uses, and will have the tagged content of private in other all user's spaces Make hidden processing in active user space.
A kind of polygonal color use device of terminal, including:
Role identification setup module, for being respectively provided with role's mark for all the elements at least two user's space Know;
Privately owned identify and arrange module, for being the privately owned exclusive privately owned mark of curriculum offering at least two user's space Know;
Hidden processing module, for when entering active user space, obtaining and the role under the active user space It identifies corresponding content, be supplied to user's use into active user space, and by having in other all user's spaces The tagged content of private makees hidden processing in active user space.
A kind of electronic equipment, including memory and processor store computer program, the calculating in the memory When machine program is executed by the processor so that the processor executes the step of method described in the embodiment of the present application.
A kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in the embodiment of the present application is realized when being executed by processor.
The polygonal color application method and device, computer readable storage medium, electricity for the terminal that the embodiment of the present application is provided Sub- equipment, by for curriculum offering role identification so that content in user's space can displaying corresponding with user role, simultaneously By for the privately owned mark of curriculum offering, and can the privately owned exclusive content in other users space be subjected to hidden processing, avoided The content for getting other users space by the system function of high permission in active user space, leads to other users space Privacy leakage.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 2 is the flow chart of the polygonal color application method of terminal in one embodiment;
Fig. 3 is the flow chart that role identification is arranged in one embodiment;
Fig. 4 is that private tagged flow chart is arranged in one embodiment;
Fig. 5 is a kind of hidden processing method flow diagram in one embodiment;
Fig. 6 is the hidden processing method flow diagram of another kind in one embodiment;
Fig. 7 is another hidden processing method flow diagram in one embodiment;
Fig. 8 is another hidden processing method flow diagram in one embodiment;
Fig. 9 is the structure diagram of the polygonal color use device of the terminal of an embodiment;
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements, But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.Citing comes It says, without departing from the scope of the invention, the first user's space can be known as second user space, and similarly, Second user space can be known as to the first user's space.First user's space and second user space both user's space, But it is not same user's space.
In one embodiment, as shown in Figure 1, providing a kind of internal structure schematic diagram of terminal.The terminal includes logical Cross processor, memory and the display screen of system bus connection.Wherein, the processor is for providing calculating and control ability, branch Support the operation of entire terminal.Memory for storing data, program, and/or instruction code etc., stored on memory at least one Computer program, the computer program can be executed by processor, to realize that is provided in the embodiment of the present application is suitable for terminal Polygonal color application method.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non- Volatile storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database And computer program.A kind of polygonal color of the terminal provided for realizing above each embodiment is stored in the database to be made With the relevant data of method, for example default processing strategy or default verification information can be stored etc..The computer program can be handled Performed by device, for realizing a kind of polygonal color application method of terminal that each embodiment of the application is provided.Built-in storage The running environment of cache is provided for operating system, database and the computer program in non-volatile memory medium.Display Screen can be touch screen, for example be capacitance plate or electrical screen, be used for the interface information of display terminal.The terminal can be mobile phone, Tablet computer or personal digital assistant or Wearable etc..
The polygonal color application method of terminal in the present embodiment, is described for running in terminal.The terminal Polygonal color application method be applied to the system at least two user's spaces, at least two user's space belongs to different Use role.
In the application, system refers to the operating system of terminal.The operating system provides the function in multi-user or more spaces, makes A terminal can open up multiple spaces by multiple user time-sharings use or a user under different situations enter not Same space uses.By not distinguishing multiple spaces of the space of different user and same user are collectively referred to as in the application User's space.When same user uses different user's spaces, it is also considered as it and uses role with different.Use situation packet It includes but is not limited to:
One terminal has more than two users, each with opening a user for belonging to itself in systems per family Space, such as children's spatial, visitor space etc.;One terminal only has there are one user, which opens in systems belongs to In the more than two user's spaces of itself, such as the principal space and private space;One terminal has more than two users, often It is a also additionally to have one with opening user's space that one belongs to itself or wherein at least one user in systems per family A one's own private space.
For the system in multi-user or more spaces is provided, user when first used, in system it is general only there are one Space (commonly referred to as owner space is used to owner, has highest permission).When need to multi-user use or open up more Space is in use, need to create user's space in systems.Other than owner space, there is life in other user's spaces Period, the life cycle start from establishment, destroy finally.Between establishment and destruction is then the survival stage.
, at least can be in operating status there are one user's space in multiple user's spaces and the system deposited, other spaces can To be in running background or not running.During system use, bottom function is generally configured with all users in management system The permission of space content.Such as multitask function, file management facilities etc., belonging to the content of different user can be managed. Such as the video seen in private space, when using nearest task list in owner space, which appears in recently In task list, and the frame preview content that history plays can be seen.Although cannot be accessed after selection, preview content foot To expose privacy of user.Such as file management facilities again can manage the file of all users below system.Other users The inaccessible file in space by it is a kind of cannot read in a manner of present, usually preserved in a manner of plus invalid suffix etc..But This cannot tackle the problem at its root, and on the basis of obtaining this document, its content still can be obtained using certain means.
The polygonal color application method of the terminal of one embodiment of the application includes step 202 to step 206.This method is applied to System at least two user's spaces.
Step 202:It is respectively provided with role identification for all the elements at least two user's space.
Content in user's space may include apply, data, setting, interface, user's space itself etc..Using for example Social networking application, game application, Video Applications, reading application etc..Data such as short message content, audio file, video file, text Shelves, contact person etc..Setting such as hot spot setting, multi-user's setting, Bluetooth transmission setting etc.;Interface such as desktop background, Account login interface etc..User's space such as owner space, private space, children's spatial.When being related to multi-user, multiple users Same application also belong to different contents.
Role identification is for indicating a user's space is used for what role.As previously mentioned, same user is not using When isospace, it may have different roles.Role can easily illustrate the right to use that the owner of the user's space has Limit.Such as children's spatial, visitor space etc., role is respectively suitable for children and visitor, in using terminal, can only just use The function of permission suitable for the role.Role identification is just used to indicate the role.The role can be provided previously by system, It selects to use to user when newly-built user's space;It can also be by being obtained after user's self-defining and configuration permission.The permission of configuration May include system function permission, the access right of application, access right of data etc..
After content is configured role identification, so that it may to determine that the user in active user space can use in much permissions The content and whether can use the content.
Normally, it can automatically be role mark of all the elements setting in same user's space corresponding to the user's space Know.As shown in figure 3, the step may include:
Step 302:A role identification is assigned for each user's space, and any two role identification is different. Normally, when establishing user's space, role identification is distributed for user's space.Wherein, owner space belongs to the resident sky of system Between, life cycle is not present.Its role identification is endowed as owner role, has highest permission.Other users space To be obtained by newly-built, newly-built user's space may belong to same already present user, can also belong to new user, that is, exist User's space is created while newly-built user.In newly-built user's space, pre-configured role is assigned to the newly-built use Family space, the role are indicated and are quoted using a unique role identification.
Step 304:For belong to all the elements in same user's space be respectively provided with it is corresponding with the same user's space Role identification.
All the elements in same user's space include all application, data, setting, interface, user's space itself etc. Deng.Such as all application, data, setting, interface in owner space, used unique angle corresponding with the owner space Colour code knowledge is marked.
After the completion of label, so that it may with determine active user space user can in much permissions using the content with And whether can use the content.
Such as owner's role identification, private space is used to use privacy role identification in owner space.In owner space All applications, data, setting, interface carry owner's role identification, all applications in private space, are set data It sets, interface carries privacy role identification.When being respectively at owner space and private space with a chat application A, it is exactly Include two chat application A simultaneously:Chat application A (owner's role identification), chat application A (privacy role identification).
By above-mentioned processing, the different role of same money application division different can be answered to finally divide into two With.
Step 204:For the privately owned exclusive privately owned mark of curriculum offering at least two user's space.
Privately owned exclusive content is the subset of user's space content, equally can be apply, data, setting, interface, Yong Hukong Between itself etc..Using such as social networking application, game application, Video Applications, reading application etc..Data such as short message content, Audio file, video file, document, contact person etc..Setting is such as hot spot setting, multi-user's setting, Bluetooth transmission setting Deng;Interface is such as desktop background, account login interface.User's space such as owner space, private space, children's spatial.
Privately owned exclusive content carries user-specific, usually embodies the privacy requirements of user.Normally, it is by user Lai Ding Which adopted content belongs to privately owned exclusive content.As shown in figure 4, the step may include:
Step 402:Start the setting of privately owned exclusive content according to user instruction, and provides all in active user space The list of content.
Under active user space, the setting of privately owned exclusive content is initiated by owning user.Each user's space belongs to One user, a user can use more than two user's spaces.When user enters a user's space, can be should User's space specifies privately owned exclusive content namely the privately owned exclusive content of assigned role.According to system provide inlet porting, by User initiates setting instruction.All the elements in active user space are then presented to the user according to setting instruction by system, for Family selects.The mode of presentation can be that list is presented, or is presented after further being classified.Such as according to application, data, Setting, interface, user's space itself etc. are classified.
Step 404:According to the user's choice, the list of all the elements out of active user space is chosen privately owned exclusive interior Hold.System provide all the elements list when, also provide content it is whether selected be marked for user interaction.For by user It is expressed as selected after interaction, forms the privately owned exclusive contents list of selection.The selection can refer to sizing selection, i.e. basis The specified content of selection forms privately owned exclusive contents list;It can also be the selection of exclusion type, i.e., formed after excluding selection content Privately owned exclusive contents list.
Step 406:For the privately owned exclusive privately owned mark of curriculum offering of selection.
Privately owned mark is for indicating whether a content is specific to a role.As previously mentioned, same user is not using When isospace, it may have different roles is also different application when being in different user's spaces with a application.
After content is configured privately owned mark, so that it may only have the user in active user space that can use the content to determine.
Step 206:When entering active user space, obtain corresponding with the role identification under the active user space Content, be supplied into active user space user use, and will in other all user's spaces have the privately owned mark The content of knowledge makees hidden processing in active user space.
Active user's space representation is in the user's space of front stage operation, for servicing current user, such as owner's sky Between.Other users space includes all user's spaces opened up in the system of terminal, such as private space.May include working as Preceding user's space in backstage and the user's space not run.
At statement " entering active user space ", the user's space indicated entry into is exactly active user space.By obtaining The content with the role identification under active user space is taken, the user for providing it to active user space uses so that when The user of front space can use role-security.
Content in other users space, in some cases, even if it cannot access, but still can be in active user's sky Between it is visible.And if after being configured privately owned mark, active user space will in other spaces have the private it is tagged Content makees hidden processing, keeps its invisible.May include nearest task list with the hidden processing of the tagged content of private In hide, the hiding of file, application and its data are hidden etc..
The polygonal color application method of above-mentioned terminal, by for curriculum offering role identification so that interior in user's space Hold and correspondings with user role can show, while by for the privately owned mark of curriculum offering, and can will be in other users space Privately owned exclusive content carries out hidden processing, avoids getting other use by the system function of high permission in active user space The content in family space leads to the privacy leakage in other users space.
In one embodiment, it as shown in figure 5, when entering active user space, obtains and the active user space Under the corresponding content of role identification, be supplied to user's use into active user space, and by other all user's spaces Interior has the step of tagged content of private makees hidden processing in active user space, i.e., step 206 may include Following steps:
Step 502:Obtaining in other users space has the tagged application of private.The present embodiment using apply as Target is dealt with objects.May include system application using being functional programs that system upper layer is supplied to user, such as phone, Short message, clock etc. can also include tripartite's application, such as social networking application, reading application etc..After the processing of above-mentioned steps 204, when All the elements in preceding user's space are selectively provided with privately owned mark, wherein including just to be provided with private tagged answer With.
Step 504:Obtain the data that the application generates.Using will produce the number for belonging to application during use According to.Such as the application has an account, each account has some about the setting data of application, content-data etc., in order to Different users is logging in using this in application, these data can be utilized to provide more personalized use body for account user It tests.After obtaining with private tagged application, the data of application are also obtained.
