CN113093941A - Operation method, mobile terminal and storage medium - Google Patents

Operation method, mobile terminal and storage medium Download PDF

Info

Publication number
CN113093941A
CN113093941A CN202110390614.5A CN202110390614A CN113093941A CN 113093941 A CN113093941 A CN 113093941A CN 202110390614 A CN202110390614 A CN 202110390614A CN 113093941 A CN113093941 A CN 113093941A
Authority
CN
China
Prior art keywords
preset
application
interface
function
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110390614.5A
Other languages
Chinese (zh)
Inventor
贺飞云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110390614.5A priority Critical patent/CN113093941A/en
Publication of CN113093941A publication Critical patent/CN113093941A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • G06F3/0412Digitisers structurally integrated in a display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04812Interaction techniques based on cursor appearance or behaviour, e.g. being affected by the presence of displayed objects

Abstract

The application relates to the technical field of terminal application, and discloses an operation method, a mobile terminal and a storage medium, wherein the operation method comprises the following steps: s1: displaying at least one piece of first identification information on a first preset interface according to a first preset strategy; s2: receiving a first preset operation; s3: and if the first preset operation meets a first preset condition, executing corresponding processing. Through the technical scheme, the operation steps of the user can be effectively reduced, the safety of the mobile terminal can be further improved, and the user experience is improved.

Description

Operation method, mobile terminal and storage medium
Technical Field
The present application relates to the field of terminal application technologies, and in particular, to an operating method, a mobile terminal, and a storage medium.
Background
In recent years, mobile terminals represented by mobile phones and tablets have become one of the necessary devices in the hands of consumers, so that the performance and the functions of the mobile terminals have become more and more powerful, and the lives of the consumers have been kept away from the mobile terminals.
However, when the inventor uses the mobile terminal, once the mobile terminal is locked, the user generally needs to unlock the screen locking interface before entering the system, then finds the corresponding application icon, and then clicks the application icon to enter the application, which is tedious in operation for the commonly used application functions, not convenient and fast enough, and affects the user experience.
Disclosure of Invention
In view of the above technical drawbacks, the present application provides an operating method, a mobile terminal and a storage medium to solve the technical problems in the background art.
In order to achieve the above object, in a first aspect, the present application provides an operating method applied to a mobile terminal, including the steps of:
s1: displaying at least one piece of first identification information on a first preset interface according to a first preset strategy;
s2: receiving a first preset operation;
s3: and if the first preset operation meets a first preset condition, executing corresponding processing.
Optionally, before the step of S1, the method further includes:
s0: a preset control mode or switch is turned on.
Optionally, the method further comprises at least one of:
the first preset interface comprises at least one of: the system comprises a screen-saving interface, a screen-locking interface, a standby interface, a negative one-screen interface, a preset system or application interface, a system tray and a virtual navigation bar;
the first identification information includes at least one of: the name of the application or function, the category of the application or function, the icon of the application or function, the color of the application or function, and the identification information corresponding to the application or function.
Optionally, the first preset policy further includes at least one of:
all the identification information corresponding to all the preset applications or functions is displayed;
displaying identification information corresponding to a preset application or function according to a preset operation;
displaying identification information corresponding to the application or function meeting the requirements in a first display mode;
and displaying the identification information corresponding to the application or the function which does not meet the requirement in a second display mode.
Optionally, the first display mode and/or the second display mode includes at least one of the following:
fixed or floating display at a preset position;
static display or dynamic display;
regular display or irregular display;
the display effect of different applications is different;
the applications of different categories show different effects.
Optionally, the display effect comprises at least one of:
displaying the position;
a display size;
displaying the font;
displaying a color;
the shape is displayed.
Optionally, the first preset operation meets a first preset condition, and includes at least one of:
the trigger position of the first preset operation belongs to a preset position;
when the first preset operation is triggered, user authentication information is obtained and authentication is passed;
the target application or the target function to be opened by the first preset operation meets the requirement.
Optionally, the step S1 further includes:
and displaying the second identification information on a second preset interface according to a second preset strategy.
Optionally, the second preset policy includes at least one of:
the first preset interface and the second preset interface are the same or different;
the applications or functions displayed on the first preset interface and the second preset interface are the same or different;
the application categories or the function categories displayed on the first preset interface and the second preset interface are the same or different.
Optionally, the determining manner of the category of the application or the function includes at least one of:
classifying applications or functions in the mobile terminal into safe and unsafe categories according to user use habits;
classifying applications or functions in the mobile terminal into safe and unsafe categories according to the settings of the mobile terminal and/or associated equipment;
applications or functions in the mobile terminal are classified into safe and unsafe categories based on big data analysis.
Optionally, the method further comprises:
displaying a safe application or function on a first preset interface, and/or displaying an unsafe application or function on a second preset interface; and/or the presence of a gas in the gas,
and displaying the unsafe application or function on the first preset interface, and/or displaying the safe application or function on the second preset interface.
Optionally, the method further comprises: and receiving a second preset operation, detecting whether the second preset operation meets a second preset condition, and if so, adjusting the display position of the application or the function and/or converting the safety category.
Optionally, the second preset operation meets a second preset condition, and includes at least one of:
triggered by a preset function button or menu item;
belonging to the preset operation.
Optionally, the category to which the application belongs or the category to which the function belongs may be determined or converted according to at least one of the following ways:
according to the use habits of users;
setting according to the mobile terminal and/or the associated equipment;
and (4) analyzing according to big data.
In a second aspect, the present application further provides a mobile terminal, including: a memory, and a processor, wherein the memory has stored thereon an operating program, which when executed by the processor implements the steps of the operating method according to the first aspect.
In a third aspect, the present application further provides a readable storage medium, characterized in that the readable storage medium has stored thereon a computer program, which when executed by a processor, implements the steps of the operating method according to the first aspect.
Through the technical scheme, the user can directly enter the corresponding application interface or start the corresponding function through clicking the corresponding identification on the corresponding interface, so that the operation steps of the user are effectively reduced, the safety of the mobile terminal can be effectively protected, and the user experience is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a schematic flow chart diagram of a method of operation provided by an embodiment of the present application;
fig. 2a is a first schematic diagram illustrating that a mobile terminal according to an embodiment of the present application executes the present operation method under a screen lock interface;
fig. 2b is a schematic diagram two illustrating that the mobile terminal provided in the embodiment of the present application executes the operation method under a screen locking interface;
fig. 2c is a third schematic diagram of the mobile terminal provided in the embodiment of the present application, executing the present operation method under a screen locking interface;
fig. 3 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings. With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of an element by the phrase "comprising an … …" does not exclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element, and further, where similarly-named elements, features, or elements in different embodiments of the disclosure may have the same meaning, or may have different meanings, that particular meaning should be determined by their interpretation in the embodiment or further by context with the embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or," "and/or," "including at least one of the following," and the like, as used herein, are to be construed as inclusive or mean any one or any combination. For example, "includes at least one of: A. b, C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C ", again for example," A, B or C "or" A, B and/or C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C'. An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that step numbers such as S1 and S2 are used herein for the purpose of more clearly and briefly describing the corresponding content, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform S2 first and then S1 in specific implementation, which should be within the scope of the present application.
The embodiment of the application provides an operation method, which can be applied to a mobile terminal and is used for reducing the operation steps that a user directly enters corresponding application or function under preset interfaces such as a screen locking interface and the like, so that the operation of the user is facilitated, and the user experience and/or the safety are/is improved.
First embodiment
In this embodiment, a smart phone is taken as a mobile terminal, the smart phone has a touch screen, and the operation method provided in this application is described in detail below, where fig. 1 is a schematic flow diagram of the operation method provided in this embodiment, and the operation method specifically includes:
step S1: displaying at least one piece of first identification information on a first preset interface according to a first preset strategy;
optionally, the second identification information is displayed on a second preset interface according to a second preset strategy.
Optionally, in this embodiment, the first preset interface and the second preset interface each include at least one of the following: the system comprises a screen-saving interface, a screen-locking interface, a standby interface, a negative one-screen interface, a preset system or application interface, a system tray and a virtual navigation bar.
The first identification information and the second identification information each include at least one of: the name of the application or function (such as WeChat, microblog, camera, and the like), the category of the application or function (such as work, entertainment, finance, and the like), the icon of the application or function, the color of the application or function, and identification information (such as short for short) corresponding to the application or function.
In the first preset interface and the second preset interface, a plurality of first identification information corresponding to applications and/or functions in a one-to-one mode can be displayed, wherein the applications and/or functions comprise payment treasures, microblogs, photo albums, WeChats, settings, cameras, maps, music, enterprise WeChats, nailing, bus taking code display, payment code display and the like. It should be understood that the first preset interface and the second preset interface may also display other identification information corresponding to applications and/or functions, which is not limited in this application.
In this embodiment, the first preset policy may include at least one of the following:
the first case: and displaying all the identification information corresponding to all the preset applications or functions.
Optionally, the application icons of the applications and/or functions are displayed together in the first preset interface, that is, the application icons are directly displayed on the first preset interface, and the animation scrolling display can be supported. The user can clearly know each specific application and directly click the corresponding application icon, so that the operation of the user is facilitated. For example, in this embodiment, application icons of applications and/or functions such as a map, music, WeChat, and the like may be directly displayed on the lock screen interface, and after entering the lock screen interface, a user may directly know the application icons corresponding to the map, music, WeChat, and the like.
The second case: and displaying the identification information corresponding to the preset application or function according to the preset operation.
In order to better protect the privacy of the user or improve the security of the terminal, in this embodiment, the user needs to trigger and display the application and/or function corresponding identifier (e.g., an icon) in the first preset interface by preset operations based on an entity key (e.g., a volume key) or a combination key (e.g., a specific gesture + an entity key, the entity key may be a volume key or a power key). It should be understood that the specific manner of the preset operation can be set by the user, and the present application is not limited thereto.
The third situation: and displaying identification information corresponding to the application or the function meeting the requirements in a first display mode.
In order to avoid that a lot of application icons are displayed in the first preset interface, which may cause that too much space is occupied in the first preset interface, so that the first preset interface is not concise enough, user habits may be combined, and only the application icons meeting requirements, such as applications and/or functions meeting the user habits, are displayed on the first preset interface, where the user habits may be time, place, or operation frequency, and the like, as exemplified below:
example 1: because the user gets up to work in the morning (such as 7: 00 to 9: 00) and is accustomed to opening the navigation application, based on the user habit, a map App icon is displayed on a preset interface (such as a screen locking interface) in the morning, if the user is accustomed to buying a takeout lunch at noon, the takeout App icon is displayed on the preset interface at noon, and if the user is accustomed to listening to songs at night, a music App icon is displayed on the preset interface at night.
Example 2: when the mobile phone is located at home, the game App icon is displayed on a preset interface (such as a screen locking interface), and the enterprise WeChat App icon is displayed on a preset interface when the mobile phone is in a company.
Example 3: and counting the App with the maximum opening times within 1 week or 1 month, and displaying the App icon only on a preset interface (such as a screen locking interface).
A fourth scenario: and displaying the identification information corresponding to the application or the function which does not meet the requirement in a second display mode.
For applications and/or functions that are not in accordance with the user's habits of the third type, the color dots may be displayed in the first predetermined interface, and different dots have different colors and represent different applications and/or functions. And clicking the corresponding dot by the user to display the corresponding application. The area of the dot can be smaller than that of the application icon, so that the display space of the first preset interface can be saved, the first preset interface is simpler, and the user interaction is more convenient.
In this embodiment, the first display mode and/or the second display mode may include at least one of the following:
the display is fixed or floating at a preset position, in one embodiment, the preset position can be a certain fixed area (such as the middle most) of the screen tray, or a certain fixed area (such as the right most) of the navigation bar at the bottom of the screen, or a certain fixed area (such as the middle position of the left side bar) of the left and right side bars, or below or above the fingerprint identification area, and the like, and the floating display mode can be in the form of a small window or a floating window;
static display or dynamic display, wherein the dynamic display mode can be animation, such as rolling, or display or hiding at regular intervals (such as 3s or 2 s);
regular display, such as the corresponding logo display areas of the respective applications and/or functions are of uniform shape and/or size, or irregular display, such as display areas of non-uniform shape and/or size;
the display effect of different applications is different;
the applications of different categories show different effects.
The display effect comprises at least one of the following: display position, display size, display font, display color, display shape.
In one embodiment, application a or category B may be displayed in position 1 (e.g., a tray) with a display size of 60 x 60 pixels, with a font of microsoft black, red in color, and circular in shape, while in another embodiment application C or category D may be displayed only in position 2 (e.g., a fixed position in the navigation area), with a display size of 30 x 30 pixels, with a font of iso-lines, blue in color, and square in shape.
Through the technical scheme, the display effects of different types or different applications are different, the user can conveniently search the display effects, the flexible configuration can be carried out by combining the preference of the user, and the user experience can be further improved.
In this embodiment, the second preset policy includes at least one of the following:
the first case: the first preset interface and the second preset interface are the same or different.
In one embodiment, the first predetermined interface and the second predetermined interface are the same interface (e.g. lock screen interface), in another embodiment, the first default interface may be a screen lock interface, and the second default interface may be a negative one-screen interface or other standby interface, by the technical scheme, when more applications and/or functions needing quick start are needed, when the same interface can not be placed or is inconvenient to place, the display can be dispersedly displayed on different interfaces, and then better experience is provided for users, and the entrance of some privacy or insecurity applications (such as contacts, bank applications and the like) or functions (such as payment codes) can be placed on a non-default preset interface, so that convenience and rapidness are improved, and meanwhile, the safety of the terminal can be further improved.
The second case: and the applications or functions displayed on the first preset interface and the second preset interface are the same or different.
In an embodiment, for an application or function operated at a high frequency, the application or function can be simultaneously placed on the first preset interface and the second preset interface, for example, if the user is a music feverish friend, the QQ music application can be simultaneously placed on the screen locking interface and the negative one-screen interface, so that the user can conveniently find and start the QQ music anytime and anywhere, and more convenient and faster use experience is brought to the user.
The third situation: the application categories or the function categories displayed on the first preset interface and the second preset interface are the same or different.
It should be understood that the security requirements of different applications and/or functions (which may be system applications and/or functions, preset applications and/or functions, or third-party applications and/or functions) are different, and applications such as a bus code, a payment code, etc. may be directly opened without being verified, which may present a security risk. There may be a case that others set the icon of the payment code of the user on the lock screen interface and then directly open the embezzlement brush from the lock screen interface, which causes economic loss to the user. Therefore, the application categories need to be distinguished according to the safety requirements, in one implementation mode, the applications can be divided into a safety category and an unsafe category, the applications in the safety category (such as QQ music and drop car) do not need safety verification when being started, the applications in the unsafe category (such as WeChat payment, Payment code, contacts and the like) need safety verification when being started, in one implementation scenario, if a user wants to open the payment code, the user needs to verify a face or a fingerprint or a password, the payment code is allowed to be displayed only if the verification is passed, and/or if the verification is not passed, the payment code is not displayed and/or prompt information (prompt modes such as characters, sounds, lights and the like) is not output, so as to warn the user, further enhance the safety of the terminal, and effectively protect user information and/or property safety.
In this embodiment, the applications or functions of the security category may be displayed in the first preset interface, and the applications or functions of the non-security category may be displayed in the second preset interface; the applications or functions of the unsafe category may also be displayed in the first preset interface, and the applications or functions of the safe category may also be displayed in the second preset interface, which is not specifically limited herein.
Through above technical implementation scheme, not only convenience of customers swiftly operates, but also can promote safety (if separately or categorised the demonstration, if support safety verification etc. again), further promoted user experience.
In this embodiment, the mobile terminal may further receive a second preset operation, detect whether the second preset operation meets a second preset condition, and if so, adjust a display position of the application or the function and/or convert the security category. Optionally, the second preset operation meets a second preset condition, and includes at least one of:
the first case: triggered by a preset function button or menu item;
in one implementation scenario, the preset function button can be an adjustment or conversion function button, in another implementation scenario, the preset function menu item can be an adjustment or conversion function menu item, once the user clicks the function button or function menu item, it can be determined that the operation meets the preset condition, and such a determination condition is set, so as to avoid the user from mistakenly triggering the corresponding function, and further improve the user experience.
The second case: belonging to the preset operation.
In an implementation scenario, the preset operation may be a preset physical key (such as a volume key) operation, or a preset certain combined key (a specific gesture + a physical key, the physical key may be a volume key or a power key, etc.), or a preset certain touch operation, or a preset certain voice control instruction for performing adjustment or conversion, etc., and in the specific implementation, the user may set the operation according to a preference, so that the technical scheme of the present application may be more flexible and convenient.
Optionally, in this embodiment, the determining manner of the category of the application or the function includes at least one of the following:
the first case: applications or functions in the mobile terminal are classified into safe and unsafe categories according to user's usage habits.
For example, on the screen locking interface, the display interface is divided into two display positions, and a user can drag the first application from the display position of the first category (if security verification is not required) to the display position of the second category (if security verification is required) directly in a dragging mode, so that the category of the first application is changed from the first category to the first category. Similarly, the method can also support operations such as revocation/restoration and the like to change the application types, and the change operation is convenient.
Optionally, in addition to the above-mentioned support for the manual operation of the user, the mobile terminal may further perform automatic statistical analysis on the operation of the user during the process of using the mobile terminal by the user, specifically, may perform statistical analysis on operation information of the user such as setting, classification, and adjustment, and fix an application that never has undergone a security class change. In this embodiment, the authentication verification may include at least one of password verification, fingerprint verification, or face recognition, and by this embodiment, the intelligence and convenience of the technical solution may be further improved, and meanwhile, the security may also be ensured.
The second case: applications or functions in the mobile terminal are classified into safe and unsafe categories according to the settings of the mobile terminal and/or associated devices.
For example, if the tablet or another mobile phone of the user is a device associated with the mobile phone, and the user sets the a application as the security class application on the tablet or another mobile phone, the a application on the mobile phone may be automatically set as the security class application. Conversely, if the security class of the application A is changed on the local computer, the security class setting of the application A on other related devices such as a tablet can be automatically updated. Through the implementation mode, the operation steps of user setting can be simplified, the repeated labor is reduced, and the more intelligent and convenient technical effect is realized.
The third situation: applications or functions in the mobile terminal are classified into a secure category and an insecure category according to big data analysis.
For example, through big data query analysis, if the a application belongs to the unsafe category or has more problems, the a application is automatically set to the unsafe category.
For example, in an embodiment, if the mobile terminal learns that the business title notifies a new batch of App lists which infringe the user's rights and interests through networking, the mobile terminal may classify the batch of apps into unsafe categories, and may output a prompt to remind the user to unload the apps or to directly disallow the batch of apps to appear on a preset interface, so as to reduce the user operation frequency and further improve the security.
In the first embodiment, optionally, before the step of S1, the method may further include:
step S0: a preset control mode or switch is turned on.
The preset control mode may be a smart mode or a shortcut mode, and the preset control switch may be a screen-locking application shortcut switch or option, and in one embodiment, the function given in the step S1 is supported or implemented only when the preset control mode or switch is in an on state, and/or the function given in the step S1 is not supported or implemented when the preset control mode or switch is in an off state. Through the technical means, more flexible selection can be provided for the user, and the user experience is further improved.
S2: receiving a first preset operation;
in an implementation scenario, when a user wants to directly start a corresponding application and/or function in a first preset interface or a second preset interface, a first preset operation may be input to a mobile terminal through an input device such as a touch screen, a camera, or a microphone, where the first preset operation may be a click, a long press, a short press, a re-press, a slide, a double click, or an air-insulated gesture, a physical key, or a combination key, or a voice control instruction. It should be understood that the specific manner of the first preset operation is various, and the embodiment is not particularly limited.
S3: and if the first preset operation meets a first preset condition, executing corresponding processing.
After receiving a first preset operation input by a user, the mobile terminal judges whether the first preset operation meets a first preset condition. In this embodiment, the first preset operation meets a first preset condition, and includes at least one of the following operations:
the first case: the trigger position of the first preset operation belongs to a preset position.
In one embodiment, if a user is a preset operation triggered by a preset function button (e.g., a floating window of a lock screen interface) of a preset interface, a trigger position of the preset operation belongs to a preset position; in another embodiment, the user is a preset operation triggered by the fingerprint identification area, the trigger position of the preset operation also belongs to the preset position, and the preset position can allow the user to set in advance and also can support change.
The second case: and when the first preset operation is triggered, acquiring user authentication information, and passing the authentication.
For example, in the present embodiment, in the first preset interface, the off-screen fingerprint identification function and the application icon display position may be set to be the same area or overlap, and only when the area is clicked and identified by a fingerprint, the application and/or function corresponding to the application icon may be displayed or opened.
Or when the user clicks the identification corresponding to the application and/or the function in the first preset interface, the mobile terminal simultaneously starts face recognition, and the corresponding application and/or the function can be opened only after the face recognition; and/or if the face recognition is not passed, forbidding to open the application corresponding to the identifier; and/or the mobile terminal can also output a prompt to remind the user that the face recognition verification fails.
The method of the present embodiment is described in detail below with reference to fig. 2 a-2 c. In fig. 2a, the mobile terminal is in a lock screen interface, and 3 dots representing different applications and/or functions are displayed in the lock screen interface. After the user clicks one of the dots, the applications and/or functions corresponding to the dots, such as application a, application B, and application C, are displayed on the lock screen interface, as shown in fig. 2B. As shown in fig. 2C, after the user clicks the corresponding application and/or function, for example, clicks the application C, the mobile terminal may also perform fingerprint recognition and/or face recognition (the starting time may be at the same time as the clicking operation, or after the clicking operation, or before the corresponding application and/or function is started), and if the authentication is passed, the application C may be directly opened from the screen locking interface.
Through the technical scheme, the safety verification can be performed while the user operates the mobile terminal, so that the mobile terminal is fast, convenient, safe and reliable, and the user experience can be further improved.
The third situation: the target application or the target function to be opened by the first preset operation meets the requirement.
In one implementation scenario, if the target application or target function to be opened by the user on the first preset interface or the second preset interface belongs to an application and/or function (e.g., map navigation, etc.) that does not require security authentication, the requirement may be met, in which case, the corresponding processing may be to directly open the application and/or function.
In another implementation scenario, if the target application or the target function to be opened by the user on the first preset interface or the second preset interface belongs to an application and/or a function that needs to be securely authenticated (e.g., a riding code, a payment code, etc.), the application and/or the function may be determined to be not compliant with the requirements.
In any case, in an implementation manner, it may be supported that a plurality of applications and/or functions are simultaneously started through one operation of a user, and only the user needs to configure in advance (for example, after the navigation application is started, the system contextual model is automatically changed into the navigation mode) or the mobile terminal automatically configures according to the operation habit of the user (for example, after the riding code is displayed, the system is automatically muted), so that a more intelligent and convenient use experience may be brought to the user.
By implementing the operation method provided by the first embodiment, the user can conveniently enter the corresponding application interface or start the corresponding function from the preset interface, and the operations such as classification and authentication are supported, so that the operation steps of the user can be effectively reduced, and the safety and/or the intelligence can be further improved.
The second embodiment provides a mobile terminal based on the same inventive concept. As shown in FIG. 3, the mobile terminal 100 includes memory 102, a memory controller 104, one or more processing units (CPUs) 106, a peripherals interface 108, RF circuitry 112, audio circuitry 114, a speaker 116, a microphone 118, an input/output (I/O) subsystem 120, a touch screen 126, other output or control devices 128, and an external port 148. These components communicate over one or more communication buses or signal lines 110.
The mobile terminal 100 may be any portable mobile terminal including, but not limited to, a handheld computer, a tablet computer, a mobile phone, a smart phone, a media player, a Personal Digital Assistant (PDA), and the like, including combinations of two or more thereof. It should be understood that the mobile terminal 100 is only one example of a portable electronic mobile terminal and that the components of the mobile terminal 100 may have more or fewer components than shown, or a different configuration of components. The various components shown in fig. 2 may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
Memory 102 may include high-speed random access memory and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid-state storage devices. In certain embodiments, the memory 102 may also include memory remote from the one or more processors 106, such as network-attached memory accessed via the RF circuitry 112 or the external port 148 and a communication network (not shown), which may be the internet, one or more intranets, a Local Area Network (LAN), a wide area network (WLAN), a Storage Area Network (SAN), etc., or a suitable combination thereof. The memory controller 104 may control access to the memory 102 by other components of the mobile terminal 100, such as the CPU106 and the peripherals interface 108.
The peripherals interface 108 couples input and output peripherals of the device to the CPU106 and the memory 102. The one or more processors 106 execute various software programs and/or sets of instructions stored in memory 102 to perform various functions of the mobile terminal 100 and process data.
In some embodiments, peripheral interface 108, CPU106, and memory controller 104 may be implemented on a single chip, such as chip 111. While in some other embodiments they may be implemented on multiple discrete chips.
The RF (radio frequency) circuit 112 receives and transmits electromagnetic waves. The RF circuit 112 converts an electric signal into an electromagnetic wave or converts an electromagnetic wave into an electric signal, and communicates with a communication network and other communication devices via the electromagnetic wave. The RF circuitry 112 may include well-known circuitry for performing these functions, including but not limited to an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC chipset, a Subscriber Identity Module (SIM) card, memory, and so forth. The RF circuitry 112 may communicate with networks and other devices via wireless communications, which may be the internet, intranets, and/or wireless networks such as cellular telephone networks, wireless Local Area Networks (LANs), and/or Metropolitan Area Networks (MANs). The wireless communication may use any of a variety of communication standards, protocols, and technologies, including, but not limited to, global system for mobile communications (GSM), Enhanced Data GSM Environment (EDGE), wideband code division multiple access (W-CDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), bluetooth, wireless fidelity (Wi-Fi) (e.g., ieee802.11a, ieee802.11b, ieee802.11g, and/or ieee802.11n), voice over internet protocol (VoIP), Wi-MAX, protocols for email, instant messaging, and/or Short Message Service (SMS), or any other suitable communication protocol, including those not yet developed at the filing date of this document.
Audio circuitry 114, speaker 116, and microphone 118 provide an audio interface between a user and mobile terminal 100. The audio circuitry 114 receives audio data from the peripheral interface 108, converts the audio data to electrical signals, and transmits the electrical signals to the speaker 116. The speaker converts the electrical signal into a sound wave audible to a human. The audio circuitry 114 also receives electrical signals converted from sound waves by the microphone 116. The audio circuitry 114 converts the electrical signals into audio data and transmits the audio data to the peripheral interface 108 for processing. Audio data may be retrieved from memory 102 and/or RF circuitry 112 by peripheral interface 108 and/or transferred to memory 102 and/or RF circuitry 112. In some embodiments, audio circuitry 114 also includes a headset jack (not shown). The headset jack provides an interface between the audio circuitry 114 and removable audio input/output peripherals, such as pure output headphones or a headset with both output (headphones for one or both ears) and input (microphone).
The I/O subsystem 120 provides an interface between input/output peripherals of the mobile terminal 100, such as a touch screen 126 and other input/control devices 128, and the peripherals interface 108. The I/O subsystem 120 includes a touch screen controller 122 and one or more input controllers 124 for other output or control devices. The one or more input controllers 124 receive/transmit electrical signals from/to other input or control devices 128. The other input/control devices 128 may include physical buttons (e.g., push buttons, rocker buttons, etc.), dials, slider switches, joysticks, and the like.
The touch screen 126 provides both an output interface and an input interface between the device and the user. The touch screen controller 122 receives/sends electrical signals from/to the touch screen 126. The touch screen 126 displays visual output to the user. This visual output may include text, graphics, video, and any combination thereof. Some or all of the visual output may correspond to user interface objects, more details of which are described below.
The touch screen 126 also accepts user input based on tactile and/or tactile contact. The touch screen 126 forms a touch sensitive surface that accepts user input. The touch screen 126 and touch screen controller 122 (along with any associated modules and/or sets of instructions in memory 102) detect contact (and any movement or breaking of the touch) on the touch screen 126 and transform the detected contact into interaction with user interface objects, such as one or more soft keys, displayed on the touch screen. In one exemplary embodiment, the point of contact between the touch screen 126 and the user corresponds to one or more fingers of the user. The touch screen 126 may use LCD (liquid crystal display) technology or LPD (light emitting polymer display) technology, but in other embodiments other display technologies may be used. The touch screen 126 and the touch screen controller 122 may detect contact and movement or breaking thereof using any of a variety of touch sensitive technologies, including but not limited to capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays, or other technologies for determining one or more points of contact with the touch screen 126. The touch screen 126 displays visual output from the portable device. The touch screen 126 may have a resolution greater than 100 dpi. In one exemplary embodiment, the touch screen 126 may have a resolution of approximately 168 dpi. The user may contact the touch screen 126 using any suitable object or accessory, such as a stylus, finger, or the like.
The mobile terminal 100 also includes a power system 130 for powering the various components. The power system 130 may include a power management system, one or more power sources (e.g., battery, Alternating Current (AC)), a charging system, power failure detection circuitry, a power converter or inverter, a power status indicator (e.g., Light Emitting Diode (LED)), and any other components associated with power generation, management, and distribution in portable devices.
In certain embodiments, the software components include an operating system 132, a communication module (or set of instructions) 134, a contact/motion module (or set of instructions) 138, a graphics module (or set of instructions) 140, a user interface state module (or set of instructions) 144, and one or more applications (or sets of instructions) 146.
Operating system 132 includes various software components and/or drivers for controlling and managing conventional system tasks (e.g., memory management, storage device control, power management, etc.) and for facilitating communication between the various software and hardware components.
The communication module 134 facilitates communication with other devices via one or more external ports 148 and it also includes various software components for processing data received by the RF circuitry 112 and/or the external ports 148. The external port 148 (e.g., Universal Serial Bus (USB), FIREWIRE, etc.) is adapted to couple to other devices either directly or indirectly via a network (e.g., the internet, wireless LAN, etc.).
The contact/motion module 138, in conjunction with the touch screen controller 122, detects contact with the touch screen 126. The contact/motion module 138 includes various software components for performing various operations associated with detection of contact with the touch screen 122, such as determining whether contact has occurred, determining whether the contact has moved, and tracking movement on the touch screen, and determining whether the contact has been broken (i.e., whether contact has ceased). Determining movement of the point of contact may include determining a velocity (magnitude), a velocity (magnitude and direction), and/or an acceleration (including magnitude and/or direction) of the point of contact.
The graphics module 140 includes various known software components for rendering and displaying graphics on the touch screen 126. Note that the term "graphic" includes any object that may be displayed to a user, including but not limited to text, web pages, icons (e.g., user interface objects including soft keys), digital images, videos, animations and the like.
In certain embodiments, the graphics module 140 includes a light intensity module 142. The light intensity module 142 controls the light intensity of graphical objects, such as user interface objects, displayed on the touch screen 126. The light intensity control may comprise increasing or decreasing the light intensity of the graphical object. In some embodiments, the increase or decrease may follow a predetermined function.
The user interface state module 144 controls the user interface state of the mobile terminal 100. The user interface state module 144 may include a lock module 150 and an unlock module 152. The lock module detects satisfaction of any one of one or more conditions for transitioning mobile terminal 100 to the user interface lock state and for transitioning mobile terminal 100 to the lock state.
The one or more applications 130 may include any application installed on the mobile terminal 100 including, but not limited to, browsers, address books, contact lists, WeChat, Payment Pair, email, instant messaging, word processing, keyboard emulation, widgets, voice recognition, voice replication, positioning navigation, music players, and so forth.
In some embodiments, mobile terminal 100 may include one or more optional optical sensors (not shown), such as CMOS or CCD image sensors, for use in imaging applications.
In some embodiments, the mobile terminal 100 is a device that: the predetermined set of functions on the device are all performed via the touch screen 126. By using a touch screen as the primary input/control device for operation of the mobile terminal 100, the number of physical input/control devices (e.g., push buttons, dials, etc.) on the mobile terminal 100 may be reduced. In one embodiment, the mobile terminal 100 includes a touch screen 126, push switches for powering the device on/off and locking the device, a volume dial button. The button may be used to turn on/off the power of the device by pressing the push button and holding the button in a pressed state for a predetermined time interval, or may be used to lock the device by pressing the button and releasing the button before the predetermined time interval elapses. In an alternative embodiment, mobile terminal 100 may also accept voice input through microphone 118 to activate or deactivate certain functions.
In the mobile terminal of this embodiment, the memory 102 stores an operating program, and the operating program, when executed by the processor 106, implements the steps of the operating method according to the first aspect of this embodiment.
In a third embodiment, this application further provides a readable storage medium, which stores a computer program, where the computer program includes program instructions, and the program instructions, when executed by a processor, implement the steps of any of the above-mentioned operation methods.
The computer readable storage medium may be an internal storage unit of the background server described in the foregoing embodiment, for example, a hard disk or a memory of the system. The computer readable storage medium may also be an external storage device of the system, such as a plug-in hard drive provided on the system, a Smart Media Card (SMC), a Secure Digital (SD) card, a flash card (FlashCard), and the like. Further, the computer readable storage medium may also include both an internal storage unit and an external storage device of the system. The computer-readable storage medium is used for storing the computer program and other programs and data required by the system. The computer readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially or partially contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the present application, the same or similar term concepts, technical solutions and/or application scenario descriptions will be generally described only in detail at the first occurrence, and when the description is repeated later, the detailed description will not be repeated in general for brevity, and when understanding the technical solutions and the like of the present application, reference may be made to the related detailed description before the description for the same or similar term concepts, technical solutions and/or application scenario descriptions and the like which are not described in detail later.
In the present application, each embodiment is described with emphasis, and reference may be made to the description of other embodiments for parts that are not described or illustrated in any embodiment.
The technical features of the technical solution of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, the scope of the present application should be considered as being described in the present application.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention.

Claims (10)

1. An operation method applied to a mobile terminal is characterized by comprising the following steps:
s1: displaying at least one piece of first identification information on a first preset interface according to a first preset strategy;
s2: receiving a first preset operation;
s3: and if the first preset operation meets a first preset condition, executing corresponding processing.
2. The method of claim 1, wherein the first preset policy comprises at least one of:
all the identification information corresponding to all the preset applications or functions is displayed;
displaying identification information corresponding to a preset application or function according to a preset operation;
displaying identification information corresponding to the application or function meeting the requirements in a first display mode;
and displaying the identification information corresponding to the application or the function which does not meet the requirement in a second display mode.
3. The method of claim 2, wherein the first display mode and/or the second display mode comprises at least one of:
fixed or floating display at a preset position;
static display or dynamic display;
regular display or irregular display;
the display effect of different applications is different;
the applications of different categories show different effects.
4. The method of any of claims 1 to 3, wherein the first predetermined operation satisfies a first predetermined condition, comprising at least one of:
the trigger position of the first preset operation belongs to a preset position;
when the first preset operation is triggered, user authentication information is obtained and authentication is passed;
the target application or the target function to be opened by the first preset operation meets the requirement.
5. The method according to any one of claims 1 to 3, wherein the step S1 further comprises:
and displaying the second identification information on a second preset interface according to a second preset strategy.
6. The method of claim 5, wherein the second predetermined policy comprises at least one of:
the first preset interface and the second preset interface are the same or different;
the applications or functions displayed on the first preset interface and the second preset interface are the same or different;
the application categories or the function categories displayed on the first preset interface and the second preset interface are the same or different.
7. The method of claim 6, wherein the manner of determining the category of the application or function comprises at least one of:
classifying applications or functions in the mobile terminal into safe and unsafe categories according to user use habits;
classifying applications or functions in the mobile terminal into safe and unsafe categories according to the settings of the mobile terminal and/or associated equipment;
applications or functions in the mobile terminal are classified into safe and unsafe categories based on big data analysis.
8. The method of claim 7, further comprising:
displaying a safe application or function on a first preset interface, and/or displaying an unsafe application or function on a second preset interface; and/or the presence of a gas in the gas,
and displaying the unsafe application or function on the first preset interface, and/or displaying the safe application or function on the second preset interface.
9. The method of claim 7 or 8, further comprising: and receiving a second preset operation, detecting whether the second preset operation meets a second preset condition, and if so, adjusting the display position of the application or the function and/or converting the safety category.
10. A mobile terminal, characterized in that the mobile terminal comprises: memory, processor, wherein the memory has stored thereon an operating program which, when executed by the processor, carries out the steps of the operating method according to any one of claims 1 to 9.
CN202110390614.5A 2021-04-12 2021-04-12 Operation method, mobile terminal and storage medium Pending CN113093941A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110390614.5A CN113093941A (en) 2021-04-12 2021-04-12 Operation method, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110390614.5A CN113093941A (en) 2021-04-12 2021-04-12 Operation method, mobile terminal and storage medium

Publications (1)

Publication Number Publication Date
CN113093941A true CN113093941A (en) 2021-07-09

Family

ID=76677165

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110390614.5A Pending CN113093941A (en) 2021-04-12 2021-04-12 Operation method, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113093941A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116610402A (en) * 2023-05-22 2023-08-18 深圳市腾进达信息技术有限公司 Wearing equipment display control method and wearing equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858225A (en) * 2019-01-30 2019-06-07 Oppo广东移动通信有限公司 Unlocked by fingerprint method, apparatus, terminal and storage medium
CN111309209A (en) * 2020-02-06 2020-06-19 华为技术有限公司 Method and device for quickly opening application or application function and terminal equipment
CN112256183A (en) * 2020-11-10 2021-01-22 深圳传音控股股份有限公司 Shortcut function display method, terminal and computer storage medium
CN112256171A (en) * 2020-10-20 2021-01-22 北京字节跳动网络技术有限公司 Method, device, terminal and storage medium for presenting information in screen locking interface
CN112363648A (en) * 2020-11-10 2021-02-12 深圳传音控股股份有限公司 Shortcut display method, terminal and computer storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858225A (en) * 2019-01-30 2019-06-07 Oppo广东移动通信有限公司 Unlocked by fingerprint method, apparatus, terminal and storage medium
CN111309209A (en) * 2020-02-06 2020-06-19 华为技术有限公司 Method and device for quickly opening application or application function and terminal equipment
CN112256171A (en) * 2020-10-20 2021-01-22 北京字节跳动网络技术有限公司 Method, device, terminal and storage medium for presenting information in screen locking interface
CN112256183A (en) * 2020-11-10 2021-01-22 深圳传音控股股份有限公司 Shortcut function display method, terminal and computer storage medium
CN112363648A (en) * 2020-11-10 2021-02-12 深圳传音控股股份有限公司 Shortcut display method, terminal and computer storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116610402A (en) * 2023-05-22 2023-08-18 深圳市腾进达信息技术有限公司 Wearing equipment display control method and wearing equipment

Similar Documents

Publication Publication Date Title
EP3232299B1 (en) Physical key component, terminal, and touch response method and device
US8675024B2 (en) Mobile terminal and displaying method thereof
US10129044B2 (en) Method and apparatus for controlling smart device
JP5956384B2 (en) Mobile terminal and voice recognition method thereof
US10721196B2 (en) Method and device for message reading
US9582181B2 (en) Method and apparatus for unlocking lock screen in electronic device
WO2019227488A1 (en) Method for viewing information content, and terminal
WO2019205065A1 (en) Method for quickly opening application or application function, and terminal
KR20120067636A (en) Mobile terminal and control method therof
CN108875394B (en) Electronic device and application program control method
US20120262388A1 (en) Mobile device and method for controlling mobile device
CN109314733A (en) The notice of coordination
WO2023030129A1 (en) Message display method, apparatus and electronic device
CN111880706B (en) Function switching method and device, electronic equipment and readable storage medium
CN111459362A (en) Information display method, information display device, electronic apparatus, and storage medium
CN108710806B (en) Terminal unlocking method and mobile terminal
US10311254B2 (en) Electronic apparatus and information access control method thereof
CN110753153A (en) Terminal control method, terminal and computer storage medium
CN108153460B (en) Icon hiding method and terminal
US20160365021A1 (en) Mobile device with low-emission mode
CN113422869A (en) Information processing method and device, computer readable storage medium and terminal
CN113093941A (en) Operation method, mobile terminal and storage medium
WO2023186011A1 (en) Image display method and apparatus, and electronic device
AU2014299558A1 (en) Apparatus and method for providing a security environment
US9430988B1 (en) Mobile device with low-emission mode

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210709

RJ01 Rejection of invention patent application after publication