CN111580730B - Background display method of application program, electronic device and storage medium - Google Patents

Background display method of application program, electronic device and storage medium Download PDF

Info

Publication number
CN111580730B
CN111580730B CN202010357162.6A CN202010357162A CN111580730B CN 111580730 B CN111580730 B CN 111580730B CN 202010357162 A CN202010357162 A CN 202010357162A CN 111580730 B CN111580730 B CN 111580730B
Authority
CN
China
Prior art keywords
application
privacy
interface
background
display interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010357162.6A
Other languages
Chinese (zh)
Other versions
CN111580730A (en
Inventor
张宝全
宋程龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ireader Technology Co Ltd
Original Assignee
Ireader Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ireader Technology Co Ltd filed Critical Ireader Technology Co Ltd
Priority to CN202010357162.6A priority Critical patent/CN111580730B/en
Publication of CN111580730A publication Critical patent/CN111580730A/en
Application granted granted Critical
Publication of CN111580730B publication Critical patent/CN111580730B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Abstract

The invention discloses a background display method of an application program, electronic equipment and a storage medium, wherein the method comprises the following steps: responding to a background running switching instruction aiming at the application, and generating a background running state identifier; traversing each interface element in a current display interface of the application, and acquiring an attribute label of each interface element; according to the background running state identification, drawing a hidden masking layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface; carrying out screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application; switching the application to a background operation; and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application. In the mode, the drawing hiding layer is used for shading the appointed information needing to be hidden, the flexibility is higher, the problem of information leakage can be avoided, and a user can conveniently check the information needing not to be hidden.

Description

Background display method of application program, electronic device and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a background display method of an application program, electronic equipment and a storage medium.
Background
In the process of switching the application to the background operation, the terminal system firstly captures the current displayed interface of the application and stores the screenshot, and then switches the application to the background operation. When a user views an application running in the background of the current system, the terminal system displays an interface screenshot of the application when the application is switched to the background to the user in a list layout mode.
However, the inventor finds out in the process of implementing the invention that: when the application program is switched to the background running processing mode, screenshot needs to be performed on the display interface of the application, and user information can be displayed in the display interface, so that the problem of user information leakage can be caused.
Disclosure of Invention
In view of the above, the present invention has been made to provide a background display method of an application, an electronic device, and a storage medium that overcome or at least partially solve the above problems.
According to one aspect of the invention, a background display method of an application program is provided, which comprises the following steps:
responding to a background running switching instruction aiming at the application, and generating a background running state identifier; traversing each interface element in a current display interface of the application, and acquiring an attribute label of each interface element; according to the background running state identification, drawing a hidden masking layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface; carrying out screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application; switching the application to a background operation; and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application.
According to still another aspect of the present invention, there is provided an electronic apparatus including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is configured to store at least one executable instruction that causes the processor to:
responding to a background running switching instruction aiming at the application, and generating a background running state identifier; traversing each interface element in a current display interface of the application, and acquiring an attribute label of each interface element; according to the background running state identification, drawing a hidden masking layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface; carrying out screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application; switching the application to a background operation; and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application.
According to yet another aspect of the present invention, there is provided a computer storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to:
responding to a background running switching instruction aiming at the application, and generating a background running state identifier; traversing each interface element in a current display interface of the application, and acquiring an attribute label of each interface element; according to the background running state identification, drawing a hidden masking layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface; carrying out screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application; switching the application to a background operation; and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application.
According to the background display method of the application program, the electronic device and the storage medium, after a background switching instruction for the application is received, the privacy interface element in the current display interface is determined, the hidden cover layer is drawn on the display area of the privacy interface element to shield the privacy information, then the shielded display interface is subjected to screenshot, finally the application is switched to background operation, and when a user views the background operation application, the screenshot of the shielded display interface is displayed. In the background operation switching mode of the application, the hidden mask layer is generated to shield the specified information needing to be hidden, compared with a full-range shielding mode, the background operation switching mode has higher flexibility, is convenient for a user to check the information needing not to be hidden, and can also avoid the problem of user information leakage caused by background operation switching.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flowchart illustrating a background display method for an application according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a background display method for an application according to another embodiment of the present invention;
FIG. 3a is a diagram illustrating a background display of an application in the prior art;
FIG. 3b is a diagram illustrating a background display of an application in an embodiment of the invention;
fig. 4 shows a schematic structural diagram of an electronic device provided in an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
In order to avoid information leakage of a user, a possible solution is to capture a screenshot of a current display interface and cover a fuzzy masking layer on the screenshot, so that when the user views a background running application, the screenshot covered with the fuzzy masking layer corresponding to the displayed application program is a full-range shielding mode. However, this approach has at least the following disadvantages: when a user switches an application to another application and operates the other application, the user may need to check information in an interface before the application is switched to a background, but the user cannot check the information due to the shielding of the fuzzy masking layer, so that inconvenience is brought to the user, and the full-range shielding mode is not flexible; moreover, because of the full range of masking, strangers' curiosity can be caused, and the risk that privacy is over-concerned and stolen can be increased. Based on this, the embodiment of the present invention provides a background display method for an application program, so as to overcome the disadvantages of the above solutions.
Fig. 1 is a flowchart illustrating a background display method for an application according to an embodiment of the present invention, where as shown in fig. 1, the method includes the following steps:
step S101, responding to a background operation switching instruction aiming at the application, and generating a background operation state identifier.
Illustratively, when the application runs in a foreground, a user executes a first gesture from top to bottom on a terminal screen so as to switch the application to a background operation, detects a first sliding gesture executed by the user, and generates a background operation switching instruction for the application. Of course, the trigger operation for switching the application to the background running is not limited to this.
In response to the background running switching instruction for the application, a background running state identifier is generated, at this time, the application does not run in the background, the background running state identifier does not represent the real running state of the application, but is equivalent to a signal, and after receiving the signal, the processing program performs the occlusion processing on the private information, which will be described in detail later.
Step S102, traversing each interface element in the current display interface of the application, and obtaining the attribute label of each interface element.
The interface elements refer to information types displayed in the interface, and take an electronic book application as an example, the interface elements of the electronic book application include: user ID, user account, reading duration, membership grade, external import book file, user comment, user idea, and the like.
Traversing each interface element in a current display interface of the application, and obtaining an attribute tag of each interface element, where the attribute tag of the interface element may be set by default by the system, or may be set manually by a user, for example, the user may manually set the attribute tag of the interface element corresponding to information (such as user privacy information) that the user thinks it needs to be hidden as a privacy tag.
And step S103, according to the background running state identification, drawing a hidden cover layer on a display area of the interface element of which the attribute tag is the privacy tag in the current display interface to obtain a shielded display interface.
The attribute tag is an interface element of the privacy tag, that is, an interface element which needs to be hidden, that is, a privacy interface element. For interface elements that do not need to be hidden, the attribute tag may be set as a non-privacy tag, or the attribute tag may not be set, and interface elements that do not have attribute tags are interface elements that do not need to be hidden by default, which is not limited in the present invention.
In this embodiment, according to the generated background running state identifier, the blocking processing of the private information is performed before the application is switched to the background. Specifically, the interface element of which the attribute tag is the privacy tag in the current display interface is determined, the hidden masking layer is drawn on the display area of the interface element of which the attribute tag is the privacy tag, the masked display interface is obtained, the display area of the privacy interface element is masked by the fuzzy masking layer through the step, and information displayed in the display area is also masked.
And step S104, performing screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application.
And performing screenshot processing on the shielded display interface, wherein the display area of the interface element which needs to be hidden in the obtained screenshot is shielded, and the display areas of other interface elements which do not need to be hidden are not shielded.
And step S105, switching the application to the background operation.
And after screenshot is carried out on the shielded display interface, switching the application to the background to run.
And S106, responding to a viewing instruction of the background running application, and displaying a screenshot of a shielded display interface corresponding to the background running application.
Illustratively, the user performs a second gesture from bottom to top on the terminal screen to view the application running in the background, and when the second gesture is detected, a viewing instruction of the application running in the background is generated.
And responding to a viewing instruction of the background running applications, and displaying the screenshots of the shielded display interfaces corresponding to the background running applications.
Therefore, a certain delay exists between the background running switching instruction for the application is received and the application is switched to the background running, and the method of the embodiment is to perform processing of drawing the shielding cover layer and screenshot for the interface element which needs to be hidden in the display interface of the application during the delay.
In summary, different from the above full-range blocking manner, the manner of this embodiment is to draw the fuzzy masking layer on the area to be hidden specified in the display interface, for example, the area to be hidden may be set as a display area of the user privacy information, so that the display area of the user privacy information may be blocked by the manner of this embodiment, and leakage of the user privacy information may be avoided; compared with a full-range shielding mode, the mode of the embodiment has higher flexibility, and is convenient for a user to check information in a display interface before the application is switched to the background operation; meanwhile, compared with a full-range shielding mode, the method is also beneficial to reducing the risk of stealing the user information.
According to the background display method of the application program, after a background switching instruction for the application is received, firstly, a privacy interface element in a current display interface is determined, a hidden cover layer is drawn on a display area of the privacy interface element to shield privacy information, then, screenshot is conducted on the shielded display interface, finally, the application is switched to background operation, and when a user views the background operation application, the screenshot of the shielded display interface is displayed. In the background display method of the application program provided by the embodiment, the generated hidden mask layer shields the specified information to be hidden, and compared with a full-range shielding mode, the background display method has higher flexibility, is convenient for a user to view the information not to be hidden, and can also avoid the problem of user information leakage caused by background operation switching.
Fig. 2 is a flowchart illustrating a background display method for an application according to another embodiment of the present invention, where as shown in fig. 2, the method includes the following steps:
step S201, creating a View for drawing the hidden mask layer, and enabling the View of each interface element in any display interface of the application to inherit the View for drawing the hidden mask layer.
The method comprises the steps of creating a View for drawing a hidden masking layer, such as the View for drawing a Gaussian fuzzy masking layer, and then enabling the View of each interface element to inherit the View for drawing the hidden masking layer.
And S202, checking an externally transmitted privacy text identifier in the View for drawing the hidden masking layer, and recording an attribute tag of an interface element corresponding to the privacy text identifier as a privacy tag.
And the View for drawing the hidden masking layer can automatically check the privacy text identification transmitted from the outside, and after the privacy text identification is detected, the attribute tag of the interface element corresponding to the privacy text identification is recorded as the privacy tag.
The method comprises the steps of firstly determining a privacy text identifier, wherein the privacy text identifier can be obtained according to manual setting of a user, and specifically, privacy setting operation is executed according to a text identifier corresponding to any interface element by the user to obtain the privacy text identifier. For example, a "privacy mark" control is provided in the application, the text identifier corresponding to the interface element is a "user name", and the user clicks the "privacy mark" control corresponding to the text identifier- "user name", that is, performs privacy setting operation on the text identifier, and records the text identifier- "user name" as a privacy text identifier. Or the private text identifier may also be obtained by default setting of the system, and the system determines the text identifiers of the interface elements of the private information according to a predetermined rule and sets the text identifiers as the private text identifiers.
The method of the embodiment can be applied to electronic book applications, and when the method is applied to the electronic book applications, the method further comprises the following steps: the attribute tag of the interface element corresponding to the user privacy information in the electronic book application is set as the privacy tag, and the specific embodiment refers to the above description, which is not repeated herein. Automatically setting an interface element attribute tag corresponding to user privacy information in electronic book application as a privacy tag, wherein the user privacy information is as follows: the method comprises the following steps of reading duration information of a user, account information of the user, externally imported book or file information, and privacy comments or ideas of the user.
After a background switching instruction for an electronic book application is received, firstly, privacy tags of interface elements in a current display interface are obtained, and if the display interface comprises the interface elements- "user account", the interface elements- "external import book", and the interface elements- "user privacy comment or idea" … …, a hidden cover layer is drawn on a display area of the interface elements by using the View of the interface elements- "user account", so that the user account information is shielded due to specific information of the user account displayed in the display area, and the processing mode for other interface elements is similar and is not repeated.
Step S203, generating a background running state identifier in response to the background running switching instruction for the application.
And generating a background running state identifier in response to a background running switching instruction for the application, wherein the application does not run in the background, and the background running state identifier does not represent the real running state of the application but is equivalent to a signal used for drawing the hidden layer View and then carrying out shielding processing on the privacy information after receiving the signal.
Step S204, traversing each interface element in the current display interface of the application, and acquiring the attribute label of each interface element.
And S205, providing the background running state identifier for the View corresponding to each interface element in the current display interface, so that the View corresponding to the interface element with the attribute tag as the privacy tag draws a hidden mask layer, and a shielded display interface is obtained.
The interface element of which the attribute tag is a privacy tag is the interface element which needs to be hidden and is set by the user. And transmitting the background running state identification to the View corresponding to each interface element in the current display interface, and drawing a hidden mask layer for the View corresponding to the interface element of the attribute label, so that the display area of the interface element is shielded by the hidden mask layer to obtain a shielded display interface.
And step S206, performing screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application.
And performing screenshot processing on the shielded display interface, wherein the display area of the interface element which needs to be hidden in the obtained screenshot is shielded, and the display areas of other interface elements which do not need to be hidden are not shielded.
And step S207, switching the application to background operation.
And after the shielded display interface is subjected to screenshot, formally switching the application to a background to run.
And S208, responding to the viewing instruction of the background running application, and displaying the screenshot of the shielded display interface corresponding to the background running application.
And when the user views the applications running in the background, displaying the screenshots of the shielded display interfaces corresponding to the applications running in the background.
Step S209, in response to the foreground operation switching instruction for the background operation application, generates a foreground operation status identifier.
Illustratively, a user may execute a trigger operation of switching a background running application to a foreground running application through an entry in a blocked display interface corresponding to the background running application. Or, the user may also execute the trigger operation of switching the background running application to the foreground running through the application icon corresponding to the background running application.
When one application is switched to the background operation and then switched to the foreground operation, the display interface to be displayed is consistent with the display interface displayed before the application is switched to the background operation. In this embodiment, the display interface before the application is switched to the background operation is covered with the hidden cover layer, and therefore, when the application is switched to the foreground operation again in the background operation, the drawn hidden cover layer needs to be removed.
Specifically, in response to a foreground running switching instruction for a background running application, a foreground running state identifier is generated, and similarly, the foreground running state identifier does not represent a real running state of the application, but is equivalent to a signal, and the View for drawing the hidden layer performs processing of removing the hidden layer after receiving the signal.
And step S210, providing the foreground running state identification for the View corresponding to each interface element in the shielded display interface of the background running application, so that the View corresponding to each interface element in the shielded display interface can remove the drawn hidden mask layer.
And then, providing the foreground running state identification for the View corresponding to each interface element in the shielded display interface of the background running application, so that the View corresponding to each interface element can remove the previously drawn hidden cover layer. Optionally, in a processing process of switching the application to the background operation, recording the View corresponding to the interface element of the drawn hidden mask layer, and in this step, providing the foreground operation state identifier to the recorded View corresponding to the drawn hidden mask layer.
Step S211, the background running application is switched to the foreground running.
And after the hidden masking layer in the shielded display interface of the background running application is removed, formally switching the background running application to the foreground running.
Similarly, there is a certain delay between receiving the foreground running switching instruction for the background running application and the background running application being switched to the foreground running, and the method of this embodiment is to perform processing of removing the drawn hidden masking layer during this delay.
Fig. 3a shows a schematic diagram of background display of an application program in the prior art, as shown in fig. 3a, in the prior art, a fuzzy masking layer is used to completely shield a screenshot of a whole display interface, after an application is switched to background operation, when a user views the application program running in the background, the screenshot which is shielded in a full range is displayed, and it is assumed that the user needs to view information in the display interface when using other applications, and only the application running in the background can be switched to foreground operation to view the information.
Fig. 3b shows a schematic diagram of background display of an application program in the embodiment of the present invention, as shown in fig. 3b, in the embodiment of the present invention, only a specified area is blocked, for example, display areas of interface elements "my account" and "my card coupon" in fig. 3a are blocked, while display areas of other interface elements are not blocked, in the above scenario, a user only needs to perform a viewing operation of running an application in the background to view non-private information, which is convenient for the user, and meanwhile, it is also ensured that private information is not leaked.
According to the background display method of the application program provided by the embodiment of the invention, the View used for drawing the hidden mask layer is created, so that the View of each interface element of the application inherits the View used for drawing the hidden mask layer, the View of each interface element of the application can draw the privacy mask layer, and the method of the embodiment is easier to implement. In the mode, the user can set the information and the interface elements which need to be hidden by himself, and the method has high flexibility. After the system receives an instruction for switching the application to background operation, firstly, the attribute tag is used as the View of the interface element of the privacy tag to draw the hidden masking layer, so that the information to be hidden is shielded, then, the shielded interface is subjected to screenshot, and then, the application is switched to background operation. And when an instruction for switching the background application to the foreground operation is received, removing the drawn privacy mask layer in the shielded interface, and ensuring the normal operation of the application.
The embodiment of the invention provides a nonvolatile computer storage medium, wherein at least one executable instruction is stored in the computer storage medium, and the computer executable instruction can execute the background display method of the application program in any method embodiment.
The executable instructions may be specifically configured to cause the processor to:
responding to a background running switching instruction aiming at the application, and generating a background running state identifier;
traversing each interface element in a current display interface of the application, and acquiring an attribute label of each interface element;
according to the background running state identification, drawing a hidden masking layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface;
carrying out screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application;
switching the application to a background operation;
and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application.
In an alternative, the executable instructions cause the processor to:
before responding to a background running switching instruction for an application, creating a View for drawing a hidden mask layer, and enabling the View of each interface element in any display interface of the application to inherit the View for drawing the hidden mask layer;
and providing the background running state identification for the views corresponding to the interface elements in the current display interface so as to enable the View corresponding to the interface element with the attribute tag as the privacy tag to draw the hidden masking layer.
In an alternative, the executable instructions cause the processor to:
and checking an externally transmitted privacy text identifier in the View for drawing the hidden masking layer, and recording an attribute tag of an interface element corresponding to the privacy text identifier as a privacy tag.
In an alternative, the executable instructions cause the processor to:
responding to a foreground running switching instruction aiming at the background running application, and generating a foreground running state identifier;
providing the foreground running state identification for views corresponding to each interface element in a shielded display interface of the background running application, so that the views corresponding to each interface element in the shielded display interface can remove the drawn hidden layer;
and switching the background running application to the foreground running.
In an alternative, the executable instructions cause the processor to:
and responding to privacy setting operation executed by a user on the text identifier corresponding to any interface element before the background running switching instruction for the application, and obtaining the privacy text identifier.
In an alternative, the executable instructions cause the processor to:
and setting the attribute tag of the interface element corresponding to the user privacy information in the electronic book application as a privacy tag.
In an alternative approach, the user privacy information includes one or more of: the method comprises the following steps of reading duration information of a user, account information of the user, externally imported book information, and privacy comments or ideas of the user.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the electronic device.
As shown in fig. 4, the electronic device may include: a processor (processor)402, a Communications Interface 404, a memory 406, and a Communications bus 408.
Wherein: the processor 402, communication interface 404, and memory 406 communicate with each other via a communication bus 408. A communication interface 404 for communicating with network elements of other devices, such as clients or other servers. The processor 402 is configured to execute the program 410, and may specifically perform relevant steps in the above-described background display method embodiment for an application program of an electronic device.
In particular, program 410 may include program code comprising computer operating instructions.
The processor 402 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The electronic device comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 406 for storing a program 410. Memory 406 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 410 may specifically be configured to cause the processor 402 to perform the following operations:
responding to a background running switching instruction aiming at the application, and generating a background running state identifier;
traversing each interface element in a current display interface of the application, and acquiring an attribute label of each interface element;
according to the background running state identification, drawing a hidden masking layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface;
carrying out screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application;
switching the application to a background operation;
and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application.
In an alternative, the program 410 causes the processor 402 to:
before responding to a background running switching instruction for an application, creating a View for drawing a hidden mask layer, and enabling the View of each interface element in any display interface of the application to inherit the View for drawing the hidden mask layer;
and providing the background running state identification for the views corresponding to the interface elements in the current display interface so as to enable the View corresponding to the interface element with the attribute tag as the privacy tag to draw the hidden masking layer.
In an alternative, the program 410 causes the processor 402 to:
and checking an externally transmitted privacy text identifier in the View for drawing the hidden masking layer, and recording an attribute tag of an interface element corresponding to the privacy text identifier as a privacy tag.
In an alternative, the program 410 causes the processor 402 to:
responding to a foreground running switching instruction aiming at the background running application, and generating a foreground running state identifier;
providing the foreground running state identification for views corresponding to each interface element in a shielded display interface of the background running application, so that the views corresponding to each interface element in the shielded display interface can remove the drawn hidden layer;
and switching the background running application to the foreground running.
In an alternative, the program 410 causes the processor 402 to:
and responding to privacy setting operation executed by a user on the text identifier corresponding to any interface element before the background running switching instruction for the application, and obtaining the privacy text identifier.
In an alternative, the program 410 causes the processor 402 to:
and setting the attribute tag of the interface element corresponding to the user privacy information in the electronic book application as a privacy tag.
In an alternative approach, the user privacy information includes one or more of: the method comprises the following steps of reading duration information of a user, account information of the user, externally imported book information, and privacy comments or ideas of the user.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.

Claims (21)

1. A background display method of an application program comprises the following steps:
responding to a background running switching instruction aiming at the application, and generating a background running state identifier;
traversing each interface element in the current display interface of the application to obtain an attribute label of each interface element;
according to the background running state identification, drawing a hidden covering layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface;
performing screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application;
switching the application to background operation;
and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application.
2. The method of claim 1, wherein prior to the responding to background-running switching instructions for an application, the method further comprises:
creating a View for drawing a hidden mask layer, and enabling the View of each interface element in any display interface of the application to inherit the View for drawing the hidden mask layer;
then, according to the background running state identifier, drawing a hidden masking layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface further includes:
and providing the background running state identification for the views corresponding to the interface elements in the current display interface so as to draw hidden masking layers for the views corresponding to the interface elements with attribute labels as privacy labels.
3. The method of claim 2, wherein the method further comprises:
and checking an externally transmitted privacy text identifier in the View for drawing the hidden masking layer, and recording an attribute tag of an interface element corresponding to the privacy text identifier as a privacy tag.
4. The method of claim 2 or 3, wherein the method further comprises:
responding to a foreground running switching instruction aiming at the background running application, and generating a foreground running state identifier;
providing the foreground running state identification for views corresponding to each interface element in a shielded display interface of the background running application, so that the views corresponding to each interface element in the shielded display interface can remove the drawn hidden masking layer;
and switching the background running application to foreground running.
5. The method of claim 2, wherein prior to said responding to a background-running switch instruction for an application, the method further comprises:
and obtaining the private text identifier according to the privacy setting operation executed by the user on the text identifier corresponding to any interface element.
6. The method of any of claims 1-3, wherein the method is applied to an electronic book application, the method further comprising:
and setting the attribute tag of the interface element corresponding to the user privacy information in the electronic book application as a privacy tag.
7. The method of claim 6, wherein the user privacy information comprises one or more of: the method comprises the following steps of reading duration information of a user, account information of the user, externally imported book information, and privacy comments or ideas of the user.
8. An electronic device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is configured to store at least one executable instruction that causes the processor to:
responding to a background running switching instruction aiming at the application, and generating a background running state identifier;
traversing each interface element in the current display interface of the application to obtain an attribute label of each interface element;
according to the background running state identification, drawing a hidden covering layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface;
performing screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application;
switching the application to background operation;
and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application.
9. The electronic device of claim 8, the executable instructions further cause the processor to:
before the response of a background operation switching instruction for the application, creating a View for drawing a hidden mask layer, and enabling the View of each interface element in any display interface of the application to inherit the View for drawing the hidden mask layer;
and providing the background running state identification for the views corresponding to the interface elements in the current display interface so as to draw hidden masking layers for the views corresponding to the interface elements with attribute labels as privacy labels.
10. The electronic device of claim 9, the executable instructions further cause the processor to:
and checking an externally transmitted privacy text identifier in the View for drawing the hidden masking layer, and recording an attribute tag of an interface element corresponding to the privacy text identifier as a privacy tag.
11. The electronic device of claim 9 or 10, the executable instructions further causing the processor to:
responding to a foreground running switching instruction aiming at the background running application, and generating a foreground running state identifier;
providing the foreground running state identification for views corresponding to each interface element in a shielded display interface of the background running application, so that the views corresponding to each interface element in the shielded display interface can remove the drawn hidden masking layer;
and switching the background running application to foreground running.
12. The electronic device of claim 9, the executable instructions further cause the processor to:
and before the background running switching instruction for the application is responded, the privacy text identifier is obtained according to the privacy setting operation executed by the user on the text identifier corresponding to any interface element.
13. The electronic device of any of claims 8-10, the executable instructions further cause the processor to:
and setting the attribute tag of the interface element corresponding to the user privacy information in the electronic book application as a privacy tag.
14. The electronic device of claim 13, wherein the user privacy information includes one or more of: the method comprises the following steps of reading duration information of a user, account information of the user, externally imported book information, and privacy comments or ideas of the user.
15. A computer storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to:
responding to a background running switching instruction aiming at the application, and generating a background running state identifier;
traversing each interface element in the current display interface of the application to obtain an attribute label of each interface element;
according to the background running state identification, drawing a hidden covering layer on a display area of an interface element of which the attribute tag is a privacy tag in the current display interface to obtain a shielded display interface;
performing screenshot processing on the shielded display interface to obtain a screenshot of the shielded display interface corresponding to the application;
switching the application to background operation;
and responding to a viewing instruction of the background running application, and displaying a screenshot of the shielded display interface corresponding to the background running application.
16. The computer storage medium of claim 15, the executable instructions further causing the processor to:
before the response of a background operation switching instruction for the application, creating a View for drawing a hidden mask layer, and enabling the View of each interface element in any display interface of the application to inherit the View for drawing the hidden mask layer;
and providing the background running state identification for the views corresponding to the interface elements in the current display interface so as to draw hidden masking layers for the views corresponding to the interface elements with attribute labels as privacy labels.
17. The computer storage medium of claim 16, the executable instructions further causing the processor to:
and checking an externally transmitted privacy text identifier in the View for drawing the hidden masking layer, and recording an attribute tag of an interface element corresponding to the privacy text identifier as a privacy tag.
18. The computer storage medium of claim 16 or 17, the executable instructions further causing the processor to:
responding to a foreground running switching instruction aiming at the background running application, and generating a foreground running state identifier;
providing the foreground running state identification for views corresponding to each interface element in a shielded display interface of the background running application, so that the views corresponding to each interface element in the shielded display interface can remove the drawn hidden masking layer;
and switching the background running application to foreground running.
19. The computer storage medium of claim 16, the executable instructions further causing the processor to:
and before the background running switching instruction for the application is responded, the privacy text identifier is obtained according to the privacy setting operation executed by the user on the text identifier corresponding to any interface element.
20. The computer storage medium of any of claims 15-17, the executable instructions further causing the processor to:
and setting the attribute tag of the interface element corresponding to the user privacy information in the electronic book application as a privacy tag.
21. The computer storage medium of claim 20, wherein the user privacy information includes one or more of: the method comprises the following steps of reading duration information of a user, account information of the user, externally imported book information, and privacy comments or ideas of the user.
CN202010357162.6A 2020-04-29 2020-04-29 Background display method of application program, electronic device and storage medium Active CN111580730B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010357162.6A CN111580730B (en) 2020-04-29 2020-04-29 Background display method of application program, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010357162.6A CN111580730B (en) 2020-04-29 2020-04-29 Background display method of application program, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN111580730A CN111580730A (en) 2020-08-25
CN111580730B true CN111580730B (en) 2021-04-02

Family

ID=72111836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010357162.6A Active CN111580730B (en) 2020-04-29 2020-04-29 Background display method of application program, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN111580730B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112380588A (en) * 2020-11-17 2021-02-19 惠州Tcl移动通信有限公司 Private information display method and device, storage medium and mobile terminal
CN113254141B (en) * 2021-06-25 2021-11-02 深圳小米通讯技术有限公司 Image generation method, image generation device, electronic equipment and storage medium
CN113835809A (en) * 2021-09-24 2021-12-24 深圳集智数字科技有限公司 Hiding processing method and device
CN114489897B (en) * 2022-01-21 2023-08-08 北京字跳网络技术有限公司 Object processing method, device, terminal equipment and medium
CN115240281A (en) * 2022-09-23 2022-10-25 平安银行股份有限公司 Private information display method and device, storage medium and mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105955684A (en) * 2016-04-22 2016-09-21 北京小米移动软件有限公司 Image display method and apparatus
CN108595237A (en) * 2018-03-30 2018-09-28 维沃移动通信有限公司 A kind of method and terminal of display content
CN108829388A (en) * 2017-05-03 2018-11-16 武汉斗鱼网络科技有限公司 A kind of processing method and system of showing interface

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028172A (en) * 2016-06-13 2016-10-12 百度在线网络技术(北京)有限公司 Audio/video processing method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105955684A (en) * 2016-04-22 2016-09-21 北京小米移动软件有限公司 Image display method and apparatus
CN108829388A (en) * 2017-05-03 2018-11-16 武汉斗鱼网络科技有限公司 A kind of processing method and system of showing interface
CN108595237A (en) * 2018-03-30 2018-09-28 维沃移动通信有限公司 A kind of method and terminal of display content

Also Published As

Publication number Publication date
CN111580730A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
CN111580730B (en) Background display method of application program, electronic device and storage medium
US9535651B2 (en) Co-browsing systems and methods
CN103995722B (en) Open the method and apparatus of multiple windows simultaneously on screen
EP2924593A1 (en) Method and apparatus for constructing documents
CN110908865A (en) Memory leakage monitoring method and device and electronic equipment
CN104346463A (en) Loading method and device of page label and browser client
CN111857464A (en) Information display method and device, electronic equipment and readable storage medium
CN104834687A (en) Picture display method
CN112347512A (en) Image processing method, device, equipment and storage medium
CN111309225B (en) Screen clearing processing method and device
CN104657668A (en) Terminal
CN104182266B (en) A kind of application installation method and device
CN110674050B (en) Memory out-of-range detection method and device, electronic equipment and computer storage medium
CN104657991A (en) Picture processing method
CN115510508A (en) Page information protection method and device and electronic equipment
CN113378025B (en) Data processing method, device, electronic equipment and storage medium
CN104766352A (en) Picture processing method
CN111610917B (en) Display method, display device and electronic equipment
CN105094789A (en) Data exchanging method and device
WO2015176672A1 (en) Method and apparatus for obtaining response priority for application triggering
CN110262856B (en) Application program data acquisition method, device, terminal and storage medium
US9477448B2 (en) Screen-oriented computing program refactoring
US9069562B2 (en) Mobile computing program slicing and behavior
CN110989893A (en) Click operation response method and device and electronic equipment
US20140215392A1 (en) Connections identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant