Supercharge Your Innovation With Domain-Expert AI Agents!

Terminal interface control method

An interface control and terminal technology, applied in the electronic field, can solve the problem of easy leakage of user privacy, and achieve the effect of protecting user privacy

Inactive Publication Date: 2015-04-29
SHENZHEN GIONEE COMM EQUIP
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after the existing terminal is unlocked, it usually enters the browsing interface before the lock screen by default, so user privacy is easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal interface control method
  • Terminal interface control method
  • Terminal interface control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] An embodiment of the present invention provides a terminal interface control method. When the terminal is in the locked screen state, if an unlock command for the terminal is received, the target interface for outputting on the unlocked terminal screen is obtained, and the target interface is determined. Whether the interface belongs to the operation interface of the preset privacy application; if the target interface belongs to the operation in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a terminal interface control method. The terminal interface control method includes acquiring a target interface outputted in an unlocked terminal screen when receiving an unlocking command for a terminal; judging whether the target interface belongs to the operation interface of a preset private application or not; if the target interface belongs to the operation interface of the preset private application, acquiring browsing authority limits of a transmitter of the unlocking command; if the transmitter is not authorized by the preset private application, unlocking the terminal and displaying a non-target interface in the preset interface on the terminal screen. By the terminal interface control method in the embodiment, user privacy can be effectively protected.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a terminal interface control method. Background technique [0002] With the development of terminal technology, terminals such as mobile phones and tablet computers have been widely used. At the same time, users are paying more and more attention to personal privacy. For the convenience of description, the above-mentioned terminal takes a mobile phone as an example. As we all know, a user can preset an unlock password to prevent others from using his mobile phone. [0003] However, cell phones are occasionally passed around among friends or relatives, in other words, authorized users can use their phones as they please. But even so, users generally still hope to have their own privacy, especially for private content browsed by users before the mobile phone is locked, for example, text messages being edited, photos being browsed, web pages, etc. However, after the existing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32
CPCG06F21/32G06F2221/2141
Inventor 陈恳
Owner SHENZHEN GIONEE COMM EQUIP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More