WO2022247664A1 - Graphical interface display method, electronic device, medium, and program product - Google Patents

Graphical interface display method, electronic device, medium, and program product Download PDF

Info

Publication number
WO2022247664A1
WO2022247664A1 PCT/CN2022/092872 CN2022092872W WO2022247664A1 WO 2022247664 A1 WO2022247664 A1 WO 2022247664A1 CN 2022092872 W CN2022092872 W CN 2022092872W WO 2022247664 A1 WO2022247664 A1 WO 2022247664A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
content
target
protection
interface
Prior art date
Application number
PCT/CN2022/092872
Other languages
French (fr)
Chinese (zh)
Inventor
杜奕全
邓勐
杨晓
李凯
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022247664A1 publication Critical patent/WO2022247664A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Definitions

  • the present disclosure generally relates to the field of information technology, and more particularly relates to a graphical interface display method, electronic equipment, computer-readable storage medium, and computer program products.
  • typical information protection methods include app lock, private space, artificial intelligence (AI) to hide notification content, etc.
  • AI artificial intelligence
  • traditional user information protection methods cannot effectively prevent information from being peeped, and how to further improve information security is still the key to improving user experience.
  • a graphical interface display method, an electronic device, a medium, and a program product are provided, which can protect user information so that the user information cannot be viewed by unauthorized users, thereby enhancing the security of the electronic device, And significantly improved user experience.
  • a graphical interface display method is provided.
  • a user interface UI is displayed on the screen of the electronic device; a protection operation associated with the UI is detected; and in response to detecting the protection operation, making at least a part of the UI The associated content does not display properly on said screen.
  • user information can be protected so that the user information cannot be viewed by unauthorized users, thereby enhancing the security of the electronic device and significantly improving user experience.
  • the content associated with at least a portion of the UI includes at least one of: content displayed by at least a portion of the UI, and content accessed via at least a portion of the UI. In this way, content currently displayed by the UI and/or content further accessed via the content currently displayed by the UI can be protected, thereby enhancing security of the electronic device and significantly improving user experience.
  • the protection operation includes: an element protection operation for protecting UI elements in the UI, and the element protection operation prevents the content associated with the UI element from being displayed normally, or protects the UI element
  • the UI is protected by an interface protection operation, and the interface protection operation prevents at least a part of the content of the UI from being displayed normally. In this way, user information can be protected at the granularity of the UI or at the granularity of UI elements in the UI, thereby enhancing the security of the electronic device and significantly improving user experience.
  • the protection operation is the element protection operation
  • preventing the content from being displayed normally includes: determining a target UI element corresponding to the element protection operation based on the element protection operation; The content associated with the target UI element cannot be displayed normally. In this way, the target UI element can be easily determined and protected, thereby enhancing the flexibility of information protection and improving user experience.
  • the element protection operation includes a control display operation and a selection operation
  • the determining the target UI element corresponding to the element protection operation based on the element protection operation includes: based on the control display operation, in Displaying on the screen an element protection control corresponding to at least one UI element included in the UI; and based on the selection operation, determining the UI element corresponding to the element protection control on which the selection operation acts as the target UI elements.
  • preventing the content associated with the target UI element from being displayed normally includes: determining a mode in which the target UI element is to be protected, and the mode indicates at least one of the following: making the content blurring, and preventing access to the content via the target UI element; and disabling normal display of the content associated with the target UI element based on the pattern.
  • different protection modes can be applied to different UI elements, thereby enhancing the flexibility of information protection, thereby improving user experience.
  • preventing the content associated with the target UI element from being displayed normally includes: blurring the content.
  • obscuring the content may include obscuring content displayed by the target UI element itself and/or obscuring content accessed via the target UI element. In this manner, unauthorized users cannot clearly view the content that the user desires to protect.
  • preventing the content associated with the target UI element from being displayed normally includes: preventing access to the content via the target UI element.
  • preventing access to content via the target UI element may include making the target UI element inoperable by a user, and/or making the target UI element no longer responsive to user manipulation. In this manner, unauthorized users are rendered inaccessible to content that the user desires to protect.
  • the protection operation is the element protection operation
  • the method further includes: detecting an unprotect operation on the target UI element; and in response to detecting the unprotect operation, interacting with The content associated with the target UI element is normally displayed. In this way, the protection of the content can be released, enabling the user to view desired content.
  • enabling the normal display of the content associated with the target UI element includes: verifying the identity of the user who initiates the unprotecting operation; The described content associated with the element is displayed normally. In this manner, an authorized user whose authentication is successful is enabled to view desired content.
  • the protection operation is the interface protection operation, and making the all contents of the UI unable to be displayed normally includes: blurring the all contents of the UI. In this manner, unauthorized users cannot clearly view the content that the user desires to protect.
  • the protection operation is the interface protection operation
  • the method further includes: detecting an unprotect operation acting on the UI; in response to detecting the unprotect operation, determining the target area indicated by the location where the unprotect operation occurred; and causing the target area to be displayed normally. In this way, the protection of the content can be released, enabling the user to view desired content.
  • the unprotecting operation is a click operation
  • the UI includes at least one window
  • determining the target area includes: determining the target window where the click operation occurs in the at least one window as the target area. In this way, the protection of the clicked window can be released, so that the user can easily view his desired content by clicking.
  • the unprotecting operation is an area drawing operation
  • determining the target area includes: determining a part of the UI surrounded by the area drawing operation as the target area. For example, a user can draw a target area by a predetermined shape. Alternatively, the user can freely draw the target area arbitrarily. In this way, it is possible to release the protection of the part in the circle, so that the user can easily view his desired content through the area drawing operation.
  • the unprotecting operation is a sliding wiping operation
  • determining the target area includes: determining a part of the UI where the sliding wiping operation occurs as the target area. In this way, the protection of the wiped portion can be released, so that the user can easily view his desired content through the wiping operation.
  • an electronic device in a second aspect of the present disclosure, includes a processor and a memory storing instructions, wherein the instructions cause the electronic device to execute any method according to the first aspect and its implementation manner when executed by the processor.
  • a computer readable storage medium stores instructions, wherein the instructions cause the electronic device to execute any method according to the first aspect and its implementations when executed by the processor.
  • a computer program product comprises instructions, wherein the instructions, when executed by the processor, cause the electronic device to perform any method according to the first aspect and implementations thereof.
  • FIGS. 1A to 1B show schematic diagrams of a hardware structure and a software structure of an electronic device that can implement an embodiment of the present disclosure.
  • FIG. 2 shows a block diagram of another electronic device in which embodiments of the present disclosure may be implemented.
  • 3A-3I illustrate schematic diagrams of a first example of a UI associated with an element protection operation, according to some embodiments of the present disclosure.
  • 4A-4L illustrate schematic diagrams of a second example of a UI associated with an element protection operation, according to some embodiments of the present disclosure.
  • 5A-5P illustrate diagrams illustrating a third example of a UI associated with an element protection operation according to some embodiments of the present disclosure.
  • 6A-6D show diagrams of a fourth example of UI associated with interface protection operations according to some embodiments of the present disclosure.
  • FIGS. 7A-7E show diagrams of a fifth example of UI associated with an interface protection operation according to some embodiments of the present disclosure.
  • FIGS. 8A-8E are diagrams showing a sixth example of UI associated with an interface protection operation according to some embodiments of the present disclosure.
  • FIGS. 9A-9E show diagrams of a seventh example of UI associated with an interface protection operation according to some embodiments of the present disclosure.
  • FIGS. 10A-10E are diagrams showing an eighth example of UI associated with an interface protection operation according to some embodiments of the present disclosure.
  • Fig. 11 shows a flowchart of a graphical interface display method according to an embodiment of the present disclosure.
  • Fig. 12 shows a schematic diagram of a system architecture according to an embodiment of the present disclosure.
  • Fig. 13 shows a schematic diagram of a partial sharpening architecture according to an embodiment of the present disclosure.
  • Figure 14 shows a schematic diagram of physical elements according to an embodiment of the disclosure.
  • the term “comprise” and its variants mean open inclusion, ie “including but not limited to”.
  • the term “or” means “and/or” unless otherwise stated.
  • the term “based on” means “based at least in part on”.
  • the terms “embodiments” and “some embodiments” mean “at least some embodiments.”
  • the terms “first”, “second” and other descriptions are used to distinguish different objects, etc., and do not represent a sequence, nor do they limit that "first” and “second” are different types.
  • UI refers to the interface where the user interacts with the application program or the operating system and exchanges information, which realizes the conversion between the internal form of information and the form acceptable to the user.
  • the UI of an application program is source code written in a specific computer language such as java and extensible markup language (XML). , such as pictures, text, buttons and other UI elements.
  • the attributes and contents of the UI elements in the UI are defined by tags or nodes.
  • XML specifies the UI elements included in the UI through nodes such as ⁇ Textview>, ⁇ ImgView>, and ⁇ VideoView>.
  • a node corresponds to a UI element or attribute in the UI. After the node is parsed and rendered, it is presented as the content visible to the user.
  • the UI of many applications such as hybrid applications, usually includes web pages.
  • a web page can be understood as a special UI element embedded in the application UI.
  • a web page is a source code written in a specific computer language, such as hypertext markup language (hyper text markup language, HTML), cascading style sheets (cascading style sheets) , CSS), java script (JavaScript, JS), etc.
  • the source code of the webpage can be loaded and displayed as user-identifiable content by a browser or a webpage display component similar in function to the browser.
  • the specific content contained in the webpage is also defined by the tags or nodes in the source code of the webpage.
  • HTML defines the elements and attributes of the webpage through ⁇ p>, ⁇ img>, ⁇ video>, and ⁇ canvas>.
  • UI element used in this article includes but is not limited to: window (window), scroll bar (scrollbar), table view (tableview), button (button), menu bar (menu bar), text box (text box) , navigation bar, toolbar (toolbar), image (image), static text (tatictext), component (Widget) and other visual UI elements.
  • the application lock can only prevent unauthorized users from entering the application to view the content of the application, the protection scenario is single, and it cannot prevent the leakage of application content in real time.
  • the application lock can only protect the content of the entire application, but cannot individually protect the content of a certain control or page in the application.
  • the private space can only prevent unauthorized users from entering the private space, the protection scene is single, and it cannot prevent the leakage of the private space in real time.
  • AI hiding notification content can only protect message notification scenarios, but cannot protect other scenarios.
  • Embodiments of the present disclosure relate to applying a protection operation to content associated with at least a part of the UI, so that the content cannot be displayed normally on the screen.
  • protection operations include element protection operations and interface protection operations.
  • element protection operation the method of protecting controls and layouts is adopted to realize the protection of partial content. For example, when a user is using a certain application, he may not want others to see a certain control or layout, in this case, the user can use element protection operations to protect these contents. After these contents are protected, specific controls or layouts within the app need to be verified by password, fingerprint, face, etc.
  • the electronic device only displays a part of the UI, while other parts cannot be displayed normally, such as blurring, so as to realize information protection.
  • the desired protected content of the electronic device can be protected from being leaked in real time, thereby enhancing the security of the electronic device and significantly improving user experience.
  • FIG. 1A shows a schematic diagram of a hardware structure of an electronic device 100 that can implement an embodiment of the present disclosure.
  • the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charging management module 140, a power management module 141, and a battery 142 , antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone jack 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193 , a display screen 194, and a subscriber identification module (subscriber identification module, SIM) card interface 195, etc.
  • SIM subscriber identification module
  • the sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, bone conduction sensor 180M, etc.
  • the structures shown in the embodiments of the present disclosure do not constitute a specific limitation on the electronic device 100 .
  • the electronic device 100 may include more or fewer components than shown, or combine some components, or separate some components, or arrange different components.
  • the illustrated components can be realized in hardware, software or a combination of software and hardware.
  • the processor 110 may include one or more processing units, for example: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc. Wherein, different processing units may be independent devices, or may be integrated in one or more processors.
  • the controller can generate an operation control signal according to the instruction opcode and timing signal, and complete the control of fetching and executing the instruction.
  • a memory may also be provided in the processor 110 for storing instructions and data.
  • the memory in processor 110 is a cache memory.
  • the memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated access is avoided, and the waiting time of the processor 110 is reduced, thereby improving the efficiency of the system.
  • processor 110 may include one or more interfaces.
  • the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transmitter (universal asynchronous receiver/transmitter, UART) interface, mobile industry processor interface (mobile industry processor interface, MIPI), general-purpose input and output (general-purpose input/output, GPIO) interface, subscriber identity module (subscriber identity module, SIM) interface, and /or universal serial bus (universal serial bus, USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • PCM pulse code modulation
  • UART universal asynchronous transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input and output
  • subscriber identity module subscriber identity module
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus, including a serial data line (serial data line, SDA) and a serial clock line (derail clock line, SCL).
  • processor 110 may include multiple sets of I2C buses.
  • the processor 110 may be respectively coupled to the touch sensor 180K, the charger, the flashlight, the camera 193 and the like through different I2C bus interfaces.
  • the processor 110 may be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 communicates with the touch sensor 180K through the I2C bus interface to realize the touch function of the electronic device 100 .
  • the I2S interface can be used for audio communication.
  • processor 110 may include multiple sets of I2S buses.
  • the processor 110 may be coupled to the audio module 170 through an I2S bus to implement communication between the processor 110 and the audio module 170 .
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface, so as to realize the function of answering calls through the Bluetooth headset.
  • the PCM interface can also be used for audio communication, sampling, quantizing and encoding the analog signal.
  • the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
  • the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is generally used to connect the processor 110 and the wireless communication module 160 .
  • the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to realize the Bluetooth function.
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.
  • the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
  • MIPI interface includes camera serial interface (camera serial interface, CSI), display serial interface (display serial interface, DSI), etc.
  • the processor 110 communicates with the camera 193 through the CSI interface to realize the shooting function of the electronic device 100 .
  • the processor 110 communicates with the display screen 194 through the DSI interface to realize the display function of the electronic device 100 .
  • the GPIO interface can be configured by software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface can be used to connect the processor 110 with the camera 193 , the display screen 194 , the wireless communication module 160 , the audio module 170 , the sensor module 180 and so on.
  • the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 130 is an interface conforming to the USB standard specification, specifically, it may be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 130 can be used to connect a charger to charge the electronic device 100 , and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones and play audio through them. This interface can also be used to connect other electronic devices, such as AR devices.
  • the interface connection relationship among the modules shown in the embodiments of the present disclosure is only for schematic illustration, and does not constitute a structural limitation of the electronic device 100 .
  • the electronic device 100 may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.
  • the charging management module 140 is configured to receive a charging input from a charger.
  • the charger may be a wireless charger or a wired charger.
  • the charging management module 140 can receive charging input from the wired charger through the USB interface 130 .
  • the charging management module 140 may receive a wireless charging input through a wireless charging coil of the electronic device 100 . While the charging management module 140 is charging the battery 142 , it can also supply power to the electronic device 100 through the power management module 141 .
  • the power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 .
  • the power management module 141 receives the input of the battery 142 and/or the charging management module 140, and supplies power for the processor 110, the internal memory 121, the display screen 194, the camera 193, and the wireless communication module 160, etc.
  • the power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, and battery health status (leakage, impedance).
  • the power management module 141 may also be disposed in the processor 110 .
  • the power management module 141 and the charging management module 140 may also be set in the same device.
  • the wireless communication function of the electronic device 100 may be realized by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in electronic device 100 may be used to cover single or multiple communication frequency bands. Different antennas can also be multiplexed to improve the utilization of the antennas.
  • antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G/6G applied on the electronic device 100 .
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA) and the like.
  • the mobile communication module 150 can receive electromagnetic waves through the antenna 1, filter and amplify the received electromagnetic waves, and send them to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signals modulated by the modem processor, and convert them into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the mobile communication module 150 may be set in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be set in the same device.
  • a modem processor may include a modulator and a demodulator.
  • the modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator sends the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the low-frequency baseband signal is passed to the application processor after being processed by the baseband processor.
  • the application processor outputs a sound signal through an audio device (not limited to a speaker 170A, a receiver 170B, etc.), or displays an image or video through a display screen 194 .
  • the modem processor may be a stand-alone device. In some other embodiments, the modem processor may be independent from the processor 110, and be set in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide wireless local area network (wireless local area networks, WLAN) (such as wireless fidelity (wireless fidelity, Wi-Fi) network), bluetooth (Bluetooth, BT), global navigation satellite Wireless communication solutions such as global navigation satellite system (GNSS), frequency modulation (FM), near field communication (NFC), and infrared technology (IR).
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency-modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110 , frequency-modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
  • the antenna 1 of the electronic device 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (long term evolution, LTE), 5G and subsequent evolution standards, BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc.
  • GSM global system for mobile communications
  • GPRS general packet radio service
  • code division multiple access code division multiple access
  • CDMA broadband Code division multiple access
  • WCDMA wideband code division multiple access
  • TD-SCDMA time-division code division multiple access
  • LTE long term evolution
  • 5G and subsequent evolution standards BT, GNSS,
  • GNSS can include global positioning system (global positioning system, GPS), global navigation satellite system (global navigation satellite system, GLONASS), Beidou satellite navigation system (beidou navigation satellite system, BDS), quasi-zenith satellite system (quasi- zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • Beidou satellite navigation system beidou navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the electronic device 100 realizes the display function through the GPU, the display screen 194 , and the application processor.
  • the GPU is a microprocessor for image processing, and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
  • the display screen 194 is used to display images, videos and the like.
  • the display screen 194 includes a display panel.
  • the electronic device 100 may include 1 or N display screens 194 , where N is a positive integer greater than 1.
  • the electronic device 100 can realize the shooting function through the ISP, the camera 193 , the video codec, the GPU, the display screen 194 , and the application processor.
  • the ISP is used for processing the data fed back by the camera 193 .
  • the light is transmitted to the photosensitive element of the camera through the lens, and the light signal is converted into an electrical signal, and the photosensitive element of the camera transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye.
  • ISP can also perform algorithm optimization on image noise, brightness, and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene.
  • the ISP may be located in the camera 193 .
  • Camera 193 is used to capture still images or video.
  • the object generates an optical image through the lens and projects it to the photosensitive element.
  • the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the light signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
  • the ISP outputs the digital image signal to the DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other image signals.
  • the electronic device 100 may include 1 or N cameras 193 , where N is a positive integer greater than 1.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
  • Video codecs are used to compress or decompress digital video.
  • the electronic device 100 may support one or more video codecs.
  • the electronic device 100 can play or record videos in various encoding formats, for example, moving picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
  • the NPU is a neural-network (NN) computing processor.
  • NN neural-network
  • Applications such as intelligent cognition of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, and the like.
  • the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, so as to expand the storage capacity of the electronic device 100.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. Such as saving music, video and other files in an external memory card.
  • the internal memory 121 may be used to store computer-executable program codes including instructions.
  • the internal memory 121 may include an area for storing programs and an area for storing data.
  • the stored program area can store an operating system, at least one application program required by a function (such as a sound playing function, an image playing function, etc.) and the like.
  • the storage data area can store data created during the use of the electronic device 100 (such as audio data, phonebook, etc.) and the like.
  • the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (universal flash storage, UFS) and the like.
  • the processor 110 executes various functional applications and data processing of the electronic device 100 by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
  • the electronic device 100 can implement audio functions through the audio module 170 , the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • the SIM card interface 195 is used for connecting a SIM card.
  • the SIM card can be connected and separated from the electronic device 100 by inserting it into the SIM card interface 195 or pulling it out from the SIM card interface 195 .
  • the electronic device 100 may support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
  • SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card etc. Multiple cards can be inserted into the same SIM card interface 195 at the same time. The types of the multiple cards may be the same or different.
  • the SIM card interface 195 is also compatible with different types of SIM cards.
  • the SIM card interface 195 is also compatible with external memory cards.
  • the electronic device 100 interacts with the network through the SIM card to implement functions such as calling and data communication.
  • the electronic device 100 adopts an eSIM, that is, an embedded SIM card.
  • the eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100 .
  • the software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a micro-kernel architecture, a micro-service architecture, or a cloud architecture.
  • the embodiments of the present disclosure take a mobile operating system with a layered architecture as an example to illustrate the software structure of the electronic device 100 .
  • FIG. 1B is a schematic diagram of the software structure of the electronic device 100 according to the embodiment of the present disclosure.
  • the layered architecture divides the software into several layers, and each layer has a clear role and division of labor. Layers communicate through software interfaces.
  • the operating system can be divided into four layers, which are application program layer, application program framework layer, operating system runtime (runtime) and system library, and kernel layer from top to bottom.
  • the application layer can consist of a series of application packages. As shown in FIG. 1B , the application package may include application programs such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, and short message.
  • application programs such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, and short message.
  • the application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer.
  • the application framework layer includes some predefined functions.
  • the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and the like.
  • a window manager is used to manage window programs. The window manager can get the size of the display screen, determine whether there is a status bar, lock the screen, capture the screen, etc.
  • Content providers are used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebook, and the like.
  • the view system includes visual controls, such as controls that display text, controls that display images, and so on. The view system can be used to build applications.
  • a display interface can consist of one or more views.
  • a display interface including a notification icon of a short message may include a view for displaying text and a view for displaying images.
  • the phone manager is used to provide communication functions of the electronic device 100 . For example, the management of call status (including connected, hung up, etc.).
  • the resource manager provides various resources to the application, such as localized strings, icons, images, layout files, video files, etc.
  • the notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages, and can automatically disappear after a short stay without user interaction. For example, the notification manager is used to notify the download completion, message reminder, etc.
  • the notification manager can also be a notification that appears on the top status bar of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, issuing a prompt sound, vibrating the electronic device, and flashing the indicator light, etc.
  • the operating system runtime includes a core library and a virtual machine.
  • the core library consists of two parts, one part is the function function that the Java language needs to call, and the other part is the core library of the operating system.
  • the application layer and the application framework layer run in virtual machines.
  • the virtual machine executes the Java files of the application program layer and the application program framework layer as binary files.
  • the virtual machine is used to perform functions such as object life cycle management, stack management, thread management, security and exception management, and garbage collection.
  • a system library can include multiple function modules. For example, surface manager (surface manager), media library (Media Libraries), 3D graphics processing library (such as OpenGL ES), 2D graphics engine (such as: SGL), etc.
  • the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of various commonly used audio and video formats, as well as still image files, etc.
  • the media library can support multiple audio and video encoding formats, such as MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing, etc.
  • 2D graphics engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer includes at least a display driver, a camera driver, an audio driver, and a sensor driver.
  • FIG. 2 shows a block diagram of another electronic device 200 that may implement embodiments of the present disclosure.
  • electronic device 200 may be in the form of a general-purpose computing device.
  • Components of electronic device 200 may include, but are not limited to, one or more processors or processing units 210, memory 220, storage device 230, one or more communication units 240, one or more input devices 250, and one or more output devices 260.
  • the processing unit 210 may be an actual or virtual processor and is capable of performing various processes according to programs stored in the memory 220 . In a multi-processor system, multiple processing units execute computer-executable instructions in parallel to increase the parallel processing capability of the electronic device 200 .
  • Electronic device 200 typically includes a plurality of computer storage media. Such media can be any available media that is accessible to electronic device 200, including but not limited to, volatile and nonvolatile media, removable and non-removable media.
  • Memory 220 can be volatile memory (eg, registers, cache, random access memory (RAM), nonvolatile memory (eg, read only memory (ROM), electrically erasable programmable read only memory (EEPROM) , flash memory) or some combination of them.
  • Storage device 230 may be removable or non-removable media, and may include machine-readable media, such as flash drives, magnetic disks, or any other media that may be capable of storing information and/or data (e.g., training data for training) ) and can be accessed within the electronic device 200.
  • the electronic device 200 may further include additional detachable/non-detachable, volatile/nonvolatile storage media.
  • a disk drive for reading from or writing to a removable, nonvolatile disk such as a "floppy disk"
  • a disk drive for reading from a removable, nonvolatile disk may be provided.
  • CD-ROM drive for reading or writing.
  • each drive may be connected to the bus (not shown) by one or more data media interfaces.
  • the memory 220 may include a computer program product 225 having one or more program modules configured to execute the object editing method or process of the embodiments of the present disclosure.
  • the communication unit 240 enables communication with other computing devices through communication media. Additionally, the functions of the components of the electronic device 200 may be implemented in a single computing cluster or as a plurality of computing machines capable of communicating via communication links. Accordingly, electronic device 200 may operate in a networked environment using logical connections to one or more other servers, a network personal computer (PC), or another network node.
  • PC network personal computer
  • the input device 250 may be one or more input devices, such as a mouse, keyboard, trackball, and the like.
  • Output device 260 may be one or more output devices, such as a display, speakers, printer, or the like.
  • the output device 260 may include a touch screen having a touch sensor, which may receive a user's touch input.
  • the electronic device 200 can also communicate with one or more external devices (not shown) through the communication unit 240 as required, such as storage devices, display devices, etc., and one or more devices that enable the user to interact with the electronic device 200 communicate with, or communicate with, any device (eg, network card, modem, etc.) that enables electronic device 200 to communicate with one or more other computing devices. Such communication may be performed via an input/output (I/O) interface (not shown).
  • I/O input/output
  • the embodiments of the present disclosure relate to applying a protection operation to content associated with at least a part of the UI, so that the content cannot be displayed normally on the screen.
  • the content associated with at least a portion of the UI is content displayed by at least a portion of the UI (e.g., a setting in a list of settings options), and/or content accessed via at least a portion of the UI (For example, the setting interface displayed after clicking the setting).
  • the protection operation includes an element protection operation and an interface protection operation.
  • the element protection operation the method of protecting controls and layouts is adopted to realize the protection of partial content.
  • the interface protection operation the electronic device only displays a part of the UI, while other parts cannot be displayed normally, such as blurring, so as to realize information protection. For this reason, an example UI associated with an element protection operation will be described below with reference to FIGS. 3A-5P , and an example UI associated with an interface protection operation will be described with reference to FIGS. 6A-10E .
  • the electronic device may detect an element protection operation associated with the UI.
  • the electronic device can determine the target UI element corresponding to the element protection operation based on the element protection operation, and prevent the content associated with the target UI element from being displayed normally.
  • the electronic device can monitor whether the user triggers an element protection operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If an element protection operation is detected, the electronic device may disable content associated with at least a portion of the UI from being properly displayed on the screen.
  • element protection operations may include control display operations and selection operations.
  • the electronic device may display an element protection control corresponding to at least one UI element included in the UI on the screen based on the control display operation.
  • the electronic device may determine, based on the selection operation, the UI element corresponding to the element protection control on which the selection operation acts as the target UI element. For example, the electronic device may monitor whether the user triggers a control display operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If a control display operation is detected, the electronic device may display an element protection control corresponding to at least one UI element included in the UI on the screen.
  • the electronic device may detect a selection operation acting on the element protection control, such as any appropriate action such as clicking, double-clicking, long pressing, or a specific voice command, and determine the UI element corresponding to the element protection control on which the selection operation acts as the target UI element, Thereby, the selection of the target UI element is realized. If a selection operation is detected, the electronic device may disable normal display of content associated with the target UI element.
  • a selection operation acting on the element protection control such as any appropriate action such as clicking, double-clicking, long pressing, or a specific voice command
  • the electronic device may determine a mode in which to protect the target UI element. Modes may indicate to obscure content, or prevent content from being accessed via targeted UI elements. For example, in order to prevent content from being accessed via the target UI element, the user may not be able to operate the target UI element, such as graying out or hiding the target UI element, so that the user cannot click on the target UI element. Alternatively, it is also possible to make the target UI element no longer affect user operations, such as no longer displaying the content that will be displayed after clicking the target UI element, or no longer jumping to the target UI element that will be jumped to after clicking the target UI element. content.
  • the electronic device may disable normal display of content associated with the target UI element based on the determined pattern.
  • the mode for protecting the target UI element may also be predetermined, so the electronic device does not need to further determine the mode for protecting the target UI element.
  • the user desires to protect a certain UI element, he can make the UI element enter the protected state by clicking the element protection control corresponding to the UI element, so that the content of the UI element, or via the UI element Accessed content cannot be displayed properly.
  • the electronic device may obscure the content of the UI element, obscure content accessed via the UI element, or render inaccessible content via the UI element. Thereby, information protection can be realized.
  • the electronic device may also detect an unprotection operation acting on the target UI element. If an unprotect operation is detected, the electronic device may cause the content associated with the target UI element to be displayed normally. In some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiates the unprotection operation. If the authentication is successful, the electronic device can cause the content associated with the target UI element to be displayed normally. For example, if a user wants to view the content associated with a UI element that has entered a protected state, he can trigger an unprotected verification interface (e.g., password, fingerprint, identity, etc.) face, etc. any appropriate verification method).
  • an unprotected verification interface e.g., password, fingerprint, identity, etc.
  • the electronic device may cause the UI element to leave the protected state, so as to normally display the content associated with the UI element. For example, the electronic device may restore clarity to the content of the UI element, restore clarity to content accessed via the UI element, or enable access to content via the UI element. In this way, information release protection can be realized.
  • 3A-3I show schematic diagrams of a first example of UIs 300A-300I associated with element protection operations, according to some embodiments of the present disclosure. Specifically, in the example of FIGS. 3A-3I , the scene of protecting the content of the control is shown.
  • UI 300A may include a plurality of UI elements, such as UI element 330 and UI elements 340-1 to 340-7 (hereinafter collectively referred to as "UI elements 340").
  • UI 300A may be a message interface of an instant messaging application, in which case UI element 330 may be a control to open a list of additional operations or a control to add a new message, while UI element 340 may be a message from a different sender.
  • UI 300A may be a setting interface of an electronic device, in which case UI element 300 may be a control to open an additional operation list or a control to add a new setting, and UI element 340 may be a different setting option.
  • UI 300A and UI elements 330 and 340 are examples only, and in fact the UI may be any suitable interface and the UI elements may be any suitable controls.
  • UI element used in this article includes but is not limited to: window (window), scroll bar (scrollbar), table view (tableview), button (button), menu bar (menu bar), text box (text box), navigation bar, toolbar (toolbar), image (image), static text (tatictext), component (Widget) and other visual UI elements.
  • the electronic device may detect an element protection operation associated with the UI.
  • element protection operations may include control display operations and selection operations.
  • the electronic device may monitor whether the user triggers a control display operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If a control display operation is detected, as shown in FIG. 3C , the electronic device may display on the screen an element protection control corresponding to at least one UI element included in the UI, for example, corresponding to UI elements 340-1 to 340-7.
  • Element protection controls 310 - 1 to 310 - 7 (hereinafter collectively referred to as “element protection controls 310 ”), and an element protection control 320 corresponding to UI element 330 .
  • element protection controls 310 and 320 are examples only, and in fact, the element protection controls may have any suitable shape, size, and location.
  • element protection controls corresponding to UI elements 330 and 340 are shown in FIG. 3C , the number of element protection controls is merely an example.
  • the electronic device may display more or fewer element protection controls, for example, the element protection control 320 corresponding to the UI element 330 may not be displayed, or more elements corresponding to the status bar of the electronic device (that is, the UI element at the top) may be displayed.
  • the element protection control corresponding to the status bar showing network, power, time and other information).
  • the electronic device may detect a selection operation acting on an element protection control corresponding to a target UI element in at least one UI element, such as any appropriate action such as clicking, double-clicking, long-pressing, or a specific voice command. If a selection operation is detected, the electronic device may disable the normal display of the content of the targeted UI element. For example, as shown in FIG. 3E, the user desires to protect UI element 340-3, and clicks on element protection control 310-3 corresponding to UI element 340-3. Thus, as shown in FIG.
  • the UI element 340-3 enters a protected state, so that the content of the UI element 340-3 cannot be displayed normally, for example, the content of the UI element 340-3 is blurred. Thereby, information protection can be realized. It should be understood that blurring is only an example of the failure to display normally. In fact, the content of the UI element can be prevented from being displayed normally by any appropriate means, such as covering with another image with appropriate transparency, disrupting the display order of the content of the UI element Wait.
  • the electronic device may also detect an unprotection operation acting on the target UI element. If an unprotection operation is detected, the electronic device may cause the content of the target UI element to be displayed normally. In some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiates the unprotection operation. If the authentication is successful, the electronic device can cause the content of the target UI element to be displayed normally. For example, as shown in Figure 3G, the user wants to view the content of the UI element 340-3 that has entered the protected state, and triggers the unprotection as shown in Figure 3H by long pressing, double-clicking on the UI element 340-3, etc.
  • the verification interface (for example, verification interface such as password, fingerprint, face, etc.).
  • the UI element 340-3 can be left in the protected state, so as to display the content of the UI element normally, as shown in FIG. 3I .
  • FIGS. 4A-4L show schematic diagrams of a second example of UIs 400A-400L associated with element protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 4A-4L , a scenario of protecting content accessed via controls is shown.
  • UI 400A may include a plurality of UI elements, such as UI element 430 and UI elements 440-1 to 440-7 (hereinafter collectively referred to as "UI elements 440").
  • UI 400A may be a message interface of an instant messaging application, in which case UI element 430 may be a control to open a list of additional operations or a control to add a new message, while UI element 440 may be a message from a different sender.
  • UI 400A may be a setting interface of an electronic device, in which case UI element 400 may be a control for opening an additional operation list or adding a new setting, and UI element 440 may be a different setting option.
  • UI 400A and UI elements 430 and 440 are examples only, and in fact the UI may be any suitable interface and the UI elements may be any suitable controls.
  • UI element used in this article includes but is not limited to: window (window), scroll bar (scrollbar), table view (tableview), button (button), menu bar (menu bar), text box (text box), navigation bar, toolbar (toolbar), image (image), static text (tatictext), component (Widget) and other visual UI elements.
  • the user wants to view content accessed via UI element 430 , for example, the user wants to open a list of additional operations and clicks on UI element 430 .
  • the electronic device displays a list of additional operations accessible via UI element 430 , such as a list of operations 1-3.
  • UI 400D may include a plurality of UI elements, such as UI element 430 and UI element 440.
  • the electronic device may detect element protection operations associated with the UI.
  • element protection operations may include control display operations and selection operations. For example, the electronic device may monitor whether the user triggers a control display operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If a control display operation is detected, as shown in FIG. 4F , the electronic device may display on the screen an element protection control corresponding to at least one UI element included in the UI, for example, corresponding to UI elements 440-1 to 440-7.
  • Element protection controls 410 - 1 to 410 - 7 (hereinafter collectively referred to as “element protection controls 410 ”), and an element protection control 420 corresponding to UI element 430 .
  • element protection controls 410 and 420 are merely examples, and in fact, the element protection controls may have any suitable shape, size and location.
  • element protection controls corresponding to UI elements 430 and 440 are shown in FIG. 4F , the number of element protection controls is merely an example.
  • the electronic device may display more or fewer element protection controls, for example, may not display the element protection control 420 corresponding to the UI element 430, or may display more elements related to the status bar of the electronic device (that is, the topmost element of the UI).
  • the element protection control corresponding to the status bar showing network, power, time and other information).
  • the electronic device may detect a selection operation acting on an element protection control corresponding to a target UI element in at least one UI element, such as any appropriate action such as clicking, double-clicking, long-pressing, or a specific voice command. If a selection operation is detected, the electronic device may disable normal display of content accessed via the target UI element. For example, as shown in FIG. 4H , the user desires to protect the UI element 430 and clicks on the element protection control 420 corresponding to the UI element 430 . Thus, as shown in FIG.
  • the UI element 430 enters a protected state, so that the content accessed via the UI element 430 cannot be displayed normally, for example, the UI element 430 becomes a dotted line representation, and additional operations cannot be opened via the UI element 430 list. Thereby, information protection can be realized.
  • the dotted line represents only an example of the UI element entering the protected state. In fact, any appropriate method may be used to indicate that the UI element enters the protected state, such as replacing the UI element with another image, graying the UI element, etc.
  • the electronic device may also detect an unprotection operation acting on the target UI element. If an unprotect operation is detected, the electronic device may cause the content accessed via the target UI element to be displayed normally. In some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiates the unprotection operation. If the authentication is successful, the electronic device can cause the content accessed via the target UI element to display normally. For example, as shown in FIG. 4J, the user wants to view the content accessed via the UI element 430 entering the protected state, and triggers the verification of unprotection as shown in FIG. 4K by long pressing, double-clicking on the UI element 430, etc.
  • the UI element 430 may be caused to leave the protected state, and the list of additional operations accessed via the UI element 430 may be displayed normally, as shown in FIG. 4L .
  • 5A-5P illustrate diagrams of a third example of UIs 500A-500P associated with element protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 5A-5P , a scenario of protecting a layout accessed via a control is shown.
  • UI 500A may include multiple UI elements, such as controls associated with various smart devices and controls associated with Home, Mall, Smart, and My layouts or pages. It should be understood that UI 500A and the UI elements therein are merely examples, and in fact, the UI may be any suitable interface, and the UI elements may be any suitable controls.
  • UI element used in this article includes but is not limited to: window (window), scroll bar (scrollbar), table view (tableview), button (button), menu bar (menu bar), text box (text box), navigation bar, toolbar (toolbar), image (image), static text (tatictext), component (Widget) and other visual UI elements.
  • the user wants to view the content of the mall page, and clicks on the mall control.
  • the electronic device displays the content of the mall page.
  • UI 500D may include multiple UI elements, such as controls associated with various smart devices and controls associated with Home, Mall, Smart and My layouts or pages.
  • the electronic device may detect element protection operations associated with the UI.
  • element protection operations may include control display operations and selection operations. For example, the electronic device may monitor whether the user triggers a control display operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If the control display operation is detected, as shown in FIG.
  • the electronic device may display on the screen an element protection control corresponding to at least one UI element included in the UI, for example, corresponding to the home control, the mall control, the smart control and the personal control respectively.
  • the controls correspond to element protection controls 510-540. It should be understood that the shape, size, and location, etc. of the element protection controls 510-540 are examples only, and in fact, the element protection controls may have any suitable shape, size, and location. Further, although element protection controls respectively corresponding to the home control, mall control, smart control and my control are shown in FIG. 5F , the number of element protection controls is just an example.
  • the electronic device may display more or fewer element protection controls, for example, may not display the element protection control 510 corresponding to the home control, or may display more controls related to various smart devices (for example, the TV in the living room) ) corresponds to the element protection control.
  • the electronic device may detect a selection operation acting on an element protection control corresponding to a target UI element in at least one UI element, such as any appropriate action such as click, double click, long press, specific voice command, and the like. If a selection operation is detected, the electronic device may disable normal display of content accessed via the target UI element. For example, as shown in FIG. 5H , the user desires to protect the content accessed via the mall control, and clicks on the element protection control 520 corresponding to the mall control. Thus, as shown in FIG. 51 , the content accessed via the mall control enters a protected state, and causes the mall control to become a dotted line representation. In this case, as shown in FIG.
  • the dotted line represents only an example of the UI element entering the protected state.
  • any appropriate method may be used to indicate that the UI element enters the protected state, such as replacing the UI element with another image, graying the UI element, etc.
  • blurring is just an example of failure to display normally.
  • the content of UI elements can be prevented from displaying normally by any appropriate means, such as overlaying with another image with appropriate transparency, disrupting the display order of the content of UI elements Wait.
  • the electronic device may also detect an unprotection operation acting on the target UI element. If an unprotect operation is detected, the electronic device may cause the content accessed via the target UI element to be displayed normally. In some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiates the unprotection operation. If the authentication is successful, the electronic device can cause the content accessed via the target UI element to display normally. For example, a user wants to view content accessed via a mall control that has entered a protected state, and either long-presses, double-clicks on the mall control (as shown in Figure 5N), or content associated with the mall control (as shown in Figure 5M), etc.
  • Appropriate actions are taken to trigger the unprotected verification interface (for example, password, fingerprint, face, etc. verification interface) as shown in FIG. 50 .
  • the mall control can be made to leave the protected state, and the mall page accessed via the mall control can be displayed normally, as shown in FIG. 5P .
  • the electronic device may detect the interface protection operation associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as interface protection controls, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, when the user clicks the interface protection control, all or part of the content of the UI is blurred. In this case, for example, when a user is on public transportation such as a subway, other people cannot see the content of the UI, thereby achieving information protection.
  • the electronic device may also detect an unprotect operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotection operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area.
  • a part of the UI surrounded by the area drawing operation may be determined as a target area.
  • the user can draw the target area in a predetermined shape (eg, any suitable shape such as a circle, a rectangle, etc.).
  • a predetermined shape eg, any suitable shape such as a circle, a rectangle, etc.
  • the user can draw a target area by dragging, scaling a predetermined shape, etc. on the screen.
  • the target area may have a regular shape.
  • the user can draw the target area arbitrarily.
  • the target area may have an irregular shape.
  • the unprotecting operation is a sliding wiping operation
  • the part of the UI where the sliding wiping operation occurs may be determined as the target area.
  • FIGS. 6A-6D show diagrams of a fourth example of UIs 600A-600D associated with interface protection operations according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 6A-6D , a scene of a single floating window is shown.
  • the UI includes an interface protection control 610 , a floating window 620 and other background parts.
  • the electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as the interface protection control 610, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 6B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 610 . When the user clicks the interface protection control 610, as shown in FIG. 6C, at least a part of the content of the UI is blurred.
  • protected content is electronic device or user settable.
  • the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotection operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. For example, as shown in FIG. 6D , when the user clicks on the floating window 620, the electronic device may determine the floating window 620 as the target area for restoring normal display, so that the floating window 620 becomes clear again while continuing to maintain the UI. Other parts are blurred.
  • the electronic device when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
  • the identity of the user who initiated the unprotection operation for example, password, fingerprint, face verification, etc.
  • FIGS. 7A-7E show diagrams of a fifth example of UIs 700A-700E associated with interface protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 7A-7E , a scene with multiple floating windows is shown.
  • the UI includes an interface protection control 710, a floating window 720, a floating window 730, and other background parts.
  • the electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as interface protection controls 710, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 7B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 710 . When the user clicks the interface protection control 710, as shown in FIG. 7C, at least a part of the content of the UI is blurred.
  • protected content is electronic device or user settable.
  • the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotection operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. For example, as shown in FIG.
  • the electronic device may determine the floating window 720 as the target area for restoring normal display, so that the floating window 720 becomes clear again while continuing to maintain the UI.
  • Other parts are blurred.
  • the electronic device may determine the floating window 730 as the target area for restoring normal display, so that the floating window 730 becomes clear again while continuing to keep other parts of the UI blurred .
  • the electronic device when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
  • the identity of the user who initiated the unprotection operation for example, password, fingerprint, face verification, etc.
  • FIGS. 8A-8E show diagrams of sixth examples of UIs 800A-800E associated with interface protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 8A-8E , a split-screen scene is shown.
  • the UI includes an interface protection control 810, a split-screen window 820, a split-screen window 830, and other background parts.
  • the electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as the interface protection control 810, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 8B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 810 . When the user clicks the interface protection control 810, as shown in FIG.
  • At least a part of the content of the UI is blurred.
  • a user when a user is on public transportation such as a subway, other people cannot see the content of the UI, thereby achieving information protection.
  • FIG. 8C it is shown in FIG. 8C that all content of the UI is blurred, only a part of the content of the UI may be blurred, for example, only the split-screen windows 820 and 830 are blurred.
  • protected content is electronic device or user settable.
  • the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotecting operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. For example, as shown in FIG.
  • the electronic device when the user clicks on the split-screen window 820, the electronic device can determine the split-screen window 820 as the target area for restoring normal display, so that the split-screen window 820 becomes clear again, and at the same time continues to Keep the rest of the UI blurred.
  • the electronic device may determine the split-screen window 830 as the target area for restoring normal display, so that the split-screen window 830 becomes clear again while continuing to maintain the UI. Other parts are blurred.
  • the electronic device when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
  • the identity of the user who initiated the unprotection operation for example, password, fingerprint, face verification, etc.
  • FIGS. 9A-9E show diagrams of a seventh example of UIs 900A-900E associated with interface protection operations, according to some embodiments of the present disclosure. Specifically, in the example of FIGS. 9A-9E , parallel horizon scenarios are shown.
  • the UI includes an interface protection control 910 , a parallel horizon window 920 , a parallel horizon window 930 , and other background parts.
  • the electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as interface protection controls 910, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 9B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 910 . When the user clicks the interface protection control 910 , as shown in FIG.
  • At least a part of the content of the UI is blurred.
  • the content of the UI is shown to be blurred in FIG. 9C , only a part of the content of the UI may be blurred, for example, only the parallel horizon windows 920 and 930 are blurred.
  • protected content is electronic device or user settable.
  • the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotection operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. For example, as shown in FIG.
  • the electronic device may determine the parallel horizon window 920 as the target area for restoring normal display, so that the parallel horizon window 920 becomes clear again, and at the same time continue to Keep the rest of the UI blurred.
  • the electronic device may determine the parallel horizon window 930 as the target area for restoring normal display, so that the parallel horizon window 930 becomes clear again while continuing to maintain the UI.
  • Other parts are blurred.
  • the electronic device when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
  • the identity of the user who initiated the unprotection operation for example, password, fingerprint, face verification, etc.
  • FIGS. 10A-10E show diagrams of eighth examples of UIs 1000A-1000E associated with interface protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 10A-10E , partial content display scenarios are shown.
  • the UI includes an interface guard control 1010 and various other UI elements.
  • the electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as the interface protection control 1010, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 10B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 1010 . When the user clicks the interface protection control 1010, as shown in FIG. 10C , at least a part of the content of the UI is blurred.
  • protected content is electronic device or user settable.
  • the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally.
  • the electronic device may determine the part of the UI surrounded by the area drawing operation as the target area. For example, as shown in FIG. 10D , the user may use a finger to circle the target area 1020 on the screen, thereby making the target area 1020 clear again while continuing to keep other parts of the UI blurred.
  • the electronic device may determine a part of the UI where the sliding wiping operation occurs as the target area. For example, as shown in FIG. 10E , the user can wipe out the target area 1030 with a finger on the screen, thereby making the target area 1030 clear again while continuing to keep other parts of the UI blurred.
  • the target area 1020 is only an example, in fact, the user can circle any suitable area with a regular or irregular shape on the screen with a finger, and can wipe out any suitable area with a regular or irregular shape.
  • the electronic device when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
  • the identity of the user who initiated the unprotection operation for example, password, fingerprint, face verification, etc.
  • a flowchart of a graphical interface display method 1100 will be further described with reference to FIG. 11 .
  • the method 1100 may be executed by the electronic device 100 described above with reference to FIG. 1 or the electronic device 200 described with reference to FIG. 2 .
  • Method 1100 is described herein with reference to UIs 300A-1000E of FIGS. 3A-10E .
  • the UIs 300A-1000E are merely examples and the method 1100 may be applicable to any suitable interface, including but not limited to the UIs 300A-1000E.
  • a user interface UI is displayed on the screen of the electronic device.
  • the electronic device detects a protection operation associated with the UI.
  • the electronic device in response to detecting the protection operation, the electronic device disables content associated with at least a portion of the UI from being normally displayed on the screen. In this way, user information can be protected so that the user information cannot be viewed by unauthorized users, thereby enhancing the security of the electronic device and significantly improving user experience.
  • the content associated with at least a portion of the UI includes at least one of: content displayed by at least a portion of the UI, and content accessed via at least a portion of the UI. In this way, content currently displayed by the UI and/or content further accessed via the content currently displayed by the UI can be protected, thereby enhancing security of the electronic device and significantly improving user experience.
  • the protection operation includes: an element protection operation for protecting UI elements in the UI, and the element protection operation prevents the content associated with the UI element from being displayed normally, or protects the UI element
  • the UI is protected by an interface protection operation, and the interface protection operation prevents at least a part of the content of the UI from being displayed normally. In this way, user information can be protected at the granularity of the UI or at the granularity of UI elements in the UI, thereby enhancing the security of the electronic device and significantly improving user experience.
  • the protection operation is the element protection operation
  • preventing the content from being displayed normally includes: determining a target UI element corresponding to the element protection operation based on the element protection operation; The content associated with the target UI element cannot be displayed normally. In this way, the target UI element can be easily determined and protected, thereby enhancing the flexibility of information protection and improving user experience.
  • the element protection operation includes a control display operation and a selection operation
  • the determining the target UI element corresponding to the element protection operation based on the element protection operation includes: based on the control display operation, in Displaying on the screen an element protection control corresponding to at least one UI element included in the UI; and based on the selection operation, determining the UI element corresponding to the element protection control on which the selection operation acts as the target UI elements.
  • preventing the content associated with the target UI element from being displayed normally includes: determining a mode in which the target UI element is to be protected, and the mode indicates at least one of the following: making the content blurring, and preventing access to the content via the target UI element; and disabling normal display of the content associated with the target UI element based on the pattern.
  • different protection modes can be applied to different UI elements, thereby enhancing the flexibility of information protection, thereby improving user experience.
  • preventing the content associated with the target UI element from being displayed normally includes: blurring the content.
  • Obscuring the content may include obscuring content displayed by the target UI element itself and/or obscuring content accessed via the target UI element. In this manner, unauthorized users cannot clearly view the content that the user desires to protect.
  • preventing the content associated with the target UI element from being displayed normally includes: preventing access to the content via the target UI element. In this manner, unauthorized users are rendered inaccessible to content that the user desires to protect.
  • the protection operation is the element protection operation
  • the method further includes: detecting an unprotect operation on the target UI element; and in response to detecting the unprotect operation, interacting with The content associated with the target UI element is normally displayed. In this way, the protection of the content can be released, enabling the user to view desired content.
  • enabling the normal display of the content associated with the target UI element includes: verifying the identity of the user who initiates the unprotecting operation; The described content associated with the element is displayed normally. In this manner, an authorized user whose authentication is successful is enabled to view desired content.
  • the protection operation is the interface protection operation, and making the all contents of the UI unable to be displayed normally includes: blurring the all contents of the UI. In this manner, unauthorized users cannot clearly view the content that the user desires to protect.
  • the protection operation is the interface protection operation
  • the method further includes: detecting an unprotect operation acting on the UI; in response to detecting the unprotect operation, determining the target area indicated by the location where the unprotect operation occurred; and causing the target area to be displayed normally. In this way, the protection of the content can be released, enabling the user to view desired content.
  • the unprotecting operation is a click operation
  • the UI includes at least one window
  • determining the target area includes: determining the target window where the click operation occurs in the at least one window as the target area. In this way, the protection of the clicked window can be released, so that the user can easily view his desired content by clicking.
  • the unprotecting operation is an area drawing operation
  • determining the target area includes: determining a part of the UI surrounded by the area drawing operation as the target area. In this way, it is possible to unprotect the part in the circle, so that the user can easily view his desired content through an area drawing operation.
  • the unprotecting operation is a sliding wiping operation
  • determining the target area includes: determining a part of the UI where the sliding wiping operation occurs as the target area. In this way, the protection of the wiped portion can be released, so that the user can easily view his desired content through the wiping operation.
  • FIG. 12 shows a schematic diagram of a system architecture 1200 according to an embodiment of the present disclosure.
  • the display device and the touch device receive gesture events, trigger interrupts, and notify the display driver and the touch driver of the kernel layer 1220 to obtain gesture data.
  • the display driver and the touch driver receive interrupts, acquire gesture data, and convert the gesture data into gesture events and report them to the hardware abstraction layer 1230 , so that the hardware abstraction layer 1230 reports the gesture events to the framework layer 1240 .
  • Framework layer 1240 includes protection services 1245 .
  • the protection service 1245 is used to realize the graphical interface display proposed by the embodiments of the present disclosure, so as to realize information protection.
  • the protection service 1245 monitors gesture events, triggers protection functions, and displays element protection controls. Protection service 1245 monitors selection operations and determines the type of protection. Protection types include control protection and layout protection, as described above with reference to FIGS. 3A-5P .
  • the protection service 1245 protects the control or the layout, such as blurring the content of the control or the layout, or making the control gray so that the content cannot be accessed through the control. Further, the protection service 1245 monitors the unprotection operation, and invokes a verification interface (for example, a password, fingerprint, face, etc. verification interface). When the verification information is input by the user and the verification is successful, the protection service 1245 makes the content entering the protected state displayed normally.
  • a verification interface for example, a password, fingerprint, face, etc. verification interface
  • the protection service 1245 monitors the gesture event, triggers the protection function, and protects the UI, such as blurring all the contents of the UI. Further, the protection service 1245 monitors the unprotect operation and determines the type of the unprotect operation. Types of unprotect operations include tap, area draw, and swipe wipe, etc., as described above with reference to FIGS. 6A-10E . Additionally, protection service 1245 determines the multi-window type. The multi-window types include single floating window, multiple floating windows, split screen, parallel horizon, etc., as described above with reference to FIGS. 6A-10E .
  • the protection service 1245 determines the multi-window position, matches the gesture focus with the multi-window position, and makes the matched window display normally. Alternatively, the protection service 1245 determines the gesture drawing area or the gesture sliding wiping area, and makes the determined area displayed normally.
  • FIG. 13 shows a schematic diagram of a local clarification architecture 1300 according to an embodiment of the present disclosure.
  • the electronic device detects that the interface protection control is triggered, and obtains a screenshot of the UI.
  • the electronic device calls the canvas.drawBitmap function, and draws the protected UI according to the screenshot of the UI to overlay on the screen.
  • the electronic device displays the protected UI.
  • the electronic device monitors gesture events. In the event that an area drawing gesture is detected, the path.moveTo and path.lineTo functions are called at block 1340 . Whereas in the case where a swipe wipe gesture is detected, the paint.setStyle and paint.setStrokeWidth functions are called at block 1350 .
  • the electronic device calls an onDraw function to draw a partially cleared UI.
  • the electronic device displays the partially sharpened UI.
  • FIG. 14 shows a schematic diagram 1400 of physical elements according to an embodiment of the disclosure.
  • the physical elements involved in the embodiments of the present disclosure include a processor 1440 (for example, CPU, or GPU, etc.), a display device 1430 (for example, an LCD display, an LED display, or a CRT display, etc.), and a touch Device 1420 .
  • the user can display the UI on the screen of the electronic device, and operate various UI elements (for example, windows, controls, etc.) in the UI to control the display device to safely display information.
  • various UI elements for example, windows, controls, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present disclosure relates to a graphical interface display method, an electronic device, a computer-readable storage medium, and a computer program product. According to the described graphical interface display method, a user interface (UI) is displayed on a screen of an electronic device; a protection operation associated with the UI is detected; and in response to detecting the protection operation, enabling content that is associated with at least part of the UI to be unable to be normally displayed on the screen. According to the foregoing method, user information can be protected, allowing user information to not be viewed by an unauthorized user, thereby enhancing the security of an electronic device and significantly improving user experience.

Description

图形界面显示方法、电子设备、介质以及程序产品Graphical interface display method, electronic device, medium and program product 技术领域technical field
本公开总体上涉及信息技术领域,并且更特别地涉及一种图形界面显示方法、电子设备、计算机可读存储介质以及计算机程序产品。The present disclosure generally relates to the field of information technology, and more particularly relates to a graphical interface display method, electronic equipment, computer-readable storage medium, and computer program products.
背景技术Background technique
随着电子设备的普及,信息安全及隐私保护越来越受到人们的关注。例如,典型的信息保护方式包括应用锁、隐私空间、人工智能(AI)隐藏通知内容等。但是,传统的用户信息保护方式并不能有效的防止信息被偷窥,如何进一步提高信息安全仍然是提高用户体验的关键。With the popularization of electronic devices, information security and privacy protection have attracted more and more attention. For example, typical information protection methods include app lock, private space, artificial intelligence (AI) to hide notification content, etc. However, traditional user information protection methods cannot effectively prevent information from being peeped, and how to further improve information security is still the key to improving user experience.
发明内容Contents of the invention
根据本公开的一些实施例,提供了一种图形界面显示方法、电子设备、介质以及程序产品,能够保护用户信息,使得用户信息不会被未授权用户查看,从而增强了电子设备的安全性,并且显著提高了用户体验。According to some embodiments of the present disclosure, a graphical interface display method, an electronic device, a medium, and a program product are provided, which can protect user information so that the user information cannot be viewed by unauthorized users, thereby enhancing the security of the electronic device, And significantly improved user experience.
在本公开的第一方面,提供了一种图形界面显示方法。根据第一方面的图形界面显示方法,在电子设备的屏幕上显示用户界面UI;检测与所述UI相关联的保护操作;以及响应于检测到所述保护操作,使与所述UI的至少一部分相关联的内容在所述屏幕上无法正常显示。以此方式,能够保护用户信息,使得用户信息不会被未授权用户查看,从而增强了电子设备的安全性,并且显著提高了用户体验。In a first aspect of the present disclosure, a graphical interface display method is provided. According to the graphical interface display method of the first aspect, a user interface UI is displayed on the screen of the electronic device; a protection operation associated with the UI is detected; and in response to detecting the protection operation, making at least a part of the UI The associated content does not display properly on said screen. In this way, user information can be protected so that the user information cannot be viewed by unauthorized users, thereby enhancing the security of the electronic device and significantly improving user experience.
在一些实现方式中,与所述UI的至少一部分相关联的内容包括以下至少一者:所述UI的至少一部分所显示的内容,和经由所述UI的至少一部分所访问的内容。以此方式,能够使UI当前显示的内容和/或经由UI当前显示的内容进一步访问的内容受保护,从而增强了电子设备的安全性,并且显著提高了用户体验。In some implementations, the content associated with at least a portion of the UI includes at least one of: content displayed by at least a portion of the UI, and content accessed via at least a portion of the UI. In this way, content currently displayed by the UI and/or content further accessed via the content currently displayed by the UI can be protected, thereby enhancing security of the electronic device and significantly improving user experience.
在一些实现方式中,所述保护操作包括:对所述UI中的UI元素进行保护的元素保护操作,所述元素保护操作使与所述UI元素相关联的内容无法正常显示,或对所述UI进行保护的界面保护操作,所述界面保护操作使所述UI的至少一部分内容无法正常显示。以此方式,能够在UI的粒度上或UI中的UI元素的粒度上保护用户信息,从而增强了电子设备的安全性,并且显著提高了用户体验。In some implementations, the protection operation includes: an element protection operation for protecting UI elements in the UI, and the element protection operation prevents the content associated with the UI element from being displayed normally, or protects the UI element The UI is protected by an interface protection operation, and the interface protection operation prevents at least a part of the content of the UI from being displayed normally. In this way, user information can be protected at the granularity of the UI or at the granularity of UI elements in the UI, thereby enhancing the security of the electronic device and significantly improving user experience.
在一些实现方式中,所述保护操作是所述元素保护操作,并且使所述内容无法正常显示包括:基于所述元素保护操作,确定与所述元素保护操作对应的目标UI元素;以及使与所述目标UI元素相关联的所述内容无法正常显示。以此方式,能够容易地确定目标UI元素,并且对目标UI元素进行保护,由此增强了信息保护的灵活性,从而提高了用户体验。In some implementations, the protection operation is the element protection operation, and preventing the content from being displayed normally includes: determining a target UI element corresponding to the element protection operation based on the element protection operation; The content associated with the target UI element cannot be displayed normally. In this way, the target UI element can be easily determined and protected, thereby enhancing the flexibility of information protection and improving user experience.
在一些实现方式中,所述元素保护操作包括控件显示操作和选择操作,并且所述基于所述元素保护操作确定与所述元素保护操作对应的目标UI元素包括:基于所述控件显示操作,在所述屏幕上显示与所述UI所包括的至少一个UI元素对应的元素保护控件;以及基于所述选择操作,将所述选择操作作用于的元素保护控件所对应的UI元素确定为所述目标UI元素。以此方式,能够通过元素保护控件直观地选择目标UI元素,并且对目标UI元素进行保护, 由此增强了信息保护的灵活性,从而提高了用户体验。In some implementations, the element protection operation includes a control display operation and a selection operation, and the determining the target UI element corresponding to the element protection operation based on the element protection operation includes: based on the control display operation, in Displaying on the screen an element protection control corresponding to at least one UI element included in the UI; and based on the selection operation, determining the UI element corresponding to the element protection control on which the selection operation acts as the target UI elements. In this manner, the target UI element can be intuitively selected through the element protection control, and the target UI element can be protected, thereby enhancing the flexibility of information protection, thereby improving user experience.
在一些实现方式中,使与所述目标UI元素相关联的所述内容无法正常显示包括:确定要对所述目标UI元素进行保护的模式,所述模式指示以下至少一者:使所述内容模糊,和防止经由所述目标UI元素访问所述内容;以及基于所述模式使与所述目标UI元素相关联的所述内容无法正常显示。以此方式,使得能够对不同UI元素应用不同的保护模式,由此增强了信息保护的灵活性,从而提高了用户体验。In some implementations, preventing the content associated with the target UI element from being displayed normally includes: determining a mode in which the target UI element is to be protected, and the mode indicates at least one of the following: making the content blurring, and preventing access to the content via the target UI element; and disabling normal display of the content associated with the target UI element based on the pattern. In this way, different protection modes can be applied to different UI elements, thereby enhancing the flexibility of information protection, thereby improving user experience.
在一些实现方式中,使与所述目标UI元素相关联的所述内容无法正常显示包括:使所述内容模糊。例如,使所述内容模糊可以包括使目标UI元素本身所显示的内容模糊和/或使经由目标UI元素访问的内容模糊。以此方式,使得未授权用户无法清楚地查看用户期望保护的内容。In some implementation manners, preventing the content associated with the target UI element from being displayed normally includes: blurring the content. For example, obscuring the content may include obscuring content displayed by the target UI element itself and/or obscuring content accessed via the target UI element. In this manner, unauthorized users cannot clearly view the content that the user desires to protect.
在一些实现方式中,使与所述目标UI元素相关联的所述内容无法正常显示包括:防止经由所述目标UI元素访问所述内容。例如,防止经由目标UI元素访问内容可以包括使得用户无法对目标UI元素进行操作,和/或使得目标UI元素不再对用户操作进行响应。以此方式,使得未授权用户无法访问用户期望保护的内容。In some implementations, preventing the content associated with the target UI element from being displayed normally includes: preventing access to the content via the target UI element. For example, preventing access to content via the target UI element may include making the target UI element inoperable by a user, and/or making the target UI element no longer responsive to user manipulation. In this manner, unauthorized users are rendered inaccessible to content that the user desires to protect.
在一些实现方式中,所述保护操作是所述元素保护操作,并且所述方法还包括:检测作用于所述目标UI元素的解除保护操作;以及响应于检测到所述解除保护操作,使与所述目标UI元素相关联的所述内容正常显示。以此方式,能够解除对内容的保护,使得用户能够查看期望的内容。In some implementations, the protection operation is the element protection operation, and the method further includes: detecting an unprotect operation on the target UI element; and in response to detecting the unprotect operation, interacting with The content associated with the target UI element is normally displayed. In this way, the protection of the content can be released, enabling the user to view desired content.
在一些实现方式中,使与所述目标UI元素相关联的所述内容正常显示包括:验证发起所述解除保护操作的用户的身份;以及响应于所述身份验证成功,使与所述目标UI元素相关联的所述内容正常显示。以此方式,使得身份验证成功的授权用户能够查看期望的内容。In some implementations, enabling the normal display of the content associated with the target UI element includes: verifying the identity of the user who initiates the unprotecting operation; The described content associated with the element is displayed normally. In this manner, an authorized user whose authentication is successful is enabled to view desired content.
在一些实现方式中,所述保护操作是所述界面保护操作,并且使所述UI的所述所有内容无法正常显示包括:使所述UI的所述所有内容模糊。以此方式,使得未授权用户无法清楚地查看用户期望保护的内容。In some implementation manners, the protection operation is the interface protection operation, and making the all contents of the UI unable to be displayed normally includes: blurring the all contents of the UI. In this manner, unauthorized users cannot clearly view the content that the user desires to protect.
在一些实现方式中,所述保护操作是所述界面保护操作,并且所述方法还包括:检测作用于所述UI的解除保护操作;响应于检测到所述解除保护操作,确定所述UI中的由发生所述解除保护操作的位置所指示的目标区域;以及使所述目标区域正常显示。以此方式,能够解除对内容的保护,使得用户能够查看期望的内容。In some implementations, the protection operation is the interface protection operation, and the method further includes: detecting an unprotect operation acting on the UI; in response to detecting the unprotect operation, determining the target area indicated by the location where the unprotect operation occurred; and causing the target area to be displayed normally. In this way, the protection of the content can be released, enabling the user to view desired content.
在一些实现方式中,所述解除保护操作是点击操作,所述UI包括至少一个窗口,并且确定所述目标区域包括:将所述至少一个窗口中发生所述点击操作的目标窗口确定为所述目标区域。以此方式,能够解除对被点击的窗口的保护,使得用户能够容易地通过点击而查看其期望的内容。In some implementations, the unprotecting operation is a click operation, the UI includes at least one window, and determining the target area includes: determining the target window where the click operation occurs in the at least one window as the target area. In this way, the protection of the clicked window can be released, so that the user can easily view his desired content by clicking.
在一些实现方式中,所述解除保护操作是区域绘制操作,并且确定所述目标区域包括:将所述UI中被所述区域绘制操作包围的部分确定为所述目标区域。例如,用户可以通过预定形状来绘制目标区域。备选地,用户也可以自由地任意绘制目标区域。以此方式,能够解除对圈中的部分的保护,使得用户能够容易地通过区域绘制操作而查看其期望的内容。In some implementations, the unprotecting operation is an area drawing operation, and determining the target area includes: determining a part of the UI surrounded by the area drawing operation as the target area. For example, a user can draw a target area by a predetermined shape. Alternatively, the user can freely draw the target area arbitrarily. In this way, it is possible to release the protection of the part in the circle, so that the user can easily view his desired content through the area drawing operation.
在一些实现方式中,所述解除保护操作是滑动擦拭操作,并且确定所述目标区域包括:将所述UI中发生所述滑动擦拭操作的部分确定为所述目标区域。以此方式,能够解除对被擦拭的部分的保护,使得用户能够容易地通过擦拭操作而查看其期望的内容。In some implementation manners, the unprotecting operation is a sliding wiping operation, and determining the target area includes: determining a part of the UI where the sliding wiping operation occurs as the target area. In this way, the protection of the wiped portion can be released, so that the user can easily view his desired content through the wiping operation.
在本公开的第二方面,提供了一种电子设备。电子设备包括处理器以及存储有指令的存储器,其中指令在被处理器执行时使得电子设备执行根据第一方面及其实现方式的任一方法。In a second aspect of the present disclosure, an electronic device is provided. The electronic device includes a processor and a memory storing instructions, wherein the instructions cause the electronic device to execute any method according to the first aspect and its implementation manner when executed by the processor.
在本公开的第三方面,提供了一种计算机可读存储介质。计算机可读存储介质存储有指令,其中指令在被处理器执行时使得电子设备执行根据第一方面及其实现方式的任一方法。In a third aspect of the present disclosure, a computer readable storage medium is provided. The computer-readable storage medium stores instructions, wherein the instructions cause the electronic device to execute any method according to the first aspect and its implementations when executed by the processor.
在本公开的第四方面,提供了一种计算机程序产品。计算机程序产品包括指令,其中指令在被处理器执行时使得电子设备执行根据第一方面及其实现方式的任一方法。In a fourth aspect of the present disclosure, a computer program product is provided. The computer program product comprises instructions, wherein the instructions, when executed by the processor, cause the electronic device to perform any method according to the first aspect and implementations thereof.
附图说明Description of drawings
结合附图并参考以下详细说明,本公开各实现方式的特征、优点及其他方面将变得更加明显。在此以示例性而非限制性的方式示出了本公开的若干实现方式,在附图中:The features, advantages and other aspects of various implementations of the present disclosure will become more apparent with reference to the following detailed description when taken in conjunction with the accompanying drawings. Several implementations of the present disclosure are shown here by way of illustration and not limitation, in the accompanying drawings:
图1A至1B示出了可以实施本公开的实施例的一种电子设备的硬件结构和软件结构的示意图。1A to 1B show schematic diagrams of a hardware structure and a software structure of an electronic device that can implement an embodiment of the present disclosure.
图2示出了可以实施本公开的实施例的另一种电子设备的框图。FIG. 2 shows a block diagram of another electronic device in which embodiments of the present disclosure may be implemented.
图3A-3I示出了根据本公开的一些实施例的与元素保护操作相关联的UI的第一示例的示意图。3A-3I illustrate schematic diagrams of a first example of a UI associated with an element protection operation, according to some embodiments of the present disclosure.
图4A-4L示出了根据本公开的一些实施例的与元素保护操作相关联的UI的第二示例的示意图。4A-4L illustrate schematic diagrams of a second example of a UI associated with an element protection operation, according to some embodiments of the present disclosure.
图5A-5P示出了根据本公开的一些实施例的与元素保护操作相关联的UI的第三示例的示意图。5A-5P illustrate diagrams illustrating a third example of a UI associated with an element protection operation according to some embodiments of the present disclosure.
图6A-6D示出了根据本公开的一些实施例的与界面保护操作相关联的UI的第四示例的示意图。6A-6D show diagrams of a fourth example of UI associated with interface protection operations according to some embodiments of the present disclosure.
图7A-7E示出了根据本公开的一些实施例的与界面保护操作相关联的UI的第五示例的示意图。7A-7E show diagrams of a fifth example of UI associated with an interface protection operation according to some embodiments of the present disclosure.
图8A-8E示出了根据本公开的一些实施例的与界面保护操作相关联的UI的第六示例的示意图。8A-8E are diagrams showing a sixth example of UI associated with an interface protection operation according to some embodiments of the present disclosure.
图9A-9E示出了根据本公开的一些实施例的与界面保护操作相关联的UI的第七示例的示意图。9A-9E show diagrams of a seventh example of UI associated with an interface protection operation according to some embodiments of the present disclosure.
图10A-10E示出了根据本公开的一些实施例的与界面保护操作相关联的UI的第八示例的示意图。10A-10E are diagrams showing an eighth example of UI associated with an interface protection operation according to some embodiments of the present disclosure.
图11示出了根据本公开的实施例的图形界面显示方法的流程图。Fig. 11 shows a flowchart of a graphical interface display method according to an embodiment of the present disclosure.
图12示出了根据本公开的实施例的系统架构的示意图。Fig. 12 shows a schematic diagram of a system architecture according to an embodiment of the present disclosure.
图13示出了根据本公开的实施例的局部清晰化架构的示意图。Fig. 13 shows a schematic diagram of a partial sharpening architecture according to an embodiment of the present disclosure.
图14示出了根据本公开的实施例的物理元件的示意图。Figure 14 shows a schematic diagram of physical elements according to an embodiment of the disclosure.
具体实施方式Detailed ways
下面将参照附图更详细地描述本公开的一些示例实现。虽然附图中显示了本公开的一些示例实现,然而,应该理解,可以以各种形式实现本公开而不应被这里阐述的示例实现所限制。相反,提供这些实现是为了使本公开更加透彻和完整,并且能够将本公开的范围完整地传达给本领域的技术人员。Some example implementations of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although some example implementations of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the example implementations set forth herein. Rather, these implementations are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
在本文中使用的术语“包括”及其变形表示开放性包括,即“包括但不限于”。除非特别申明,术语“或”表示“和/或”。术语“基于”表示“至少部分地基于”。术语“实施例”和“一些实施例”表示“至少一些实施例”。术语“第一”、“第二”等描述,是用于区分不同的对象等,其不代表先后顺序,也不限定“第一”和“第二”是不同的类型。As used herein, the term "comprise" and its variants mean open inclusion, ie "including but not limited to". The term "or" means "and/or" unless otherwise stated. The term "based on" means "based at least in part on". The terms "embodiments" and "some embodiments" mean "at least some embodiments." The terms "first", "second" and other descriptions are used to distinguish different objects, etc., and do not represent a sequence, nor do they limit that "first" and "second" are different types.
在本文中使用的术语“UI”表示用户与应用程序或操作系统进行交互和信息交换的接口,它实现信息的内部形式与用户可以接受形式之间的转换。例如,应用程序的UI是通过java、可扩展标记语言(extensible markup language,XML)等特定计算机语言编写的源代码,UI源代码在电子设备上经过解析,渲染,最终呈现为用户可以识别的内容,比如图片、文字、按钮等UI元素。The term "UI" used in this article refers to the interface where the user interacts with the application program or the operating system and exchanges information, which realizes the conversion between the internal form of information and the form acceptable to the user. For example, the UI of an application program is source code written in a specific computer language such as java and extensible markup language (XML). , such as pictures, text, buttons and other UI elements.
在某些实施例中,UI中的UI元素的属性和内容是通过标签或者节点来定义的,比如XML通过<Textview>、<ImgView>、<VideoView>等节点来规定UI所包含的UI元素。一个节点对应UI中一个UI元素或属性,节点经过解析和渲染之后呈现为用户可视的内容。此外,很多应用程序,比如混合应用(hybrid application)的UI中通常还包含有网页。网页可以理解为内嵌在应用程序UI中的一个特殊的UI元素,网页是通过特定计算机语言编写的源代码,例如超文本标记语言(hyper text markup language,HTML),层叠样式表(cascading style sheets,CSS),java脚本(JavaScript,JS)等,网页源代码可以由浏览器或与浏览器功能类似的网页显示组件加载和显示为用户可识别的内容。网页所包含的具体内容也是通过网页源代码中的标签或者节点来定义的,比如HTML通过<p>、<img>、<video>、<canvas>来定义网页的元素和属性。In some embodiments, the attributes and contents of the UI elements in the UI are defined by tags or nodes. For example, XML specifies the UI elements included in the UI through nodes such as <Textview>, <ImgView>, and <VideoView>. A node corresponds to a UI element or attribute in the UI. After the node is parsed and rendered, it is presented as the content visible to the user. In addition, the UI of many applications, such as hybrid applications, usually includes web pages. A web page can be understood as a special UI element embedded in the application UI. A web page is a source code written in a specific computer language, such as hypertext markup language (hyper text markup language, HTML), cascading style sheets (cascading style sheets) , CSS), java script (JavaScript, JS), etc., the source code of the webpage can be loaded and displayed as user-identifiable content by a browser or a webpage display component similar in function to the browser. The specific content contained in the webpage is also defined by the tags or nodes in the source code of the webpage. For example, HTML defines the elements and attributes of the webpage through <p>, <img>, <video>, and <canvas>.
在本文中使用的术语“UI元素”包括但不限于:窗口(window)、滚动条(scrollbar)、表格视图(tableview)、按钮(button)、菜单栏(menu bar)、文本框(text box)、导航栏、工具栏(toolbar)、图像(image)、静态文本(tatictext)、部件(Widget)等可视的UI元素。The term "UI element" used in this article includes but is not limited to: window (window), scroll bar (scrollbar), table view (tableview), button (button), menu bar (menu bar), text box (text box) , navigation bar, toolbar (toolbar), image (image), static text (tatictext), component (Widget) and other visual UI elements.
在本公开的实施例中描述的一些流程中,包含了按照特定顺序出现的多个操作或步骤,但是应该理解,这些操作或步骤可以不按照其在本公开的实施例中出现的顺序来执行或并行执行,操作的序号仅用于区分开各个不同的操作,序号本身不代表任何的执行顺序。另外,这些流程可以包括更多或更少的操作,并且这些操作或步骤可以按顺序执行或并行执行,并且这些操作或步骤可以进行组合。In some processes described in the embodiments of the present disclosure, a plurality of operations or steps appearing in a specific order are included, but it should be understood that these operations or steps may not be performed in the order in which they appear in the embodiments of the present disclosure Or execute in parallel, the sequence number of the operation is only used to distinguish different operations, and the sequence number itself does not represent any execution order. In addition, these procedures may include more or fewer operations, and these operations or steps may be performed sequentially or in parallel, and these operations or steps may be combined.
如上所述,随着电子设备的普及,信息安全及隐私保护越来越受到人们的关注。传统上,存在多种信息保护方式以保护信息安全和隐私,例如应用锁、隐私空间、AI隐藏通知内容等。然而,这些信息保护方式具有其各自的缺陷。例如,应用锁仅能够使得未授权用户无法进入应用以查看应用的内容,保护场景单一,并且无法实时防止应用内容泄露。此外,应用锁仅能够保护整个应用的内容,而无法单独保护应用内的某一控件或页面的内容。隐私空间仅能够使得未授权用户无法进入隐私空间,保护场景单一,并且无法实时防止隐私空间泄露。此外,AI隐藏通知内容仅能够保护消息通知场景,无法保护其他场景。As mentioned above, with the popularity of electronic devices, information security and privacy protection have drawn more and more attention. Traditionally, there are various information protection methods to protect information security and privacy, such as application lock, private space, AI hidden notification content, etc. However, these information protection methods have their own drawbacks. For example, the application lock can only prevent unauthorized users from entering the application to view the content of the application, the protection scenario is single, and it cannot prevent the leakage of application content in real time. In addition, the application lock can only protect the content of the entire application, but cannot individually protect the content of a certain control or page in the application. The private space can only prevent unauthorized users from entering the private space, the protection scene is single, and it cannot prevent the leakage of the private space in real time. In addition, AI hiding notification content can only protect message notification scenarios, but cannot protect other scenarios.
可见,传统信息保护方式都具有保护场景单一的缺陷,无法满足用户需求。例如,用户在地铁中使用电子设备时,其电子设备上显示的内容很容易被其他人看到,造成信息泄露。这种场景是应用锁和隐私空间等传统信息保护方式无法解决的。It can be seen that the traditional information protection methods all have the defect of a single protection scenario, which cannot meet the needs of users. For example, when a user uses an electronic device in the subway, the content displayed on the electronic device can easily be seen by others, resulting in information leakage. This scenario cannot be solved by traditional information protection methods such as App Lock and Privacy Space.
为此,本公开的实施例提出了一种图形界面显示的新方案。本公开的实施例涉及对UI的至少一部分相关联的内容应用保护操作,使该内容在屏幕上无法正常显示。具体地,保护 操作包括元素保护操作和界面保护操作。在元素保护操作中,采用对控件和布局进行保护的方式,来实现对局部内容的保护。例如,在用户使用某个应用时,其可能不希望其他人看到的某一控件或布局,在这种情况下,该用户可以采用元素保护操作对这些内容进行保护。在对这些内容进行保护之后,需要经由密码、指纹、人脸等验证,才能够查看应用内的特定控件或布局。此外,在界面保护操作中,使得电子设备仅显示UI的一部分,而其他部分无法正常显示,例如模糊化,来实现信息保护。通过显示局部内容的方式,可以实时保护电子设备的期望保护的内容不被泄露,从而增强了电子设备的安全性,显著提高了用户体验。To this end, the embodiments of the present disclosure propose a new solution for graphical interface display. Embodiments of the present disclosure relate to applying a protection operation to content associated with at least a part of the UI, so that the content cannot be displayed normally on the screen. Specifically, protection operations include element protection operations and interface protection operations. In the element protection operation, the method of protecting controls and layouts is adopted to realize the protection of partial content. For example, when a user is using a certain application, he may not want others to see a certain control or layout, in this case, the user can use element protection operations to protect these contents. After these contents are protected, specific controls or layouts within the app need to be verified by password, fingerprint, face, etc. In addition, in the interface protection operation, the electronic device only displays a part of the UI, while other parts cannot be displayed normally, such as blurring, so as to realize information protection. By displaying the partial content, the desired protected content of the electronic device can be protected from being leaked in real time, thereby enhancing the security of the electronic device and significantly improving user experience.
以下将参考附图1A至图13描述本公开的一些示例实施例。Some example embodiments of the present disclosure will be described below with reference to FIGS. 1A to 13 .
图1A示出了可以实施本公开的实施例的一种电子设备100的硬件结构的示意图。如图1所示,电子设备100可以包括处理器110、外部存储器接口120、内部存储器121、通用串行总线(universal serial bus,USB)接口130、充电管理模块140、电源管理模块141、电池142、天线1、天线2、移动通信模块150、无线通信模块160、音频模块170、扬声器170A、受话器170B、麦克风170C、耳机接口170D、传感器模块180、按键190、马达191、指示器192、摄像头193、显示屏194、以及用户标识模块(subscriber identification module,SIM)卡接口195等。传感器模块180可以包括压力传感器180A、陀螺仪传感器180B、气压传感器180C、磁传感器180D、加速度传感器180E、距离传感器180F、接近光传感器180G、指纹传感器180H、温度传感器180J、触摸传感器180K、环境光传感器180L、骨传导传感器180M等。FIG. 1A shows a schematic diagram of a hardware structure of an electronic device 100 that can implement an embodiment of the present disclosure. As shown in Figure 1, the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charging management module 140, a power management module 141, and a battery 142 , antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone jack 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193 , a display screen 194, and a subscriber identification module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, bone conduction sensor 180M, etc.
应当理解,本公开的实施例所示意的结构并不构成对电子设备100的具体限定。在本公开的另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。It should be understood that the structures shown in the embodiments of the present disclosure do not constitute a specific limitation on the electronic device 100 . In other embodiments of the present disclosure, the electronic device 100 may include more or fewer components than shown, or combine some components, or separate some components, or arrange different components. The illustrated components can be realized in hardware, software or a combination of software and hardware.
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP)、调制解调处理器、图形处理器(graphics processing unit,GPU)、图像信号处理器(image signal processor,ISP)、控制器、视频编解码器、数字信号处理器(digital signal processor,DSP)、基带处理器、和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。The processor 110 may include one or more processing units, for example: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc. Wherein, different processing units may be independent devices, or may be integrated in one or more processors. The controller can generate an operation control signal according to the instruction opcode and timing signal, and complete the control of fetching and executing the instruction.
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated access is avoided, and the waiting time of the processor 110 is reduced, thereby improving the efficiency of the system.
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口、集成电路内置音频(inter-integrated circuit sound,I2S)接口、脉冲编码调制(pulse code modulation,PCM)接口、通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口、移动产业处理器接口(mobile industry processor interface,MIPI)、通用输入输出(general-purpose input/output,GPIO)接口、用户标识模块(subscriber identity module,SIM)接口、和/或通用串行总线(universal serial bus,USB)接口等。In some embodiments, processor 110 may include one or more interfaces. The interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transmitter (universal asynchronous receiver/transmitter, UART) interface, mobile industry processor interface (mobile industry processor interface, MIPI), general-purpose input and output (general-purpose input/output, GPIO) interface, subscriber identity module (subscriber identity module, SIM) interface, and /or universal serial bus (universal serial bus, USB) interface, etc.
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根 串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K、充电器、闪光灯、摄像头193等。例如,处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现电子设备100的触摸功能。The I2C interface is a bidirectional synchronous serial bus, including a serial data line (serial data line, SDA) and a serial clock line (derail clock line, SCL). In some embodiments, processor 110 may include multiple sets of I2C buses. The processor 110 may be respectively coupled to the touch sensor 180K, the charger, the flashlight, the camera 193 and the like through different I2C bus interfaces. For example, the processor 110 may be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 communicates with the touch sensor 180K through the I2C bus interface to realize the touch function of the electronic device 100 .
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。The I2S interface can be used for audio communication. In some embodiments, processor 110 may include multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 through an I2S bus to implement communication between the processor 110 and the audio module 170 . In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface, so as to realize the function of answering calls through the Bluetooth headset.
PCM接口也可以用于音频通信,将模拟信号抽样、量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM总线接口耦合。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。所述I2S接口和所述PCM接口都可以用于音频通信。The PCM interface can also be used for audio communication, sampling, quantizing and encoding the analog signal. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface. In some embodiments, the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如,处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。The UART interface is a universal serial data bus used for asynchronous communication. The bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is generally used to connect the processor 110 and the wireless communication module 160 . For example, the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to realize the Bluetooth function. In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.
MIPI接口可以被用于连接处理器110与显示屏194、摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI)、显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现电子设备100的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现电子设备100的显示功能。The MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 . MIPI interface includes camera serial interface (camera serial interface, CSI), display serial interface (display serial interface, DSI), etc. In some embodiments, the processor 110 communicates with the camera 193 through the CSI interface to realize the shooting function of the electronic device 100 . The processor 110 communicates with the display screen 194 through the DSI interface to realize the display function of the electronic device 100 .
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193、显示屏194、无线通信模块160、音频模块170、传感器模块180等。GPIO接口还可以被配置为I2C接口、I2S接口、UART接口、MIPI接口等。The GPIO interface can be configured by software. The GPIO interface can be configured as a control signal or as a data signal. In some embodiments, the GPIO interface can be used to connect the processor 110 with the camera 193 , the display screen 194 , the wireless communication module 160 , the audio module 170 , the sensor module 180 and so on. The GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口、Micro USB接口、USB Type C接口等。USB接口130可以用于连接充电器为电子设备100充电,也可以用于电子设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。The USB interface 130 is an interface conforming to the USB standard specification, specifically, it may be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like. The USB interface 130 can be used to connect a charger to charge the electronic device 100 , and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones and play audio through them. This interface can also be used to connect other electronic devices, such as AR devices.
可以理解的是,本公开的实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备100的结构限定。在本公开的另一些实施例中,电子设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。It can be understood that the interface connection relationship among the modules shown in the embodiments of the present disclosure is only for schematic illustration, and does not constitute a structural limitation of the electronic device 100 . In other embodiments of the present disclosure, the electronic device 100 may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过电子设备100的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备100供电。The charging management module 140 is configured to receive a charging input from a charger. Wherein, the charger may be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 can receive charging input from the wired charger through the USB interface 130 . In some wireless charging embodiments, the charging management module 140 may receive a wireless charging input through a wireless charging coil of the electronic device 100 . While the charging management module 140 is charging the battery 142 , it can also supply power to the electronic device 100 through the power management module 141 .
电源管理模块141用于连接电池142、充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110、内部存储器121、显示屏 194、摄像头193、和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。The power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 . The power management module 141 receives the input of the battery 142 and/or the charging management module 140, and supplies power for the processor 110, the internal memory 121, the display screen 194, the camera 193, and the wireless communication module 160, etc. The power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, and battery health status (leakage, impedance). In some other embodiments, the power management module 141 may also be disposed in the processor 110 . In some other embodiments, the power management module 141 and the charging management module 140 may also be set in the same device.
电子设备100的无线通信功能可以通过天线1、天线2、移动通信模块150、无线通信模块160、调制解调处理器以及基带处理器等实现。天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如,可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。The wireless communication function of the electronic device 100 may be realized by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like. Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals. Each antenna in electronic device 100 may be used to cover single or multiple communication frequency bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example, antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
移动通信模块150可以提供应用在电子设备100上的包括2G/3G/4G/5G/6G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器、开关、功率放大器、低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。The mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G/6G applied on the electronic device 100 . The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA) and the like. The mobile communication module 150 can receive electromagnetic waves through the antenna 1, filter and amplify the received electromagnetic waves, and send them to the modem processor for demodulation. The mobile communication module 150 can also amplify the signals modulated by the modem processor, and convert them into electromagnetic waves through the antenna 1 for radiation. In some embodiments, at least part of the functional modules of the mobile communication module 150 may be set in the processor 110 . In some embodiments, at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be set in the same device.
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A、受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。A modem processor may include a modulator and a demodulator. Wherein, the modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator sends the demodulated low-frequency baseband signal to the baseband processor for processing. The low-frequency baseband signal is passed to the application processor after being processed by the baseband processor. The application processor outputs a sound signal through an audio device (not limited to a speaker 170A, a receiver 170B, etc.), or displays an image or video through a display screen 194 . In some embodiments, the modem processor may be a stand-alone device. In some other embodiments, the modem processor may be independent from the processor 110, and be set in the same device as the mobile communication module 150 or other functional modules.
无线通信模块160可以提供应用在电子设备100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络)、蓝牙(Bluetooth,BT)、全球导航卫星系统(global navigation satellite system,GNSS)、调频(frequency modulation,FM)、近距离无线通信技术(near field communication,NFC)、红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。The wireless communication module 160 can provide wireless local area network (wireless local area networks, WLAN) (such as wireless fidelity (wireless fidelity, Wi-Fi) network), bluetooth (Bluetooth, BT), global navigation satellite Wireless communication solutions such as global navigation satellite system (GNSS), frequency modulation (FM), near field communication (NFC), and infrared technology (IR). The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency-modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 . The wireless communication module 160 can also receive the signal to be sent from the processor 110 , frequency-modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
在一些实施例中,电子设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备100可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM)、通用分组无线服务(general packet radio service,GPRS)、码分多址接入(code division multiple access,CDMA)、宽带码分多址(wideband code division multiple access,WCDMA)、时分码分多址(time-division codedivision multiple access,TD-SCDMA)、长期演进(long term evolution,LTE)、5G以及后续演进标准、BT、GNSS、WLAN、NFC、FM、和/或IR技术等。其中GNSS可以包括全球卫星定位系统(global positioning system,GPS)、全球导航卫星系统(global  navigation satellite system,GLONASS)、北斗卫星导航系统(beidou navigation satellite system,BDS)、准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。In some embodiments, the antenna 1 of the electronic device 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology. The wireless communication technology may include global system for mobile communications (GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (long term evolution, LTE), 5G and subsequent evolution standards, BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc. Among them, GNSS can include global positioning system (global positioning system, GPS), global navigation satellite system (global navigation satellite system, GLONASS), Beidou satellite navigation system (beidou navigation satellite system, BDS), quasi-zenith satellite system (quasi- zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
电子设备100通过GPU、显示屏194、以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可以包括一个或多个GPU,其执行程序指令以生成或改变显示信息。The electronic device 100 realizes the display function through the GPU, the display screen 194 , and the application processor. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
显示屏194用于显示图像,视频等。显示屏194包括显示面板。在一些实施例中,电子设备100可以包括1个或N个显示屏194,N为大于1的正整数。The display screen 194 is used to display images, videos and the like. The display screen 194 includes a display panel. In some embodiments, the electronic device 100 may include 1 or N display screens 194 , where N is a positive integer greater than 1.
电子设备100可以通过ISP、摄像头193、视频编解码器、GPU、显示屏194以及应用处理器等实现拍摄功能。ISP用于处理摄像头193反馈的数据。例如,在拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。The electronic device 100 can realize the shooting function through the ISP, the camera 193 , the video codec, the GPU, the display screen 194 , and the application processor. The ISP is used for processing the data fed back by the camera 193 . For example, when taking a picture, open the shutter, the light is transmitted to the photosensitive element of the camera through the lens, and the light signal is converted into an electrical signal, and the photosensitive element of the camera transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise, brightness, and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be located in the camera 193 .
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备100可以包括1个或N个摄像头193,N为大于1的正整数。Camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects it to the photosensitive element. The photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The photosensitive element converts the light signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. DSP converts digital image signals into standard RGB, YUV and other image signals. In some embodiments, the electronic device 100 may include 1 or N cameras 193 , where N is a positive integer greater than 1.
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如,动态图像专家组(moving picture experts group,MPEG)1、MPEG2、MPEG3、MPEG4等。Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in various encoding formats, for example, moving picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如图像识别、人脸识别、语音识别、文本理解等。The NPU is a neural-network (NN) computing processor. By referring to the structure of biological neural networks, such as the transfer mode between neurons in the human brain, it can quickly process input information and continuously learn by itself. Applications such as intelligent cognition of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, and the like.
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐、视频等文件保存在外部存储卡中。The external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, so as to expand the storage capacity of the electronic device 100. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. Such as saving music, video and other files in an external memory card.
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储电子设备100使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。处理器110通过运行存储在内部存储器121的指令、和/或存储在设置于处理器中的存储器的指令,执行电子设备100 的各种功能应用以及数据处理。The internal memory 121 may be used to store computer-executable program codes including instructions. The internal memory 121 may include an area for storing programs and an area for storing data. Wherein, the stored program area can store an operating system, at least one application program required by a function (such as a sound playing function, an image playing function, etc.) and the like. The storage data area can store data created during the use of the electronic device 100 (such as audio data, phonebook, etc.) and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (universal flash storage, UFS) and the like. The processor 110 executes various functional applications and data processing of the electronic device 100 by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
电子设备100可以通过音频模块170、扬声器170A、受话器170B、麦克风170C、耳机接口170D、以及应用处理器等实现音频功能。例如音乐播放,录音等。The electronic device 100 can implement audio functions through the audio module 170 , the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. Such as music playback, recording, etc.
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和电子设备100的接触和分离。电子设备100可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195可以支持Nano SIM卡、Micro SIM卡、SIM卡等。同一个SIM卡接口195可以同时插入多张卡。所述多张卡的类型可以相同,也可以不同。SIM卡接口195也可以兼容不同类型的SIM卡。SIM卡接口195也可以兼容外部存储卡。电子设备100通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,电子设备100采用eSIM,即嵌入式SIM卡。eSIM卡可以嵌在电子设备100中,不能和电子设备100分离。The SIM card interface 195 is used for connecting a SIM card. The SIM card can be connected and separated from the electronic device 100 by inserting it into the SIM card interface 195 or pulling it out from the SIM card interface 195 . The electronic device 100 may support 1 or N SIM card interfaces, where N is a positive integer greater than 1. SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card etc. Multiple cards can be inserted into the same SIM card interface 195 at the same time. The types of the multiple cards may be the same or different. The SIM card interface 195 is also compatible with different types of SIM cards. The SIM card interface 195 is also compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to implement functions such as calling and data communication. In some embodiments, the electronic device 100 adopts an eSIM, that is, an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100 .
电子设备100的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构。本公开的实施例以分层架构的一种移动操作系统为例,示例性说明电子设备100的软件结构。The software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a micro-kernel architecture, a micro-service architecture, or a cloud architecture. The embodiments of the present disclosure take a mobile operating system with a layered architecture as an example to illustrate the software structure of the electronic device 100 .
图1B是本公开的实施例的电子设备100的软件结构的示意图。分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,可以将操作系统分为四层,从上至下分别为应用程序层、应用程序框架层、操作系统运行时(runtime)和系统库、以及内核层。FIG. 1B is a schematic diagram of the software structure of the electronic device 100 according to the embodiment of the present disclosure. The layered architecture divides the software into several layers, and each layer has a clear role and division of labor. Layers communicate through software interfaces. In some embodiments, the operating system can be divided into four layers, which are application program layer, application program framework layer, operating system runtime (runtime) and system library, and kernel layer from top to bottom.
应用程序层可以包括一系列应用程序包。如图1B所示,应用程序包可以包括相机、图库、日历、通话、地图、导航、WLAN、蓝牙、音乐、视频、短信息等应用程序。The application layer can consist of a series of application packages. As shown in FIG. 1B , the application package may include application programs such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, and short message.
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。The application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer. The application framework layer includes some predefined functions.
如图1B所示,应用程序框架层可以包括窗口管理器、内容提供器、视图系统、电话管理器、资源管理器、通知管理器等。窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频、图像、音频、拨打和接听的电话、浏览历史和书签、电话簿等。视图系统包括可视控件,例如显示文字的控件,显示图像的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图像的视图。电话管理器用于提供电子设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。资源管理器为应用程序提供各种资源,比如本地化字符串、图标、图像、布局文件、视频文件等。通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。As shown in FIG. 1B, the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and the like. A window manager is used to manage window programs. The window manager can get the size of the display screen, determine whether there is a status bar, lock the screen, capture the screen, etc. Content providers are used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebook, and the like. The view system includes visual controls, such as controls that display text, controls that display images, and so on. The view system can be used to build applications. A display interface can consist of one or more views. For example, a display interface including a notification icon of a short message may include a view for displaying text and a view for displaying images. The phone manager is used to provide communication functions of the electronic device 100 . For example, the management of call status (including connected, hung up, etc.). The resource manager provides various resources to the application, such as localized strings, icons, images, layout files, video files, etc. The notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages, and can automatically disappear after a short stay without user interaction. For example, the notification manager is used to notify the download completion, message reminder, etc. The notification manager can also be a notification that appears on the top status bar of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, issuing a prompt sound, vibrating the electronic device, and flashing the indicator light, etc.
继续参考图1B,操作系统运行时包括核心库和虚拟机。操作系统运行时负责操作系统的调度和管理。核心库包含两部分,一部分是Java语言需要调用的功能函数,另一部分是操作系统的核心库。应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用 程序框架层的Java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理、堆栈管理、线程管理、安全和异常的管理、以及垃圾回收等功能。系统库可以包括多个功能模块。例如,表面管理器(surface manager)、媒体库(Media Libraries)、三维图形处理库(例如OpenGL ES)、2D图形引擎(例如:SGL)等。Continuing to refer to FIG. 1B , the operating system runtime includes a core library and a virtual machine. When the operating system is running, it is responsible for the scheduling and management of the operating system. The core library consists of two parts, one part is the function function that the Java language needs to call, and the other part is the core library of the operating system. The application layer and the application framework layer run in virtual machines. The virtual machine executes the Java files of the application program layer and the application program framework layer as binary files. The virtual machine is used to perform functions such as object life cycle management, stack management, thread management, security and exception management, and garbage collection. A system library can include multiple function modules. For example, surface manager (surface manager), media library (Media Libraries), 3D graphics processing library (such as OpenGL ES), 2D graphics engine (such as: SGL), etc.
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如,MPEG4、H.264、MP3、AAC、AMR、JPG、PNG等。三维图形处理库用于实现三维图形绘图、图像渲染、合成、和图层处理等。2D图形引擎是2D绘图的绘图引擎。The surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications. The media library supports playback and recording of various commonly used audio and video formats, as well as still image files, etc. The media library can support multiple audio and video encoding formats, such as MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc. The 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing, etc. 2D graphics engine is a drawing engine for 2D drawing.
内核层是硬件和软件之间的层。内核层至少包含显示驱动、摄像头驱动、音频驱动、传感器驱动。The kernel layer is the layer between hardware and software. The kernel layer includes at least a display driver, a camera driver, an audio driver, and a sensor driver.
图2示出了可以实施本公开的实施例的另一种电子设备200的框图。如图2所示,电子设备200可以是通用计算设备的形式。电子设备200的组件可以包括但不限于一个或多个处理器或处理单元210、存储器220、存储设备230、一个或多个通信单元240、一个或多个输入设备250以及一个或多个输出设备260。处理单元210可以是实际或虚拟处理器并且能够根据存储器220中存储的程序来执行各种处理。在多处理器系统中,多个处理单元并行执行计算机可执行指令,以提高电子设备200的并行处理能力。FIG. 2 shows a block diagram of another electronic device 200 that may implement embodiments of the present disclosure. As shown in FIG. 2, electronic device 200 may be in the form of a general-purpose computing device. Components of electronic device 200 may include, but are not limited to, one or more processors or processing units 210, memory 220, storage device 230, one or more communication units 240, one or more input devices 250, and one or more output devices 260. The processing unit 210 may be an actual or virtual processor and is capable of performing various processes according to programs stored in the memory 220 . In a multi-processor system, multiple processing units execute computer-executable instructions in parallel to increase the parallel processing capability of the electronic device 200 .
电子设备200通常包括多个计算机存储介质。这样的介质可以是电子设备200可访问的任何可以获得的介质,包括但不限于易失性和非易失性介质、可拆卸和不可拆卸介质。存储器220可以是易失性存储器(例如寄存器、高速缓存、随机访问存储器(RAM))、非易失性存储器(例如,只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、闪存)或它们的某种组合。存储设备230可以是可拆卸或不可拆卸的介质,并且可以包括机器可读介质,诸如闪存驱动、磁盘或者任何其他介质,其可以能够用于存储信息和/或数据(例如用于训练的训练数据)并且可以在电子设备200内被访问。 Electronic device 200 typically includes a plurality of computer storage media. Such media can be any available media that is accessible to electronic device 200, including but not limited to, volatile and nonvolatile media, removable and non-removable media. Memory 220 can be volatile memory (eg, registers, cache, random access memory (RAM), nonvolatile memory (eg, read only memory (ROM), electrically erasable programmable read only memory (EEPROM) , flash memory) or some combination of them. Storage device 230 may be removable or non-removable media, and may include machine-readable media, such as flash drives, magnetic disks, or any other media that may be capable of storing information and/or data (e.g., training data for training) ) and can be accessed within the electronic device 200.
电子设备200可以进一步包括另外的可拆卸/不可拆卸、易失性/非易失性存储介质。尽管未在图2中示出,可以提供用于从可拆卸、非易失性磁盘(例如“软盘”)进行读取或写入的磁盘驱动和用于从可拆卸、非易失性光盘进行读取或写入的光盘驱动。在这些情况中,每个驱动可以由一个或多个数据介质接口被连接至总线(未示出)。存储器220可以包括计算机程序产品225,其具有一个或多个程序模块,这些程序模块被配置为执行本公开的实施例的对象编辑方法或过程。The electronic device 200 may further include additional detachable/non-detachable, volatile/nonvolatile storage media. Although not shown in FIG. 2, a disk drive for reading from or writing to a removable, nonvolatile disk (such as a "floppy disk") and a disk drive for reading from a removable, nonvolatile disk may be provided. CD-ROM drive for reading or writing. In these cases, each drive may be connected to the bus (not shown) by one or more data media interfaces. The memory 220 may include a computer program product 225 having one or more program modules configured to execute the object editing method or process of the embodiments of the present disclosure.
通信单元240实现通过通信介质与其他计算设备进行通信。附加地,电子设备200的组件的功能可以以单个计算集群或多个计算机器来实现,这些计算机器能够通过通信连接进行通信。因此,电子设备200可以使用与一个或多个其他服务器、网络个人计算机(PC)或者另一个网络节点的逻辑连接来在联网环境中进行操作。The communication unit 240 enables communication with other computing devices through communication media. Additionally, the functions of the components of the electronic device 200 may be implemented in a single computing cluster or as a plurality of computing machines capable of communicating via communication links. Accordingly, electronic device 200 may operate in a networked environment using logical connections to one or more other servers, a network personal computer (PC), or another network node.
输入设备250可以是一个或多个输入设备,例如鼠标、键盘、追踪球等。输出设备260可以是一个或多个输出设备,例如显示器、扬声器、打印机等。在本公开的实施例中,输出设备260可以包括具有触摸传感器的触摸屏,其可以接收用户的触摸输入。电子设备200还可以根据需要通过通信单元240与一个或多个外部设备(未示出)进行通信,外部设备诸如存储设备、显示设备等,与一个或多个使得用户与电子设备200交互的设备进行通信,或者 与使得电子设备200与一个或多个其他计算设备通信的任何设备(例如,网卡、调制解调器等)进行通信。这样的通信可以经由输入/输出(I/O)接口(未示出)来执行。The input device 250 may be one or more input devices, such as a mouse, keyboard, trackball, and the like. Output device 260 may be one or more output devices, such as a display, speakers, printer, or the like. In an embodiment of the present disclosure, the output device 260 may include a touch screen having a touch sensor, which may receive a user's touch input. The electronic device 200 can also communicate with one or more external devices (not shown) through the communication unit 240 as required, such as storage devices, display devices, etc., and one or more devices that enable the user to interact with the electronic device 200 communicate with, or communicate with, any device (eg, network card, modem, etc.) that enables electronic device 200 to communicate with one or more other computing devices. Such communication may be performed via an input/output (I/O) interface (not shown).
应当理解,上文图1所示出的电子设备100和图2所示出的电子设备200仅仅是能够实施本公开的一个或多个实施例的两种示例电子设备,其不应当构成对本文所描述的实施例的功能和范围的任何限制。It should be understood that the above electronic device 100 shown in FIG. 1 and the electronic device 200 shown in FIG. no limitations on the function and scope of the described embodiments.
在上文中对电子设备进行了描述。进一步地,如上所述,本公开的实施例涉及对UI的至少一部分相关联的内容应用保护操作,使该内容在屏幕上无法正常显示。在某些实施例中,与UI的至少一部分相关联的内容是UI的至少一部分所显示的内容(例如,设置选项列表中的一项设置),和/或经由UI的至少一部分所访问的内容(例如,点击该项设置后显示的设置界面)。Electronic devices are described above. Further, as described above, the embodiments of the present disclosure relate to applying a protection operation to content associated with at least a part of the UI, so that the content cannot be displayed normally on the screen. In some embodiments, the content associated with at least a portion of the UI is content displayed by at least a portion of the UI (e.g., a setting in a list of settings options), and/or content accessed via at least a portion of the UI (For example, the setting interface displayed after clicking the setting).
具体地,保护操作包括元素保护操作和界面保护操作。在元素保护操作中,采用对控件和布局进行保护的方式,来实现对局部内容的保护。此外,在界面保护操作中,使得电子设备仅显示UI的一部分,而其他部分无法正常显示,例如模糊化,来实现信息保护。为此,在下文中将参考图3A-5P对与元素保护操作相关联的示例UI进行描述,并且参考图6A-10E对与界面保护操作相关联的示例UI进行描述。Specifically, the protection operation includes an element protection operation and an interface protection operation. In the element protection operation, the method of protecting controls and layouts is adopted to realize the protection of partial content. In addition, in the interface protection operation, the electronic device only displays a part of the UI, while other parts cannot be displayed normally, such as blurring, so as to realize information protection. For this reason, an example UI associated with an element protection operation will be described below with reference to FIGS. 3A-5P , and an example UI associated with an interface protection operation will be described with reference to FIGS. 6A-10E .
在元素保护操作中,电子设备可以检测与UI相关联的元素保护操作。由此,电子设备可以基于元素保护操作,确定与元素保护操作对应的目标UI元素,并且使与目标UI元素相关联的内容无法正常显示。例如,电子设备可以监控用户是否触发了元素保护操作,诸如三指长按、三指下滑、特定语音命令等任何适当动作。如果检测到元素保护操作,则电子设备可以使与UI的至少一部分相关联的内容在屏幕上无法正常显示。In the element protection operation, the electronic device may detect an element protection operation associated with the UI. Thus, the electronic device can determine the target UI element corresponding to the element protection operation based on the element protection operation, and prevent the content associated with the target UI element from being displayed normally. For example, the electronic device can monitor whether the user triggers an element protection operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If an element protection operation is detected, the electronic device may disable content associated with at least a portion of the UI from being properly displayed on the screen.
在某些实施例中,元素保护操作可以包括控件显示操作和选择操作。在这种情况下,电子设备可以基于控件显示操作,在屏幕上显示与UI所包括的至少一个UI元素对应的元素保护控件。此外,电子设备可以基于选择操作,将选择操作作用于的元素保护控件所对应的UI元素确定为目标UI元素。例如,电子设备可以监控用户是否触发了控件显示操作,诸如三指长按、三指下滑、特定语音命令等任何适当动作。如果检测到控件显示操作,则电子设备可以在屏幕上显示与UI所包括的至少一个UI元素对应的元素保护控件。电子设备可以检测作用于元素保护控件的选择操作,诸如点击、双击、长按、特定语音命令等任何适当动作,并且将选择操作作用于的元素保护控件所对应的UI元素确定为目标UI元素,从而实现目标UI元素的选择。如果检测到选择操作,则电子设备可以使与目标UI元素相关联的内容无法正常显示。In some embodiments, element protection operations may include control display operations and selection operations. In this case, the electronic device may display an element protection control corresponding to at least one UI element included in the UI on the screen based on the control display operation. In addition, the electronic device may determine, based on the selection operation, the UI element corresponding to the element protection control on which the selection operation acts as the target UI element. For example, the electronic device may monitor whether the user triggers a control display operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If a control display operation is detected, the electronic device may display an element protection control corresponding to at least one UI element included in the UI on the screen. The electronic device may detect a selection operation acting on the element protection control, such as any appropriate action such as clicking, double-clicking, long pressing, or a specific voice command, and determine the UI element corresponding to the element protection control on which the selection operation acts as the target UI element, Thereby, the selection of the target UI element is realized. If a selection operation is detected, the electronic device may disable normal display of content associated with the target UI element.
在某些实施例中,如果检测到选择操作,则电子设备可以确定要对目标UI元素进行保护的模式。模式可以指示使内容模糊、或者防止经由目标UI元素访问内容。例如,为了防止经由目标UI元素访问内容,可以使得用户无法对目标UI元素进行操作,诸如可以将目标UI元素置灰、隐藏等,以使得用户无法点击该目标UI元素。备选地,还可以使得目标UI元素不再对用户操作进行影响,诸如不再显示原本点击目标UI元素之后将要显示的内容、或者不再跳转到原本点击目标UI元素之后将要跳转到的内容。从而,电子设备可以基于所确定的模式使与目标UI元素相关联的内容无法正常显示。然而,备选地,对目标UI元素进行保护的模式也可以是预先确定的,因此电子设备无需进一步确定要对目标UI元素进行保护的模式。In some embodiments, if a selection operation is detected, the electronic device may determine a mode in which to protect the target UI element. Modes may indicate to obscure content, or prevent content from being accessed via targeted UI elements. For example, in order to prevent content from being accessed via the target UI element, the user may not be able to operate the target UI element, such as graying out or hiding the target UI element, so that the user cannot click on the target UI element. Alternatively, it is also possible to make the target UI element no longer affect user operations, such as no longer displaying the content that will be displayed after clicking the target UI element, or no longer jumping to the target UI element that will be jumped to after clicking the target UI element. content. Thus, the electronic device may disable normal display of content associated with the target UI element based on the determined pattern. However, alternatively, the mode for protecting the target UI element may also be predetermined, so the electronic device does not need to further determine the mode for protecting the target UI element.
例如,如果用户期望对某个UI元素进行保护,则其可以通过点击与该UI元素对应的元 素保护控件来使该UI元素进入受保护状态,从而使得该UI元素的内容、或经由该UI元素访问的内容无法正常显示。例如,电子设备可以使得该UI元素的内容被模糊化、使得经由该UI元素访问的内容被模糊化、或使得无法经由该UI元素访问内容。由此,能够实现信息保护。For example, if the user desires to protect a certain UI element, he can make the UI element enter the protected state by clicking the element protection control corresponding to the UI element, so that the content of the UI element, or via the UI element Accessed content cannot be displayed properly. For example, the electronic device may obscure the content of the UI element, obscure content accessed via the UI element, or render inaccessible content via the UI element. Thereby, information protection can be realized.
进一步地,在使得目标UI元素进入受保护状态之后,电子设备还可以检测作用于目标UI元素的解除保护操作。如果检测到解除保护操作,则电子设备可以使与目标UI元素相关联的内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份。如果身份验证成功,则电子设备可以使与目标UI元素相关联的内容正常显示。例如,如果用户想要查看与进入受保护状态的UI元素相关联的内容,则其可以通过长按、双击该UI元素等任何适当动作来触发解除保护的验证界面(例如,密码、指纹、人脸等任何适当验证方式)。在用户验证成功之后,电子设备可以使得该UI元素离开受保护状态,从而正常显示与该UI元素相关联的内容。例如,电子设备可以使得该UI元素的内容恢复清晰、使得经由该UI元素访问的内容恢复清晰、或使得能够经由该UI元素访问内容。由此,能够实现信息解除保护。Further, after making the target UI element enter the protected state, the electronic device may also detect an unprotection operation acting on the target UI element. If an unprotect operation is detected, the electronic device may cause the content associated with the target UI element to be displayed normally. In some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiates the unprotection operation. If the authentication is successful, the electronic device can cause the content associated with the target UI element to be displayed normally. For example, if a user wants to view the content associated with a UI element that has entered a protected state, he can trigger an unprotected verification interface (e.g., password, fingerprint, identity, etc.) face, etc. any appropriate verification method). After the user verification is successful, the electronic device may cause the UI element to leave the protected state, so as to normally display the content associated with the UI element. For example, the electronic device may restore clarity to the content of the UI element, restore clarity to content accessed via the UI element, or enable access to content via the UI element. In this way, information release protection can be realized.
图3A-3I示出了根据本公开的一些实施例的与元素保护操作相关联的UI 300A-300I的第一示例的示意图。具体地,在图3A-3I的示例中,示出了对控件的内容进行保护的场景。3A-3I show schematic diagrams of a first example of UIs 300A-300I associated with element protection operations, according to some embodiments of the present disclosure. Specifically, in the example of FIGS. 3A-3I , the scene of protecting the content of the control is shown.
如图3A所示,UI 300A可以包括多个UI元素,例如UI元素330以及UI元素340-1至340-7(在下文中统称为“UI元素340”)。例如,UI 300A可以是即时消息应用的消息界面,在这种情况下,UI元素330可以是打开附加操作列表的控件或者增加新消息的控件,而UI元素340可以是来自不同发送者的消息。作为另一示例,UI 300A可以是电子设备的设置界面,在这种情况下,UI元素300可以是打开附加操作列表的控件或者增加新设置的控件,而UI元素340可以是不同的设置选项。As shown in FIG. 3A, UI 300A may include a plurality of UI elements, such as UI element 330 and UI elements 340-1 to 340-7 (hereinafter collectively referred to as "UI elements 340"). For example, UI 300A may be a message interface of an instant messaging application, in which case UI element 330 may be a control to open a list of additional operations or a control to add a new message, while UI element 340 may be a message from a different sender. As another example, UI 300A may be a setting interface of an electronic device, in which case UI element 300 may be a control to open an additional operation list or a control to add a new setting, and UI element 340 may be a different setting option.
应理解,UI 300A以及UI元素330和340仅是示例,事实上,UI可以是任何适当界面,并且UI元素可以是任何适当控件。如上所述,在本文中使用的术语“UI元素”包括但不限于:窗口(window)、滚动条(scrollbar)、表格视图(tableview)、按钮(button)、菜单栏(menu bar)、文本框(text box)、导航栏、工具栏(toolbar)、图像(image)、静态文本(tatictext)、部件(Widget)等可视的UI元素。It should be understood that UI 300A and UI elements 330 and 340 are examples only, and in fact the UI may be any suitable interface and the UI elements may be any suitable controls. As mentioned above, the term "UI element" used in this article includes but is not limited to: window (window), scroll bar (scrollbar), table view (tableview), button (button), menu bar (menu bar), text box (text box), navigation bar, toolbar (toolbar), image (image), static text (tatictext), component (Widget) and other visual UI elements.
如图3B所示,电子设备可以检测与UI相关联的元素保护操作。如上所述,元素保护操作可以包括控件显示操作和选择操作。例如,电子设备可以监控用户是否触发了控件显示操作,诸如三指长按、三指下滑、特定语音命令等任何适当动作。如果检测到控件显示操作,则如图3C所示,电子设备可以在屏幕上显示与UI所包括的至少一个UI元素对应的元素保护控件,例如,与UI元素340-1至340-7对应的元素保护控件310-1至310-7(在下文中统称为“元素保护控件310”),以及与UI元素330对应的元素保护控件320。应理解,元素保护控件310和320的形状、大小和位置等仅是示例,事实上,元素保护控件可以具有任何适当形状、大小和位置。进一步地,虽然图3C中示出了与UI元素330和340对应的元素保护控件,然而元素保护控件的数目仅是示例。事实上,电子设备可以显示更多或更少的元素保护控件,例如,可以不显示与UI元素330对应的元素保护控件320,或者更多地显示与电子设备的状态栏(即,UI最上方的示出网络、电量、时间等信息的状态栏)对应的元素保护控件。As shown in FIG. 3B, the electronic device may detect an element protection operation associated with the UI. As described above, element protection operations may include control display operations and selection operations. For example, the electronic device may monitor whether the user triggers a control display operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If a control display operation is detected, as shown in FIG. 3C , the electronic device may display on the screen an element protection control corresponding to at least one UI element included in the UI, for example, corresponding to UI elements 340-1 to 340-7. Element protection controls 310 - 1 to 310 - 7 (hereinafter collectively referred to as “element protection controls 310 ”), and an element protection control 320 corresponding to UI element 330 . It should be understood that the shape, size, location, etc. of the element protection controls 310 and 320 are examples only, and in fact, the element protection controls may have any suitable shape, size, and location. Further, although element protection controls corresponding to UI elements 330 and 340 are shown in FIG. 3C , the number of element protection controls is merely an example. In fact, the electronic device may display more or fewer element protection controls, for example, the element protection control 320 corresponding to the UI element 330 may not be displayed, or more elements corresponding to the status bar of the electronic device (that is, the UI element at the top) may be displayed. The element protection control corresponding to the status bar showing network, power, time and other information).
如图3D所示,电子设备可以检测作用于与至少一个UI元素中的目标UI元素对应的元 素保护控件的选择操作,例如点击、双击、长按、特定语音命令等任何适当动作。如果检测到选择操作,则电子设备可以使目标UI元素的内容无法正常显示。例如,如图3E所示,用户期望对UI元素340-3进行保护,并且点击了与UI元素340-3对应的元素保护控件310-3。由此,如图3F所示,UI元素340-3进入受保护状态,从而使得UI元素340-3的内容无法正常显示,例如使得UI元素340-3的内容被模糊化。由此,能够实现信息保护。应理解,模糊化仅是无法正常显示的示例,事实上,可以通过任何适当方式使得UI元素的内容无法正常显示,例如以具有适当透明度的另一图像覆盖、打乱UI元素的内容的显示顺序等。As shown in FIG. 3D, the electronic device may detect a selection operation acting on an element protection control corresponding to a target UI element in at least one UI element, such as any appropriate action such as clicking, double-clicking, long-pressing, or a specific voice command. If a selection operation is detected, the electronic device may disable the normal display of the content of the targeted UI element. For example, as shown in FIG. 3E, the user desires to protect UI element 340-3, and clicks on element protection control 310-3 corresponding to UI element 340-3. Thus, as shown in FIG. 3F , the UI element 340-3 enters a protected state, so that the content of the UI element 340-3 cannot be displayed normally, for example, the content of the UI element 340-3 is blurred. Thereby, information protection can be realized. It should be understood that blurring is only an example of the failure to display normally. In fact, the content of the UI element can be prevented from being displayed normally by any appropriate means, such as covering with another image with appropriate transparency, disrupting the display order of the content of the UI element Wait.
进一步地,在使得目标UI元素进入受保护状态之后,电子设备还可以检测作用于目标UI元素的解除保护操作。如果检测到解除保护操作,则电子设备可以使目标UI元素的内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份。如果身份验证成功,则电子设备可以使目标UI元素的内容正常显示。例如,如图3G所示,用户想要查看进入受保护状态的UI元素340-3的内容,并且通过长按、双击UI元素340-3等任何适当动作来触发如图3H所示的解除保护的验证界面(例如,密码、指纹、人脸等验证界面)。在用户验证成功之后,可以使得UI元素340-3离开受保护状态,从而正常显示该UI元素的内容,如图3I所示。Further, after making the target UI element enter the protected state, the electronic device may also detect an unprotection operation acting on the target UI element. If an unprotection operation is detected, the electronic device may cause the content of the target UI element to be displayed normally. In some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiates the unprotection operation. If the authentication is successful, the electronic device can cause the content of the target UI element to be displayed normally. For example, as shown in Figure 3G, the user wants to view the content of the UI element 340-3 that has entered the protected state, and triggers the unprotection as shown in Figure 3H by long pressing, double-clicking on the UI element 340-3, etc. The verification interface (for example, verification interface such as password, fingerprint, face, etc.). After the user authentication is successful, the UI element 340-3 can be left in the protected state, so as to display the content of the UI element normally, as shown in FIG. 3I .
图4A-4L示出了根据本公开的一些实施例的与元素保护操作相关联的UI 400A-400L的第二示例的示意图。具体地,在图4A-4L的示例中,示出了对经由控件访问的内容进行保护的场景。4A-4L show schematic diagrams of a second example of UIs 400A-400L associated with element protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 4A-4L , a scenario of protecting content accessed via controls is shown.
为了更清楚地理解本示例场景,首先将参考图4A-4C描述在元素UI没有进入受保护状态的情况下的示例UI。如图4A所示,UI 400A可以包括多个UI元素,例如UI元素430以及UI元素440-1至440-7(在下文中统称为“UI元素440”)。例如,UI 400A可以是即时消息应用的消息界面,在这种情况下,UI元素430可以是打开附加操作列表的控件或者增加新消息的控件,而UI元素440可以是来自不同发送者的消息。作为另一示例,UI 400A可以是电子设备的设置界面,在这种情况下,UI元素400可以是打开附加操作列表的控件或者增加新设置的控件,而UI元素440可以是不同的设置选项。In order to understand this example scenario more clearly, an example UI without the element UI entering the protected state will first be described with reference to FIGS. 4A-4C . As shown in FIG. 4A, UI 400A may include a plurality of UI elements, such as UI element 430 and UI elements 440-1 to 440-7 (hereinafter collectively referred to as "UI elements 440"). For example, UI 400A may be a message interface of an instant messaging application, in which case UI element 430 may be a control to open a list of additional operations or a control to add a new message, while UI element 440 may be a message from a different sender. As another example, UI 400A may be a setting interface of an electronic device, in which case UI element 400 may be a control for opening an additional operation list or adding a new setting, and UI element 440 may be a different setting option.
应理解,UI 400A以及UI元素430和440仅是示例,事实上,UI可以是任何适当界面,并且UI元素可以是任何适当控件。如上所述,在本文中使用的术语“UI元素”包括但不限于:窗口(window)、滚动条(scrollbar)、表格视图(tableview)、按钮(button)、菜单栏(menu bar)、文本框(text box)、导航栏、工具栏(toolbar)、图像(image)、静态文本(tatictext)、部件(Widget)等可视的UI元素。It should be understood that UI 400A and UI elements 430 and 440 are examples only, and in fact the UI may be any suitable interface and the UI elements may be any suitable controls. As mentioned above, the term "UI element" used in this article includes but is not limited to: window (window), scroll bar (scrollbar), table view (tableview), button (button), menu bar (menu bar), text box (text box), navigation bar, toolbar (toolbar), image (image), static text (tatictext), component (Widget) and other visual UI elements.
如图4B所示,用户想要查看经由UI元素430访问的内容,例如,用户想要打开附加操作列表,并且点击了UI元素430。在这种情况下,如图4C所示,电子设备显示经由UI元素430能够访问的附加操作列表,例如操作1-3的列表。As shown in FIG. 4B , the user wants to view content accessed via UI element 430 , for example, the user wants to open a list of additional operations and clicks on UI element 430 . In this case, as shown in FIG. 4C , the electronic device displays a list of additional operations accessible via UI element 430 , such as a list of operations 1-3.
在上文中描述了在元素UI没有进入受保护状态的情况下的示例UI,在下文中将参考图4D-4L描述在对元素UI进行保护的情况下的示例UI。Having described the example UI in case the element UI does not enter the protected state above, the example UI in case the element UI is protected will be described below with reference to FIGS. 4D-4L .
类似于图4A,如图4D所示,UI 400D可以包括多个UI元素,例如UI元素430以及UI元素440。如图4E所示,电子设备可以检测与UI相关联的元素保护操作。如上所述,元素保护操作可以包括控件显示操作和选择操作。例如,电子设备可以监控用户是否触发了控件显示操作,诸如三指长按、三指下滑、特定语音命令等任何适当动作。如果检测到控件显示 操作,则如图4F所示,电子设备可以在屏幕上显示与UI所包括的至少一个UI元素对应的元素保护控件,例如,与UI元素440-1至440-7对应的元素保护控件410-1至410-7(在下文中统称为“元素保护控件410”),以及与UI元素430对应的元素保护控件420。应理解,元素保护控件410和420的形状、大小和位置等仅是示例,事实上,元素保护控件可以具有任何适当形状、大小和位置。进一步地,虽然图4F中示出了与UI元素430和440对应的元素保护控件,然而元素保护控件的数目仅是示例。事实上,电子设备可以显示更多或更少的元素保护控件,例如,可以不显示与UI元素430对应的元素保护控件420,或者更多地显示与电子设备的状态栏(即,UI最上方的示出网络、电量、时间等信息的状态栏)对应的元素保护控件。Similar to FIG. 4A, as shown in FIG. 4D, UI 400D may include a plurality of UI elements, such as UI element 430 and UI element 440. As shown in FIG. 4E, the electronic device may detect element protection operations associated with the UI. As described above, element protection operations may include control display operations and selection operations. For example, the electronic device may monitor whether the user triggers a control display operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If a control display operation is detected, as shown in FIG. 4F , the electronic device may display on the screen an element protection control corresponding to at least one UI element included in the UI, for example, corresponding to UI elements 440-1 to 440-7. Element protection controls 410 - 1 to 410 - 7 (hereinafter collectively referred to as “element protection controls 410 ”), and an element protection control 420 corresponding to UI element 430 . It should be understood that the shape, size and location, etc. of element protection controls 410 and 420 are merely examples, and in fact, the element protection controls may have any suitable shape, size and location. Further, although element protection controls corresponding to UI elements 430 and 440 are shown in FIG. 4F , the number of element protection controls is merely an example. In fact, the electronic device may display more or fewer element protection controls, for example, may not display the element protection control 420 corresponding to the UI element 430, or may display more elements related to the status bar of the electronic device (that is, the topmost element of the UI). The element protection control corresponding to the status bar showing network, power, time and other information).
如图4G所示,电子设备可以检测作用于与至少一个UI元素中的目标UI元素对应的元素保护控件的选择操作,例如点击、双击、长按、特定语音命令等任何适当动作。如果检测到选择操作,则电子设备可以使经由目标UI元素访问的内容无法正常显示。例如,如图4H所示,用户期望对UI元素430进行保护,并且点击了与UI元素430对应的元素保护控件420。由此,如图4I所示,UI元素430进入受保护状态,从而使得经由UI元素430访问的内容无法正常显示,例如使得UI元素430变为虚线表示,并且经由UI元素430将无法打开附加操作列表。由此,能够实现信息保护。应理解,虚线表示仅是进入受保护状态的UI元素的示例,事实上,可以通过任何适当方式表示UI元素进入受保护状态,例如以用另一图像代替UI元素、将UI元素置灰等。As shown in FIG. 4G, the electronic device may detect a selection operation acting on an element protection control corresponding to a target UI element in at least one UI element, such as any appropriate action such as clicking, double-clicking, long-pressing, or a specific voice command. If a selection operation is detected, the electronic device may disable normal display of content accessed via the target UI element. For example, as shown in FIG. 4H , the user desires to protect the UI element 430 and clicks on the element protection control 420 corresponding to the UI element 430 . Thus, as shown in FIG. 4I , the UI element 430 enters a protected state, so that the content accessed via the UI element 430 cannot be displayed normally, for example, the UI element 430 becomes a dotted line representation, and additional operations cannot be opened via the UI element 430 list. Thereby, information protection can be realized. It should be understood that the dotted line represents only an example of the UI element entering the protected state. In fact, any appropriate method may be used to indicate that the UI element enters the protected state, such as replacing the UI element with another image, graying the UI element, etc.
进一步地,在使得目标UI元素进入受保护状态之后,电子设备还可以检测作用于目标UI元素的解除保护操作。如果检测到解除保护操作,则电子设备可以使经由目标UI元素访问的内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份。如果身份验证成功,则电子设备可以使经由目标UI元素访问的内容正常显示。例如,如图4J所示,用户想要查看经由进入受保护状态的UI元素430访问的内容,并且通过长按、双击UI元素430等任何适当动作来触发如图4K所示的解除保护的验证界面(例如,密码、指纹、人脸等验证界面)。在用户验证成功之后,可以使得UI元素430离开受保护状态,并且正常显示经由UI元素430访问的附加操作列表,如图4L所示。Further, after making the target UI element enter the protected state, the electronic device may also detect an unprotection operation acting on the target UI element. If an unprotect operation is detected, the electronic device may cause the content accessed via the target UI element to be displayed normally. In some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiates the unprotection operation. If the authentication is successful, the electronic device can cause the content accessed via the target UI element to display normally. For example, as shown in FIG. 4J, the user wants to view the content accessed via the UI element 430 entering the protected state, and triggers the verification of unprotection as shown in FIG. 4K by long pressing, double-clicking on the UI element 430, etc. Interface (for example, password, fingerprint, face verification interface, etc.). After successful user authentication, the UI element 430 may be caused to leave the protected state, and the list of additional operations accessed via the UI element 430 may be displayed normally, as shown in FIG. 4L .
在上文中参考图3A-4L描述了对控件的保护,在下文中将参考图5A-5P描述对布局的保护。图5A-5P示出了根据本公开的一些实施例的与元素保护操作相关联的UI 500A-500P的第三示例的示意图。具体地,在图5A-5P的示例中,示出了对经由控件访问的布局进行保护的场景。The protection of controls is described above with reference to FIGS. 3A-4L , and the protection of layouts will be described below with reference to FIGS. 5A-5P . 5A-5P illustrate diagrams of a third example of UIs 500A-500P associated with element protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 5A-5P , a scenario of protecting a layout accessed via a control is shown.
为了更清楚地理解本示例场景,首先将参考图5A-5C描述在元素UI没有进入受保护状态的情况下的示例UI。如图5A所示,UI 500A可以包括多个UI元素,例如与各种智能设备相关联的控件以及与家居、商城、智能和我的布局或页面相关联的控件。应理解,UI 500A以及其中的UI元素仅是示例,事实上,UI可以是任何适当界面,并且UI元素可以是任何适当控件。如上所述,在本文中使用的术语“UI元素”包括但不限于:窗口(window)、滚动条(scrollbar)、表格视图(tableview)、按钮(button)、菜单栏(menu bar)、文本框(text box)、导航栏、工具栏(toolbar)、图像(image)、静态文本(tatictext)、部件(Widget)等可视的UI元素。In order to understand this example scenario more clearly, an example UI where the element UI does not enter the protected state will first be described with reference to FIGS. 5A-5C . As shown in FIG. 5A , UI 500A may include multiple UI elements, such as controls associated with various smart devices and controls associated with Home, Mall, Smart, and My layouts or pages. It should be understood that UI 500A and the UI elements therein are merely examples, and in fact, the UI may be any suitable interface, and the UI elements may be any suitable controls. As mentioned above, the term "UI element" used in this article includes but is not limited to: window (window), scroll bar (scrollbar), table view (tableview), button (button), menu bar (menu bar), text box (text box), navigation bar, toolbar (toolbar), image (image), static text (tatictext), component (Widget) and other visual UI elements.
如图5B所示,用户想要查看商城页面的内容,并且点击了商城控件。在这种情况下,如图5C所示,电子设备显示商城页面的内容。As shown in FIG. 5B , the user wants to view the content of the mall page, and clicks on the mall control. In this case, as shown in FIG. 5C , the electronic device displays the content of the mall page.
在上文中描述了在元素UI没有进入受保护状态的情况下的示例UI,在下文中将参考图5D-5P描述在对元素UI进行保护的情况下的示例UI。Having described the example UI in the case that the element UI does not enter the protected state above, the example UI in the case that the element UI is protected will be described below with reference to FIGS. 5D-5P .
类似于图5A,如图5D所示,UI 500D可以包括多个UI元素,例如与各种智能设备相关联的控件以及与家居、商城、智能和我的布局或页面相关联的控件。如图5E所示,电子设备可以检测与UI相关联的元素保护操作。如上所述,元素保护操作可以包括控件显示操作和选择操作。例如,电子设备可以监控用户是否触发了控件显示操作,诸如三指长按、三指下滑、特定语音命令等任何适当动作。如果检测到控件显示操作,则如图5F所示,电子设备可以在屏幕上显示与UI所包括的至少一个UI元素对应的元素保护控件,例如,分别与家居控件、商城控件、智能控件和我的控件对应的元素保护控件510-540。应理解,元素保护控件510-540的形状、大小和位置等仅是示例,事实上,元素保护控件可以具有任何适当形状、大小和位置。进一步地,虽然图5F中示出了分别与家居控件、商城控件、智能控件和我的控件对应的元素保护控件,然而元素保护控件的数目仅是示例。事实上,电子设备可以显示更多或更少的元素保护控件,例如,可以不显示与家居控件对应的元素保护控件510,或者更多地显示与各种智能设备(例如,客厅的电视的控件)对应的元素保护控件。Similar to FIG. 5A , as shown in FIG. 5D , UI 500D may include multiple UI elements, such as controls associated with various smart devices and controls associated with Home, Mall, Smart and My layouts or pages. As shown in FIG. 5E, the electronic device may detect element protection operations associated with the UI. As described above, element protection operations may include control display operations and selection operations. For example, the electronic device may monitor whether the user triggers a control display operation, such as any appropriate action such as three-finger long press, three-finger slide, specific voice command, and the like. If the control display operation is detected, as shown in FIG. 5F, the electronic device may display on the screen an element protection control corresponding to at least one UI element included in the UI, for example, corresponding to the home control, the mall control, the smart control and the personal control respectively. The controls correspond to element protection controls 510-540. It should be understood that the shape, size, and location, etc. of the element protection controls 510-540 are examples only, and in fact, the element protection controls may have any suitable shape, size, and location. Further, although element protection controls respectively corresponding to the home control, mall control, smart control and my control are shown in FIG. 5F , the number of element protection controls is just an example. In fact, the electronic device may display more or fewer element protection controls, for example, may not display the element protection control 510 corresponding to the home control, or may display more controls related to various smart devices (for example, the TV in the living room) ) corresponds to the element protection control.
如图5G所示,电子设备可以检测作用于与至少一个UI元素中的目标UI元素对应的元素保护控件的选择操作,例如点击、双击、长按、特定语音命令等任何适当动作。如果检测到选择操作,则电子设备可以使经由目标UI元素访问的内容无法正常显示。例如,如图5H所示,用户期望对经由商城控件访问的内容进行保护,并且点击了与商城控件对应的元素保护控件520。由此,如图5I所示,经由商城控件访问的内容进入受保护状态,并且使得商城控件变为虚线表示。在这种情况下,如图5J所示,即使用户想要通过点击商城控件来查看经由商城控件访问的内容,经由商城控件访问的内容也无法正常显示,例如,使得商城页面被模糊化(如图5K所示)或者经由商城控件将无法进入商城页面(如图5L所示)。由此,能够实现信息保护。As shown in FIG. 5G , the electronic device may detect a selection operation acting on an element protection control corresponding to a target UI element in at least one UI element, such as any appropriate action such as click, double click, long press, specific voice command, and the like. If a selection operation is detected, the electronic device may disable normal display of content accessed via the target UI element. For example, as shown in FIG. 5H , the user desires to protect the content accessed via the mall control, and clicks on the element protection control 520 corresponding to the mall control. Thus, as shown in FIG. 51 , the content accessed via the mall control enters a protected state, and causes the mall control to become a dotted line representation. In this case, as shown in FIG. 5J , even if the user wants to view the content accessed through the mall control by clicking on the mall control, the content accessed through the mall control cannot be displayed normally, for example, making the mall page blurred (such as As shown in FIG. 5K ) or via the mall control, the mall page (as shown in FIG. 5L ) cannot be entered. Thereby, information protection can be realized.
应理解,虚线表示仅是进入受保护状态的UI元素的示例,事实上,可以通过任何适当方式表示UI元素进入受保护状态,例如以用另一图像代替UI元素、将UI元素置灰等。此外,模糊化也仅是无法正常显示的示例,事实上,可以通过任何适当方式使得UI元素的内容无法正常显示,例如以具有适当透明度的另一图像覆盖、打乱UI元素的内容的显示顺序等。It should be understood that the dotted line represents only an example of the UI element entering the protected state. In fact, any appropriate method may be used to indicate that the UI element enters the protected state, such as replacing the UI element with another image, graying the UI element, etc. In addition, blurring is just an example of failure to display normally. In fact, the content of UI elements can be prevented from displaying normally by any appropriate means, such as overlaying with another image with appropriate transparency, disrupting the display order of the content of UI elements Wait.
进一步地,在使得目标UI元素进入受保护状态之后,电子设备还可以检测作用于目标UI元素的解除保护操作。如果检测到解除保护操作,则电子设备可以使经由目标UI元素访问的内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份。如果身份验证成功,则电子设备可以使经由目标UI元素访问的内容正常显示。例如,用户想要查看经由进入受保护状态的商城控件访问的内容,并且通过长按、双击商城控件(如图5N所示)或与商城控件相关联的内容(如图5M所示)等任何适当动作来触发如图5O所示的解除保护的验证界面(例如,密码、指纹、人脸等验证界面)。在用户验证成功之后,可以使得商城控件离开受保护状态,并且正常显示经由商城控件访问的商城页面,如图5P所示。Further, after making the target UI element enter the protected state, the electronic device may also detect an unprotection operation acting on the target UI element. If an unprotect operation is detected, the electronic device may cause the content accessed via the target UI element to be displayed normally. In some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiates the unprotection operation. If the authentication is successful, the electronic device can cause the content accessed via the target UI element to display normally. For example, a user wants to view content accessed via a mall control that has entered a protected state, and either long-presses, double-clicks on the mall control (as shown in Figure 5N), or content associated with the mall control (as shown in Figure 5M), etc. Appropriate actions are taken to trigger the unprotected verification interface (for example, password, fingerprint, face, etc. verification interface) as shown in FIG. 50 . After the user is authenticated successfully, the mall control can be made to leave the protected state, and the mall page accessed via the mall control can be displayed normally, as shown in FIG. 5P .
在上文中参考图3A-5P描述了元素保护操作,在下文中将参考图6A-10E描述界面保护 操作。在界面保护操作中,电子设备可以检测与UI相关联的界面保护操作。例如,电子设备可以监控用户是否触发了诸如界面保护控件、特定语音命令等任何适当动作。如果检测到界面保护操作,则电子设备可以使UI的至少一部分内容无法正常显示。例如,当用户点击了界面保护控件时,UI的所有内容或者一部分内容被模糊化。在这种情况下,例如,当用户在地铁等公共交通工具上时,其他人无法看到UI的内容,从而实现信息保护。The element protection operation is described above with reference to FIGS. 3A-5P , and the interface protection operation will be described below with reference to FIGS. 6A-10E . In the interface protection operation, the electronic device may detect the interface protection operation associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as interface protection controls, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, when the user clicks the interface protection control, all or part of the content of the UI is blurred. In this case, for example, when a user is on public transportation such as a subway, other people cannot see the content of the UI, thereby achieving information protection.
进一步地,在使得目标UI元素的内容进入受保护状态之后,电子设备还可以检测作用于UI的解除保护操作。如果检测到解除保护操作,则电子设备可以使UI的至少一部分内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以确定UI中的由发生解除保护操作的位置所指示的目标区域,以及使目标区域正常显示。例如,在解除保护操作是点击操作,并且UI包括至少一个窗口的情况下,可以将至少一个窗口中发生点击操作的目标窗口确定为目标区域。作为另一示例,在解除保护操作是区域绘制操作的情况下,可以将UI中被区域绘制操作包围的部分确定为目标区域。在某些实施例中,用户可以通过预定形状(例如,圆形、矩形等任何适当形状)来绘制目标区域。例如,用户可以通过在屏幕上拖动、缩放预定形状等来绘制目标区域。在这种情况下,目标区域可以具有规则的形状。备选地,用户也可以任意地绘制目标区域。在这种情况下,目标区域可以具有不规则的形状。作为再一示例,在解除保护操作是滑动擦拭操作的情况下,可以将UI中发生滑动擦拭操作的部分确定为目标区域。Further, after making the content of the target UI element enter the protected state, the electronic device may also detect an unprotect operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotection operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. As another example, in a case where the unprotecting operation is an area drawing operation, a part of the UI surrounded by the area drawing operation may be determined as a target area. In some embodiments, the user can draw the target area in a predetermined shape (eg, any suitable shape such as a circle, a rectangle, etc.). For example, the user can draw a target area by dragging, scaling a predetermined shape, etc. on the screen. In this case, the target area may have a regular shape. Alternatively, the user can draw the target area arbitrarily. In this case, the target area may have an irregular shape. As yet another example, in the case that the unprotecting operation is a sliding wiping operation, the part of the UI where the sliding wiping operation occurs may be determined as the target area.
图6A-6D示出了根据本公开的一些实施例的与界面保护操作相关联的UI 600A-600D的第四示例的示意图。具体地,在图6A-6D的示例中,示出了单悬浮窗口的场景。6A-6D show diagrams of a fourth example of UIs 600A-600D associated with interface protection operations according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 6A-6D , a scene of a single floating window is shown.
如图6A所示,UI与包括界面保护控件610、悬浮窗口620和其他背景部分。电子设备可以检测与UI相关联的界面保护操作。例如,电子设备可以监控用户是否触发了诸如界面保护控件610、特定语音命令等任何适当动作。如果检测到界面保护操作,则电子设备可以使UI的至少一部分内容无法正常显示。例如,如图6B所示,用户想要对UI的至少一部分内容进行保护,并且点击了界面保护控件610。当用户点击了界面保护控件610时,如图6C所示,UI的至少一部分内容被模糊化。在这种情况下,例如,当用户在地铁等公共交通工具上时,其他人无法看到UI的内容,从而实现信息保护。应理解,虽然图6C中示出UI的所有内容被模糊化,然而可以仅模糊化UI的一部分内容,例如仅模糊化悬浮窗口620。在某些实施例中,被保护的内容是电子设备或用户可设置的。As shown in FIG. 6A , the UI includes an interface protection control 610 , a floating window 620 and other background parts. The electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as the interface protection control 610, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 6B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 610 . When the user clicks the interface protection control 610, as shown in FIG. 6C, at least a part of the content of the UI is blurred. In this case, for example, when a user is on public transportation such as a subway, other people cannot see the content of the UI, thereby achieving information protection. It should be understood that although all the content of the UI is blurred as shown in FIG. 6C , only a part of the content of the UI may be blurred, for example, only the floating window 620 is blurred. In some embodiments, protected content is electronic device or user settable.
进一步地,在使得UI的至少一部分内容进入受保护状态之后,电子设备还可以检测作用于UI的解除保护操作。如果检测到解除保护操作,则电子设备可以使UI的至少一部分内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以确定UI中的由发生解除保护操作的位置所指示的目标区域,以及使目标区域正常显示。例如,在解除保护操作是点击操作,并且UI包括至少一个窗口的情况下,可以将至少一个窗口中发生点击操作的目标窗口确定为目标区域。例如,如图6D所示,在用户点击了悬浮窗口620的情况下,电子设备可以将悬浮窗口620确定为恢复正常显示的目标区域,从而使得悬浮窗口620重新变得清晰,同时继续保持UI的其他部分模糊。Further, after making at least a part of content of the UI into a protected state, the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotection operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. For example, as shown in FIG. 6D , when the user clicks on the floating window 620, the electronic device may determine the floating window 620 as the target area for restoring normal display, so that the floating window 620 becomes clear again while continuing to maintain the UI. Other parts are blurred.
此外,在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份(例如,密码、指纹、人脸等验证)。如果身份验证成功,则电子设备可以使目标区域正常显示。In addition, in some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
图7A-7E示出了根据本公开的一些实施例的与界面保护操作相关联的UI 700A-700E的第五示例的示意图。具体地,在图7A-7E的示例中,示出了多悬浮窗口的场景。7A-7E show diagrams of a fifth example of UIs 700A-700E associated with interface protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 7A-7E , a scene with multiple floating windows is shown.
如图7A所示,UI与包括界面保护控件710、悬浮窗口720、悬浮窗口730、和其他背景部分。电子设备可以检测与UI相关联的界面保护操作。例如,电子设备可以监控用户是否触发了诸如界面保护控件710、特定语音命令等任何适当动作。如果检测到界面保护操作,则电子设备可以使UI的至少一部分内容无法正常显示。例如,如图7B所示,用户想要对UI的至少一部分内容进行保护,并且点击了界面保护控件710。当用户点击了界面保护控件710时,如图7C所示,UI的至少一部分内容被模糊化。在这种情况下,例如,当用户在地铁等公共交通工具上时,其他人无法看到UI的内容,从而实现信息保护。应理解,虽然图7C中示出UI的所有内容被模糊化,然而可以仅模糊化UI的一部分内容,例如仅模糊化悬浮窗口720和730。在某些实施例中,被保护的内容是电子设备或用户可设置的。As shown in FIG. 7A, the UI includes an interface protection control 710, a floating window 720, a floating window 730, and other background parts. The electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as interface protection controls 710, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 7B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 710 . When the user clicks the interface protection control 710, as shown in FIG. 7C, at least a part of the content of the UI is blurred. In this case, for example, when a user is on public transportation such as a subway, other people cannot see the content of the UI, thereby achieving information protection. It should be understood that although it is shown in FIG. 7C that all content of the UI is blurred, only a part of the content of the UI may be blurred, for example, only the floating windows 720 and 730 are blurred. In some embodiments, protected content is electronic device or user settable.
进一步地,在使得UI的至少一部分内容进入受保护状态之后,电子设备还可以检测作用于UI的解除保护操作。如果检测到解除保护操作,则电子设备可以使UI的至少一部分内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以确定UI中的由发生解除保护操作的位置所指示的目标区域,以及使目标区域正常显示。例如,在解除保护操作是点击操作,并且UI包括至少一个窗口的情况下,可以将至少一个窗口中发生点击操作的目标窗口确定为目标区域。例如,如图7D所示,在用户点击了悬浮窗口720的情况下,电子设备可以将悬浮窗口720确定为恢复正常显示的目标区域,从而使得悬浮窗口720重新变得清晰,同时继续保持UI的其他部分模糊。作为另一示例,在用户点击了悬浮窗口730的情况下,电子设备可以将悬浮窗口730确定为恢复正常显示的目标区域,从而使得悬浮窗口730重新变得清晰,同时继续保持UI的其他部分模糊。Further, after making at least a part of content of the UI into a protected state, the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotection operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. For example, as shown in FIG. 7D , when the user clicks on the floating window 720, the electronic device may determine the floating window 720 as the target area for restoring normal display, so that the floating window 720 becomes clear again while continuing to maintain the UI. Other parts are blurred. As another example, when the user clicks on the floating window 730, the electronic device may determine the floating window 730 as the target area for restoring normal display, so that the floating window 730 becomes clear again while continuing to keep other parts of the UI blurred .
此外,在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份(例如,密码、指纹、人脸等验证)。如果身份验证成功,则电子设备可以使目标区域正常显示。In addition, in some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
图8A-8E示出了根据本公开的一些实施例的与界面保护操作相关联的UI 800A-800E的第六示例的示意图。具体地,在图8A-8E的示例中,示出了分屏场景。8A-8E show diagrams of sixth examples of UIs 800A-800E associated with interface protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 8A-8E , a split-screen scene is shown.
如图8A所示,UI与包括界面保护控件810、分屏窗口820、分屏窗口830、和其他背景部分。电子设备可以检测与UI相关联的界面保护操作。例如,电子设备可以监控用户是否触发了诸如界面保护控件810、特定语音命令等任何适当动作。如果检测到界面保护操作,则电子设备可以使UI的至少一部分内容无法正常显示。例如,如图8B所示,用户想要对UI的至少一部分内容进行保护,并且点击了界面保护控件810。当用户点击了界面保护控件810时,如图8C所示,UI的至少一部分内容被模糊化。在这种情况下,例如,当用户在地铁等公共交通工具上时,其他人无法看到UI的内容,从而实现信息保护。应理解,虽然图8C中示出UI的所有内容被模糊化,然而可以仅模糊化UI的一部分内容,例如仅模糊化分屏窗口820和830。在某些实施例中,被保护的内容是电子设备或用户可设置的。As shown in FIG. 8A, the UI includes an interface protection control 810, a split-screen window 820, a split-screen window 830, and other background parts. The electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as the interface protection control 810, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 8B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 810 . When the user clicks the interface protection control 810, as shown in FIG. 8C, at least a part of the content of the UI is blurred. In this case, for example, when a user is on public transportation such as a subway, other people cannot see the content of the UI, thereby achieving information protection. It should be understood that although it is shown in FIG. 8C that all content of the UI is blurred, only a part of the content of the UI may be blurred, for example, only the split- screen windows 820 and 830 are blurred. In some embodiments, protected content is electronic device or user settable.
进一步地,在使得UI的至少一部分内容进入受保护状态之后,电子设备还可以检测作用于UI的解除保护操作。如果检测到解除保护操作,则电子设备可以使UI的至少一部分内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以确定UI中的由发生解除保护操作的位置所指示的目标区域,以及使目标区域正常显示。例如,在解除保 护操作是点击操作,并且UI包括至少一个窗口的情况下,可以将至少一个窗口中发生点击操作的目标窗口确定为目标区域。例如,如图8D所示,在用户点击了分屏窗口820的情况下,电子设备可以将分屏窗口820确定为恢复正常显示的目标区域,从而使得分屏窗口820重新变得清晰,同时继续保持UI的其他部分模糊。作为另一示例,在用户点击了分屏窗口830的情况下,电子设备可以将分屏窗口830确定为恢复正常显示的目标区域,从而使得分屏窗口830重新变得清晰,同时继续保持UI的其他部分模糊。Further, after making at least a part of content of the UI into a protected state, the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotecting operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. For example, as shown in FIG. 8D, when the user clicks on the split-screen window 820, the electronic device can determine the split-screen window 820 as the target area for restoring normal display, so that the split-screen window 820 becomes clear again, and at the same time continues to Keep the rest of the UI blurred. As another example, when the user clicks on the split-screen window 830, the electronic device may determine the split-screen window 830 as the target area for restoring normal display, so that the split-screen window 830 becomes clear again while continuing to maintain the UI. Other parts are blurred.
此外,在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份(例如,密码、指纹、人脸等验证)。如果身份验证成功,则电子设备可以使目标区域正常显示。In addition, in some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
图9A-9E示出了根据本公开的一些实施例的与界面保护操作相关联的UI 900A-900E的第七示例的示意图。具体地,在图9A-9E的示例中,示出了平行视界场景。9A-9E show diagrams of a seventh example of UIs 900A-900E associated with interface protection operations, according to some embodiments of the present disclosure. Specifically, in the example of FIGS. 9A-9E , parallel horizon scenarios are shown.
如图9A所示,UI与包括界面保护控件910、平行视界窗口920、平行视界窗口930、和其他背景部分。电子设备可以检测与UI相关联的界面保护操作。例如,电子设备可以监控用户是否触发了诸如界面保护控件910、特定语音命令等任何适当动作。如果检测到界面保护操作,则电子设备可以使UI的至少一部分内容无法正常显示。例如,如图9B所示,用户想要对UI的至少一部分内容进行保护,并且点击了界面保护控件910。当用户点击了界面保护控件910时,如图9C所示,UI的至少一部分内容被模糊化。在这种情况下,例如,当用户在地铁等公共交通工具上时,其他人无法看到UI的内容,从而实现信息保护。应理解,虽然图9C中示出UI的所有内容被模糊化,然而可以仅模糊化UI的一部分内容,例如仅模糊化平行视界窗口920和930。在某些实施例中,被保护的内容是电子设备或用户可设置的。As shown in FIG. 9A , the UI includes an interface protection control 910 , a parallel horizon window 920 , a parallel horizon window 930 , and other background parts. The electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as interface protection controls 910, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 9B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 910 . When the user clicks the interface protection control 910 , as shown in FIG. 9C , at least a part of the content of the UI is blurred. In this case, for example, when a user is on public transportation such as a subway, other people cannot see the content of the UI, thereby achieving information protection. It should be understood that although all content of the UI is shown to be blurred in FIG. 9C , only a part of the content of the UI may be blurred, for example, only the parallel horizon windows 920 and 930 are blurred. In some embodiments, protected content is electronic device or user settable.
进一步地,在使得UI的至少一部分内容进入受保护状态之后,电子设备还可以检测作用于UI的解除保护操作。如果检测到解除保护操作,则电子设备可以使UI的至少一部分内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以确定UI中的由发生解除保护操作的位置所指示的目标区域,以及使目标区域正常显示。例如,在解除保护操作是点击操作,并且UI包括至少一个窗口的情况下,可以将至少一个窗口中发生点击操作的目标窗口确定为目标区域。例如,如图9D所示,在用户点击了平行视界窗口920的情况下,电子设备可以将平行视界窗口920确定为恢复正常显示的目标区域,从而使得平行视界窗口920重新变得清晰,同时继续保持UI的其他部分模糊。作为另一示例,在用户点击了平行视界窗口930的情况下,电子设备可以将平行视界窗口930确定为恢复正常显示的目标区域,从而使得平行视界窗口930重新变得清晰,同时继续保持UI的其他部分模糊。Further, after making at least a part of content of the UI into a protected state, the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally. For example, when the unprotection operation is a click operation, and the UI includes at least one window, the target window where the click operation occurs in the at least one window may be determined as the target area. For example, as shown in FIG. 9D, when the user clicks on the parallel horizon window 920, the electronic device may determine the parallel horizon window 920 as the target area for restoring normal display, so that the parallel horizon window 920 becomes clear again, and at the same time continue to Keep the rest of the UI blurred. As another example, when the user clicks on the parallel horizon window 930, the electronic device may determine the parallel horizon window 930 as the target area for restoring normal display, so that the parallel horizon window 930 becomes clear again while continuing to maintain the UI. Other parts are blurred.
此外,在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份(例如,密码、指纹、人脸等验证)。如果身份验证成功,则电子设备可以使目标区域正常显示。In addition, in some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
图10A-10E示出了根据本公开的一些实施例的与界面保护操作相关联的UI 1000A-1000E的第八示例的示意图。具体地,在图10A-10E的示例中,示出了局部内容显示场景。10A-10E show diagrams of eighth examples of UIs 1000A-1000E associated with interface protection operations, according to some embodiments of the present disclosure. Specifically, in the examples of FIGS. 10A-10E , partial content display scenarios are shown.
如图10A所示,UI与包括界面保护控件1010和各种其他UI元素。电子设备可以检测与UI相关联的界面保护操作。例如,电子设备可以监控用户是否触发了诸如界面保护控件1010、特定语音命令等任何适当动作。如果检测到界面保护操作,则电子设备可以使UI的至少一部分内容无法正常显示。例如,如图10B所示,用户想要对UI的至少一部分内容进行保护, 并且点击了界面保护控件1010。当用户点击了界面保护控件1010时,如图10C所示,UI的至少一部分内容被模糊化。在这种情况下,例如,当用户在地铁等公共交通工具上时,其他人无法看到UI的内容,从而实现信息保护。应理解,虽然图10C中示出UI的所有内容被模糊化,然而可以仅模糊化UI的一部分内容,例如仅模糊化与情景智能相关联的控件和与停车相关联的控件。在某些实施例中,被保护的内容是电子设备或用户可设置的。As shown in FIG. 1OA, the UI includes an interface guard control 1010 and various other UI elements. The electronic device can detect interface protection operations associated with the UI. For example, the electronic device may monitor whether the user has triggered any appropriate actions such as the interface protection control 1010, specific voice commands, and the like. If an interface protection operation is detected, the electronic device may prevent at least a part of the content of the UI from being displayed normally. For example, as shown in FIG. 10B , the user wants to protect at least a part of the content of the UI, and clicks the interface protection control 1010 . When the user clicks the interface protection control 1010, as shown in FIG. 10C , at least a part of the content of the UI is blurred. In this case, for example, when a user is on public transportation such as a subway, other people cannot see the content of the UI, thereby achieving information protection. It should be understood that although all content of the UI is shown to be blurred in FIG. 10C , only a part of the content of the UI may be blurred, for example, only controls associated with contextual intelligence and controls associated with parking may be blurred. In some embodiments, protected content is electronic device or user settable.
进一步地,在使得UI的至少一部分内容进入受保护状态之后,电子设备还可以检测作用于UI的解除保护操作。如果检测到解除保护操作,则电子设备可以使UI的至少一部分内容正常显示。在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以确定UI中的由发生解除保护操作的位置所指示的目标区域,以及使目标区域正常显示。Further, after making at least a part of content of the UI into a protected state, the electronic device may also detect an unprotection operation acting on the UI. If an unprotection operation is detected, the electronic device may display at least a part of the content of the UI normally. In some embodiments, when the electronic device detects the unprotection operation, it can also determine the target area indicated by the location where the unprotection operation occurs in the UI, and display the target area normally.
在某些实施例中,在解除保护操作是区域绘制操作的情况下,电子设备可以将UI中被区域绘制操作包围的部分确定为目标区域。例如,如图10D所示,用户可以用手指在屏幕上圈出目标区域1020,从而使得目标区域1020重新变得清晰,同时继续保持UI的其他部分模糊。In some embodiments, if the unprotecting operation is an area drawing operation, the electronic device may determine the part of the UI surrounded by the area drawing operation as the target area. For example, as shown in FIG. 10D , the user may use a finger to circle the target area 1020 on the screen, thereby making the target area 1020 clear again while continuing to keep other parts of the UI blurred.
备选地,在解除保护操作是滑动擦拭操作的情况下,电子设备可以将UI中发生滑动擦拭操作的部分确定为目标区域。例如,如图10E所示,用户可以用手指在屏幕上擦拭出目标区域1030,从而使得目标区域1030重新变得清晰,同时继续保持UI的其他部分模糊。Alternatively, in the case that the unlocking operation is a sliding wiping operation, the electronic device may determine a part of the UI where the sliding wiping operation occurs as the target area. For example, as shown in FIG. 10E , the user can wipe out the target area 1030 with a finger on the screen, thereby making the target area 1030 clear again while continuing to keep other parts of the UI blurred.
应理解,目标区域1020仅是示例,事实上,用户可以用手指在屏幕上圈出具有规则或者不规则形状的任何适当区域,并且可以擦拭出具有规则或者不规则形状的任何适当区域。It should be understood that the target area 1020 is only an example, in fact, the user can circle any suitable area with a regular or irregular shape on the screen with a finger, and can wipe out any suitable area with a regular or irregular shape.
此外,在某些实施例中,电子设备在检测到解除保护操作的情况下,还可以验证发起解除保护操作的用户的身份(例如,密码、指纹、人脸等验证)。如果身份验证成功,则电子设备可以使目标区域正常显示。In addition, in some embodiments, when the electronic device detects the unprotection operation, it can also verify the identity of the user who initiated the unprotection operation (for example, password, fingerprint, face verification, etc.). If the authentication is successful, the electronic device can cause the target area to be displayed normally.
在上文中,详细描述了信息保护的示例场景。在下文中,将参考图11进一步描述根据本公开的实施例的图形界面显示方法1100的流程图。应当理解,方法1100可以由以上参考图1所描述的电子设备100或者参考图2所描述的电子设备200来执行。在此参考图3A-10E的UI 300A-1000E描述方法1100。然而,应当理解,UI 300A-1000E仅是示例,方法1100可以适用于任何适当界面,包括但不限于UI 300A-1000E。In the above, an example scenario of information protection is described in detail. Hereinafter, a flowchart of a graphical interface display method 1100 according to an embodiment of the present disclosure will be further described with reference to FIG. 11 . It should be understood that the method 1100 may be executed by the electronic device 100 described above with reference to FIG. 1 or the electronic device 200 described with reference to FIG. 2 . Method 1100 is described herein with reference to UIs 300A-1000E of FIGS. 3A-10E . However, it should be understood that the UIs 300A-1000E are merely examples and the method 1100 may be applicable to any suitable interface, including but not limited to the UIs 300A-1000E.
在框1110,在电子设备的屏幕上显示用户界面UI。在框1120,电子设备检测与所述UI相关联的保护操作。在框1130,响应于检测到所述保护操作,电子设备使与所述UI的至少一部分相关联的内容在所述屏幕上无法正常显示。以此方式,能够保护用户信息,使得用户信息不会被未授权用户查看,从而增强了电子设备的安全性,并且显著提高了用户体验。At block 1110, a user interface UI is displayed on the screen of the electronic device. At block 1120, the electronic device detects a protection operation associated with the UI. At block 1130, in response to detecting the protection operation, the electronic device disables content associated with at least a portion of the UI from being normally displayed on the screen. In this way, user information can be protected so that the user information cannot be viewed by unauthorized users, thereby enhancing the security of the electronic device and significantly improving user experience.
在一些实现方式中,与所述UI的至少一部分相关联的内容包括以下至少一者:所述UI的至少一部分所显示的内容,和经由所述UI的至少一部分所访问的内容。以此方式,能够使UI当前显示的内容和/或经由UI当前显示的内容进一步访问的内容受保护,从而增强了电子设备的安全性,并且显著提高了用户体验。In some implementations, the content associated with at least a portion of the UI includes at least one of: content displayed by at least a portion of the UI, and content accessed via at least a portion of the UI. In this way, content currently displayed by the UI and/or content further accessed via the content currently displayed by the UI can be protected, thereby enhancing security of the electronic device and significantly improving user experience.
在一些实现方式中,所述保护操作包括:对所述UI中的UI元素进行保护的元素保护操作,所述元素保护操作使与所述UI元素相关联的内容无法正常显示,或对所述UI进行保护的界面保护操作,所述界面保护操作使所述UI的至少一部分内容无法正常显示。以此方式,能够在UI的粒度上或UI中的UI元素的粒度上保护用户信息,从而增强了电子设备的安全性,并且显著提高了用户体验。In some implementations, the protection operation includes: an element protection operation for protecting UI elements in the UI, and the element protection operation prevents the content associated with the UI element from being displayed normally, or protects the UI element The UI is protected by an interface protection operation, and the interface protection operation prevents at least a part of the content of the UI from being displayed normally. In this way, user information can be protected at the granularity of the UI or at the granularity of UI elements in the UI, thereby enhancing the security of the electronic device and significantly improving user experience.
在一些实现方式中,所述保护操作是所述元素保护操作,并且使所述内容无法正常显示 包括:基于所述元素保护操作,确定与所述元素保护操作对应的目标UI元素;以及使与所述目标UI元素相关联的所述内容无法正常显示。以此方式,能够容易地确定目标UI元素,并且对目标UI元素进行保护,由此增强了信息保护的灵活性,从而提高了用户体验。In some implementations, the protection operation is the element protection operation, and preventing the content from being displayed normally includes: determining a target UI element corresponding to the element protection operation based on the element protection operation; The content associated with the target UI element cannot be displayed normally. In this way, the target UI element can be easily determined and protected, thereby enhancing the flexibility of information protection and improving user experience.
在一些实现方式中,所述元素保护操作包括控件显示操作和选择操作,并且所述基于所述元素保护操作确定与所述元素保护操作对应的目标UI元素包括:基于所述控件显示操作,在所述屏幕上显示与所述UI所包括的至少一个UI元素对应的元素保护控件;以及基于所述选择操作,将所述选择操作作用于的元素保护控件所对应的UI元素确定为所述目标UI元素。以此方式,能够通过元素保护控件直观地选择目标UI元素,并且对目标UI元素进行保护,由此增强了信息保护的灵活性,从而提高了用户体验。In some implementations, the element protection operation includes a control display operation and a selection operation, and the determining the target UI element corresponding to the element protection operation based on the element protection operation includes: based on the control display operation, in Displaying on the screen an element protection control corresponding to at least one UI element included in the UI; and based on the selection operation, determining the UI element corresponding to the element protection control on which the selection operation acts as the target UI elements. In this way, the target UI element can be intuitively selected through the element protection control, and the target UI element can be protected, thereby enhancing the flexibility of information protection, thereby improving user experience.
在一些实现方式中,使与所述目标UI元素相关联的所述内容无法正常显示包括:确定要对所述目标UI元素进行保护的模式,所述模式指示以下至少一者:使所述内容模糊,和防止经由所述目标UI元素访问所述内容;以及基于所述模式使与所述目标UI元素相关联的所述内容无法正常显示。以此方式,使得能够对不同UI元素应用不同的保护模式,由此增强了信息保护的灵活性,从而提高了用户体验。In some implementations, preventing the content associated with the target UI element from being displayed normally includes: determining a mode in which the target UI element is to be protected, and the mode indicates at least one of the following: making the content blurring, and preventing access to the content via the target UI element; and disabling normal display of the content associated with the target UI element based on the pattern. In this way, different protection modes can be applied to different UI elements, thereby enhancing the flexibility of information protection, thereby improving user experience.
在一些实现方式中,使与所述目标UI元素相关联的所述内容无法正常显示包括:使所述内容模糊。使所述内容模糊可以包括使目标UI元素本身所显示的内容模糊和/或使经由目标UI元素访问的内容模糊。以此方式,使得未授权用户无法清楚地查看用户期望保护的内容。In some implementation manners, preventing the content associated with the target UI element from being displayed normally includes: blurring the content. Obscuring the content may include obscuring content displayed by the target UI element itself and/or obscuring content accessed via the target UI element. In this manner, unauthorized users cannot clearly view the content that the user desires to protect.
在一些实现方式中,使与所述目标UI元素相关联的所述内容无法正常显示包括:防止经由所述目标UI元素访问所述内容。以此方式,使得未授权用户无法访问用户期望保护的内容。In some implementations, preventing the content associated with the target UI element from being displayed normally includes: preventing access to the content via the target UI element. In this manner, unauthorized users are rendered inaccessible to content that the user desires to protect.
在一些实现方式中,所述保护操作是所述元素保护操作,并且所述方法还包括:检测作用于所述目标UI元素的解除保护操作;以及响应于检测到所述解除保护操作,使与所述目标UI元素相关联的所述内容正常显示。以此方式,能够解除对内容的保护,使得用户能够查看期望的内容。In some implementations, the protection operation is the element protection operation, and the method further includes: detecting an unprotect operation on the target UI element; and in response to detecting the unprotect operation, interacting with The content associated with the target UI element is normally displayed. In this way, the protection of the content can be released, enabling the user to view desired content.
在一些实现方式中,使与所述目标UI元素相关联的所述内容正常显示包括:验证发起所述解除保护操作的用户的身份;以及响应于所述身份验证成功,使与所述目标UI元素相关联的所述内容正常显示。以此方式,使得身份验证成功的授权用户能够查看期望的内容。In some implementations, enabling the normal display of the content associated with the target UI element includes: verifying the identity of the user who initiates the unprotecting operation; The described content associated with the element is displayed normally. In this manner, an authorized user whose authentication is successful is enabled to view desired content.
在一些实现方式中,所述保护操作是所述界面保护操作,并且使所述UI的所述所有内容无法正常显示包括:使所述UI的所述所有内容模糊。以此方式,使得未授权用户无法清楚地查看用户期望保护的内容。In some implementation manners, the protection operation is the interface protection operation, and making the all contents of the UI unable to be displayed normally includes: blurring the all contents of the UI. In this manner, unauthorized users cannot clearly view the content that the user desires to protect.
在一些实现方式中,所述保护操作是所述界面保护操作,并且所述方法还包括:检测作用于所述UI的解除保护操作;响应于检测到所述解除保护操作,确定所述UI中的由发生所述解除保护操作的位置所指示的目标区域;以及使所述目标区域正常显示。以此方式,能够解除对内容的保护,使得用户能够查看期望的内容。In some implementations, the protection operation is the interface protection operation, and the method further includes: detecting an unprotect operation acting on the UI; in response to detecting the unprotect operation, determining the target area indicated by the location where the unprotect operation occurred; and causing the target area to be displayed normally. In this way, the protection of the content can be released, enabling the user to view desired content.
在一些实现方式中,所述解除保护操作是点击操作,所述UI包括至少一个窗口,并且确定所述目标区域包括:将所述至少一个窗口中发生所述点击操作的目标窗口确定为所述目标区域。以此方式,能够解除对被点击的窗口的保护,使得用户能够容易地通过点击而查看其期望的内容。In some implementations, the unprotecting operation is a click operation, the UI includes at least one window, and determining the target area includes: determining the target window where the click operation occurs in the at least one window as the target area. In this way, the protection of the clicked window can be released, so that the user can easily view his desired content by clicking.
在一些实现方式中,所述解除保护操作是区域绘制操作,并且确定所述目标区域包括:将所述UI中被所述区域绘制操作包围的部分确定为所述目标区域。以此方式,能够解除对圈 中的部分的保护,使得用户能够容易地通过区域绘制操作而查看其期望的内容。In some implementations, the unprotecting operation is an area drawing operation, and determining the target area includes: determining a part of the UI surrounded by the area drawing operation as the target area. In this way, it is possible to unprotect the part in the circle, so that the user can easily view his desired content through an area drawing operation.
在一些实现方式中,所述解除保护操作是滑动擦拭操作,并且确定所述目标区域包括:将所述UI中发生所述滑动擦拭操作的部分确定为所述目标区域。以此方式,能够解除对被擦拭的部分的保护,使得用户能够容易地通过擦拭操作而查看其期望的内容。In some implementation manners, the unprotecting operation is a sliding wiping operation, and determining the target area includes: determining a part of the UI where the sliding wiping operation occurs as the target area. In this way, the protection of the wiped portion can be released, so that the user can easily view his desired content through the wiping operation.
下面介绍实现本公开的实施例提出的图形界面显示的系统架构、局部清晰化架构和物理元件。The following introduces the system architecture, partial clarity architecture and physical components for realizing the graphical interface display proposed by the embodiments of the present disclosure.
图12示出了根据本公开的实施例的系统架构1200的示意图。在硬件层1210,显示器件和触控器件接收到手势事件,触发中断,并且通知内核层1220的显示驱动器和触控驱动器获取手势数据。在内核层1220,显示驱动器和触控驱动器接收中断,获取手势数据,并且将手势数据转换为手势事件上报到硬件抽象层1230,从而硬件抽象层1230将手势事件上报到框架层1240。框架层1240包括保护服务1245。保护服务1245用于实现本公开的实施例提出的图形界面显示,以实现信息保护。FIG. 12 shows a schematic diagram of a system architecture 1200 according to an embodiment of the present disclosure. At the hardware layer 1210, the display device and the touch device receive gesture events, trigger interrupts, and notify the display driver and the touch driver of the kernel layer 1220 to obtain gesture data. At the kernel layer 1220 , the display driver and the touch driver receive interrupts, acquire gesture data, and convert the gesture data into gesture events and report them to the hardware abstraction layer 1230 , so that the hardware abstraction layer 1230 reports the gesture events to the framework layer 1240 . Framework layer 1240 includes protection services 1245 . The protection service 1245 is used to realize the graphical interface display proposed by the embodiments of the present disclosure, so as to realize information protection.
在元素保护操作中,保护服务1245监控手势事件,触发保护功能,并且显示元素保护控件。保护服务1245监控选择操作,并且确定保护类型。保护类型包括控件保护和布局保护,如上文中参考图3A-5P所述。保护服务1245对控件或布局进行保护,例如使得控件或布局的内容模糊化、或者使得控件置灰从而无法经由控件访问内容。进一步地,保护服务1245监控解除保护操作,并且调出验证界面(例如,密码、指纹、人脸等验证界面)。在用户输入验证信息,并且验证成功的情况下,保护服务1245使得与进入受保护状态的内容正常显示。In an element protection operation, the protection service 1245 monitors gesture events, triggers protection functions, and displays element protection controls. Protection service 1245 monitors selection operations and determines the type of protection. Protection types include control protection and layout protection, as described above with reference to FIGS. 3A-5P . The protection service 1245 protects the control or the layout, such as blurring the content of the control or the layout, or making the control gray so that the content cannot be accessed through the control. Further, the protection service 1245 monitors the unprotection operation, and invokes a verification interface (for example, a password, fingerprint, face, etc. verification interface). When the verification information is input by the user and the verification is successful, the protection service 1245 makes the content entering the protected state displayed normally.
此外,在界面保护操作中,保护服务1245监控手势事件,触发保护功能,并且对UI进行保护,例如使得UI的所有内容模糊化。进一步地,保护服务1245监控解除保护操作,并且确定解除保护操作的类型。解除保护操作的类型包括点击、区域绘制和滑动擦拭等,如上文中参考图6A-10E所述。此外,保护服务1245确定多窗口类型。多窗口类型包括单悬浮窗口、多悬浮窗口、分屏、平行视界等,如上文中参考图6A-10E所述。在确定出特定多窗口类型之后,保护服务1245确定多窗口位置,匹配手势焦点与多窗口位置,并且使得匹配的窗口正常显示。备选地,保护服务1245确定手势绘制区域或者手势滑动擦拭区域,并且使得所确定出的区域正常显示。In addition, in the interface protection operation, the protection service 1245 monitors the gesture event, triggers the protection function, and protects the UI, such as blurring all the contents of the UI. Further, the protection service 1245 monitors the unprotect operation and determines the type of the unprotect operation. Types of unprotect operations include tap, area draw, and swipe wipe, etc., as described above with reference to FIGS. 6A-10E . Additionally, protection service 1245 determines the multi-window type. The multi-window types include single floating window, multiple floating windows, split screen, parallel horizon, etc., as described above with reference to FIGS. 6A-10E . After determining the specific multi-window type, the protection service 1245 determines the multi-window position, matches the gesture focus with the multi-window position, and makes the matched window display normally. Alternatively, the protection service 1245 determines the gesture drawing area or the gesture sliding wiping area, and makes the determined area displayed normally.
图13示出了根据本公开的实施例的局部清晰化架构1300的示意图。如图13所示,在框1310,电子设备检测到触发界面保护控件,并且获取UI截图。在框1320,电子设备调用canvas.drawBitmap函数,并且根据UI截图绘制受保护的UI,以覆盖在屏幕上。在框1330,电子设备显示受保护的UI。电子设备监控手势事件。在检测到区域绘制手势的情况下,在框1340调用path.moveTo和path.lineTo函数。而在检测到滑动擦拭手势的情况下,在框1350调用paint.setStyle和paint.setStrokeWidth函数。在框1360,电子设备调用onDraw函数绘制局部清晰化的UI。由此,在框1370,电子设备显示局部清晰化的UI。FIG. 13 shows a schematic diagram of a local clarification architecture 1300 according to an embodiment of the present disclosure. As shown in FIG. 13, at block 1310, the electronic device detects that the interface protection control is triggered, and obtains a screenshot of the UI. In block 1320, the electronic device calls the canvas.drawBitmap function, and draws the protected UI according to the screenshot of the UI to overlay on the screen. At block 1330, the electronic device displays the protected UI. The electronic device monitors gesture events. In the event that an area drawing gesture is detected, the path.moveTo and path.lineTo functions are called at block 1340 . Whereas in the case where a swipe wipe gesture is detected, the paint.setStyle and paint.setStrokeWidth functions are called at block 1350 . In block 1360, the electronic device calls an onDraw function to draw a partially cleared UI. Thus, at block 1370, the electronic device displays the partially sharpened UI.
图14示出了根据本公开的实施例的物理元件的示意图1400。如图14所示,本公开的实施例涉及的物理元件包括处理器1440(例如,CPU、或GPU等)、显示器件1430(例如,LCD显示器、LED显示器、或CRT显示器等)、以及触控器件1420。用户可以通过电子设备的屏幕上显示UI,操作UI中的各种UI元素(例如,窗口、或控件等),来控制显示器件进行信息的安全显示。FIG. 14 shows a schematic diagram 1400 of physical elements according to an embodiment of the disclosure. As shown in FIG. 14 , the physical elements involved in the embodiments of the present disclosure include a processor 1440 (for example, CPU, or GPU, etc.), a display device 1430 (for example, an LCD display, an LED display, or a CRT display, etc.), and a touch Device 1420 . The user can display the UI on the screen of the electronic device, and operate various UI elements (for example, windows, controls, etc.) in the UI to control the display device to safely display information.

Claims (18)

  1. 一种图形界面显示方法,包括:A graphical interface display method, comprising:
    在电子设备的屏幕上显示用户界面UI;displaying a user interface UI on a screen of the electronic device;
    检测与所述UI相关联的保护操作;以及detecting protection actions associated with the UI; and
    响应于检测到所述保护操作,使与所述UI的至少一部分相关联的内容在所述屏幕上无法正常显示。Content associated with at least a portion of the UI is disabled from normal display on the screen in response to detecting the protection operation.
  2. 根据权利要求1所述的方法,其中与所述UI的至少一部分相关联的内容包括以下至少一者:The method of claim 1, wherein the content associated with at least a portion of the UI includes at least one of:
    所述UI的至少一部分所显示的内容,和the displayed content of at least a portion of the UI, and
    经由所述UI的至少一部分所访问的内容。Content accessed via at least a portion of the UI.
  3. 根据权利要求1或2所述的方法,其中所述保护操作包括:The method according to claim 1 or 2, wherein said protection operation comprises:
    对所述UI中的UI元素进行保护的元素保护操作,所述元素保护操作使与所述UI元素相关联的内容无法正常显示,或an element protection operation for protecting a UI element in the UI, the element protection operation prevents the content associated with the UI element from being displayed normally, or
    对所述UI进行保护的界面保护操作,所述界面保护操作使所述UI的所有内容无法正常显示。An interface protection operation for protecting the UI, where the interface protection operation prevents all content of the UI from being displayed normally.
  4. 根据权利要求3所述的方法,其中所述保护操作是所述元素保护操作,并且使所述内容无法正常显示包括:The method according to claim 3, wherein the protection operation is the element protection operation, and making the content unable to be displayed normally comprises:
    基于所述元素保护操作,确定与所述元素保护操作对应的目标UI元素;以及determining a target UI element corresponding to the element protection operation based on the element protection operation; and
    使与所述目标UI元素相关联的所述内容无法正常显示。making the content associated with the target UI element unable to be displayed normally.
  5. 根据权利要求4所述的方法,其中所述元素保护操作包括控件显示操作和选择操作,并且所述基于所述元素保护操作确定与所述元素保护操作对应的目标UI元素包括:The method according to claim 4, wherein the element protection operation comprises a control display operation and a selection operation, and the determining the target UI element corresponding to the element protection operation based on the element protection operation comprises:
    基于所述控件显示操作,在所述屏幕上显示与所述UI所包括的至少一个UI元素对应的元素保护控件;以及displaying on the screen an element protection control corresponding to at least one UI element included in the UI based on the control display operation; and
    基于所述选择操作,将所述选择操作作用于的元素保护控件所对应的UI元素确定为所述目标UI元素。Based on the selection operation, the UI element corresponding to the element protection control on which the selection operation acts is determined as the target UI element.
  6. 根据权利要求4或5所述的方法,其中使与所述目标UI元素相关联的所述内容无法正常显示包括:The method according to claim 4 or 5, wherein making the content associated with the target UI element unable to be displayed normally comprises:
    确定要对所述目标UI元素进行保护的模式,所述模式指示以下至少一者:determining a mode in which to protect the target UI element, the mode indicating at least one of the following:
    使所述内容模糊,和obscure said content, and
    防止经由所述目标UI元素访问所述内容;以及preventing access to the content via the target UI element; and
    基于所述模式使与所述目标UI元素相关联的所述内容无法正常显示。The content associated with the target UI element cannot be displayed normally based on the mode.
  7. 根据权利要求4或5所述的方法,其中使与所述目标UI元素相关联的所述内容无法正常显示包括:The method according to claim 4 or 5, wherein making the content associated with the target UI element unable to be displayed normally comprises:
    使所述内容模糊。Blur said content.
  8. 根据权利要求4或5所述的方法,其中使与所述目标UI元素相关联的所述内容无法正常显示包括:The method according to claim 4 or 5, wherein making the content associated with the target UI element unable to be displayed normally comprises:
    防止经由所述目标UI元素访问所述内容。Access to the content via the target UI element is prevented.
  9. 根据权利要求4-8中任一项所述的方法,其中所述保护操作是所述元素保护操作,并且所述方法还包括:The method according to any one of claims 4-8, wherein the protection operation is the element protection operation, and the method further comprises:
    检测作用于所述目标UI元素的解除保护操作;以及detecting an unprotect operation on said target UI element; and
    响应于检测到所述解除保护操作,使与所述目标UI元素相关联的所述内容正常显示。In response to detecting the unprotect operation, causing the content associated with the target UI element to be displayed normally.
  10. 根据权利要求9所述的方法,其中使与所述目标UI元素相关联的所述内容正常显示包括:The method of claim 9, wherein causing the content associated with the target UI element to be displayed normally comprises:
    验证发起所述解除保护操作的用户的身份;以及verify the identity of the user who initiated the unprotect operation; and
    响应于所述身份验证成功,使与所述目标UI元素相关联的所述内容正常显示。In response to the successful authentication, the content associated with the target UI element is displayed normally.
  11. 根据权利要求3所述的方法,其中所述保护操作是所述界面保护操作,并且使所述UI的所述所有内容无法正常显示包括:The method according to claim 3, wherein the protection operation is the interface protection operation, and making all the contents of the UI unable to be displayed normally comprises:
    使所述UI的所述所有内容模糊。Blur all said content of said UI.
  12. 根据权利要求3或11所述的方法,其中所述保护操作是所述界面保护操作,并且所述方法还包括:The method according to claim 3 or 11, wherein the protection operation is the interface protection operation, and the method further comprises:
    检测作用于所述UI的解除保护操作;detecting an unprotect operation acting on said UI;
    响应于检测到所述解除保护操作,确定所述UI中的由发生所述解除保护操作的位置所指示的目标区域;以及in response to detecting the unfencing operation, determining a target area in the UI indicated by the location where the unfencing operation occurred; and
    使所述目标区域正常显示。Makes the target area appear normally.
  13. 根据权利要求12所述的方法,其中所述解除保护操作是点击操作,所述UI包括至少一个窗口,并且确定所述目标区域包括:The method according to claim 12, wherein the unprotecting operation is a click operation, the UI includes at least one window, and determining the target area includes:
    将所述至少一个窗口中发生所述点击操作的目标窗口确定为所述目标区域。Determining a target window where the click operation occurs in the at least one window as the target area.
  14. 根据权利要求12所述的方法,其中所述解除保护操作是区域绘制操作,并且确定所述目标区域包括:The method of claim 12, wherein the unprotecting operation is a region painting operation, and determining the target region comprises:
    将所述UI中被所述区域绘制操作包围的部分确定为所述目标区域。A part of the UI surrounded by the area drawing operation is determined as the target area.
  15. 根据权利要求12所述的方法,其中所述解除保护操作是滑动擦拭操作,并且确定所述目标区域包括:The method according to claim 12, wherein the unprotecting operation is a sliding wipe operation, and determining the target area comprises:
    将所述UI中发生所述滑动擦拭操作的部分确定为所述目标区域。Determining the part of the UI where the sliding and wiping operation occurs as the target area.
  16. 一种电子设备,其特征在于,包括:处理器、以及存储有指令的存储器,所述指令在被所述处理器执行时使得所述电子设备执行根据权利要求1至15中任一项所述的方法。An electronic device, characterized by comprising: a processor, and a memory storing instructions, the instructions, when executed by the processor, cause the electronic device to execute the electronic device according to any one of claims 1 to 15. Methods.
  17. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有指令,所述指令在被电子设备执行时使得所述电子设备执行根据权利要求1至15中任一项所述的方法。A computer-readable storage medium, characterized in that the computer-readable storage medium stores instructions, and when the instructions are executed by an electronic device, the electronic device executes the electronic device according to any one of claims 1 to 15. Methods.
  18. 一种计算机程序产品,其特征在于,所述计算机程序产品包括指令,所述指令在被电子设备执行时使得所述电子设备执行根据权利要求1至15中任一项所述的方法。A computer program product, characterized in that the computer program product includes instructions, which when executed by an electronic device cause the electronic device to perform the method according to any one of claims 1 to 15.
PCT/CN2022/092872 2021-05-28 2022-05-13 Graphical interface display method, electronic device, medium, and program product WO2022247664A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110594724.3 2021-05-28
CN202110594724.3A CN115408708A (en) 2021-05-28 2021-05-28 Graphical interface display method, electronic device, medium, and program product

Publications (1)

Publication Number Publication Date
WO2022247664A1 true WO2022247664A1 (en) 2022-12-01

Family

ID=84155564

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/092872 WO2022247664A1 (en) 2021-05-28 2022-05-13 Graphical interface display method, electronic device, medium, and program product

Country Status (2)

Country Link
CN (1) CN115408708A (en)
WO (1) WO2022247664A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973891A (en) * 2014-05-09 2014-08-06 平安付智能技术有限公司 Data security processing method for software interface
CN106569689A (en) * 2016-10-31 2017-04-19 努比亚技术有限公司 Privacy protection device and method
US20170200021A1 (en) * 2014-12-16 2017-07-13 Amazon Technologies, Inc. Secure remote application shares
CN107679426A (en) * 2017-09-08 2018-02-09 维沃移动通信有限公司 A kind of screen content display method thereof and mobile terminal
CN109491737A (en) * 2018-10-24 2019-03-19 珠海格力电器股份有限公司 A kind of display methods, device, terminal and readable storage medium storing program for executing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973891A (en) * 2014-05-09 2014-08-06 平安付智能技术有限公司 Data security processing method for software interface
US20170200021A1 (en) * 2014-12-16 2017-07-13 Amazon Technologies, Inc. Secure remote application shares
CN106569689A (en) * 2016-10-31 2017-04-19 努比亚技术有限公司 Privacy protection device and method
CN107679426A (en) * 2017-09-08 2018-02-09 维沃移动通信有限公司 A kind of screen content display method thereof and mobile terminal
CN109491737A (en) * 2018-10-24 2019-03-19 珠海格力电器股份有限公司 A kind of display methods, device, terminal and readable storage medium storing program for executing

Also Published As

Publication number Publication date
CN115408708A (en) 2022-11-29

Similar Documents

Publication Publication Date Title
WO2021129326A1 (en) Screen display method and electronic device
WO2021103981A1 (en) Split-screen display processing method and apparatus, and electronic device
US11687235B2 (en) Split-screen method and electronic device
US20220413695A1 (en) Split-screen display method and electronic device
CN115629730A (en) Display method and related device
WO2020062294A1 (en) Display control method for system navigation bar, graphical user interface, and electronic device
WO2021082835A1 (en) Method for activating function and electronic device
US11861382B2 (en) Application starting method and apparatus, and electronic device
WO2020238728A1 (en) Login method for intelligent terminal, and electronic device
WO2021135838A1 (en) Page rendering method and related apparatus
CN115981582B (en) Display method and electronic equipment
WO2021249087A1 (en) Card sharing method, electronic device, and communication system
WO2020107463A1 (en) Electronic device control method and electronic device
WO2023130921A1 (en) Method for page layout adapted to multiple devices, and electronic device
WO2020155875A1 (en) Display method for electronic device, graphic user interface and electronic device
WO2022052712A1 (en) Method and apparatus for processing interaction event
WO2021190524A1 (en) Screenshot processing method, graphic user interface and terminal
WO2022001279A1 (en) Cross-device desktop management method, first electronic device, and second electronic device
WO2023040775A1 (en) Preview method, electronic device, and system
WO2022247664A1 (en) Graphical interface display method, electronic device, medium, and program product
CN114254285B (en) Method for performing biometric authentication while simultaneously displaying multiple application interfaces
WO2024036998A1 (en) Display method, storage medium, and electronic device
WO2023160455A1 (en) Object deletion method and electronic device
WO2024109481A1 (en) Window control method and electronic device
WO2023098417A1 (en) Interface display method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22810391

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22810391

Country of ref document: EP

Kind code of ref document: A1