[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109815676B - Privacy space operation method and terminal equipment - Google Patents

Privacy space operation method and terminal equipment Download PDF

Info

Publication number
CN109815676B
CN109815676B CN201910085304.5A CN201910085304A CN109815676B CN 109815676 B CN109815676 B CN 109815676B CN 201910085304 A CN201910085304 A CN 201910085304A CN 109815676 B CN109815676 B CN 109815676B
Authority
CN
China
Prior art keywords
input
target
screen
application
privacy space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910085304.5A
Other languages
Chinese (zh)
Other versions
CN109815676A (en
Inventor
游星金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910085304.5A priority Critical patent/CN109815676B/en
Publication of CN109815676A publication Critical patent/CN109815676A/en
Priority to PCT/CN2020/073806 priority patent/WO2020156441A1/en
Application granted granted Critical
Publication of CN109815676B publication Critical patent/CN109815676B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a privacy space operation method and terminal equipment. The method is applied to the terminal equipment with the folding screen, the folding screen comprises a first screen and a second screen, and the method comprises the following steps: receiving a first input of a first program icon of a first application program when the folding screen is in an unfolded state; displaying a first program icon at a target position of the target screen in response to the first input; in response to a second input, initiating a target privacy space, the target privacy space comprising: the privacy space of the first application program and/or the privacy space of the second application program, wherein the second input is a first bending input to the folding screen and a preset input to the terminal device. According to the invention, the operation of the application program is linked with the switch of the privacy space, and the folding characteristic of the folding screen is combined, so that the privacy space can be opened through simple and flexible operation, and the time for opening the privacy space by a user is saved.

Description

Privacy space operation method and terminal equipment
Technical Field
The embodiment of the invention relates to the technical field of communication application, in particular to a privacy space operation method and terminal equipment.
Background
With the rapid development of internet communication technology, intelligent terminals are becoming popular. Intelligent terminals (such as mobile phones) have become indispensable electronic products in people's lives. The consequent information security is also a problem of general user concern.
At present, generally, in order to protect the personal privacy security of a user, privacy spaces, such as a photo privacy space, a video privacy space, a memo privacy space, and the like, may be set to store private files of the user, however, the privacy spaces are set by passwords or fingerprints, and if a user wants to enter the privacy spaces, the user must input passwords or input fingerprint information, which is a rigid operation, and is not flexible enough and wastes the time for the user to open the privacy spaces.
Disclosure of Invention
The embodiment of the invention provides a privacy space operation method and terminal equipment, and aims to solve the problems that the operation of the existing privacy space is rigid, the operation is not flexible enough, and the time for opening the privacy space by a user is wasted.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a privacy space operating method, applied to a terminal device having a foldable screen, where the foldable screen includes a first screen and a second screen, and includes:
receiving a first input of a first program icon of a first application program when the folding screen is in an unfolded state;
displaying the first program icon at a target position of a target screen in response to the first input;
in response to a second input, initiating a target privacy space, the target privacy space comprising: a privacy space of the first application and/or a privacy space of a second application;
wherein the target screen comprises the first screen and/or the second screen; the second input is a first bending input of the folding screen and a preset input of the terminal device, and a preset incidence relation exists between the second application program and the first application program.
In a second aspect, an embodiment of the present invention further provides a terminal device, where the terminal device has a foldable screen, and the foldable screen includes a first screen and a second screen, and includes:
the first receiving module is used for receiving first input of a first program icon of a first application program when the folding screen is in an unfolded state;
the first display module is used for responding to the first input and displaying the first program icon at the target position of the target screen;
a first processing module for a second input to initiate a target privacy space, the target privacy space comprising: a privacy space of the first application and/or a privacy space of a second application;
wherein the target screen comprises the first screen and/or the second screen; the second input is a first bending input of the folding screen and a preset input of the terminal device, and a preset incidence relation exists between the second application program and the first application program.
In a third aspect, an embodiment of the present invention further provides a terminal device, which includes a processor, a memory, and a computer program stored on the memory and executable on the processor, where the computer program, when executed by the processor, implements the steps of the private space operation method described above.
In a fourth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the privacy space operation method as described above.
In the above scheme of the embodiment of the present invention, a first input to a first program icon of a first application program is received when a folding screen is in an unfolded state; in response to the first input, displaying the first program icon at a target position of a target screen; in response to a second input, initiating a target privacy space, the target privacy space comprising: the method comprises the steps of obtaining a privacy space of a first application program and/or a privacy space of a second application program, wherein a target screen comprises a first screen and/or a second screen; the second input is the first input of buckling to the folding screen and the input of predetermineeing to terminal equipment, has between second application and the first application and predetermines the incidence relation, so, through will be in the same place the operation of application and the switch in privacy space to combine the collapsible characteristic of folding screen, can be through not only simply but also nimble operation, alright open the privacy space, save the time that the user opened the privacy space.
Drawings
Fig. 1 is a schematic flowchart of a method for operating a privacy space according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of a privacy space operation method according to an embodiment of the present invention. The implementation of the method is described in detail below with reference to this figure.
It should be noted that the method is applied to a terminal device having a folding screen, where the folding screen includes a first screen and a second screen.
Here, the folding screen may divide the screen into the first screen and the second screen by an actual physical device, such as a hinge, thereby achieving contact or separation between the first screen and the second screen. The folding screen is a flexible screen, and can be divided into a first screen and a second screen according to the bending position of the screen through bending operation of a user; or the folding screen is divided into a first screen and a second screen by adopting default settings of the system.
The method may specifically comprise the steps of:
step 101, receiving a first input of a first program icon of a first application program when the folding screen is in an unfolded state.
In this step, whether the folding screen is in the expansion state can be judged by detecting an included angle between the first screen and the second screen of the folding screen.
Specifically, when it is detected that an included angle between the first screen and the second screen is larger than a preset threshold value, for example, 90 degrees, it is determined that the folding screen is in the unfolded state. Here, the preset threshold may be set by itself or may be set by default.
Here, the first application includes one or more applications.
It should be noted that the first input is a preset input, and the first input may include, but is not limited to, at least one of a click input, a press input, a long press input, a pinch input, a drag input, a slide input, and a swipe input, that is, the first input may be one of the above-mentioned inputs, or may also be a combination input of two or more of the above-mentioned inputs.
And 102, responding to the first input, and displaying the first program icon at the target position of the target screen.
Here, the target screen includes the first screen and/or the second screen.
In this step, when the terminal device detects that the program icon of the first application program is located at the target position according to the first input, the terminal device responds to the first input received in step 101, and displays the first program icon at the target position of the target screen.
Here, the target screen is a screen preset by the user, and the target position is also a position preset by the user. That is, the user can set in advance at which position of which screen the program icon of the application is displayed. In other words, the screen on which the program icon of the application program preset by the user is displayed and the corresponding specific position can be regarded as the password of the privacy space, while the screens on which the program icons of the application programs correspondingly set by different users are located are different, and the specific positions of the screens are different, so that other people except the user or the person informed of the password cannot open the privacy space of the user, and the security of the privacy of the user is improved.
Step 103, responding to the second input, starting a target privacy space, wherein the target privacy space comprises: the privacy space of the first application and/or the privacy space of the second application.
Here, the second input is a first bending input to the folding screen and a preset input to the terminal device, and the second application program and the first application program have a preset association relationship.
In this step, the first bending input is a preset input. The folding input specifically refers to a folding or unfolding input to the folding screen.
Specifically, whether the input of the user to the folding screen is the first bending input or not can be determined by detecting the bending state of the folding screen; and responding to the first bending input of the folding screen if the input of the user to the folding screen is determined to be the first bending input through the bending state of the folding screen.
More specifically, the detection of the bending state of the folding screen can be realized by detecting an included angle between the first screen and the second screen of the folding screen.
Here, the preset input to the terminal device may include, but is not limited to, a blocking input to a camera on the terminal device, a preset operation to a folding screen of the terminal device (e.g., a three-finger sliding input, a double-click input, a three-click input, etc.), a flip operation to the terminal device, and the like.
It should be noted that, if the first application includes only one application, the privacy space of the first application may be opened, or the privacy space of a second application having a preset association relationship with the first application may be opened. Of course, the privacy space of the first application and the privacy space of the second application having a pre-established relationship with the first application may also be opened at the same time.
If the first application includes at least two applications, at least one of the privacy spaces of one of the at least two applications or a specified number of the applications (specifically, which is preset by the user) may be opened, the privacy spaces of all of the at least two applications may be opened, and the privacy space of a second application having a pre-established relationship with the at least two applications may be opened.
In addition, in response to the input, if the privacy space of the second application program associated with the first application program is opened, the specific positions of screens where program icons of the application programs correspondingly set by different users are located are different, and the association relationship (namely the preset association relationship) between the first application program and the privacy space of the second application program, which is preset by different users, is different, so that the security of the user privacy is further improved.
In the embodiment of the invention, a first input of a first program icon of a first application program is received when a folding screen is in an unfolding state; in response to the first input, displaying the first program icon at a target position of a target screen; in response to a second input, initiating a target privacy space, the target privacy space comprising: the method comprises the steps of obtaining a privacy space of a first application program and/or a privacy space of a second application program, wherein a target screen comprises a first screen and/or a second screen; the second input is the first input of buckling to the folding screen and the input of predetermineeing to terminal equipment, has between second application and the first application and predetermines the incidence relation, so, through will be in the same place the operation of application and the switch in privacy space to combine the collapsible characteristic of folding screen, can be through not only simply but also nimble operation, alright open the privacy space, save the time that the user opened the privacy space.
Based on the embodiment shown in fig. 1, as an optional implementation manner, step 101 may specifically include:
a first input is received for a program icon for at least one application.
Here, at least one application may be one application or at least two applications.
In the case where the at least one application is two or more applications, the first input may include: input of a program icon for each application. The first input may be a plurality of inputs of the sub-program icon in time sequence, or may be one input of the program icon at the same time.
Optionally, the first input is a slide input or a drag input.
Accordingly, step 102 may specifically include:
acquiring an input track of the first input;
determining the screen where the end point position of the input track of the first input is located as a target screen;
and displaying a program icon of each application program in the at least one application program at the end position of the input track of the first input.
Here, when there is a plurality of at least one application program, the end point position of the input trajectory of the first input corresponding to different application programs is different, and the program icons of different application programs are displayed at different end point positions.
In other words, at the end position of the input track of the first input, the program icons of the respective application programs in the at least one application program are correspondingly displayed.
In this embodiment, the first application includes one or more applications. And with the increase of the number of the application programs, the difficulty of opening the privacy space by other people except the user or people informed of the password is increased, and the security of the privacy of the user can be further improved.
Preferably, the at least one application program includes: the system comprises a third application program and a fourth application program, wherein the fourth application program is an application sub-body of the third application program.
Of course, the third application and the fourth application may be different applications.
Based on the embodiment shown in fig. 1, as an optional implementation manner, step 103 may specifically include the following steps:
and responding to the first bending input of the folding screen and the shielding input of a front camera of the terminal equipment, and starting a target privacy space.
In the step, if the folding screen is in the unfolding state before the user knows, whether the input of the user to the folding screen is the first folding input or not can be determined by detecting the folding state of the folding screen; and if so, responding to a first bending input to the folding screen.
The first bending input is a first preset bending input. Optionally, the first folding input is a fold-before-unfold input to the folding screen.
Here, whether the front camera has a shielding input, that is, whether the front camera is shielded or not, may be determined by a brightness sensor provided in the front camera when it is monitored that the current ambient brightness changes suddenly.
In this embodiment, combine the foldable characteristic of folding screen, can be through not only simple but also nimble operation, alright open the privacy space, save the time that the user opened the privacy space.
Based on the embodiment shown in fig. 1, as another optional implementation manner, the starting of the target privacy space in step 103 may specifically include the following steps:
displaying information stored within a privacy space of at least one of the first application and the second application.
In the implementation mode, the information stored in the privacy space is displayed in a direct display mode, and the information stored in the privacy space can be visually presented to a user.
Based on the embodiment shown in fig. 1, as a further optional implementation manner, the starting of the target privacy space in step 103 may specifically include the following steps:
displaying a functional portal into a privacy space of a target application, the target application comprising at least one of the first application and the second application;
receiving a third input to the function portal;
here, preferably, the third input is a click input to the function portal.
In response to the third input, displaying information stored within a privacy space of the target application.
In the implementation mode, the function entrance corresponding to the privacy space can be called out, the information stored in the privacy space is entered and displayed in the privacy space in a mode of user operation on the function entrance, when more than one privacy space is opened at one time, the user can select the privacy space conveniently, or when the third input on the function entrance is input for the personality set by the user, the mode of opening the privacy space can achieve the effect of further protecting the privacy of the user.
The above two alternative implementations for step 103 can be implemented individually or in combination with each other. And is not particularly limited herein.
After the privacy space of the application program is opened, in order to prompt the user that the current privacy space is in an open state and facilitate the user to close the privacy space in time, as an optional implementation manner based on the embodiment shown in fig. 1, after step 103, the method may further include:
displaying first identification information used for representing that the privacy space of the first application program is opened at a first preset position of a first program icon of the first application program; and/or the presence of a gas in the gas,
and displaying second identification information for indicating that the privacy space of the second application program is opened at a second preset position of a second program icon of the second application program.
Here, the first identification information and the second identification information may be a text identification or a graphic identification, for example, an "open" character is identified at a preset position of the program icon, or a graphic identification of an opened lock is identified at a preset position of the program icon. And is not particularly limited herein.
The following describes an implementation process of the method of the present invention with reference to an example, in a scenario where two application programs are application-independent from each other.
It should be noted that, first, two preconditions are set, program icons can be placed on both the first screen and the second screen of the folding screen, the layout modes on the two screens are the same, and each application can implement application separation, that is, one application can be copied into two applications, for example, the social application K1 and the social application K2 after separation.
And then, the folding screen is in an unfolded state through user operation.
Then, receiving a long-time pressing operation on the photo album application, and displaying the photo album application 1 and the photo album application 2 on the folding screen; and respectively receiving a first dragging input to the program icon of the album application 1 and a second dragging input to the album application 2, displaying the program icon of the album application 1 at a first position of the first screen in response to the first dragging input, and displaying the program icon of the album application 2 at a second position of the second screen in response to the second dragging input, wherein the first position and the second position are two symmetrical positions.
Then, receiving the bending input of the user to the folding screen, namely, the folding and re-unfolding operation, namely, detecting that the state of the folding screen is changed from the unfolding state to the folding state, and then changing the state of the folding screen to the unfolding state again; and responding to the bending input and the shielding input of the user to the front camera of the terminal equipment, and opening the privacy space of the photo album application.
And finally, after the privacy space of the photo album application is opened, displaying an unlocking icon on the upper right corner of the program icon of the photo album application on the desktop, namely, indicating that the privacy space of the photo album application is already opened.
In another example, an implementation of the method of the present invention is specifically described in connection with two different applications.
It should be noted that, first, a privacy space key setting interface is entered, two different applications, such as application 3 and application 4, are selected, a privacy space of another application different from the two different applications, such as a photo privacy space, a memo privacy space, an address book privacy space, and the like, is selected, and the two different selected applications are associated with the selected privacy space. In addition, the positions of the two different applications when triggering to open the privacy space need to be set, for example, the three positions and the fourth positions of the two screens of the folding screen are respectively set, wherein the third position and the fourth position are two symmetrical positions, and a preset bending input when triggering to open the privacy space is also provided.
Then, when the user wants to open the privacy spaces associated with the applications 3 and 4, respectively receiving a third drag input to the program icon of the application 3 and a fourth drag input to the program icon of the application 4, displaying the program icon of the application 3 at a third position on the first screen in response to the third drag input, and displaying the program icon of the application 4 at a fourth position on the second screen in response to the fourth drag input;
then, receiving the bending input of the user to the folding screen, namely, the folding and re-unfolding operation, namely, detecting that the state of the folding screen is changed from the unfolding state to the folding state, and then changing the state of the folding screen to the unfolding state again; in response to the bending input and the user's occlusion input to the front facing camera of the terminal device, a privacy space associated with the applications 3 and 4 is opened.
Finally, after the privacy spaces associated with application 3 and application 4 are opened, an unlocked icon is displayed in the upper right corner of the program icon of the application program corresponding to the privacy space on the desktop, i.e., an icon indicating that the privacy space has been opened.
According to the privacy space operation method provided by the embodiment of the invention, the first input of the first program icon of the first application program is received when the folding screen is in the unfolding state; in response to the first input, displaying the first program icon at a target position of a target screen; in response to a second input, initiating a target privacy space, the target privacy space comprising: the method comprises the steps of obtaining a privacy space of a first application program and/or a privacy space of a second application program, wherein a target screen comprises a first screen and/or a second screen; the second input is the first input of buckling to the folding screen and the input of predetermineeing to terminal equipment, has between second application and the first application and predetermines the incidence relation, so, through will be in the same place the operation of application and the switch in privacy space to combine the collapsible characteristic of folding screen, can be through not only simply but also nimble operation, alright open the privacy space, save the time that the user opened the privacy space.
Based on the embodiment shown in fig. 1, as an optional implementation manner, after step 103, the method further includes:
receiving a fourth input;
in this step, the fourth input is a second bending input to the folding screen or an input to the first program icon of the first application program.
In response to the fourth input, closing the target privacy space.
Here, through the simple operation to the folding screen, perhaps, through will be to application's operation and privacy space's switch in the same place, alright realize closing to privacy space, its mode of operation is simple and novel, makes things convenient for the closing of privacy space.
As an optional implementation manner, the fourth input is a second bending input to the folding screen; accordingly, in response to the fourth input, closing the target privacy space may specifically include: closing the target privacy space in response to the second inflection input.
Here, the second bending input is a second preset bending input. Optionally, the second bend input is a fold input to the folding screen.
It should be noted that, in this implementation, by using the foldable characteristic of the foldable screen, the privacy space can be closed by the second bending input, i.e., the folding input, and the operation mode is simple and novel, thereby facilitating the closing of the privacy space.
As another optional implementation, the fourth input is an input to a first program icon of the first application program; accordingly, in response to the fourth input, closing the target privacy space may specifically include:
acquiring an input track of the fourth input;
in this step, the fourth input is a preset input, and the fourth input may include, but is not limited to, at least one of a click input, a press input, a long press input, a pinch input, a drag input, a slide input, and a swipe input, that is, the fourth input may be one of the above-mentioned inputs, or may also be a combination input of two or more of the above-mentioned inputs.
Preferably, the fourth input is a slide input or a drag input.
And when the end position of the input track of the fourth input is any position except the start position of the input track of the fourth input, closing the target privacy space.
Here, when the end position of the input trajectory of the fourth input is any position other than the start position of the input trajectory of the fourth input, it indicates that the position of the corresponding program icon is changed when the target privacy space is opened by the fourth input before, and the description of the position change does not satisfy the condition for opening the privacy space, that is, the target privacy space can be closed.
In this implementation, the operation of the application program is linked to the switching of the privacy space, so that the privacy space can be closed.
In an optional embodiment, after closing the target privacy space, the method may further comprise: and displaying a display interface before starting the target privacy space.
Here, by displaying the display interface before the target privacy space is started, the user can be given a feeling of intuitively closing the privacy space.
In yet another optional embodiment, the closing the target privacy space may specifically include:
hiding a functional entry into the target privacy space.
In this embodiment, the closing operation of the privacy space can be realized by hiding the functional entry of the target privacy space, and the user can be intuitively felt to close.
As an optional implementation manner, after the target privacy space is closed, in order to prompt the user and facilitate the user to know the state of the current privacy space after the privacy space of the application program is closed, the method further includes:
displaying third identification information for indicating that the privacy space of the first application program is closed at a third preset position of a first program icon of the first application program; and/or the presence of a gas in the gas,
and displaying fourth identification information for indicating that the privacy space of the second application program is closed at a fourth preset position of a second program icon of the second application program.
Here, the third identification information and the fourth identification information may be text identifications or graphic identifications, for example, an "off" character is identified at a preset position of the program icon, or a graphic identification of a closed lock is identified at a preset position of the program icon. And is not particularly limited herein.
Continuing with the example in the embodiment shown in fig. 1 as an example, if the user wants to close the privacy space, the privacy space may be automatically closed by receiving a folding input of the folding screen from the user.
Or, when the folding screen is in the unfolded state, receiving a drag input for moving one of the two applications to a position other than the position where the application was when the privacy space was opened before, or receiving a drag input for moving the two applications to positions other than the positions where the application was opened before, respectively, and closing the privacy space in response to the drag input.
In addition, after the user opens the privacy space once, the user does not need to repeatedly perform authentication before closing the privacy space.
Finally, after the privacy space is closed, a locked icon is displayed at the upper right corner of the program icon of the application program corresponding to the privacy space on the desktop, namely, the locked icon represents that the privacy space is closed.
Based on the method, the embodiment of the invention provides the terminal equipment for realizing the method.
Fig. 2 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. An embodiment of the present invention provides a terminal device 200, where the terminal device has a foldable screen, where the foldable screen includes a first screen and a second screen, and the terminal device 200 may include:
a first receiving module 201, configured to receive a first input of a first program icon of a first application program when the folding screen is in an unfolded state;
a first display module 202, configured to display the first program icon at a target position of a target screen in response to the first input;
a first processing module 203, configured to start a target privacy space by using a second input, where the target privacy space includes: a privacy space of the first application and/or a privacy space of a second application;
wherein the target screen comprises the first screen and/or the second screen; the second input is a first bending input of the folding screen and a preset input of the terminal device, and a preset incidence relation exists between the second application program and the first application program.
Optionally, the first receiving module 201 may specifically include:
a first receiving unit for receiving a first input of a program icon of at least one application program;
the first display module 202 may specifically include:
a first acquisition unit configured to acquire an input trajectory of the first input;
the processing unit is used for determining a screen where the end point position of the input track of the first input is located as a target screen;
and the first display unit is used for displaying a program icon of each application program in the at least one application program at the end position of the input track of the first input.
Optionally, the at least one application includes: the system comprises a third application program and a fourth application program, wherein the fourth application program is an application sub-body of the third application program.
Optionally, the first processing module 203 may specifically include:
and the first processing unit is used for responding to the first bending input of the folding screen and the shielding input of a front camera of the terminal equipment and starting a target privacy space.
Optionally, the first processing module 203 may specifically include:
a second display unit configured to display information stored in a privacy space of at least one of the first application program and the second application program.
Optionally, the first processing module 203 may specifically include:
a third display unit, configured to display a function entry into a privacy space of a target application, where the target application includes at least one of the first application and the second application;
a second receiving unit for receiving a third input to the function portal;
and the fourth display unit is used for responding to the third input and displaying the information stored in the privacy space of the target application program.
Optionally, the terminal device 200 may further include:
a second receiving module for receiving a fourth input;
a second processing module to close the target privacy space in response to the fourth input;
and the fourth input is a second bending input of the folding screen or an input of a first program icon of the first application program.
Optionally, the fourth input is an input to a first program icon of the first application program;
correspondingly, the second processing module may specifically include:
a second obtaining unit, configured to obtain an input trajectory of the fourth input;
a second processing unit, configured to close the target privacy space when an end position of the fourth input track is any position except for a start position of the fourth input track.
Optionally, the terminal device 200 may further include:
and the second display module is used for displaying a display interface before the target privacy space is started after the target privacy space is closed.
Optionally, the second processing module may specifically include:
a third processing unit for hiding a functional entry into the target privacy space.
According to the terminal device provided by the embodiment of the invention, the first input of the first program icon of the first application program is received through the first receiving module when the folding screen is in the unfolding state; the first display module responds to the first input and displays the first program icon at a target position of a target screen; the first processing module initiates a target privacy space in response to a second input, the target privacy space comprising: a privacy space of the first application and/or a privacy space of a second application; wherein the target screen comprises the first screen and/or the second screen; the second input is a first bending input of the folding screen and a preset input of the terminal device, and a preset incidence relation exists between the second application program and the first application program, so that the operation of the application program is connected with the switch of the privacy space, and the folding characteristic of the folding screen is combined, so that the privacy space can be opened through simple and flexible operation, and the time for opening the privacy space by a user is saved.
Fig. 3 is a schematic diagram of a hardware structure of a terminal device for implementing various embodiments of the present invention.
The terminal device 300 includes but is not limited to: radio frequency unit 301, network module 302, audio output unit 303, input unit 304, sensor 305, display unit 306, user input unit 307, interface unit 308, memory 309, processor 310, and power supply 311. Those skilled in the art will appreciate that the terminal device configuration shown in fig. 3 does not constitute a limitation of the terminal device, and that the terminal device may include more or fewer components than shown, or combine certain components, or a different arrangement of components. In the embodiment of the present invention, the terminal device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal device, a wearable device, a pedometer, and the like.
The user input unit 307 is configured to receive a first input of a first program icon of a first application program when the folding screen is in the unfolded state; the display unit 306 is used for responding to the first input and displaying the first program icon at the target position of the target screen; the processor 310 is configured to initiate, in response to a second input, a target privacy space comprising: a privacy space of the first application and/or a privacy space of a second application; wherein the target screen comprises the first screen and/or the second screen; the second input is a first bending input of the folding screen and a preset input of the terminal device, and a preset incidence relation exists between the second application program and the first application program.
In the embodiment of the invention, the operation on the application program is connected with the switch of the privacy space, and the folding characteristic of the folding screen is combined, so that the privacy space can be opened or closed through simple, flexible and novel operation, and the time for opening the privacy space by a user is saved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 301 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 310; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 301 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 301 can also communicate with a network and other devices through a wireless communication system.
The terminal device provides the user with wireless broadband internet access through the network module 302, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 303 may convert audio data received by the radio frequency unit 301 or the network module 302 or stored in the memory 309 into an audio signal and output as sound. Also, the audio output unit 303 may also provide audio output related to a specific function performed by the terminal device 300 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 303 includes a speaker, a buzzer, a receiver, and the like.
The input unit 304 is used to receive audio or video signals. The input Unit 304 may include a Graphics Processing Unit (GPU) 3041 and a microphone 3042, and the Graphics processor 3041 processes image data of a still picture or video obtained by an image capturing apparatus (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 306. The image frames processed by the graphic processor 3041 may be stored in the memory 309 (or other storage medium) or transmitted via the radio frequency unit 301 or the network module 302. The microphone 3042 may receive sounds and may be capable of processing such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 301 in case of the phone call mode.
The terminal device 300 further comprises at least one sensor 305, such as light sensors, motion sensors and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 3061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 3061 and/or a backlight when the terminal device 300 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal device (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 305 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 306 is used to display information input by the user or information provided to the user. The Display unit 306 may include a Display panel 3061, and the Display panel 3061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 307 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal device. Specifically, the user input unit 307 includes a touch panel 3071 and other input devices 3072. The touch panel 3071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 3071 (e.g., operations by a user on or near the touch panel 3071 using a finger, a stylus, or any suitable object or attachment). The touch panel 3071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 310, and receives and executes commands sent by the processor 310. In addition, the touch panel 3071 may be implemented using various types, such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 307 may include other input devices 3072 in addition to the touch panel 3071. Specifically, the other input devices 3072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described herein.
Further, the touch panel 3071 may be overlaid on the display panel 3061, and when the touch panel 3071 detects a touch operation on or near the touch panel, the touch operation is transmitted to the processor 310 to determine the type of the touch event, and then the processor 310 provides a corresponding visual output on the display panel 3061 according to the type of the touch event. Although the touch panel 3071 and the display panel 3061 are shown as two separate components in fig. 3 to implement the input and output functions of the mobile terminal device, in some embodiments, the touch panel 3071 and the display panel 3061 may be integrated to implement the input and output functions of the mobile terminal device, which is not limited herein.
The interface unit 308 is an interface for connecting an external device to the terminal apparatus 300. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 308 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal apparatus 300 or may be used to transmit data between the terminal apparatus 300 and an external device.
The memory 309 may be used to store software programs as well as various data. The memory 309 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 309 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 310 is a control center of the mobile terminal device, connects various parts of the entire mobile terminal device using various interfaces and lines, and performs various functions of the mobile terminal device and processes data by running or executing software programs and/or modules stored in the memory 309 and calling data stored in the memory 309, thereby performing overall monitoring of the mobile terminal device. Processor 310 may include one or more processing units; preferably, the processor 310 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 310.
Terminal device 300 may also include a power supply 311 (e.g., a battery) for providing power to various components, and preferably, power supply 311 may be logically connected to processor 310 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
In addition, the terminal device 300 includes some functional modules that are not shown, and are not described in detail here.
Preferably, an embodiment of the present invention further provides a terminal device, which includes a processor 310, a memory 309, and a computer program stored in the memory 309 and capable of running on the processor 310, where the computer program, when executed by the processor 310, implements each process of the above-mentioned private space operation method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned privacy space operation method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (13)

1. A privacy space operation method is applied to a terminal device with a folding screen, wherein the folding screen comprises a first screen and a second screen, and the method is characterized by comprising the following steps:
receiving a first input of a first program icon of a first application program when the folding screen is in an unfolded state;
displaying the first program icon at a target position of a target screen in response to the first input;
in response to a second input, initiating a target privacy space, the target privacy space comprising: a privacy space of the first application and/or a privacy space of a second application;
wherein the target screen comprises the first screen and/or the second screen; the second input is a first bending input of the folding screen and a preset input of the terminal device, and a preset incidence relation exists between the second application program and the first application program.
2. The private space operating method of claim 1, wherein the receiving a first input of a first program icon for a first application comprises:
receiving a first input of a program icon of at least one application program;
the displaying, in response to the first input, the first program icon at a target location of a target screen includes:
acquiring an input track of the first input;
determining a screen where the end position of the input track of the first input is located as a target screen;
and displaying a program icon of each application program in the at least one application program at the end position of the input track of the first input.
3. The private space operating method of claim 2, wherein the at least one application program comprises: the system comprises a third application program and a fourth application program, wherein the fourth application program is an application sub-body of the third application program.
4. The privacy space operation method of claim 1, wherein initiating a target privacy space in response to a second input comprises:
and responding to the first bending input of the folding screen and the shielding input of a front camera of the terminal equipment, and starting a target privacy space.
5. The private space operation method according to claim 1, wherein the starting a target private space includes:
displaying information stored within a privacy space of at least one of the first application and the second application.
6. The private space operation method according to claim 1, wherein the starting a target private space includes:
displaying a functional portal into a privacy space of a target application, the target application comprising at least one of the first application and the second application;
receiving a third input to the function portal;
in response to the third input, displaying information stored within a privacy space of the target application.
7. The privacy space operation method of claim 1, further comprising, after initiating the target privacy space in response to a second input:
receiving a fourth input;
closing the target privacy space in response to the fourth input;
and the fourth input is a second bending input of the folding screen or an input of a first program icon of the first application program.
8. The private space operating method of claim 7, wherein the fourth input is an input to a first program icon of the first application;
the closing the target privacy space in response to a fourth input, comprising:
acquiring an input track of the fourth input;
and when the end position of the input track of the fourth input is any position except the start position of the input track of the fourth input, closing the target privacy space.
9. The private space operation method according to claim 7, further comprising, after closing the target private space:
and displaying a display interface before starting the target privacy space.
10. The private space operation method according to claim 7, wherein said closing the target private space includes:
hiding a functional entry into the target privacy space.
11. A terminal device having a folding screen including a first screen and a second screen, comprising:
the first receiving module is used for receiving first input of a first program icon of a first application program when the folding screen is in an unfolded state;
the first display module is used for responding to the first input and displaying the first program icon at the target position of the target screen;
a first processing module to initiate a target privacy space in response to a second input, the target privacy space comprising: a privacy space of the first application and/or a privacy space of a second application;
wherein the target screen comprises the first screen and/or the second screen; the second input is a first bending input of the folding screen and a preset input of the terminal device, and a preset incidence relation exists between the second application program and the first application program.
12. A terminal device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the private space operation method according to any one of claims 1 to 10.
13. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the privacy space operation method of one of claims 1 to 10.
CN201910085304.5A 2019-01-29 2019-01-29 Privacy space operation method and terminal equipment Active CN109815676B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910085304.5A CN109815676B (en) 2019-01-29 2019-01-29 Privacy space operation method and terminal equipment
PCT/CN2020/073806 WO2020156441A1 (en) 2019-01-29 2020-01-22 Privacy space operation method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910085304.5A CN109815676B (en) 2019-01-29 2019-01-29 Privacy space operation method and terminal equipment

Publications (2)

Publication Number Publication Date
CN109815676A CN109815676A (en) 2019-05-28
CN109815676B true CN109815676B (en) 2021-07-02

Family

ID=66605693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910085304.5A Active CN109815676B (en) 2019-01-29 2019-01-29 Privacy space operation method and terminal equipment

Country Status (2)

Country Link
CN (1) CN109815676B (en)
WO (1) WO2020156441A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815676B (en) * 2019-01-29 2021-07-02 维沃移动通信有限公司 Privacy space operation method and terminal equipment
CN110581921B (en) * 2019-07-22 2020-12-15 珠海格力电器股份有限公司 Control method and device for folding screen equipment
CN112905098B (en) * 2021-03-26 2022-08-12 珠海格力电器股份有限公司 Content display method, device, equipment and storage medium
CN115906145A (en) * 2021-09-22 2023-04-04 华为技术有限公司 Equipment control method and related device
CN114741727A (en) * 2022-04-20 2022-07-12 维沃移动通信有限公司 Data sending method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008345A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Method and device for protecting user privacy data of application program
CN107943374A (en) * 2017-12-14 2018-04-20 维沃移动通信有限公司 The startup method and collapsible terminal of application program in collapsible terminal
CN108334755A (en) * 2018-03-30 2018-07-27 广东欧珀移动通信有限公司 Private space creation method and device, storage medium, electronic equipment
CN108537037A (en) * 2018-03-29 2018-09-14 广东欧珀移动通信有限公司 Privacy control method and device, computer readable storage medium, terminal
CN109271764A (en) * 2018-08-30 2019-01-25 北京珠穆朗玛移动通信有限公司 Private data guard method, mobile terminal and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140012828A (en) * 2012-07-23 2014-02-04 조성재 The operation method of privacy protection and relief application for smartphone user
CN104008346B (en) * 2013-02-27 2019-08-27 腾讯科技(深圳)有限公司 The method and apparatus of the privacy mode of log-on data processing equipment
CN105868617B (en) * 2016-03-25 2020-02-04 维沃移动通信有限公司 Application program encryption method and mobile terminal
CN108171034A (en) * 2017-12-20 2018-06-15 维沃移动通信有限公司 A kind of method and terminal for protecting privacy
CN108959963A (en) * 2018-06-28 2018-12-07 维沃移动通信有限公司 A kind of management method and terminal device of application program
CN109241775B (en) * 2018-11-09 2021-01-08 维沃移动通信有限公司 Privacy protection method and terminal
CN109815676B (en) * 2019-01-29 2021-07-02 维沃移动通信有限公司 Privacy space operation method and terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008345A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Method and device for protecting user privacy data of application program
CN107943374A (en) * 2017-12-14 2018-04-20 维沃移动通信有限公司 The startup method and collapsible terminal of application program in collapsible terminal
CN108537037A (en) * 2018-03-29 2018-09-14 广东欧珀移动通信有限公司 Privacy control method and device, computer readable storage medium, terminal
CN108334755A (en) * 2018-03-30 2018-07-27 广东欧珀移动通信有限公司 Private space creation method and device, storage medium, electronic equipment
CN109271764A (en) * 2018-08-30 2019-01-25 北京珠穆朗玛移动通信有限公司 Private data guard method, mobile terminal and storage medium

Also Published As

Publication number Publication date
CN109815676A (en) 2019-05-28
WO2020156441A1 (en) 2020-08-06

Similar Documents

Publication Publication Date Title
CN109710132B (en) Operation control method and terminal
CN108255378B (en) Display control method and mobile terminal
WO2019174611A1 (en) Application configuration method and mobile terminal
CN109815676B (en) Privacy space operation method and terminal equipment
CN109194818B (en) Information processing method and terminal
CN109407921B (en) Application processing method and terminal device
CN109032447B (en) Icon processing method and mobile terminal
CN109241775B (en) Privacy protection method and terminal
WO2021169959A1 (en) Application starting method and electronic device
CN107728923B (en) Operation processing method and mobile terminal
CN108415641B (en) Icon processing method and mobile terminal
CN109508136B (en) Display method of application program and mobile terminal
CN107992342B (en) Application configuration changing method and mobile terminal
CN109901976B (en) Application program management method and terminal equipment
WO2020078234A1 (en) Display control method and terminal
CN108228902B (en) File display method and mobile terminal
WO2020199987A1 (en) Message display method and mobile terminal
CN111338524A (en) Application program control method and electronic equipment
CN108509131B (en) Application program starting method and terminal
CN108153460B (en) Icon hiding method and terminal
CN110908562A (en) Icon display method and device, electronic equipment and medium
CN108829306B (en) Information processing method and mobile terminal
CN109040431B (en) Mode control method, terminal and storage medium
CN111124537B (en) Application starting method and electronic equipment
CN110225192B (en) Message display method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant