CN108549823A - The polygonal color application method and device, electronic equipment of terminal - Google Patents
The polygonal color application method and device, electronic equipment of terminal Download PDFInfo
- Publication number
- CN108549823A CN108549823A CN201810317729.XA CN201810317729A CN108549823A CN 108549823 A CN108549823 A CN 108549823A CN 201810317729 A CN201810317729 A CN 201810317729A CN 108549823 A CN108549823 A CN 108549823A
- Authority
- CN
- China
- Prior art keywords
- space
- user
- private
- active user
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
This application involves the polygonal color application methods and device, electronic equipment, computer readable storage medium of a kind of terminal.This method includes:It is respectively provided with role identification for all the elements at least two user's spaces;For the privately owned exclusive privately owned mark of curriculum offering at least two user's space;When entering active user space, it obtains content corresponding with the role identification under the active user space, be supplied to user's use into active user space, and in other all user's spaces will there is the tagged content of private to make hidden processing in active user space.Content in user's space corresponding with user role can be shown, can the privately owned exclusive content in other users space be subjected to hidden processing again, the content for avoiding getting other users space by the system function of high permission in active user space, leads to the privacy leakage in other users space.
Description
Technical field
This application involves field of terminal technology, more particularly to the polygonal color application method and device, electronics of a kind of terminal
Equipment, computer readable storage medium.
Background technology
As terminal device enters the intelligent epoch, the mobile terminals such as mobile phone, communication tablet are played the part of more in people's lives
Carry out more important role.By various software applications, people can be met in social, shopping, amusement, work, study etc.
Different demands.
Currently, the polygonal color of intelligent terminal using more and more common, how to prevent the privacy content between polygonal color reveal at
For important problem.
Invention content
The embodiment of the present application provides a kind of polygonal color application method of terminal, device, electronic equipment, computer-readable storage
Medium, can be to avoid getting the content in other users space in active user space.
A kind of polygonal color application method of terminal, be applied to at least two user's spaces system, described at least two
A user's space belongs to different use roles;The method includes:
It is respectively provided with role identification for all the elements at least two user's space;
For the privately owned exclusive privately owned mark of curriculum offering at least two user's space;
When entering active user space, obtains content corresponding with the role identification under the active user space, carries
The user for being fed into active user space uses, and will have the tagged content of private in other all user's spaces
Make hidden processing in active user space.
A kind of polygonal color use device of terminal, including:
Role identification setup module, for being respectively provided with role's mark for all the elements at least two user's space
Know;
Privately owned identify and arrange module, for being the privately owned exclusive privately owned mark of curriculum offering at least two user's space
Know;
Hidden processing module, for when entering active user space, obtaining and the role under the active user space
It identifies corresponding content, be supplied to user's use into active user space, and by having in other all user's spaces
The tagged content of private makees hidden processing in active user space.
A kind of electronic equipment, including memory and processor store computer program, the calculating in the memory
When machine program is executed by the processor so that the processor executes the step of method described in the embodiment of the present application.
A kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in the embodiment of the present application is realized when being executed by processor.
The polygonal color application method and device, computer readable storage medium, electricity for the terminal that the embodiment of the present application is provided
Sub- equipment, by for curriculum offering role identification so that content in user's space can displaying corresponding with user role, simultaneously
By for the privately owned mark of curriculum offering, and can the privately owned exclusive content in other users space be subjected to hidden processing, avoided
The content for getting other users space by the system function of high permission in active user space, leads to other users space
Privacy leakage.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 2 is the flow chart of the polygonal color application method of terminal in one embodiment;
Fig. 3 is the flow chart that role identification is arranged in one embodiment;
Fig. 4 is that private tagged flow chart is arranged in one embodiment;
Fig. 5 is a kind of hidden processing method flow diagram in one embodiment;
Fig. 6 is the hidden processing method flow diagram of another kind in one embodiment;
Fig. 7 is another hidden processing method flow diagram in one embodiment;
Fig. 8 is another hidden processing method flow diagram in one embodiment;
Fig. 9 is the structure diagram of the polygonal color use device of the terminal of an embodiment;
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe herein various elements,
But these elements should not be limited by these terms.These terms are only used to distinguish first element and another element.Citing comes
It says, without departing from the scope of the invention, the first user's space can be known as second user space, and similarly,
Second user space can be known as to the first user's space.First user's space and second user space both user's space,
But it is not same user's space.
In one embodiment, as shown in Figure 1, providing a kind of internal structure schematic diagram of terminal.The terminal includes logical
Cross processor, memory and the display screen of system bus connection.Wherein, the processor is for providing calculating and control ability, branch
Support the operation of entire terminal.Memory for storing data, program, and/or instruction code etc., stored on memory at least one
Computer program, the computer program can be executed by processor, to realize that is provided in the embodiment of the present application is suitable for terminal
Polygonal color application method.Memory may include that magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. are non-
Volatile storage medium or random access memory (Random-Access-Memory, RAM) etc..For example, in one embodiment
In, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system, database
And computer program.A kind of polygonal color of the terminal provided for realizing above each embodiment is stored in the database to be made
With the relevant data of method, for example default processing strategy or default verification information can be stored etc..The computer program can be handled
Performed by device, for realizing a kind of polygonal color application method of terminal that each embodiment of the application is provided.Built-in storage
The running environment of cache is provided for operating system, database and the computer program in non-volatile memory medium.Display
Screen can be touch screen, for example be capacitance plate or electrical screen, be used for the interface information of display terminal.The terminal can be mobile phone,
Tablet computer or personal digital assistant or Wearable etc..
The polygonal color application method of terminal in the present embodiment, is described for running in terminal.The terminal
Polygonal color application method be applied to the system at least two user's spaces, at least two user's space belongs to different
Use role.
In the application, system refers to the operating system of terminal.The operating system provides the function in multi-user or more spaces, makes
A terminal can open up multiple spaces by multiple user time-sharings use or a user under different situations enter not
Same space uses.By not distinguishing multiple spaces of the space of different user and same user are collectively referred to as in the application
User's space.When same user uses different user's spaces, it is also considered as it and uses role with different.Use situation packet
It includes but is not limited to:
One terminal has more than two users, each with opening a user for belonging to itself in systems per family
Space, such as children's spatial, visitor space etc.;One terminal only has there are one user, which opens in systems belongs to
In the more than two user's spaces of itself, such as the principal space and private space;One terminal has more than two users, often
It is a also additionally to have one with opening user's space that one belongs to itself or wherein at least one user in systems per family
A one's own private space.
For the system in multi-user or more spaces is provided, user when first used, in system it is general only there are one
Space (commonly referred to as owner space is used to owner, has highest permission).When need to multi-user use or open up more
Space is in use, need to create user's space in systems.Other than owner space, there is life in other user's spaces
Period, the life cycle start from establishment, destroy finally.Between establishment and destruction is then the survival stage.
, at least can be in operating status there are one user's space in multiple user's spaces and the system deposited, other spaces can
To be in running background or not running.During system use, bottom function is generally configured with all users in management system
The permission of space content.Such as multitask function, file management facilities etc., belonging to the content of different user can be managed.
Such as the video seen in private space, when using nearest task list in owner space, which appears in recently
In task list, and the frame preview content that history plays can be seen.Although cannot be accessed after selection, preview content foot
To expose privacy of user.Such as file management facilities again can manage the file of all users below system.Other users
The inaccessible file in space by it is a kind of cannot read in a manner of present, usually preserved in a manner of plus invalid suffix etc..But
This cannot tackle the problem at its root, and on the basis of obtaining this document, its content still can be obtained using certain means.
The polygonal color application method of the terminal of one embodiment of the application includes step 202 to step 206.This method is applied to
System at least two user's spaces.
Step 202:It is respectively provided with role identification for all the elements at least two user's space.
Content in user's space may include apply, data, setting, interface, user's space itself etc..Using for example
Social networking application, game application, Video Applications, reading application etc..Data such as short message content, audio file, video file, text
Shelves, contact person etc..Setting such as hot spot setting, multi-user's setting, Bluetooth transmission setting etc.;Interface such as desktop background,
Account login interface etc..User's space such as owner space, private space, children's spatial.When being related to multi-user, multiple users
Same application also belong to different contents.
Role identification is for indicating a user's space is used for what role.As previously mentioned, same user is not using
When isospace, it may have different roles.Role can easily illustrate the right to use that the owner of the user's space has
Limit.Such as children's spatial, visitor space etc., role is respectively suitable for children and visitor, in using terminal, can only just use
The function of permission suitable for the role.Role identification is just used to indicate the role.The role can be provided previously by system,
It selects to use to user when newly-built user's space;It can also be by being obtained after user's self-defining and configuration permission.The permission of configuration
May include system function permission, the access right of application, access right of data etc..
After content is configured role identification, so that it may to determine that the user in active user space can use in much permissions
The content and whether can use the content.
Normally, it can automatically be role mark of all the elements setting in same user's space corresponding to the user's space
Know.As shown in figure 3, the step may include:
Step 302:A role identification is assigned for each user's space, and any two role identification is different.
Normally, when establishing user's space, role identification is distributed for user's space.Wherein, owner space belongs to the resident sky of system
Between, life cycle is not present.Its role identification is endowed as owner role, has highest permission.Other users space
To be obtained by newly-built, newly-built user's space may belong to same already present user, can also belong to new user, that is, exist
User's space is created while newly-built user.In newly-built user's space, pre-configured role is assigned to the newly-built use
Family space, the role are indicated and are quoted using a unique role identification.
Step 304:For belong to all the elements in same user's space be respectively provided with it is corresponding with the same user's space
Role identification.
All the elements in same user's space include all application, data, setting, interface, user's space itself etc.
Deng.Such as all application, data, setting, interface in owner space, used unique angle corresponding with the owner space
Colour code knowledge is marked.
After the completion of label, so that it may with determine active user space user can in much permissions using the content with
And whether can use the content.
Such as owner's role identification, private space is used to use privacy role identification in owner space.In owner space
All applications, data, setting, interface carry owner's role identification, all applications in private space, are set data
It sets, interface carries privacy role identification.When being respectively at owner space and private space with a chat application A, it is exactly
Include two chat application A simultaneously:Chat application A (owner's role identification), chat application A (privacy role identification).
By above-mentioned processing, the different role of same money application division different can be answered to finally divide into two
With.
Step 204:For the privately owned exclusive privately owned mark of curriculum offering at least two user's space.
Privately owned exclusive content is the subset of user's space content, equally can be apply, data, setting, interface, Yong Hukong
Between itself etc..Using such as social networking application, game application, Video Applications, reading application etc..Data such as short message content,
Audio file, video file, document, contact person etc..Setting is such as hot spot setting, multi-user's setting, Bluetooth transmission setting
Deng;Interface is such as desktop background, account login interface.User's space such as owner space, private space, children's spatial.
Privately owned exclusive content carries user-specific, usually embodies the privacy requirements of user.Normally, it is by user Lai Ding
Which adopted content belongs to privately owned exclusive content.As shown in figure 4, the step may include:
Step 402:Start the setting of privately owned exclusive content according to user instruction, and provides all in active user space
The list of content.
Under active user space, the setting of privately owned exclusive content is initiated by owning user.Each user's space belongs to
One user, a user can use more than two user's spaces.When user enters a user's space, can be should
User's space specifies privately owned exclusive content namely the privately owned exclusive content of assigned role.According to system provide inlet porting, by
User initiates setting instruction.All the elements in active user space are then presented to the user according to setting instruction by system, for
Family selects.The mode of presentation can be that list is presented, or is presented after further being classified.Such as according to application, data,
Setting, interface, user's space itself etc. are classified.
Step 404:According to the user's choice, the list of all the elements out of active user space is chosen privately owned exclusive interior
Hold.System provide all the elements list when, also provide content it is whether selected be marked for user interaction.For by user
It is expressed as selected after interaction, forms the privately owned exclusive contents list of selection.The selection can refer to sizing selection, i.e. basis
The specified content of selection forms privately owned exclusive contents list;It can also be the selection of exclusion type, i.e., formed after excluding selection content
Privately owned exclusive contents list.
Step 406:For the privately owned exclusive privately owned mark of curriculum offering of selection.
Privately owned mark is for indicating whether a content is specific to a role.As previously mentioned, same user is not using
When isospace, it may have different roles is also different application when being in different user's spaces with a application.
After content is configured privately owned mark, so that it may only have the user in active user space that can use the content to determine.
Step 206:When entering active user space, obtain corresponding with the role identification under the active user space
Content, be supplied into active user space user use, and will in other all user's spaces have the privately owned mark
The content of knowledge makees hidden processing in active user space.
Active user's space representation is in the user's space of front stage operation, for servicing current user, such as owner's sky
Between.Other users space includes all user's spaces opened up in the system of terminal, such as private space.May include working as
Preceding user's space in backstage and the user's space not run.
At statement " entering active user space ", the user's space indicated entry into is exactly active user space.By obtaining
The content with the role identification under active user space is taken, the user for providing it to active user space uses so that when
The user of front space can use role-security.
Content in other users space, in some cases, even if it cannot access, but still can be in active user's sky
Between it is visible.And if after being configured privately owned mark, active user space will in other spaces have the private it is tagged
Content makees hidden processing, keeps its invisible.May include nearest task list with the hidden processing of the tagged content of private
In hide, the hiding of file, application and its data are hidden etc..
The polygonal color application method of above-mentioned terminal, by for curriculum offering role identification so that interior in user's space
Hold and correspondings with user role can show, while by for the privately owned mark of curriculum offering, and can will be in other users space
Privately owned exclusive content carries out hidden processing, avoids getting other use by the system function of high permission in active user space
The content in family space leads to the privacy leakage in other users space.
In one embodiment, it as shown in figure 5, when entering active user space, obtains and the active user space
Under the corresponding content of role identification, be supplied to user's use into active user space, and by other all user's spaces
Interior has the step of tagged content of private makees hidden processing in active user space, i.e., step 206 may include
Following steps:
Step 502:Obtaining in other users space has the tagged application of private.The present embodiment using apply as
Target is dealt with objects.May include system application using being functional programs that system upper layer is supplied to user, such as phone,
Short message, clock etc. can also include tripartite's application, such as social networking application, reading application etc..After the processing of above-mentioned steps 204, when
All the elements in preceding user's space are selectively provided with privately owned mark, wherein including just to be provided with private tagged answer
With.
Step 504:Obtain the data that the application generates.Using will produce the number for belonging to application during use
According to.Such as the application has an account, each account has some about the setting data of application, content-data etc., in order to
Different users is logging in using this in application, these data can be utilized to provide more personalized use body for account user
It tests.After obtaining with private tagged application, the data of application are also obtained.
Step 506:The data of the application and its generation are subjected to hidden processing.May include using hidden processing is carried out
The startup entrance (such as application icon) of application is hidden, the installation file of application is hidden, and by application
Data file is hidden.Or by the installation file of application be set as the Authority Verification under current spatial view access and can
See.
In the above method, due to carrying out selective processing to application, can by other users space application and its number
According to hiding for static state is carried out, application and its data that other users space is got by active user space are prevented.
In actual use, system bottom function can manage the use trace of application, this can lead to different user
Space gets the use trace in other users space when using the system bottom function.In one embodiment, such as Fig. 6 institutes
Show, it is described when entering active user space, content corresponding with the role identification under the active user space, offer are provided
It is used to the user for entering active user space, and in other all user's spaces will there is the tagged content of private to exist
The step of making hidden processing in active user space, i.e., step 206 may comprise steps of:
Step 602:Obtaining in other users space has the tagged application of private.The present embodiment using apply as
Target is dealt with objects.May include system application using being functional programs that system upper layer is supplied to user, such as phone,
Short message, clock etc. can also include tripartite's application, such as social networking application, reading application, Video Applications, browser etc..Above-mentioned
After step 204 processing, all the elements in active user space are selectively provided with privately owned mark, wherein including just to set
Private tagged application is set.
Step 604:Obtain the nearest task list in active user space.Nearest task list is system bottom function, is used
In the currently running applicable cases in the record system of backstage.By recording service condition, cooperation caching mechanism not only can be most
Installed System Memory is utilized to big degree, and can accomplish quickly to start and switch related application.Terminal, which provides, enters this nearest
The entrance of business list, after user enters from the entrance, system will transfer the nearest task list to complete visually to arrange
Table content displaying.
Step 606:The list items with the tagged application of private are deleted from the nearest task list, to cancel
Preview in the nearest task list.
After user enters from the entrance, system will transfer the nearest task list to complete visual list content
Displaying (being typically using the historical content frame of application as preview).This step from nearest task list by deleting with described
The list items of private tagged application can be let out to avoid the privacy with private tagged exclusive application in other users space
Dew.
It, can be by the dynamic of the application in other users space due to carrying out selective processing to application in the above method
It is hidden using trace, prevents the application for getting other users space by system bottom function by active user space
Some use informations.
In actual use, system bottom function, such as file management facilities can manage all file datas,
This can cause different user space to get the file in other users space when using the system bottom function (although cannot lead to
Cross normal mode opening).In one embodiment, as shown in fig. 7, it is described when enter active user space when, obtain with it is described
The corresponding content of role identification under active user space is supplied to user's use into active user space, and by other
There is the step of tagged content of private makees hidden processing in active user space, i.e. step in all user's spaces
206 may comprise steps of:
Step 702:When file management facilities start, obtaining in other users space has the tagged text of private
Part.The present embodiment is dealt with objects using file as target.File is usually the particular memory form of data, such as audio file,
Video file, document files etc..After the processing of above-mentioned steps 204, all the elements in active user space are selectively set
Privately owned mark is set, wherein including just to be provided with private tagged file.
Step 704:Obtain the file management list in active user space.File management list is system bottom function, is used
In providing visual package management file to the user.File management based on catalogue and the file based on type would generally be provided
Management.File management based on catalogue can get the All Files that the storage path in memory according to file provides;Base
It in the file management of type, can be classified according to the general type of file, not have to provide file path in displaying.No matter
Which kind of file management mode, the file being required in scanning system form file management list, then basis according to its attribute
List is shown.
Step 706:List items corresponding with having the tagged file of private are deleted from the file management list,
To cancel the display with the tagged file of private in the file management list.
When user's startup file management function, file management list is to form the basis of displaying.This step from comprising institute
List items corresponding with having the tagged file of private are deleted in documentary file management list, you can in file management
Do not occur the privately owned exclusive content in other users space in function.
The above method can carry out the file in other users space static due to carrying out selective processing to file
Hide, prevent the file that other users space is got by active user space.
In actual use, when other users space is in running background, notice is will produce, multi-user system is usual
The notice in background user space is allowed to be sent out in active user space, this can cause active user space to get other users sky
Between information.In one embodiment, as shown in figure 8, it is described when entering active user space, it obtains and the active user
The corresponding content of role identification under space is supplied to user's use into active user space, and by other all users
There is the tagged content of private the step of making hidden processing in active user space in space, i.e. step 206 can be with
Include the following steps:
Step 802:Obtaining in other users space has the tagged content of private.The present embodiment is with each of system
Kind content is dealt with objects as target, such as application, data, interface, setting and user's space itself etc..In above-mentioned steps
After 204 processing, all the elements in active user space are selectively provided with privately owned mark.
Step 804:Obtain the notice that there is private tagged content to generate.It can be because generating new thing in system
Part, receives new push, incoming call, short message etc. and needs to give notice application state change, to remind user.Traditional is applied alone
Notifying for family is fairly simple and direct, for example, incoming call after call interface is directly presented, receive short message after send out short message sound or
Short message content, chat application is directly presented even message content can also directly occurs in locking screen interface or notification bar.Polygonal color
Between message informing, can will notify to be presented on active user space by the application run in the user's space on backstage
In.
Step 806:The notice is intercepted in active user space.
Different from conventional method, the notice that this step will go into active user space intercepts so that comes from it
The notice of his user's space is not in active user's spatial display.
The above method, due to being intercepted to the notice from other users space so that active user space cannot be shown
Show the notice from other users space.
It should be understood that although each step in the flow chart of Fig. 2-8 is shown successively according to the instruction of arrow,
These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-8
Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can either the sub-step of other steps or at least part in stage be in turn or alternately with other steps
It executes.
Fig. 9 is the polygonal color use device of the terminal of one embodiment of the application, is applied to have at least two user's spaces
System, at least two user's space belongs to different and uses role.Described device includes:
Role identification setup module 902, for being respectively provided with role for all the elements at least two user's space
Mark;
Privately owned identify and arrange module 904, for being the privately owned exclusive curriculum offering private at least two user's space
There is mark;
Hidden processing module 906, for when entering active user space, obtaining and the angle under the active user space
Colour code knows corresponding content, is supplied to user's use into active user space, and by the tool in other all user's spaces
There is the content of the privately owned mark to make hidden processing in active user space.
The role identification setup module 902 includes in one of the embodiments,:
Given unit, for assigning a role identification for each user's space, and any two role identification is mutually not
It is identical;
Setting unit, for being respectively provided with and the same user's space pair to belong to all the elements in same user's space
The role identification answered.
The privately owned identify and arrange module 904 includes in one of the embodiments,:
List cell, the setting for starting privately owned exclusive content according to user instruction, and provide in active user space
All the elements list;
Selecting unit, for according to the user's choice, the list selection of all the elements out of active user space to be privately owned
Exclusive content;
Setting unit, for the privately owned exclusive privately owned mark of curriculum offering of selection.
The hidden processing module 906 includes in one of the embodiments,:
Application acquisition unit has the tagged application of private for obtaining in other users space;
Data capture unit, the data generated for obtaining the application;
Hidden processing unit, for the data of the application and its generation to be carried out hidden processing.
The hidden processing module 906 includes in one of the embodiments,:
Application acquisition unit has the tagged application of private for obtaining in other users space;
Task list acquiring unit, the nearest task list for obtaining active user space;
Task list adjustment unit deletes the list with the tagged application of private from the nearest task list
, to cancel the preview in the nearest task list.
The hidden processing module 906 includes in one of the embodiments,:
File obtaining unit has the private for when file management facilities start, obtaining in other users space
Tagged file;
Listed files acquiring unit, the file management list for obtaining active user space;
Listed files adjustment unit, for being deleted from the file management list and there is the tagged file of private
Corresponding list items, to cancel the display with the tagged file of private in the file management list.
The hidden processing module 906 includes in one of the embodiments,:
Private content acquiring unit has the tagged content of private for obtaining in other users space;
Acquiring unit is notified, for obtaining the notice that there is private tagged content to generate;
Interception unit, for intercepting the notice in active user space.
It may refer to the limit of the polygonal color application method above for terminal about the specific restriction of information processing unit
Fixed, details are not described herein.Modules in above- mentioned information processing unit can be fully or partially through software, hardware and combinations thereof
To realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also be with soft
Part form is stored in the memory in computer equipment, and the corresponding behaviour of the above modules is executed in order to which processor calls
Make.
Realizing for modules in the information processing unit provided in the embodiment of the present application can be the shape of computer program
Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal
Or on the memory of server.When the computer program is executed by processor, terminal described in the embodiment of the present application is realized
The step of polygonal color application method.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When so that the processor executes the step of polygonal color application method of terminal.
A kind of computer program product including instruction, when run on a computer so that computer executes terminal
Polygonal color application method.
The embodiment of the present application also provides a kind of terminals.As shown in Figure 10, for convenience of description, it illustrates only and the application
The relevant part of embodiment, particular technique details do not disclose, please refer to the embodiment of the present application method part.The terminal can be
Including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of
Sales, point-of-sale terminal), vehicle-mounted computer, the arbitrary terminal device such as Wearable, by taking terminal is mobile phone as an example:
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 10, hand
Machine includes:Radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input unit 1030, display unit 1040,
Sensor 1050, voicefrequency circuit 1060, Wireless Fidelity (wireless fidelity, WiFi) module 1070, processor 1080,
And the equal components of power supply 1090.It will be understood by those skilled in the art that handset structure shown in Fig. 10 is not constituted to mobile phone
It limits, may include either combining certain components or different components arrangement than illustrating more or fewer components.
Wherein, RF circuits 1010 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station
After downlink information receives, handled to processor 1080;The data of uplink can also be sent to base station.In general, RF circuits include
But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier,
LNA), duplexer etc..In addition, RF circuits 1010 can also be communicated with network and other equipment by radio communication.It is above-mentioned wireless
Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of
Mobile communication, GSM), general packet radio service (General Packet Radio Service,
GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code
Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email,
Short message service (Short Messaging Service, SMS) etc..
Memory 1020 can be used for storing software program and module, and processor 1080 is stored in memory by operation
1020 software program and module, to execute various function application and the data processing of mobile phone.Memory 1020 can be led
To include program storage area and data storage area, wherein program storage area can storage program area, needed at least one function
Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;It data storage area can
Storage uses created data (such as audio data, address list etc.) etc. according to mobile phone.In addition, memory 1020 can wrap
High-speed random access memory is included, can also include nonvolatile memory, for example, at least disk memory, a flash memories
Part or other volatile solid-state parts.
Input unit 1030 can be used for receiving the number or character information of input, and generates and set with the user of mobile phone 1000
It sets and the related key signals of function control inputs.Specifically, input unit 1030 may include operation panel 1031 and other
Input equipment 1032.Operation panel 1031, alternatively referred to as touch screen collect user on it or neighbouring touch operation (are compared
Such as user is using finger, stylus any suitable object or attachment on operation panel 1031 or near operation panel 1031
Operation), and corresponding attachment device is driven according to preset formula.In one embodiment, operation panel 1031 can
Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and examine
The signal that touch operation is brought is surveyed, touch controller is transmitted a signal to;Touch controller is received from touch detecting apparatus to be touched
Information is touched, and is converted into contact coordinate, then gives processor 1080, and order that processor 1080 is sent can be received and added
To execute.Furthermore, it is possible to realize operation panel using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
1031.In addition to operation panel 1031, input unit 1030 can also include other input equipments 1032.Specifically, other are inputted
Equipment 1032 can include but is not limited to one in physical keyboard, function key (such as volume control button, switch key etc.) etc.
Kind is a variety of.
Display unit 1040 can be used for showing information input by user or be supplied to user information and mobile phone it is each
Kind menu.Display unit 1040 may include display panel 1041.In one embodiment, liquid crystal display may be used
(Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode,
) etc. OLED forms configure display panel 1041.In one embodiment, operation panel 1031 can cover display panel 1041,
When operation panel 1031 detects on it or after neighbouring touch operation, processor 1080 is sent to determine touch event
Type is followed by subsequent processing device 1080 and provides corresponding visual output on display panel 1041 according to the type of touch event.Although
In Fig. 10, operation panel 1031 and display panel 1041 are to realize the input and input of mobile phone as two independent components
Function, but in some embodiments it is possible to operation panel 1031 and display panel 1041 are integrated and are realized the input of mobile phone
And output function.
Mobile phone 1000 may also include at least one sensor 1050, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor may include ambient light sensor and range sensor, wherein ambient light sensor can be according to ring
The light and shade of border light adjusts the brightness of display panel 1041, and range sensor can close display when mobile phone is moved in one's ear
Panel 1041 and/or backlight.Motion sensor may include acceleration transducer, can detect all directions by acceleration transducer
The size of upper acceleration can detect that size and the direction of gravity when static, the application that can be used to identify mobile phone posture is (such as horizontal
Vertical screen switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer,
Other sensors such as hygrometer, thermometer, infrared sensor etc..
Voicefrequency circuit 1060, loud speaker 1061 and microphone 1062 can provide the audio interface between user and mobile phone.Sound
The transformed electric signal of the audio data received can be transferred to loud speaker 1061 by frequency circuit 1060, by 1061 turns of loud speaker
It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1062, by voicefrequency circuit
Audio data is converted to after 1060 receptions, then by after the processing of audio data output processor 1080, can be sent out through RF circuits 1010
Another mobile phone is given, or audio data is exported to memory 1020 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 1070
Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Figure 10 is shown
WiFi module 1070, but it is understood that, and it is not belonging to must be configured into for mobile phone 1000, it can save as needed
Slightly.
Processor 1080 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone,
By running or execute the software program and/or module that are stored in memory 1020, and calls and be stored in memory 1020
Interior data execute the various functions and processing data of mobile phone, to carry out whole monitoring to mobile phone.In one embodiment,
Processor 1080 may include one or more processing units.In one embodiment, processor 1080 can integrate application processor
And modem, wherein the main processing operation system of application processor, user interface and application program etc.;Modem
Main processing wireless communication.It is understood that above-mentioned modem can not also be integrated into processor 1080.For example,
The processor 1080 can integrate application processor and baseband processor, baseband processor with and the composable tune such as other peripheral chips
Modulator-demodulator.Mobile phone 1000 further includes the power supply 1090 (such as battery) powered to all parts, it is preferred that power supply can pass through
Power-supply management system and processor 1080 are logically contiguous, to realize management charging, electric discharge, Yi Jigong by power-supply management system
The functions such as consumption management.
In one embodiment, mobile phone 1000 can also include camera, bluetooth module etc..
In the embodiment of the present application, when the processor included by the mobile phone executes the computer program of storage on a memory
Realize the polygonal color application method of above-mentioned described terminal.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile
And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM),
Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access
Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as
It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced
SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
Each technical characteristic of embodiment described above can be combined arbitrarily, to keep description succinct, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, it is all considered to be the range of this specification record.
Several embodiments of the invention above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection of the present invention
Range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. a kind of polygonal color application method of terminal, it is applied to the system at least two user's spaces, described at least two
User's space belongs to different use roles;The method includes:
It is respectively provided with role identification for all the elements at least two user's space;
For the privately owned exclusive privately owned mark of curriculum offering at least two user's space;
When entering active user space, obtains content corresponding with the role identification under the active user space, is supplied to
User into active user space uses, and in other all user's spaces will there is the tagged content of private to work as
Make hidden processing in preceding user's space.
2. according to the method described in claim 1, it is characterized in that, described is all interior at least two user's space
Appearance is respectively provided with role identification, including:
A role identification is assigned for each user's space, and any two role identification is different;
It is respectively provided with role identification corresponding with the same user's space to belong to all the elements in same user's space.
3. according to the method described in claim 1, it is characterized in that, described is privately owned special at least two user's space
Belong to the privately owned mark of curriculum offering, including:
Start the setting of privately owned exclusive content according to user instruction, and the list of all the elements in active user space is provided;
According to the user's choice, privately owned exclusive content is chosen in the list of all the elements out of active user space;
For the privately owned exclusive privately owned mark of curriculum offering of selection.
4. according to the method described in claim 1, it is characterized in that, described will have the private in other all user's spaces
Tagged content makees hidden processing in active user space, including:
Obtaining in other users space has the tagged application of private;
Obtain the data that the application generates;
The data of the application and its generation are subjected to hidden processing.
5. according to the method described in claim 1, it is characterized in that, described will have the private in other all user's spaces
Tagged content makees hidden processing in active user space, including:
Obtaining in other users space has the tagged application of private;
Obtain the nearest task list in active user space;
The list items with the tagged application of private are deleted from the nearest task list, are appointed recently described with cancelling
The preview being engaged in list.
6. according to the method described in claim 1, it is characterized in that, described will have the private in other all user's spaces
Tagged content makees hidden processing in active user space, including:
When file management facilities start, obtaining in other users space has the tagged file of private;
Obtain the file management list in active user space;
List items corresponding with having the tagged file of private are deleted from the file management list, in the file
Cancel the display with the tagged file of private in management list.
7. according to the method described in claim 1, it is characterized in that, described will have the private in other all user's spaces
Tagged content makees hidden processing in active user space, including:
Obtaining in other users space has the tagged content of private;
Obtain the notice that there is private tagged content to generate;
The notice is intercepted in active user space.
8. a kind of polygonal color use device of terminal, which is characterized in that including:
Role identification setup module, for being respectively provided with role identification for all the elements at least two user's space;
Privately owned identify and arrange module, for being the privately owned exclusive privately owned mark of curriculum offering at least two user's space;
Hidden processing module, for when entering active user space, obtaining and the role identification under the active user space
Corresponding content is supplied to the user into active user space to use, and having in other all user's spaces is described
Private tagged content makees hidden processing in active user space.
9. a kind of electronic equipment, including memory and processor, computer program, the computer are stored in the memory
When program is executed by the processor so that the processor executes the step of the method as described in any one of claim 1 to 7
Suddenly.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method as described in any one of claim 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810317729.XA CN108549823B (en) | 2018-04-10 | 2018-04-10 | Multi-role using method and device of terminal and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810317729.XA CN108549823B (en) | 2018-04-10 | 2018-04-10 | Multi-role using method and device of terminal and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108549823A true CN108549823A (en) | 2018-09-18 |
CN108549823B CN108549823B (en) | 2020-06-12 |
Family
ID=63514674
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810317729.XA Active CN108549823B (en) | 2018-04-10 | 2018-04-10 | Multi-role using method and device of terminal and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108549823B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112464186A (en) * | 2020-12-01 | 2021-03-09 | 广州朗国电子科技有限公司 | Application program time-sharing and authority-sharing management method, system, all-in-one machine and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104008346A (en) * | 2013-02-27 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Method and device for starting privacy mode of data processing device |
CN104008313A (en) * | 2013-02-27 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Protecting method and device of privacy information |
CN104102882A (en) * | 2013-04-12 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Protection method and device for privacy data of application program |
-
2018
- 2018-04-10 CN CN201810317729.XA patent/CN108549823B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104008346A (en) * | 2013-02-27 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Method and device for starting privacy mode of data processing device |
CN104008313A (en) * | 2013-02-27 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Protecting method and device of privacy information |
CN104102882A (en) * | 2013-04-12 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Protection method and device for privacy data of application program |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112464186A (en) * | 2020-12-01 | 2021-03-09 | 广州朗国电子科技有限公司 | Application program time-sharing and authority-sharing management method, system, all-in-one machine and storage medium |
CN112464186B (en) * | 2020-12-01 | 2023-11-14 | 广州朗国电子科技股份有限公司 | Application time-sharing and weight-sharing management method, system, all-in-one machine and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108549823B (en) | 2020-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108521494A (en) | Terminal control method and device, readable storage medium storing program for executing, terminal | |
CN108536783A (en) | Data processing method and device, terminal, computer readable storage medium | |
CN104427074B (en) | A kind of methods, devices and systems for showing incoming information | |
CN103473092B (en) | A kind of download the processing method of application, device and terminal unit | |
CN108537037A (en) | Privacy control method and device, computer readable storage medium, terminal | |
CN107395880B (en) | Information display method and device and terminal | |
CN103501485B (en) | Push the method, apparatus and terminal device of application | |
CN106412093A (en) | Method, device and system for uploading data | |
CN106657329A (en) | Mobile terminal as well as notification information control method and device | |
CN105577532A (en) | Application message processing method and device based on keywords, and mobile terminal | |
CN103491240B (en) | A kind of alarm clock ringing method, device and mobile terminal | |
CN108573168A (en) | Private space starts method and apparatus, storage medium, electronic equipment | |
CN108573169A (en) | Nearest task list display methods and device, storage medium, electronic equipment | |
CN108681437A (en) | Display methods and device, storage medium, electronic equipment | |
CN108509788A (en) | Information sharing method and device, computer readable storage medium, terminal | |
CN108537027A (en) | Resource allocation methods and device, terminal, computer readable storage medium | |
CN108549698A (en) | Document handling method, device, mobile terminal and computer readable storage medium | |
CN108733337A (en) | Screen display method and device, electronic equipment, computer readable storage medium | |
CN108632454A (en) | Information processing method and device, computer readable storage medium, terminal | |
CN106713636B (en) | Loading method, device and the mobile terminal of image data | |
CN108537058A (en) | The polygonal color application method and device, computer readable storage medium, terminal of terminal | |
WO2019196704A1 (en) | Inter-multi-character message notification method and device within terminal, and terminal | |
CN104571778A (en) | Lock screen picture setting method and device | |
CN109992399A (en) | Method for managing resource, device, mobile terminal and computer readable storage medium | |
CN108055383A (en) | Acquisition methods, device and the mobile terminal of screenshot picture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |