WO2017166789A1 - 一种系统锁定方法及装置 - Google Patents

一种系统锁定方法及装置 Download PDF

Info

Publication number
WO2017166789A1
WO2017166789A1 PCT/CN2016/102465 CN2016102465W WO2017166789A1 WO 2017166789 A1 WO2017166789 A1 WO 2017166789A1 CN 2016102465 W CN2016102465 W CN 2016102465W WO 2017166789 A1 WO2017166789 A1 WO 2017166789A1
Authority
WO
WIPO (PCT)
Prior art keywords
lock
program
locking
locked state
running
Prior art date
Application number
PCT/CN2016/102465
Other languages
English (en)
French (fr)
Inventor
李�真
Original Assignee
乐视控股(北京)有限公司
乐视移动智能信息技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 乐视控股(北京)有限公司, 乐视移动智能信息技术(北京)有限公司 filed Critical 乐视控股(北京)有限公司
Publication of WO2017166789A1 publication Critical patent/WO2017166789A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • Embodiments of the present invention relate to the field of human-computer interaction, and in particular, to a system locking method and apparatus.
  • the smart terminal lock screen is similar to the computer lock screen, including two ways, one is to cut off the screen power, and the other is to use the software to quickly and intelligently lock the screen.
  • the purpose of the lock screen is to protect the privacy of your computer or mobile phone, prevent misuse, and save power without shutting down the terminal.
  • the existing screen locking method regardless of the locking principle, the result of the locking is usually to stop running all programs, close the terminal screen, the user can open the screen to access the unlocking interface; after unlocking, the user can enter the system desktop and access all applications
  • the existing screen locking method is less flexible and convenient.
  • an embodiment of the present invention provides a system locking method, including:
  • the first locked state includes masking all input commands except the unlock command, keeping the terminal screen open, and keeping the foreground program running.
  • the method further comprises:
  • the second lock state is entered, and the second lock state includes closing the terminal screen and shielding the system desktop.
  • Embodiments of the present invention also provide another system locking method, including:
  • the lock status option When receiving the lock instruction, the lock status option is fed back to the user, the lock status option includes a first lock status and a second lock status, and the lock contents of the first lock status and the second lock status are different;
  • the first locking state includes shielding all input commands except the unlocking command, keeping the terminal screen in an open state, and maintaining the currently running foreground program to continue running.
  • the second locked state includes closing the terminal screen, shielding the system desktop, and ending the currently running foreground program.
  • an embodiment of the present invention provides a system locking apparatus, including:
  • a monitoring unit configured to monitor whether a lock instruction is received
  • a determining unit configured to determine whether there is a running foreground program when receiving the locking instruction
  • a first locking unit configured to enter a first locked state if there is currently a running foreground program, the first locking state includes shielding all input commands except the unlocking command, keeping the terminal screen in an open state, and maintaining the The foreground program continues to run.
  • the method further comprises:
  • the second locking unit is configured to enter a second locked state if there is no foreground program currently running, and the second locking state includes closing the terminal screen and shielding the system desktop.
  • Embodiments of the present invention also provide another system locking device, including:
  • a first monitoring unit configured to monitor whether a lock instruction is received
  • An interrogation unit configured to: when the lock instruction is received, feed back a lock status option to the user, the lock status option includes a first lock status and a second lock status, and the lock content of the first lock status and the second lock status are different ;
  • a second monitoring unit configured to monitor whether a selected instruction provided by the user is received
  • a locking unit configured to determine to enter the first locked state or the second locked state according to the selected instruction when receiving the selected instruction provided by the user.
  • the first locking state includes shielding all input commands except the unlocking command, keeping the terminal screen in an open state, and maintaining the currently running foreground program to continue running.
  • the second locked state includes closing the terminal screen, shielding the system desktop, and ending the currently running foreground program.
  • an electronic device including:
  • At least one processor At least one processor
  • At least one memory communicatively coupled to the processor, wherein:
  • the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the following method:
  • the first lock state includes blocking but unlocking All input commands outside the command, keeping the terminal screen open, and keeping the foreground program running.
  • embodiments of the present invention provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions when the program instructions are When the computer executes, the computer is caused to perform the following method:
  • the first lock state includes blocking but unlocking All input commands outside the command, keeping the terminal screen open, and keeping the foreground program running.
  • embodiments of the present invention provide a non-transitory computer readable storage medium storing computer instructions that cause the computer to perform the following methods:
  • the first lock state includes blocking but unlocking All input commands outside the command, keeping the terminal screen open, and keeping the foreground program running.
  • An embodiment of the present invention further provides an electronic device, including:
  • At least one processor At least one processor
  • At least one memory communicatively coupled to the processor, wherein:
  • the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the following method:
  • Monitoring whether a lock instruction is received when receiving the lock instruction, feeding back a lock status option to the user, the lock status option including the first lock status and the second lock status, and the lock content of the first lock status and the second lock status Not being the same; monitoring whether a selected instruction provided by the user is received; when receiving the selected instruction provided by the user, determining to enter the first locked state or the second locked state according to the selected command.
  • Embodiments of the present invention also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer When the computer is caused to perform the following method:
  • Monitoring whether a lock instruction is received when receiving the lock instruction, feeding back a lock status option to the user, the lock status option including the first lock status and the second lock status, and the lock content of the first lock status and the second lock status Not being the same; monitoring whether a selected instruction provided by the user is received; when receiving the selected instruction provided by the user, determining to enter the first locked state or the second locked state according to the selected command.
  • Monitoring whether a lock instruction is received when receiving the lock instruction, feeding back a lock status option to the user, the lock status option including the first lock status and the second lock status, and the lock content of the first lock status and the second lock status Not being the same; monitoring whether a selected instruction provided by the user is received; when receiving the selected instruction provided by the user, determining to enter the first locked state or the second locked state according to the selected command.
  • the first locking state includes shielding except for the unlocking finger All the input commands are kept, the screen of the terminal is kept on, and the foreground program is kept running. In this locked state, the foreground application can be kept running, and the user can normally watch the display content of the terminal screen without interference from the misoperation. This increases the flexibility and convenience of the locking operation.
  • a second system locking method and apparatus feeds back a lock status option to a user when a lock command is detected, the lock status option includes a first lock status and a second lock status, and The content locked in the state is different.
  • the selected instruction provided by the user is received, one of the two locking states is entered according to the user's selection, thereby improving the flexibility and convenience of the locking operation.
  • FIG. 1 is a flowchart of a system locking method according to Embodiment 1 of the present invention.
  • FIG. 2 is a flowchart of a system locking method according to Embodiment 2 of the present invention.
  • FIG. 3 is a schematic structural diagram of a system locking device according to Embodiment 3 of the present invention.
  • FIG. 4 is a schematic structural diagram of a system locking device according to Embodiment 4 of the present invention.
  • FIG. 5 is a structural block diagram of an electronic device according to Embodiment 5 of the present invention.
  • FIG. 6 is a structural block diagram of an electronic device according to Embodiment 8 of the present invention.
  • This embodiment provides a system locking method, which can be performed in an intelligent terminal. As shown in FIG. 1 , the method includes:
  • the lock command may be provided by a user, specifically by using a lock button of the terminal, or setting a virtual button on the system desktop or the main interface, and a lock command occurs when the user clicks the lock button.
  • step S2 is performed, otherwise the monitoring is continued.
  • step S2 to determine whether there is currently a running foreground program.
  • the front and back of the embodiment of the present invention are relative to the desktop of the visual operating system, that is, the program running on the desktop is a foreground program, and the user can perceive when the foreground program is running, such as a video player, a browser, etc. Front desk program.
  • the background program is not visible to the user.
  • the existing smartphone operating system supports both foreground program running and background program running.
  • the background program is also called the task level program, and the foreground program is also called the event processing level program. If there is currently a running foreground program, for example, the web browser is in an open state, step S3 is performed, otherwise step S4 is performed.
  • first locked state includes masking all input commands except the unlock command, keeping the screen of the terminal in an open state, and maintaining the foreground program to continue running.
  • mask instructions There are various ways to mask instructions. For example, you can intercept instructions or disable system input modules. In this state, operations such as user touch screen operation, operation shutdown button, and power off the screen are all blocked. Only the unlock command is accepted. After receiving the unlock command, it will resume normal use. At present, most of the smart terminal's lock button and unlock button are the same mechanical button. This solution can be executed in the existing terminal, and the user can issue a lock command and an unlock command through the same mechanical button. Of course, since the locking state of the solution is different from the existing locking state, in order to facilitate user differentiation, a button for transmitting the locking instruction of the solution may be added to the existing terminal.
  • the second locking state includes closing the terminal screen, shielding the system desktop, and the second locking state is the same as the existing locking state, that is, the solution provides two locking states at the same time.
  • the locking instruction when the locking instruction is detected, it is first determined whether there is currently a running foreground program, and if there is currently a running foreground program, the first locking state is entered, the first The lock status includes masking all inputs except the unlock command.
  • the instruction is entered, the screen of the terminal is kept open, and the foreground program is kept running. In this locked state, the foreground application can be kept running, and the user can normally watch the display content of the terminal screen without interference from misoperation, thereby improving the locking. Operational flexibility and convenience.
  • This embodiment provides another system locking method, which can be performed in an intelligent terminal. As shown in FIG. 2, the method includes:
  • the lock command can be provided by the user, and can be implemented by using the lock button of the terminal.
  • the virtual button can also be set on the desktop or the main interface of the system.
  • a lock command occurs.
  • most of the smart terminal's lock button and unlock button are the same mechanical button.
  • This solution can be executed in the existing terminal, and the user can issue a lock command and an unlock command through the same mechanical button.
  • a button for transmitting the locking instruction of the solution may be added to the existing terminal.
  • step S'2 is performed, otherwise the monitoring is continued.
  • the lock status option is fed back to the user, the lock status option includes a first lock status and a second lock status, and the lock contents of the first lock status and the second lock status are different. For example, you can pop up a menu of options with two options.
  • step S'3 it is monitored whether the selected instruction provided by the user is received, that is, waiting for the user to select a locked state; when the selected instruction provided by the user is received, step S'4 is performed, otherwise the monitoring is continued.
  • the lock status option when the lock instruction is detected, the lock status option is fed back to the user, the lock status option includes the first lock status and the second lock status, and is locked in the two lock states.
  • the content is different.
  • the first locking state includes shielding all input commands except the unlocking command, keeping the terminal screen in an open state, and maintaining the currently running foreground program to continue running.
  • mask instructions For example, you can intercept instructions or disable system input modules. In this state, operations such as user touch screen operation, operation shutdown button, and power off the screen are all blocked. Only the unlock command is accepted. , restore after receiving the unlock command Normal use status.
  • the second locked state includes closing the terminal screen, shielding the system desktop, ending the currently running foreground program, and the second locked state may be the same as the existing locked state.
  • This embodiment provides a system locking device. As shown in FIG. 3, the device includes:
  • a monitoring unit 31 configured to monitor whether a lock instruction is received
  • the determining unit 32 is configured to: when receiving the locking instruction, determine whether there is currently a running foreground program;
  • the first locking unit 33 is configured to enter a first locked state if there is currently a running foreground program, where the first locking state includes shielding all input commands except the unlocking command, keeping the terminal screen open, and maintaining the The foreground program continues to run.
  • the lock instruction when the lock instruction is detected, it is first determined whether there is currently a running foreground program, and if there is currently a running foreground program, the first lock state is entered, the first The locking state includes shielding all input commands except the unlocking command, keeping the terminal screen open, and keeping the foreground program running. In this locked state, the foreground application can remain running, and the user can normally view the terminal screen display content without being Misuse of interference, thereby increasing the flexibility and convenience of the locking operation.
  • the device further includes:
  • the second locking unit 34 is configured to enter a second locked state if there is no foreground program currently running, and the second locking state includes closing the terminal screen and shielding the system desktop.
  • the device includes:
  • a first monitoring unit 41 configured to monitor whether a lock instruction is received
  • the query unit 42 is configured to feed back a lock status option to the user when receiving the lock instruction, the lock status option includes a first lock status and a second lock status, and the lock content of the first lock status and the second lock status is not the same;
  • a second monitoring unit 43 configured to monitor whether a selected instruction provided by the user is received
  • the locking unit 44 is configured to determine to enter the first locked state or the second locked state according to the selected instruction when receiving the selected instruction provided by the user.
  • the first locking state includes shielding other than the unlocking instruction. All input commands, keep the terminal screen open, and keep the currently running foreground program running.
  • the second locked state includes closing the terminal screen, shielding the system desktop, and ending the currently running foreground program.
  • a system locking device feeds back a lock status option to a user when a lock command is detected, the lock status option including a first lock state and a second lock state, and being locked in two lock states
  • the content is different.
  • one of the two locking states is entered according to the user's selection, thereby improving the flexibility and convenience of the locking operation.
  • FIG. 5 is a block diagram showing the structure of an electronic device according to Embodiment 5 of the present application.
  • the test device of the electronic device display device includes: a processor 501, a memory 502, and a bus 503;
  • the processor 501 and the memory 502 complete communication with each other through the bus 503.
  • the processor 501 is configured to invoke the program instructions in the memory 502 to perform the methods provided in the foregoing method embodiments, for example, including: monitoring whether a lock instruction is received; when receiving the lock instruction, determining whether there is currently a running foreground program; if there is currently a running foreground program, entering a first locked state, the first locked state includes masking all input commands except the unlock command, keeping the terminal screen open, and maintaining the foreground The program continues to run.
  • the embodiment discloses a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer, the computer
  • the method provided by each of the foregoing method embodiments can be performed, for example, comprising: monitoring whether a lock instruction is received; when receiving the lock instruction, determining whether there is currently a running foreground program; if there is currently a running foreground program, entering a first lock state, the first lock state includes masking all input commands except the unlock command, keeping the terminal screen in an on state, and maintaining the foreground program to continue running.
  • the embodiment provides a non-transitory computer readable storage medium, the non-transitory computer readable storage medium storing computer instructions, the computer instructions causing the computer to perform the methods provided by the foregoing method embodiments, including, for example, : monitoring whether a lock instruction is received; when receiving the lock instruction, determining whether there is currently a running foreground program; if there is currently a running foreground program, entering a first lock state, the first lock state includes masking All input commands except the unlock command, keeping the terminal screen open, and keeping the foreground program running.
  • FIG. 6 is a block diagram showing the structure of an electronic device according to Embodiment 8 of the present application.
  • the test device of the display device includes: a processor 601, a memory 602, and a bus 603;
  • the processor 601 and the memory 602 complete communication with each other through the bus 603.
  • the processor 601 is configured to invoke program instructions in the memory 602 to perform the methods provided by the foregoing method embodiments, for example, including: monitoring whether a lock instruction is received; and receiving a lock instruction to the user when receiving the lock instruction a status option, the lock status option includes a first lock status and a second lock status, and the locked content of the first lock status and the second lock status are different; monitoring whether a user-supplied selected instruction is received; when the user is received When the selected instruction is provided, it is determined to enter the first locked state or the second locked state according to the selected command.
  • the embodiment discloses a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer, the computer
  • the method provided by each of the foregoing method embodiments can be performed, for example, comprising: monitoring whether a lock instruction is received; and when receiving the lock instruction, feeding back a lock status option to the user, the lock status option including a first lock status and a second lock status, And the locked content of the first locked state and the second locked state are different; monitoring whether a selected instruction provided by the user is received; when receiving the selected instruction provided by the user, determining to enter the first according to the selected instruction Locked state or second locked state.
  • the embodiment provides a non-transitory computer readable storage medium, and the non-transitory computer can
  • the read storage medium stores computer instructions that cause the computer to perform the methods provided by the various method embodiments described above, for example, including: monitoring whether a lock instruction is received; and when receiving the lock instruction, feeding back a lock status option to the user,
  • the lock status option includes a first lock status and a second lock status, and the locked content of the first lock status and the second lock status are different; monitoring whether a user-supplied selected instruction is received; when receiving the user-provided selection When the command is commanded, it is determined to enter the first lock state or the second lock state according to the selected command.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

一种系统锁定方法及装置,所述方法包括:监测是否接收到锁定指令(S1);当接收到锁定指令时,判断当前是否有正在运行的前台程序(S2);若当前有正在运行的前台程序,则进入第一锁定状态(S3),所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。该方法可以提高系统锁定操作的灵活性和便利性。

Description

一种系统锁定方法及装置
交叉引用
本申请引用于2016年4月1日提交的专利名称为“一种系统锁定方法及装置”的第2016102037940号中国专利申请,其通过引用被全部并入本申请。
技术领域
本发明的实施例涉及人机交互领域,具体涉及一种系统锁定方法及装置。
背景技术
随着智能终端的普及,很多用户利用锁屏软件来保护自己的终端隐私。智能终端锁屏与电脑锁屏相仿,包括有两种方式,一种是切断屏幕电源,一种是利用软件快速智能锁屏。锁屏的目的在于保护自己的电脑或手机隐私、防止误操作、在不关闭终端的情况下节省电量。
现有的屏幕锁定方式,无论锁定原理如何,锁定的结果通常是停止运行所有程序、关闭终端屏幕,用户可以开启屏幕访问解锁界面;而在解锁之后,用户可以进入系统桌面,访问所有的应用程序,由此可见,现有的屏幕锁定方式的灵活性和便利性较差。
发明内容
本发明的实施例要解决的是现有的屏幕锁定方式的灵活性和便利性较差的问题。
有鉴于此,本发明的实施例提供一种系统锁定方法,包括:
监测是否接收到锁定指令;
当接收到锁定指令时,判断当前是否有正在运行的前台程序;
若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
优选地,还包括:
若当前没有正在运行的前台程序,则进入第二锁定状态,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面。
本发明的实施例还提供另一种系统锁定方法,包括:
监测是否接收到锁定指令;
当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;
监测是否接收到用户提供的选定指令;
当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
优选地,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持当前正在运行的前台程序继续运行。
优选地,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面、结束当前正在运行的前台程序。
相应地,本发明的实施例提供一种系统锁定装置,包括:
监测单元,用于监测是否接收到锁定指令;
判断单元,用于当接收到锁定指令时,判断当前是否有正在运行的前台程序;
第一锁定单元,用于若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
优选地,还包括:
第二锁定单元,用于若当前没有正在运行的前台程序,则进入第二锁定状态,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面。
本发明的实施例还提供另一种系统锁定装置,包括:
第一监测单元,用于监测是否接收到锁定指令;
询问单元,用于当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;
第二监测单元,用于监测是否接收到用户提供的选定指令;
锁定单元,用于当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
优选地,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持当前正在运行的前台程序继续运行。
优选地,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面、结束当前正在运行的前台程序。
相应地,本发明的实施例提供一种电子设备,包括:
至少一个处理器;以及
与所述处理器通信连接的至少一个存储器,其中:
所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行如下的方法:
监测是否接收到锁定指令;当接收到锁定指令时,判断当前是否有正在运行的前台程序;若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
相应地,本发明的实施例提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如下的方法:
监测是否接收到锁定指令;当接收到锁定指令时,判断当前是否有正在运行的前台程序;若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
相应地,本发明的实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行如下的方法:
监测是否接收到锁定指令;当接收到锁定指令时,判断当前是否有正在运行的前台程序;若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
本发明的实施例还提供一种电子设备,包括:
至少一个处理器;以及
与所述处理器通信连接的至少一个存储器,其中:
所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行如下的方法:
监测是否接收到锁定指令;当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;监测是否接收到用户提供的选定指令;当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
本发明的实施例还提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如下方法:
监测是否接收到锁定指令;当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;监测是否接收到用户提供的选定指令;当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
本发明的实施例还提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行如下方法:
监测是否接收到锁定指令;当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;监测是否接收到用户提供的选定指令;当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
根据本发明的实施例提供的第一种系统锁定方法及装置,在监测到锁定指令时,首先判断当前是否有正在运行的前台程序,若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指 令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行,在此锁定状态前台应用程序可以保持运行,用户可以正常观看终端屏幕显示内容且不受误操作的干扰,由此提高了锁定操作的灵活性和便利性。
根据本发明的实施例提供的第二种系统锁定方法及装置,在监测到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且在两种锁定状态中被锁定的内容不相同,当接收到用户提供的选定指令时,按照用户的选择进入两种锁定状态中的一种,由此提高了锁定操作的灵活性和便利性。
附图说明
为了更清楚地说明本发明的实施例具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的实施例的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明的实施例1提供的系统锁定方法的流程图;
图2为本发明的实施例2提供的系统锁定方法的流程图;
图3为本发明的实施例3提供的系统锁定装置的结构示意图;
图4为本发明的实施例4提供的系统锁定装置的结构示意图;
图5为本发明的实施例5提供的电子设备的结构框图;
图6为本发明的实施例8提供的电子设备的结构框图。
具体实施方式
下面将结合附图对本发明的实施例的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明的实施例一部分实施例,而不是全部的实施例。基于本发明的实施例中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明的实施例保护的范围。
此外,下面所描述的本发明的实施例不同实施方式中所涉及的技术特 征只要彼此之间未构成冲突就可以相互结合。
实施例1
本实施例提供了一种系统锁定方法,该方法可以在智能终端中执行,如图1所示该方法包括:
S1,监测是否接收到锁定指令,锁定指令可以由用户提供,具体可以利用终端的锁定键实现,也可以在系统桌面或主界面设置虚拟按键,当用户点击锁定按键时即发生锁定指令。当接收到锁定指令时,执行步骤S2,否则继续监测。
S2,判断当前是否有正在运行的前台程序。本发明的实施例所指的前台和后台是相对可视化操作系统的桌面而言的,即在桌面运行的程序为前台程序,前台程序运行时用户能够感知,如视频播放器、浏览器等都是前台程序。而后台程序,是用户看不到的。众所周知,现有的智能手机操作系统均同时支持前台程序运行和后台程序运行。后台程序也叫任务级程序,前台程序也叫事件处理级程序。若当前有正在运行的前台程序,例如网页浏览器处于开启状态,则执行步骤S3,否则执行步骤S4。
S3,进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。屏蔽指令的方式有多种,例如可以截获指令,也可以禁用系统输入模块等,在此状态下,诸如用户触摸屏幕的操作、操作关机键、关闭屏幕电源的操作均被屏蔽,只接受解锁指令,接到解锁指令后则恢复正常使用状态。目前多数智能终端的锁定键和解锁键为同一个机械按键,本方案可以在现有的终端中执行,用户可以通过同一个机械按键发出锁定指令和解锁指令。当然,由于本方案的锁定状态与现有锁定状态不同,所以为了便于用户区分,也可以在现有的终端上增设一个用于发送本方案的锁定指令的按键。
S4,进入第二锁定状态,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面,第二锁定状态与现有的锁定状态相同,即本方案同时提供两种锁定状态。
根据本发明的实施例提供的系统锁定方法,在监测到锁定指令时,首先判断当前是否有正在运行的前台程序,若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输 入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行,在此锁定状态前台应用程序可以保持运行,用户可以正常观看终端屏幕显示内容且不受误操作的干扰,由此提高了锁定操作的灵活性和便利性。
实施例2
本实施例提供了另一种系统锁定方法,该方法可以在智能终端中执行,如图2所示该方法包括:
S’1,监测是否接收到锁定指令。锁定指令可以由用户提供,具体可以利用终端的锁定键实现,也可以在系统桌面或主界面设置虚拟按键,当用户点击锁定按键时即发生锁定指令。目前多数智能终端的锁定键和解锁键为同一个机械按键,本方案可以在现有的终端中执行,用户可以通过同一个机械按键发出锁定指令和解锁指令。当然,由于本方案的锁定状态与现有锁定状态不同,所以为了便于用户区分,也可以在现有的终端上增设一个用于发送本方案的锁定指令的按键。
当接收到锁定指令时,执行步骤S’2,否则继续监测。
S’2,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同。例如可以弹出一个选项菜单,其中有两个选项。
S’3,监测是否接收到用户提供的选定指令,即等待用户选择一种锁定状态;当接收到用户提供的选定指令时执行步骤S’4,否则继续监测。
S’4,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
根据本发明的实施例提供的系统锁定方法,在监测到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且在两种锁定状态中被锁定的内容不相同,当接收到用户提供的选定指令时,按照用户的选择进入两种锁定状态中的一种,由此提高了锁定操作的灵活性和便利性。
作为一个优选的实施方式,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持当前正在运行的前台程序继续运行。屏蔽指令的方式有多种,例如可以截获指令,也可以禁用系统输入模块等,在此状态下,诸如用户触摸屏幕的操作、操作关机键、关闭屏幕电源的操作均被屏蔽,只接受解锁指令,接到解锁指令后则恢复 正常使用状态。
所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面、结束当前正在运行的前台程序,第二锁定状态可以与现有的锁定状态相同。
实施例3
本实施例提供一种系统锁定装置,如图3所示,该装置包括:
监测单元31,用于监测是否接收到锁定指令;
判断单元32,用于当接收到锁定指令时,判断当前是否有正在运行的前台程序;
第一锁定单元33,用于若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
根据本发明的实施例提供的系统锁定装置,在监测到锁定指令时,首先判断当前是否有正在运行的前台程序,若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行,在此锁定状态前台应用程序可以保持运行,用户可以正常观看终端屏幕显示内容且不受误操作的干扰,由此提高了锁定操作的灵活性和便利性。
作为一个优选的实施方式,该装置还包括:
第二锁定单元34,用于若当前没有正在运行的前台程序,则进入第二锁定状态,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面。
实施例4
本发明的实施例提供另一种系统锁定装置,如图4所示,该装置包括:
第一监测单元41,用于监测是否接收到锁定指令;
询问单元42,用于当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;
第二监测单元43,用于监测是否接收到用户提供的选定指令;
锁定单元44,用于当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
作为一个优选的实施方式,所述第一锁定状态包括屏蔽除解锁指令外 的所有输入指令、保持终端屏幕处于开启状态、保持当前正在运行的前台程序继续运行。
所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面、结束当前正在运行的前台程序。
根据本发明的实施例提供的系统锁定装置,在监测到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且在两种锁定状态中被锁定的内容不相同,当接收到用户提供的选定指令时,按照用户的选择进入两种锁定状态中的一种,由此提高了锁定操作的灵活性和便利性。
实施例五
图5是示出本申请实施例五的电子设备的结构框图。
参照图5,所述电子设备显示装置的测试设备,包括:处理器(processor)501、存储器(memory)502和总线503;
其中,所述处理器501、存储器502通过所述总线503完成相互间的通信;
所述处理器501用于调用所述存储器502中的程序指令,以执行上述各方法实施例所提供的方法,例如包括:监测是否接收到锁定指令;当接收到锁定指令时,判断当前是否有正在运行的前台程序;若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
实施例六
本实施例公开一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法实施例所提供的方法,例如包括:监测是否接收到锁定指令;当接收到锁定指令时,判断当前是否有正在运行的前台程序;若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
实施例七
本实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行上述各方法实施例所提供的方法,例如包括:监测是否接收到锁定指令;当接收到锁定指令时,判断当前是否有正在运行的前台程序;若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
实施例八
图6是示出本申请实施例八的电子设备的结构框图。
参照图6,所述显示装置的测试设备,包括:处理器(processor)601、存储器(memory)602和总线603;
其中,所述处理器601、存储器602通过所述总线603完成相互间的通信;
所述处理器601用于调用所述存储器602中的程序指令,以执行上述各方法实施例所提供的方法,例如包括:监测是否接收到锁定指令;当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;监测是否接收到用户提供的选定指令;当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
实施例九
本实施例公开一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法实施例所提供的方法,例如包括:监测是否接收到锁定指令;当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;监测是否接收到用户提供的选定指令;当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
实施例十
本实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可 读存储介质存储计算机指令,所述计算机指令使所述计算机执行上述各方法实施例所提供的方法,例如包括:监测是否接收到锁定指令;当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;监测是否接收到用户提供的选定指令;当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所描述的电子设备等实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。
显然,上述实施例仅仅是为清楚地说明所作的举例,而并非对实施方式的限定。对于所属领域的普通技术人员来说,在上述说明的基础上还可以做出其它不同形式的变化或变动。这里无需也无法对所有的实施方式予以穷举。而由此所引伸出的显而易见的变化或变动仍处于本发明的实施例创造的保护范围之中。

Claims (16)

  1. 一种系统锁定方法,其特征在于,包括:
    监测是否接收到锁定指令;
    当接收到锁定指令时,判断当前是否有正在运行的前台程序;
    若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
  2. 根据权利要求1所述的方法,其特征在于,还包括:
    若当前没有正在运行的前台程序,则进入第二锁定状态,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面。
  3. 一种系统锁定方法,其特征在于,包括:
    监测是否接收到锁定指令;
    当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;
    监测是否接收到用户提供的选定指令;
    当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
  4. 根据权利要求3所述的方法,其特征在于,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持当前正在运行的前台程序继续运行。
  5. 根据权利要求3所述的方法,其特征在于,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面、结束当前正在运行的前台程序。
  6. 一种系统锁定装置,其特征在于,包括:
    监测单元,用于监测是否接收到锁定指令;
    判断单元,用于当接收到锁定指令时,判断当前是否有正在运行的前台程序;
    第一锁定单元,用于若当前有正在运行的前台程序,则进入第一锁定状态,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持所述前台程序继续运行。
  7. 根据权利要求6所述的装置,其特征在于,还包括:
    第二锁定单元,用于若当前没有正在运行的前台程序,则进入第二锁定状态,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面。
  8. 一种系统锁定装置,其特征在于,包括:
    第一监测单元,用于监测是否接收到锁定指令;
    询问单元,用于当接收到锁定指令时,向用户反馈锁定状态选项,锁定状态选项包括第一锁定状态和第二锁定状态,并且所述第一锁定状态和第二锁定状态的锁定内容不相同;
    第二监测单元,用于监测是否接收到用户提供的选定指令;
    锁定单元,用于当接收到用户提供的选定指令时,根据所述选定指令确定进入第一锁定状态或第二锁定状态。
  9. 根据权利要求8所述的装置,其特征在于,所述第一锁定状态包括屏蔽除解锁指令外的所有输入指令、保持终端屏幕处于开启状态、保持当前正在运行的前台程序继续运行。
  10. 根据权利要求8所述的装置,其特征在于,所述第二锁定状态包括关闭终端屏幕、屏蔽系统桌面、结束当前正在运行的前台程序。
  11. 一种电子设备,其特征在于,包括:
    至少一个处理器;以及
    与所述处理器通信连接的至少一个存储器,其中:
    所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行如权利要求1至2任一所述的方法。
  12. 一种计算机程序产品,其特征在于,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如权利要求1至2任一所述的方法。
  13. 一种非暂态计算机可读存储介质,其特征在于,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行如权利要求1至2任一所述的方法。
  14. 一种电子设备,其特征在于,包括:
    至少一个处理器;以及
    与所述处理器通信连接的至少一个存储器,其中:
    所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行如权利要求3至5任一所述的方法。
  15. 一种计算机程序产品,其特征在于,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如权利要求3至5任一所述的方法。
  16. 一种非暂态计算机可读存储介质,其特征在于,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行如权利要求3至5任一所述的方法。
PCT/CN2016/102465 2016-04-01 2016-10-18 一种系统锁定方法及装置 WO2017166789A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610203794.0 2016-04-01
CN201610203794.0A CN105893886A (zh) 2016-04-01 2016-04-01 一种系统锁定方法及装置

Publications (1)

Publication Number Publication Date
WO2017166789A1 true WO2017166789A1 (zh) 2017-10-05

Family

ID=57012128

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/102465 WO2017166789A1 (zh) 2016-04-01 2016-10-18 一种系统锁定方法及装置

Country Status (2)

Country Link
CN (1) CN105893886A (zh)
WO (1) WO2017166789A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893886A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种系统锁定方法及装置
CN106682526A (zh) * 2016-12-14 2017-05-17 珠海格力电器股份有限公司 一种浏览图片的限制方法和移动终端
CN113687925B (zh) * 2021-07-22 2023-09-29 成都鲁易科技有限公司 设备操作处理方法及装置、存储介质、计算机设备
CN114070659B (zh) * 2021-10-29 2023-11-17 深圳市优必选科技股份有限公司 一种设备锁定方法、装置及终端设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063241A (zh) * 2009-11-16 2011-05-18 英业达股份有限公司 手持式电子装置及其解锁方法
JP2014075093A (ja) * 2012-10-05 2014-04-24 Sharp Corp 情報処理端末およびプログラム
CN103793177A (zh) * 2014-02-28 2014-05-14 广州视源电子科技股份有限公司 一种触屏设备的界面处理方法及触屏设备
CN104142773A (zh) * 2013-05-06 2014-11-12 中兴通讯股份有限公司 一种终端锁屏的方法及终端
CN105068867A (zh) * 2015-08-21 2015-11-18 广东欧珀移动通信有限公司 一种屏幕锁定方法及装置
CN105893886A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种系统锁定方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063241A (zh) * 2009-11-16 2011-05-18 英业达股份有限公司 手持式电子装置及其解锁方法
JP2014075093A (ja) * 2012-10-05 2014-04-24 Sharp Corp 情報処理端末およびプログラム
CN104142773A (zh) * 2013-05-06 2014-11-12 中兴通讯股份有限公司 一种终端锁屏的方法及终端
CN103793177A (zh) * 2014-02-28 2014-05-14 广州视源电子科技股份有限公司 一种触屏设备的界面处理方法及触屏设备
CN105068867A (zh) * 2015-08-21 2015-11-18 广东欧珀移动通信有限公司 一种屏幕锁定方法及装置
CN105893886A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种系统锁定方法及装置

Also Published As

Publication number Publication date
CN105893886A (zh) 2016-08-24

Similar Documents

Publication Publication Date Title
EP3901756B1 (en) Electronic device including touch sensitive display and method for operating the same
US9880157B2 (en) Apparatus and methods for suppressing user-alerting actions
CA2737954C (en) Restricting user access on shared computer
WO2017166789A1 (zh) 一种系统锁定方法及装置
WO2016146056A1 (zh) 一种页面切换方法及装置
US9804767B2 (en) Light dismiss manager
WO2018119905A1 (zh) 多系统移动终端的控制方法、控制装置及电子设备
CN108628650B (zh) 触摸事件的处理方法、装置和智能交互设备
US10838612B2 (en) Apparatus and method for processing drag and drop
US20150058713A1 (en) Method and apparatus for sharing media content and method and apparatus for displaying media content
KR102416501B1 (ko) 전자 장치 및 그의 제어 방법
KR102539580B1 (ko) 조건부 액션에 대한 정보를 공유하기 위한 방법 및 그 전자 장치
KR102510846B1 (ko) 전자 장치 및 그의 제어방법
KR20160032604A (ko) 독립된 화면 구성을 가지는 전자 장치
US20150370423A1 (en) Mobile terminal, and menu item disposing method and apparatus thereof
CN105760794A (zh) 一种显示隐私信息的方法、装置及终端设备
KR102654807B1 (ko) 전자 장치 및 전자 장치 제어 방법
US10853526B2 (en) Dynamic screen filtering
CN111368275B (zh) 机器人控制方法、装置、设备及存储介质
KR102619117B1 (ko) 전자 장치 및 전자 장치의 동작 방법
KR102362868B1 (ko) 사용자의 선호도에 따라 사용자에게 컨텐트들을 제공하는 방법 및 이를 위한 전자 장치
KR102477043B1 (ko) 전자 장치 및 그의 제어 방법
KR102655187B1 (ko) 전자 장치 및 그의 동작 방법
US20140068510A1 (en) Matrix menu
CN113655937A (zh) 应用管理方法、装置、电子设备和可读存储介质

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896559

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896559

Country of ref document: EP

Kind code of ref document: A1