Step 506:The data of the application and its generation are subjected to hidden processing.May include using hidden processing is carried out The startup entrance (such as application icon) of application is hidden, the installation file of application is hidden, and by application Data file is hidden.Or by the installation file of application be set as the Authority Verification under current spatial view access and can See.
In the above method, due to carrying out selective processing to application, can by other users space application and its number According to hiding for static state is carried out, application and its data that other users space is got by active user space are prevented.
In actual use, system bottom function can manage the use trace of application, this can lead to different user Space gets the use trace in other users space when using the system bottom function.In one embodiment, such as Fig. 6 institutes Show, it is described when entering active user space, content corresponding with the role identification under the active user space, offer are provided It is used to the user for entering active user space, and in other all user's spaces will there is the tagged content of private to exist The step of making hidden processing in active user space, i.e., step 206 may comprise steps of:
Step 602:Obtaining in other users space has the tagged application of private.The present embodiment using apply as Target is dealt with objects.May include system application using being functional programs that system upper layer is supplied to user, such as phone, Short message, clock etc. can also include tripartite's application, such as social networking application, reading application, Video Applications, browser etc..Above-mentioned After step 204 processing, all the elements in active user space are selectively provided with privately owned mark, wherein including just to set Private tagged application is set.
Step 604:Obtain the nearest task list in active user space.Nearest task list is system bottom function, is used In the currently running applicable cases in the record system of backstage.By recording service condition, cooperation caching mechanism not only can be most Installed System Memory is utilized to big degree, and can accomplish quickly to start and switch related application.Terminal, which provides, enters this nearest The entrance of business list, after user enters from the entrance, system will transfer the nearest task list to complete visually to arrange Table content displaying.
Step 606:The list items with the tagged application of private are deleted from the nearest task list, to cancel Preview in the nearest task list.
After user enters from the entrance, system will transfer the nearest task list to complete visual list content Displaying (being typically using the historical content frame of application as preview).This step from nearest task list by deleting with described The list items of private tagged application can be let out to avoid the privacy with private tagged exclusive application in other users space Dew.
It, can be by the dynamic of the application in other users space due to carrying out selective processing to application in the above method It is hidden using trace, prevents the application for getting other users space by system bottom function by active user space Some use informations.
In actual use, system bottom function, such as file management facilities can manage all file datas, This can cause different user space to get the file in other users space when using the system bottom function (although cannot lead to Cross normal mode opening).In one embodiment, as shown in fig. 7, it is described when enter active user space when, obtain with it is described The corresponding content of role identification under active user space is supplied to user's use into active user space, and by other There is the step of tagged content of private makees hidden processing in active user space, i.e. step in all user's spaces 206 may comprise steps of:
Step 702:When file management facilities start, obtaining in other users space has the tagged text of private Part.The present embodiment is dealt with objects using file as target.File is usually the particular memory form of data, such as audio file, Video file, document files etc..After the processing of above-mentioned steps 204, all the elements in active user space are selectively set Privately owned mark is set, wherein including just to be provided with private tagged file.
Step 704:Obtain the file management list in active user space.File management list is system bottom function, is used In providing visual package management file to the user.File management based on catalogue and the file based on type would generally be provided Management.File management based on catalogue can get the All Files that the storage path in memory according to file provides;Base It in the file management of type, can be classified according to the general type of file, not have to provide file path in displaying.No matter Which kind of file management mode, the file being required in scanning system form file management list, then basis according to its attribute List is shown.
Step 706:List items corresponding with having the tagged file of private are deleted from the file management list, To cancel the display with the tagged file of private in the file management list.
When user's startup file management function, file management list is to form the basis of displaying.This step from comprising institute List items corresponding with having the tagged file of private are deleted in documentary file management list, you can in file management Do not occur the privately owned exclusive content in other users space in function.
The above method can carry out the file in other users space static due to carrying out selective processing to file Hide, prevent the file that other users space is got by active user space.
In actual use, when other users space is in running background, notice is will produce, multi-user system is usual The notice in background user space is allowed to be sent out in active user space, this can cause active user space to get other users sky Between information.In one embodiment, as shown in figure 8, it is described when entering active user space, it obtains and the active user The corresponding content of role identification under space is supplied to user's use into active user space, and by other all users There is the tagged content of private the step of making hidden processing in active user space in space, i.e. step 206 can be with Include the following steps:
Step 802:Obtaining in other users space has the tagged content of private.The present embodiment is with each of system Kind content is dealt with objects as target, such as application, data, interface, setting and user's space itself etc..In above-mentioned steps After 204 processing, all the elements in active user space are selectively provided with privately owned mark.
Step 804:Obtain the notice that there is private tagged content to generate.It can be because generating new thing in system Part, receives new push, incoming call, short message etc. and needs to give notice application state change, to remind user.Traditional is applied alone Notifying for family is fairly simple and direct, for example, incoming call after call interface is directly presented, receive short message after send out short message sound or Short message content, chat application is directly presented even message content can also directly occurs in locking screen interface or notification bar.Polygonal color Between message informing, can will notify to be presented on active user space by the application run in the user's space on backstage In.
Step 806:The notice is intercepted in active user space.
Different from conventional method, the notice that this step will go into active user space intercepts so that comes from it The notice of his user's space is not in active user's spatial display.
The above method, due to being intercepted to the notice from other users space so that active user space cannot be shown Show the notice from other users space.
It should be understood that although each step in the flow chart of Fig. 2-8 is shown successively according to the instruction of arrow, These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-8 Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can either the sub-step of other steps or at least part in stage be in turn or alternately with other steps It executes.
Fig. 9 is the polygonal color use device of the terminal of one embodiment of the application, is applied to have at least two user's spaces System, at least two user's space belongs to different and uses role.Described device includes:
Role identification setup module 902, for being respectively provided with role for all the elements at least two user's space Mark;
Privately owned identify and arrange module 904, for being the privately owned exclusive curriculum offering private at least two user's space There is mark;
Hidden processing module 906, for when entering active user space, obtaining and the angle under the active user space Colour code knows corresponding content, is supplied to user's use into active user space, and by the tool in other all user's spaces There is the content of the privately owned mark to make hidden processing in active user space.
The role identification setup module 902 includes in one of the embodiments,:
Given unit, for assigning a role identification for each user's space, and any two role identification is mutually not It is identical;
Setting unit, for being respectively provided with and the same user's space pair to belong to all the elements in same user's space The role identification answered.
The privately owned identify and arrange module 904 includes in one of the embodiments,:
List cell, the setting for starting privately owned exclusive content according to user instruction, and provide in active user space All the elements list;
Selecting unit, for according to the user's choice, the list selection of all the elements out of active user space to be privately owned Exclusive content;
Setting unit, for the privately owned exclusive privately owned mark of curriculum offering of selection.
The hidden processing module 906 includes in one of the embodiments,:
Application acquisition unit has the tagged application of private for obtaining in other users space;
Data capture unit, the data generated for obtaining the application;
Hidden processing unit, for the data of the application and its generation to be carried out hidden processing.
The hidden processing module 906 includes in one of the embodiments,:
Application acquisition unit has the tagged application of private for obtaining in other users space;
Task list acquiring unit, the nearest task list for obtaining active user space;
Task list adjustment unit deletes the list with the tagged application of private from the nearest task list , to cancel the preview in the nearest task list.
The hidden processing module 906 includes in one of the embodiments,:
File obtaining unit has the private for when file management facilities start, obtaining in other users space Tagged file;
Listed files acquiring unit, the file management list for obtaining active user space;
Listed files adjustment unit, for being deleted from the file management list and there is the tagged file of private Corresponding list items, to cancel the display with the tagged file of private in the file management list.
The hidden processing module 906 includes in one of the embodiments,:
Private content acquiring unit has the tagged content of private for obtaining in other users space;
Acquiring unit is notified, for obtaining the notice that there is private tagged content to generate;
Interception unit, for intercepting the notice in active user space.
It may refer to the limit of the polygonal color application method above for terminal about the specific restriction of information processing unit Fixed, details are not described herein.Modules in above- mentioned information processing unit can be fully or partially through software, hardware and combinations thereof To realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also be with soft Part form is stored in the memory in computer equipment, and the corresponding behaviour of the above modules is executed in order to which processor calls Make.
Realizing for modules in the information processing unit provided in the embodiment of the present application can be the shape of computer program Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal Or on the memory of server.When the computer program is executed by processor, terminal described in the embodiment of the present application is realized The step of polygonal color application method.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors When so that the processor executes the step of polygonal color application method of terminal.
A kind of computer program product including instruction, when run on a computer so that computer executes terminal Polygonal color application method.
The embodiment of the present application also provides a kind of terminals.As shown in Figure 10, for convenience of description, it illustrates only and the application The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 10, hand Machine includes:Radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input unit 1030, display unit 1040, Sensor 1050, voicefrequency circuit 1060, Wireless Fidelity (wireless fidelity, WiFi) module 1070, processor 1080, And the equal components of power supply 1090.It will be understood by those skilled in the art that handset structure shown in Fig. 10 is not constituted to mobile phone It limits, may include either combining certain components or different components arrangement than illustrating more or fewer components.
Wherein, RF circuits 1010 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station After downlink information receives, handled to processor 1080;The data of uplink can also be sent to base station.In general, RF circuits include But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 1010 can also be communicated with network and other equipment by radio communication.It is above-mentioned wireless Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, Short message service (Short Messaging Service, SMS) etc..
Memory 1020 can be used for storing software program and module, and processor 1080 is stored in memory by operation 1020 software program and module, to execute various function application and the data processing of mobile phone.Memory 1020 can be led To include program storage area and data storage area, wherein program storage area can storage program area, needed at least one function Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;It data storage area can Storage uses created data (such as audio data, address list etc.) etc. according to mobile phone.In addition, memory 1020 can wrap High-speed random access memory is included, can also include nonvolatile memory, for example, at least disk memory, a flash memories Part or other volatile solid-state parts.
Input unit 1030 can be used for receiving the number or character information of input, and generates and set with the user of mobile phone 1000 It sets and the related key signals of function control inputs.Specifically, input unit 1030 may include operation panel 1031 and other Input equipment 1032.Operation panel 1031, alternatively referred to as touch screen collect user on it or neighbouring touch operation (are compared Such as user is using finger, stylus any suitable object or attachment on operation panel 1031 or near operation panel 1031 Operation), and corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 1031 can Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and examine The signal that touch operation is brought is surveyed, touch controller is transmitted a signal to;Touch controller is received from touch detecting apparatus to be touched Information is touched, and is converted into contact coordinate, then gives processor 1080, and order that processor 1080 is sent can be received and added To execute.Furthermore, it is possible to realize operation panel using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves 1031.In addition to operation panel 1031, input unit 1030 can also include other input equipments 1032.Specifically, other are inputted Equipment 1032 can include but is not limited to one in physical keyboard, function key (such as volume control button, switch key etc.) etc. Kind is a variety of.
Display unit 1040 can be used for showing information input by user or be supplied to user information and mobile phone it is each Kind menu.Display unit 1040 may include display panel 1041.In one embodiment, liquid crystal display may be used (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, ) etc. OLED forms configure display panel 1041.In one embodiment, operation panel 1031 can cover display panel 1041, When operation panel 1031 detects on it or after neighbouring touch operation, processor 1080 is sent to determine touch event Type is followed by subsequent processing device 1080 and provides corresponding visual output on display panel 1041 according to the type of touch event.Although In Fig. 10, operation panel 1031 and display panel 1041 are to realize the input and input of mobile phone as two independent components Function, but in some embodiments it is possible to operation panel 1031 and display panel 1041 are integrated and are realized the input of mobile phone And output function.
Mobile phone 1000 may also include at least one sensor 1050, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to ring The light and shade of border light adjusts the brightness of display panel 1041, and range sensor can close display when mobile phone is moved in one's ear Panel 1041 and/or backlight.Motion sensor may include acceleration transducer, can detect all directions by acceleration transducer The size of upper acceleration can detect that size and the direction of gravity when static, the application that can be used to identify mobile phone posture is (such as horizontal Vertical screen switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, Other sensors such as hygrometer, thermometer, infrared sensor etc..
Voicefrequency circuit 1060, loud speaker 1061 and microphone 1062 can provide the audio interface between user and mobile phone.Sound The transformed electric signal of the audio data received can be transferred to loud speaker 1061 by frequency circuit 1060, by 1061 turns of loud speaker It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1062, by voicefrequency circuit Audio data is converted to after 1060 receptions, then by after the processing of audio data output processor 1080, can be sent out through RF circuits 1010 Another mobile phone is given, or audio data is exported to memory 1020 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 1070 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Figure 10 is shown WiFi module 1070, but it is understood that, and it is not belonging to must be configured into for mobile phone 1000, it can save as needed Slightly.
Processor 1080 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, By running or execute the software program and/or module that are stored in memory 1020, and calls and be stored in memory 1020 Interior data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment, Processor 1080 may include one or more processing units.In one embodiment, processor 1080 can integrate application processor And modem, wherein the main processing operation system of application processor, user interface and application program etc.;Modem Main processing wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 1080.For example, The processor 1080 can integrate application processor and baseband processor, baseband processor with and the composable tune such as other peripheral chips Modulator-demodulator.Mobile phone 1000 further includes the power supply 1090 (such as battery) powered to all parts, it is preferred that power supply can pass through Power-supply management system and processor 1080 are logically contiguous, to realize management charging, electric discharge, Yi Jigong by power-supply management system The functions such as consumption management.
In one embodiment, mobile phone 1000 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory Realize the polygonal color application method of above-mentioned described terminal.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. a kind of polygonal color application method of terminal, it is applied to the system at least two user's spaces, described at least two User's space belongs to different use roles;The method includes:
It is respectively provided with role identification for all the elements at least two user's space;
For the privately owned exclusive privately owned mark of curriculum offering at least two user's space;
When entering active user space, obtains content corresponding with the role identification under the active user space, is supplied to User into active user space uses, and in other all user's spaces will there is the tagged content of private to work as Make hidden processing in preceding user's space.
2. according to the method described in claim 1, it is characterized in that, described is all interior at least two user's space Appearance is respectively provided with role identification, including:
A role identification is assigned for each user's space, and any two role identification is different;
It is respectively provided with role identification corresponding with the same user's space to belong to all the elements in same user's space.
3. according to the method described in claim 1, it is characterized in that, described is privately owned special at least two user's space Belong to the privately owned mark of curriculum offering, including:
Start the setting of privately owned exclusive content according to user instruction, and the list of all the elements in active user space is provided;
According to the user's choice, privately owned exclusive content is chosen in the list of all the elements out of active user space;
For the privately owned exclusive privately owned mark of curriculum offering of selection.
4. according to the method described in claim 1, it is characterized in that, described will have the private in other all user's spaces Tagged content makees hidden processing in active user space, including:
Obtaining in other users space has the tagged application of private;
Obtain the data that the application generates;
The data of the application and its generation are subjected to hidden processing.
5. according to the method described in claim 1, it is characterized in that, described will have the private in other all user's spaces Tagged content makees hidden processing in active user space, including:
Obtaining in other users space has the tagged application of private;
Obtain the nearest task list in active user space;
The list items with the tagged application of private are deleted from the nearest task list, are appointed recently described with cancelling The preview being engaged in list.
6. according to the method described in claim 1, it is characterized in that, described will have the private in other all user's spaces Tagged content makees hidden processing in active user space, including:
When file management facilities start, obtaining in other users space has the tagged file of private;
Obtain the file management list in active user space;
List items corresponding with having the tagged file of private are deleted from the file management list, in the file Cancel the display with the tagged file of private in management list.
7. according to the method described in claim 1, it is characterized in that, described will have the private in other all user's spaces Tagged content makees hidden processing in active user space, including:
Obtaining in other users space has the tagged content of private;
Obtain the notice that there is private tagged content to generate;
The notice is intercepted in active user space.
8. a kind of polygonal color use device of terminal, which is characterized in that including:
Role identification setup module, for being respectively provided with role identification for all the elements at least two user's space;
Privately owned identify and arrange module, for being the privately owned exclusive privately owned mark of curriculum offering at least two user's space;
Hidden processing module, for when entering active user space, obtaining and the role identification under the active user space Corresponding content is supplied to the user into active user space to use, and having in other all user's spaces is described Private tagged content makees hidden processing in active user space.
9. a kind of electronic equipment, including memory and processor, computer program, the computer are stored in the memory When program is executed by the processor so that the processor executes the step of the method as described in any one of claim 1 to 7 Suddenly.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method as described in any one of claim 1 to 7 is realized when being executed by processor.
CN201810317729.XA 2018-04-10 2018-04-10 Multi-role using method and device of terminal and electronic equipment Active CN108549823B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810317729.XA CN108549823B (en) 2018-04-10 2018-04-10 Multi-role using method and device of terminal and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810317729.XA CN108549823B (en) 2018-04-10 2018-04-10 Multi-role using method and device of terminal and electronic equipment

Publications (2)

Publication Number Publication Date
CN108549823A true CN108549823A (en) 2018-09-18
CN108549823B CN108549823B (en) 2020-06-12

Family

ID=63514674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810317729.XA Active CN108549823B (en) 2018-04-10 2018-04-10 Multi-role using method and device of terminal and electronic equipment

Country Status (1)

Country Link
CN (1) CN108549823B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112464186A (en) * 2020-12-01 2021-03-09 广州朗国电子科技有限公司 Application program time-sharing and authority-sharing management method, system, all-in-one machine and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008346A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Method and device for starting privacy mode of data processing device
CN104008313A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Protecting method and device of privacy information
CN104102882A (en) * 2013-04-12 2014-10-15 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008346A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Method and device for starting privacy mode of data processing device
CN104008313A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Protecting method and device of privacy information
CN104102882A (en) * 2013-04-12 2014-10-15 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112464186A (en) * 2020-12-01 2021-03-09 广州朗国电子科技有限公司 Application program time-sharing and authority-sharing management method, system, all-in-one machine and storage medium
CN112464186B (en) * 2020-12-01 2023-11-14 广州朗国电子科技股份有限公司 Application time-sharing and weight-sharing management method, system, all-in-one machine and storage medium

Also Published As

Publication number Publication date
CN108549823B (en) 2020-06-12

Similar Documents

Publication Publication Date Title
CN108521494A (en) Terminal control method and device, readable storage medium storing program for executing, terminal
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN104427074B (en) A kind of methods, devices and systems for showing incoming information
CN103473092B (en) A kind of download the processing method of application, device and terminal unit
CN108537037A (en) Privacy control method and device, computer readable storage medium, terminal
CN107395880B (en) Information display method and device and terminal
CN103501485B (en) Push the method, apparatus and terminal device of application
CN106412093A (en) Method, device and system for uploading data
CN106657329A (en) Mobile terminal as well as notification information control method and device
CN105577532A (en) Application message processing method and device based on keywords, and mobile terminal
CN103491240B (en) A kind of alarm clock ringing method, device and mobile terminal
CN108573168A (en) Private space starts method and apparatus, storage medium, electronic equipment
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
CN108681437A (en) Display methods and device, storage medium, electronic equipment
CN108509788A (en) Information sharing method and device, computer readable storage medium, terminal
CN108537027A (en) Resource allocation methods and device, terminal, computer readable storage medium
CN108549698A (en) Document handling method, device, mobile terminal and computer readable storage medium
CN108733337A (en) Screen display method and device, electronic equipment, computer readable storage medium
CN108632454A (en) Information processing method and device, computer readable storage medium, terminal
CN106713636B (en) Loading method, device and the mobile terminal of image data
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal
WO2019196704A1 (en) Inter-multi-character message notification method and device within terminal, and terminal
CN104571778A (en) Lock screen picture setting method and device
CN109992399A (en) Method for managing resource, device, mobile terminal and computer readable storage medium
CN108055383A (en) Acquisition methods, device and the mobile terminal of screenshot picture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant