CN113190882B - Method and device for shielding control - Google Patents

Method and device for shielding control Download PDF

Info

Publication number
CN113190882B
CN113190882B CN202110450598.4A CN202110450598A CN113190882B CN 113190882 B CN113190882 B CN 113190882B CN 202110450598 A CN202110450598 A CN 202110450598A CN 113190882 B CN113190882 B CN 113190882B
Authority
CN
China
Prior art keywords
target control
target
target object
determining
shielding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110450598.4A
Other languages
Chinese (zh)
Other versions
CN113190882A (en
Inventor
陈敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202110450598.4A priority Critical patent/CN113190882B/en
Publication of CN113190882A publication Critical patent/CN113190882A/en
Application granted granted Critical
Publication of CN113190882B publication Critical patent/CN113190882B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

The application discloses a method and a device for shielding a control, and belongs to the technical field of electronics. The method comprises the following steps: and displaying a target object, determining a target control according to the target object, and shielding the target control. In the process of displaying the target object, the electronic equipment firstly determines a target control corresponding to the target object and then shields the target control.

Description

Method and device for shielding control
Technical Field
The application belongs to the technical field of electronics, and particularly relates to a method and a device for shielding a control.
Background
With the development of internet technology, electronic devices are increasingly used in work and life. In some scenarios, it is necessary to share an electronic device between different users, and when sharing the electronic device, it is necessary to protect some data and functions in the electronic device to prevent the user from misoperation.
In the prior art, different accounts are usually set in the electronic device, and different users log in the electronic device by using the different accounts in the process of sharing the electronic device. When the method is used, the data and the functions corresponding to different accounts are completely isolated, and although misoperation can be prevented, the data and the functions cannot be shared among different accounts.
Disclosure of Invention
The embodiment of the application aims to provide a method and a device for shielding a control, which can solve the problem that data and functions cannot be shared in the sharing process of electronic equipment.
In a first aspect, an embodiment of the present application provides a method for shielding a control, where the method includes:
displaying a target object;
determining a target control according to the target object;
and shielding the target control.
In a second aspect, an embodiment of the present application provides an apparatus for shielding a control, where the apparatus includes:
the display module is used for displaying the target object;
the determining module is used for determining a target control according to the target object;
and the shielding module is used for shielding the target control.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, and a program or instruction stored on the memory and executable on the processor, the program or instruction implementing the steps of the method according to the first aspect when executed by the processor.
In a fourth aspect, embodiments of the present application provide a readable storage medium having stored thereon a program or instructions which when executed by a processor perform the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and where the processor is configured to execute a program or instructions to implement a method according to the first aspect.
In the embodiment of the application, the electronic equipment displays the target object, determines the target control according to the target object, and shields the target control. When sharing electronic equipment among a plurality of users, the target control corresponding to the target object is shielded, so that the user can be prevented from misoperation of the target object through the target control, other contents can be shared among different users, and sharing of data and functions can be realized.
Drawings
FIG. 1 is a flowchart of the steps of a method of shielding a control provided in accordance with an exemplary embodiment;
FIG. 2 is a schematic diagram of a display interface provided in accordance with an exemplary embodiment;
FIG. 3 is a schematic diagram of another display interface provided in accordance with an exemplary embodiment;
FIG. 4 is a schematic diagram of yet another display interface provided in accordance with an exemplary embodiment;
FIG. 5 is a schematic diagram of yet another display interface provided in accordance with an exemplary embodiment;
FIG. 6 is a schematic diagram of an apparatus for shielding controls provided in accordance with an exemplary embodiment;
FIG. 7 is a schematic diagram of an electronic device provided in accordance with an exemplary embodiment;
fig. 8 is a schematic diagram of a hardware structure of an electronic device according to an exemplary embodiment.
Detailed Description
The technical solutions of the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which are obtained by a person skilled in the art based on the embodiments of the present application, fall within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The method for shielding the control provided by the embodiment of the application is described in detail through specific embodiments and application scenes thereof with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart of steps of a method of shielding a control provided in accordance with an exemplary embodiment, the method may include:
step 101, displaying the target object.
Step 102, determining a target control according to the target object.
In this embodiment, the method for shielding the control may be performed by an electronic device having a display screen, such as a mobile phone, a tablet computer, and a notebook computer. When the electronic equipment displays the target object through the display screen, the target control can be determined according to the target object, and the target control is shielded.
Alternatively, step 102 may be implemented as follows:
a target control is identified from the display interface that matches the type or content of the target object.
In one embodiment, a corresponding target control may be set in advance for a certain type of target object. For example, a user may set multimedia data as a target object in the electronic device in advance, and set a corresponding target control for a certain type of multimedia data. In the process of displaying the multimedia data, the electronic device can detect the currently displayed display interface, determine the multimedia data from the display interface and determine a target control matched with the type of the multimedia data. Specifically, the user can set a corresponding target control for the text type multimedia data, the electronic device can acquire a screen image currently displayed by the display screen, target detection is performed on the screen image, the multimedia data are identified from the screen image, and when the multimedia data comprise text, the target control matched with the text type multimedia data can be identified and determined from the display interface. As shown in fig. 2, fig. 2 is a schematic diagram of a display interface provided according to an exemplary embodiment, a user may preset multimedia data as a target object, and set a corresponding target control for text multimedia data. When the electronic device detects that the text 201 is included in the display interface 200 when the display interface 200 included in the application program is displayed, it may first determine that the text 201 matches the type of the preset multimedia data. At this time, the electronic device may recognize a target control, which is determined to match the text-based multimedia data, from the display interface 200 according to the type of the text 201. For example, if the target controls corresponding to the text-based multimedia data include controls having a forwarding function, a copying function, and a deleting function, when the user clicks the text 201 and the electronic device displays the operation interface 202 corresponding to the text 201 in response to the clicking operation of the user, the electronic device may recognize and determine the target controls such as the copying button 2021, the forwarding button 2022, and the deleting button 2023 corresponding to the text-based multimedia data.
In another embodiment, the corresponding target control may be set for content included by the target object. For example, the user may set a certain type of picture as a target object, for example, may set a picture including a person as a target object, and set a corresponding target control. When the electronic equipment determines that the picture is displayed in the display screen, target detection can be performed on the picture, and if the picture is detected to include a person, a target control corresponding to the picture can be further determined. Alternatively, the user may set a corresponding target control for text comprising a certain type of content, e.g. text comprising the words "check" and "report" as target object. When the electronic equipment detects that the text is included in the display interface, the content included in the text can be detected, and when the text is detected to include characters such as check, report and the like, a target control corresponding to the text can be determined.
In yet another embodiment, the target object may be a particular multimedia data. As shown in fig. 2, a user may preset a picture 207 as a target object, and when the electronic device detects that the picture 203 is displayed in the display screen, according to the name of the picture 203, the user may determine that the picture 203 is the preset target object, and further may determine a target control corresponding to the picture 203.
In yet another embodiment, the target object may be an application interface in a certain application or a certain class of application interfaces, such as a payment class interface. The electronic device may detect the currently displayed application program interface, and if it is detected that the application program interface is a preset payment interface, determine a target control corresponding to the payment interface. The target control corresponding to the payment interface can pay the button.
In practical application, a user can set a corresponding target control according to the type or content of the target object, and in the process of displaying the target object, the electronic equipment can determine the corresponding target control from the display interface according to the type or content of the target object to shield, so that the user can flexibly set the target object according to the actual requirement, and the target object is protected.
It should be noted that the target object may be multimedia data such as pictures, videos, audios, texts, etc., files such as installation packages and compression packages, or application icons, application interfaces, etc., and the specific type of the target object may be set according to requirements. Methods of determining a target control from a target object may include, but are not limited to, the methods described in the examples above.
Optionally, before step 101, the method may further include:
receiving a first input, wherein the first input is used for determining a detection area from a display interface;
the display object in the detection area is taken as a target object.
In one embodiment, the user may manually select a determination target object from among the objects displayed on the display interface to cause the electronic device to mask a target control corresponding to the target object when the target object is next displayed. For example, the first input may be a sliding operation of sliding in a preset direction, and the electronic device may determine the detection area from the display interface according to the sliding trajectory in response to the sliding operation of the user. As shown in fig. 2, the user may slide from a first contact point 203 to the lower right to a second contact point 204 in the display interface to stop, and form a sliding track 205 in the display screen. The electronic apparatus may determine a rectangular area 206, i.e., a detection area, with the first contact point 203 and the second contact point 204 as two opposite vertices and with the sliding track 205 as a diagonal line in response to a sliding operation by a user. At this time, the electronic apparatus may detect the display object in the detection area 206 using the screen recognition technology, recognize the picture 207 therefrom, and set the picture 207 as the target object. After recognizing the picture 207, the electronic device may store the name of the picture 207, and in the next process of displaying the picture 207, may determine, according to the name of the picture 207, a target control corresponding to the picture 207. Alternatively, after identifying the picture 207, the picture-class multimedia data to which the picture 207 belongs may be taken as a target object.
In another embodiment, the first input may press a certain physical key or a virtual key in the electronic device, and the electronic device may respond to the pressing operation of the user, take the entire display interface as a detection area, and identify multimedia data such as text and pictures included in the display interface as a target object. The specific form of the first input, and the specific process of determining the detection area and the target object by the electronic device may be set according to requirements, which is not limited in this embodiment.
In practical application, a user can set a display object in a display interface as a target object through simple operation, so that the target object can be set quickly. When sharing electronic equipment, the target object can be set quickly, so that sharing of the electronic equipment among different users is facilitated.
It should be noted that, the target object and the target control corresponding to the target object may be set manually by the user, or may be set by default by the electronic device, which is not limited in this embodiment. For example, the electronic device may default the multimedia data to be a target object, and the target control corresponding to the default multimedia data includes a control having functions of copying, forwarding, modifying, and the like.
Step 103, shielding the target control.
In this embodiment, after determining the target control, the electronic device may mask the target control to prohibit the user from operating the target control, so as to prevent the user from operating the target object by mistake.
Alternatively, step 103 may be implemented as follows:
in the event that a second input to the target control is received, a response to the second input is prohibited.
In one embodiment, the electronic device may inhibit the target control from responding to user operations to prevent a user from operating the target object through the target control. Illustratively, the second input may be a click operation, and the user may click on a target control within the operation interface 202 to operate on the text 201. After the shielding of the target control is started, the electronic device may monitor the target controls such as the forwarding button, the copying button, and the deleting button in the operation interface 202, and if it is monitored that the user clicks the target controls such as the forwarding button, the copying button, and the deleting button, the generated control instruction is intercepted, so that the target control is prohibited from responding to the clicking operation of the user, thereby preventing the user from copying, forwarding, and deleting the text 201.
In practical application, the target control is prohibited from responding to the user operation, so that the user can be prevented from operating the target object through the target control, and the target object can be protected, and misoperation of the user is prevented.
Alternatively, step 103 may be implemented as follows:
determining a display area of a target control from a display screen;
and displaying a shielding cover layer in the display area, wherein the shielding cover layer is used for shielding the target control so as to isolate user operation.
In one embodiment, the electronic device may display a mask over a display area of the target control to obscure the target control and isolate user operations. As shown in fig. 3, fig. 3 is a schematic diagram of another display interface provided according to an exemplary embodiment, and when determining target controls such as a forwarding button, a copying button, and a deleting button corresponding to the text 201, the electronic device may further determine display areas of the forwarding button, the copying button, and the deleting button in the operation interface 202. For example, the electronic device may acquire coordinate information of the forwarding button, the copying button, and the deleting button in the display screen, and determine display areas of the forwarding button, the copying button, and the deleting button in the display screen according to the coordinate information. Further, the electronic device may display the corresponding shielding mask 208 in the display area, and shield the target control through the shielding mask 208, and when the user clicks the shielding mask 208, receive the clicking operation of the user through the shielding mask 208, so as to avoid that the target control such as the forwarding button, the copying button, and the deleting button receives the user operation, so as to isolate the target control and the user operation, and prevent the user from operating the target object through the target control in the display area. The specific form of the shielding cover layer may be set according to requirements, and this embodiment is not limited thereto.
In practical application, the shielding cover layer is displayed in the display area where the target control is located, so that the target control can be shielded, a user is prevented from viewing the target control, and the target control in the display area can be prevented from responding to the operation of the user. The shielding cover layer not only can shield the target control, but also can remind the user that the target control in the display area is not operable.
Alternatively, step 103 may be implemented as follows:
and canceling the display of the target control.
In one embodiment, the electronic device may directly cancel the display of the target control in the display screen while shielding the target control. For example, when the electronic device masks the copy button 2021, the forward button 2022, and the delete button 2023, the display of the copy button 2021, the forward button 2022, and the delete button 2023 in the operation interface 202 may be directly canceled, and the display positions of the copy button 2021, the copy button 2022, and the delete button 2023 may directly display blank content or display substitute content unrelated to the target control, so as to implement the masking of the target control.
It should be noted that, the method of shielding the target control may include, but is not limited to, the method illustrated in the foregoing examples, and any existing or future possible method may be applied in the present embodiment.
Optionally, the electronic device may also output notification information to notify the user that the target control is inoperable. As shown in fig. 3, the electronic device may display notification information "temporarily unavailable" on the surface of the shielding cover 208 to alert the user that the target control is unavailable. The notification information may be other types of notification information, which is not limited in this embodiment.
In one embodiment, the electronic device may also mask the target object to prevent the user from viewing the target object. As shown in connection with fig. 2, the electronic device may mask the picture 207 when determining that the target object is a preset icon 207. For example, the electronic device may display a shielding mask in a display area of the picture 207, and shield the picture 207 by shielding the picture by the shielding mask, so as to prevent other users from viewing the picture 207.
In summary, in this embodiment, the electronic device displays the target object, determines the target control according to the target object, and masks the target control. When sharing electronic equipment among a plurality of users, the target control corresponding to the target object is shielded, so that the user can be prevented from misoperation of the target object through the target control, other contents can be shared among different users, and sharing of data and functions can be realized.
In the prior art, different users need to log in the electronic device by using corresponding accounts respectively in the process of sharing the electronic device, and then can use the electronic device. When a user logs in the electronic equipment by using different accounts, the electronic equipment needs to be switched between the different accounts in the sharing process, and the switching process needs a long time. In this embodiment, after the user sets the target object, the electronic device can be shared, and in the sharing process, the user does not need to log in the electronic device by using different accounts, so that the problem of long time consumption in the account switching process can be solved.
Optionally, before step 101, the method may further include:
receiving a third input;
in response to the third input, the steps of determining the target control and masking the target control are triggered to be performed.
The third input is used for starting a shielding function of the electronic device, so that the electronic device executes the steps of determining the target control and shielding the target control. The third input, for example, a clicking operation for clicking a physical key or a virtual key included in the electronic device, and after receiving the clicking operation by the user, the electronic device may initiate a masking function of the electronic device in response to the clicking operation by the user, triggering execution of step 102 and step 103.
In an exemplary sharing process of the electronic device, if the user a needs to protect a target object in the electronic device, to prevent the user B who is about to use the electronic device from operating the target object by mistake, the user a may first set the target object and a corresponding target control in the electronic device, execute a third input, start a shielding function of the electronic device, and then give the electronic device to the user B. After receiving the third input, the electronic device may trigger execution of steps 102 and 103. At this time, if the target object set by the user a is displayed in the display screen during the use of the electronic device by the user B, the electronic device may determine the target control corresponding to the target object, and mask the target control. At this time, the user B cannot operate the target object operated by the target control, and can be prevented from operating the target object by mistake. Conversely, when the user a does not need to protect the target object, a fourth input corresponding to the third input may be performed, and the electronic device may close the shielding function in response to the fourth input, stopping performing steps 102 and 103. At this time, when the electronic device displays the target object, the shielding object corresponding to the target object is not shielded, and the user B can normally operate the target object. The specific form of the third input and the fourth input may be set according to the requirement, and the present embodiment is not limited thereto.
In one embodiment, after receiving the third input, the electronic device may initiate a masking function under an operating system currently running by the electronic device in response to the third input. For example, if the electronic device includes an account a and an account B, when the user a logs in to the a operating system using the account a, if the user a wants to share the electronic device with the user B, the user a may execute a third input to trigger the electronic device to start the shielding function under the a operating system. At this time, the user B may directly use the electronic device under the operating system a, and may not need to log in to the operating system B using the account B, so that switching of the operating system may be avoided, and thus the electronic device may be rapidly shared between the user a and the user B.
In practical application, when sharing electronic equipment, a user can start the shielding function of the electronic equipment through simple operation to protect a preset target object, so that the electronic equipment can be shared among different users rapidly, and meanwhile, the time loss in the account switching process can be avoided.
In another embodiment, the electronic device may automatically start the shielding function directly under the currently running operating system after the target object is set by the user, so as to protect the target object. At this time, regardless of the user using the electronic device, when the electronic device displays the target object on the display screen, the steps 102 and 103 are executed to mask the target control corresponding to the target object. Accordingly, the electronic device may stop the shielding function after the user deletes the target object, and stop protecting the target object. Or the electronic equipment can always keep the shielding function in a starting state, and protect the target object set by the user.
Optionally, before step 101, the method may further include:
displaying at least one control corresponding to the target object;
receiving a fourth input;
and responding to the fourth input, and determining a target control corresponding to the target object from at least one control.
In one embodiment, a user may manually set a target control corresponding to a target object. As shown in fig. 2, the fourth input may be a long-press operation on the target control, and after the electronic device displays the operation interface 202, if a long-press operation of the user long-pressing the copy button 2021 is received, the copy button 2021 may be determined to be the target control of the text-based multimedia data or determined to be the target control corresponding to the text 201 in response to the long-press operation of the user. Similarly, the forward button 2022 and delete button 2023 may be determined to be text-like target controls for media data. The specific form of the fourth input may be set according to the requirement, which is not limited in this embodiment.
In practical application, a user can set a corresponding target control for a target object through simple operation. When sharing electronic equipment, the target control can be quickly set, so that sharing of the electronic equipment among different users is facilitated.
In another embodiment, the electronic device may default to a unified target control for all target objects. For example, for multimedia data, the target controls of all multimedia data may be set as controls such as copy, forward, delete, and the like. Meanwhile, the electronic equipment can acquire related information corresponding to the target control, and the target control is determined according to the related information. For example, the electronic device may receive keywords such as "copy, forward, and delete" input by the user, and set controls related to copy, forward, and delete, etc., as target controls of the multimedia data according to the keywords. Or, the electronic device may obtain keywords such as "copy, forward, delete" from the server, and set controls related to copy, forward, delete, and the like as target controls of the multimedia data according to the keywords. Or, the electronic device may obtain the control icon of the delete button from the server, and set the target control according to the control icon. The specific method for setting the target control may be set according to the requirement, which is not limited in this embodiment.
Optionally, step 102 may also be implemented as follows:
determining a file type of the multimedia data;
And determining a target control corresponding to the authority according to the authority corresponding to the file type.
In one embodiment, the user may preset the rights of the multimedia data, and after the electronic device determines that the target object is the multimedia data, the electronic device may determine the file type of the multimedia data first, and then determine the target object according to the rights corresponding to the file type. As shown in fig. 4, fig. 4 is a schematic diagram of still another display interface provided according to an exemplary embodiment, in which a user may set rights of the picture-class multimedia data, if the user presses a file icon 401 of the picture-class multimedia data for a long time, the electronic device may display a rights setting window 402 in response to the user's long press operation, where the rights setting window 402 includes rights of editing inhibition, copying inhibition, forwarding inhibition, deletion inhibition, and the like. If the user clicks the selection button 403 corresponding to the editing prohibition, the electronic device may set the authority of the picture-type multimedia data including the editing prohibition in response to the clicking operation of the user.
Correspondingly, when the electronic equipment detects that the display screen comprises the target object picture, the electronic equipment can firstly determine that the picture is picture type multimedia data, and then determine that a control related to editing is a target control according to permission 'forbidden editing' corresponding to the picture type multimedia data. As shown in fig. 5, fig. 5 is a schematic diagram of another display interface provided according to an exemplary embodiment, when a display screen includes a picture 501, if an electronic device determines that deletion is prohibited in rights corresponding to picture-type multimedia data to which the picture 501 belongs, the electronic device may determine that a target control is a delete button 502 for the deletion prohibited rights, and the electronic device may display a shielding mask layer in a display area where the delete button 502 is located to shield the delete button 502. Similarly, for the permission to prohibit editing, the editing button 503 may be determined as a target control, and the display area where the editing button 503 is located may be masked.
In practical application, a user can indirectly set a target control corresponding to a target object through authority setting of the target object, and the electronic equipment can prevent the user from misoperation of the target object through shielding the target control corresponding to the target object. The specific process of authority setting can be set according to requirements, and the embodiment is not limited to this.
In yet another embodiment, for the target object, the electronic device may perform step 102 and step 103 to protect the target object when the attribute of the target object matches the preset attribute. For example, the target object may be picture multimedia data, the attribute is the receiving time and the sender of the picture, and the preset attribute is the current time and the user X. In the running process of the electronic device, if the picture sent by the user X is received, the electronic device can firstly determine that the receiving time of the picture is the current moment, and the sender of the picture is the user X. In the process of displaying the picture, the receiving time of the picture is determined to be the current moment, the sender is user X, the attribute of the picture is determined to be matched with the preset attribute, further a target control corresponding to the picture can be determined, and the target control is shielded. Otherwise, if the receiving time of the picture is not the current time and the sender of the picture is not the user X, determining that the attribute of the picture is not matched with the preset attribute, and not executing the steps of determining the target control and shielding the target control. The attribute of the target object may be specifically set according to the type of the target object, and the attribute of the target object may be one attribute or may be multiple attributes, which is not limited in this embodiment.
In practical application, when the attribute of the target object is matched with the preset attribute, the electronic device executes the steps of determining the target control and shielding the target control, so that a user can conveniently protect the target objects with different characteristics according to the characteristics of the target object.
It should be noted that, in the method for shielding a control provided by the embodiment of the present application, the execution body may be a device for shielding the control, or a control module for executing the method for shielding the control in the device for shielding the control. In the embodiment of the application, a method for executing the shielding control by using a device for shielding the control is taken as an example, and the device for shielding the control provided by the embodiment of the application is described.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an apparatus for shielding a control provided according to an exemplary embodiment, the apparatus 600 may include:
a display module 601, configured to display a target object;
a determining module 602, configured to determine a target control according to the target object;
a shielding module 603, configured to shield the target control.
In the embodiment of the application, the electronic equipment displays the target object, determines the target control according to the target object, and shields the target control. When sharing electronic equipment among a plurality of users, the target control corresponding to the target object is shielded, so that the user can be prevented from misoperation of the target object through the target control, other contents can be shared among different users, and sharing of data and functions can be realized.
Optionally, the apparatus 600 may further include:
the receiving module is used for receiving a first input, and the first input is used for determining a detection area from the display interface;
and the identification module is used for taking the display object in the detection area as a target object.
Optionally, the target object comprises multimedia data; a determining module 602, specifically configured to determine a file type of the multimedia data; and determining a target control corresponding to the authority according to the authority corresponding to the file type.
Optionally, the determining module 602 is specifically configured to identify, from the display interface, a target control that matches the type or content of the target object.
Optionally, the masking module 603 is specifically configured to prohibit responding to the second input if the second input to the target control is received.
Optionally, the shielding module 603 may include:
the determining unit is used for determining the display area of the target control from the display screen;
and the shielding unit is used for displaying a shielding cover layer in the display area, and the shielding cover layer is used for shielding the target control so as to isolate user operation.
The device for shielding the control in the embodiment of the application can be a device, and can also be a component, an integrated circuit or a chip in the terminal. The device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a cell phone, tablet computer, notebook computer, palm computer, vehicle mounted electronic device, wearable device, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook or personal digital assistant (personal digital assistant, PDA), etc., and the non-mobile electronic device may be a server, network attached storage (Network Attached Storage, NAS), personal computer (personal computer, PC), television (TV), teller machine or self-service machine, etc., and embodiments of the present application are not limited in particular.
The device for shielding the control in the embodiment of the application can be a device with an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The device for shielding the control provided by the embodiment of the present application can implement each process implemented by the method embodiment of fig. 1, and in order to avoid repetition, a description is omitted here.
Optionally, as shown in fig. 7, fig. 7 is a schematic structural diagram of an electronic device according to an exemplary embodiment, where the electronic device 700 includes a processor 701, a memory 702, and a program or an instruction stored in the memory 702 and capable of running on the processor 701, where the program or the instruction implements each process of the method embodiment of the shielding control described above when executed by the processor 701, and the process can achieve the same technical effects, and is not repeated herein.
The electronic device in the embodiment of the application includes the mobile electronic device and the non-mobile electronic device.
Fig. 8 is a schematic diagram of a hardware structure of an electronic device according to an exemplary embodiment.
The electronic device 800 includes, but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, input unit 804, sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, and processor 810.
Those skilled in the art will appreciate that the electronic device 800 may also include a power source (e.g., a battery) for powering the various components, which may be logically connected to the processor 810 by a power management system to perform functions such as managing charge, discharge, and power consumption by the power management system. The electronic device structure shown in fig. 8 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than shown, or may combine certain components, or may be arranged in different components, which are not described in detail herein.
Wherein, the display unit 806 is configured to display a target object;
determining a target control according to the target object;
the target control is masked.
In the embodiment of the application, the electronic equipment displays the target object, determines the target control according to the target object, and shields the target control. When sharing electronic equipment among a plurality of users, the target control corresponding to the target object is shielded, so that the user can be prevented from misoperation of the target object through the target control, other contents can be shared among different users, and sharing of data and functions can be realized.
Optionally, the display unit 806 is further configured to receive a first input, where the first input is used to determine a detection area from the display interface;
the display object in the detection area is taken as a target object, so that the target control is determined and shielded when the target object is displayed next time.
In practical application, a user can set a display object in a display screen as a target object through simple operation, so that the target object can be set quickly. When sharing electronic equipment, the target object can be set quickly, so that sharing of the electronic equipment among different users is facilitated.
Optionally, the target object comprises multimedia data.
The display unit 806 is specifically configured to determine a file type of the multimedia data; and determining a target control corresponding to the authority according to the authority corresponding to the file type.
In practical application, a user can indirectly set a target control corresponding to a target object through setting the authority of the target object, and the electronic equipment can prevent the user from misoperation of the target object through shielding the target control corresponding to the target object.
Optionally, the display unit 806 is specifically configured to identify, from the display interface, a target control that matches the type or content of the target object.
In practical application, a user can set a corresponding target control according to the type or content of the target object, and in the process of displaying the target object, the electronic equipment can determine the corresponding target control from the display interface according to the type or content of the target object to shield, so that the user can flexibly set the target object according to the actual requirement and protect the target object.
Optionally, the display unit 806 is specifically configured to prohibit responding to the second input if the second input to the target control is received.
In practical application, the target control is prohibited from responding to the user operation, so that the user can be prevented from operating the target object through the target control, and the target object can be protected, and misoperation of the user is prevented.
Optionally, the display unit 806 is specifically configured to determine a display area of the target control from the display screen;
and displaying a shielding cover layer in the display area, wherein the shielding cover layer is used for shielding the target control so as to isolate user operation.
In practical application, the shielding cover layer is displayed in the display area where the target control is located, so that the target control can be shielded, a user is prevented from viewing the target control, and the target control in the display area can be prevented from responding to the operation of the user. The shielding cover layer not only can shield the display area, but also can remind a user that a target control in the display area is not operable.
It should be appreciated that in embodiments of the present application, the input unit 804 may include a graphics processor (Graphics Processing Unit, GPU) 8041 and a microphone 8042, the graphics processor 8041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 806 may include a display panel 8061, and the display panel 8061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 807 includes a touch panel 8071 and other input devices 8072. Touch panel 8071, also referred to as a touch screen. The touch panel 8071 may include two parts, a touch detection device and a touch controller. Other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein. The memory 809 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 810 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 810.
The embodiment of the application also provides a readable storage medium, and the readable storage medium stores a program or an instruction, which when executed by a processor, implements each process of the method embodiment of the shielding control, and can achieve the same technical effects, so that repetition is avoided, and no further description is provided here.
Wherein the processor is a processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
The embodiment of the application further provides a chip, which comprises a processor and a communication interface, wherein the communication interface is coupled with the processor, and the processor is used for running programs or instructions to realize the processes of the method embodiment of the shielding control, and the same technical effects can be achieved, so that repetition is avoided, and the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (10)

1. A method of shielding a control, comprising:
receiving a first input, wherein the first input is used for determining a detection area from a display interface;
taking a display object in the detection area as a target object;
displaying the target object; the target object comprises multimedia data, an installation package, a compression package, an application icon and an application interface; the multimedia data comprises pictures, video, audio and text;
determining a target control according to the target object; the target control comprises a control with a forwarding function, a copying function and a deleting function;
shielding the target control;
the first input is a sliding operation of sliding along a preset direction, and the determining the detection area from the display interface comprises:
responding to a sliding operation of a user, and determining the detection area from the display interface according to a sliding track corresponding to the sliding operation;
in the case where the first input is a pressing operation for pressing a physical key or a virtual key in the electronic device, the determining a detection area from the display interface includes:
and responding to the pressing operation of the user, and taking the whole displayed application program interface as the detection area.
2. The method of claim 1, wherein the determining a target control from the target object comprises:
determining a file type of the multimedia data;
and determining a target control corresponding to the authority according to the authority corresponding to the file type.
3. The method of claim 1, wherein the determining a target control from the target object comprises:
a target control matching the type or content of the target object is identified from a display interface.
4. A method according to any of claims 1-3, wherein the masking the target control comprises:
and in the case of receiving a second input to the target control, disabling responding to the second input.
5. A method according to any of claims 1-3, wherein the masking the target control comprises:
determining a display area of the target control from a display screen;
and displaying a shielding cover layer in the display area, wherein the shielding cover layer is used for shielding the target control so as to isolate user operation.
6. An apparatus for shielding a control, comprising:
the receiving module is used for receiving a first input, and the first input is used for determining a detection area from the display interface;
The identification module is used for taking the display object in the detection area as a target object;
the display module is used for displaying the target object; the target object comprises multimedia data, an installation package, a compression package, an application icon and an application interface; the multimedia data comprises pictures, video, audio and text;
the determining module is used for determining a target control according to the target object; the target control comprises a control with a forwarding function, a copying function and a deleting function;
the shielding module is used for shielding the target control;
the first input is a sliding operation of sliding along a preset direction, and the determining the detection area from the display interface comprises:
responding to a sliding operation of a user, and determining the detection area from the display interface according to a sliding track corresponding to the sliding operation;
in the case where the first input is a pressing operation for pressing a physical key or a virtual key in the electronic device, the determining a detection area from the display interface includes:
and responding to the pressing operation of the user, and taking the whole displayed application program interface as the detection area.
7. The apparatus of claim 6, wherein the device comprises a plurality of sensors,
The determining module is specifically configured to determine a file type of the multimedia data; and determining a target control corresponding to the authority according to the authority corresponding to the file type.
8. The apparatus of claim 6, wherein the device comprises a plurality of sensors,
the determining module is specifically configured to identify, from a display interface, a target control that matches a type or content of the target object.
9. The apparatus according to any of claims 6-8, wherein the masking module is specifically configured to disable responding to a second input to the target control if the second input is received.
10. The apparatus of any of claims 6-8, wherein the shielding module comprises:
the determining unit is used for determining the display area of the target control from the display screen;
and the shielding unit is used for displaying a shielding cover layer in the display area, and the shielding cover layer is used for shielding the target control so as to isolate user operation.
CN202110450598.4A 2021-04-25 2021-04-25 Method and device for shielding control Active CN113190882B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110450598.4A CN113190882B (en) 2021-04-25 2021-04-25 Method and device for shielding control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110450598.4A CN113190882B (en) 2021-04-25 2021-04-25 Method and device for shielding control

Publications (2)

Publication Number Publication Date
CN113190882A CN113190882A (en) 2021-07-30
CN113190882B true CN113190882B (en) 2023-10-13

Family

ID=76978819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110450598.4A Active CN113190882B (en) 2021-04-25 2021-04-25 Method and device for shielding control

Country Status (1)

Country Link
CN (1) CN113190882B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN104965646A (en) * 2015-06-02 2015-10-07 深圳市金立通信设备有限公司 Operation instruction response processing method and terminal
CN105049597A (en) * 2015-06-01 2015-11-11 惠州Tcl移动通信有限公司 Interaction method and system for entering visitor mode during picture browse of mobile terminal
KR20160066963A (en) * 2014-12-03 2016-06-13 엘지전자 주식회사 Mobile terminal and control method thereof
CN105930139A (en) * 2016-01-16 2016-09-07 平安科技(深圳)有限公司 Application program control dynamic configuration method and electronic device
CN106095279A (en) * 2016-06-23 2016-11-09 珠海市魅族科技有限公司 A kind of functional shielding method and device
CN106203153A (en) * 2016-06-23 2016-12-07 珠海市魅族科技有限公司 A kind of information access control method and device
CN106407831A (en) * 2015-07-31 2017-02-15 中兴通讯股份有限公司 File protection method and device, and mobile terminal
CN107608616A (en) * 2017-09-12 2018-01-19 中广热点云科技有限公司 A kind of audio/video player system and method for mobile terminal privacy
CN109597542A (en) * 2018-10-08 2019-04-09 华为技术有限公司 A kind of photograph album methods of exhibiting, electronic equipment and storage medium
CN112398978A (en) * 2019-07-30 2021-02-23 华为技术有限公司 Privacy protection method of electronic equipment and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8811948B2 (en) * 2010-07-09 2014-08-19 Microsoft Corporation Above-lock camera access
US9935978B2 (en) * 2014-09-19 2018-04-03 Microsoft Technology Licensing, Llc Policy application for multi-identity apps
US10652218B2 (en) * 2016-08-31 2020-05-12 Mcafee, Llc Message protection

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160066963A (en) * 2014-12-03 2016-06-13 엘지전자 주식회사 Mobile terminal and control method thereof
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN105049597A (en) * 2015-06-01 2015-11-11 惠州Tcl移动通信有限公司 Interaction method and system for entering visitor mode during picture browse of mobile terminal
CN104965646A (en) * 2015-06-02 2015-10-07 深圳市金立通信设备有限公司 Operation instruction response processing method and terminal
CN106407831A (en) * 2015-07-31 2017-02-15 中兴通讯股份有限公司 File protection method and device, and mobile terminal
CN105930139A (en) * 2016-01-16 2016-09-07 平安科技(深圳)有限公司 Application program control dynamic configuration method and electronic device
CN106095279A (en) * 2016-06-23 2016-11-09 珠海市魅族科技有限公司 A kind of functional shielding method and device
CN106203153A (en) * 2016-06-23 2016-12-07 珠海市魅族科技有限公司 A kind of information access control method and device
CN107608616A (en) * 2017-09-12 2018-01-19 中广热点云科技有限公司 A kind of audio/video player system and method for mobile terminal privacy
CN109597542A (en) * 2018-10-08 2019-04-09 华为技术有限公司 A kind of photograph album methods of exhibiting, electronic equipment and storage medium
CN112398978A (en) * 2019-07-30 2021-02-23 华为技术有限公司 Privacy protection method of electronic equipment and electronic equipment

Also Published As

Publication number Publication date
CN113190882A (en) 2021-07-30

Similar Documents

Publication Publication Date Title
CN111966258B (en) Permission setting method and device and electronic equipment
CN112099705B (en) Screen projection method and device and electronic equipment
CN112804445B (en) Display method and device and electronic equipment
CN112947829B (en) Misoperation processing method and device, electronic equipment and readable storage medium
CN112148163B (en) Screen recording method and device and electronic equipment
CN112286416A (en) Information display method and device and electronic equipment
CN111695151A (en) Application permission setting method and device, electronic equipment and readable storage medium
CN112417420A (en) Information processing method and device and electronic equipment
CN113992615B (en) Method and device for displaying withdrawal message, electronic equipment and storage medium
CN113867585B (en) Interface display method, device, electronic equipment and storage medium
CN113918894A (en) Authority management method and authority management device
CN112948843A (en) Encryption method, encryption device, electronic equipment and medium
CN113190882B (en) Method and device for shielding control
WO2023125238A1 (en) Unlocking control method and apparatus, electronic device, and readable storage medium
WO2023103901A1 (en) Application management method and apparatus, and electronic device
CN109756539B (en) Screen capture control method and related equipment
CN114416264A (en) Message display method and device
CN111723163B (en) Information processing method, device and system
CN114741727A (en) Data sending method and device
CN113655937A (en) Application management method and device, electronic equipment and readable storage medium
CN114398128A (en) Information display method and device
CN113300944A (en) Friend adding method and device and electronic equipment
CN113347076B (en) Session information deleting method and device
CN113835576A (en) Icon operation method and device
CN117111811A (en) Screenshot method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant