WO2023185623A1 - 后台应用恢复方法、装置、电子设备及可读存储介质 - Google Patents
后台应用恢复方法、装置、电子设备及可读存储介质 Download PDFInfo
- Publication number
- WO2023185623A1 WO2023185623A1 PCT/CN2023/083372 CN2023083372W WO2023185623A1 WO 2023185623 A1 WO2023185623 A1 WO 2023185623A1 CN 2023083372 W CN2023083372 W CN 2023083372W WO 2023185623 A1 WO2023185623 A1 WO 2023185623A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- background application
- deleted
- application
- background
- Prior art date
Links
- 238000011084 recovery Methods 0.000 title claims abstract description 103
- 238000003860 storage Methods 0.000 title claims abstract description 89
- 238000000034 method Methods 0.000 title claims abstract description 80
- 230000037430 deletion Effects 0.000 claims abstract description 44
- 238000012217 deletion Methods 0.000 claims abstract description 41
- 230000004044 response Effects 0.000 claims abstract description 21
- 238000004590 computer program Methods 0.000 claims description 27
- 238000004891 communication Methods 0.000 description 33
- 230000006854 communication Effects 0.000 description 33
- 230000006870 function Effects 0.000 description 27
- 238000010586 diagram Methods 0.000 description 20
- 238000012545 processing Methods 0.000 description 17
- 238000007726 management method Methods 0.000 description 16
- 230000005236 sound signal Effects 0.000 description 15
- 238000010295 mobile communication Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 11
- 210000000988 bone and bone Anatomy 0.000 description 10
- 238000004140 cleaning Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 6
- 230000003111 delayed effect Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 5
- 229920001621 AMOLED Polymers 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 238000013528 artificial neural network Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000001815 facial effect Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 101100264195 Caenorhabditis elegans app-1 gene Proteins 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 2
- 230000036772 blood pressure Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000005012 migration Effects 0.000 description 2
- 238000013508 migration Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000002096 quantum dot Substances 0.000 description 2
- 230000005855 radiation Effects 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000003321 amplification Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000003416 augmentation Effects 0.000 description 1
- 238000010009 beating Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000013529 biological neural network Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001149 cognitive effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000008140 language development Effects 0.000 description 1
- 239000010985 leather Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004020 luminiscence type Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 210000002569 neuron Anatomy 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003238 somatosensory effect Effects 0.000 description 1
- 230000006641 stabilisation Effects 0.000 description 1
- 238000011105 stabilization Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1438—Restarting or rejuvenating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
Definitions
- the present application relates to the field of terminals, and in particular to a background application recovery method, device, electronic device and readable storage medium.
- a smart device can run multiple applications at the same time.
- the applications displayed on the interface are foreground applications, and the others are background applications. Since background applications occupy system resources of smart devices when they are running, users may delete background applications.
- Embodiments of the present application provide a background application recovery method, device, electronic device and readable storage medium, which can solve the problem of insufficient distance accuracy and large error calculated by existing one-way ranging solutions.
- embodiments of the present application provide a background application recovery method, which is applied to electronic devices and includes: responding to a recovery operation from a user and obtaining the user's first identification tag. According to the user's first identification tag, the background application deleted by the user is obtained from the first storage space. In response to an operation from the user, determine and restore at least one background application from the background applications deleted by the user.
- the electronic device may be a mobile phone, a tablet, an augmented reality (AR)/virtual reality (VR) device, a large-screen device, a laptop, a netbook, or a personal digital assistant (personal digital assistant).
- AR augmented reality
- VR virtual reality
- PDA personal digital assistant
- the user's first identification tag is obtained by responding to a restore operation from the user. Then, the background application deleted by the user is obtained according to the user's first identification tag, and in response to the operation from the user, at least one background application is determined and restored from the displayed background applications. It realizes the recovery of background applications deleted by users, so that when users accidentally delete background applications, they can quickly and easily restore the background applications they accidentally deleted through this operation, solving the problem of accidentally deleting background applications.
- the method further includes: responding to a deletion operation from the user, deleting at least one background application and storing the deleted background application in the first storage space.
- deleting at least one background application and storing the deleted background application in the first storage space includes: removing the deleted background application from a background application list, and the background application list includes at least one running background application. .
- the deleted background application, the recovery information of the deleted background application and the user's first identification tag are bound and stored in the first storage space.
- the method further includes: when the storage time of the deleted background application in the first storage space reaches a preset time period, clearing the deleted background application from the first storage space.
- the preset duration is determined based on the number of times the user restores deleted background applications and the recovery time interval.
- obtaining the background application deleted by the user from the first storage space according to the user's first identification tag includes: obtaining the user's first identification tag from the first storage space according to the user's first identification tag. Deleted background applications. Displays the app ID of each deleted background app.
- determining and restoring at least one background application from the background application includes: obtaining recovery information of the deleted background application in the first storage space, and the deleted background application is determined based on the user's operation. of. According to the obtained recovery information of the deleted background application, the deleted background application is added to the background application list. Remove deleted background applications from the first storage space.
- a background application recovery device which is applied to electronic devices and includes: an acquisition module, configured to acquire the user's first identification tag in response to a recovery operation from the user.
- the acquisition module is also used to acquire and display background applications deleted by the user based on the user's first identification tag.
- a restoration module is configured to select and restore at least one background application from the displayed background applications in response to an operation from the user.
- the device further includes a deletion module configured to respond to a deletion operation from the user, delete at least one background application and store the deleted background application in the first storage space.
- the deletion module is specifically configured to remove the deleted background application from the background application list, and the background application list includes at least one running background application.
- the deleted background application, the recovery information of the deleted background application and the user's first identification tag are bound and stored in the first storage space.
- the deletion module is also used to clean up the deleted background application from the first storage space after the storage period of the deleted background application in the first storage space reaches a preset period.
- the preset duration is determined based on the number of times the user restores deleted background applications and the recovery time interval.
- the acquisition module is specifically configured to obtain the deleted background application including the user's first identification tag in the first storage space according to the user's first identification tag. Displays the app ID of each deleted background app.
- the recovery module is specifically configured to obtain the recovery information of the deleted background application in the first storage space.
- the deleted background application is determined based on the user's operation. According to the obtained recovery information of the deleted background application, the deleted background application is added to the background application list. Remove deleted background applications from the first storage space.
- embodiments of the present application provide an electronic device, including a memory, a processor, a ranging signal receiving component, and a computer program stored in the memory and executable on the processor.
- the method provided by the first aspect is implemented when the processor executes the computer program.
- embodiments of the present application provide a computer-readable storage medium.
- the computer-readable storage medium A computer program is stored.
- the method provided by the first aspect is implemented when the computer program is executed by the processor.
- embodiments of the present application provide a computer program product, which when the computer program product is run on an electronic device, causes the terminal device to execute the method provided in the first aspect.
- embodiments of the present application provide a chip system.
- the chip system includes a memory and a processor.
- the processor executes a computer program stored in the memory to implement the method provided in the first aspect.
- embodiments of the present application provide a chip system.
- the chip system includes a processor.
- the processor is coupled to the computer-readable storage medium provided in the eighth aspect.
- the processor executes a computer program stored in the computer-readable storage medium. To implement the method provided by the first aspect.
- Figure 1 shows a schematic structural diagram of an electronic device applying a background application recovery method provided by an embodiment of the present application
- Figure 2 shows a schematic diagram of the software structure of an electronic device in a background application recovery method provided by an embodiment of the present application
- Figure 3 shows a schematic flow chart of a background application recovery method provided by an embodiment of the present application
- Figure 4 shows a schematic system structure diagram of a background application recovery method provided by an embodiment of the present application
- Figure 5 shows a schematic diagram of the application interface of a background application recovery method provided by an embodiment of the present application
- Figure 6 shows a schematic diagram of the application interface of another background application recovery method provided by an embodiment of the present application.
- Figure 7 shows a schematic diagram of the application interface of another background application recovery method provided by an embodiment of the present application.
- Figure 8 shows a schematic diagram of the application interface of another background application recovery method provided by an embodiment of the present application.
- Figure 9 shows a schematic system structure diagram of another background application recovery method provided by an embodiment of the present application.
- Figure 10 shows a schematic flow chart of another background application recovery method provided by an embodiment of the present application.
- Figure 11 shows a structural block diagram of a ranging device applied to electronic equipment provided by an embodiment of the present application
- Figure 12 is a structural block diagram of an electronic device provided by an embodiment of the present application.
- the term "if” may be interpreted as “when” or “once” or “in response to determining” or “in response to detecting” depending on the context. ".
- this application provides a background application recovery method, which includes: responding to a recovery operation from the user and obtaining the user's first identification tag. According to the user's first identification tag, obtain and display the background applications deleted by the user. In response to an action from the user, determine and restore at least one background application from the displayed background applications.
- the user's first identification tag is obtained by responding to the restore operation from the user.
- the background application deleted by the user is obtained according to the user's first identification tag, and in response to the operation from the user, at least one background application is determined and restored from the displayed background applications. It realizes the restoration of the background application deleted by the user, so that when the user deletes the background application by mistake, he can quickly and conveniently restore the background application deleted by mistake through this operation, which solves the problem of accidentally deleting the background application.
- Figure 1 shows a schematic structural diagram of an electronic device applying a background application recovery method provided by an embodiment of the present application.
- the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, and a battery 142.
- SIM subscriber identification module
- the sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
- the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the electronic device 100 .
- the electronic device 100 may include more or fewer components than shown in the figures, or some components may be combined, some components may be separated, or some components may be arranged differently.
- the components illustrated may be implemented in hardware, software, or a combination of software and hardware.
- the electronic device 100 when the electronic device 100 is a mobile phone, a tablet computer, or a large-screen device, it may include all the components in the illustration, or may only include some of the components in the illustration.
- the processor 110 may include one or more processing units.
- the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, memory, video codec processor, digital signal processor (DSP), baseband processor, and/or neural network processing unit (NPU), etc.
- application processor application processor, AP
- modem processor graphics processing unit
- GPU graphics processing unit
- image signal processor image signal processor
- ISP image signal processor
- controller memory
- video codec processor digital signal processor
- DSP digital signal processor
- NPU neural network processing unit
- different processing units can be independent devices or integrated in one or more processors.
- the controller may be the nerve center and command center of the electronic device 100 .
- the controller can generate operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
- the processor 110 may also be provided with a memory for storing instructions and data.
- the memory in processor 110 is cache memory. This memory may hold instructions or data that have been recently used or recycled by processor 110 . If the processor 110 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
- processor 110 may include one or more interfaces.
- Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and /or universal serial bus (USB) interface, etc.
- I2C integrated circuit
- I2S integrated circuit built-in audio
- PCM pulse code modulation
- UART universal asynchronous receiver and transmitter
- MIPI mobile industry processor interface
- GPIO general-purpose input/output
- SIM subscriber identity module
- USB universal serial bus
- the I2C interface is a bidirectional synchronous serial bus, including a serial data line (SDA) and a serial clock line (derail clock line, SCL).
- processor 110 may include multiple sets of I2C buses.
- the processor 110 can separately couple the touch sensor 180K, charger, flash, camera 193, etc. through different I2C bus interfaces.
- the processor 110 can be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to implement the touch function of the electronic device 100 .
- the I2S interface can be used for audio communication.
- processor 110 may include multiple sets of I2S buses.
- the processor 110 can be coupled with the audio module 170 through the I2S bus to implement communication between the processor 110 and the audio module 170 .
- the audio module 170 may transmit audio signals to the wireless communication module 160 through the I2S interface.
- the PCM interface can also be used for audio communications to sample, quantize and encode analog signals.
- the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
- the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface. Both the I2S interface and the PCM interface can be used for audio communication.
- the UART interface is a universal serial data bus used for asynchronous communication.
- the bus can be a bidirectional communication bus. It converts the data to be transmitted to and from parallel communications.
- a UART interface is generally used to connect the processor 110 and the wireless communication module 160 .
- the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function.
- the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface to implement the function of playing music through a Bluetooth headset.
- the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
- MIPI interfaces include camera serial interface (CSI), display serial interface (display serial interface, DSI), etc.
- the processor 110 and the camera 193 communicate through the CSI interface to implement the shooting function of the electronic device 100 .
- the processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device 100 .
- the GPIO interface can be configured through software.
- the GPIO interface can be configured as a control signal or as a data signal.
- the GPIO interface can be used to connect the processor 110 with the camera 193, display screen 194, wireless communication module 160, audio module 170, sensor module 180, etc.
- the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
- the USB interface 130 is an interface that complies with the USB standard specification, and may be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc.
- the USB interface 130 can be used to connect a charger to charge the electronic device 100, and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones to play audio through them. This interface can also be used to connect other electronic devices, such as AR devices, etc.
- the interface connection relationships between the modules illustrated in the embodiments of the present application are only schematic illustrations and do not constitute a structural limitation of the electronic device 100 .
- the electronic device 100 may also adopt different interface connection methods in the above embodiments, or a combination of multiple interface connection methods.
- the charging management module 140 is used to receive charging input from the charger.
- the charger can be a wireless charger or a wired charger.
- the charging management module 140 may receive charging input from the wired charger through the USB interface 130 .
- the charging management module 140 may receive wireless charging input through the wireless charging coil of the electronic device 100 . While the charging management module 140 charges the battery 142, it can also provide power to the electronic device through the power management module 141.
- the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
- the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, internal memory 121, external memory, display screen 194, camera 193, wireless communication module 160, etc.
- the power management module 141 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
- the power management module 141 may also be provided in the processor 110 . In other embodiments, the power management module 141 and the charging management module 140 may also be provided in the same device.
- the wireless communication function of the electronic device 100 can be implemented through the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
- Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in electronic device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization. For example: Antenna 1 can be reused as a diversity antenna for a wireless LAN. In other embodiments, antennas may be used in conjunction with tuning switches.
- the mobile communication module 150 can provide solutions for wireless communication including 2G/3G/4G/5G applied on the electronic device 100 .
- the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc.
- the mobile communication module 150 can receive electromagnetic waves through the antenna 1, perform filtering, amplification and other processing on the received electromagnetic waves, and transmit them to the modem processor for demodulation.
- the mobile communication module 150 can also amplify the signal modulated by the modem processor and convert it into electromagnetic waves through the antenna 1 for radiation.
- At least part of the functional modules of the mobile communication module 150 may be disposed in the processor 110 .
- At least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
- a modem processor may include a modulator and a demodulator.
- the modulator is used to modulate the low-frequency baseband signal to be sent into a medium-high frequency signal.
- the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
- the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
- the application processor outputs sound signals through audio devices (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194.
- the modem processor may be a stand-alone device. In other embodiments, the modem processor may be independent of the processor 110 and may be provided in the same device as the mobile communication module 150 or other functional modules.
- the wireless communication module 160 can provide applications on the electronic device 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (bluetooth, BT), and global navigation satellites.
- WLAN wireless local area networks
- System global navigation satellite system, GNSS
- frequency modulation frequency modulation, FM
- near field communication technology near field communication, NFC
- infrared technology infrared, IR
- the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
- the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
- the wireless communication module 160 can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
- the antenna 1 of the electronic device 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
- Wireless communication technologies can include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband code division Multiple access (wideband code division multiple access, WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM , and/or IR technology, etc.
- GSM global system for mobile communications
- GPRS general packet radio service
- CDMA code division multiple access
- WCDMA broadband code division Multiple access
- TD-SCDMA time-division code division multiple access
- LTE long term evolution
- BT GNSS
- WLAN wireless local area network
- NFC long term evolution
- FM long term evolution
- IR technology etc.
- GNSS can include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi-zenith) satellite system (QZSS) and/or satellite
- the electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like.
- the GPU is an image processing microprocessor and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
- Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
- the display screen 194 is used to display images, videos, etc.
- the display screen 194 includes a display panel.
- the display panel can use liquid crystal display (LCD), organic light-emitting diode (OLED), active matrix Organic light-emitting diode or active matrix organic light emitting diode (active-matrix organic light emitting diode, AMOLED), flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot luminescence Diodes (quantum dot light emitting diodes, QLED), etc.
- LCD liquid crystal display
- OLED organic light-emitting diode
- AMOLED active matrix organic light-emitting diode
- FLED flexible light-emitting diode
- Miniled MicroLed, Micro-oLed
- quantum dot luminescence Diodes quantum dot light emitting diodes, QLED
- the electronic device 100 may include 1 or N display screens 194, where N is a positive integer greater than 1.
- the electronic device 100 can implement the shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
- the ISP is used to process the data fed back by the camera 193. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the light signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise, brightness, and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 193.
- Camera 193 is used to capture still images or video.
- the object passes through the lens to produce an optical image that is projected onto the photosensitive element.
- the focal length of the lens can be used to indicate the viewing range of the camera. The smaller the focal length of the lens, the larger the viewing range of the lens.
- the photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
- CMOS complementary metal-oxide-semiconductor
- the photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal.
- ISP outputs digital image signals to DSP for processing.
- DSP converts digital image signals into standard RGB, YUV and other format image signals.
- the electronic device 100 may include cameras 193 with two or more focal lengths.
- Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
- Video codecs are used to compress or decompress digital video.
- Electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in multiple encoding formats, such as moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
- MPEG moving picture experts group
- MPEG2 MPEG2, MPEG3, MPEG4, etc.
- NPU is a neural network (NN) computing processor.
- NN neural network
- Intelligent cognitive applications of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
- the NPU or other processors may be used to perform operations such as analysis and processing on images in videos stored by the electronic device 100 .
- the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device 100.
- the external memory card communicates with the processor 110 through the external memory interface 120 to implement the data storage function. Such as saving music, videos, etc. files in external memory card.
- Internal memory 121 may be used to store computer executable program code, which includes instructions.
- the processor 110 executes instructions stored in the internal memory 121 to execute various functional applications and data processing of the electronic device 100 .
- the internal memory 121 may include a program storage area and a data storage area. Among them, save The stored program area can store the operating system and at least one application program required for a function (such as a sound playback function, an image playback function, etc.).
- the storage data area may store data created during use of the electronic device 100 (such as audio data, phone book, etc.).
- the internal memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one disk storage device, flash memory device, universal flash storage (UFS), etc.
- non-volatile memory such as at least one disk storage device, flash memory device, universal flash storage (UFS), etc.
- the electronic device 100 can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor.
- the audio module 170 is used to convert digital audio signals into analog audio signal outputs, and is also used to convert analog audio inputs into digital audio signals. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
- Speaker 170A also called “speaker” is used to convert audio electrical signals into sound signals.
- the electronic device 100 can listen to music or listen to hands-free calls through the speaker 170A.
- the speaker can play the comparison analysis results provided by the embodiments of the present application.
- Receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
- the electronic device 100 answers a call or a voice message, the voice can be heard by bringing the receiver 170B close to the human ear.
- Microphone 170C also called “microphone” or “microphone” is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can speak close to the microphone 170C with the human mouth and input the sound signal to the microphone 170C.
- the electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C, which in addition to collecting sound signals, may also implement a noise reduction function. When measuring distance through ultrasonic waves, the selected microphone 170C needs to be able to record ultrasonic audio signals.
- the electronic device 100 can also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions, etc.
- the headphone interface 170D is used to connect wired headphones.
- the headphone interface 170D may be a USB interface 130, or may be a 3.5mm open mobile terminal platform (OMTP) standard interface, or a Cellular Telecommunications Industry Association of the USA (CTIA) standard interface.
- OMTP open mobile terminal platform
- CTIA Cellular Telecommunications Industry Association of the USA
- the pressure sensor 180A is used to sense pressure signals and can convert the pressure signals into electrical signals.
- pressure sensor 180A may be disposed on display screen 194 .
- pressure sensors 180A such as resistive pressure sensors, inductive pressure sensors, capacitive pressure sensors, etc.
- a capacitive pressure sensor may include at least two parallel plates of conductive material.
- the electronic device 100 determines the intensity of the pressure based on the change in capacitance.
- the electronic device 100 detects the strength of the touch operation according to the pressure sensor 180A.
- the electronic device 100 may also calculate the touched position based on the detection signal of the pressure sensor 180A.
- touch operations acting on the same touch location but with different touch operation intensities may correspond to different operation instructions. For example: when a touch operation with a touch operation intensity less than the first pressure threshold is applied to the short message application icon, an instruction to view the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold is applied to the short message application icon, an instruction to create a new short message is executed.
- the gyro sensor 180B may be used to determine the motion posture of the electronic device 100 .
- the angular velocity of electronic device 100 about three axes ie, x, y, and z axes
- the gyro sensor 180B can be used for image stabilization. For example, when the shutter is pressed, the gyro sensor 180B detects the angle at which the electronic device 100 shakes, calculates the distance that the lens module needs to compensate based on the angle, and allows the lens to offset the shake of the electronic device 100 through reverse movement to achieve anti-shake.
- the gyro sensor 180B can also be used for navigation and somatosensory game scenes.
- Air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronic device 100 calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist positioning and navigation.
- Magnetic sensor 180D includes a Hall sensor.
- the electronic device 100 may utilize the magnetic sensor 180D to detect opening and closing of the flip holster.
- the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. Then, based on the detected opening and closing status of the leather case or the opening and closing status of the flip cover, features such as automatic unlocking of the flip cover are set.
- the acceleration sensor 180E can detect the acceleration of the electronic device 100 in various directions (generally three axes). When the electronic device 100 is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices and be used in horizontal and vertical screen switching, pedometer and other applications.
- the electronic device 100 can measure distance through ultrasonic waves, infrared, or laser. In some embodiments, when shooting a scene, the electronic device 100 may utilize the distance sensor 180F to measure distance to achieve fast focusing.
- Proximity light sensor 180G may include, for example, a light emitting diode (LED) and a light detector, such as a photodiode.
- the light emitting diode may be an infrared light emitting diode.
- the electronic device 100 emits infrared light outwardly through the light emitting diode.
- Electronic device 100 uses photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device 100 . When insufficient reflected light is detected, the electronic device 100 may determine that there is no object near the electronic device 100 .
- the electronic device 100 can use the proximity light sensor 180G to detect when the user holds the electronic device 100 close to the ear for talking, so as to automatically turn off the screen to save power.
- the proximity light sensor 180G can also be used in holster mode, and pocket mode automatically unlocks and locks the screen.
- the ambient light sensor 180L is used to sense ambient light brightness.
- the electronic device 100 can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness.
- the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
- the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device 100 is in the pocket to prevent accidental touching.
- Fingerprint sensor 180H is used to collect fingerprints.
- the electronic device 100 can use the collected fingerprint characteristics to achieve fingerprint unlocking, access to application locks, fingerprint photography, fingerprint answering of incoming calls, etc.
- Temperature sensor 180J is used to detect temperature.
- the electronic device 100 utilizes the temperature detected by the temperature sensor 180J to execute the temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device 100 reduces the performance of a processor located near the temperature sensor 180J in order to reduce power consumption and implement thermal protection. In other embodiments, when the temperature is lower than another threshold, the electronic device 100 heats the battery 142 to prevent the low temperature from causing the electronic device 100 to shut down abnormally. In some other embodiments, when the temperature is lower than another threshold, the electronic device 100 performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
- Touch sensor 180K also called “touch panel”.
- the touch sensor 180K may be provided on the display screen 194,
- the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen”.
- the touch sensor 180K is used to detect a touch operation on or near the touch sensor 180K.
- the touch sensor can pass the detected touch operation to the application processor to determine the touch event type.
- Visual output related to the touch operation may be provided through display screen 194 .
- the touch sensor 180K may also be disposed on the surface of the electronic device 100 at a location different from that of the display screen 194 .
- Bone conduction sensor 180M can acquire vibration signals.
- the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human body's vocal part.
- the bone conduction sensor 180M can also contact the human body's pulse and receive blood pressure beating signals.
- the bone conduction sensor 180M can also be provided in an earphone and combined into a bone conduction earphone.
- the audio module 170 can analyze the voice signal based on the vibration signal of the vocal vibrating bone obtained by the bone conduction sensor 180M to implement the voice function.
- the application processor can analyze the heart rate information based on the blood pressure beat signal obtained by the bone conduction sensor 180M to implement the heart rate detection function.
- the buttons 190 include a power button, a volume button, etc.
- Key 190 may be a mechanical key. It can also be a touch button.
- the electronic device 100 may receive key inputs and generate key signal inputs related to user settings and function control of the electronic device 100 .
- the motor 191 can generate vibration prompts.
- the motor 191 can be used for vibration prompts for incoming calls and can also be used for touch vibration feedback.
- touch operations for different applications can correspond to different vibration feedback effects.
- the motor 191 can also respond to different vibration feedback effects for touch operations in different areas of the display screen 194 .
- Different application scenarios such as time reminders, receiving information, alarm clocks, games, etc.
- the touch vibration feedback effect can also be customized.
- the indicator 192 may be an indicator light, which may be used to indicate charging status, power changes, or may be used to indicate messages, missed calls, notifications, etc.
- the SIM card interface 195 is used to connect a SIM card.
- the SIM card can be connected to or separated from the electronic device 100 by inserting it into the SIM card interface 195 or pulling it out from the SIM card interface 195 .
- the electronic device 100 can support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
- SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card, etc. Multiple cards can be inserted into the same SIM card interface 195 at the same time. Multiple cards can be of the same type or different types.
- the SIM card interface 195 is also compatible with different types of SIM cards.
- the SIM card interface 195 is also compatible with external memory cards.
- the electronic device 100 interacts with the network through the SIM card to implement functions such as calls and data communications.
- the electronic device 100 uses an eSIM, that is, an embedded SIM card.
- the eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100 .
- Figure 2 shows a schematic diagram of the software structure of an electronic device in a background application recovery method provided by an embodiment of the present application.
- the operating system in the electronic device can be Android, Microsoft Window System (Windows), Apple Mobile Operating System (iOS) or Harmony OS, etc.
- the operating system of the electronic device is the Hongmeng system as an example.
- the Hongmeng system can be divided into four layers, including a kernel layer, a system service layer, a framework layer, and an application layer.
- the layers communicate through software interfaces.
- the kernel layer includes the kernel abstract layer (KAL) and driver subsystem.
- KAL includes multiple kernels, such as the Linux Kernel of the Linux system and the lightweight IoT system. Kernel LiteOS etc.
- the driver subsystem can include the Hardware Driver Foundation (HDF).
- HDF Hardware Driver Foundation
- the hardware driver framework can provide unified peripheral access capabilities and driver development and management framework.
- the multi-core kernel layer can select the corresponding core for processing according to the needs of the system.
- the system service layer is the core capability set of Hongmeng system.
- the system service layer provides services to applications through the framework layer.
- This layer can include:
- System basic capability subsystem set Provides basic capabilities for the operation, scheduling, migration and other operations of distributed applications on multiple devices of the Hongmeng system. It can include subsystems such as distributed soft bus, distributed data management, distributed task scheduling, multi-language runtime, common basic library, multi-mode input, graphics, security, artificial intelligence (AI), user program framework and other subsystems.
- the multi-language runtime provides C or C++ or JavaScript (JS) multi-language runtime and basic system class libraries. It can also be used for static Java programs using a compiler (that is, using Java language development in the application or framework layer). section) provides the runtime.
- JS JavaScript
- Basic software service subsystem set Provides public and general software services for Hongmeng system. Can include event notification, telephone, multimedia, Design For X (Design For X, DFX), MSDP&DV and other subsystems.
- Enhanced software service subsystem set Provides Hongmeng system with differentiated capability-enhanced software services for different devices. It can include smart screen proprietary business, wearable proprietary business, and Internet of Things (IoT) proprietary business subsystems.
- IoT Internet of Things
- Hardware service subsystem set Provides hardware services for Hongmeng system. It can include subsystems such as location services, biometric identification, wearable proprietary hardware services, and IoT proprietary hardware services.
- the framework layer provides multi-language user program frameworks and Ability frameworks such as Java, C, C++, and JS for Hongmeng system application development.
- Two user interface (UI) frameworks including Java UI for Java language framework, JS UI framework suitable for JS language), and multi-language framework application program interface (Application Programming Interface, API) that is open to the public for various software and hardware services.
- UI user interface
- API Application Programming Interface
- the application layer includes system applications and third-party non-system applications.
- System applications may include applications installed by default on the desktop, control bar, settings, phone and other electronic devices.
- Extended applications can be non-essential applications developed and designed by manufacturers of electronic devices, such as electronic device manager, replacement migration, notes, weather and other applications.
- Third-party non-system applications can be developed by other manufacturers, but can run applications in the Hongmeng system, such as games, navigation, social networking or shopping applications.
- Hongmeng system applications are composed of one or more meta-programs (Feature Ability, FA) or meta-services (Particle Ability, PA).
- FA has a UI interface that provides the ability to interact with users.
- PA has no UI interface and provides the ability to run tasks in the background and a unified data access abstraction.
- PA mainly provides support for FA, such as providing computing power as a background service, or providing data access capabilities as a data warehouse.
- Applications developed based on FA or PA can implement specific business functions, support cross-device scheduling and distribution, and provide users with a consistent and efficient application experience.
- Multiple electronic devices running the Hongmeng system can achieve hardware mutual assistance and resource sharing through distributed soft buses, distributed device virtualization, distributed data management and distributed task scheduling.
- Figure 3 shows a schematic flow chart of a background application recovery method provided by an embodiment of the present application. As an example and not a limitation, this method can be applied to the above-mentioned electronic device 100.
- background application recovery methods include:
- the user's deletion operation may be an independent operation or a combination of multiple operations.
- the deletion operation is an independent operation, it may be a voice control instruction received by the electronic device, a gesture operation, or an operation on a physical button.
- the electronic device can delete all background applications.
- the touch panel of the electronic device receives a gesture operation for instructing to clean up background applications, all background applications can also be deleted.
- all background applications can be deleted.
- the deletion operation is a combination of multiple operations, it may be a combination of multiple control operations on the electronic device display interface.
- the display interface of the electronic device may display multiple running background applications in the background application list.
- the interface may include preview interfaces for multiple background applications, and a deletion mark used to indicate deletion of the background application is set on the preview interface of each background application.
- the interface can also include a cleanup flag to indicate deletion of all background applications, etc.
- the background application list includes at least one running background application.
- the sliding operation used to instruct deletion of one or more background applications includes: clicking the deletion mark corresponding to the background application in the background application interface. Or, click the cleanup mark in the background app interface. Alternatively, you can also click on the preview interface of the background application and drag the preview interface for a certain distance in a preset direction to indicate deletion of the background application.
- deleting at least one background application and storing the deleted background application in the first storage space can remove the deleted background application from the background application list. Then, the deleted background application, the recovery information of the deleted background application and the user's first identification tag are bound and stored in the first storage space.
- Figure 4 shows a schematic system structure diagram of a background application recovery method provided by an embodiment of the present application.
- the background application display module may be a service running in random access memory (Random Access Memory, RAM), and is used to obtain the running background application from RAM when an operation indicating display of the running background application is detected, and Displayed on the interface of electronic devices.
- RAM Random Access Memory
- the virtual deletion module may be a service module in the system service layer and framework layer, and is used to identify the first identification tag of the user who currently deletes the background application. And the deleted background application, the recovery information of the deleted background application and the user's first identification tag are bound, and handed over to the deletion path list storage module.
- the deletion path list storage module is used to store the bound deleted background application, the recovery information of the deleted background application, and the user's first identification tag in the first storage in the read-only memory (Read-Only Memory, ROM). within the space.
- the deleted background applications include the running data of the background applications. For example, it can include process data of background applications, service types called, storage locations of cached data, etc.
- the recovery information of the deleted background application may include the time when the background application was deleted, the interface information of the application when the background application was deleted, etc.
- the user's first identification tag may be a number, text information, or a unique character string.
- the user's first identification tag is used to indicate the user's identity.
- the user's identity includes the machine owner, multiple family members, or visitors.
- the user's first identification tag can be determined based on the user's
- the user's voiceprint characteristics, facial characteristics, fingerprint characteristics and other biometric characteristics can be determined, or it can also be passwords, drawn graphics and other information that can be used to identify the user.
- the biometrics of multiple users with different identities can be pre-entered in the electronic device.
- the electronic device is unlocked through the corresponding biometrics, it can be confirmed that the current user corresponds to the biometrics.
- the user's identity can be determined as the user's first identification tag.
- each user of the electronic device can delete background applications.
- the deletion path list storage module can store the background applications deleted by users with different identification tags in different storage spaces. .
- the deletion path list storage module receives the first identification tag, the deleted background application, and the recovery information of the deleted background application, it is determined that the first identification tag corresponds to the machine owner, and the background application was deleted by the machine owner. Then, the first identification tag, the deleted background application, and the recovery information of the deleted background application can be stored in the storage space corresponding to the host in the first storage space.
- the deletion path list storage module When the deletion path list storage module receives the first identification tag, the deleted background application, and the recovery information of the deleted background application, it is determined that the first identification tag corresponds to family member A, and the background application was deleted by family member A. Then, the first identification tag, the deleted background application, and the recovery information of the deleted background application can be stored in the storage space corresponding to family member A in the first storage space.
- a delayed deletion module is also included.
- the delayed deletion module is similar to the virtual deletion module and can be a service module in the system service layer and the framework layer, used to delete data stored in the first Deletion of background applications in storage space is timed.
- Each deleted background application corresponds to a preset duration.
- the preset duration is the cleaning duration of background applications.
- the user's recovery operation may be an independent operation or a combination of multiple operations.
- the recovery operation When the recovery operation is an independent operation, it may be a voice control instruction, a gesture operation, or an operation on a physical button received by the electronic device.
- the user authentication module when the microphone of the electronic device receives the voice command "Resume background application", the user authentication module can obtain the first identification tag corresponding to the user based on the voiceprint characteristics of the received voice command.
- the user authentication module may be a service module in the system service layer and framework layer, and is used to identify the user who initiates the recovery operation.
- the touch panel of the electronic device receives a gesture operation for instructing to resume the background application
- the user's fingerprint features or facial features can also be collected through the user authentication module to identify the user's first identification tag.
- the recovery operation When the recovery operation is a combination of multiple operations, it may be a combination of multiple control operations on the electronic device display interface. For example, when the electronic device receives a sliding operation of sliding upward from the bottom edge of the screen, the display interface of the electronic device may display multiple running background applications. This interface contains the content mentioned in the example of S310, and may also include a restore button for instructing to restore the background application.
- the electronic device when the electronic device receives the operation of clicking the restore button for instructing to restore the background application, it can collect the user's voiceprint features, fingerprint features or facial features through the user authentication module to identify the user who initiated the restore operation and obtain the user's The first identification tag.
- Figure 5 shows a schematic diagram of the application interface of a background application recovery method provided by an embodiment of the present application.
- a plurality of running background applications 501 and a resume button 502 are shown.
- the electronic device may determine that the restore operation is received.
- the electronic device can collect the biometric characteristics of the user who initiates the recovery operation through a fingerprint sensor, camera or microphone, and obtain the user's first identification tag based on the user's biometric characteristics.
- the first storage space may store multiple background applications deleted by users, and each deleted background application corresponds to a first identification tag. In this case, only the deleted background application with the first identification tag of the user can be obtained. For example, if the first storage space stores a background application deleted by the owner (with a first identification tag of the owner) and a background application deleted by family member A (with a first identification tag of family member A). When the user's first identification tag indicates that the user is the machine owner, all background applications deleted by the machine owner are obtained based on the first identification tag corresponding to the machine owner.
- FIG. 6 shows a schematic diagram of the application interface of another background application recovery method provided by an embodiment of the present application.
- FIG. 7 shows a schematic diagram of the application interface of another background application recovery method provided by an embodiment of the present application.
- the application name and icon of the background application deleted by the user may be displayed in the interface.
- the machine owner is user 1.
- the names of the four background applications deleted by the owner are shown in the order of deletion time: "Application Name 5", "Application Name 6", "Application Name 7" and "Application Name 8".
- 4 recovery options are displayed: “Select Recovery”, “Recover One by One”, “Restore All” and “Cancel Recovery”.
- the user's operation can be a selection operation.
- the selection operation may be a click operation that acts on the "Select Restore", "Restore One by One” or "Restore All” areas.
- the user's selection operation is a click operation that displays the "Select Restore” area
- the user can be prompted to enter the interface for selecting recovery by highlighting the "Select Restore” area.
- the selected application name can be highlighted to determine the user's needs. Restored background applications.
- Figure 7 takes the selection of "Application Name 5" and "Application Name 7" as an example.
- the "Confirm Recovery” button can be displayed to prompt the user to confirm again whether to restore the background application.
- the area displaying "Confirm Recovery” receives a click operation, it is confirmed that the user needs to restore the background applications corresponding to "Application Name 5" and "Application Name 7".
- the recovery module obtains the recovery information of the background application corresponding to "Application Name 5" and "Application Name 7" from the first storage space, and based on the information of "Application Name 5" and "Application Name 7" Restore the information, add the applications corresponding to "Application Name 5" and "Application Name 7" to the background application list, and then remove the data corresponding to "Application Name 5" and "Application Name 7" from the first storage space.
- each click can restore a deleted background application whose deletion time is closest to the current time. For example, if the current time is 18:00, application 5 is deleted at 17:00, application 6 is deleted at 17:12, application 7 is deleted at 17:31, and application 8 is deleted at 17:58. . Then when the click operation is received in the "Restore one by one" area, the background application corresponding to application 8 is restored; when the click operation is received again in the "Restore one by one” area, the background application corresponding to application 7 is restored. its recovery method The formula is similar to the above example and will not be repeated here. And so on, until all deleted background applications are restored, or an operation to terminate the recovery is received (for example, a click operation is received in the "Cancel Recovery" area).
- Figure 8 shows a schematic diagram of an application interface of another background application recovery method provided by an embodiment of the present application.
- family member A is user 2.
- the names of the two background applications deleted by family member A "Application Name 9" and "Application Name 10" are displayed in the order of deletion time.
- 4 recovery options “select recovery”, “item recovery”, “all recovery” and “cancel recovery”.
- the method for user 2 to restore background applications is similar to that for user 1, and will not be described in detail here.
- the user's first identification is obtained when the user initiates a recovery operation, and the background application deleted by the user is obtained according to the user's first identification. It can prevent other users from restoring background applications that were not deleted by themselves, prevent other users from obtaining private data by restoring deleted background applications, and better protect the privacy of each user.
- Figure 9 shows a schematic system structure diagram of another background application recovery method provided by an embodiment of the present application.
- this application also provides a user habit learning module.
- the user habit learning module is also a service module in the system service layer and framework layer, and is used to modify each of the delayed deletion modules according to the user's recovery habits.
- the preset duration of background applications i.e. the cleaning duration is used to learn users’ habits of restoring background applications and provide more personalized services.
- Figure 10 shows a schematic flow chart of another background application recovery method provided by an embodiment of the present application.
- the recovery data includes the number of recovery times and the recovery time interval of the background application.
- the cleaning time of the background application may be different.
- the number of restoration times of background applications needs to be counted based on different users. For example, within a week, user 1 (the owner) restored application 1 20 times (number of restorations), and usually 10 minutes after deleting application 1 Restore within (restore time interval). User 2 restored App 1 5 times, usually within 30 minutes of deleting App 1.
- each background application has different importance to different users. Therefore, when obtaining the recovery data of each background application, it needs to be distinguished based on the user's first identification identifier.
- application 1 is restored the most times within a week and the recovery time interval is the shortest. Then the increased importance of application 1 to user 1 can be confirmed based on the recovery data of application 1, that is, Extend the cleanup time after user 1 deletes application 1. For example, the cleaning time after User 1 deletes Application 1 is 15 minutes. Depending on the importance of Application 1 to User 1, the cleaning time can be adjusted to 30 minutes.
- FIG. 11 shows a structural block diagram of a ranging device applied to electronic equipment provided in the embodiment of the present application. For convenience of explanation, only Parts related to the embodiments of this application are disclosed.
- the background application recovery device includes:
- the acquisition module 61 is configured to acquire the user's first identification tag in response to the recovery operation from the user.
- the acquisition module 61 is also used to acquire and display the background applications deleted by the user according to the user's first identification tag.
- the restoration module 62 is configured to select and restore at least one background application from the displayed background applications in response to an operation from the user.
- the device further includes a deletion module 63, configured to delete at least one background application and store the deleted background application in the first storage space in response to a deletion operation from the user.
- a deletion module 63 configured to delete at least one background application and store the deleted background application in the first storage space in response to a deletion operation from the user.
- the deletion module 63 is specifically configured to remove the deleted background application from the background application list, which includes at least one running background application.
- the deleted background application, the recovery information of the deleted background application and the user's first identification tag are bound and stored in the first storage space.
- the deletion module 63 is also configured to clean up the deleted background application from the first storage space after the storage period of the deleted background application in the first storage space reaches a preset period.
- the preset duration is determined based on the number of times the user restores deleted background applications and the recovery time interval.
- the acquisition module 61 is specifically configured to obtain the deleted background application including the user's first identification tag in the first storage space according to the user's first identification tag. Displays the app ID of each deleted background app.
- the recovery module 62 is specifically configured to obtain the recovery information of the deleted background application in the first storage space.
- the deleted background application is determined based on the user's operation. According to the obtained recovery information of the deleted background application, the deleted background application is added to the background application list. Remove deleted background applications from the first storage space.
- Module completion means dividing the internal structure of the device into different functional units or modules to complete all or part of the functions described above.
- Each functional unit and module in the embodiment can be integrated into one processing unit, or each unit can exist physically alone, or two or more units can be integrated into one unit.
- the above-mentioned integrated unit can be hardware-based. It can also be implemented in the form of software functional units.
- the specific names of each functional unit and module are only for the convenience of distinguishing each other and are not used for Limit the scope of protection of this application.
- For the specific working processes of the units and modules in the above system please refer to the corresponding processes in the foregoing method embodiments, and will not be described again here.
- FIG 12 is a structural block diagram of an electronic device provided by an embodiment of the present application. As shown in Figure 12, the electronic device 7 of this embodiment includes:
- At least one processor 701 (only one is shown in Figure 12), a memory 702, and a computer program 703 stored in the memory 702 and executable on at least one processor 701.
- the processor 701 executes the computer program 703, the above is achieved. Control steps in method embodiments.
- the electronic device 7 may be a mobile phone, a tablet computer, an augmented reality (AR)/virtual reality (VR) device, a large screen device, a laptop, a netbook, a personal digital assistant (personal digital assistant, PDA), etc.
- AR augmented reality
- VR virtual reality
- FIG. 12 is only an example of the electronic device 7 and does not constitute a limitation on the electronic device 7. It may include more or fewer components than shown in the figure, or some components may be combined, or different components may be used. , for example, it may also include input and output devices, network access devices, etc.
- the so-called processor 701 can be a central processing unit (Central Processing Unit, CPU).
- the processor 701 can also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit). , ASIC), SOC, off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
- a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
- the memory 702 may be an internal storage unit of the electronic device 7 in some embodiments, such as a hard disk or memory of the electronic device 7 . In other embodiments, the memory 702 may also be an external storage device of the electronic device 7, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), or a secure digital (SD) equipped on the electronic device 7. Card, Flash Card, etc.
- a plug-in hard disk such as a smart disk, SMC), or a secure digital (SD) equipped on the electronic device 7.
- SD secure digital
- the memory 702 may also include both an internal storage unit of the electronic device 7 and an external storage device.
- the memory 702 is used to store operating systems, application programs, boot loaders, data, and other programs, such as program codes of computer programs.
- the memory 702 may also be used to temporarily store data that has been output or is to be output.
- Embodiments of the present application provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium.
- a computer program implements a method applied to an electronic device when executed by a processor.
- Embodiments of the present application provide a computer program product.
- the computer program product When the computer program product is run on an electronic device, it causes the terminal device to execute the above method applied to the electronic device.
- Embodiments of the present application provide a chip system.
- the chip system includes a memory and a processor.
- the processor executes a computer program stored in the memory to implement a method applied to an electronic device.
- Embodiments of the present application provide a chip system.
- the chip system includes a processor.
- the processor is coupled to the computer-readable storage medium provided in the eighth aspect.
- the processor executes the computer program stored in the computer-readable storage medium to implement applications. Electronic device methods.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
- this application can implement all or part of the processes in the methods of the above embodiments by instructing relevant hardware through a computer program.
- the computer program can be stored in a computer-readable storage medium.
- the computer program When executed by the processor, The steps of each of the above method embodiments can be implemented.
- the computer program includes computer program code, which may be in the form of source code, object code, executable file or some intermediate form.
- the computer-readable medium may at least include: any entity or device capable of carrying computer program code to an electronic device or a second device, a recording medium, a computer memory, a read-only memory (ROM, Read-Only Memory), a random access Memory (RAM, Random Access Memory), electrical carrier signals, telecommunications signals, and software distribution media.
- ROM Read-only memory
- RAM Random Access Memory
- electrical carrier signals telecommunications signals
- software distribution media For example, U disk, mobile hard disk, magnetic disk or CD, etc.
- computer-readable media may not be electrical carrier signals and telecommunications signals.
- the disclosed methods, devices, electronic devices or second devices can be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of modules or units is only a logical function division.
- the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, indirect coupling or communication connection of devices or units, which may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Telephone Function (AREA)
Abstract
本申请适用于终端领域,尤其涉及一种后台应用恢复方法、装置、电子设备及可读存储介质。后台应用恢复方法,包括:响应来自用户的恢复操作,获取用户的第一识别标签。根据用户的第一识别标签,从第一存储空间中获取用户删除的后台应用。响应来自用户的操作,从用户删除的后台应用中确定并恢复至少一个后台应用。实现了恢复用户删除的后台应用,进而使得用户在误删后台应用时,可以通过该操作方便快捷的恢复误删的后台应用,解决了误删后台应用的问题。
Description
本申请要求于2022年3月31日提交国家知识产权局、申请号为202210353006.1、申请名称为“后台应用恢复方法、装置、电子设备及可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及终端领域,尤其涉及一种后台应用恢复方法、装置、电子设备及可读存储介质。
如今,智能设备在人们的生活中无处不在,例如智能手机、平板电脑、智能终端等设备。这些智能设备往往是依靠应用程序(Application,APP)为用户提供服务。一个智能设备可以同时运行多个应用程序,在界面上显示的应用程序为前台应用,其他则为后台应用。由于后台应用运行时会占用智能设备的系统资源,用户可能会对后台应用进行删除。
然而,用户在删除后台应用时可能会误删除无需删除的后台应用。目前,只能通过预先锁定后台应用的方式防止误删除。
但是,现有防止误删除的方式操作不便,且无法有效的防止误删除。
发明内容
本申请实施例提供了一种后台应用恢复方法、装置、电子设备及可读存储介质,可以解决现有的单向测距方案计算得到的距离精确度不足,误差较大的问题。
第一方面,本申请实施例提供了一种后台应用恢复方法,应用于电子设备,包括:响应来自用户的恢复操作,获取用户的第一识别标签。根据用户的第一识别标签,从第一存储空间中获取用户删除的后台应用。响应来自用户的操作,从用户删除的后台应用中确定并恢复至少一个后台应用。
一些实施方式中,电子设备可以是手机、平板电脑、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、大屏设备、笔记本电脑、上网本、个人数字助理(personal digital assistant,PDA)等可以对后台应用进行操作的设备,本申请实施例对电子设备的具体类型不作任何限制。
第一方面中,通过响应来自用户的恢复操作,获取用户的第一识别标签。然后根据用户的第一识别标签获取该用户删除的后台应用,并响应来自用户的操作,从展示的后台应用中确定并恢复至少一个后台应用。实现了恢复用户删除的后台应用,进而使得用户在误删后台应用时,可以通过该操作方便快捷的恢复误删的后台应用,解决了误删后台应用的问题。
一些实施方式中,该方法还包括:响应来自用户的删除操作,删除至少一个后台应用并将删除的后台应用存入第一存储空间。
一些实施方式中,删除至少一个后台应用并将删除的后台应用存入第一存储空间,包括:将删除的后台应用从后台应用列表中移除,后台应用列表中包括至少一个正在运行的后台应用。将删除的后台应用、删除的后台应用的恢复信息以及用户的第一识别标签进行绑定,保存在第一存储空间中。
一些实施方式中,该方法还包括:当删除的后台应用在第一存储空间中的存储时长达到预设时长后,从第一存储空间中清理删除的后台应用。
一些实施方式中,预设时长是根据用户恢复删除的后台应用的恢复次数和恢复时间间隔确定的。
一些实施方式中,根据用户的第一识别标签,从第一存储空间中获取用户删除的后台应用,包括:根据用户的第一识别标签,在第一存储空间中获取包括用户的第一识别标签的删除的后台应用。展示每个删除的后台应用的应用标识。
一些实施方式中,响应来自用户的操作,从后台应用中确定并恢复至少一个后台应用,包括:在第一存储空间中获取删除的后台应用的恢复信息,删除的后台应用是根据用户的操作确定的。根据获取的删除的后台应用的恢复信息,将删除的后台应用添加至后台应用列表中。从第一存储空间中移除删除的后台应用。
第二方面,本申请实施例提供了一种后台应用恢复装置,应用于电子设备,包括:获取模块,用于响应来自用户的恢复操作,获取用户的第一识别标签。获取模块,还用于根据用户的第一识别标签,获取并展示用户删除的后台应用。恢复模块,用于响应来自用户的操作,从展示的后台应用中选择并恢复至少一个后台应用。
一些实施方式中,该装置还包括删除模块,用于响应来自用户的删除操作,删除至少一个后台应用并将删除的后台应用存入第一存储空间。
一些实施方式中,删除模块,具体用于将删除的后台应用从后台应用列表中移除,后台应用列表中包括至少一个正在运行的后台应用。将删除的后台应用、删除的后台应用的恢复信息以及用户的第一识别标签进行绑定,保存在第一存储空间中。
一些实施方式中,删除模块,还用于当删除的后台应用在第一存储空间中的存储时长达到预设时长后,从第一存储空间中清理删除的后台应用。
一些实施方式中,预设时长是根据用户恢复删除的后台应用的恢复次数和恢复时间间隔确定的。
一些实施方式中,获取模块,具体用于根据用户的第一识别标签,在第一存储空间中获取包括用户的第一识别标签的删除的后台应用。展示每个删除的后台应用的应用标识。
一些实施方式中,恢复模块,具体用于在第一存储空间中获取删除的后台应用的恢复信息,删除的后台应用是根据用户的操作确定的。根据获取的删除的后台应用的恢复信息,将删除的后台应用添加至后台应用列表中。从第一存储空间中移除删除的后台应用。
第三方面,本申请实施例提供了一种电子设备,包括存储器、处理器、测距信号接收组件以及存储在存储器中并可在处理器上运行的计算机程序。处理器执行计算机程序时实现第一方面提供的方法。
第四方面,本申请实施例提供了一种计算机可读存储介质,计算机可读存储介质
存储有计算机程序。计算机程序被处理器执行时实现第一方面提供的方法。
第五方面,本申请实施例提供了一种计算机程序产品,当计算机程序产品在电子设备上运行时,使得终端设备执行上述第一方面提供的方法。
第六方面,本申请实施例提供了一种芯片系统,芯片系统包括存储器和处理器,处理器执行存储器中存储的计算机程序,以实现第一方面提供的方法。
第七方面,本申请实施例提供了一种芯片系统,芯片系统包括处理器,处理器与第八方面提供的计算机可读存储介质耦合,处理器执行计算机可读存储介质中存储的计算机程序,以实现第一方面提供的方法。
可以理解的是,上述第二方面至第七方面的有益效果可以参见上述第一方面中的相关描述,在此不再赘述。
图1示出了本申请实施例提供的一种应用后台应用恢复方法的电子设备的结构示意图;
图2示出了本申请实施例提供的一种后台应用恢复方法中电子设备的软件结构示意图;
图3示出了本申请实施例提供的一种后台应用恢复方法的示意性流程图;
图4示出了本申请实施例提供的一种后台应用恢复方法的系统结构示意图;
图5示出了本申请实施例提供的一种后台应用恢复方法的应用界面示意图;
图6示出了本申请实施例提供的另一种后台应用恢复方法的应用界面示意图;
图7示出了本申请实施例提供的另一种后台应用恢复方法的应用界面示意图;
图8示出了本申请实施例提供的另一种后台应用恢复方法的应用界面示意图;
图9示出了本申请实施例提供的另一种后台应用恢复方法的系统结构示意图;
图10示出了本申请实施例提供的另一种后台应用恢复方法的示意性流程图;
图11示出了本申请实施例提供的一种应用于电子设备的测距装置的结构框图;
图12为本申请实施例提供的一种电子设备的结构框图。
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。
应当理解,当在本申请说明书和所附权利要求书中使用时,术语“包括”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。
还应当理解,在本申请说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。
如在本申请说明书和所附权利要求书中所使用的那样,术语“如果”可以依据上下文被解释为“当...时”或“一旦”或“响应于确定”或“响应于检测到”。
另外,在本申请说明书和所附权利要求书的描述中,术语“第一”、“第二”、“第三”等仅用于区分描述,而不能理解为指示或暗示相对重要性。
在本申请说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。
用户在使用智能设备时,很有可能出现误删除后台应用的情况。对此,可以通过在后台应用展示界面提供锁定功能,锁定需要保留的后台应用。锁定后的后台应用无法被删除,即可实现防止误删除的功能。
但是,这种方式需要提前在后台应用展示界面进行锁定操作,操作繁琐。而且,当未锁定的后台应用被误删时无法补救。
对此,本申请提供了一种后台应用恢复方法,包括:响应来自用户的恢复操作,获取用户的第一识别标签。根据用户的第一识别标签,获取并展示用户删除的后台应用。响应来自用户的操作,从展示的后台应用中确定并恢复至少一个后台应用。
在本申请中,通过响应来自用户的恢复操作,获取用户的第一识别标签。然后根据用户的第一识别标签获取该用户删除的后台应用,并响应来自用户的操作,从展示的后台应用中确定并恢复至少一个后台应用。实现了恢复该用户删除的后台应用,进而使得用户在误删后台应用时,可以通过该操作方便快捷的恢复误删的后台应用,解决了误删后台应用的问题。
图1示出了本申请实施例提供的一种应用后台应用恢复方法的电子设备的结构示意图。
在图1中,电子设备100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
可以理解的是,本申请实施例示意的结构并不构成对电子设备100的具体限定。在本申请另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
作为举例,当电子设备100为手机、平板电脑或大屏设备时,可以包括图示中的全部部件,也可以仅包括图示中的部分部件。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码
器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
其中,控制器可以是电子设备100的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现电子设备100的触摸功能。
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号。
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM总线接口耦合。
在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号。I2S接口和PCM接口都可以用于音频通信。
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在与并行通信之间转换。
在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。
在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。
MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display
serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现电子设备100的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现电子设备100的显示功能。
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备100充电,也可以用于电子设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。
可以理解的是,本申请实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备100的结构限定。在本申请另一些实施例中,电子设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。
在一些无线充电的实施例中,充电管理模块140可以通过电子设备100的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备供电。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。
在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。
电子设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在电子设备100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。
在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。
在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。
在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。
无线通信模块160可以提供应用在电子设备100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,电子设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备100可以通过无线通信技术与网络以及其他设备通信。
无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
电子设备100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。例如本申请实施例中的教学视频和用户动作画面视频,显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵
有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。
在一些实施例中,电子设备100可以包括1个或N个显示屏194,N为大于1的正整数。
电子设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。镜头的焦段可以用于表示摄像头的取景范围,镜头的焦段越小,表示镜头的取景范围越大。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。
在本申请中,电子设备100可以包括2个或2个以上焦段的摄像头193。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。
在本申请实施例中,NPU或其他处理器可以用于对电子设备100存储的视频中的图像进行分析处理等操作。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。
内部存储器121可以用于存储计算机可执行程序代码,可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行电子设备100的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存
储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)。存储数据区可存储电子设备100使用过程中所创建的数据(比如音频数据,电话本等)。
此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
电子设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。
音频模块170用于将数字音频信号转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。电子设备100可以通过扬声器170A收听音乐,或收听免提通话,例如扬声器可以播放本申请实施例提供的比对分析结果。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当电子设备100接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。电子设备100可以设置至少一个麦克风170C。在另一些实施例中,电子设备100可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在通过超声波进行测距时,选用的麦克风170C需要能够录制超声波音频信号。
在另一些实施例中,电子设备100还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。
耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。
在一些实施例中,压力传感器180A可以设置于显示屏194。压力传感器180A的种类很多,如电阻式压力传感器,电感式压力传感器,电容式压力传感器等。电容式压力传感器可以是包括至少两个具有导电材料的平行板。当有力作用于压力传感器180A,电极之间的电容改变。电子设备100根据电容的变化确定压力的强度。当有触摸操作作用于显示屏194,电子设备100根据压力传感器180A检测触摸操作强度。电子设备100也可以根据压力传感器180A的检测信号计算触摸的位置。
在一些实施例中,作用于相同触摸位置,但不同触摸操作强度的触摸操作,可以对应不同的操作指令。例如:当有触摸操作强度小于第一压力阈值的触摸操作作用于短消息应用图标时,执行查看短消息的指令。当有触摸操作强度大于或等于第一压力阈值的触摸操作作用于短消息应用图标时,执行新建短消息的指令。
陀螺仪传感器180B可以用于确定电子设备100的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备100围绕三个轴(即,x,y和z轴)的角速度。陀螺仪传感器180B可以用于拍摄防抖。示例性的,当按下快门,陀螺仪传感器180B检测电子设备100抖动的角度,根据角度计算出镜头模组需要补偿的距离,让镜头通过反向运动抵消电子设备100的抖动,实现防抖。陀螺仪传感器180B还可以用于导航,体感游戏场景。
气压传感器180C用于测量气压。在一些实施例中,电子设备100通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。
磁传感器180D包括霍尔传感器。电子设备100可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当电子设备100是翻盖机时,电子设备100可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。
加速度传感器180E可检测电子设备100在各个方向上(一般为三轴)加速度的大小。当电子设备100静止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。
距离传感器180F,用于测量距离。电子设备100可以通过超声波、红外或激光测量距离。在一些实施例中,拍摄场景,电子设备100可以利用距离传感器180F测距以实现快速对焦。
接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。电子设备100通过发光二极管向外发射红外光。电子设备100使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定电子设备100附近有物体。当检测到不充分的反射光时,电子设备100可以确定电子设备100附近没有物体。电子设备100可以利用接近光传感器180G检测用户手持电子设备100贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器180L用于感知环境光亮度。电子设备100可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测电子设备100是否在口袋里,以防误触。
指纹传感器180H用于采集指纹。电子设备100可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
温度传感器180J用于检测温度。在一些实施例中,电子设备100利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,电子设备100执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,电子设备100对电池142加热,以避免低温导致电子设备100异常关机。在其他一些实施例中,当温度低于又一阈值时,电子设备100对电池142的输出电压执行升压,以避免低温导致的异常关机。
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,
由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备100的表面,与显示屏194所处的位置不同。
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。
在一些实施例中,骨传导传感器180M也可以设置于耳机中,结合成骨传导耳机。音频模块170可以基于骨传导传感器180M获取的声部振动骨块的振动信号,解析出语音信号,实现语音功能。应用处理器可以基于骨传导传感器180M获取的血压跳动信号解析心率信息,实现心率检测功能。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备100可以接收按键输入,产生与电子设备100的用户设置以及功能控制有关的键信号输入。
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和电子设备100的接触和分离。电子设备100可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口195可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一个SIM卡接口195可以同时插入多张卡。多张卡的类型可以相同,也可以不同。SIM卡接口195也可以兼容不同类型的SIM卡。SIM卡接口195也可以兼容外部存储卡。电子设备100通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,电子设备100采用eSIM,即:嵌入式SIM卡。eSIM卡可以嵌在电子设备100中,不能和电子设备100分离。
图2示出了本申请实施例提供的一种后台应用恢复方法中电子设备的软件结构示意图。
电子设备中的操作系统可以是安卓(Android)系统,微软窗口系统(Windows),苹果移动操作系统(iOS)或者鸿蒙系统(Harmony OS)等。在此,以电子设备的操作系统为鸿蒙系统为例进行说明。
在一些实施例中,可将鸿蒙系统分为四层,包括内核层、系统服务层、框架层以及应用层,层与层之间通过软件接口通信。
如图2所示,内核层包括内核抽象层(Kernel Abstract Layer,KAL)和驱动子系统。KAL下包括多个内核,如Linux系统的内核Linux Kernel、轻量级物联网系统内
核LiteOS等。驱动子系统则可以包括硬件驱动框架(Hardware Driver Foundation,HDF)。硬件驱动框架能够提供统一外设访问能力和驱动开发、管理框架。多内核的内核层可以根据系统的需求选择相应的内核进行处理。
系统服务层是鸿蒙系统的核心能力集合,系统服务层通过框架层对应用程序提供服务。该层可包括:
系统基本能力子系统集:为分布式应用在鸿蒙系统多设备上的运行、调度、迁移等操作提供了基础能力。可包括分布式软总线、分布式数据管理、分布式任务调度、多语言运行时、公共基础库、多模输入、图形、安全、人工智能(Artificial Intelligence,AI)、用户程序框架等子系统。其中,多语言运行时提供了C或C++或JavaScript(JS)多语言运行时和基础的系统类库,也可以为使用编译器静态化的Java程序(即应用程序或框架层中使用Java语言开发的部分)提供运行时。
基础软件服务子系统集:为鸿蒙系统提供公共的、通用的软件服务。可包括事件通知、电话、多媒体、面向X设计(Design For X,DFX)、MSDP&DV等子系统。
增强软件服务子系统集:为鸿蒙系统提供针对不同设备的、差异化的能力增强型软件服务。可包括智慧屏专有业务、穿戴专有业务、物联网(Internet of Things,IoT)专有业务子系统组成。
硬件服务子系统集:为鸿蒙系统提供硬件服务。可包括位置服务、生物特征识别、穿戴专有硬件服务、IoT专有硬件服务等子系统。
框架层为鸿蒙系统应用开发提供了Java、C、C++、JS等多语言的用户程序框架和能力(Ability)框架,两种用户界面(User Interface,UI)框架(包括适用于Java语言的Java UI框架、适用于JS语言的JS UI框架),以及各种软硬件服务对外开放的多语言框架应用程序接口(Application Programming Interface,API)。根据系统的组件化裁剪程度,鸿蒙系统设备支持的API也会有所不同。
应用层包括系统应用和第三方非系统应用。系统应用可包括桌面、控制栏、设置、电话等电子设备默认安装的应用程序。扩展应用可以是由电子设备的制造商开发设计的、非必要的应用,如电子设备管家、换机迁移、便签、天气等应用程序。而第三方非系统应用则可以是由其他厂商开发,但是可以在鸿蒙系统中运行应用程序,如游戏、导航、社交或购物等应用程序。
鸿蒙系统的应用由一个或多个元程序(Feature Ability,FA)或元服务(Particle Ability,PA)组成。其中,FA有UI界面,提供与用户交互的能力。而PA无UI界面,提供后台运行任务的能力以及统一的数据访问抽象。PA主要为FA提供支持,例如作为后台服务提供计算能力,或作为数据仓库提供数据访问能力。基于FA或PA开发的应用,能够实现特定的业务功能,支持跨设备调度与分发,为用户提供一致、高效的应用体验。
多个运行鸿蒙系统的电子设备之间可以通过分布式软总线、分布式设备虚拟化、分布式数据管理和分布式任务调度实现硬件互助和资源共享。
图3示出了本申请实施例提供的一种后台应用恢复方法的示意性流程图,作为示例而非限定,该方法可以应用于上述电子设备100中。
参考图3,后台应用恢复方法包括:
S310、响应来自用户的删除操作,删除至少一个后台应用并将删除的后台应用存入第一存储空间。
一些实施方式中,用户的删除操作可以是一个独立的操作,也可以是多个操作的组合。
当删除操作为独立的操作时,可以是电子设备接收到的语音控制指令、手势操作或者对物理按键的操作等。例如,当电子设备的麦克风接收到语音指令“清理后台应用”时,电子设备可以将所有的后台应用删除。或者,当电子设备的触控面板接收到用于指示清理后台应用的手势操作时,也可以将所有的后台应用删除。再或者,若设置了用于清理后台应用的物理按键,当该物理按键接收到用户的按压操作发出信号时,则可以将所有的后台应用删除。
当删除操作为多个操作的组合时,可以是对电子设备显示界面的多个控制操作的组合。例如,当电子设备接收到从底部屏幕边缘向上滑动的滑动操作后,电子设备的显示界面可以显示后台应用列表中的多个正在运行的后台应用。该界面中可以包括多个后台应用的预览界面,每个后台应用的预览界面上设置有用于指示删除该后台应用的删除标记。该界面中还可以包括用于指示删除所有后台应用的清理标记等。其中,后台应用列表中包括至少一个正在运行的后台应用。
然后,电子设备接收到用于指示删除一个或多个后台应用的滑动操作后,将对应的后台应用删除。其中,用于指示删除一个或多个后台应用的滑动操作包括:点击后台应用界面中后台应用对应的删除标记。或者,点击后台应用界面中的清理标记。再或者,还可以通过点击后台应用的预览界面,并向预设的方向拖动该预览界面一段距离,以指示删除该后台应用。
一些实施方式中,删除至少一个后台应用并将删除的后台应用存入第一存储空间,可以将删除的后台应用从后台应用列表中移除。然后,将删除的后台应用、删除的后台应用的恢复信息以及用户的第一识别标签进行绑定,保存在第一存储空间中。
图4示出了本申请实施例提供的一种后台应用恢复方法的系统结构示意图。
作为示例,参考图4,其中包括后台应用显示模块、虚拟删除模块以及删除路径列表存储模块。后台应用显示模块可以是在随机存取存储器(Random Access Memory,RAM)中运行的服务,用于在检测到指示显示正在运行的后台应用的操作时,从RAM中获取正在运行的后台应用,并在电子设备的界面进行展示。
虚拟删除模块,可以是系统服务层和框架层中的服务模块,用于识别当前删除后台应用的用户的第一识别标签。并将删除的后台应用、删除的后台应用的恢复信息以及用户的第一识别标签进行绑定,并交给删除路径列表存储模块。删除路径列表存储模块则用于将绑定好的删除的后台应用、删除的后台应用的恢复信息以及用户的第一识别标签存储在只读存储器(Read-Only Memory,ROM)中的第一存储空间内。删除的后台应用包括后台应用的运行数据。例如,可以包括后台应用的进程数据、调用的服务类型、缓存数据的存储位置等。删除的后台应用的恢复信息则可以包括删除后台应用时的时间、删除后台应用时应用的界面信息等。用户的第一识别标签可以是编号、文字信息或者具有唯一性的字符串等。用户的第一识别标签用于指示用户的身份,例如,用户的身份包括机主、多个家庭成员或访客等。用户的第一识别标签可以根据用
户的声纹特征、面容特征、指纹特征等生物特征进行确定,或者也可以是密码、绘制的图形等可以用于识别用户的信息。
作为示例,可以在电子设备中预先录入多个不同身份用户(如机主和多个家庭成员)的生物特征,当通过对应的生物特征解锁电子设备时,则可以确认当前用户为该生物特征对应用户的身份,即可确定用户的第一识别标签。
需要说明的是,电子设备的每个用户均可删除后台应用,为了区分不同用户的删除的后台应用,删除路径列表存储模块可以将不同识别标签的用户删除的后台应用存储在不同的存储空间中。例如,当删除路径列表存储模块接收到的第一识别标签、删除的后台应用、删除的后台应用的恢复信息时,确定该第一识别标签对应机主,后台应用是机主删除的。则可以将第一识别标签、删除的后台应用、删除的后台应用的恢复信息存储在第一存储空间中机主对应的存储空间内。
而当删除路径列表存储模块接收到的第一识别标签、删除的后台应用、删除的后台应用的恢复信息时,确定该第一识别标签对应家庭成员A,后台应用是家庭成员A删除的。则可以将第一识别标签、删除的后台应用、删除的后台应用的恢复信息存储在第一存储空间中家庭成员A对应的存储空间内。
一些实施方式中,参考图4,在本实施例中,还包括延迟删除模块,延迟删除模块与虚拟删除模块类似,可以是系统服务层和框架层中的服务模块,用于对存储在第一存储空间中的删除的后台应用进行计时。每个删除的后台应用对应一个预设的时长。该预设的时长为后台应用的清理时长。当删除的后台应用在第一存储空间中的存储时长达到删除的后台应用对应的清理时长之后,延迟删除模块将清理删除的后台应用。即延迟删除模块将删除的后台应用以及对应的恢复信息从第一存储空间中删除。
S320、响应来自用户的恢复操作,获取用户的第一识别标签。
一些实施方式中,用户的恢复操作可以是一个独立的操作,也可以是多个操作的组合。
当恢复操作为独立的操作时,可以是电子设备接收到的语音控制指令、手势操作或者对物理按键的操作等。例如,参考图4,当电子设备的麦克风接收到语音指令“恢复后台应用”时,可以通过用户认证模块,根据接收到的语音指令的声纹特征获取对应用户的第一识别标签。其中,用户认证模块可以是系统服务层和框架层中的服务模块,用于对发起恢复操作的用户进行识别。
或者,当电子设备的触控面板接收到用于指示恢复后台应用的手势操作时,也可以通过用户认证模块采集用户的指纹特征或面容特征,以识别用户的第一识别标签。
当恢复操作为多个操作的组合时,可以是对电子设备显示界面的多个控制操作的组合。例如,当电子设备接收到从底部屏幕边缘向上滑动的滑动操作后,电子设备的显示界面可以显示多个正在运行的后台应用。该界面中出了S310的示例中提及的内容,还可以包括用于指示恢复后台应用的恢复按钮。
然后,电子设备接收到点击用于指示恢复后台应用的恢复按钮的操作时,可以通过用户认证模块采集用户的声纹特征、指纹特征或面容特征,以对发起恢复操作的用户进行识别,获得用户的第一识别标签。
图5示出了本申请实施例提供的一种后台应用恢复方法的应用界面示意图。
参考图5,其中示出了多个正在运行的后台应用501以及恢复按钮502。当展示恢复按钮502的区域接收到点击操作时,则电子设备可以确定接收到恢复操作。电子设备可以通过指纹传感器、摄像头或者麦克风采集发起恢复操作的用户的生物特征,并根据用户的生物特征获取该用户的第一识别标签。
S330、根据用户的第一识别标签,从第一存储空间中获取用户删除的后台应用。
一些实施方式中,第一存储空间中可能存储有多个用户删除的后台应用,每个删除的后台应用均对应一个第一识别标签。这个情况下,可以只获取具有该用户的第一识别标签的删除的后台应用。例如,若第一存储空间中存储有机主删除的后台应用(具有机主的第一识别标签)以及家庭成员A删除的后台应用(具有家庭成员A的第一识别标签)。当用户的第一识别标签指示该用户为机主时,则根据机主对应的第一识别标签,获取所有机主删除的后台应用。
S340、响应来自用户的操作,从用户删除的后台应用中确定并恢复至少一个后台应用。
图6示出了本申请实施例提供的另一种后台应用恢复方法的应用界面示意图,图7示出了本申请实施例提供的另一种后台应用恢复方法的应用界面示意图。
一些实施方式中,在从第一存储空间中获取用户删除的后台应用之后,可以在界面中显示用户删除的后台应用的应用名称和图标。参考图6,其中,机主为用户1。在图6中,按照删除的时间顺序显示了机主删除的4个后台应用的名称“应用名称5”、“应用名称6”、“应用名称7”和“应用名称8”。同时,展示了4个恢复选项“选择恢复”、“逐条恢复”、“全部恢复”和“取消恢复”。
这个情况下,用户的操作可以是选择操作。作为示例,选择操作可以是作用于展示“选择恢复”、“逐条恢复”或“全部恢复”区域的点击操作。
例如,当用户的选择操作为作用于展示“选择恢复”区域的点击操作时,参照图7,可以通过高亮“选择恢复”区域提示用户进入了选择恢复的界面。同时,可以通过接收用户作用于“应用名称5”、“应用名称6”、“应用名称7”和“应用名称8”展示区域的点击操作,将选择的应用名称高亮显示,以确定用户需要恢复的后台应用。图7中以选择“应用名称5”和“应用名称7”为例,当确定用户选择了需要恢复的后台应用是,可以展示“确认恢复”按钮,以提示用户再次确认是否进行后台应用恢复。当展示“确认恢复”的区域接收到点击操作后,则确认用户需要恢复“应用名称5”和“应用名称7”对应的后台应用。
然后,参考图4,恢复模块从第一存储空间中,获取“应用名称5”和“应用名称7”的对应的后台应用的恢复信息,并根据“应用名称5”和“应用名称7”的恢复信息,将“应用名称5”和“应用名称7”对应的应用程序添加后台应用列表中,然后从第一存储空间中移除“应用名称5”和“应用名称7”对应的数据。
一些实施方式中,继续参考图6,当用户的选择操作为作用于展示“逐条恢复”区域的点击操作时,每当点击一下,可恢复一个删除时间与当前时间最接近的删除的后台应用。例如,若当前时间为18:00分,应用程序5为17:00分删除,应用程序6为17:12分删除,应用程序7为17:31分删除,应用程序8为17:58分删除。则当展示“逐条恢复”区域的接收到点击操作时,将应用程序8对应的后台应用恢复;当展示“逐条恢复”区域的再次接收到点击操作时,将应用程序7对应的后台应用恢复,其恢复的方
式与上述示例类似,在此不做赘述。以此类推,直至所有删除的后台应用全部恢复,或者接收到终止恢复的操作(例如展示“取消恢复”区域的接收到点击操作)为止。
还有一些实施方式中,继续参考图6,当用户的选择操作为作用于展示“全部恢复”区域的点击操作时,则将“应用名称5”、“应用名称6”、“应用名称7”和“应用名称8”对应的后台应用全部恢复,其恢复的方式与上述示例类似,在此不做赘述。
图8示出了本申请实施例提供的另一种后台应用恢复方法的应用界面示意图。
参考图8,其中,家庭成员A为用户2。在图8中,按照删除的时间顺序显示了家庭成员A删除的2个后台应用的名称“应用名称9”、“应用名称10”。以及4个恢复选项“选择恢复”、“逐条恢复”、“全部恢复”和“取消恢复”。用户2恢复后台应用的方式与用户1类似,在此亦不做赘述。
在本申请中,通过在用户发起恢复操作时获取该用户的第一识别标识,并根据用户的第一识别标识获取该用户删除的后台应用。可以防止其他用户恢复非本人删除的后台应用,防止其他用户通过恢复删除的后台应用获取隐私数据,可以更好的保护每个用户的隐私。
图9示出了本申请实施例提供的另一种后台应用恢复方法的系统结构示意图。
一些实施方式中,参考图9,本申请还提供了用户习惯学习模块,用户习惯学习模块也是系统服务层和框架层中的服务模块,用于根据用户的恢复习惯修改延迟删除模块中的每个后台应用预设的时长(即清理时长),以学习用户恢复后台应用的习惯,提供更加个性化的服务。
图10示出了本申请实施例提供的另一种后台应用恢复方法的示意性流程图。
参考图10,学习用户恢复后台应用的习惯,包括:
S350、获取每个后台应用的恢复数据,恢复数据包括后台应用的恢复次数和恢复时间间隔。
其中,不同的用户删除相同的后台应用时,该后台应用的清理时长可能不相同。后台应用的恢复次数需要根据不同用户进行统计,例如,在一周内,用户1(机主)恢复了应用程序1的次数为20次(恢复次数),且通常在删除应用程序1后的10分钟内(恢复时间间隔)进行恢复。用户2恢复了应用程序1的次数为5次,且通常在删除应用程序1后的30分钟内进行恢复。
S360、根据每个后台应用的恢复数据调整每个后台应用的清理时长。
一些实施方式中,每个后台应用对于不同用户的重要性均不相同,因此获取每个后台应用的恢复数据时,需要根据用户的第一识别标识进行区分。
例如,对于上述示例的用户1,在一周内恢复应用程序1的次数最多,且恢复的时间间隔最短,则可以根据应用程序1的恢复数据确认应用程序1对于用户1的重要性提升,即可以延长用户1删除应用程序1后的清理时长。例如,用户1删除应用程序1后的清理时长为15分钟,根据应用程序1对于用户1的重要性变化,可以将清理时长调整为30分钟。
对于上述示例的用户2,在一周内恢复应用程序1的次数最少多,且恢复的时间间隔最长,则可以根据应用程序1的恢复数据确认应用程序1对于用户2的重要性降低,即可以缩短用户2删除应用程序1后的清理时长。例如,用户2删除应用程序1
后的清理时长为15分钟,根据应用程序1对于用户2的重要性变化,可以将清理时长调整为10分钟。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后。各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
对应于上文实施例提供的应用于电子设备的后台应用恢复方法,图11示出了本申请实施例提供的一种应用于电子设备的测距装置的结构框图,为了便于说明,仅示出了与本申请实施例相关的部分。
参照图11,后台应用恢复装置,包括:
获取模块61,用于响应来自用户的恢复操作,获取用户的第一识别标签。
获取模块61,还用于根据用户的第一识别标签,获取并展示用户删除的后台应用。
恢复模块62,用于响应来自用户的操作,从展示的后台应用中选择并恢复至少一个后台应用。
一些实施方式中,该装置还包括删除模块63,用于响应来自用户的删除操作,删除至少一个后台应用并将删除的后台应用存入第一存储空间。
一些实施方式中,删除模块63,具体用于将删除的后台应用从后台应用列表中移除,后台应用列表中包括至少一个正在运行的后台应用。将删除的后台应用、删除的后台应用的恢复信息以及用户的第一识别标签进行绑定,保存在第一存储空间中。
一些实施方式中,删除模块63,还用于当删除的后台应用在第一存储空间中的存储时长达到预设时长后,从第一存储空间中清理删除的后台应用。
一些实施方式中,预设时长是根据用户恢复删除的后台应用的恢复次数和恢复时间间隔确定的。
一些实施方式中,获取模块61,具体用于根据用户的第一识别标签,在第一存储空间中获取包括用户的第一识别标签的删除的后台应用。展示每个删除的后台应用的应用标识。
一些实施方式中,恢复模块62,具体用于在第一存储空间中获取删除的后台应用的恢复信息,删除的后台应用是根据用户的操作确定的。根据获取的删除的后台应用的恢复信息,将删除的后台应用添加至后台应用列表中。从第一存储空间中移除删除的后台应用。
需要说明的是,上述模块之间的信息交互、执行过程等内容,由于与本申请方法实施例基于同一构思,其具体功能及带来的技术效果,具体可参见方法实施例部分,此处不再赘述。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于
限制本申请的保护范围。上述系统中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
图12为本申请实施例提供的一种电子设备的结构框图。如图12所示,该实施例的电子设备7包括:
至少一个处理器701(图12中仅示出一个)处理器、存储器702以及存储在存储器702中并可在至少一个处理器701上运行的计算机程序703,处理器701执行计算机程序703时实现上述控制方法实施例中的步骤。
电子设备7可以是手机、平板电脑、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、大屏设备、笔记本电脑、上网本、个人数字助理(personal digital assistant,PDA)等。本领域技术人员可以理解,图12仅仅是电子设备7的举例,并不构成对电子设备7的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如还可以包括输入输出设备、网络接入设备等。
所称处理器701可以是中央处理单元(Central Processing Unit,CPU),该处理器701还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、SOC、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
存储器702在一些实施例中可以是电子设备7的内部存储单元,例如电子设备7的硬盘或内存。存储器702在另一些实施例中也可以是电子设备7的外部存储设备,例如电子设备7上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。
进一步地,存储器702还可以既包括电子设备7的内部存储单元也包括外部存储设备。存储器702用于存储操作系统、应用程序、引导装载程序(BootLoader)、数据以及其他程序等,例如计算机程序的程序代码等。存储器702还可以用于暂时地存储已经输出或者将要输出的数据。
本申请实施例提供了一种计算机可读存储介质,计算机可读存储介质存储有计算机程序。计算机程序被处理器执行时实现应用于电子设备的方法。
本申请实施例提供了一种计算机程序产品,当计算机程序产品在电子设备上运行时,使得终端设备执行上述应用于电子设备的方法。
本申请实施例提供了一种芯片系统,芯片系统包括存储器和处理器,处理器执行存储器中存储的计算机程序,以实现应用于电子设备的方法。
本申请实施例提供了一种芯片系统,芯片系统包括处理器,处理器与第八方面提供的计算机可读存储介质耦合,处理器执行计算机可读存储介质中存储的计算机程序,以实现应用于电子设备的方法。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,
可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质至少可以包括:能够将计算机程序代码携带到电子设备或第二设备的任何实体或装置、记录介质、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质。例如U盘、移动硬盘、磁碟或者光盘等。在某些司法管辖区,根据立法和专利实践,计算机可读介质不可以是电载波信号和电信信号。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
在本申请所提供的实施例中,应该理解到,所揭露的方法、装置、电子设备或第二设备,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,装置或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
最后应说明的是:以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (10)
- 一种后台应用恢复方法,应用于电子设备,其特征在于,包括:响应来自用户的恢复操作,获取所述用户的第一识别标签;根据所述用户的第一识别标签,从第一存储空间中获取所述用户删除的后台应用;响应来自所述用户的操作,从所述用户删除的后台应用中确定并恢复至少一个所述后台应用。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:响应来自所述用户的删除操作,删除至少一个后台应用并将删除的所述后台应用存入所述第一存储空间。
- 根据权利要求2所述的方法,其特征在于,所述删除至少一个后台应用并将删除的所述后台应用存入所述第一存储空间,包括:将删除的后台应用从后台应用列表中移除,所述后台应用列表中包括至少一个正在运行的后台应用;将所述删除的后台应用、所述删除的后台应用的恢复信息以及所述用户的第一识别标签进行绑定,保存在所述第一存储空间中。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:当所述删除的后台应用在所述第一存储空间中的存储时长达到预设时长后,从所述第一存储空间中清理所述删除的后台应用。
- 根据权利要求4所述的方法,其特征在于,所述预设时长是根据所述用户恢复所述删除的后台应用的恢复次数和恢复时间间隔确定的。
- 根据权利要求2-5任一项所述的方法,其特征在于,根据所述用户的第一识别标签,从第一存储空间中获取所述用户删除的后台应用,包括:根据所述用户的第一识别标签,在所述第一存储空间中获取包括所述用户的第一识别标签的所述删除的后台应用;展示每个所述删除的后台应用的应用标识。
- 根据权利要求6所述的方法,其特征在于,响应来自所述用户的操作,从所述后台应用中确定并恢复至少一个所述后台应用,包括:在所述第一存储空间中获取所述删除的后台应用的恢复信息,所述删除的后台应用是根据所述用户的操作确定的;根据获取的所述删除的后台应用的恢复信息,将所述删除的后台应用添加至所述后台应用列表中;从所述第一存储空间中移除所述删除的后台应用。
- 一种后台应用恢复装置,应用于电子设备,其特征在于,包括:获取模块,用于响应来自用户的恢复操作,获取所述用户的第一识别标签;所述获取模块,还用于根据所述用户的第一识别标签,获取并展示所述用户删除的后台应用;恢复模块,用于响应来自所述用户的操作,从展示的所述后台应用中选择并恢复至少一个所述后台应用。
- 一种电子设备,包括存储器、处理器以及存储在所述存储器中并可在所述处 理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求1至7任一项所述的方法。
- 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至7任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210353006.1A CN116932277A (zh) | 2022-03-31 | 2022-03-31 | 后台应用恢复方法、装置、电子设备及可读存储介质 |
CN202210353006.1 | 2022-03-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023185623A1 true WO2023185623A1 (zh) | 2023-10-05 |
Family
ID=88199227
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/083372 WO2023185623A1 (zh) | 2022-03-31 | 2023-03-23 | 后台应用恢复方法、装置、电子设备及可读存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116932277A (zh) |
WO (1) | WO2023185623A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105677548A (zh) * | 2015-12-28 | 2016-06-15 | 小米科技有限责任公司 | 应用管理方法、装置及终端 |
CN106648962A (zh) * | 2016-10-10 | 2017-05-10 | 广东欧珀移动通信有限公司 | 一种多开应用的管理方法、装置及智能终端 |
CN108268291A (zh) * | 2018-01-08 | 2018-07-10 | 平安科技(深圳)有限公司 | 一种应用程序删除方法及终端设备 |
CN113608753A (zh) * | 2021-07-13 | 2021-11-05 | 荣耀终端有限公司 | 应用卸载方法、应用恢复方法、电子设备以及存储介质 |
WO2022057525A1 (zh) * | 2020-09-15 | 2022-03-24 | 腾讯科技(深圳)有限公司 | 一种数据找回方法、装置、电子设备及存储介质 |
-
2022
- 2022-03-31 CN CN202210353006.1A patent/CN116932277A/zh active Pending
-
2023
- 2023-03-23 WO PCT/CN2023/083372 patent/WO2023185623A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105677548A (zh) * | 2015-12-28 | 2016-06-15 | 小米科技有限责任公司 | 应用管理方法、装置及终端 |
CN106648962A (zh) * | 2016-10-10 | 2017-05-10 | 广东欧珀移动通信有限公司 | 一种多开应用的管理方法、装置及智能终端 |
CN108268291A (zh) * | 2018-01-08 | 2018-07-10 | 平安科技(深圳)有限公司 | 一种应用程序删除方法及终端设备 |
WO2022057525A1 (zh) * | 2020-09-15 | 2022-03-24 | 腾讯科技(深圳)有限公司 | 一种数据找回方法、装置、电子设备及存储介质 |
CN113608753A (zh) * | 2021-07-13 | 2021-11-05 | 荣耀终端有限公司 | 应用卸载方法、应用恢复方法、电子设备以及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN116932277A (zh) | 2023-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020259452A1 (zh) | 一种移动终端的全屏显示方法及设备 | |
WO2021017889A1 (zh) | 一种应用于电子设备的视频通话的显示方法及相关装置 | |
WO2021213164A1 (zh) | 应用界面交互方法、电子设备和计算机可读存储介质 | |
WO2021036585A1 (zh) | 一种柔性屏显示方法和电子设备 | |
US20210149578A1 (en) | Data Restoration Method Used When Terminal Is Restored to Factory Settings, and Terminal | |
CN112492193B (zh) | 一种回调流的处理方法及设备 | |
WO2020221060A1 (zh) | 一种卡片处理方法及设备 | |
WO2021052139A1 (zh) | 手势输入方法及电子设备 | |
WO2020088633A1 (zh) | 支付方法、装置和用户设备 | |
WO2021218429A1 (zh) | 应用窗口的管理方法、终端设备及计算机可读存储介质 | |
WO2021258814A1 (zh) | 视频合成方法、装置、电子设备及存储介质 | |
WO2020107463A1 (zh) | 一种电子设备的控制方法及电子设备 | |
WO2021238370A1 (zh) | 显示控制方法、电子设备和计算机可读存储介质 | |
CN110687998A (zh) | 一种应用管理方法及装置 | |
WO2020118490A1 (zh) | 自动分屏的方法、图形用户界面及电子设备 | |
WO2022001258A1 (zh) | 多屏显示方法、装置、终端设备及存储介质 | |
WO2023241209A1 (zh) | 桌面壁纸配置方法、装置、电子设备及可读存储介质 | |
WO2023273543A1 (zh) | 一种文件夹管理方法及装置 | |
CN114528581A (zh) | 一种安全显示方法及电子设备 | |
WO2022037725A1 (zh) | 一种系统服务恢复方法、装置和电子设备 | |
WO2021042878A1 (zh) | 一种拍摄方法及电子设备 | |
WO2023051094A1 (zh) | 内存回收方法、装置、电子设备及可读存储介质 | |
WO2023029916A1 (zh) | 批注展示方法、装置、终端设备及可读存储介质 | |
WO2023185623A1 (zh) | 后台应用恢复方法、装置、电子设备及可读存储介质 | |
CN115185441A (zh) | 控制方法、装置、电子设备及可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23777993 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023777993 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2023777993 Country of ref document: EP Effective date: 20240913 |