CN115017487B - Switching method for login account of electronic equipment and electronic equipment - Google Patents

Switching method for login account of electronic equipment and electronic equipment Download PDF

Info

Publication number
CN115017487B
CN115017487B CN202111390076.6A CN202111390076A CN115017487B CN 115017487 B CN115017487 B CN 115017487B CN 202111390076 A CN202111390076 A CN 202111390076A CN 115017487 B CN115017487 B CN 115017487B
Authority
CN
China
Prior art keywords
account
electronic device
desktop
electronic equipment
privacy space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111390076.6A
Other languages
Chinese (zh)
Other versions
CN115017487A (en
Inventor
窦伟明
黄士俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202111390076.6A priority Critical patent/CN115017487B/en
Publication of CN115017487A publication Critical patent/CN115017487A/en
Application granted granted Critical
Publication of CN115017487B publication Critical patent/CN115017487B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses a switching method of electronic equipment login accounts and electronic equipment, and relates to the field of electronic equipment to optimize the switching process of the electronic equipment login accounts. The specific scheme is as follows: the method comprises the steps that the electronic equipment receives a first operation of a user, wherein the first operation is used for triggering switching from a second account to a first account, and the second account is an account which is logged in at present by the electronic equipment; responding to the first operation, the electronic equipment acquires the activity corresponding to the second account; the method comprises the steps that when the activities corresponding to the second account number comprise activities corresponding to the desktop of the second account number, and the desktop of the first account number runs in the background of the electronic equipment, the electronic equipment displays the desktop of the first account number, wherein the desktop of the first account number is loaded by the electronic equipment before the electronic equipment receives a first operation of a user; and the electronic equipment loads and displays the content corresponding to the first account on the desktop of the first account according to the first data.

Description

Switching method for login account of electronic equipment and electronic equipment
Technical Field
The present application relates to the field of electronic devices, and in particular, to a method for switching login accounts of an electronic device and an electronic device.
Background
Currently, in order to secure the private data (such as photos or videos stored in a photo album) and applications (such as social applications) of the user on the mobile phone, the electronic device may provide a private space for the user to use.
Disclosure of Invention
The embodiment of the application provides a method for switching login accounts of electronic equipment and the electronic equipment, so that the switching process of the login accounts of the electronic equipment is optimized.
In some scenarios, a user may establish different login accounts on a mobile phone, where the different login accounts correspond to different storage spaces. For example, a user may establish a login account 1 and a login account 2 on a mobile phone, the mobile phone may store general data and applications in a storage space (e.g., referred to as a normal space) corresponding to the login account 1, store private data and applications in a storage space (e.g., referred to as a private space) corresponding to the login account 2, and the mobile phone may enter the login account 1 or the login account 2 through different passwords or fingerprints, so that the private data and applications may be isolated from the general data and applications. When a user enters the login account through a password or a fingerprint corresponding to the login account 2, the mobile phone can acquire privacy data and applications stored in the privacy space to present to the user.
In some scenarios, the mobile phone switches between different login accounts, for example, when the login account corresponding to the common space is switched to the login account corresponding to the privacy space, the desktop corresponding to the privacy space is reloaded by the mobile phone. Due to the fact that the desktop corresponding to the privacy space is reloaded by the mobile phone, the application program icons on the desktop corresponding to the privacy space need to be reloaded. The reloading of the application program icons on the desktop corresponding to the privacy space is one by one, which causes the slow loading of the application program icons, thereby causing the time for switching the privacy space by the mobile phone to be longer, the efficiency for switching the privacy space by the mobile phone to be lower and the user experience to be poorer. In addition, because the desktop corresponding to the privacy space needs to be reloaded for the mobile phone, the wallpaper corresponding to the privacy space also needs to be redrawn, and when the wallpaper is drawn, the mobile phone displays a black screen. The wallpaper drawing usually needs a long time, when the wallpaper is drawn, the mobile phone always displays a black screen, so that the time for switching the privacy space of the mobile phone is further long, the efficiency for switching the privacy space of the mobile phone is low, and the user experience is poor.
In a first aspect, an embodiment of the present application provides a method for switching login accounts of an electronic device, where the method is applied to the electronic device, the electronic device includes a plurality of accounts, the plurality of accounts includes a first account, and the method may include: the method comprises the steps that the electronic equipment receives a first operation of a user, the first operation is used for triggering switching from a second account to a first account, and the second account is an account which is currently logged in by the electronic equipment; responding to the first operation, the electronic equipment acquires the activity corresponding to the second account; the method comprises the steps that when the activity corresponding to the second account number comprises the activity corresponding to the desktop of the second account number, and the desktop of the first account number runs in a background of the electronic equipment, the electronic equipment displays the desktop of the first account number, wherein the desktop of the first account number is loaded before the electronic equipment receives the first operation of a user; and the electronic equipment loads and displays the content corresponding to the first account on the desktop of the first account according to the first data.
According to the method for switching the login accounts of the electronic equipment, when the electronic equipment is switched to the privacy space, and the desktop of the privacy space runs in the background of the electronic equipment, the electronic equipment does not reload the desktop corresponding to the privacy space, but switches the desktop corresponding to the privacy space from the background to the foreground, so that application icons on the desktop corresponding to the privacy space do not need to be reloaded, wallpaper of the privacy space does not need to be redrawn, the application icons on the desktops corresponding to the privacy space can be prevented from being loaded one by one, the mobile phone is prevented from displaying a black screen, the time for switching the privacy space of the mobile phone can be shortened, the efficiency for switching the privacy space of the mobile phone is improved, and user experience is improved. In addition, because the electronic equipment does not reload the desktop corresponding to the privacy space, but switches the desktop corresponding to the privacy space from the background to the foreground, the desktop corresponding to the privacy space can be the desktop set by the user and is not a fixed desktop, so that the user experience can be improved.
With reference to the first aspect, in a possible implementation manner, before the electronic device receives the first operation of the user, the method for switching the login account of the electronic device may further include: the electronic equipment receives a second operation that a user triggers and switches to the first account; in response to the second operation, the electronic device loads the desktop of the first account according to the first data, and loads and displays the content corresponding to the first account on the desktop of the first account according to the first data; the electronic equipment stores the desktop of the loaded first account; the electronic equipment receives a third operation that a user triggers switching from the first account to other accounts; in response to the third operation, the electronic device switches the account currently logged in by the electronic device from the first account to another account.
Based on the possible implementation mode, the electronic equipment can load the desktop of the privacy space under the condition that the desktop of the privacy space does not run in the background of the electronic equipment, and then loads the interface of the privacy space according to the data of the privacy space, so that the success rate of switching login accounts by the electronic equipment can be improved.
With reference to the first aspect, in a possible implementation manner, after the electronic device loads the desktop of the first account according to the first data, the method for switching the login account of the electronic device may further include: the electronic equipment records a switching mark, and the switching mark is used for indicating that the desktop of the first account runs in the background of the electronic equipment. Before the electronic device displays the desktop of the first account, the method for switching the login account of the electronic device may further include: and the electronic equipment determines that the desktop of the first account runs in the background of the electronic equipment according to the switching mark.
Based on the possible implementation manner, when the electronic device is cold-cut to the privacy space, the electronic device may record the switching flag to indicate that the desktop of the privacy space runs in the background of the electronic device, so that when the electronic device is switched to the privacy space (i.e., hot-cut) next time, the electronic device may determine that the desktop of the privacy space runs in the background of the electronic device according to the switching flag.
With reference to the first aspect, in a possible implementation manner, the first account is an account corresponding to a privacy space on the electronic device.
Based on the possible implementation manner, the first account is the account corresponding to the privacy space on the electronic device, and the user can store the private data in the corresponding space, so that the private data is isolated from other data, and the security of the private data of the user is improved.
In a second aspect, an embodiment of the present application provides a device for switching a login account of an electronic device, where the device may be applied to the electronic device, and is used to implement the method in the first aspect. The functions of the device can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions, for example, a receiving module, an obtaining module, a displaying module, a loading module, and the like.
The receiving module may be configured to receive a first operation of a user, where the first operation is used to trigger switching from a second account to a first account, and the second account is an account currently logged in by the electronic device.
The obtaining module may be configured to, in response to the first operation, obtain, by the electronic device, an activity corresponding to the second account.
The display module may be configured to include, in the activity corresponding to the second account, an activity corresponding to a desktop of the second account, and when the desktop of the first account runs in a background of the electronic device, the electronic device displays the desktop of the first account, where the desktop of the first account is loaded by the electronic device before receiving the first operation of the user.
The loading module may be configured to load content corresponding to the first account according to the first data.
The display module may also be configured to display content corresponding to the first account on a desktop of the first account.
With reference to the second aspect, in another possible implementation manner, the receiving module may be further configured to receive a second operation that the user triggers switching to the first account. The loading module may be further configured to, in response to the second operation, load the desktop of the first account according to the first data and load content corresponding to the first account according to the first data. The display module may also be configured to display content corresponding to the first account on a desktop of the first account. The electronic device may further include a storage module. And the storage module can be used for storing the loaded desktop of the first account.
The receiving module may be further configured to receive a third operation that the user triggers switching from the first account to another account. The electronic device may further include a switching module. The switching module may be configured to switch, in response to a third operation, the account currently logged in by the electronic device from the first account to another account.
With reference to the second aspect, in another possible implementation manner, the electronic device may further include a recording module. The recording module may be configured to record a switching flag, where the switching flag is used to indicate that the desktop of the first account runs in a background of the electronic device. The electronic device may further include a determination module. The determining module may be configured to determine that the desktop of the first account runs in the background of the electronic device according to the switching flag.
With reference to the second aspect, in another possible implementation manner, the first account is an account corresponding to a privacy space on the electronic device.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor, a memory for storing instructions executable by the processor. The processor is configured to execute the above instructions to cause the electronic device to implement the method for using a geo-fence as described in the first aspect or any of its possible implementations.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having computer program instructions stored thereon. The computer program instructions, when executed by the electronic device, cause the electronic device to implement a method of using a geofence as set forth in the first aspect or any of its possible implementations.
In a fifth aspect, the present application provides a computer program product, which includes computer readable code, when the computer readable code is run in an electronic device, causes the electronic device to implement the method for using a geofence as set forth in the first aspect or any one of the possible implementations of the first aspect.
It should be understood that, the beneficial effects of the second to fifth aspects may refer to the relevant description in the first aspect, and are not described herein again.
Drawings
Fig. 1 is a first schematic view of a display interface of an electronic device according to an embodiment of the present disclosure;
fig. 2 is a schematic view illustrating switching of login accounts of an electronic device according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a cold cutting process of an electronic device according to an embodiment of the present application;
fig. 4 is a schematic diagram of a hot-cutting process of an electronic device according to an embodiment of the present application;
fig. 5 is a second schematic view of a display interface of an electronic device according to an embodiment of the present application;
fig. 6 is a third schematic view of a display interface of an electronic device according to an embodiment of the present application;
fig. 7 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present disclosure;
fig. 8 is a schematic diagram of a software structure of an electronic device according to an embodiment of the present application;
fig. 9 is a first schematic view illustrating a method for switching login accounts of an electronic device according to an embodiment of the present application;
fig. 10 is a second schematic diagram illustrating a method for switching a login account of an electronic device according to an embodiment of the present application;
fig. 11 is a fourth schematic view of a display interface of an electronic device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a device for switching login accounts of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless otherwise specified.
At present, a user can establish different login accounts on a mobile phone, and the different login accounts correspond to different storage spaces. For example, a user may establish a login account 1 and a login account 2 on a mobile phone, the mobile phone may store general data and applications in a storage space corresponding to the login account 1 (the storage space may be referred to as a primary space or may be referred to as a common space), store privacy data and applications in a storage space corresponding to the login account 2 (for example, referred to as a privacy space), and when the mobile phone enters the login account through a password or a fingerprint corresponding to the login account 2, the mobile phone may obtain the privacy data and applications stored in the privacy space to present to the user.
For example, as shown in fig. 1 (a), the user may establish different login accounts on the mobile phone, such as login account 1 and login account 2. The established login account can be displayed on a screen locking interface of the mobile phone. The login account 1 may correspond to a common space for storing general data and applications of the user, that is, the mobile phone may store the general data and applications of the user in the common space corresponding to the login account 1. The login account 2 may correspond to a privacy space for storing the privacy data and the application of the user, that is, the mobile phone may store the privacy data and the application of the user in the privacy space corresponding to the login account 2.
The user can enter login account 1 or login account 2 by entering a different fingerprint in the fingerprint input area 101 of the lock screen interface of the mobile phone. For example, the user can input a fingerprint of the left thumb on the fingerprint input area 101 to enable the mobile phone to acquire general data and applications of the user stored in the general space. That is, when the password or fingerprint corresponding to the login account 1 input by the user is correct, the mobile phone may obtain the general data and application of the user stored in the general space, and then the mobile phone may display the interface 102 corresponding to the login account 1 as shown in (b) in fig. 1 for the user to view, and the interface 101 corresponding to the login account 1 may display the general data and application of the user.
As another example, the user may enter a fingerprint of the right thumb on the fingerprint input area 101 to cause the cell phone to obtain the user's private data and applications stored in the private space. When the password or fingerprint corresponding to the login account 2 input by the user is correct, the mobile phone may obtain the user's private data and application stored in the private space, and further, the mobile phone may display an interface 103 corresponding to the login account 2 as shown in (c) in fig. 1 for the user to view, the interface 103 corresponding to the login account 2 may display the user's private data and application, and the interface 103 may also be referred to as an interface corresponding to the private space. When the mobile phone displays the interface corresponding to the privacy space, the mobile phone is switched to the privacy space.
Currently, the process of switching different login accounts by a mobile phone may include a cold-cut process and a hot-cut process. And cold cutting, namely before the mobile phone is switched to a certain login account, the state of the login account is in a stop state, and if the desktop corresponding to the login account is in the stop state, the desktop corresponding to the login account does not run in the background of the mobile phone. And performing hot-cut, namely before the mobile phone is switched to a certain login account, the state of the login account is an operating state, and if the desktop corresponding to the login account operates in the background of the mobile phone, the desktop corresponding to the login account is in an operating state.
For example, as shown in fig. 2, when the login account 1 and the login account 2 on the mobile phone are both in an operating state (for example, the login account 1 may operate in the foreground of the mobile phone, and the login account 2 may operate in the background of the mobile phone), the mobile phone may switch from the login account 1 to the login account 2, or switch from the login account 2 to the login account 1, which may be called a hot-cut. When the login account 1 on the mobile phone is in an operating state and the login account 2 is in a stopped state, the mobile phone switches from the login account 1 to the login account 2, which may be called cold cutting, and at this time, the mobile phone may start the login account 2, that is, the login account 2 changes from the stopped state to the operating state. When the login account 1 and the login account 2 on the mobile phone are both in an operating state, the mobile phone can quit the login account 2 through the login account 1, that is, the login account 2 is changed from the operating state to a stop state.
For example, after the mobile phone is turned on, when the login account corresponding to the privacy space is switched to the login account corresponding to the common space for the first time, the state of the login account corresponding to the privacy space is a stopped state, and if the desktop of the login account corresponding to the privacy space does not run in the background of the mobile phone, the switching process may be referred to as a cold-cut process. For another example, after the login account corresponding to the privacy space is created, when the login account corresponding to the common space is switched to the login account corresponding to the privacy space for the first time, the state of the login account corresponding to the privacy space is in a stopped state, the desktop of the login account corresponding to the privacy space does not run in the background of the mobile phone, and the switching process may also be referred to as a cold-cut process.
After logging in the login account corresponding to the privacy space, when the login account corresponding to the privacy space is switched to the login account corresponding to the common space, the login account corresponding to the common space is in an operating state, and if the desktop of the login account corresponding to the common space operates in the background of the mobile phone, the switching process may be referred to as a hot-cut process. Or, when the mobile phone switches from the login account corresponding to the common space to the login account corresponding to the privacy space again, the state of the login account corresponding to the privacy space is an operating state, and the switching process may also be referred to as a hot-cut process.
For example, as shown in connection with fig. 3, a prior art cold cutting process may include the following steps:
after the user triggers the mobile phone to switch to the privacy space and inputs the user credential (such as a fingerprint or a password), the screen locking service in the mobile phone can determine whether the user credential (such as the fingerprint or the password) passes the authentication. When the screen locking service determines that the user credential passes the authentication, the mobile phone may obtain data corresponding to the privacy space, and load an interface corresponding to the switched login account, that is, an interface corresponding to the privacy space.
When the screen locking service determines that the user credential passes authentication, the screen locking service may start a privacy space switching thread for starting the user controller.
After the user controller is started, the user controller may pull up the switching service for obtaining data of the privacy space, such as system configuration of the privacy space, such as obtaining subject, desktop, wallpaper, and other configurations of the privacy space. That is, the user controller may obtain data corresponding to the privacy space, such as data corresponding to a theme, a desktop, and wallpaper. After the user controller obtains the data corresponding to the privacy space, the user controller may also send the system configuration of the privacy space to other system services (such as a window manager, a user management service, a system service manager, a desktop service, an activity task management server service, a storage management server service, and the like) on the mobile phone.
After the other system services receive the system configuration of the privacy space sent by the user controller, the other system services may be configured according to the system configuration of the privacy space. For example, when the other system service is a desktop service, after the desktop service receives the system configuration of the privacy space sent by the user controller, the desktop service may configure a desktop corresponding to the privacy space according to desktop data included in the system configuration of the privacy space.
After the user controller sends the system configuration of the privacy space to other system services on the mobile phone, the user controller can also switch the desktop corresponding to the common space to a background for running and start a desktop process, so that the desktop corresponding to the privacy space can be pulled up. That is, the user controller may switch the desktop corresponding to the common space to the background and start the desktop corresponding to the privacy space.
After the user controller switches the desktop corresponding to the common space to the background and starts the desktop corresponding to the privacy space, the user controller may send a message for starting the privacy space to other system services on the mobile phone.
After the other system services receive the message for starting the privacy space sent by the user controller, the other system services may perform corresponding configuration according to the system configuration of the privacy space sent by the user controller. Other system services may determine whether all other system services are configured according to the system configuration of the privacy space by traversing all other system service callbacks. In the cold cutting process, the login account corresponding to the privacy space does not run in the background of the mobile phone, so that the system configuration of the privacy space needs to be started first, that is, other system services need to be configured correspondingly according to the system configuration of the privacy space sent by the user controller.
After the other system services are configured according to the system configuration of the privacy space, the user controller may further send a message for switching the privacy space to the other system services, so as to call the system configuration corresponding to the privacy space to the foreground. Other system services can determine whether the system configuration corresponding to the privacy space is called to the foreground by traversing all other system service callbacks.
After the system configuration corresponding to the privacy space is called to the foreground by other system services, the user controller may further send a wallpaper switching message to the wallpaper service, so as to switch the wallpaper and load the wallpaper, that is, the wallpaper corresponding to the common space is switched to the background and the wallpaper corresponding to the privacy space is loaded.
After the other system services call the system configuration of the privacy space to the foreground, the user controller may also send a screen unfreezing message to the other system services for unfreezing the screen. Other system services may determine whether all other system services have completed invoking the system configuration of the privacy space to the foreground by traversing all watcher callbacks. That is, the system configuration of each privacy space corresponds to one observer, and whether the system configuration of the privacy space is called to the foreground to be completed or not can be determined through the callback of the observer.
The user controller may also send a privacy space switch complete message to the screen lock service after the other system service has defrosted the screen. After the screen locking service receives the privacy space switching completion message sent by the user controller, the screen locking service can quit the screen locking, so that the mobile phone can display an interface corresponding to the privacy space.
As another example, as shown in fig. 4, the hot cutting process in the prior art may include the following steps:
after the user triggers the mobile phone to switch to the privacy space and inputs the user credential (e.g., fingerprint or password), the screen locking service in the mobile phone may determine whether the user credential passes authentication. When the screen locking service determines that the user credential passes the authentication, the mobile phone may obtain data corresponding to the privacy space, and load an interface corresponding to the switched login account, that is, an interface corresponding to the privacy space.
When the screen locking service determines that the user credential passes authentication, the screen locking service may start a privacy space switching thread for starting the user controller.
After the user controller is started, the user controller may pull up the switching service for obtaining the system configuration of the privacy space, such as obtaining the theme, desktop, wallpaper, and other configurations of the privacy space. That is, the user controller may obtain data corresponding to the privacy space, such as data corresponding to a theme, a desktop, and wallpaper. After the user controller acquires the data corresponding to the privacy space, the user controller can also send the system configuration of the privacy space to other system services on the mobile phone.
After the other system services receive the system configuration of the privacy space sent by the user controller, the other system services may be configured according to the system configuration of the privacy space.
After the user controller sends the system configuration of the privacy space to other system services on the mobile phone, the user controller can also switch the desktop corresponding to the common space to a background for running and start a desktop process, so that the desktop corresponding to the privacy space can be pulled up. That is, the user controller may switch the desktop corresponding to the common space to the background and start the desktop corresponding to the privacy space.
After the user controller switches the desktop corresponding to the common space to the background and starts the desktop corresponding to the privacy space, the user controller can send a privacy space switching message to other system services on the mobile phone, so as to call the system configuration corresponding to the privacy space to the foreground. In the hot-cut process, the login account corresponding to the privacy space runs in the background of the mobile phone, so that the system configuration of the privacy space does not need to be started, and only the system configuration of the privacy space needs to be switched to the foreground. Other system services can determine whether the system configuration corresponding to the privacy space is called to the foreground by traversing all other system service callbacks.
After the system configuration of the privacy space is switched to the foreground by other system services, the user controller can also send a wallpaper switching message to the wallpaper service for switching the wallpaper, and load the wallpaper, that is, the wallpaper corresponding to the common space is switched to the background, and the wallpaper corresponding to the privacy space is loaded.
After the other system services invoke the system configuration of the privacy space to the foreground, the user controller may also send a screen unfreezing message to the other system services for unfreezing the screen. Other system services may determine whether all other system services have completed invoking the system configuration of the privacy space to the foreground by traversing all watcher callbacks. That is, the system configuration of each privacy space corresponds to one observer, and whether the system configuration of the privacy space is called to the foreground to be completed or not can be determined through the callback of the observer.
The user controller may also send a privacy space switch complete message to the screen lock service after the other system services have thawed the screen. After the screen locking service receives the privacy space switching completion message sent by the user controller, the screen locking service can quit the screen locking, so that the mobile phone can display an interface corresponding to the privacy space.
Therefore, in the prior art, when the mobile phone is cold-cut or hot-cut to the privacy space, the mobile phone needs to start the desktop corresponding to the privacy space. That is, even if the desktop corresponding to the privacy space runs in the background of the mobile phone, the mobile phone needs to reload the desktop corresponding to the privacy space. After the desktop corresponding to the privacy space is reloaded by the mobile phone, the application icons on the desktop corresponding to the privacy space all need to be reloaded, and the loading process of the application icons on the desktop corresponding to the privacy space is an asynchronous process, that is, the application icons are loaded one by one. In addition, after the desktop corresponding to the privacy space is reloaded by the mobile phone, the wallpaper corresponding to the privacy space also needs to be redrawn, and when the wallpaper is drawn, the mobile phone displays a black screen.
For example, a user establishes different login accounts on a mobile phone, such as login account 1 and login account 2, and the established login accounts are displayed on a screen locking interface of the mobile phone. The login account 1 corresponds to a general space for storing general data and applications of the user. The login account 2 corresponds to a privacy space for storing the privacy data and applications of the user.
Referring to fig. 5 (a), the user may input a fingerprint corresponding to the login account 2 on a fingerprint input area of the mobile phone lock screen interface. When the fingerprint corresponding to the login account 2 input by the user is correct, the mobile phone may obtain the user's privacy data and applications stored in the privacy space, such as system configuration of the privacy space. The mobile phone can restart the desktop corresponding to the privacy space.
After the desktop corresponding to the privacy space is restarted by the mobile phone, the wallpaper corresponding to the privacy space of the mobile phone needs to be redrawn. In the process of drawing the wallpaper by the mobile phone, as shown in (b) of fig. 5, the mobile phone displays a black screen. After the desktop corresponding to the privacy space is restarted by the mobile phone, the application program icons on the desktop corresponding to the privacy space are loaded one by one. That is, as shown in fig. 5 (c), the mobile phone first loads an application icon on the desktop corresponding to the privacy space.
Then, as shown in (d) of fig. 5, the mobile phone may load an application icon on the desktop corresponding to the privacy space again until all application icons on the desktop corresponding to the privacy space are completely loaded, and the mobile phone displays an interface corresponding to the privacy space, and at this time, the mobile phone switches to the privacy space.
Therefore, in the prior art, when the mobile phone is cold-cut or hot-cut to the privacy space, even if the desktop corresponding to the privacy space runs in the background of the mobile phone, the mobile phone also needs to reload the desktop corresponding to the privacy space, so that the application icons on the desktop corresponding to the privacy space need to be reloaded, and the application icons on the desktop corresponding to the privacy space are loaded one by one when being reloaded, which leads to slower loading of the application icons, thus leading to longer time for switching the privacy space of the mobile phone, lower efficiency for switching the privacy space of the mobile phone, and poorer user experience.
In addition, because the desktop corresponding to the privacy space needs to be reloaded for the mobile phone, the wallpaper corresponding to the privacy space also needs to be redrawn, and when the wallpaper is drawn, the mobile phone displays a black screen. The wallpaper drawing usually needs a long time, when the wallpaper is drawn, the mobile phone always displays a black screen, so that the time for switching the privacy space of the mobile phone is long, the efficiency for switching the privacy space of the mobile phone is low, and the user experience is poor.
In the related art, the theme of the privacy space may be set as a default theme, for example, the desktop corresponding to the privacy space is set as a default desktop, and the wallpaper of the privacy space is set as a default wallpaper, so that in the hot-cutting process of the mobile phone, the mobile phone may prevent application icons on the desktop corresponding to the privacy space from being loaded one by one, and prevent the wallpaper from being redrawn, thereby preventing the mobile phone from displaying a black screen.
For example, as shown in (a) in fig. 6, an icon 601 for switching the avatar application may be included on the interface of the mobile phone. For example, the user has already established login account 1 and login account 2 on the mobile phone, where login account 1 corresponds to a common space, and login account 2 corresponds to a private space, the user may click icon 601 for switching the split-body application.
Then, as shown in fig. 6 (b), the mobile phone may display a screen locking interface, and the user may input a password or a fingerprint corresponding to the login account 2 on the screen locking interface. When the fingerprint corresponding to the login account 2 input by the user is correct, the mobile phone can acquire the user privacy data and application stored in the privacy space. The mobile phone can switch the default desktop corresponding to the privacy space to the foreground and the default wallpaper corresponding to the privacy space to the foreground, and display the privacy data and the application. Then, as shown in fig. 6 (c), the mobile phone may display an interface corresponding to the privacy space, and at this time, the mobile phone switches to the privacy space.
Although in the related art, when the mobile phone is hot-switched to the privacy space, the application icons on the desktop corresponding to the privacy space are not loaded one by one, and a black screen is not displayed. However, in the related art, the theme of the privacy space is a default theme, and the user cannot change the theme of the privacy space, for example, the user cannot set the desktop corresponding to the privacy space as another desktop, or the user cannot set the wallpaper of the privacy space as another wallpaper, which results in a low user experience. Therefore, the related art does not well solve the problems that the time for switching the privacy space is long and the mobile phone displays a black screen in the switching process.
In order to solve the above problem, an embodiment of the present application provides a method for switching a login account of an electronic device, which is applied to the electronic device. When the electronic equipment is hot-cut to the privacy space, the electronic equipment can not reload the desktop corresponding to the privacy space, but can switch the desktop corresponding to the privacy space from the background to the foreground, so that the application icons on the desktop corresponding to the privacy space do not need to be reloaded and the wallpaper of the privacy space does not need to be redrawn, the application icons on the desktop corresponding to the privacy space can be prevented from being loaded one by one, the mobile phone is prevented from displaying a black screen, the time for switching the privacy space by the mobile phone can be shortened, the efficiency for switching the privacy space is improved, and the user experience is improved. In addition, because the electronic equipment does not reload the desktop corresponding to the privacy space, but switches the desktop corresponding to the privacy space from the background to the foreground, the desktop corresponding to the privacy space can be the desktop set by the user and is not a fixed desktop, so that the user experience can be improved.
The method for switching the login account of the electronic device provided by the embodiment of the application is described below.
The switching method of the login account of the electronic equipment provided by the embodiment of the application can be applied to the electronic equipment. In some embodiments, the electronic device may be a mobile phone, a tablet computer, a handheld computer, a Personal Computer (PC), a cellular phone, a Personal Digital Assistant (PDA), a wearable device, or other electronic devices with NFC functionality. The embodiment of the present application does not limit the specific form of the electronic device.
Exemplarily, taking an electronic device as a mobile phone as an example, fig. 7 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
As shown in fig. 7, the electronic device may include a processor 710, an external memory interface 720, an internal memory 721, a Universal Serial Bus (USB) interface 730, a charging management module 740, a power management module 741, a battery 742, an antenna 1, an antenna 2, a mobile communication module 750, a wireless communication module 760, an audio module 770, a speaker 770A, a receiver 770B, a microphone 770C, a headset interface 770D, a sensor module 780, a button 790, a motor 791, an indicator 792, a camera 793, a display 794, and a Subscriber Identity Module (SIM) card interface 795, and so on. Among them, the sensor module 780 may include a pressure sensor 780A, a gyroscope sensor 780B, a barometric pressure sensor 780C, a magnetic sensor 780D, an acceleration sensor 780E, a distance sensor 780F, a proximity light sensor 780G, a fingerprint sensor 780H, a temperature sensor 780J, a touch sensor 780K, an ambient light sensor 780L, a bone conduction sensor 780M, and the like.
It is to be understood that the illustrated structure of the present embodiment does not constitute a specific limitation to the electronic device. In other embodiments, an electronic device may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 710 may include one or more processing units, such as: the processor 710 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a memory, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors.
The controller may be a neural center and a command center of the electronic device. The controller can generate an operation control signal according to the instruction operation code and the time sequence signal to finish the control of instruction fetching and instruction execution.
A memory may also be provided in processor 710 for storing instructions and data. In some embodiments, the memory in the processor 710 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 710. If the processor 710 needs to reuse the instruction or data, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 710, thereby increasing the efficiency of the system.
In some embodiments, processor 710 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, and/or a Universal Serial Bus (USB) interface, etc.
The electronic device implements display functions via the GPU, the display screen 794, and the application processor, etc. The GPU is a microprocessor for image processing, and is connected to a display screen 794 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 710 may include one or more GPUs that execute program instructions to generate or alter display information.
The display screen 794 is used to display images, video, and the like. The display screen 794 includes a display panel. The display panel may be a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-o led, a quantum dot light-emitting diode (QLED), or the like. In some embodiments, the electronic device may include 1 or N display screens 794, N being a positive integer greater than 1.
In this embodiment, the display screen 794 may be used to display an interface of the electronic device.
The electronic device may implement a photographing function through the ISP, the camera 793, the video codec, the GPU, the display screen 794, the application processor, and the like. In some embodiments, the electronic device may include 1 or N cameras 793, N being a positive integer greater than 1.
Of course, it should be understood that the above-mentioned fig. 7 is only an exemplary illustration of the electronic device in the form of a mobile phone. If the electronic device is in the form of a tablet computer, a handheld computer, a PC, a PDA, a wearable device (e.g., a smart watch, a smart bracelet), or other devices, the structure of the electronic device may include fewer structures than those shown in fig. 6, or may include more structures than those shown in fig. 7, which is not limited herein.
The software system of the electronic device may employ a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the application takes an Android system with a layered architecture as an example, and exemplarily illustrates a software structure of an electronic device.
Fig. 8 is a block diagram of a software configuration of an electronic device according to an embodiment of the present application.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages. As shown in fig. 8, the application package may include applications such as camera, gallery, calendar, phone call, map, navigation, WLAN, bluetooth, music, video, short message, etc.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 8, the application framework layer may include system services such as a window manager, a lock screen service, a user controller, an activity task management service, an activity thread, a hardware theme manager, a wallpaper service, and a desktop service.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The screen locking service can be used for verifying the credentials (such as fingerprints or passwords) input by the user. And when the credential input by the user passes the verification, the screen locking service starts a privacy space switching thread, namely, a user controller is started.
The user controller may be configured to obtain a system configuration of the privacy space, and the user controller may be a user controller in the electronic device. The user controller may also be used to send the system configuration of the privacy space to all other system services on the electronic device. The user controller can also be used for switching the desktop in the common space to the background and switching the desktop corresponding to the privacy space to the foreground. The user controller may also be configured to send a switch privacy space message to all other system services on the electronic device. The user controller may also be configured to send a switch privacy space message to the wallpaper service. The user controller can also be used for sending a privacy space switching completion message to the screen locking service.
The activity task management service may be configured to obtain an activity stack corresponding to the current login account, and the activity task management service may be an activitytaskmanagemervice in the electronic device. The activity task management service may also be configured to determine whether the configuration of the activity in the activity stack needs to be changed when the activity stack corresponding to the current login account is not empty. The activity task management service may also be configured to determine, when it is determined that the configuration of the activity in the activity stack needs to be changed, whether the activity is an activity corresponding to the desktop, and determine whether the desktop corresponding to the privacy space runs in a background of the electronic device. The activity task management service can also be used for informing the user controller when the activity is the activity corresponding to the desktop and the switched desktop of the login account is under the background running condition of the electronic equipment, so that the user controller can switch the desktop in the common space to the background and switch the desktop corresponding to the privacy space to the foreground.
An active thread, which may be used to restart the activity comprised by the privacy space, may be an ActivityThread in the electronic device.
The hardware theme manager may be configured to record a switching flag, where the switching flag is used to indicate whether a desktop corresponding to the privacy space runs in a background of the electronic device, and the hardware theme manager may be a hw thememanager in the electronic device.
A wallpaper service may be used to enable the wallpaper service and load the rendering engine. The wallpaper module can also be used for starting wallpaper drawing and drawing wallpaper.
The desktop service can be used to start the desktop service and load the desktop hotspot icon. The desktop module can also be used for loading desktop window icons and desktop weather clocks.
The application framework layer may also include content providers, view systems, telephony managers, resource managers, user management services, system management services, and notification managers, among others.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
The phone manager is used to provide communication functions of the electronic device. Such as management of call status (including on, off, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, sounding a prompt tone, vibrating the electronic device, flashing an indicator light, etc.
The Android Runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application layer and the application framework layer as binary files. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The methods in the following embodiments may be implemented in an electronic device having the above-described hardware structure or software structure.
Fig. 9 is a flowchart illustrating a method for switching a login account of an electronic device according to an embodiment of the present application. As shown in fig. 9, the method for switching the login account of the electronic device may include:
s901, the electronic equipment determines whether an operation for triggering the switching of the privacy space by the user is received.
The user can establish different login accounts on the electronic device, and the different login accounts (also referred to as accounts for short) correspond to different storage spaces. The user may store general data in a storage space (the storage space may be a common space or may also be referred to as a primary space) corresponding to a login account, where the login account may be referred to as a second account, and the second account may be an account currently logged in by the electronic device. And the private data is stored in a storage space corresponding to another login account (the storage space may be called a private space), and the login account may be referred to as a first login account, so that the private data of the user is isolated from general data.
The data stored in the privacy space of the electronic device may include system configurations including the privacy space (e.g., theme, desktop, wallpaper, etc. of the privacy space), data of the user's privacy (e.g., certain data saved in photos or videos of an album or in certain applications), and some applications (e.g., social-like applications). The data stored in the private space may be referred to as first data.
When a user establishes different login accounts on the electronic device, the different login accounts can correspond to different credentials (such as fingerprints or passwords) respectively. For example, the user may use the fingerprint of the left thumb as a credential to enter the login account corresponding to the privacy space, and the user may use the fingerprint of the right thumb as a credential to enter another login account.
For example, a user may establish a login account 1 and a login account 2 on an electronic device, and the electronic device may store general data in a storage space corresponding to the login account 1, that is, a common space, and store private data in a storage space corresponding to the login account 2, that is, a private space. When the electronic device enters the electronic device through the password or the fingerprint corresponding to the login account 2, the electronic device may acquire the privacy data stored in the privacy space to present to the user.
Generally, the electronic device may set a login account corresponding to a storage space for storing general data as a default account, that is, the electronic device may currently access the storage space for storing general data. When the user needs to access the data of the privacy space, the user can input the password or the fingerprint corresponding to the login account corresponding to the privacy space on the screen locking interface of the electronic device.
When the electronic equipment determines that the password or the fingerprint corresponding to the login account corresponding to the privacy space input by the user is correct, the electronic equipment can switch the storage space to the privacy space, so that the electronic equipment can acquire the privacy data stored in the privacy space, and then can display the interface corresponding to the login account corresponding to the privacy space for the user to check, namely, the electronic equipment can switch to the interface corresponding to the privacy space.
The electronic device may determine whether an operation for triggering switching of the privacy space by the user is received by determining whether the user inputs a credential corresponding to a login account corresponding to the privacy space, where the operation may be referred to as a first operation. For example, when a user inputs a password or a fingerprint corresponding to a login account corresponding to a privacy space on a lock screen interface of the electronic device, and the password or the fingerprint input by the user is correct, the electronic device may determine that an operation for switching the privacy space from the start of the user is received.
For example, as shown in fig. 10, the electronic device determines whether an operation for triggering switching of the privacy space by the user is received, and may receive, for an electronic device, for example, a lock screen service of the electronic device, a credential corresponding to a login account corresponding to the privacy space input by the user. When the screen locking service determines that the user passes the verification by using the credential corresponding to the privacy space, the screen locking service may determine that the user needs to perform privacy space switching. When the screen locking service determines that the user passes verification by using the credential corresponding to the default login account, the screen locking verification module may determine that the user does not need to perform privacy space switching, and the electronic device may enter the default login account, and may display the general data stored in the storage space corresponding to the default login account, so that the corresponding interface may be displayed for the user to check.
In a case where the electronic device determines that the operation for triggering the switching of the privacy space by the user is not received, the electronic device may re-execute the above S901. In a case where the electronic device receives an operation for triggering switching of the privacy space by the user, the electronic device may perform S902.
S902, the electronic equipment acquires data of the privacy space.
Under the condition that the electronic equipment determines that the operation that the user is used for triggering the switching of the privacy space is received, responding to the operation, the electronic equipment can acquire data corresponding to the privacy space, namely the data stored in the privacy space, so that the electronic equipment can load an interface corresponding to the privacy space. The data of the privacy space may include system configuration of the privacy space, such as privacy space theme, desktop and wallpaper, and may also include privacy data and applications of the user.
For example, as shown in fig. 10, when the electronic device, such as a screen locking service of the electronic device, determines that the user passes verification using a credential corresponding to the privacy space, the screen locking service may start a privacy space switching thread for starting a user controller of the electronic device. After the user controller of the electronic device starts, the user controller may pull up the switching service for acquiring data of the privacy space, such as data of a theme, a desktop, and wallpaper of the privacy space, after the user controller starts.
And S903, the electronic equipment acquires an activity stack corresponding to the current login account.
The current login account, that is, the account that the electronic device logs in before switching to the account corresponding to the privacy space, such as the login account corresponding to the common space, may be referred to as a second account.
The activity stack corresponding to the current login account is used for recording all activities of the current account, and the activity stack can be an ActivityStack in the electronic device. An activity is an application component that provides a screen through which a user can interact in order to accomplish a task. For example, a user opens an application on the electronic device, that is, the electronic device starts an Activity, which corresponds to the application, and the Activity may be Activity in the electronic device. After the electronic device has initiated an activity, the electronic device will record the activity in the activity stack, i.e., will launch a new activity onto the stack. After the new activity is started to be stacked, the new activity is displayed at the forefront of the screen of the electronic equipment. When the electronic equipment processes the activity in the activity stack, the activity at the top of the activity stack is processed, and after the processing of the activity at the top of the stack is completed, the next activity is a new activity at the top of the stack.
For example, a user opens a weather application on the electronic device, the electronic device starts an activity corresponding to the weather application, and pushes the activity, where the activity corresponding to the weather application is at the top of the activity stack. And then, the user opens the chat application on the electronic equipment, the electronic equipment starts the activity corresponding to the chat application and stacks the activity, and the activity corresponding to the chat application is at the top of the activity stack. Typically, the desktop of the electronic device also corresponds to an activity, which is typically at the bottom of the stack of activities.
For example, as shown in connection with fig. 10, after an electronic device, such as a user controller of the electronic device, acquires data of a privacy space, the user controller may transmit the acquired data of the privacy space to an activity task management service of the electronic device. After the activity task management service obtains the data of the privacy space sent by the user controller, the activity task management service can obtain an activity stack corresponding to the current login account.
S904, the electronic device determines whether the active stack is empty.
When the electronic device determines that the activity stack corresponding to the current login account is empty, that is, the current login account of the electronic device does not start any activity, the electronic device may load an interface corresponding to the privacy space according to the acquired data of the privacy space. When the electronic device determines that the activity stack corresponding to the current login account is not empty, that is, the electronic device starts a plurality of activities at the current login account, the electronic device may determine whether the plurality of activities started by the current login account need to be changed according to the acquired data of the privacy space.
In the case where the electronic device determines that the current active stack is empty, the electronic device may perform S905. In the event that the electronic device determines that the current active stack is not empty, the electronic device may perform S906.
For example, as shown in fig. 10, after the activity task management service of the electronic device, such as the electronic device, acquires the activity stack corresponding to the current login account, the activity task management service of the electronic device, such as the electronic device, may determine whether the activity stack corresponding to the current login account is empty.
And S905, the electronic equipment loads an interface corresponding to the privacy space according to the data of the privacy space.
Under the condition that the electronic device determines that the activity stack corresponding to the current login account is empty, the electronic device may load an interface corresponding to the privacy space according to the acquired data corresponding to the privacy space, that is, the data stored in the privacy space.
For example, as shown in fig. 4, the electronic device loads an interface corresponding to the privacy space according to the data in the privacy space, and after the user controller of the electronic device acquires the data in the privacy space, the user controller may send the data in the privacy space to another system service on the mobile phone. After the other system services receive the data (such as system configuration) of the privacy space sent by the user controller, the other system services may configure according to the data of the privacy space. After the user controller sends the system configuration of the privacy space to other system services on the mobile phone, the user controller can also switch the desktop corresponding to the common space to the background and start the desktop corresponding to the privacy space. After the user controller switches the desktop corresponding to the common space to the background and starts the desktop corresponding to the privacy space, the user controller may send a message for starting the privacy space to other system services on the mobile phone. After receiving the message for starting the privacy space, the other system services may perform corresponding configuration according to the data of the privacy space.
After the other system services complete configuration according to the data of the privacy space, the user controller may also send a switch privacy space message to the other system services. After receiving the message of switching the privacy space, the other system services may switch the system configuration of the privacy space to the foreground. After the other system service switches the system configuration of the privacy space to the foreground, the user controller may send a screen unfreezing message to the other system service for unfreezing the screen. The user controller may also send a privacy space switch complete message to the screen lock service after the other system service has defrosted the screen. After the screen locking service receives the privacy space switching completion message sent by the user controller, the screen locking service can quit the screen locking, so that the mobile phone can display an interface corresponding to the privacy space.
S906, the electronic equipment determines whether the configuration of the first activity in the activity stack needs to be changed or not according to the data of the privacy space.
The first activity is an activity at the top of the stack in the activity stack corresponding to the current login account. For example, the activity stack corresponding to the current login account includes activities corresponding to a chat application, activities corresponding to a weather application, and activities corresponding to a desktop. And if the stack top activity of the activity stack is the activity corresponding to the chat application, the first activity is the activity corresponding to the chat application. The electronic device may determine, according to the data in the privacy space, whether a configuration of an activity corresponding to the chat application needs to be changed, for example, whether the chat application is included in the privacy space, or whether the privacy space needs to display a part of data in the chat application.
After the electronic device completes processing of the activity at the top of the stack in the active stack, i.e., after performing S906-S917 on the activity at the top of the stack in the active stack, the top of the stack in the active stack becomes the activity after the activity at the original top of the stack. For example, the activity stack corresponding to the current login account includes activities corresponding to a chat application, activities corresponding to a weather application, and activities corresponding to a desktop. The top activity of the activity stack is an activity corresponding to the chat application, and the first activity is an activity corresponding to the chat application. After determining whether the configuration of the activity corresponding to the chat application needs to be changed according to the data of the privacy space, the electronic device may change the activity at the top of the stack into the activity corresponding to the weather application, at this time, the activity corresponding to the weather application is the first activity, and the electronic device may continue to execute S906-S917 on the activity corresponding to the weather application.
For example, as shown in fig. 10, in a case where an activity task management service of an electronic device, such as an electronic device, may determine that an activity stack corresponding to a current login account is not empty, the activity task management service of the electronic device, such as an electronic device, may determine, according to data of a privacy space, whether a configuration of a first activity in the activity stack needs to be changed.
In the event that the electronic device determines from the data of the privacy space that the configuration of the first activity in the activity stack does not need to be changed, the electronic device may perform S907. In the event that the electronic device determines from the data of the privacy space that the configuration of the first activity in the activity stack needs to be changed, the electronic device may perform S908.
S907, the electronic device determines whether the first activity requires changing the display.
In the event that the electronic device determines, from the data of the privacy space, that the configuration of the first activity in the activity stack does not need to be changed, the electronic device may determine whether the configuration of the first activity in the activity stack does not need to be changed. For example, when the first activity is an activity corresponding to a chat application, the electronic device may determine, according to the data in the privacy space, that the configuration of the activity corresponding to the chat application does not need to be changed, that is, the chat application is included in the privacy space, and the data in the privacy space of the chat application is the same as the data in the ordinary space. At this point, the electronic device can determine whether the chat application needs to be displayed. For example, if a chat application is already displayed in the ordinary space and not needed in the privacy space, the electronic device may not display the chat application in the privacy space. If the chat application is already displayed in the ordinary space and is also required to be displayed in the private space, the electronic device may display the chat application in the private space, i.e., without altering the display of the chat application.
For example, as shown in connection with FIG. 10, where an activity task management service of an electronic device, such as an electronic device, determines that a configuration of a first activity in an activity stack does not require a change based on data of a privacy space, the activity task management service of the electronic device, such as an electronic device, may determine whether the first activity requires a change to a display.
In the event that the electronic device determines that the first activity in the activity stack requires a change in display, the electronic device may perform S909. In the event that the electronic device determines that no modification of the display is required for the first activity in the activity stack, the electronic device may perform S910.
S909, the electronic device changes the display of the first activity.
In the event that the electronic device determines that the display of the first activity needs to be changed, the electronic device may change the display of the first activity based on the data of the privacy space.
For example, as shown in connection with FIG. 10, in the event that an activity task management service of an electronic device, such as an electronic device, determines that a first activity requires a change to a display, the activity task management service of the electronic device, such as an electronic device, may notify the first activity to make the change to the display.
S910, the electronic device does not change the display of the first activity.
In the event that the electronic device determines that the display does not need to be changed for the first activity, the electronic device may change the display of the first activity based on the data of the privacy space.
For example, as shown in connection with FIG. 10, in the event that an activity task management service of an electronic device, such as an electronic device, determines that a first activity does not require a change to the display, the activity task management service of the electronic device, such as an electronic device, may notify the first activity not to change the display.
S908, the electronic device determines whether the first activity is an activity corresponding to the desktop.
When the electronic device determines that the configuration of a first activity in the activity stack needs to be changed according to the data of the privacy space, the electronic device may determine whether the first activity is an activity corresponding to a desktop, and thus, when the first activity is an activity corresponding to the desktop, the electronic device may determine whether the desktop corresponding to the privacy space runs in a background of the electronic device, and thus, whether the desktop corresponding to the privacy space needs to be restarted can be determined.
For example, as shown in connection with fig. 10, in a case where an activity task management service of an electronic device, such as an electronic device, determines that a configuration of a first activity in an activity stack needs to be changed according to data of a privacy space, the activity task management service of the electronic device, such as an electronic device, may determine whether the first activity is an activity corresponding to a desktop.
In the case where the electronic device determines that the first activity is a desktop, the electronic device may perform S911. In the event that the electronic device determines that the first activity is not a desktop, the electronic device can perform S912.
S911, the electronic device determines whether the desktop corresponding to the privacy space runs in the background of the electronic device.
When the electronic device is switched from the current login account to the first login account (i.e., the login account corresponding to the privacy space) to be hot, the desktop corresponding to the first login account runs in the background. That is, before the electronic device switches from the current login account to the first login account, the electronic device has switched to the first login account. For example, when the electronic device switches from the login account corresponding to the private space to the login account corresponding to the general space after logging in the login account corresponding to the private space, the state of the login account corresponding to the general space is an operating state. When the electronic device switches from the login account corresponding to the common space to the login account corresponding to the privacy space again, the login account corresponding to the privacy space is in an operating state, that is, the login account corresponding to the privacy space operates in the background.
The electronic device may determine whether the desktop corresponding to the first login account runs in the background through the switching flag. For example, the handoff marker may be TRUE or FALSE. The switching flag may indicate that the desktop corresponding to the first login account runs in the background, that is, before the electronic device switches from the current login account to the first login account, the electronic device has switched to the first login account, that is, it is a hot switch that the electronic device switches from the current login account to the first login account. When the switching flag is FALSE, it indicates that the desktop corresponding to the first login account does not run in the background, that is, before the electronic device switches from the current login account to the first login account, the electronic device does not switch to the first login account, that is, it is a hot switch that the electronic device switches from the current login account to the first login account.
After the electronic device is powered on, or after the electronic device creates the first login account, the electronic device may mark the switch as FALSE. When the electronic device is switched from the current login account to the first login account to be a cold cut, that is, the electronic device is switched to the first login account for the first time after being started or the electronic device creates the first login account, the electronic device may switch the current login account to the first login account for the first time, and the electronic device may mark the switching as TRUE.
For example, as shown in fig. 10, in a case that whether the activity task management service of the electronic device, such as the electronic device, determines whether the first activity is an activity corresponding to a desktop, the activity task management service of the electronic device, such as the electronic device, may determine whether the desktop corresponding to the first login account runs in a background of the electronic device. For example, the activity task management service of the electronic device may query a switching flag in a hardware theme manager of the electronic device, and in a case of TRUE of the switching flag in the hardware theme manager, the activity task management service of the electronic device may determine that a desktop corresponding to the first login account runs in a background of the electronic device, that is, the electronic device is hot-cut when being switched from the current login account to the first login account. Under the condition of FALSE of the switch mark in the hardware theme manager, the activity task management service of the electronic device may determine that the desktop corresponding to the first login account does not run in the background of the electronic device, that is, the electronic device is cold cut when being switched from the current login account to the first login account.
It should be noted that, when the electronic device is switched from the current login account to the first login account to be a cold cut, that is, the electronic device, such as a user controller of the electronic device, may set the switching flag to TRUE, and send the switching flag to a hardware theme manager of the electronic device. The hardware theme manager of the electronic device may store the switching flag, so that the electronic device may determine whether the desktop of the first login account runs in the background of the electronic device through the switching flag when the electronic device is switched from the current login account to the first login account next time. That is, under the condition that the desktop of the privacy space does not run in the background of the electronic device, the electronic device may receive an operation that a user triggers switching from a currently logged-in account to a first account, and the electronic device may load the desktop of the privacy space according to first data stored in a storage space corresponding to the first account, and load an interface of the first account according to the first data stored in the storage space corresponding to the first account (i.e., the privacy data corresponding to the privacy space). The electronic device may record a switching flag, where the switching flag is used to indicate that the desktop of the first account runs in a background of the electronic device.
That is, before the electronic device receives a first operation of the user, the electronic device may receive a second operation triggered by the user to switch to the first account (i.e., the account corresponding to the privacy space). In response to the second operation, the electronic device may load a desktop of the privacy space according to the data of the privacy space, that is, the first data, and load and display content corresponding to the privacy space on the desktop of the privacy space according to the first data. After the electronic device loads the desktop of the privacy space, the electronic device may store the loaded desktop of the privacy space. After that, the electronic device may receive a third operation that a user triggers switching from the first account to another account, and in response to the third operation, the electronic device switches the account currently logged in by the electronic device from the first account to another account.
In a case where the electronic device determines that the desktop corresponding to the privacy space is not running in the background of the electronic device, the electronic device may perform S913. In a case that the electronic device determines that the desktop corresponding to the privacy space runs in the background of the electronic device, the electronic device may perform S914.
S913, the electronic device loads the desktop corresponding to the privacy space.
Under the condition that the electronic equipment determines that the desktop corresponding to the privacy space does not run in the background of the electronic equipment, the electronic equipment can start the desktop corresponding to the privacy space according to the data of the privacy space, namely, the desktop corresponding to the privacy space is loaded according to the data of the privacy space. That is, under the condition that the desktop of the privacy space does not run in the background of the electronic device, the electronic device may receive an operation that a user triggers switching from a currently logged-in account to a first account, and the electronic device may load the desktop of the privacy space according to first data stored in a storage space corresponding to the first account, and load an interface of the first account according to the first data stored in the storage space corresponding to the first account (i.e., the privacy data corresponding to the privacy space).
For example, as shown in fig. 4, in the electronic device, for example, the activity task management service of the electronic device determines that the desktop corresponding to the first login account (i.e., the login account corresponding to the privacy space) does not run in the background of the electronic device, for example, the electronic device is cold when switching from the current login account to the first login account. The electronic device, such as an activity task management service of the electronic device, may notify a user controller of the electronic device, so that the user controller of the electronic device may switch a desktop in a common space to a background, and start a desktop corresponding to a privacy space according to data in the privacy space.
After the electronic device switches the desktop corresponding to the privacy space to the foreground, the electronic device may load the interface corresponding to the privacy space according to the data in the privacy space, that is, the electronic device may continue to execute S915 described below.
And S914, the electronic equipment switches the desktop corresponding to the privacy space to the foreground.
The desktop corresponding to the privacy space can be a desktop set by a user or a desktop default by the system. This is not limited in the examples of the present application. Therefore, the electronic device can load and display the content corresponding to the first account on the desktop of the first account according to the data of the privacy space, namely the first data. The electronic device switches the desktop corresponding to the privacy space to the foreground, namely the electronic device displays the desktop of the first account, and the desktop of the first account is loaded before the electronic device receives the first operation of the user.
For example, as shown in fig. 10, in the electronic device, for example, the activity task management service of the electronic device determines that a desktop corresponding to the first login account (i.e., the login account corresponding to the privacy space) runs in a background of the electronic device, that is, the electronic device is hot to switch from the current login account to the first login account. The electronic device, such as the active task management service of the electronic device, may notify the user controller of the electronic device, so that the user controller of the electronic device may switch the desktop in the common space to the background and switch the desktop corresponding to the private space to the foreground.
After the electronic device switches the desktop corresponding to the privacy space to the foreground, the electronic device can also switch the wallpaper of the privacy space to the foreground. The wallpaper of the privacy space can be the wallpaper set by the user. This is not limited in the examples of the present application. Because the desktop corresponding to the privacy space is not reloaded, the wallpaper of the privacy space does not need to be reloaded, and therefore when the current login account number is switched to the login account number corresponding to the privacy space by the electronic equipment, the electronic equipment does not have a black screen.
After the electronic device switches the desktop corresponding to the privacy space to the foreground, the electronic device may load an interface corresponding to the privacy space according to the data of the privacy space, that is, the electronic device may continue to execute S915 described below.
And S915, the electronic equipment loads an interface corresponding to the privacy space according to the data of the privacy space.
After the desktop corresponding to the privacy space is switched to the foreground by the electronic equipment, the electronic equipment can load an interface corresponding to the privacy space according to the data of the privacy space. For example, an application icon of the privacy space is loaded on a desktop corresponding to the privacy space by the electronic device, that is, the electronic device may load and display content corresponding to the first account on the desktop of the first account according to data of the privacy space, that is, the first data. Because the desktop corresponding to the privacy space is not reloaded, the application program icons in the privacy space do not need to be reloaded, so that the time for switching the privacy space can be reduced when the electronic equipment is switched from the current login account number to the login account number corresponding to the privacy space, the efficiency for switching the privacy space is improved, and the user experience is improved.
For example, as shown in fig. 4, the electronic device loads an interface corresponding to the privacy space according to the data of the privacy space, and may send a message for switching the privacy space to another system service for the electronic device, such as a user controller of the electronic device. After receiving the message of switching the privacy space, the other system services can switch the system configuration of the privacy space to the foreground. After the other system services switch the system configuration of the privacy space to the foreground, the user controller may send a screen unfreezing message to the other system services for unfreezing the screen. The user controller may also send a privacy space switch complete message to the screen lock service after the other system service has defrosted the screen. After the screen locking service receives the privacy space switching completion message sent by the user controller, the screen locking service can quit the screen locking, so that the mobile phone can display an interface corresponding to the privacy space.
S912, the electronic device determines whether the first activity needs to be restarted.
Under the condition that the electronic device determines that the first activity is not the activity corresponding to the desktop, the electronic device may determine whether the first activity needs to be restarted according to the data of the privacy space. For example, in a case that the first activity is an activity corresponding to a chat application, the electronic device may determine, according to the data of the privacy space, that the privacy space does not include the chat application, and then the electronic device determines that the first activity does not need to be restarted, and the electronic device may stop running the first activity. When the first activity is an activity corresponding to the chat application, the electronic device may determine, according to the data of the privacy space, that the privacy space includes the chat application, and then the electronic device may determine that the first activity needs to be restarted, and the electronic device may restart the first activity.
I.e., in case the electronic device determines from the data of the privacy space that the first activity does not need to be restarted, the electronic device may perform S916. In case the electronic device determines from the data of the privacy space that the first activity needs to be restarted, the electronic device may perform S917.
For example, as shown in fig. 10, in a case where the activity task management service of the electronic device, such as the electronic device, determines that the first activity is not an activity corresponding to a desktop, the activity task management service of the electronic device, such as the electronic device, may determine whether the first activity needs to be restarted according to the data of the privacy space.
S916, the electronic equipment stops the first activity.
In case the electronic device determines, based on the data of the privacy space, that the first activity does not need to be restarted, the electronic device may stop the first activity, i.e. destroy the first activity.
For example, as shown in connection with fig. 10, in a case where an activity task management service of an electronic device, such as an electronic device, determines that a first activity does not need to be run based on data of a privacy space, the activity task management service of the electronic device, such as an electronic device, may destroy the first activity.
S917, the electronic device restarts the first activity.
And under the condition that the electronic equipment determines that the first activity needs to be restarted according to the data of the privacy space, the electronic equipment can restart the first activity according to the data of the privacy space.
For example, as shown in fig. 10, in a case where the activity task management service of the electronic device, such as the electronic device, determines that the first activity needs to be restarted according to the data of the privacy space, the activity task management service of the electronic device, such as the electronic device, notifies the activity thread to restart the first activity.
For example, as shown in (a) in fig. 11, the user may set up different login accounts on the mobile phone, such as login account 1 and login account 2. The established login account can be displayed on a screen locking interface of the mobile phone. The login account 1 may correspond to a common space for storing general data and applications of the user, that is, the mobile phone may store the general data and applications in the common space corresponding to the login account 1. The login account 2 may correspond to a privacy space for storing the privacy data and the application of the user, that is, the mobile phone may store the privacy data and the application in the privacy space corresponding to the login account 2.
The user can enter login account 1 or login account 2 by entering different fingerprints into the fingerprint input area of the lock screen interface. When the password or fingerprint corresponding to the login account 2 input by the user is correct, the mobile phone may acquire the data of the privacy space and acquire the activity stack corresponding to the current login account (i.e., the login account 1). The mobile phone can determine whether the configuration of the stack top activity in the activity stack needs to be changed according to the data of the privacy space. When the mobile phone determines that the configuration of the stack top activity in the activity stack needs to be changed, the mobile phone may determine whether the stack top activity is an activity corresponding to the desktop. Under the condition that whether the activity at the top of the stack is the activity corresponding to the desktop is determined, the mobile phone can determine whether the desktop corresponding to the privacy space runs in the background of the electronic device. Under the condition that the mobile phone can determine that the desktop corresponding to the privacy space runs in the background of the electronic equipment, the mobile phone can switch the desktop corresponding to the privacy space to the foreground, so that the mobile phone can load an interface corresponding to the privacy space according to the data of the privacy space.
When the mobile phone loads the interface corresponding to the privacy space according to the data in the privacy space, as shown in (b) of fig. 11, the mobile phone may display a switching action to prompt the user that the mobile phone is in the switching process. When the mobile phone finishes loading the interface corresponding to the privacy space according to the data of the privacy space, the mobile phone may display the interface corresponding to the login account 2 shown in (c) in fig. 11 for the user to view, and the interface corresponding to the login account 2 may display the privacy data and the application of the user, that is, the mobile phone is switched to the privacy space.
According to the scheme, when the privacy space is switched to the electronic equipment, because the desktop corresponding to the privacy space runs at the background of the electronic equipment, the electronic equipment can not reload the desktop corresponding to the privacy space, but switch the desktop corresponding to the privacy space to the foreground, so that the application icons on the desktop corresponding to the privacy space do not need to be reloaded, and the wallpaper of the privacy space does not need to be redrawn, thereby avoiding loading the application icons on the desktop corresponding to the privacy space one by one, avoiding displaying a black screen on the mobile phone, further shortening the time for switching the privacy space by the mobile phone, improving the efficiency for switching the privacy space, and improving user experience. In addition, because the electronic equipment does not reload the desktop corresponding to the privacy space, but switches the desktop corresponding to the privacy space from the background to the foreground, the desktop corresponding to the privacy space can be the desktop set by the user and is not a fixed desktop, so that the user experience can be improved.
For example, fig. 12 shows a schematic structural diagram of a switching apparatus 1200 for an electronic device login account, and as shown in fig. 12, the switching apparatus 1200 for an electronic device login account may include: a receiving module 1201, an obtaining module 1202, a displaying module 1203, a loading module 1204, and the like.
The receiving module 1201 may be configured to receive a first operation of a user, where the first operation is used to trigger switching from a second account to a first account, and the second account is an account currently logged in by the electronic device.
The obtaining module 1202 may be configured to, in response to the first operation, obtain, by the electronic device, an activity corresponding to the second account.
The display module 1203 may be configured to include, in the activity corresponding to the second account, an activity corresponding to a desktop of the second account, and in a case that the desktop of the first account runs in a background of the electronic device, the electronic device displays the desktop of the first account, where the desktop of the first account is loaded before the electronic device receives the first operation of the user.
The loading module 1204 may be configured to load, according to the first data, content corresponding to the first account.
The display module 1203 may be further configured to display content corresponding to the first account on the desktop of the first account.
In another possible implementation manner, the receiving module 1201 may be further configured to receive a second operation that the user triggers switching to the first account. The loading module 1204 may be further configured to, in response to the second operation, load the desktop of the first account according to the first data and load content corresponding to the first account according to the first data. The display module 1203 may be further configured to display content corresponding to the first account on the desktop of the first account. The electronic device may also include a storage module 1205. The storage module 1205 may be configured to store the desktop of the loaded first account.
The receiving module 1201 may also be configured to receive a third operation that a user triggers switching from the first account to another account. The electronic device may further include a switching module 1206. The switching module 1206 may be configured to switch, in response to the third operation, the account currently logged in by the electronic device from the first account to another account.
In another possible implementation manner, the electronic device may further include a recording module 1207. The recording module 1207 may be configured to record a switch flag, where the switch flag is used to indicate that the desktop of the first account runs in a background of the electronic device. The electronic device may further include a determination module. The electronic device may also include a determination module 1208. The determining module 1208 may be configured to determine, according to the switching flag, that the desktop of the first account runs in the background of the electronic device.
In another possible implementation manner, the first account is an account corresponding to a privacy space on the electronic device.
It should be understood that the division of units or modules (hereinafter referred to as units) in the above apparatus is only a division of logical functions, and may be wholly or partially integrated into one physical entity or physically separated in actual implementation. And the units in the device can be realized in the form of software called by the processing element; or may be implemented entirely in hardware; part of the units can also be realized in the form of software called by a processing element, and part of the units can be realized in the form of hardware.
For example, each unit may be a processing element separately set up, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory in the form of a program, and a function of the unit may be called and executed by a processing element of the apparatus. In addition, all or part of the units can be integrated together or can be independently realized. The processing element described herein, which may also be referred to as a processor, may be an integrated circuit having signal processing capabilities. In the implementation process, the steps of the method or the units above may be implemented by integrated logic circuits of hardware in a processor element or in a form called by software through the processor element.
In one example, the units in the above apparatus may be one or more integrated circuits configured to implement the above method, such as: one or more ASICs, or one or more DSPs, or one or more FPGAs, or a combination of at least two of these integrated circuit forms.
As another example, when a unit in a device may be implemented in the form of a processing element scheduler, the processing element may be a general purpose processor, such as a CPU or other processor capable of invoking programs. As another example, these units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
In one implementation, the means for implementing the respective corresponding steps of the above method by the above apparatus may be implemented in the form of a processing element scheduler. For example, the apparatus may include a processing element and a memory element, the processing element calling a program stored by the memory element to perform the method described in the above method embodiments. The memory elements may be memory elements on the same chip as the processing elements, i.e. on-chip memory elements.
In another implementation, the program for performing the above method may be in a memory element on a different chip than the processing element, i.e. an off-chip memory element. At this time, the processing element calls or loads a program from the off-chip storage element onto the on-chip storage element to call and execute the method described in the above method embodiment.
For example, the embodiments of the present application may also provide an apparatus, such as: an electronic device may include: a processor, a memory for storing instructions executable by the processor. The processor is configured to execute the above instructions, so that the electronic device implements the virtual card switching method according to the foregoing embodiment. The memory may be located within the electronic device or external to the electronic device. And the processor includes one or more.
In yet another implementation, the unit of the apparatus for implementing the steps of the method may be configured as one or more processing elements, and these processing elements may be disposed on the electronic device corresponding to the foregoing, where the processing elements may be integrated circuits, for example: one or more ASICs, or one or more DSPs, or one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits may be integrated together to form a chip.
For example, the embodiment of the present application also provides a chip, and the chip can be applied to the electronic device. The chip includes one or more interface circuits and one or more processors; the interface circuit and the processor are interconnected through a line; the processor receives and executes computer instructions from the memory of the electronic device through the interface circuitry to implement the methods described in the above method embodiments.
Embodiments of the present application further provide a computer program product, which includes computer instructions executed by the electronic device as described above.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical functional division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another device, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, that is, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in the form of software products, such as: and (5) programming. The software product is stored in a program product, such as a computer readable storage medium, and includes several instructions for causing a device (which may be a single chip, a chip, or the like) or a processor (processor) to perform all or part of the steps of the methods according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
For example, embodiments of the present application may also provide a computer-readable storage medium having stored thereon computer program instructions. The computer program instructions, when executed by the electronic device, cause the electronic device to implement the virtual card switching method as described in the aforementioned method embodiments.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (7)

1. A switching method of login accounts of electronic equipment is characterized by being applied to the electronic equipment, wherein the electronic equipment comprises a plurality of accounts, and the accounts comprise a first account and a second account; the storage space corresponding to the first account is a privacy space, and the storage space corresponding to the second account is a common space; the method comprises the following steps that first data are stored in a storage space corresponding to the first account, and the method comprises the following steps:
the electronic equipment receives a first operation of a user, wherein the first operation is used for triggering switching from the second account to the first account, and the second account is an account which is currently logged in by the electronic equipment;
responding to the first operation, and acquiring an activity corresponding to the second account by the electronic equipment;
the activities corresponding to the second account include activities corresponding to a desktop of the second account, and the electronic device displays the desktop of the first account when the desktop of the first account runs in a background of the electronic device, wherein the desktop of the first account is loaded by the electronic device before receiving the first operation of the user;
and the electronic equipment loads and displays the content corresponding to the first account on the desktop of the first account according to the first data.
2. The method of claim 1, wherein before the electronic device receives a first operation by a user, the method further comprises:
the electronic equipment receives a second operation that a user triggers switching to the first account;
in response to the second operation, the electronic device loads a desktop of the first account according to the first data, and loads and displays content corresponding to the first account on the desktop of the first account according to the first data;
the electronic equipment stores the loaded desktop of the first account;
the electronic equipment receives a third operation that a user triggers switching from the first account to other accounts;
responding to the third operation, and switching the account currently logged in by the electronic equipment from the first account to the other accounts by the electronic equipment.
3. The method of claim 2, wherein after the electronic device loads the desktop of the first account according to the first data, the method further comprises:
the electronic equipment records a switching mark, wherein the switching mark is used for indicating that the desktop of the first account runs in the background of the electronic equipment;
before the electronic device displays the desktop of the first account, the method further comprises:
and the electronic equipment determines that the desktop of the first account runs in the background of the electronic equipment according to the switching mark.
4. An electronic device, comprising a processor, a memory for storing processor-executable instructions; the processor is configured to execute the instructions to cause the electronic device to:
receiving a first operation of a user, wherein the first operation is used for triggering switching from a second account to a first account, and the second account is an account currently logged in by the electronic equipment; the storage space corresponding to the first account is a privacy space, and the storage space corresponding to the second account is a common space; first data are stored in a storage space corresponding to the first account;
responding to the first operation, and acquiring the activity corresponding to the second account by the electronic equipment;
displaying the desktop of the first account under the condition that the activity corresponding to the desktop of the second account is included in the activity corresponding to the second account and the desktop of the first account runs in the background of the electronic device, wherein the desktop of the first account is loaded by the electronic device before the first operation of the user is received;
and loading and displaying the content corresponding to the first account on the desktop of the first account according to the first data.
5. The electronic device of claim 4, wherein the processor is configured to execute the instructions to further cause the electronic device to:
receiving a second operation of triggering switching to the first account by a user;
responding to the second operation, loading the desktop of the first account according to the first data, and loading and displaying the content corresponding to the first account on the desktop of the first account according to the first data;
storing the loaded desktop of the first account;
receiving a third operation that a user triggers switching from the first account to other accounts;
and responding to the third operation, and switching the account currently logged in by the electronic equipment from the first account to the other accounts.
6. The electronic device of claim 5, wherein the processor is configured to execute the instructions to further cause the electronic device to:
recording a switching mark, wherein the switching mark is used for indicating that the desktop of the first account runs in the background of the electronic equipment;
and determining that the desktop of the first account runs in the background of the electronic equipment according to the switching mark.
7. A computer readable storage medium having stored thereon computer program instructions; it is characterized in that the preparation method is characterized in that,
the computer program instructions, when executed by an electronic device, cause the electronic device to implement the method of any of claims 1 to 3.
CN202111390076.6A 2021-11-22 2021-11-22 Switching method for login account of electronic equipment and electronic equipment Active CN115017487B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111390076.6A CN115017487B (en) 2021-11-22 2021-11-22 Switching method for login account of electronic equipment and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111390076.6A CN115017487B (en) 2021-11-22 2021-11-22 Switching method for login account of electronic equipment and electronic equipment

Publications (2)

Publication Number Publication Date
CN115017487A CN115017487A (en) 2022-09-06
CN115017487B true CN115017487B (en) 2023-03-28

Family

ID=83064588

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111390076.6A Active CN115017487B (en) 2021-11-22 2021-11-22 Switching method for login account of electronic equipment and electronic equipment

Country Status (1)

Country Link
CN (1) CN115017487B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110231975A (en) * 2019-06-20 2019-09-13 京东方科技集团股份有限公司 A kind of applied program processing method, device and electronic equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104350723B (en) * 2014-05-22 2017-09-08 华为技术有限公司 The method and device that account is logged in
CN105915491A (en) * 2015-11-18 2016-08-31 乐视网信息技术(北京)股份有限公司 Account number login method and device
CN106056001A (en) * 2016-07-21 2016-10-26 北京奇虎科技有限公司 Private data protection method and apparatus based on mobile terminal and mobile terminal
US20210218725A1 (en) * 2018-09-03 2021-07-15 Huawei Technologies Co., Ltd. Login Method, Token Sending Method, and Device
CN112860322B (en) * 2019-11-26 2022-04-26 成都鼎桥通信技术有限公司 Operating system switching method, device, equipment and storage medium
CN111131619B (en) * 2019-12-30 2021-04-27 广州酷狗计算机科技有限公司 Account switching processing method, device and system
CN112596883B (en) * 2020-12-25 2023-10-24 深圳市欢太科技有限公司 Application switching method and device, storage medium and electronic equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110231975A (en) * 2019-06-20 2019-09-13 京东方科技集团股份有限公司 A kind of applied program processing method, device and electronic equipment

Also Published As

Publication number Publication date
CN115017487A (en) 2022-09-06

Similar Documents

Publication Publication Date Title
CN112860145B (en) Application control method and electronic equipment
CN113220445A (en) Image or video data acquisition method and terminal equipment
CN114489917B (en) Processing method for abnormal exit of application program, electronic equipment and readable storage medium
US20220206735A1 (en) Display Method for Side Area of Screen and Electronic Device
KR20150051078A (en) Lock screen display method of electronic apparatus and electronic appparatus thereof
CN111541811A (en) Method for eliminating unread message corner mark and electronic equipment
CN113835569A (en) Terminal device, quick start method for internal function of application and storage medium
CN115017534B (en) File processing authority control method, device and storage medium
CN113220446A (en) Image or video data processing method and terminal equipment
CN115017487B (en) Switching method for login account of electronic equipment and electronic equipment
CN114035870A (en) Terminal device, application resource control method and storage medium
CN113642010B (en) Method for acquiring data of extended storage device and mobile terminal
CN114356559A (en) Multithreading control method and terminal equipment
CN115686700A (en) Rendering method and electronic equipment
CN113900740A (en) Method and device for loading multiple list data
CN114138343A (en) Terminal and terminal starting method
CN111159734A (en) Communication terminal and multi-application data inter-access processing method
CN115941674B (en) Multi-device application connection method, device and storage medium
CN113806727B (en) Switching method for login account of electronic equipment and electronic equipment
KR20200013508A (en) Method and electronic device for independently controlling a plurality of display
CN116743908B (en) Wallpaper display method and related device
CN113938890B (en) Data sharing method and terminal equipment
CN116088970B (en) Method for controlling application call and related device
CN111142648B (en) Data processing method and intelligent terminal
CN113536387A (en) Terminal and method for detecting integrity of kernel data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant