CN114442891A - Thumbnail display method and terminal equipment - Google Patents

Thumbnail display method and terminal equipment Download PDF

Info

Publication number
CN114442891A
CN114442891A CN202011117065.6A CN202011117065A CN114442891A CN 114442891 A CN114442891 A CN 114442891A CN 202011117065 A CN202011117065 A CN 202011117065A CN 114442891 A CN114442891 A CN 114442891A
Authority
CN
China
Prior art keywords
thumbnail
control
application program
terminal device
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011117065.6A
Other languages
Chinese (zh)
Inventor
宋明东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202011117065.6A priority Critical patent/CN114442891A/en
Publication of CN114442891A publication Critical patent/CN114442891A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a thumbnail display method and terminal equipment, wherein the method comprises the following steps: judging whether a control for starting a safety mode exists in the application program; if the application program has a control for starting the safety mode, carrying out fuzzy processing on display information corresponding to the control for starting the safety mode to obtain a thumbnail of the application program; a thumbnail of the application is displayed. According to the thumbnail display method and the terminal device, the private information of the user can be locally protected in the thumbnail interface of the latest task, the private information of the user is protected, normal display of other non-private information of the user is not influenced, and user experience is improved.

Description

Thumbnail display method and terminal equipment
Technical Field
The present application relates to the field of communications, and in particular, to a thumbnail display method and a terminal device.
Background
Many Applications (APPs) related to user privacy information exist on the terminal device, for example, a bank APP, a payment APP, a personal tax APP, a real estate APP, a social APP, and the like, and some User Interfaces (UIs) of these APPs may display user privacy information, for example, account balance, transfer information, transaction information, real estate information, social information, and the like. When a user views a latest task through a multi-task key (a receive key) on the terminal device, the terminal device may display a thumbnail of a last use interface of an APP that is recently run by the terminal device on a thumbnail interface of the latest task. Therefore, if the last interface of the APP run by the terminal device relates to the user privacy information in the near future, the user privacy information may be leaked.
At present, in a thumbnail interface of a recent task, for an APP related to user privacy information, a terminal device integrally protects a thumbnail of a last user interface of the APP, for example, modes such as integral whitewashing and integral blurring affect normal display of other non-user privacy information, and user experience is poor.
Disclosure of Invention
The application provides a thumbnail display method and terminal equipment, which can locally protect user privacy information in a thumbnail interface of a recent task, protect the user privacy information, and simultaneously do not influence normal display of other non-user privacy information, thereby improving user experience.
In a first aspect, a thumbnail display method is provided, including: judging whether a control for starting a safety mode exists in the application program; if the application program has a control for starting the safety mode, carrying out fuzzy processing on display information corresponding to the control for starting the safety mode to obtain a thumbnail of the application program; a thumbnail of the application is displayed.
An application may include one or more controls, each of which has a respective security mode that may be either on or off. The security mode of one control is in an open state to indicate that the display information corresponding to the control is the user privacy information, and the security mode of the one control is in a closed state to indicate that the display information corresponding to the control is not the user privacy information.
It should be understood that the thumbnail of the application program displayed in the embodiment of the present application is a thumbnail that has been subjected to local blurring processing. In the thumbnail, the terminal device only carries out fuzzy processing on the private information of the user, so that local protection is realized, and other non-private information can be normally displayed in the thumbnail.
According to the thumbnail display method, whether the safe mode is opened or not is judged, the thumbnail of the application program of the control of the safe mode is protected in the control level, the thumbnail of the application program can be subjected to local fuzzification more intelligently, the protection of user privacy information is achieved, meanwhile, the user does not influence the check of the user on other non-user privacy information of the thumbnail interface of the application program, and the user experience is improved.
With reference to the first aspect, in some implementation manners of the first aspect, performing fuzzy processing on display information corresponding to a control for starting a secure mode to obtain a thumbnail of the application program includes: and when the application program exits from the foreground, carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode to obtain the thumbnail of the application program.
It should be appreciated that exiting the foreground of an application may include switching a running application to a background running or exiting a running application. When the application program exits from the foreground, the active component management module in the terminal device can control the active component and the graphic module to generate the thumbnail of the application program, perform fuzzy processing on the display information corresponding to the control for starting the security mode in the application program, and then store the thumbnail.
With reference to the first aspect, in some implementation manners of the first aspect, before performing fuzzy processing on display information corresponding to a control for starting a secure mode and obtaining a thumbnail of an application, the method further includes: receiving a first instruction, wherein the first instruction is used for accessing a latest task thumbnail; the method for carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode to obtain the thumbnail of the application program comprises the following steps: and responding to the first instruction, carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode, and obtaining the thumbnail of the application program.
In the embodiment of the application, when the user quits the application program from foreground operation, the terminal device generates a thumbnail of the application program based on the last use interface of the application program. At this time, all the information in the thumbnail can be normally displayed. When the terminal device receives a first instruction of a user, the terminal device may respond to the first instruction, and perform fuzzy processing on display information corresponding to a control for starting a security mode in a thumbnail of a last interface used by a recently-used application program in the thumbnail of the application program, so as to obtain the thumbnail processed by the application program.
It should be appreciated that the first instructions for accessing the most recent task thumbnail described above may be different for different types of terminal devices. For example, for some types of terminal devices, the user may tap the lower left touch key to cause the terminal device to display the most recent task thumbnail; for some types of terminal equipment, a user can enable the terminal equipment to display a latest task thumbnail by long-pressing a home key (home); for other types of terminal devices, a user may perform a gesture operation (for example, the user may slide the main interface of the terminal device upwards or leftwards) to cause the terminal device to display the latest task thumbnail, which is not limited in this embodiment of the present application
With reference to the first aspect, in certain implementations of the first aspect, the method further includes: receiving a second instruction, wherein the second instruction is used for modifying the safety mode of the control of the application program; in response to the second instruction, a security mode of a control of the application is modified. The second instruction is used for changing the safety mode of the control of the application program from open to close or from close to open.
In the embodiment of the application, the user can modify the security mode corresponding to the control in the application program, so that whether each piece of display information in the thumbnail of the last using interface of the application program needs to be protected or not is flexibly selected, the method and the device can be more intelligent and humanized, and the user experience is improved.
It should be understood that the security mode of the control of the application program may be that, in the process of developing the application program, a developer sets selection keys for the control in the application program, so that after the user installs the application program on the terminal device, the security mode corresponding to the control of the application program can be modified by himself, thereby meeting the requirements of different users. Generally, the security mode of a control in an application may be a default state (e.g., on or off) at development time.
In a second aspect, a terminal device is provided, which is configured to perform the method in any one of the possible implementation manners of the first aspect. In particular, the terminal device comprises means for performing the method of any one of the possible implementations of the first aspect described above.
In a third aspect, a terminal device is provided, which includes a processor coupled to a memory and configured to execute instructions in the memory to implement the method in any one of the possible implementations of the first aspect. Optionally, the terminal device further comprises a memory. Optionally, the terminal device further comprises a communication interface, the processor being coupled to the communication interface.
In one implementation, the communication interface of the terminal device may be a transceiver, or an input/output interface.
In a fourth aspect, a processor is provided, comprising: input circuit, output circuit and processing circuit. The processing circuit is configured to receive a signal via the input circuit and transmit a signal via the output circuit, so that the processor performs the method of any one of the possible implementations of the first aspect.
In a specific implementation process, the processor may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, various logic circuits, and the like. The input signal received by the input circuit may be received and input by, for example and without limitation, a receiver, the signal output by the output circuit may be output to and transmitted by a transmitter, for example and without limitation, and the input circuit and the output circuit may be the same circuit that functions as the input circuit and the output circuit, respectively, at different times. The embodiment of the present application does not limit the specific implementation manner of the processor and various circuits.
In a fifth aspect, a processing apparatus is provided that includes a processor and a memory. The processor is configured to read instructions stored in the memory to perform the method of any one of the possible implementations of the first aspect.
Optionally, there are one or more processors and one or more memories.
Alternatively, the memory may be integrated with the processor, or provided separately from the processor.
In a specific implementation process, the memory may be a non-transient memory, such as a Read Only Memory (ROM), which may be integrated on the same chip as the processor, or may be separately disposed on different chips.
The processing device in the fifth aspect may be a chip, the processor may be implemented by hardware or software, and when implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like; when implemented in software, the processor may be a general-purpose processor implemented by reading software code stored in a memory, which may be integrated with the processor, located external to the processor, or stand-alone.
In a sixth aspect, there is provided a computer program product comprising: computer program (also called code, or instructions), which when executed, causes a computer to perform the method of any of the possible implementations of the first aspect described above.
In a seventh aspect, a computer-readable storage medium is provided, which stores a computer program (which may also be referred to as code or instructions) that, when executed on a computer, causes the computer to perform the method in any of the possible implementations of the first aspect.
In an eighth aspect, a chip system is provided, which includes a processor and is configured to implement the method according to the first aspect or any one of the possible implementation manners of the first aspect. In one possible design, the system-on-chip further includes a memory to store the program instructions. The chip system may be formed by a chip, and may also include a chip and other discrete devices.
Drawings
FIG. 1 is a block diagram of components of a recent task thumbnail protection unit provided by an embodiment of the present application;
fig. 2 is a schematic flowchart of a thumbnail display method of an embodiment of the present application;
FIG. 3 is a schematic diagram of a recent task thumbnail interface provided by an embodiment of the present application;
FIG. 4 is an interface diagram for modifying a security mode of a display control according to an embodiment of the present disclosure;
FIG. 5 is a schematic interface diagram of another embodiment of the present disclosure for modifying a security mode of a display control;
fig. 6 is a schematic block diagram of a terminal device according to an embodiment of the present application;
fig. 7 is a schematic block diagram of another terminal device according to an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
It should be understood that the technical solution of the embodiment of the present application may be applied to various operating systems having a function of viewing a latest task thumbnail, such as an android system (android), an apple operating system (ios), a microsoft system (microsoft windows), and other operating systems that may appear in the future.
The terminal device of the embodiment of the present application may also be referred to as a User Equipment (UE), for example, a mobile phone (mobile phone), a tablet computer, a laptop computer, a palmtop computer, a Mobile Internet Device (MID), a wearable device, a Virtual Reality (VR) device, an Augmented Reality (AR) device, a wireless terminal in industrial control (industrial control), a wireless terminal in self driving (self driving), a wireless terminal in remote surgery (remote medical supply), a wireless terminal in a smart grid (smart grid), a wireless terminal in transportation security (transportation security), a wireless terminal in a smart city (smart city), a wireless terminal in a smart home (smart home), or other processing devices capable of installing an operating system, a wearable terminal device, a future public network device (G5), or a mobile network device (future public network G), PLMN), and the like, which is not limited in this embodiment of the present application.
The following takes the android system as an example, and details of components of the latest task thumbnail protection unit are described with reference to fig. 1.
Fig. 1 shows a component block diagram of a latest task thumbnail protection unit 100 provided in an application embodiment. As shown in fig. 1, the latest task thumbnail protection unit 100 may include: activity component (activity)110, recent tasks (services) service module 120, display (view) control 130, activity component management (activity manager) module 140, and graphics (graphic) module 150 of APP.
The activity component 110 is one of the four core components of android, and has a main function of providing an interface and interacting with a user. An application is typically composed of a plurality of activity components, each of which is responsible for exposing a user interface. One of the activity components is generally designated as a main activity component in an application program, wherein the main activity component is the activity component which is presented to a user when the application program is started for the first time; the latest task service module 120 is responsible for responding to the multitask key and calling out a thumbnail interface of the latest task; the display control 130 includes a text control, a picture control, a button control, a clock control, a date and time selection control, etc., and the display control may also be referred to as a control for short in this application, and is provided for an application program to draw a window (window); the active component management module 140 is responsible for managing the active component 110, which may include an active component manager wrapper (active manager wrapper), and controls the active component 110 to generate a current interface thumbnail of the application when the application exits (pause); the graphics module 150 is configured to perform graphics processing such as multi-layer fusion drawing and transparency.
The terminal equipment has a plurality of APPs related to user privacy information, such as bank type APPs, payment type APPs, personal tax APPs, real estate APPs, social type APPs and the like, and some UI interfaces of the APPs can display the user privacy information, such as account balance, transfer information, transaction information, real estate information, social information and the like. When a user views a latest task through a multi-task key (a receive key) on the terminal device, the terminal device may display a thumbnail of a last use interface of an APP that is recently run by the terminal device on a thumbnail interface of the latest task. Therefore, if the last using interface of the APP run by the terminal device relates to the user privacy information in the near future, the user privacy information may be leaked. Therefore, for a terminal device which can display a latest task thumbnail interface, it is extremely important to protect the related display interface which may reveal the privacy information of the user and exists in the thumbnail of the latest application program last-used interface.
At present, in a thumbnail interface of a recent task, for an APP related to user privacy information, a terminal device integrally protects a thumbnail of a last user interface of the APP, for example, modes such as integral whitewashing and integral blurring affect normal display of other non-user privacy information, and user experience is poor.
In view of this, the application provides a thumbnail display method and a terminal device, and the method includes determining whether a control in an application program opens a secure mode, performing control-level protection on the thumbnail of the application program that opens the control in the secure mode, and performing local fuzzification processing on the thumbnail of the application program more intelligently. When a user calls a latest task thumbnail interface through a multitask key or a gesture, the private information of the user is locally protected in the thumbnail interface of the latest task, meanwhile, the normal display of other non-user private information is not influenced, and the user experience is improved.
In the embodiments shown below, terms and english abbreviations such as security mode, thumbnail, multitask key, user privacy information, and the like are exemplary examples given for convenience of description, and should not limit the present application in any way. This application is not intended to exclude the possibility that other terms may exist or may be defined in the future that achieve the same or similar functionality.
The thumbnail display method 200 according to the embodiment of the present application will be described in detail below with reference to fig. 2. The method 200 may be applied to the protection unit 100 shown in fig. 1, but the embodiment of the present application is not limited thereto. The method 200 may be performed by a terminal device, comprising the steps of:
s201, judging whether a control for starting a safety mode exists in the application program.
It should be understood that an application may include one or more controls, each of which has a respective security mode that may be either on or off. The security mode of one control is in an open state to indicate that the display information corresponding to the control is the user privacy information, and the security mode of the one control is in a closed state to indicate that the display information corresponding to the control is not the user privacy information.
In a possible implementation, the state of the security mode may also be represented by a security attribute value. For example, a control in an application may have a security attribute (secure flag), a value of the security attribute may be true (true) or false (false), a value of the security attribute of the control being true indicates that the security mode of the control is in an on state, and a value of the security attribute of the control being false indicates that the security mode of the control is in an off state.
And S202, if the application program has a control for starting the safety mode, carrying out fuzzy processing on display information corresponding to the control for starting the safety mode to obtain the thumbnail of the application program.
It should be understood that the display information may be one or more of text information, time information, picture information, and the like, which may appear in the display interface of the application program.
Illustratively, the blurring process may include: fuzzification processing, whitewashing processing or elimination processing and the like are carried out on the position corresponding to the user privacy information in the thumbnail, so that the user privacy information is not displayed in the thumbnail, and the protection of the user privacy information is realized. The user privacy information may be, for example, account balance, transfer information, transaction information, property information, social information, and the like, which is not limited in this embodiment of the application.
It should be understood that the foregoing fuzzy processing may also be referred to as protection processing, privacy processing, or other names, which are not limited in the embodiments of the present application.
S203, a thumbnail of the application is displayed.
It should be understood that the thumbnail may be a picture generated after the original application interface is reduced according to a certain proportion, but the content of the original interface is kept unchanged in the process of reduction.
Alternatively, the thumbnail of the application may be an interface of one or more task thumbnails presented in a preset presentation form (e.g., a list form or a stacked form). The thumbnail can be an interface thumbnail of an application which has been run in a predetermined time or is running in the background.
The thumbnail of the application program displayed in the embodiment of the application program is the thumbnail after the local fuzzy processing, in the thumbnail, the terminal device only performs the fuzzy processing on the privacy information of the user, so that the local protection is realized, and other non-privacy information can be normally displayed in the thumbnail.
According to the thumbnail display method, whether the safe mode is opened or not is judged, the thumbnail of the application program of the control of the safe mode is protected in the control level, the thumbnail of the application program can be subjected to local fuzzification more intelligently, the protection of user privacy information is achieved, meanwhile, the user does not influence the check of the user on other non-user privacy information of the thumbnail interface of the application program, and the user experience is improved.
The thumbnail display interface of the application program will be described in detail with reference to fig. 3. Illustratively, fig. 3 is a schematic diagram of a recent task thumbnail interface provided by an embodiment of the present application. The method comprises the steps that the terminal equipment runs a China Bank APP (as shown in an interface a in figure 3), the interface a comprises card number information, balance information, time information and the like, when the terminal equipment receives an instruction for displaying a recent task thumbnail interface, the method S201-S203 is executed, the recent task thumbnail interface as shown in an interface b in figure 3 is displayed on the terminal equipment, wherein the thumbnail of the China Bank APP is included, only account balance information in the thumbnail of the China Bank APP is subjected to fuzzy processing and is not displayed, and other information can be normally displayed.
As an optional embodiment, performing fuzzy processing on display information corresponding to a control for starting a secure mode to obtain a thumbnail of the application program includes: and when the application program exits from the foreground, carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode to obtain the thumbnail of the application program.
It should be appreciated that exiting the foreground of an application may include switching a running application to a background running or exiting a running application. When the application program exits from the foreground, the active component management module in the terminal device can control the active component and the graphic module to generate the thumbnail of the application program, perform fuzzy processing on the display information corresponding to the control for starting the security mode in the application program, and then store the thumbnail.
Illustratively, the blurring process may be implemented by a graphics module. The implementation manner of the fuzzy processing may be to perform local fuzzy on the layer of the control corresponding to the display information in the last use interface of the application program, and then superimpose the layer after the local fuzzy into the main layer to obtain the thumbnail of the application program.
It should be understood that the layers may be films containing elements such as text or graphics that are stacked one on top of the other in a sequence that combine to form the final effect of the page. The layers can precisely locate elements on the page. And texts, pictures, tables and plug-ins can be added into the layers, and the layers can be nested in the layers.
As an optional embodiment, before performing a blurring process on display information corresponding to a control for starting the secure mode and obtaining a thumbnail of an application (i.e., S202), the method further includes: receiving a first instruction, wherein the first instruction is used for accessing a latest task thumbnail; the method for carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode to obtain the thumbnail of the application program comprises the following steps: and responding to the first instruction, carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode, and obtaining the thumbnail of the application program.
It should be appreciated that the first instructions for accessing the most recent task thumbnail described above may be different for different types of terminal devices. For example, for some types of terminal devices, the user may tap the lower left touch key to cause the terminal device to display the most recent task thumbnail; for some types of terminal equipment, a user can enable the terminal equipment to display a latest task thumbnail by long-pressing a home key (home); for other types of terminal devices, a user may perform a gesture operation (for example, the user may slide the main interface of the terminal device upward or leftward) to cause the terminal device to display the latest task thumbnail, which is not limited in this embodiment of the present application.
In this embodiment, when the user quits the application program from the foreground operation, the terminal device generates a thumbnail of the application program based on the last user interface of the application program. At this time, all the information in the thumbnail can be normally displayed. When the terminal device receives a first instruction of a user, the terminal device may respond to the first instruction, and perform fuzzy processing on display information corresponding to a control for starting a security mode in a thumbnail of a last interface used by a recently-used application program in the thumbnail of the application program, so as to obtain the thumbnail processed by the application program.
It should be understood that the blurring process may be performed by a graphics module, or may be performed by other image processing technologies, which is not limited in this embodiment of the present application.
As an optional embodiment, the method further includes: receiving a second instruction, wherein the second instruction is used for modifying the safety mode of the control of the application program; in response to the second instruction, a security mode of a control of the application is modified. The second instruction is used for changing the safety mode of the control of the application program from open to close or from close to open.
It should be understood that the security mode of the control of the application program may be that, in the process of developing the application program, a developer sets selection keys for the control in the application program, so that after the user installs the application program on the terminal device, the security mode corresponding to the control of the application program can be modified by himself, thereby meeting the requirements of different users. Generally, the security mode of a control in an application may be a default state (e.g., on or off) at development time.
Exemplarily, assuming that a security mode of a text view control of an account balance of a china bank APP is a default closed state, a user may modify the security mode of the text view control of the account balance in a china bank APP display interface to an open state on a terminal device, so as to perform fuzzy processing on display information of the account balance in a thumbnail of the china bank APP, and implement local protection.
Therefore, in the embodiment of the application, when the second instruction of the user is received, the terminal device may modify the security mode corresponding to the control of the application. It should be understood that the second instruction is an instruction by the user for one or more controls of the application, and that the modification made by the terminal device in response to the second instruction is also directed to the one or more controls of the application.
In the embodiment of the application, the user can modify the security mode corresponding to the control in the application program, so that whether each piece of display information in the thumbnail of the last using interface of the application program needs to be protected or not is flexibly selected, the method and the device can be more intelligent and humanized, and the user experience is improved.
In the embodiment of the present application, a user may modify the security mode of the control of the application through different portals, in other words, there may be different implementations of the user's modification of the security mode of the control of the application. The following describes in detail a process of modifying a security mode corresponding to a control of an application by a user with reference to fig. 4 and 5.
In a possible implementation manner, a user may modify the security modes of the controls of different applications through a system setting interface of the terminal device.
Illustratively, fig. 4 is an interface schematic diagram of modifying a security mode provided by an embodiment of the present application. As shown in fig. 4, a "setting" icon (as shown in an interface a in fig. 4) is provided on the main display interface of the terminal device, and after receiving an instruction for selecting the icon by the user, the terminal device displays the setting interface (as shown in an interface b in fig. 4), and then the user can display an "APP list" interface (as shown in an interface c in fig. 4) by selecting an arrow corresponding to the "APP security mode". The "APP list" interface includes a plurality of APPs installed in the terminal device, such as China Bank, Payment treasures, personal taxes, and so on. Assuming that the user selects "china bank" from the APP list, the terminal device displays a "display control list" interface of china bank (as shown in an interface d in fig. 4), where the "display control list" interface includes a plurality of controls of china bank, such as a card number control, a balance control, a time control, and the like. In this interface, the user may select a control that requires modification of the security mode. Assuming that the user selects the card number control from the display control list, the user enters a "security mode" interface corresponding to the card number control (as shown in an e interface in fig. 4), and then the user can select to modify the on state into the off state or modify the off state into the on state through a "switch" selection key. It should be understood that the instruction corresponding to the on state or the off state of the user is the second instruction. The 'opening' indicates that information corresponding to the control cannot be displayed in the thumbnail of the application program; "close" indicates that the information corresponding to the control is to be displayed in the thumbnail of the application.
In another possible implementation manner, a user may modify the security mode of the control of a different application through a setting interface of the application.
Illustratively, fig. 5 is an interface schematic diagram of another modification security mode provided in an embodiment of the present application. As shown in fig. 5, a "chinese bank" icon (shown as an interface a in fig. 5) is provided on the main display interface of the terminal device, and after receiving an instruction for selecting the icon by the user, the terminal device displays the main interface of the application program (shown as an interface b in fig. 5), and the user can select the "my" icon to enter the "my" interface (shown as an interface c in fig. 5). The My interface includes a variety of information that the Chinese bank may be involved in, such as settings, total assets, balance records, and the like. In the interface, the user can enter a setting interface (as shown in a d interface in fig. 5) by selecting an arrow corresponding to the setting, wherein the setting interface comprises various information which may be related to the chinese bank and needs to be set, such as a security mode, login management, personal information and the like. In the interface, the user may enter a "display control list" interface (as shown in an e interface in fig. 5) by selecting an arrow corresponding to the "security mode", where the "display control list" interface includes a plurality of controls of the chinese bank, such as a card number control, a balance control, a time control, and the like. In this interface, the user may select a control that requires modification of the security mode. Assuming that the user selects the card number control from the display control list, the user enters a security mode interface corresponding to the card number control (as shown in the interface f in fig. 5). And the user can select to modify the on state into the off state or modify the off state into the on state through the 'on-off' selection key. It should be understood that the instruction corresponding to the on state or the off state of the user is the second instruction. The 'opening' indicates that information corresponding to the control cannot be displayed in the thumbnail of the application program; "close" indicates that the information corresponding to the control is to be displayed in the thumbnail of the application.
The thumbnail display method according to the embodiment of the present application is described in detail above with reference to fig. 1 to 5, and the terminal device according to the embodiment of the present application will be described in detail below with reference to fig. 6 and 7.
Fig. 6 shows a terminal device 600 provided in an embodiment of the present application, where the terminal device 600 includes: a judging module 610, a processing module 620 and a display module 630.
Wherein, the determining module 610 is configured to: judging whether a control for starting a safety mode exists in the application program; the processing module 620 is configured to: carrying out fuzzy processing on display information corresponding to a control for starting a safety mode to obtain a thumbnail of the application program; the display module 630 is configured to: a thumbnail of the application is displayed.
Optionally, the processing module 620 is specifically configured to: and when the application program exits from the foreground, carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode to obtain the thumbnail of the application program.
Optionally, the terminal device 600 further includes: the first receiving module is used for receiving a first instruction, and the first instruction is used for accessing the latest task thumbnail; the processing module 620 is specifically configured to: and responding to the first instruction, carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode, and obtaining the thumbnail of the application program.
Optionally, the terminal device 600 further includes: a second receiving module, configured to receive a second instruction, where the second instruction is used to modify a security mode of a control of the application program; and the modification module is used for responding to the second instruction and modifying the safety mode of the control of the application program.
Optionally, the second instruction is used to modify the security mode of the control of the application from on to off, or from off to on.
It should be understood that the terminal device 600 herein is embodied in the form of functional modules. The term module herein may refer to an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (e.g., a shared, dedicated, or group processor) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that support the described functionality. The terminal device 600 may be configured to execute each flow and/or step corresponding to the terminal device in the foregoing method embodiments, and details are not described herein for avoiding repetition.
The terminal device 600 has a function of implementing corresponding steps executed by the terminal device in the method 200; the above functions may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
In the embodiment of the present application, the terminal device 600 in fig. 6 may also be a chip or a chip system, for example: system on chip (SoC), the present application is not limited thereto.
Fig. 7 illustrates another terminal device 700 provided in an embodiment of the present application. The terminal device 700 includes a processor 710, a memory 720, and a communication interface 730. The processor 710, the memory 720 and the communication interface 730 are connected through an internal connection path, the memory 720 is used for storing instructions, and the processor 710 is used for executing the instructions stored in the memory 720, so that the terminal device 700 can execute the thumbnail display method 200 provided by the above method embodiment.
Wherein the processor 710 is configured to: judging whether a control for starting a safety mode exists in the application program; carrying out fuzzy processing on display information corresponding to a control for starting a safety mode to obtain a thumbnail of the application program; a thumbnail of the application is displayed.
Optionally, the processor 710 is specifically configured to: and when the application program exits from the foreground, carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode to obtain the thumbnail of the application program.
Optionally, the processor 710 is further configured to: receiving a first instruction through the communication interface 730, the first instruction for accessing a most recent task thumbnail; and responding to the first instruction, carrying out fuzzy processing on the display information corresponding to the control for starting the safety mode, and obtaining the thumbnail of the application program.
Optionally, the processor 710 is further configured to: receiving a second instruction through the communication interface 730, wherein the second instruction is used for modifying the security mode of the control of the application program; in response to a second instruction, a security mode of a control of the application is modified.
Optionally, the second instruction is used to modify the security mode of the control of the application from on to off, or from off to on.
It should be understood that the functions of the terminal device in the foregoing embodiments may be integrated in the terminal device 700, and the terminal device 700 may be configured to execute the steps and/or processes corresponding to the terminal device in the foregoing method embodiments. Alternatively, the memory 720 may include both read-only memory and random-access memory, and provides instructions and data to the processor. The portion of memory may also include non-volatile random access memory. For example, the memory may also store device type information. The processor 710 may be configured to execute the instructions stored in the memory, and when the processor executes the instructions, the processor 710 may perform each step and/or flow corresponding to the terminal device in the foregoing method embodiments.
The communication interface 730 is used for data interaction between the terminal device and other devices. The communication interface 730 may be any one or any combination of the following: a network interface (e.g., an ethernet interface), a wireless network card, etc. having a network access function.
It should be understood that, in the embodiment of the present application, the processor 710 may be a Central Processing Unit (CPU), and the processor 710 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. The processor 710 may be a microprocessor or the processor 710 may be any conventional processor or the like.
In implementation, the steps of the method 200 may be performed by integrated logic circuits of hardware or instructions in the form of software in a processor. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor executes instructions in the memory and combines hardware thereof to perform the steps of the above-described method. To avoid repetition, it is not described in detail here.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the terminal device and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, terminal device and method can be implemented in other manners. For example, the above-described terminal device embodiments are merely illustrative, and for example, the division of the units is only one logical function division, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of terminal devices or units through some interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. A thumbnail display method, comprising:
judging whether a control for starting a safety mode exists in the application program;
if the control for starting the safe mode exists in the application program, carrying out fuzzy processing on display information corresponding to the control for starting the safe mode to obtain a thumbnail of the application program;
displaying a thumbnail of the application.
2. The method according to claim 1, wherein the blurring the display information corresponding to the control for starting the secure mode to obtain the thumbnail of the application program comprises:
and when the application program exits from the foreground, carrying out fuzzy processing on the display information corresponding to the control for starting the safe mode to obtain the thumbnail of the application program.
3. The method according to claim 1, wherein before the blurring the display information corresponding to the control for starting the secure mode to obtain the thumbnail of the application program, the method further comprises:
receiving a first instruction, wherein the first instruction is used for accessing a latest task thumbnail;
the fuzzy processing of the display information corresponding to the control for starting the security mode to obtain the thumbnail of the application program includes:
and responding to the first instruction, performing fuzzy processing on the display information corresponding to the control for starting the safe mode, and obtaining the thumbnail of the application program.
4. The method according to any one of claims 1 to 3, further comprising:
receiving a second instruction, wherein the second instruction is used for modifying the safety mode of the control of the application program;
modifying a security mode of a control of the application in response to the second instruction.
5. The method of claim 4, wherein the second instruction is configured to modify a security mode of a control of the application from on to off or from off to on.
6. A terminal device, characterized in that the terminal device comprises:
the judging module is used for judging whether a control for starting a safety mode exists in the application program;
the processing module is used for carrying out fuzzy processing on the display information corresponding to the control for starting the security mode to obtain a thumbnail of the application program;
and the display module is used for displaying the thumbnail of the application program.
7. The terminal device according to claim 6, wherein the processing module is specifically configured to:
and when the application program exits from the foreground, carrying out fuzzy processing on the display information corresponding to the control for starting the safe mode to obtain the thumbnail of the application program.
8. The terminal device according to claim 6, wherein the terminal device further comprises:
the first receiving module is used for receiving a first instruction, and the first instruction is used for accessing the latest task thumbnail;
the processing module is specifically configured to: and responding to the first instruction, and performing fuzzy processing on the display information corresponding to the control for starting the safe mode to obtain the thumbnail of the application program.
9. The terminal device according to any one of claims 6 to 8, wherein the terminal device further comprises:
a second receiving module, configured to receive a second instruction, where the second instruction is used to modify a security mode of a control of the application;
and the modification module is used for responding to the second instruction and modifying the safety mode of the control of the application program.
10. The terminal device according to claim 9, wherein the second instruction is configured to modify a security mode of a control of the application from on to off or from off to on.
11. A terminal device, comprising: a processor coupled to a memory for storing a computer program that, when invoked by the processor, causes the terminal device to perform the method of any of claims 1 to 5.
12. A computer-readable storage medium for storing a computer program comprising instructions for implementing the method of any one of claims 1 to 5.
CN202011117065.6A 2020-10-19 2020-10-19 Thumbnail display method and terminal equipment Pending CN114442891A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011117065.6A CN114442891A (en) 2020-10-19 2020-10-19 Thumbnail display method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011117065.6A CN114442891A (en) 2020-10-19 2020-10-19 Thumbnail display method and terminal equipment

Publications (1)

Publication Number Publication Date
CN114442891A true CN114442891A (en) 2022-05-06

Family

ID=81357959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011117065.6A Pending CN114442891A (en) 2020-10-19 2020-10-19 Thumbnail display method and terminal equipment

Country Status (1)

Country Link
CN (1) CN114442891A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127069A (en) * 2016-06-15 2016-11-16 珠海市魅族科技有限公司 Thumbnail treating method and apparatus and methods for interface management and device
CN107958161A (en) * 2017-11-30 2018-04-24 维沃移动通信有限公司 A kind of multitask display methods and mobile terminal
CN108038393A (en) * 2017-12-29 2018-05-15 维沃移动通信有限公司 A kind of application program method for secret protection, mobile terminal
CN109491737A (en) * 2018-10-24 2019-03-19 珠海格力电器股份有限公司 A kind of display methods, device, terminal and readable storage medium storing program for executing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127069A (en) * 2016-06-15 2016-11-16 珠海市魅族科技有限公司 Thumbnail treating method and apparatus and methods for interface management and device
CN107958161A (en) * 2017-11-30 2018-04-24 维沃移动通信有限公司 A kind of multitask display methods and mobile terminal
CN108038393A (en) * 2017-12-29 2018-05-15 维沃移动通信有限公司 A kind of application program method for secret protection, mobile terminal
CN109491737A (en) * 2018-10-24 2019-03-19 珠海格力电器股份有限公司 A kind of display methods, device, terminal and readable storage medium storing program for executing

Similar Documents

Publication Publication Date Title
US11159922B2 (en) Layers in messaging applications
USRE49459E1 (en) Apparatus and method for configuring password and for releasing lock
EP3255909A1 (en) Messaging application interacting with one or more extension applications
US20170011557A1 (en) Method for providing augmented reality and virtual reality and electronic device using the same
EP3944641A1 (en) Message extension app store
US9804767B2 (en) Light dismiss manager
WO2015200798A1 (en) Context menu utilizing a context indicator and floating menu bar
US20220229528A1 (en) Method, apparatus, and system for generating resource value transfer request
CN111857464A (en) Information display method and device, electronic equipment and readable storage medium
US20240193306A1 (en) Permission optimization method and related device
WO2017008415A1 (en) Apparatus and method for launching mobile applications from a lock screen
EP4276595A1 (en) Content display method and apparatus, and device and storage medium
CN113792328A (en) Authority management method, user interface and electronic equipment
US20160182498A1 (en) Separated use mobile devices
CN114442891A (en) Thumbnail display method and terminal equipment
EP4220364A1 (en) Method for presenting interface information, and electronic device
CN108182577A (en) A kind of method, apparatus and equipment for showing payment information
CN115017522A (en) Permission recommendation method and electronic equipment
US20150378530A1 (en) Command surface drill-in control
CN111859461A (en) Data isolation method and device and electronic equipment
KR102672368B1 (en) Document management server and method thereof
EP3113040A1 (en) Providing a user interface
CN117707668A (en) Method and system for displaying different interfaces of application based on different fingerprints
CN118113282A (en) Page generation method, component configuration method, page display method and page display device
CN116324676A (en) Automatic completion keyboard for contact person

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination