WO2017161818A1 - 一种终端的控制方法及终端 - Google Patents

一种终端的控制方法及终端 Download PDF

Info

Publication number
WO2017161818A1
WO2017161818A1 PCT/CN2016/096430 CN2016096430W WO2017161818A1 WO 2017161818 A1 WO2017161818 A1 WO 2017161818A1 CN 2016096430 W CN2016096430 W CN 2016096430W WO 2017161818 A1 WO2017161818 A1 WO 2017161818A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
touch area
user
operation information
edge touch
Prior art date
Application number
PCT/CN2016/096430
Other languages
English (en)
French (fr)
Inventor
索浩森
Original Assignee
乐视控股(北京)有限公司
乐视移动智能信息技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 乐视控股(北京)有限公司, 乐视移动智能信息技术(北京)有限公司 filed Critical 乐视控股(北京)有限公司
Priority to US15/335,416 priority Critical patent/US20170277395A1/en
Publication of WO2017161818A1 publication Critical patent/WO2017161818A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a terminal control method and terminal.
  • mainstream terminals use a touch screen, and the user can control the terminal by operating the function buttons on the touch screen.
  • a user uses a terminal, some files, pictures, videos, or applications in the terminal do not want other users to see it. Users need to set access rights for those things that they do not want to be seen, thus protecting their privacy.
  • the user sets access rights for content such as files, pictures, videos, or applications that are not to be seen, generally by
  • the content that the user does not want to be seen is encrypted one by one or the guest mode is set for the terminal; and after setting the privacy mode for the content that the user does not want to be seen by the above means, when accessing the content that the user does not want to be seen, the input needs to be input.
  • the password or the operation mode of the terminal is changed by setting, and the operation process is cumbersome. Therefore, setting the privacy mode for content that the user does not want to be seen in the prior art may result in low operational efficiency.
  • the present application provides a terminal control method and terminal for solving The problem of low efficiency of operation caused by setting a privacy mode for content that the user does not want to be seen in the prior art.
  • an embodiment of the present application provides a method for controlling a terminal, where the method includes: acquiring operation information of a user for an edge touch area of the terminal; The operation information of the edge touch area hides the specified desktop icon.
  • the aspect as described above, and any possible implementation manner further provide an implementation manner of acquiring operation information of a user for an edge touch area of the terminal, including: monitoring whether a desktop icon on the terminal is dragged to the An edge touch area of the terminal; hiding the specified desktop icon according to operation information of the edge touch area of the terminal, including: if the desktop icon on the terminal is detected to be dragged to the The edge touch area of the terminal hides the dragged desktop icon.
  • the foregoing aspect and any possible implementation manner further provide an implementation manner of acquiring operation information of a user for an edge touch area of the terminal, including: detecting an operation of the user in an edge touch area of the terminal Whether the information is the specified operation information for hiding the specified desktop icon; and the specified desktop icon is hidden according to the operation information of the user for the edge touch area of the terminal, including: if the user is detected
  • the operation information of the edge touch area of the terminal is specified operation information for hiding the specified desktop icon, and the specified desktop icon is hidden.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the operation information of the user in the edge touch area of the terminal includes: after the user performs a sliding operation on the edge touch area of the terminal The generated operation information; or the operation information generated by the user after the click operation in the edge touch area of the terminal; or the user touches the edge of the terminal The operation information generated after the area is pressed.
  • the technical solution of the foregoing technical solution has the following beneficial effects: in the embodiment of the present application, the operation information of the edge touch area of the user is obtained, and then the operation information of the edge touch area of the user is used according to the user , hides the specified desktop icon.
  • the embodiment of the present application when the user sets a privacy mode for content that is not to be seen, the user only needs to perform a simple operation on the edge touch area in the terminal, and the terminal will correspond to the content that the user does not want to be seen.
  • the desktop icon is hidden in the terminal; thus, the user can quickly and easily set the privacy mode for some content that is not wanted to be seen, and at the same time ensure that the desktop icon corresponding to the content is not perceived by other users. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the embodiment of the present application further provides a method for controlling a terminal, where the method includes: acquiring operation information of a user in an edge touch area of the terminal; The operation information of the edge touch area displays the hidden desktop icon in the terminal through the screen of the terminal.
  • the desktop icon includes: detecting whether the operation information of the user in the edge touch area of the terminal is specified operation information for displaying the hidden desktop icon in the terminal; if the user is detected to be touched at the edge of the terminal
  • the operation information of the control area is specified operation information for displaying the hidden desktop icon in the terminal, and the hidden desktop icon in the terminal is displayed through the screen of the terminal.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the operation information of the user in the edge touch area of the terminal includes: operation information generated after the user performs a sliding operation on the edge touch area of the terminal; or the user performs a click operation on the edge touch area of the terminal. The operation information generated afterwards; or the operation information generated by the user after the pressing operation in the edge touch area of the terminal.
  • the embodiment of the present application obtains the operation information of the user in the edge touch area of the terminal, and then according to the user's touch area in the edge of the terminal
  • the operation information displays a hidden desktop icon in the terminal through a screen of the terminal.
  • the embodiment of the present application after the user sets the privacy mode for some content that is not to be seen, the user does not need to change the operation mode of the terminal, and does not need to input the unlocking password cumbersomely, and only needs to be simple in the edge touch area of the terminal.
  • the operation of the terminal will display the desktop icons of the hidden content of the user that the user does not want to be seen through the screen, and the operation is simple and difficult to be perceived. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the third aspect of the present invention provides a terminal, including: an obtaining module, configured to acquire operation information of a user for an edge touch area of the terminal; and a hiding module, configured to The user hides the specified desktop icon for the operation information of the edge touch area of the terminal.
  • the above-mentioned aspect and any possible implementation manner further provide an implementation manner, where the acquiring module is specifically configured to: monitor whether a desktop icon on the terminal is dragged to an edge touch area of the terminal.
  • the hidden module is specifically configured to: if the desktop icon on the terminal is detected to be dragged to the edge touch area of the terminal, the desktop icon that is dragged is hidden.
  • the acquiring module is specifically configured to: detect whether the operation information of the user in the edge touch area of the terminal is hidden Specified operation information of the specified desktop icon; the hidden module, Specifically, if it is detected that the operation information of the user in the edge touch area of the terminal is the specified operation information for hiding the specified desktop icon, the specified desktop icon is hidden.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the operation information of the user in the edge touch area of the terminal includes: after the user performs a sliding operation on the edge touch area of the terminal The generated operation information; or the operation information generated by the user after the click operation in the edge touch area of the terminal; or the operation information generated by the user after the user performs the pressing operation on the edge touch area of the terminal.
  • the embodiment of the present application acquires operation information of the user for the edge touch area of the terminal by using the obtaining module in the terminal, and then the hidden module in the terminal is configured according to the user according to the The operation information of the edge touch area of the terminal hides the specified desktop icon.
  • the user when the user sets a privacy mode for content that is not to be seen, the user only needs to perform a simple operation on the edge touch area in the terminal, and the terminal will correspond to the content that the user does not want to be seen.
  • the desktop icon is hidden in the terminal; thus, the user can quickly and easily set the privacy mode for some content that is not wanted to be seen, and at the same time ensure that the desktop icon corresponding to the content is not perceived by other users. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the fourth embodiment of the present disclosure further provides a terminal, including: an acquiring module, configured to acquire operation information of the user in an edge touch area of the terminal; and a display module, configured to: And displaying, according to the operation information of the touch area of the edge of the terminal, the desktop icon hidden in the terminal by using a screen of the terminal.
  • the display module is specifically configured to: detect an edge touch area of the user in the terminal Whether the operation information is the specified operation information for displaying the hidden desktop icon in the terminal; if the operation information of the user in the edge touch area of the terminal is detected, the designated operation of displaying the hidden desktop icon in the terminal is Information, displaying a hidden desktop icon in the terminal through a screen of the terminal.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the operation information of the user in the edge touch area of the terminal includes: after the user performs a sliding operation on the edge touch area of the terminal The generated operation information; or the operation information generated by the user after the click operation in the edge touch area of the terminal; or the operation information generated by the user after the user performs the pressing operation on the edge touch area of the terminal.
  • the embodiment of the present application acquires operation information of the user in an edge touch area of the terminal by using an acquiring module in the terminal, and then the display module in the terminal is configured according to the The operation information of the user in the edge touch area of the terminal displays the hidden desktop icon in the terminal through the screen of the terminal.
  • the user after the user sets the privacy mode for some content that is not to be seen, the user does not need to change the operation mode of the terminal, and does not need to input the unlocking password cumbersomely, and only needs to be simple in the edge touch area of the terminal.
  • the operation of the terminal will display the desktop icons of the hidden content of the user that the user does not want to be seen through the screen, and the operation is simple and difficult to be perceived. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the fifth aspect of the present application further provides a terminal, at least one processor, and a memory communicably connected to the at least one processor; wherein the memory stores Executing instructions executed by at least one processor, the instructions being executed by the at least one processor to enable the at least one processor to: acquire a user for the end The operation information of the edge touch area of the end; the specified desktop icon is hidden according to the operation information of the edge touch area of the terminal.
  • the technical solution of the foregoing technical solution has the following beneficial effects: in the embodiment of the present application, the operation information of the edge touch area of the user is obtained, and then the operation information of the edge touch area of the user is used according to the user , hides the specified desktop icon.
  • the embodiment of the present application when the user sets a privacy mode for content that is not to be seen, the user only needs to perform a simple operation on the edge touch area in the terminal, and the terminal will correspond to the content that the user does not want to be seen.
  • the desktop icon is hidden in the terminal; thus, the user can quickly and easily set the privacy mode for some content that is not wanted to be seen, and at the same time ensure that the desktop icon corresponding to the content is not perceived by other users. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the sixth aspect of the present application further provides a terminal, at least one processor, and a memory communicatively coupled to the at least one processor; wherein the memory stores Executing instructions executed by the at least one processor, the instructions being executed by the at least one processor, to enable the at least one processor to: obtain operation information of a user in an edge touch area of the terminal; The operation information of the edge touch area of the terminal is displayed, and the hidden desktop icon in the terminal is displayed through the screen of the terminal.
  • the embodiment of the present application obtains the operation information of the user in the edge touch area of the terminal, and then according to the user's touch area in the edge of the terminal
  • the operation information displays a hidden desktop icon in the terminal through a screen of the terminal.
  • the user after the user sets the privacy mode for some content that is not to be seen, the user does not need to change the operation mode of the terminal, and does not need to input the unlocking password cumbersomely, and only needs to be simple in the edge touch area of the terminal.
  • the operation of the terminal will display the desktop icons of the hidden content of the user that the user does not want to be seen through the screen, and the operation is simple and difficult to be perceived. Therefore, the embodiment of the present application solves the problem in the prior art that the user does not want to be seen.
  • the content to the content setting privacy mode leads to low operational efficiency, easy operation, and improved operational efficiency.
  • the embodiment of the present application further provides a non-transitory computer readable storage medium, where the non-transitory computer readable storage medium stores computer executable instructions, the computer executable The instruction is used to: obtain operation information of the user for the edge touch area of the terminal; and hide the specified desktop icon according to the operation information of the edge touch area of the terminal.
  • the technical solution of the foregoing technical solution has the following beneficial effects: in the embodiment of the present application, the operation information of the edge touch area of the user is obtained, and then the operation information of the edge touch area of the user is used according to the user , hides the specified desktop icon.
  • the embodiment of the present application when the user sets a privacy mode for content that is not to be seen, the user only needs to perform a simple operation on the edge touch area in the terminal, and the terminal will correspond to the content that the user does not want to be seen.
  • the desktop icon is hidden in the terminal; thus, the user can quickly and easily set the privacy mode for some content that is not wanted to be seen, and at the same time ensure that the desktop icon corresponding to the content is not perceived by other users. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • an embodiment of the present application further provides a non-transitory computer readable storage medium, where the non-transitory computer readable storage medium stores computer executable instructions, the computer executable The command is used to: obtain operation information of the user in the edge touch area of the terminal; and display the hidden desktop icon in the terminal through the screen of the terminal according to the operation information of the user in the edge touch area of the terminal.
  • the embodiment of the present application obtains the operation information of the user in the edge touch area of the terminal, and then according to the user's touch area in the edge of the terminal
  • the operation information displays a hidden desktop icon in the terminal through a screen of the terminal.
  • the embodiment of the present application when the user is not wanting to be seen, After setting the privacy mode, the user does not need to change the operation mode of the terminal, and does not need to input the unlock password cumbersomely. It only needs to perform simple operations on the edge touch area of the terminal, and the terminal will display these users hidden in the terminal through the screen.
  • the desktop icon of the content that you don't want to be seen is easy to operate and not easily noticeable. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the embodiment of the present application further provides a computer program product, the computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising a program
  • the instructions when executed by a computer, cause the computer to perform the methods of the first, third, fifth, and seventh aspects.
  • the technical solution of the foregoing technical solution has the following beneficial effects: in the embodiment of the present application, the operation information of the edge touch area of the user is obtained, and then the operation information of the edge touch area of the user is used according to the user , hides the specified desktop icon.
  • the embodiment of the present application when the user sets a privacy mode for content that is not to be seen, the user only needs to perform a simple operation on the edge touch area in the terminal, and the terminal will correspond to the content that the user does not want to be seen.
  • the desktop icon is hidden in the terminal; thus, the user can quickly and easily set the privacy mode for some content that is not wanted to be seen, and at the same time ensure that the desktop icon corresponding to the content is not perceived by other users. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the tenth aspect of the present application further provides a computer program product, the computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising a program
  • the instructions when executed by the computer, cause the computer to perform the methods of the second, fourth, sixth, and eighth aspects.
  • the embodiment of the present application obtains the operation information of the user in the edge touch area of the terminal, and then according to the user's touch area in the edge of the terminal
  • the operation information displays a hidden desktop icon in the terminal through a screen of the terminal.
  • the embodiment of the present application after the user sets the privacy mode for some content that is not to be seen, the user does not need to change the operation mode of the terminal, and does not need to input the unlocking password cumbersomely, and only needs to be simple in the edge touch area of the terminal.
  • the operation of the terminal will display the desktop icons of the hidden content of the user that the user does not want to be seen through the screen, and the operation is simple and difficult to be perceived. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • Embodiment 1 is a schematic flowchart of Embodiment 1 of a method for controlling a terminal provided by an embodiment of the present application;
  • Embodiment 2 is a schematic flowchart of Embodiment 2 of a method for controlling a terminal provided by an embodiment of the present application;
  • Embodiment 3 is a schematic flowchart of Embodiment 3 of a method for controlling a terminal provided by an embodiment of the present application;
  • Embodiment 1 of a terminal provided by an embodiment of the present application
  • FIG. 5 is a schematic structural diagram of Embodiment 2 of a terminal provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of hardware of a terminal for performing a method for controlling a terminal according to an embodiment of the present disclosure
  • FIG. 7 is a schematic structural diagram of hardware of a terminal for controlling a terminal according to an embodiment of the present disclosure.
  • the word “if” as used herein may be interpreted as “when” or “when” or “in response to a determination” or “in response to Detection”.
  • the phrase “if determined” or “if detected (conditions or events stated)” may be interpreted as “when determined” or “in response to determination” or “when detected (stated condition or event) “Time” or “in response to a test (condition or event stated)”.
  • the embodiment of the present application provides a method for controlling a terminal.
  • FIG. 1 it is a schematic flowchart of Embodiment 1 of a method for controlling a terminal provided by an embodiment of the present application, as shown in FIG. 1 . As shown, the method includes the following steps S101 to S102.
  • the terminal acquires operation information of the user for the edge touch area of the terminal, so as to determine whether the specified desktop icon can be hidden according to the operation information.
  • terminals involved in the embodiments of the present application may include, but are not limited to, a personal computer (PC), a personal digital assistant (PDA), a wireless handheld device, a tablet computer, and a tablet computer.
  • PC personal computer
  • PDA personal digital assistant
  • Mobile phones MP3 players, MP4 players, etc.
  • edge touch provides touch input through the edge or the edge of the terminal, and tracks the tapping, sliding or pressing of the finger on the edge of the terminal to control the mobile phone.
  • the edge touch area of the terminal may be an area that the user's thumb can reach on the side of the terminal when the user naturally holds the terminal, and the other side of the terminal is the other four sides except the front and the back.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the edge touch area of the terminal can be implemented by using a physical button, a virtual button, a sensor, or a screen.
  • the edge touch area of the terminal can be implemented by using the edge screen of the curved screen.
  • the capacitance of the contact changes, so that the frequency of the oscillator connected to the capacitor changes, and the touch position can be determined by measuring the frequency change of the oscillator. Further, operation information of the user in the edge touch area of the terminal can be acquired.
  • its edge touch area can be implemented using physical buttons, virtual buttons, or sensors. If there is a physical button for adjusting the volume on the edge of the terminal, the physical button for adjusting the volume in the terminal is taken as an example. When the user presses the physical button for adjusting the volume, the terminal obtains that the user is pressed to increase the volume.
  • the button is pressed on the button for adjusting the volume to obtain the operation information of the user in the touch area of the edge of the terminal; if there is a virtual button with a certain function on the edge of the terminal, the virtual button on the terminal is For example, when the virtual button is a capacitive virtual button, the terminal determines the virtual button on which the user touches by the capacitance of the capacitive virtual button. Specifically, when the user touches the capacitive virtual button, the finger and the capacitive virtual The electrode piece in the button forms a capacitance, and the terminal determines the position touched by the user by detecting the change of the capacitance, and can determine which virtual button the user touches, thereby acquiring the user's edge touch area of the terminal.
  • Operation information if there is a sensor with a certain function on the edge of the terminal, taking the sensor on the terminal as an example, and the sensor is a pressure sensor, when the user presses the pressure sensor, a semiconductor deformation pressure is formed on the surface of the sheet of the pressure sensor, By pressing to deform the thin skin to produce a piezoelectric impedance effect The change is converted into an electrical signal, and after the terminal obtains the electrical signal, it can determine which pressure sensor is pressed by the user, or at which position on the pressure sensor, to determine which function of the pressure sensor is pressed by the user. Further, operation information of the user in the edge touch area of the terminal can be acquired. Further, the sensor having a certain function on the edge of the terminal may also be a light sensor.
  • the operation information of the edge touch area of the terminal is obtained by the user, and the method includes: acquiring operation information related to the edge touch area of the terminal performed by the user on the terminal, and/or acquiring the user at the terminal Operational information on the edge touch area.
  • the first type: obtaining operation information related to the edge touch area of the terminal performed by the user on the terminal may include, but is not limited to, monitoring whether the desktop icon on the terminal is dragged to the edge touch area of the terminal.
  • whether the desktop icon on the terminal is dragged to the edge touch area of the terminal is used to determine whether the specified desktop icon can be hidden.
  • the terminal can monitor the desktop icon that is dragged to the edge touch area of the terminal, and the desktop icon that is dragged to the edge touch area of the terminal is the designated desktop icon.
  • the terminal For example, if the terminal monitors the WeChat desktop icon and drags it to the edge touch area of the terminal, the terminal considers that the specified desktop icon is the WeChat desktop icon; if the terminal monitors the microblog desktop icon is dragged to the terminal by the user The edge touch area, the terminal thinks that the designated desktop icon is the desktop icon of Weibo; if the terminal monitors the WeChat desktop icon and the microblog desktop icon are dragged by the user to the edge touch area of the terminal, the terminal then The specified desktop icon is the desktop icon of WeChat and the desktop icon of Weibo.
  • the second type of operation information obtained by the user on the edge touch area of the terminal may include, but is not limited to, detecting operation information performed by the user on the edge touch area of the terminal, and the user is in the edge touch area of the terminal.
  • the operation information is compared with the specified operation information of the preset hidden desktop icon, so that it can be determined whether the operation information of the user in the edge touch area of the terminal is the specified operation information for hiding the specified desktop icon.
  • detecting whether the operation information of the user in the edge touch area of the terminal is the specified operation information for hiding the specified desktop icon is to determine whether to hide the specified desktop icon.
  • the designated desktop icon in the terminal may be preset according to actual needs.
  • the user can preset a desktop icon corresponding to a file, a picture, a video, or an application currently in a running state or an open state as a specified desktop icon.
  • the specified desktop icon may include, but is not limited to, a desktop icon corresponding to the running application in the terminal, a desktop icon corresponding to the opened image in the terminal, a desktop icon corresponding to the file already opened in the terminal, and a terminal.
  • the terminal presets a desktop icon corresponding to a file, a picture, a video, or an application that is currently in an active state or an open state as a specified desktop icon.
  • the terminal detects that the user operates on the edge touch area of the terminal. And at this time, the terminal is running WeChat, the terminal thinks that the desktop icon of WeChat is the designated desktop icon.
  • the terminal may also preset a desktop icon corresponding to a file, a picture, a video, or an application in a hidden state or a privacy mode as a specified desktop icon.
  • the terminal does not consider whether the desktop icons corresponding to the files, pictures, videos, or applications in the hidden state or the privacy mode are in a running state or an open state, and the terminal considers these files in a hidden state or a privacy mode.
  • the desktop icon corresponding to the content such as a picture, video, or application is the specified desktop icon.
  • the desktop icon is a designated desktop icon.
  • the terminal has set WeChat, Weibo, and Zhiwei as privacy modes. Regardless of whether WeChat, Weibo, or knowing whether it is running, the terminal will consider WeChat, Weibo, and the corresponding WeChat desktop icon and Weibo desktop.
  • the icon, the known desktop icon is the specified desktop icon.
  • obtaining operation information of the user in the edge touch area of the terminal may include: acquiring operation information of the effective area of the user on the edge touch area of the terminal. Only the operation in the active area can achieve the purpose of hiding the specified desktop icon.
  • the operation information of the user in the edge touch area of the terminal may include, but is not limited to, operation information generated after the user performs a sliding operation on the edge touch area of the terminal; or the user touches the edge of the terminal.
  • the operation information generated after the click operation is performed; or the operation information generated by the user after the pressing operation in the edge touch area of the terminal.
  • the third type is to obtain operation information related to the edge touch area of the terminal performed by the user on the terminal, and obtain operation information performed by the user on the edge touch area of the terminal.
  • obtaining the operation information of the edge touch area of the terminal may also obtain the operation information related to the edge touch area of the terminal performed by the user on the terminal and the user performing the edge touch area on the edge of the terminal. Operational information.
  • the user operates by using the edge touch area of the terminal. To hide the specified desktop icon.
  • the terminal hiding the specified desktop icon includes: the specified desktop icon is not displayed in the terminal desktop, but the file, the picture, the video, or the application corresponding to the specified desktop icon is still stored in the terminal.
  • the user can still find the content corresponding to the hidden specified desktop icon through some complicated operations, such as using an application management menu, a setting menu, and the like.
  • the user can place the desktop icon corresponding to the content that they do not want to be seen into a privacy folder, and the privacy folder is not displayed in the desktop of the terminal.
  • the method for hiding the designated desktop icon according to the operation information of the edge touch area of the terminal may include, but is not limited to, the following two types.
  • the first type If the terminal monitors that the desktop icon on the terminal is dragged to the edge touch area of the terminal, the dragged desktop icon is hidden.
  • the terminal detects that the user drags the WeChat desktop icon to the edge touch area of the terminal, the terminal considers that the WeChat desktop icon is the designated desktop icon, and the terminal hides the WeChat desktop icon in the terminal.
  • the second type if the terminal detects that the operation information of the user in the edge touch area of the terminal is to hide the specified operation information of the specified desktop icon, the specified desktop icon is hidden.
  • the terminal detects that the operation information of the user in the edge touch area of the terminal is not the specified operation information of the specified desktop icon, the terminal does not hide the desktop icon, and maintains the display state of the specified desktop icon.
  • the terminal presets the specified operation information of the specified desktop icon, the operation information generated by the user sliding up in the edge touch area of the terminal is used. If the terminal detects that the operation information of the user on the edge touch area of the terminal is upward sliding, the terminal compares the obtained operation information with the preset operation information, and determines that the user slides upward in the edge touch area of the terminal.
  • the generated operation information is the specified operation information of the desktop icon of the hidden WeChat, and the terminal will display the desktop icon of WeChat. Hide it.
  • the terminal detects that the operation information of the user on the edge touch area of the terminal is sliding to the left, the terminal compares the obtained operation information with the preset operation information, and determines that the user performs the edge touch area of the terminal.
  • the operation information generated after sliding to the left is not the specified operation information of the desktop icon of the WeChat, and the desktop icon of the WeChat is not hidden, and the display state of the WeChat desktop icon is maintained.
  • the technical solution of the embodiment of the present application has the following beneficial effects: in the embodiment of the present application, the operation information of the edge touch area of the terminal is obtained by the user, and then the specified desktop is determined according to the operation information of the edge touch area of the terminal for the terminal.
  • the icon is hidden.
  • the embodiment of the present application when the user sets a privacy mode for content that is not to be seen, the user only needs to perform a simple operation on the edge touch area in the terminal, and the terminal will correspond to the content that the user does not want to be seen.
  • the desktop icon is hidden in the terminal; thus, the user can quickly and easily set the privacy mode for some content that is not wanted to be seen, and at the same time ensure that the desktop icon corresponding to the content is not perceived by other users. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the embodiment of the present application provides a method for controlling a terminal.
  • FIG. 2 it is a schematic flowchart of Embodiment 2 of a method for controlling a terminal according to an embodiment of the present application. As shown in FIG. 2, the method includes the following steps. S201 to S202.
  • the operation information of the user in the edge touch area of the terminal is obtained to determine whether the desktop icon hidden in the terminal can be displayed through the screen of the terminal according to the operation information.
  • terminals involved in the embodiments of the present application may include, but are not limited to, a personal computer (PC), a personal digital assistant (PDA), a wireless handheld device, a tablet computer, and a tablet computer.
  • PC personal computer
  • PDA personal digital assistant
  • Mobile phone MP3 player, MP4 player, etc.
  • the operation information of the user in the edge touch area of the terminal may include, but is not limited to, operation information generated after the user performs a sliding operation on the edge touch area of the terminal; or the user touches the edge of the terminal.
  • the operation information generated after the click operation is performed; or the operation information generated by the user after the pressing operation in the edge touch area of the terminal.
  • edge touch provides touch input through the edge or the edge of the terminal, and tracks the tapping, sliding or pressing of the finger on the edge of the terminal to control the mobile phone.
  • the edge touch area of the terminal may be an area that the user's thumb can reach on the side of the terminal when the user naturally holds the terminal, and the other side of the terminal is the other four sides except the front and the back.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the edge touch area of the terminal can be implemented by using a physical button, a virtual button, a sensor, or a screen.
  • the edge touch area of the terminal can be implemented by using the edge screen of the curved screen.
  • the capacitance of the contact changes, so that the frequency of the oscillator connected to the capacitor changes, and the touch position can be determined by measuring the frequency change of the oscillator. Further, operation information of the user in the edge touch area of the terminal can be acquired.
  • its edge touch area can be implemented using physical buttons, virtual buttons, or sensors. If there is a physical button for adjusting the volume on the edge of the terminal, the physical button for adjusting the volume in the terminal is taken as an example.
  • the terminal When the user presses the physical button for adjusting the volume, the terminal will obtain whether the user is pressed on the button for adjusting the volume or Pressing on the button for adjusting the low volume, thereby obtaining the operation information of the user in the touch area of the edge of the terminal; if there is a virtual button having a certain function on the edge of the terminal, taking the virtual button on the terminal as an example, and
  • the virtual button is a capacitive virtual button
  • the terminal determines the virtual button on which the user touches by the capacitance of the capacitive virtual button. Specifically, when the user touches the capacitive virtual button, the finger forms a capacitance with the electrode piece in the capacitive virtual button, and the terminal detects the capacitance.
  • the change of the user to determine the location of the user touch can determine which virtual button the user touches, and thus can obtain the operation information of the user in the edge touch area of the terminal; if there is a sensor with a certain function on the edge of the terminal, Taking the sensor on the terminal as an example, and when the sensor is a pressure sensor, when the user presses the pressure sensor, a semiconductor deformation pressure is formed on the surface of the sheet of the pressure sensor, and the piezoelectric skin is deformed by pressing to generate a piezoelectric impedance effect, so that the impedance is The change is converted into an electrical signal, and after the terminal obtains the electrical signal, it can determine which pressure sensor is pressed by the user, or at which position on the pressure sensor, to determine which function of the pressure sensor is pressed by the user, and then Able to get the user in the stated
  • the operation information of the edge region of the end of the touch may also be a light sensor.
  • the operation information of the user in the edge touch area of the terminal is obtained, that is, the operation information of the effective area of the user on the edge touch area of the terminal is obtained, and only the operation in the effective area can realize the screen display terminal through the terminal.
  • the purpose of hiding the desktop icon is obtained.
  • the effective area of the edge screen is the click or contact of the user's thumb when the user naturally holds the terminal.
  • the edge area of the screen is the click or contact of the user's thumb when the user naturally holds the terminal.
  • the effective area is a physical button for adjusting the volume
  • the effective area is a physical button for adjusting the volume
  • the effective area is the area where the virtual key is located
  • the effective area is the area where the sensor is located.
  • the user can perform the operation on the edge touch area of the terminal, and the terminal can display the hidden desktop icon in the terminal through the screen of the terminal.
  • the hidden desktop icon in the terminal includes: a desktop icon that is not displayed in the terminal desktop, and the file, the picture, the video, or the application corresponding to the desktop icon is still stored in the terminal.
  • the user can still find the content corresponding to the hidden desktop icon through some complicated operations, such as using an application management menu, a setting menu, and the like.
  • the hidden desktop icon in the terminal is displayed on the screen of the terminal, and specifically includes: detecting whether the operation information of the user in the edge touch area of the terminal is a hidden desktop icon in the display terminal. If the operation information of the user's edge touch area is detected, the specified operation information of the hidden desktop icon in the display terminal is displayed, and the hidden desktop icon in the terminal is displayed through the screen of the terminal.
  • the hidden desktop icon is not displayed, and the hidden state of the hidden desktop icon is maintained.
  • the specified operation information of the hidden desktop icon in the display terminal is used to determine whether the operation of the user in the effective area of the terminal can trigger the terminal to hide the desktop icon hidden in the screen display terminal.
  • the terminal acquires the operation information of the user in the edge touch area of the terminal, the user is determined to be at the edge touch area of the terminal. Whether the operation information is swiping up. If the operation information of the touch area in the edge of the terminal is upward, the terminal can display the hidden desktop icon through the screen of the terminal. On the other hand, if the operation information of the touch area in the edge of the terminal is not sliding upward, the terminal keeps the hidden state of the hidden desktop icon, and does not perform the operation of displaying the hidden desktop icon in the terminal.
  • the embodiment of the present application has the following beneficial effects: the embodiment of the present application
  • the operation information of the user in the edge touch area of the terminal is obtained, and then the hidden desktop icon in the terminal is displayed through the screen of the terminal according to the operation information of the touch area of the user at the edge of the terminal.
  • the user after the user sets the privacy mode for some content that is not to be seen, the user does not need to change the operation mode of the terminal, and does not need to input the unlocking password cumbersomely, and only needs to be simple in the edge touch area of the terminal.
  • the operation of the terminal will display the desktop icons of the hidden content of the user that the user does not want to be seen through the screen, and the operation is simple and difficult to be perceived. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the embodiment of the present application further provides a specific implementation manner of implementing the foregoing method embodiment. Please refer to FIG. 3, which is provided by the embodiment of the present application. As shown in FIG. 3, the method may include: S301 to S305.
  • the operation information of the user in the edge touch area of the terminal is not the specified operation information of the hidden desktop icon in the display terminal, the state of the hidden desktop icon in the terminal is maintained, and the hidden desktop in the terminal is not executed through the screen of the terminal. Icon operation.
  • the method may further include:
  • the operation information of the user in the edge touch area of the terminal is detected.
  • the operation information of the user in the touch area of the edge of the terminal is a specified operation of hiding the specified desktop icon, the specified desktop icon is hidden.
  • the technical solution of the embodiment of the present application has the following beneficial effects: in the embodiment of the present application, by monitoring whether the desktop icon on the terminal is dragged to the edge touch area of the terminal, if the desktop icon on the terminal is detected, the icon is dragged to the terminal.
  • the edge touch area hides the dragged desktop icon; by detecting the user's operation information on the edge touch area of the terminal, if the user's operation information on the edge touch area of the terminal is a hidden desktop icon in the display terminal.
  • the specified operation information is displayed through the terminal's screen to display the hidden desktop icon in the terminal.
  • the desktop icon corresponding to the content that the user does not want to be seen may be hidden in the terminal by a simple operation performed on the edge touch area of the terminal, or the content that has been hidden in the terminal may be corresponding.
  • the desktop icon is displayed through the screen of the terminal; therefore, the user does not need to change the operating mode of the terminal, or use cumbersome settings or enter the unlocking password, whether setting the privacy mode or opening the hidden content for the content that is not desired to be seen.
  • the operation is simple and not easy to be perceived; further, the problem of low operational efficiency caused by setting a privacy mode for content that the user does not want to be seen in the prior art is solved, and the operation efficiency is improved.
  • the embodiment of the present application further provides an apparatus embodiment for implementing the steps and methods in the foregoing method embodiments.
  • the terminal provided by the embodiment of the present application is provided. As shown in FIG. 4, the terminal includes an obtaining module 41 and a hiding module 42.
  • the obtaining module 41 is configured to obtain operation information of the user for the edge touch area of the terminal.
  • the hiding module 42 is configured to hide the specified desktop icon according to the operation information of the edge touch area of the terminal.
  • the obtaining module 41 is specifically configured to: monitor whether the desktop icon on the terminal is dragged to the edge touch area of the terminal; the hiding module 42 is specifically configured to: if the desktop icon on the terminal is detected, the icon is dragged to the terminal The edge touch area hides the dragged desktop icon.
  • the obtaining module 41 is further configured to: detect whether the operation information of the user in the edge touch area of the terminal is specified operation information for hiding the specified desktop icon; the hiding module 42 is further configured to: if the user is detected The operation information of the edge touch area of the terminal is to hide the specified operation information of the specified desktop icon, and hide the specified desktop icon.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the operation information of the user in the edge touch area of the terminal includes: sliding operation information of the user in the edge touch area of the terminal; or click operation information of the user in the edge touch area of the terminal; or, the user is at the terminal The pressing operation information of the edge touch area.
  • the embodiment of the present application obtains the operation information of the edge touch area of the user by the acquiring module in the terminal, and then the hidden module in the terminal touches the edge of the terminal according to the user.
  • the operation information of the area hides the specified desktop icon.
  • the embodiment of the present application when the user sets a privacy mode for content that is not to be seen, the user only needs to perform a simple operation on the edge touch area in the terminal, and the terminal will correspond to the content that the user does not want to be seen.
  • the desktop icon is hidden in the terminal; thus, the user can quickly and easily set the privacy mode for some content that is not wanted to be seen, and at the same time ensure that the desktop icon corresponding to the content is not perceived by other users. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the embodiment of the present application further provides an apparatus embodiment for implementing the steps and methods in the foregoing method embodiments.
  • the terminal provided by the embodiment of the present application is provided.
  • the schematic diagram of the structure of Embodiment 2 is as shown in FIG. 5, and the terminal includes: an obtaining module 51 and a display module 52.
  • the obtaining module 51 is configured to obtain operation information of the user in the edge touch area of the terminal.
  • the display module 52 is configured to display the hidden desktop icon in the terminal through the screen of the terminal according to the operation information of the user in the edge touch area of the terminal.
  • the display module 52 is configured to: detect whether the operation information of the user in the edge touch area of the terminal is the specified operation information of the hidden desktop icon in the display terminal; if the operation information of the touch area in the edge of the user is detected, the operation information is displayed.
  • the specified operation information of the hidden desktop icon in the terminal, and the hidden desktop icon in the terminal is displayed through the screen of the terminal.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the operation information of the user in the edge touch area of the terminal includes: sliding operation information of the user in the edge touch area of the terminal; or click operation information of the user in the edge touch area of the terminal; or, the user is at the terminal The pressing operation information of the edge touch area.
  • the embodiment of the present application obtains the operation information of the user in the edge touch area of the terminal by using the obtaining module in the terminal, and then the display module in the terminal touches the edge of the terminal according to the user.
  • the operation information of the area displays the hidden desktop icons in the terminal through the screen of the terminal.
  • the terminal will display the desktop of the hidden content of these users that the user does not want to see through the screen.
  • the icon is easy to operate and is not easily noticeable. Therefore, the embodiment of the present application solves the problem that the operation efficiency is low in the prior art for setting the privacy mode for the content that the user does not want to be seen, and the operation is simple and the operation efficiency is improved.
  • the embodiment of the present application provides a non-transitory computer storage medium storing computer executable instructions, which can execute the control method in Embodiment 1 or 3 above.
  • the embodiment of the present application provides a non-transitory computer storage medium storing computer executable instructions, which can execute the control method in Embodiment 2 or 3 above.
  • FIG. 6 is a schematic structural diagram of a hardware of a terminal for controlling a method for performing a terminal according to an embodiment of the present disclosure.
  • the terminal includes: one or more processors 610 and a memory 620, and one processor 610 in FIG.
  • the terminal may further include: an input device 630 and an output device 640.
  • the processor 610, the memory 620, the input device 630, and the output device 640 may be connected by a bus or other means, as exemplified by a bus connection in FIG.
  • the memory 620 is a non-transitory computer readable storage medium for storing non-transitory software programs, non-transitory computer executable programs, and modules.
  • the processor 610 performs various functional applications and data processing of the terminal by running non-transitory software programs, instructions, and modules stored in the memory 620, that is, the processing method of the foregoing method embodiments.
  • the memory 620 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data or the like.
  • memory 620 can include high speed random access memory, and can also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage. Device.
  • memory 620 can optionally include memory remotely located relative to processor 610, which can be connected to the processing device over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Input device 630 can receive input digital or character information and generate a signal input.
  • the output device 640 can include a display device such as a display screen.
  • the one or more modules are stored in the memory 620, and when executed by the one or more processors 610, performing: acquiring operation information of a user in an edge touch area of the terminal; The operation information of the edge touch area of the terminal is displayed, and the hidden desktop icon in the terminal is displayed through the screen of the terminal.
  • the acquiring, by the user, the operation information of the edge touch area of the terminal includes: monitoring whether the desktop icon on the terminal is dragged to the edge touch area of the terminal; The specified desktop icon is hidden according to the operation information of the edge touch area of the terminal, including: if the desktop icon on the terminal is detected to be dragged to the edge touch area of the terminal, the device will be dragged The desktop icon is hidden.
  • the obtaining, by the user, the operation information of the edge touch area of the terminal includes: detecting whether the operation information of the user in the edge touch area of the terminal is to hide the specified desktop icon. Specifying the operation information; hiding the specified desktop icon according to the operation information of the edge touch area of the terminal, including: detecting that the operation information of the user in the edge touch area of the terminal is The specified operation information of the specified desktop icon is hidden, and the specified desktop icon is hidden.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the operation information of the user in the edge touch area of the terminal includes: operation information generated after the user performs a sliding operation on the edge touch area of the terminal; or the user is at the terminal The operation information generated after the click operation is performed on the edge touch area; or the operation letter generated after the user performs the pressing operation on the edge touch area of the terminal interest.
  • the above product can perform the method provided by Embodiment 1 or 3 of the present application, and has the corresponding functional modules and beneficial effects of the execution method.
  • Embodiment 1 or 3 of the present application For technical details that are not described in detail in this embodiment, reference may be made to the method provided in Embodiment 1 or 3 of the present application.
  • FIG. 7 is a schematic structural diagram of a hardware of a terminal for controlling a terminal according to an embodiment of the present disclosure. As shown in FIG. 7, the device includes:
  • One or more processors 710 and memory 720, one processor 610 is exemplified in FIG.
  • the device may also include an input device 730 and an output device 740.
  • the processor 710, the memory 720, the input device 730, and the output device 740 may be connected by a bus or other means, as exemplified by a bus connection in FIG.
  • the memory 720 as a non-transitory computer readable storage medium, can be used to store non-transitory software programs, non-transitory computer executable programs, and modules.
  • the processor 710 executes various functional applications and data processing of the terminal by running non-transitory software programs, instructions, and modules stored in the memory 720, that is, the processing method of the foregoing method embodiments.
  • the memory 720 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data or the like.
  • memory 720 can include high speed random access memory, and can also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device.
  • memory 720 can optionally include memory remotely located relative to processor 710, which can be connected to the processing device over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Input device 730 can receive input digital or character information and generate a signal input.
  • the output device 740 can include a display device such as a display screen.
  • the one or more modules are stored in the memory 720, and when executed by the one or more processors 710, performing: acquiring a user's operation in an edge touch area of the terminal The information is displayed on the edge of the terminal by the user, and the hidden desktop icon in the terminal is displayed through the screen of the terminal.
  • displaying the hidden desktop icon in the terminal by using the operation information of the user in the edge touch area of the terminal including: detecting the user in the Whether the operation information of the edge touch area of the terminal is the specified operation information for displaying the hidden desktop icon in the terminal; if the operation information of the user in the edge touch area of the terminal is detected, the terminal is displayed.
  • the specified operation information of the hidden desktop icon displays the hidden desktop icon in the terminal through the screen of the terminal.
  • the edge touch area of the terminal includes an edge touch area of at least one side of the terminal.
  • the operation information of the user in the edge touch area of the terminal includes: operation information generated after the user performs a sliding operation on the edge touch area of the terminal; or the user is at the terminal The operation information generated after the click operation is performed on the edge touch area; or the operation information generated after the user performs the pressing operation on the edge touch area of the terminal.
  • Embodiment 2 or 3 of the present application can perform the methods provided in Embodiment 2 or 3 of the present application, and have the corresponding functional modules and beneficial effects of the execution method.
  • the terminal of the embodiment of the present application exists in various forms, including but not limited to:
  • Mobile communication devices These devices are characterized by mobile communication functions and are mainly aimed at providing voice and data communication.
  • Such terminals include: smart phones (such as iPhone), multimedia phones, functional phones, and low-end phones.
  • Ultra-mobile PC devices These devices belong to the category of personal computers, have computing and processing functions, and generally have mobile Internet access.
  • Such terminals include: PDAs, MIDs, and UMPC devices, such as the iPad.
  • Portable entertainment devices These devices can display and play multimedia content. Such devices include: audio, video players (such as iPod), handheld game consoles, e-books, and smart devices. Toys and portable car navigation devices.
  • the server A device that provides computing services.
  • the server consists of a processor, hard disk, memory, system bus, etc.
  • the server is similar to a general-purpose computer architecture, but because of the need to provide highly reliable services, processing power, stability, and reliability. Security, scalability, manageability and other aspects are high.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • the method for controlling the terminal obtaineds operation information of the edge touch area of the user for the terminal; according to the edge touch area of the user for the terminal Operation information, hiding the specified desktop icon.
  • the user sets the privacy mode for content that is not to be seen, the user only needs to perform simple operations on the edge touch area in the terminal, and the terminal will display the desktop icon corresponding to the content that the user does not want to be seen at the terminal.
  • Hidden in the middle thus, the user can quickly and easily set a privacy mode for some content that is not desired to be seen, and the operation is simple and the operation efficiency is improved.
  • the operation information of the user in the edge touch area of the terminal is obtained.
  • the hidden desktop icon in the terminal is displayed through the screen of the terminal. It can be realized that after the user sets the privacy mode for some content that is not to be seen, the user does not need to change the operation mode of the terminal, and does not need to input the unlock password cumbersomely, and only needs to perform simple operation in the edge touch area of the terminal.
  • the desktop icon of the content that the user does not want to be seen hidden in the terminal is displayed on the screen, which is easy to operate and improves the operation efficiency.

Abstract

一种终端的控制方法及终端,该方法包括:获取用户针对终端的边缘触控区域的操作信息(S101),根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏(S102)。提供的技术方案用以解决现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。

Description

一种终端的控制方法及终端
交叉引用
本申请要求在2016年3月25日提交中国专利局、申请号为2016101802579、发明名称为“一种终端的控制方法及终端”的中国专利申请的优先权,该申请的全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种终端的控制方法及终端。
背景技术
当前主流终端都采用触摸屏,用户可以通过对触摸屏上的功能按键进行操作以实现对终端的控制。用户使用终端时,终端中有些文件、图片、视频或者应用等内容不想让其他用户看到,用户需要为这些不想被看到的内容设置访问权限,从而保护自己的隐私。
在实现本申请过程中,发明人发现现有技术中至少存在如下问题:现有技术中,用户为这些不想被看到的文件、图片、视频或者应用等内容设置访问权限,一般是通过将这些用户不想被看到的内容进行逐一加密或为终端设置访客模式实现的;而通过上述手段为这些用户不想被看到的内容设置隐私模式后,访问这些用户不想被看到的内容时,需要输入密码或者通过设置改变终端的运行模式,操作过程繁琐。因此,现有技术中为用户不想被看到的内容设置隐私模式会导致操作效率较低。
发明内容
有鉴于此,本申请提供了一种终端的控制方法及终端,用以解 决现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题。
为实现上述发明目的,第一方面,本申请实施例提供了一种终端的控制方法,所述方法包括:获取用户针对终端的边缘触控区域的操作信息;根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,获取用户针对终端的边缘触控区域的操作信息,包括:监测所述终端上的桌面图标是否被拖动至所述终端的边缘触控区域;根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏,包括:若监测到所述终端上的桌面图标被拖动至所述终端的边缘触控区域,将被拖动的所述桌面图标进行隐藏。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,获取用户针对终端的边缘触控区域的操作信息,包括:检测所述用户在所述终端的边缘触控区域的操作信息是否为隐藏所述指定的桌面图标的指定操作信息;根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏,包括:若检测到所述用户在所述终端的边缘触控区域的操作信息是隐藏所述指定的桌面图标的指定操作信息,将所述指定的桌面图标进行隐藏。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述用户在所述终端的边缘触控区域的操作信息,包括:用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,用户在终端的边缘触控 区域进行按压操作后产生的操作信息。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例中,通过获取用户针对终端的边缘触控区域的操作信息,然后根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式时,只需要针对终端中的边缘触控区域进行简单操作,终端就会将这些用户不想被看到的内容所对应的桌面图标在终端中进行隐藏;从而,用户可以简单快捷的为一些不想被看到的内容设置隐私模式,同时保证了这些内容所对应的桌面图标不会被其他用户察觉到。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第二方面,本申请实施例还提供了一种终端的控制方法,所述方法包括:获取用户在终端的边缘触控区域的操作信息;根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标,包括:检测所述用户在所述终端的边缘触控区域的操作信息是否为显示所述终端中隐藏的桌面图标的指定操作信息;若检测到所述用户在所述终端的边缘触控区域的操作信息是显示所述终端中隐藏的桌面图标的指定操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
如上所述的方面和任一可能的实现方式,进一步提供一种实现 方式,所述用户在所述终端的边缘触控区域的操作信息,包括:用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,用户在终端的边缘触控区域进行按压操作后产生的操作信息。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例通过获取所述用户在所述终端的边缘触控区域的操作信息,然后根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式后,用户不需要去改变终端的运行模式,也不用繁琐的输入解锁密码,只需要在终端的边缘触控区域进行简单的操作,终端就会通过屏幕显示终端中隐藏的这些用户不想被看到的内容的桌面图标,操作简便,同时不容易被人察觉。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第三方面,本申请实施例提供了一种终端,包括:获取模块,用于获取用户针对所述终端的边缘触控区域的操作信息;隐藏模块,用于根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述获取模块,具体用于:监测所述终端上的桌面图标是否被拖动至所述终端的边缘触控区域;所述隐藏模块,具体用于:若监测到所述终端上的桌面图标被拖动至所述终端的边缘触控区域,将被拖动的所述桌面图标进行隐藏。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述获取模块,具体用于:检测所述用户在所述终端的边缘触控区域的操作信息是否为隐藏所述指定的桌面图标的指定操作信息;所述隐藏模块, 具体用于:若检测到所述用户在所述终端的边缘触控区域的操作信息是隐藏所述指定的桌面图标的指定操作信息,将所述指定的桌面图标进行隐藏。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述用户在所述终端的边缘触控区域的操作信息,包括:用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,用户在终端的边缘触控区域进行按压操作后产生的操作信息。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例通过终端中的获取模块获取用户针对终端的边缘触控区域的操作信息,然后,终端中的隐藏模块根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式时,只需要针对终端中的边缘触控区域进行简单操作,终端就会将这些用户不想被看到的内容所对应的桌面图标在终端中进行隐藏;从而,用户可以简单快捷的为一些不想被看到的内容设置隐私模式,同时保证了这些内容所对应的桌面图标不会被其他用户察觉到。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第四方面,本申请实施例还提供了一种终端,包括:获取模块,用于获取所述用户在所述终端的边缘触控区域的操作信息;显示模块,用于根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述显示模块,具体用于:检测所述用户在所述终端的边缘触控区域 的操作信息是否为显示所述终端中隐藏的桌面图标的指定操作信息;若检测到所述用户在所述终端的边缘触控区域的操作信息是显示所述终端中隐藏的桌面图标的指定操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述用户在所述终端的边缘触控区域的操作信息,包括:用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,用户在终端的边缘触控区域进行按压操作后产生的操作信息。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例通过终端中的获取模块获取所述用户在所述终端的边缘触控区域的操作信息,然后,终端中的显示模块根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式后,用户不需要去改变终端的运行模式,也不用繁琐的输入解锁密码,只需要在终端的边缘触控区域进行简单的操作,终端就会通过屏幕显示终端中隐藏的这些用户不想被看到的内容的桌面图标,操作简便,同时不容易被人察觉。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第五方面,本申请实施例还提供了一种终端,至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取用户针对终 端的边缘触控区域的操作信息;根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例中,通过获取用户针对终端的边缘触控区域的操作信息,然后根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式时,只需要针对终端中的边缘触控区域进行简单操作,终端就会将这些用户不想被看到的内容所对应的桌面图标在终端中进行隐藏;从而,用户可以简单快捷的为一些不想被看到的内容设置隐私模式,同时保证了这些内容所对应的桌面图标不会被其他用户察觉到。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第六方面,本申请实施例还提供了一种终端,至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取用户在终端的边缘触控区域的操作信息;根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例通过获取所述用户在所述终端的边缘触控区域的操作信息,然后根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式后,用户不需要去改变终端的运行模式,也不用繁琐的输入解锁密码,只需要在终端的边缘触控区域进行简单的操作,终端就会通过屏幕显示终端中隐藏的这些用户不想被看到的内容的桌面图标,操作简便,同时不容易被人察觉。因此,本申请实施例解决了现有技术中为用户不想被看 到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第七方面,本申请实施例还提供了一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于:获取用户针对终端的边缘触控区域的操作信息;根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例中,通过获取用户针对终端的边缘触控区域的操作信息,然后根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式时,只需要针对终端中的边缘触控区域进行简单操作,终端就会将这些用户不想被看到的内容所对应的桌面图标在终端中进行隐藏;从而,用户可以简单快捷的为一些不想被看到的内容设置隐私模式,同时保证了这些内容所对应的桌面图标不会被其他用户察觉到。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第八方面,本申请实施例还提供了一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于:获取用户在终端的边缘触控区域的操作信息;根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例通过获取所述用户在所述终端的边缘触控区域的操作信息,然后根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。本申请实施例中,当用户为一些不想被看到的内 容设置隐私模式后,用户不需要去改变终端的运行模式,也不用繁琐的输入解锁密码,只需要在终端的边缘触控区域进行简单的操作,终端就会通过屏幕显示终端中隐藏的这些用户不想被看到的内容的桌面图标,操作简便,同时不容易被人察觉。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第九方面,本申请实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行第一方面、第三方面、第五方面以及第七方面所述的方法。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例中,通过获取用户针对终端的边缘触控区域的操作信息,然后根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式时,只需要针对终端中的边缘触控区域进行简单操作,终端就会将这些用户不想被看到的内容所对应的桌面图标在终端中进行隐藏;从而,用户可以简单快捷的为一些不想被看到的内容设置隐私模式,同时保证了这些内容所对应的桌面图标不会被其他用户察觉到。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
为实现上述发明目的,第十方面,本申请实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行第二方面、第四方面、第六方面以及第八方面所述的方法。
上述技术方案中的一个技术方案具有如下有益效果:本申请实施例通过获取所述用户在所述终端的边缘触控区域的操作信息,然后根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式后,用户不需要去改变终端的运行模式,也不用繁琐的输入解锁密码,只需要在终端的边缘触控区域进行简单的操作,终端就会通过屏幕显示终端中隐藏的这些用户不想被看到的内容的桌面图标,操作简便,同时不容易被人察觉。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
附图说明
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定,附图中具有相同参考数字标号的元件表示为类似的元件,除非有特别申明,附图中的图不构成比例限制。
图1是本申请实施例所提供的终端的控制方法的实施例一的流程示意图;
图2是本申请实施例所提供的终端的控制方法的实施例二的流程示意图;
图3是本申请实施例所提供的终端的控制方法的实施例三的流程示意图;
图4是本申请实施例所提供的终端的实施例一的结构示意图;
图5是本申请实施例所提供的终端的实施例二的结构示意图;
图6为本申请实施例提供的执行终端的控制方法的终端的硬件结构示意图;
图7为本申请实施例提供的执行终端的控制方法的终端的硬件结构示意图。
具体实施方式
以下结合附图对本申请的优选实施例进行说明,应当理解,此处所描述的优选实施例仅用于说明和解释本申请,并不用于限定本申请。
应当明确,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。
在本申请实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。在本申请实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。
应当理解,本文中使用的术语“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
取决于语境,如在此所使用的词语“如果”可以被解释成为“在......时”或“当......时”或“响应于确定”或“响应于检测”。类似地,取决于语境,短语“如果确定”或“如果检测(陈述的条件或事件)”可以被解释成为“当确定时”或“响应于确定”或“当检测(陈述的条件或事件)时”或“响应于检测(陈述的条件或事件)”。
实施例1
本申请实施例给出一种终端的控制方法,请参考图1,其为本申请实施例所提供的终端的控制方法的实施例1的流程示意图,如图1 所示,该方法包括以下步骤S101~S102。
S101,获取用户针对终端的边缘触控区域的操作信息。
具体的,终端获取用户针对终端的边缘触控区域的操作信息,是为了判断是否可以根据这些操作信息将指定的桌面图标进行隐藏。
需要说明的是,本申请实施例中所涉及的终端可以包括但不限于个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、无线手持设备、平板电脑(Tablet Computer)、手机、MP3播放器、MP4播放器等。
可以理解的是,边缘触控是通过终端边缘或边框提供触控输入,跟踪手指在终端边缘上的轻击、滑动或按压,实现对手机的控制。
终端的边缘触控区域可以为用户自然持握所述终端时,用户的拇指在终端的侧面能够达到的区域,终端的侧面是除所述正面和背面的其他四个侧面。
具体的,终端的边缘触控区域包括终端上至少一个侧面的边缘触控区域。
本申请实施例中,终端的边缘触控区域可以利用物理按键、虚拟按键、传感器或者屏幕实现。
例如,若终端使用了曲面屏幕,则终端的边缘触控区域可以利用曲面屏幕的边缘屏幕实现。以电容式触摸屏为例进行说明,当用户手指触摸在边缘触摸屏上时,触点的电容就会发生变化,使得与电容相连的振荡器频率发生变化,通过测量振荡器频率变化可以确定触摸位置,进而能够获取到用户在所述终端的边缘触控区域的操作信息。
或者,又例如,对于没有使用曲面屏幕的终端,其边缘触控区域可以利用物理按键、虚拟按键或者传感器实现。如果终端边缘上存在调节音量的物理按键,以终端中调节音量的物理按键为例进行说明,当用户手指按压调节音量的物理按键时,终端会获得用户是按压在了调高音量 的按键上还是按压在了调低音量的按键上,从而获取到用户在所述终端的边缘触控区域的操作信息;如果终端边缘上存在具有一定功能的虚拟按键,以终端上的虚拟按键为例,并且所述虚拟按键是电容式虚拟按键时,终端通过电容式虚拟按键的电容量来判断用户触摸在哪个虚拟按键上,具体的,用户接触到电容式虚拟按键时手指会与电容式虚拟按键中的电极片形成电容,终端通过侦测电容量的变化来确定用户触摸的位置就可以确定出用户触摸在了哪个虚拟按键上,进而能够获取到用户在所述终端的边缘触控区域的操作信息;如果终端边缘上存在具有一定功能的传感器,以终端上的传感器为例,并且所述传感器是压力传感器时,当用户按压到压力传感器时,在压力传感器的薄片表面形成半导体变形压力,通过按压使薄皮变形产生压电阻抗效果,使阻抗的变化转换成电信号,终端获得电信号后就可以确定出用户在哪个压力传感器上进行的按压,或在压力传感器上哪个位置进行的按压,从而确定用户对哪个功能的压力传感器进行的按压,进而能够获取到用户在所述终端的边缘触控区域的操作信息。进一步地,终端边缘上存在具有一定功能的传感器还可以为光感应器。
本申请实施例中,获取用户针对终端的边缘触控区域的操作信息,包括以下方法:获取用户在终端上进行的与终端的边缘触控区域相关的操作信息,和/或,获取用户在终端的边缘触控区域上进行的操作信息。
第一种:获取用户在终端上进行的与终端的边缘触控区域相关的操作信息可以包括但不限于:监测终端上的桌面图标是否被拖动至终端的边缘触控区域。
本申请实施例中,监测终端上的桌面图标是否被拖动至终端的边缘触控区域,是为了判断指定的桌面图标是否可以进行隐藏。
具体的,终端可以监测被拖动到终端的边缘触控区域的桌面图标具体是什么,这些被拖动到终端的边缘触控区域的桌面图标即为指定的桌面图标。
例如:终端监测到微信的桌面图标被用户拖动到终端的边缘触控区域,终端则认为指定的桌面图标即为微信的桌面图标;若终端监测到微博的桌面图标被用户拖动到终端的边缘触控区域,终端则认为指定的桌面图标即为微博的桌面图标;若终端监测到微信的桌面图标和微博的桌面图标都被用户拖动到终端的边缘触控区域,终端则认为指定的桌面图标即为微信的桌面图标和微博的桌面图标。
第二种:获取用户在终端的边缘触控区域上进行的操作信息可以包括但不限于:检测用户在终端的边缘触控区域上进行的操作信息,并将用户在终端的边缘触控区域的操作信息与预设的隐藏指定桌面图标的指定操作信息进行比对,从而可以判断用户在终端的边缘触控区域的操作信息是否为隐藏指定的桌面图标的指定操作信息。
本申请实施例中,检测用户在终端的边缘触控区域的操作信息是否为隐藏指定的桌面图标的指定操作信息,是为了判断是否对指定的桌面图标进行隐藏。
本申请实施例中,终端中的指定的桌面图标可以根据实际需要进行预先设定。
具体的,用户可以预设当前处于运行状态或打开状态的文件、图片、视频或者应用等内容对应的桌面图标为指定的桌面图标。例如,指定的桌面图标可以包括但不限于:终端中正在运行的应用所对应的桌面图标、终端中已经打开的图片所对应的桌面图标、终端中已经打开的文件所对应的桌面图标、终端中正在播放的视频所对应的桌面图标、终端中正在播放的音乐所对应的桌面图标。
举例说明,终端预设了当前处于运行状态或打开状态的文件、图片、视频或者应用等内容对应的桌面图标为指定的桌面图标,当终端检测到用户在终端的边缘触控区域进行了操作时,且此时终端正在运行微信,则终端认为微信的桌面图标即为指定桌面图标。
具体的,终端还可以预设处于隐藏状态或隐私模式的文件、图片、视频或者应用等内容对应的桌面图标为指定的桌面图标。在具体实施过程中,终端不考虑这些处于隐藏状态或隐私模式的文件、图片、视频或者应用等内容对应的桌面图标是否处于运行状态或打开状态,终端都认为这些处于隐藏状态或隐私模式的文件、图片、视频或者应用等内容对应的桌面图标是指定的桌面图标。
举例说明,若终端预设了处于隐藏状态或隐私模式的文件、图片、视频或者应用等内容对应的桌面图标为指定的桌面图标。终端已经将微信、微博、知乎设置为隐私模式,无论微信、微博、知乎是否处于运行状态,终端都会认为微信、微博、知乎所对应的微信的桌面图标、微博的桌面图标、知乎的桌面图标为指定的桌面图标。
本申请实施例中,获取用户在终端的边缘触控区域的操作信息,可以包括:获取用户在终端的边缘触控区域上的有效区域的操作信息。只有在有效区域中的操作才可以实现隐藏指定的桌面图标的目的。
本申请实施例中,用户在终端的边缘触控区域的操作信息可以包括但不限于:用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,用户在终端的边缘触控区域进行按压操作后产生的操作信息。
第三种:获取用户在终端上进行的与终端的边缘触控区域相关的操作信息,和,获取用户在终端的边缘触控区域上进行的操作信息。
本申请实施例中,获取针对终端的边缘触控区域的操作信息也可以同时获取用户在终端上进行的与终端的边缘触控区域相关的操作信息和用户在终端的边缘触控区域上进行的操作信息。
S102,根据用户针对终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
具体的,用户通过针对终端的边缘触控区域进行操作,就可 以将指定的桌面图标进行隐藏。
本申请实施例中,终端将指定的桌面图标进行隐藏包括:终端桌面中不显示指定的桌面图标,但终端中仍保存有指定的桌面图标所对应的文件、图片、视频或者应用等内容。然而,用户在使用终端的过程中,仍然可以通过一些复杂的操作,如利用应用管理菜单、设置菜单等,查找到隐藏后的指定的桌面图标所对应的内容。例如,用户可以将这些不想被看到的内容所对应的桌面图标放到一个隐私文件夹,而这个隐私文件夹并不会在终端的桌面中进行显示。
本申请实施例中,根据用户针对终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏的方法可以包括但不限于以下两种。
第一种:若终端监测到终端上的桌面图标被拖动至终端的边缘触控区域,将被拖动的桌面图标进行隐藏。
举例说明,若终端监测到用户将微信的桌面图标拖动到终端的边缘触控区域,终端认为微信的桌面图标为指定的桌面图标,终端将微信的桌面图标在终端中进行隐藏。
第二种:若终端检测到用户在终端的边缘触控区域的操作信息是隐藏指定的桌面图标的指定操作信息,将指定的桌面图标进行隐藏。
反之,若终端检测到用户在终端的边缘触控区域的操作信息不是隐藏指定的桌面图标的指定操作信息,不隐藏桌面图标,保持指定的桌面图标的显示状态。
举例说明,若终端的指定的桌面图标为微信的桌面图标,而且终端预设隐藏指定的桌面图标的指定操作信息是用户在终端的边缘触控区域进行向上滑动后产生的操作信息。若终端检测到用户在终端的边缘触控区域上的操作信息为向上滑动,终端将获取到的操作信息与预设的操作信息进行比对,确定用户在终端的边缘触控区域进行向上滑动后产生的操作信息是隐藏微信的桌面图标的指定操作信息,终端将微信的桌面图标 进行隐藏。反之,若终端检测到用户在终端的边缘触控区域上的操作信息为向左滑动,终端将获取到的操作信息与预设的操作信息进行比对,确定用户在终端的边缘触控区域进行向左滑动后产生的操作信息不是隐藏微信的桌面图标的指定操作信息,不隐藏微信的桌面图标,保持微信的桌面图标的显示状态。
本申请实施例的技术方案具有以下有益效果:本申请实施例中,通过获取用户针对终端的边缘触控区域的操作信息,然后根据用户针对终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式时,只需要针对终端中的边缘触控区域进行简单操作,终端就会将这些用户不想被看到的内容所对应的桌面图标在终端中进行隐藏;从而,用户可以简单快捷的为一些不想被看到的内容设置隐私模式,同时保证了这些内容所对应的桌面图标不会被其他用户察觉到。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
实施例2
本申请实施例给出一种终端的控制方法,请参考图2,其为本申请实施例所提供的终端的控制方法的实施例2的流程示意图,如图2所示,该方法包括以下步骤S201~S202。
S201,获取用户在终端的边缘触控区域的操作信息。
具体的,获取用户在终端的边缘触控区域的操作信息是为了判断是否可以根据这些操作信息通过终端的屏幕显示终端中隐藏的桌面图标。
需要说明的是,本申请实施例中所涉及的终端可以包括但不限于个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、无线手持设备、平板电脑(Tablet Computer)、手机、 MP3播放器、MP4播放器等。
本申请实施例中,用户在终端的边缘触控区域的操作信息可以包括但不限于:用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,用户在终端的边缘触控区域进行按压操作后产生的操作信息。
可以理解的是,边缘触控是通过终端边缘或边框提供触控输入,跟踪手指在终端边缘上的轻击、滑动或按压,实现对手机的控制。
终端的边缘触控区域可以为用户自然持握所述终端时,用户的拇指在终端的侧面能够达到的区域,终端的侧面是除所述正面和背面的其他四个侧面。
本申请实施例中,终端的边缘触控区域包括终端上至少一个侧面的边缘触控区域。
本申请实施例中,终端的边缘触控区域可以利用物理按键、虚拟按键、传感器或者屏幕实现。
例如,若终端使用了曲面屏幕,则终端的边缘触控区域可以利用曲面屏幕的边缘屏幕实现。以电容式触摸屏为例进行说明,当用户手指触摸在边缘触摸屏上时,触点的电容就会发生变化,使得与电容相连的振荡器频率发生变化,通过测量振荡器频率变化可以确定触摸位置,进而能够获取到用户在所述终端的边缘触控区域的操作信息。
或者,又例如,对于没有使用曲面屏幕的终端,其的边缘触控区域可以利用物理按键、虚拟按键或者传感器实现。如果终端边缘上存在调节音量的物理按键,以终端中调节音量的物理按键为例进行说明,当用户手指按压调节音量的物理按键时,终端会获得用户是按压在了调高音量的按键上还是按压在了调低音量的按键上,从而获取到用户在所述终端的边缘触控区域的操作信息;如果终端边缘上存在具有一定功能的虚拟按键,以终端上的虚拟按键为例,并且所述虚拟按键是电容式虚拟按键时, 终端通过电容式虚拟按键的电容量来判断用户触摸在哪个虚拟按键上,具体的,用户接触到电容式虚拟按键时手指会与电容式虚拟按键中的电极片形成电容,终端通过侦测电容量的变化来确定用户触摸的位置就可以确定出用户触摸在了哪个虚拟按键上,进而能够获取到用户在所述终端的边缘触控区域的操作信息;如果终端边缘上存在具有一定功能的传感器,以终端上的传感器为例,并且所述传感器是压力传感器时,当用户按压到压力传感器时,在压力传感器的薄片表面形成半导体变形压力,通过按压使薄皮变形产生压电阻抗效果,使阻抗的变化转换成电信号,终端获得电信号后就可以确定出用户在哪个压力传感器上进行的按压,或在压力传感器上哪个位置进行的按压,从而确定用户对哪个功能的压力传感器进行的按压,进而能够获取到用户在所述终端的边缘触控区域的操作信息。进一步地,终端边缘上存在具有一定功能的传感器还可以为光感应器。
具体的,获取用户在终端的边缘触控区域的操作信息,即获取用户在终端的边缘触控区域上的有效区域的操作信息,只有在有效区域中的操作才可以实现通过终端的屏幕显示终端中隐藏的桌面图标的目的。
例如,若终端使用了曲面屏幕,在终端的边缘触控区域利用曲面屏幕的边缘屏幕实现获取用户的操作信息时,边缘屏幕的有效区域为用户自然持握终端时用户拇指能够点击或接触到的屏幕边缘区域。例如,若终端边缘上存在调节音量的物理按键,在终端的边缘触控区域利用调节音量的物理按键实现获取用户的操作信息时,有效区域为调节音量的物理按键;若终端边缘上存在具有一定功能的虚拟按键,在终端的边缘触控区域利用虚拟按键实现获取用户的操作信息时,有效区域为虚拟按键所在的区域;若终端边缘上存在具有一定功能的传感器,在终端的边缘触控区域利用传感器实现获取用户的操作信息时,有效区域为传感器所在的区域。
S202,根据用户在终端的边缘触控区域的操作信息,通过终端的屏幕显示终端中隐藏的桌面图标。
具体的,用户通过在终端的边缘触控区域上进行操作,终端就能够通过终端的屏幕显示终端中隐藏的桌面图标。
本申请实施例中,终端中隐藏的桌面图标包括:终端桌面中未显示的桌面图标且终端中仍保存有这些桌面图标所对应的文件、图片、视频或者应用等内容。然而,用户在使用终端的过程中,仍然可以通过一些复杂的操作,如利用应用管理菜单、设置菜单等,查找到隐藏的桌面图标所对应的内容。
根据用户在终端的边缘触控区域的操作信息,通过终端的屏幕显示终端中隐藏的桌面图标,具体包括:检测用户在终端的边缘触控区域的操作信息是否为显示终端中隐藏的桌面图标的指定操作信息;若检测到用户在终端的边缘触控区域的操作信息是显示终端中隐藏的桌面图标的指定操作信息,通过终端的屏幕显示终端中隐藏的桌面图标。
反之,若检测到用户在终端的边缘触控区域的操作信息不是显示终端中隐藏的桌面图标的指定操作信息,不显示隐藏的桌面图标,保持隐藏的桌面图标的隐藏状态。
具体的,显示终端中隐藏的桌面图标的指定操作信息是为了判断用户在终端的有效区域中的操作是否可以触发终端通过屏幕显示终端中隐藏的桌面图标。
例如,如果预设的显示终端中隐藏的桌面图标的指定操作信息是在有效区域内向上滑动,在终端获取用户在终端的边缘触控区域的操作信息后,判断用户在终端的边缘触控区域的操作信息是否为向上滑动。若用户在终端的边缘触控区域的操作信息是向上滑动,终端就可以将隐藏的桌面图标通过终端的屏幕显示出来。反之,若用户在终端的边缘触控区域的操作信息不是向上滑动,终端保持隐藏的桌面图标的隐藏状态,不执行显示终端中隐藏的桌面图标的操作。
本申请实施例的技术方案具有以下有益效果:本申请实施例 通过获取用户在终端的边缘触控区域的操作信息,然后根据用户在终端的边缘触控区域的操作信息,通过终端的屏幕显示终端中隐藏的桌面图标。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式后,用户不需要去改变终端的运行模式,也不用繁琐的输入解锁密码,只需要在终端的边缘触控区域进行简单的操作,终端就会通过屏幕显示终端中隐藏的这些用户不想被看到的内容的桌面图标,操作简便,同时不容易被人察觉。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
实施例3
基于上述实施例1与实施例2所提供的终端的控制方法,本申请实施例进一步给出实现上述方法实施例的一种具体实施方式,请参考图3,其为本申请实施例所提供的终端的控制方法的实施例3的流程示意图,如图3所示,该方法具体可以包括:S301~S305。
S301,监测终端上的桌面图标是否被拖动至终端的边缘触控区域。
S302,若是,将被拖动的桌面图标进行隐藏。
S303,检测用户在终端的边缘触控区域的操作信息。
S304,判断用户在终端的边缘触控区域的操作信息是否为显示终端中隐藏的桌面图标的指定操作信息。,
S305,若是,通过终端的屏幕显示终端中隐藏的桌面图标。
具体的,若用户在终端的边缘触控区域的操作信息不是显示终端中隐藏的桌面图标的指定操作信息,保持终端中隐藏的桌面图标的状态,不执行通过终端的屏幕显示终端中隐藏的桌面图标的操作。
具体的,通过终端的屏幕显示终端中隐藏的桌面图标后,还可以包括:
检测用户在终端的边缘触控区域的操作信息。
若用户在终端的边缘触控区域的操作信息是隐藏指定的桌面图标的指定操作,将指定的桌面图标进行隐藏。
由于本实施例为图1和图2的一种具体实现方式,本实施例未详细描述的部分,可参考对图1和图2的相关说明。
本申请实施例的技术方案具有以下有益效果:本申请实施例中,通过监测终端上的桌面图标是否被拖动至终端的边缘触控区域,若监测到终端上的桌面图标被拖动至终端的边缘触控区域,将被拖动的桌面图标进行隐藏;通过检测用户在终端的边缘触控区域的操作信息,若用户在终端的边缘触控区域的操作信息是显示终端中隐藏的桌面图标的指定操作信息,通过终端的屏幕显示终端中隐藏的桌面图标。本申请实施例通过针对终端的边缘触控区域进行的简单操作,即可将用户不想被看到的内容所对应的桌面图标在终端中进行隐藏,也可以将终端中已经隐藏的内容所对应的桌面图标通过终端的屏幕显示出来;因此,用户无论是为这些不想被看到的内容设置隐私模式或是打开被隐藏的内容,都无需改变终端的运行模式,也不用繁琐的设置或输入解锁密码,操作简便,且不容易被人察觉;进而,解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,提升了操作效率。
实施例4
基于上述实施例一所提供的终端的控制方法,本申请实施例进一步给出实现上述方法实施例中各步骤及方法的装置实施例,请参考图4,其为本申请实施例所提供的终端的实施例一的结构示意图,如图4所示,该终端包括:获取模块41和隐藏模块42。
获取模块41,用于获取用户针对终端的边缘触控区域的操作信息。
隐藏模块42,用于根据用户针对终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
具体的,获取模块41,具体用于:监测终端上的桌面图标是否被拖动至终端的边缘触控区域;隐藏模块42,具体用于:若监测到终端上的桌面图标被拖动至终端的边缘触控区域,将被拖动的桌面图标进行隐藏。
具体的,获取模块41,还具体用于:检测用户在终端的边缘触控区域的操作信息是否为隐藏指定的桌面图标的指定操作信息;隐藏模块42,还具体用于:若检测到用户在终端的边缘触控区域的操作信息是隐藏指定的桌面图标的指定操作信息,将指定的桌面图标进行隐藏。
具体的,终端的边缘触控区域包括终端上至少一个侧面的边缘触控区域。
具体的,用户在终端的边缘触控区域的操作信息,包括:用户在终端的边缘触控区域的滑动操作信息;或者,用户在终端的边缘触控区域的点击操作信息;或者,用户在终端的边缘触控区域的按压操作信息。
由于本实施例中的各单元能够执行图1所示的方法,本实施例未详细描述的部分,可参考对图1的相关说明。
本申请实施例的技术方案具有以下有益效果:本申请实施例通过终端中的获取模块获取用户针对终端的边缘触控区域的操作信息,然后,终端中的隐藏模块根据用户针对终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式时,只需要针对终端中的边缘触控区域进行简单操作,终端就会将这些用户不想被看到的内容所对应的桌面图标在终端中进行隐藏;从而,用户可以简单快捷的为一些不想被看到的内容设置隐私模式,同时保证了这些内容所对应的桌面图标不会被其他用户察觉到。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
实施例5
基于上述实施例2所提供的终端的控制方法,本申请实施例进一步给出实现上述方法实施例中各步骤及方法的装置实施例,请参考图5,其为本申请实施例所提供的终端的实施例2的结构示意图,如图5所示,该终端包括:获取模块51和显示模块52。
获取模块51,用于获取用户在终端的边缘触控区域的操作信息。
显示模块52,用于根据用户在终端的边缘触控区域的操作信息,通过终端的屏幕显示终端中隐藏的桌面图标。
显示模块52,具体用于:检测用户在终端的边缘触控区域的操作信息是否为显示终端中隐藏的桌面图标的指定操作信息;若检测到用户在终端的边缘触控区域的操作信息是显示终端中隐藏的桌面图标的指定操作信息,通过终端的屏幕显示终端中隐藏的桌面图标。
具体的,终端的边缘触控区域包括终端上至少一个侧面的边缘触控区域。
具体的,用户在终端的边缘触控区域的操作信息,包括:用户在终端的边缘触控区域的滑动操作信息;或者,用户在终端的边缘触控区域的点击操作信息;或者,用户在终端的边缘触控区域的按压操作信息。
由于本实施例中的各单元能够执行图2所示的方法,本实施例未详细描述的部分,可参考对图2的相关说明。
本申请实施例的技术方案具有以下有益效果:本申请实施例通过终端中的获取模块获取用户在终端的边缘触控区域的操作信息,然后,终端中的显示模块根据用户在终端的边缘触控区域的操作信息,通过终端的屏幕显示终端中隐藏的桌面图标。本申请实施例中,当用户为一些不想被看到的内容设置隐私模式后,用户不需要去改变终端的运行模式,也不用繁琐的输入解锁密码,只需要在终端的边缘触控区域进行简单的操作,终端就会通过屏幕显示终端中隐藏的这些用户不想被看到的内容的桌面 图标,操作简便,同时不容易被人察觉。因此,本申请实施例解决了现有技术中为用户不想被看到的内容设置隐私模式导致的操作效率较低的问题,操作简便,提升了操作效率。
实施例6
本申请实施例提供了一种非暂态计算机存储介质,所述计算机存储介质存储有计算机可执行指令,该计算机可执行指令可执行上述实施例1或3中的控制方法。
实施例7
本申请实施例提供了一种非暂态计算机存储介质,所述计算机存储介质存储有计算机可执行指令,该计算机可执行指令可执行上述实施例2或3中的控制方法。
实施例8
图6是本申请实施例提供的执行终端的控制方法的终端的硬件结构示意图,如图6所示,该终端包括:一个或多个处理器610以及存储器620,图6中以一个处理器610为例。该终端还可以包括:输入装置630和输出装置640。
处理器610、存储器620、输入装置630和输出装置640可以通过总线或者其他方式连接,图6中以通过总线连接为例。
存储器620作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序、非暂态计算机可执行程序以及模块。处理器610通过运行存储在存储器620中的非暂态软件程序、指令以及模块,从而执行终端的各种功能应用以及数据处理,即实现上述方法实施例的处理方法。
存储器620可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储数据等。此外,存储器620可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储 器件。在一些实施例中,存储器620可选包括相对于处理器610远程设置的存储器,这些远程存储器可以通过网络连接至处理装置。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入装置630可接收输入的数字或字符信息,以及产生信号输入。输出装置640可包括显示屏等显示设备。
所述一个或者多个模块存储在所述存储器620中,当被所述一个或者多个处理器610执行时,执行:获取用户在终端的边缘触控区域的操作信息;根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
在一种可能的实现方式中,获取用户针对终端的边缘触控区域的操作信息,包括:监测所述终端上的桌面图标是否被拖动至所述终端的边缘触控区域;根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏,包括:若监测到所述终端上的桌面图标被拖动至所述终端的边缘触控区域,将被拖动的所述桌面图标进行隐藏。
在一种可能的实现方式中,获取用户针对终端的边缘触控区域的操作信息,包括:检测所述用户在所述终端的边缘触控区域的操作信息是否为隐藏所述指定的桌面图标的指定操作信息;根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏,包括:若检测到所述用户在所述终端的边缘触控区域的操作信息是隐藏所述指定的桌面图标的指定操作信息,将所述指定的桌面图标进行隐藏。
在一种可能的实现方式中,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
在一种可能的实现方式中,所述用户在所述终端的边缘触控区域的操作信息,包括:用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,用户在终端的边缘触控区域进行按压操作后产生的操作信 息。
上述产品可执行本申请实施例1或3所提供的方法,具备执行方法相应的功能模块和有益效果。未在本实施例中详尽描述的技术细节,可参见本申请实施例1或3所提供的方法。
实施例9
图7是本申请实施例提供的执行终端的控制方法的终端的硬件结构示意图,如图7所示,该设备包括:
一个或多个处理器710以及存储器720,图7中以一个处理器610为例。该设备还可以包括:输入装置730和输出装置740。
处理器710、存储器720、输入装置730和输出装置740可以通过总线或者其他方式连接,图7中以通过总线连接为例。
存储器720作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序、非暂态计算机可执行程序以及模块。处理器710通过运行存储在存储器720中的非暂态软件程序、指令以及模块,从而执行终端的各种功能应用以及数据处理,即实现上述方法实施例的处理方法。
存储器720可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储数据等。此外,存储器720可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施例中,存储器720可选包括相对于处理器710远程设置的存储器,这些远程存储器可以通过网络连接至处理装置。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入装置730可接收输入的数字或字符信息,以及产生信号输入。输出装置740可包括显示屏等显示设备。
所述一个或者多个模块存储在所述存储器720中,当被所述一个或者多个处理器710执行时,执行:获取用户在终端的边缘触控区域的操 作信息;根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
在一种可能的实现方式中,根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标,包括:检测所述用户在所述终端的边缘触控区域的操作信息是否为显示所述终端中隐藏的桌面图标的指定操作信息;若检测到所述用户在所述终端的边缘触控区域的操作信息是显示所述终端中隐藏的桌面图标的指定操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
在一种可能的实现方式中,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
在一种可能的实现方式中,所述用户在所述终端的边缘触控区域的操作信息,包括:用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,用户在终端的边缘触控区域进行按压操作后产生的操作信息。
上述产品可执行本申请实施例2或3所提供的方法,具备执行方法相应的功能模块和有益效果。未在本实施例中详尽描述的技术细节,可参见本申请实施例2或3所提供的方法。
本申请实施例的终端以多种形式存在,包括但不限于:
移动通信设备:这类设备的特点是具备移动通信功能,并且以提供话音、数据通信为主要目标。这类终端包括:智能手机(例如iPhone)、多媒体手机、功能性手机,以及低端手机等。
超移动个人计算机设备:这类设备属于个人计算机的范畴,有计算和处理功能,一般也具备移动上网特性。这类终端包括:PDA、MID和UMPC设备等,例如iPad。
便携式娱乐设备:这类设备可以显示和播放多媒体内容。该类设备包括:音频、视频播放器(例如iPod),掌上游戏机,电子书,以及智能 玩具和便携式车载导航设备。
服务器:提供计算服务的设备,服务器的构成包括处理器、硬盘、内存、系统总线等,服务器和通用的计算机架构类似,但是由于需要提供高可靠的服务,因此在处理能力、稳定性、可靠性、安全性、可扩展性、可管理性等方面要求较高。
其他具有数据交互功能的电子装置。
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。
最后应说明的是:以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。
工业实用性
本申请实施例提供的终端的控制方法,通过获取用户针对终端的边缘触控区域的操作信息;根据所述用户针对所述终端的边缘触控区域的 操作信息,将指定的桌面图标进行隐藏。可以实现当用户为一些不想被看到的内容设置隐私模式时,只需要针对终端中的边缘触控区域进行简单操作,终端就会将这些用户不想被看到的内容所对应的桌面图标在终端中进行隐藏;从而,用户可以简单快捷的为一些不想被看到的内容设置隐私模式,操作简便,提升了操作效率。
通过获取用户在终端的边缘触控区域的操作信息;根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。可以实现当用户为一些不想被看到的内容设置隐私模式后,用户不需要去改变终端的运行模式,也不用繁琐的输入解锁密码,只需要在终端的边缘触控区域进行简单的操作,终端就会通过屏幕显示终端中隐藏的这些用户不想被看到的内容的桌面图标,操作简便,提升了操作效率。

Claims (24)

  1. 一种终端的控制方法,其特征在于,所述方法包括:
    获取用户针对终端的边缘触控区域的操作信息;
    根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
  2. 根据权利要求1所述的方法,其特征在于,
    获取用户针对终端的边缘触控区域的操作信息,包括:监测所述终端上的桌面图标是否被拖动至所述终端的边缘触控区域;
    根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏,包括:若监测到所述终端上的桌面图标被拖动至所述终端的边缘触控区域,将被拖动的所述桌面图标进行隐藏。
  3. 根据权利要求1所述的方法,其特征在于,
    获取用户针对终端的边缘触控区域的操作信息,包括:检测所述用户在所述终端的边缘触控区域的操作信息是否为隐藏所述指定的桌面图标的指定操作信息;
    根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏,包括:若检测到所述用户在所述终端的边缘触控区域的操作信息是隐藏所述指定的桌面图标的指定操作信息,将所述指定的桌面图标进行隐藏。
  4. 根据权利要求1所述的方法,其特征在于,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
  5. 根据权利要求3所述的方法,其特征在于,所述用户在所述终端的边缘触控区域的操作信息,包括:
    用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,
    用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,
    用户在终端的边缘触控区域进行按压操作后产生的操作信息。
  6. 一种终端的控制方法,其特征在于,所述方法包括:
    获取用户在终端的边缘触控区域的操作信息;
    根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
  7. 根据权利要求6所述的方法,其特征在于,根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标,包括:
    检测所述用户在所述终端的边缘触控区域的操作信息是否为显示所述终端中隐藏的桌面图标的指定操作信息;
    若检测到所述用户在所述终端的边缘触控区域的操作信息是显示所述终端中隐藏的桌面图标的指定操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
  8. 根据权利要求6所述的方法,其特征在于,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
  9. 根据权利要求6所述的方法,其特征在于,所述用户在所述终端的边缘触控区域的操作信息,包括:
    用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,
    用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,
    用户在终端的边缘触控区域进行按压操作后产生的操作信息。
  10. 一种终端,其特征在于,所述终端包括:
    获取模块,用于获取用户针对所述终端的边缘触控区域的操作信息;
    隐藏模块,用于根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
  11. 根据权利要求10所述的终端,其特征在于,
    所述获取模块,具体用于:监测所述终端上的桌面图标是否被拖动至所述终端的边缘触控区域;
    所述隐藏模块,具体用于:若监测到所述终端上的桌面图标被拖动至所述终端的边缘触控区域,将被拖动的所述桌面图标进行隐藏。
  12. 根据权利要求10所述的终端,其特征在于,
    所述获取模块,具体用于:检测所述用户在所述终端的边缘触控区域的操作信息是否为隐藏所述指定的桌面图标的指定操作信息;
    所述隐藏模块,具体用于:若检测到所述用户在所述终端的边缘触控区域的操作信息是隐藏所述指定的桌面图标的指定操作信息,将所述指定的桌面图标进行隐藏。
  13. 根据权利要求10所述的终端,其特征在于,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
  14. 根据权利要求12所述的终端,其特征在于,所述用户在所述终端的边缘触控区域的操作信息,包括:
    用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,
    用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,
    用户在终端的边缘触控区域进行按压操作后产生的操作信息。
  15. 一种终端,其特征在于,所述终端包括:
    获取模块,用于获取所述用户在所述终端的边缘触控区域的操作信息;
    显示模块,用于根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
  16. 根据权利要求15所述的终端,其特征在于,所述显示模块,具体用于:
    检测所述用户在所述终端的边缘触控区域的操作信息是否为显示所述终端中隐藏的桌面图标的指定操作信息;
    若检测到所述用户在所述终端的边缘触控区域的操作信息是显示所述终端中隐藏的桌面图标的指定操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
  17. 根据权利要求15所述的终端,其特征在于,所述终端的边缘触控区域包括所述终端上至少一个侧面的边缘触控区域。
  18. 根据权利要求15所述的终端,其特征在于,所述用户在所述终端的边缘触控区域的操作信息,包括:
    用户在终端的边缘触控区域进行滑动操作后产生的操作信息;或者,
    用户在终端的边缘触控区域进行点击操作后产生的操作信息;或者,
    用户在终端的边缘触控区域进行按压操作后产生的操作信息。
  19. 一种终端,包括:
    至少一个处理器;以及,
    与所述至少一个处理器通信连接的存储器;其中,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取用户针对终端 的边缘触控区域的操作信息;
    根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
  20. 一种终端,包括:
    至少一个处理器;以及,
    与所述至少一个处理器通信连接的存储器;其中,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:获取用户在终端的边缘触控区域的操作信息;
    根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
  21. 一种非暂态计算机可读存储介质,其特征在于,所述非暂态计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于:获取用户针对终端的边缘触控区域的操作信息;
    根据所述用户针对所述终端的边缘触控区域的操作信息,将指定的桌面图标进行隐藏。
  22. 一种非暂态计算机可读存储介质,其特征在于,所述非暂态计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于:获取用户在终端的边缘触控区域的操作信息;
    根据所述用户在所述终端的边缘触控区域的操作信息,通过所述终端的屏幕显示所述终端中隐藏的桌面图标。
  23. 一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行权利要求1-5所述的方法。
  24. 一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行权利要求6-9任一项所述的方法。
PCT/CN2016/096430 2016-03-25 2016-08-23 一种终端的控制方法及终端 WO2017161818A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/335,416 US20170277395A1 (en) 2016-03-25 2016-10-26 Control method for terminal and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610180257.9A CN105867808A (zh) 2016-03-25 2016-03-25 一种终端的控制方法及终端
CN201610180257.9 2016-03-25

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/335,416 Continuation US20170277395A1 (en) 2016-03-25 2016-10-26 Control method for terminal and terminal

Publications (1)

Publication Number Publication Date
WO2017161818A1 true WO2017161818A1 (zh) 2017-09-28

Family

ID=56624804

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/096430 WO2017161818A1 (zh) 2016-03-25 2016-08-23 一种终端的控制方法及终端

Country Status (2)

Country Link
CN (1) CN105867808A (zh)
WO (1) WO2017161818A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105867808A (zh) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 一种终端的控制方法及终端
CN107037972A (zh) * 2017-04-07 2017-08-11 珠海市魅族科技有限公司 应用图标隐藏方法及装置
CN109782995A (zh) * 2017-11-10 2019-05-21 群迈通讯股份有限公司 电子装置、屏幕的控制方法及系统
CN108509131B (zh) * 2018-03-28 2021-04-06 维沃移动通信有限公司 一种应用程序启动方法及终端

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104020927A (zh) * 2014-05-30 2014-09-03 北京金山安全软件有限公司 一种通知栏显示方法和终端
CN104156073A (zh) * 2014-08-29 2014-11-19 深圳市中兴移动通信有限公司 移动终端及其操作方法
CN104808919A (zh) * 2015-04-29 2015-07-29 努比亚技术有限公司 界面显示控制方法和装置
CN105867808A (zh) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 一种终端的控制方法及终端

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761023A (zh) * 2013-12-31 2014-04-30 上海斐讯数据通信技术有限公司 一种提高屏幕利用率的方法及移动终端
CN104850799B (zh) * 2015-05-27 2018-11-16 努比亚技术有限公司 一种隐藏移动终端中的数据的方法及移动终端
CN104915119B (zh) * 2015-06-24 2018-05-18 努比亚技术有限公司 终端桌面图标调整方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104020927A (zh) * 2014-05-30 2014-09-03 北京金山安全软件有限公司 一种通知栏显示方法和终端
CN104156073A (zh) * 2014-08-29 2014-11-19 深圳市中兴移动通信有限公司 移动终端及其操作方法
CN104808919A (zh) * 2015-04-29 2015-07-29 努比亚技术有限公司 界面显示控制方法和装置
CN105867808A (zh) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 一种终端的控制方法及终端

Also Published As

Publication number Publication date
CN105867808A (zh) 2016-08-17

Similar Documents

Publication Publication Date Title
WO2019174611A1 (zh) 应用程序的设置方法及移动终端
CA2841524C (en) Method and apparatus for controlling content using graphical object
US9772760B2 (en) Brightness adjustment method and device and electronic device
KR101847754B1 (ko) 근접 기반 입력을 위한 장치 및 방법
KR102519800B1 (ko) 전자 장치
WO2019014859A1 (zh) 一种多任务操作方法及电子设备
WO2017161817A1 (zh) 一种终端的控制方法及装置
WO2017161803A1 (zh) 一种设置的调节方法和终端
CN109032447B (zh) 一种图标处理方法及移动终端
TW201239764A (en) Method and apparatus for providing quick access to media functions from a locked screen
WO2017161818A1 (zh) 一种终端的控制方法及终端
US11054930B2 (en) Electronic device and operating method therefor
WO2020181955A1 (zh) 界面控制方法及终端设备
US9426606B2 (en) Electronic apparatus and method of pairing in electronic apparatus
US9798512B1 (en) Context-based volume adjustment
WO2020001385A1 (zh) 电子装置及应用程序控制方法
CN106951143B (zh) 隐藏应用图标的方法及装置
WO2022057407A1 (zh) 挂件显示方法和电子设备
WO2017161814A1 (zh) 一种终端的控制方法及装置
JP2014229302A (ja) 電子装置の機能の実行方法及びその電子装置
US20170277379A1 (en) Method and terminal for processing desktop icon
US10311254B2 (en) Electronic apparatus and information access control method thereof
CN108073405B (zh) 一种应用程序卸载方法及移动终端
US10908868B2 (en) Data processing method and mobile device
WO2018054125A1 (zh) 一种移动终端的信息显示方法及移动终端

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16895167

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16895167

Country of ref document: EP

Kind code of ref document: A1