WO2017008415A1 - Appareil et procédé de lancement d'applications mobiles à partir d'un écran de verrouillage - Google Patents

Appareil et procédé de lancement d'applications mobiles à partir d'un écran de verrouillage Download PDF

Info

Publication number
WO2017008415A1
WO2017008415A1 PCT/CN2015/094049 CN2015094049W WO2017008415A1 WO 2017008415 A1 WO2017008415 A1 WO 2017008415A1 CN 2015094049 W CN2015094049 W CN 2015094049W WO 2017008415 A1 WO2017008415 A1 WO 2017008415A1
Authority
WO
WIPO (PCT)
Prior art keywords
secure
secure application
application
launching
lock screen
Prior art date
Application number
PCT/CN2015/094049
Other languages
English (en)
Inventor
Huan KONG
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Publication of WO2017008415A1 publication Critical patent/WO2017008415A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Definitions

  • This disclosure relates generally to screen lock techniques for terminal devices. More specifically, it relates to devices and methods for launching mobile applications from a lock screen.
  • Smart phones have become ubiquitous and even essential tools for many people around the world. Smart phone applications have also sprouted into various fields such as finance, social communication, games, video, etc. Demands for better smart phones and better smart phone applications have vastly increased. Smart phone related technology development community cares not only the security of information, but also the convenience and ease of use to improve user experience.
  • Many smart phones are equipped with a screen lock function, which prevents an unauthorized person from using the device while in standby mode or prevent accidentally launching of an application.
  • a screen lock function When the screen lock function is enabled, a lock screen is displayed and a user has to unlock the lock screen by entering a password or other types of authentication information before using the smart phone to perform its normal functions. While the screen lock function enhances the security of information stored in or that can be accessed by a smart phone, the additional step of entering a password or other authentication information every time a user wants to use his/her smart phone also reduces the convenience.
  • the present disclosure is directed to a method for launching an application from a lock screen.
  • the method may include displaying, on the lock screen with a lock function activated, at least one icon associated with a secure application.
  • the method may also include acquiring a launching instruction corresponding to the secure application.
  • the method may include launching the secure application without requiring input for unlocking the lock screen.
  • the present disclosure is directed to a terminal device.
  • the terminal device may include a display device and a processor device communicatively coupled to the display device.
  • the processor device may be programmed to control the display device to display a lock screen.
  • the processor may also be programmed to control the display device to display, on the lock screen with a lock function activated, at least one icon associated with a secure application.
  • the processor may further be programmed to acquire a launching instruction corresponding to the secure application.
  • the processor may be programmed to launch the secure application without requiring input for unlocking the lock screen.
  • the present disclosure is directed to a non-transitory, computer-readable medium.
  • the computer-readable medium may store instructions that, when executed by a processor device, cause the processor device to perform a method for launching an application from a lock screen.
  • the method may include displaying, on the lock screen with a lock function activated, at least one icon associated with a secure application.
  • the method may also include acquiring a launching instruction corresponding to the secure application.
  • the method may include launching the secure application without requiring input for unlocking the lock screen.
  • Fig. 1 is a flow chart of an exemplary method for launching an application from a lock screen, according to some embodiments of the present disclosure.
  • Fig. 2 is a flow chart of another exemplary method for launching an application from a lock screen, according to some embodiments of the present disclosure.
  • Fig. 3 is a schematic diagram of an exemplary lock screen interface, according to some embodiments of the present disclosure.
  • Fig. 4 is a functional block diagram of an exemplary terminal device, according to some embodiments of the present disclosure.
  • Fig. 1 is a flow chart of an exemplary method 100 for rapidly launching an application directly from a lock screen.
  • the term “application” may include any applications that are operable on a terminal device, for example, mobile applications that are operable on a smart phone. These applications may also be referred to as “apps. ”
  • the terminal device may include phones, tablets, PDAs, portable computers, or any other devices capable of executing software applications.
  • the term terminal device is used to refer to such a device.
  • one type of terminal devices such as a smart phone, may be used as an example in the descriptions of some embodiments.
  • a person having ordinary skill in the art should understand that other terminal devices are interchangeable with the exemplary terminal device.
  • method 100 may include the following steps.
  • the terminal device may display at least one, for example, a plurality of icons on a lock screen. Each icon may correspond to a secure application.
  • a terminal device may have a screen lock function.
  • the terminal device may display a lock screen when a user attempts to use the terminal device.
  • the user must enter a password to unlock the lock screen in order to initiate a regular mode and access the interface under the regular mode.
  • the regular mode refers to the regular operational status after the lock screen of the terminal device is unlocked.
  • a plurality of applications may be installed on the terminal device.
  • the user may select one or more applications and mark the selected applications as secure applications. Icons corresponding to the secure applications may be established and the absolute addresses of the secure applications may be recorded.
  • An absolute address refers to the address of an application in the main memory or storage device. In some embodiments, an absolute address may be the physical address where the application is stored.
  • the terminal device may include a secure application setting unit, through which a user may set or mark an application as a secure application. Once an application is set or marked as a secure application, the terminal device may automatically generate an icon corresponding to the secure application and record the absolute address of the secure application. The user may then launch the secure application by operating the corresponding icon directly on the lock screen.
  • the launched secure application may run in a secure mode to allow the user to perform operations with the secure application.
  • the terminal device may return to and redisplay the lock screen.
  • the quantity of the secure applications that can be marked may be limited to a predetermined number. All applications that have already been marked as secure applications may be provided to a user, e.g., by displaying the secure applications on the screen of the terminal device.
  • the terminal device may allow deletion or unmarking of a secure application.
  • the secure application setting unit may be provided to the user through one or more menu options in the system setting module of the terminal device. In some embodiments, some functions of the secure application setting unit, such as deletion or unmarking of a secure application, may also be provided through an interface directly on the lock screen.
  • the user may select from among all applications installed on the terminal device through an interface and set or mark any application as a secure application.
  • Corresponding icon to be displayed on the lock screen may then be built or generated and the absolute address of the secure application may be recorded.
  • the user may perform operations on the icon directly on the lock screen to launch the corresponding secure application by accessing the recorded absolute address.
  • a non-secure application the user may have to enter the password to unlock the lock screen first before launching that application in a traditional way.
  • the user may customize the icon of a secure application that is displayed on the lock screen.
  • the terminal device may acquire a launching instruction corresponding to a secure application.
  • the launching instruction may include single-click, double-click, swiping, gesture, or other suitable operations.
  • a triggering operation may also be provided to activate the process for launching secure applications directly on the lock screen.
  • the triggering operation may include single-click, double-click, swiping, etc.
  • the terminal device may launch the secure application in response to the launching instruction and run the secure application in a first operating mode.
  • the first operating mode refers to a mode in which the secure application is running after launched directly from the lock screen without requiring user input for unlocking the lock screen.
  • the first operating mode refers to a secure mode.
  • a second operating mode refers to a mode in which an application is running after launched from the regular user interface after unlocking the lock screen. The second operating mode is the regular operating mode.
  • the unlocked interface which is also the regular interface after unlocking the lock screen, may be displayed after the user enters the correct password.
  • the lock screen may be redisplayed after a secure application ceases or exits operation.
  • the terminal device is in the normal operating mode. If the screen lock function is enabled or activated, the secure mode may be established.
  • the information access mechanism under the secure mode is as follows. A secure application may be launched either through the normal interface after unlocking the lock screen or through the corresponding icon displayed on the lock screen. When the secure application is directly launched by a launching operation performed on the corresponding icon displayed on the lock screen, the terminal device may enter into the secure mode, in which the user may launch the secure application without entering the password to unlock the lock screen. Out of information security concern, in the secure mode, interactions between a secure application and a non-secure application may be prohibited. Interactions among secure applications may be allowed.
  • the interface of the terminal device may return to the lock screen (e.g., by redisplaying the lock screen) .
  • the lock screen may be unlocked and the normal interface may be displayed.
  • data protection may be established in the secure mode.
  • launcher e.g., launcher, provider
  • launcher may need to add a secure application identifier, indicating whether a particular application is on the secure application list.
  • Data protection may then be initiated for those applications identified as secure applications.
  • data protection may include backing up or restoring temporary application information, building temporary buffer queues for launcher activity, recording path information of temporarily launched activities, etc.
  • the system may temporarily backup the database, redirect the database location of the previous user, cleanup data, and load data into activity interface upon launching.
  • the system may use widget or control identification method to obtain text attribute of an input block, buffer the information, and restore the information after the system exits the secure mode.
  • Method and apparatus disclosed in this application enable a user to launch an application directly from a lock screen.
  • a user may use a chatting application frequently on his/her smart phone, and is confident or comfortable about the security management of that chatting application.
  • the screen of the smart phone may be locked automatically whenever there is a certain time period during which the smart phone does not receive input.
  • the user has to enter password repeatedly in order to resume a conversation session, which is inconvenient and time wasting.
  • the user may simply set the chatting application as a secure application. Then that chatting application may be directly launched from the lock screen without requiring the user to enter password, which improves the convenience and user experience.
  • Fig. 2 is a flow chart of an exemplary method 200 for launching an application from a lock screen.
  • Method 200 may include the following steps.
  • step 201 after the terminal device is turned on, the terminal device checks screen lock settings.
  • step 202 the terminal device may determine whether the screen lock function is activated. If no, perform step 203. If yes, perform step 204.
  • step 203 the terminal device enters a normal or regular mode, and the operation flow ends.
  • step 204 the terminal device displays the lock screen.
  • step 205 the terminal device determines whether an unlocking instruction or operation is received. If yes, perform step 206. If no, perform step 207.
  • step 206 the lock screen is unlocked and the terminal device enters the normal or regular mode and display regular standby interface. The operation flow ends.
  • step 207 upon receiving a direct launch instruction or operation to an icon on the lock screen, the terminal device launches the corresponding secure application in a secure mode.
  • Fig. 3 is a schematic diagram of an exemplary lock screen 300.
  • lock screen 300 includes two icons 301 and 302, corresponding to two secure applications Message and WeChat, respectively. These two applications may be set or marked as secure application using the secure application setting unit discussed above.
  • the two icons may be generated by the terminal device or selected or customized by the user.
  • a curved arrow is shown to lead from each secure application to a small triangular sign 310, indicating that the user may launch either secure application in secure mode by swiping the corresponding icon along the trajectory defined by the curved arrow.
  • Graphical indicators 320 may indicate keys, dots, or other suitable input means for the user to enter password or other authentication information to unlock the lock screen 300.
  • a user’s smart phone may have screen lock function activated.
  • the user may use a Notepad application frequently.
  • the user may open the secure application setting interface (e.g., provided by the secure application setting unit) , select Notepad from all applications installed on the smart phone, and add the Notepad application onto the secure application list.
  • the user may also choose a personal photo from his/her camera database as the icon to be displayed on the lock screen corresponding to the Notepad application.
  • the user may also define a direct launch operation, such as double-click, as the launching instruction to launch the Notepad application directly from the lock screen.
  • the user may open the Notepad application under normal mode (e.g., after unlocking the smart phone) , and record some notes, such as “meeting room setup: *** .”
  • the screen of the smart phone may subsequently be locked.
  • the user may, directly on the lock screen, double-click the personal image (the icon defined by the user as corresponding to the Notepad application) and launch Notepad application without entering the screen unlocking password.
  • the Notepad interface may be displayed, showing the last point of edit “meeting room setup: *** .”
  • the user may resume the note taking process and add “platform setup: *** .”
  • the Notepad application has a short messaging function, the user may wish to send the note to his/her colleague through a short message.
  • application Message (a short messaging application) is also a secure application
  • the user may send the note through a short message by calling Message application directly from the Notepad application (e.g., currently in secure mode) .
  • the Message application is not a secure application, then the user cannot send the note just yet.
  • the system may prompt “please unlock before sending” or a similar message. If the user exits the Notepad application, the system may return to the lock screen.
  • the new information added to the note “platform setup: *** ” during secure mode operation may be saved. Once the user unlocks the screen (e.g., enter the normal mode) , the user may send the note through a short message.
  • the technical solution disclosed in this application enables a user to launch an application directly from the lock screen without unlocking operations, simplifying the operation flow and enhancing user experience.
  • the user may also customize the direct launching icon and direct launching operation, improving privacy and security.
  • Terminal device 400 may include the following components: display unit 41, acquisition unit 42, launch unit 43, exit unit 44, secure application setting unit 45, icon setting unit 46, and unlock unit 47.
  • Display unit 41 may be used to display a lock screen and a plurality of icons on the lock screen. Each icon may correspond to a secure application.
  • Acquisition unit 42 may be used to acquire a launching instruction corresponding to a secure application. Acquisition unit 42 may also be used to detect a launching operation performed on an icon and generate a launching instruction.
  • Launch unit 43 may be used to respond to the launching instruction and launch the secure application in a first operating mode, such as a secure mode.
  • Exit unit 44 may be used to exit the secure application and return to the lock screen.
  • Secure application setting unit 45 may be used to select one or more applications and mark the selected application (s) as secure application (s) .
  • Icon setting unit 46 may be used to build or generate an icon corresponding to each secure application and record the absolute address of the secure application.
  • Launch unit 43 may also be used to launch the secure application by accessing the absolute address recorded from that secure application.
  • Unlock unit 47 may be used to obtain an unlocking operation and display an unlocked interface that includes multiple application icons.
  • Launch unit 43 may also be used to record the status of the secure mode, record application call information, and properly display user data of the calling or called application.
  • Exit unit 44 may also be used to return to lock screen upon user operation; process data under secure mode, including storing and deleting data; and deleting temporary files. After data processing, exit unit 44 may mark the current status as the normal mode.
  • whether an application is a secure or non-secure application may be determined through terminal device handshaking. Interactions and calling between a currently running secure application and another secure application are permitted. Interactions between the currently running secure application and a non-secure application are prohibited. A friendly warning message may be provided when a secure application attempts to interact with a non-secure application. In addition, when the user launches or exits an application under secure or normal mode, data consistency is maintained.
  • the terminal device may protect the original user data and buffer the temporary data.
  • the protection of the original data refers to hiding the original user data in the secure mode such that the original data will not be exposed.
  • Buffering the temporary data refers to processing the temporary data after exiting the secure mode or entering the normal mode. The processing may include ignoring, prompting to save, directly merging, marking, etc.
  • the units shown in Fig. 4 may be implemented according to the corresponding methods described above.
  • the functions of each unit may be implemented through software programs that are executable by one or more processor devices, or through specific logical circuits.
  • a computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored.
  • a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor (s) to perform steps or stages consistent with the embodiments described herein.
  • the term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include RAM, ROM, volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.
  • the methods and functions disclosed in this application can be implemented as software codes or instructions stored on a non-transitory computer-readable medium.
  • the software codes or instructions when executed by a processor device, can cause the processor device to perform the disclosed methods and functions, such as launching an application from a lock screen without requiring input for unlocking the lock screen.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention concerne un procédé et un appareil permettant de lancer des applications mobiles à partir d'un écran de verrouillage. Le procédé comprend les étapes consistant à : afficher, sur l'écran de verrouillage avec une fonction de verrouillage activée, au moins une icône associée à une application sécurisée ; acquérir une instruction de lancement correspondant à l'application sécurisée ; et lancer l'application sécurisée sans nécessiter d'entrée pour déverrouiller l'écran de verrouillage.
PCT/CN2015/094049 2015-07-10 2015-11-06 Appareil et procédé de lancement d'applications mobiles à partir d'un écran de verrouillage WO2017008415A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510408562.4A CN105045465A (zh) 2015-07-10 2015-07-10 解锁界面快速进入应用的方法及终端
CN201510408562.4 2015-07-10

Publications (1)

Publication Number Publication Date
WO2017008415A1 true WO2017008415A1 (fr) 2017-01-19

Family

ID=54452043

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/094049 WO2017008415A1 (fr) 2015-07-10 2015-11-06 Appareil et procédé de lancement d'applications mobiles à partir d'un écran de verrouillage

Country Status (2)

Country Link
CN (1) CN105045465A (fr)
WO (1) WO2017008415A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107179831A (zh) * 2017-06-30 2017-09-19 广东欧珀移动通信有限公司 启动应用的方法、装置、存储介质及终端

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491137B (zh) * 2015-12-14 2018-08-07 苏州天平先进数字科技有限公司 一种安卓锁屏app的平台系统
CN105677156B (zh) * 2016-01-05 2021-07-27 惠州Tcl移动通信有限公司 免解锁进入应用的方法和移动终端
CN107292148A (zh) * 2016-03-31 2017-10-24 宇龙计算机通信科技(深圳)有限公司 一种工作模式切换方法及用户终端
CN109036398A (zh) * 2018-07-04 2018-12-18 百度在线网络技术(北京)有限公司 语音交互方法、装置、设备及存储介质
CN111124537B (zh) * 2019-12-19 2022-11-08 维沃移动通信有限公司 一种应用启动方法及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013166878A1 (fr) * 2012-05-07 2013-11-14 惠州Tcl移动通信有限公司 Procédé de démarrage d'application basé sur un dispositif à écran tactile, et dispositif à écran tactile correspondant
US20150033361A1 (en) * 2013-07-24 2015-01-29 Korea Advanced Institute Of Science And Technology Method for Invoking Application in Screen Lock Environment
CN104360874A (zh) * 2014-10-21 2015-02-18 中国联合网络通信集团有限公司 应用软件使用控制方法和装置
WO2015069735A2 (fr) * 2013-11-06 2015-05-14 Alibaba Group Holding Limited Procédé et appareil permettant de fournir des informations sur un programme d'application dans un dispositif terminal mobile

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604223B (zh) * 2009-04-20 2012-05-23 宇龙计算机通信科技(深圳)有限公司 一种触摸屏的解锁方法、系统及触摸屏设备
CN102354272A (zh) * 2011-09-20 2012-02-15 宇龙计算机通信科技(深圳)有限公司 应用程序的启动方法和终端
CN103164130B (zh) * 2011-12-12 2018-10-12 联想(北京)有限公司 电子设备及其锁屏控制方法
US20130283199A1 (en) * 2012-04-24 2013-10-24 Microsoft Corporation Access to an Application Directly from a Lock Screen
CN103543936B (zh) * 2012-07-16 2017-10-27 中兴通讯股份有限公司 一种触摸屏终端快速解锁进入应用的方法及触摸屏终端
CN103034445B (zh) * 2012-12-13 2016-01-13 广东欧珀移动通信有限公司 一种移动终端设备自定义解锁界面的方法及移动终端设备
CN104571838B (zh) * 2013-10-15 2018-01-05 腾讯科技(深圳)有限公司 一种快速启动应用程序的方法和装置
CN103777871B (zh) * 2014-02-14 2017-10-10 北京猎豹移动科技有限公司 一种锁屏状态下启动应用的方法及装置
CN103761036B (zh) * 2014-02-14 2017-05-17 北京猎豹移动科技有限公司 一种用于启动应用的方法及装置
CN104133631B (zh) * 2014-07-28 2017-09-05 步步高教育电子有限公司 一种从锁屏界面快速开启应用的方法和装置
CN104123164B (zh) * 2014-07-31 2018-01-16 广东欧珀移动通信有限公司 一种应用程序的启动方法和装置
CN104238916A (zh) * 2014-09-16 2014-12-24 广东欧珀移动通信有限公司 一种移动终端启动应用或应用功能的方法及移动终端
CN104536681B (zh) * 2014-12-09 2018-06-19 惠州Tcl移动通信有限公司 一种基于触摸屏同时开启多个应用的方法及系统
CN104572175B (zh) * 2014-12-17 2018-01-19 广东欧珀移动通信有限公司 一种快速启动非隐私类型应用的方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013166878A1 (fr) * 2012-05-07 2013-11-14 惠州Tcl移动通信有限公司 Procédé de démarrage d'application basé sur un dispositif à écran tactile, et dispositif à écran tactile correspondant
US20150033361A1 (en) * 2013-07-24 2015-01-29 Korea Advanced Institute Of Science And Technology Method for Invoking Application in Screen Lock Environment
WO2015069735A2 (fr) * 2013-11-06 2015-05-14 Alibaba Group Holding Limited Procédé et appareil permettant de fournir des informations sur un programme d'application dans un dispositif terminal mobile
CN104360874A (zh) * 2014-10-21 2015-02-18 中国联合网络通信集团有限公司 应用软件使用控制方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107179831A (zh) * 2017-06-30 2017-09-19 广东欧珀移动通信有限公司 启动应用的方法、装置、存储介质及终端
CN107179831B (zh) * 2017-06-30 2019-05-03 Oppo广东移动通信有限公司 启动应用的方法、装置、存储介质及终端

Also Published As

Publication number Publication date
CN105045465A (zh) 2015-11-11

Similar Documents

Publication Publication Date Title
WO2017008415A1 (fr) Appareil et procédé de lancement d'applications mobiles à partir d'un écran de verrouillage
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US10572639B2 (en) Selectively providing personal information and access to functionality on lock screen based on biometric user authentication
US10318764B2 (en) Method and apparatus for differentiated access control
KR102299261B1 (ko) 어플리케이션의 잠금 상태를 제어하는 방법 및 이를 지원하는 전자장치
US8261361B2 (en) Enabling sharing of mobile communication device
US10635456B2 (en) Method for entering operating system desktop and mobile intelligent terminal
US7941861B2 (en) Permitting multiple tasks requiring elevated rights
US20180357440A1 (en) Personalized Meetings
US9098695B2 (en) Secure note system for computing device lock screen
US20160300079A1 (en) Method and Device for Processing Hidden File Folder, and Terminal
CN104077512B (zh) 个人信息安全管理方法及管理装置
JP2017518598A (ja) 権限管理方法、装置、プログラムおよび記録媒体
US9443072B2 (en) Methods and devices for granting access to and enabling passcode protection for a file
CN112148163B (zh) 屏幕录制方法、装置及电子设备
CN106936999A (zh) 最近访问记录列表的显示方法、移动终端及可读存储介质
US20160055342A1 (en) Device and methods to control information outputting on computing device
US20200089910A1 (en) Message privacy
WO2019011083A1 (fr) Procédé et appareil de traitement d'informations privées et terminal mobile
CN117999555A (zh) 权限优化方法及相关设备
WO2018072193A1 (fr) Procédé et dispositif de commande d'application pour un demarrage automatique
CN107704337B (zh) 恢复出厂设置的方法、移动终端及具有存储功能的装置
US9846980B2 (en) Lock releasing method of electronic device, and apparatus thereof
CN112632518A (zh) 数据访问方法、装置、终端及存储介质
US20130169566A1 (en) Method, system and apparatus for data manipulation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15898142

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15898142

Country of ref document: EP

Kind code of ref document: A1