Terminal unlocking method and terminal

A control method and terminal technology, applied in the communication field, can solve problems such as low operation efficiency, and achieve the effect of improving operation efficiency and easy operation

Inactive Publication Date: 2016-08-17
LETV HLDG BEIJING CO LTD +1
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, an embodiment of the present invention provides a terminal control method and a terminal to solve the problem of low operational efficiency caused by setting a privacy mode for content that the user does not want to be seen in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal unlocking method and terminal
  • Terminal unlocking method and terminal
  • Terminal unlocking method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] The embodiment of the present invention provides a terminal control method, please refer to figure 1 , which is a schematic flowchart of Embodiment 1 of the terminal control method provided by the embodiment of the present invention, as shown in figure 1 As shown, the method includes the following steps:

[0073] S101. Obtain operation information of a user on an edge touch area of ​​a terminal.

[0074] Specifically, the purpose of the terminal acquiring the user's operation information on the edge touch area of ​​the terminal is to determine whether the specified desktop icon can be hidden according to the operation information.

[0075] It should be noted that the terminals involved in the embodiments of the present invention may include but not limited to personal computers (Personal Computer, PC), personal digital assistants (Personal Digital Assistant, PDA), wireless handheld devices, tablet computers (Tablet Computer), Mobile phones, MP3 players, MP4 players, e...

Embodiment 2

[0113] The embodiment of the present invention provides a terminal control method, please refer to figure 2 , which is a schematic flowchart of Embodiment 2 of the terminal control method provided by the embodiment of the present invention, as shown in figure 2 As shown, the method includes the following steps:

[0114] S201. Obtain operation information of a user on an edge touch area of ​​a terminal.

[0115] Specifically, the purpose of obtaining the user's operation information on the edge touch area of ​​the terminal is to determine whether the hidden desktop icons in the terminal can be displayed on the terminal screen according to the operation information.

[0116] It should be noted that the terminals involved in the embodiments of the present invention may include but not limited to personal computers (Personal Computer, PC), personal digital assistants (Personal Digital Assistant, PDA), wireless handheld devices, tablet computers (Tablet Computer), Mobile phones...

Embodiment 3

[0141] Based on the terminal control methods provided in the first and second embodiments above, the embodiment of the present invention further provides a specific implementation manner for realizing the above method embodiment, please refer to image 3 , which is a schematic flowchart of Embodiment 3 of the terminal control method provided by the embodiment of the present invention, as shown in image 3 As shown, the method may specifically include:

[0142] S301. Detect whether a desktop icon on a terminal is dragged to an edge touch area of ​​the terminal.

[0143] S302, if yes, hide the dragged desktop icon.

[0144] S303. Detect operation information of the user on the edge touch area of ​​the terminal.

[0145] S304, judging whether the user's operation information on the edge touch area of ​​the terminal is designated operation information of a hidden desktop icon displayed in the terminal. ,

[0146] S305, if yes, display the hidden desktop icon in the terminal th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a terminal unlocking method and a terminal. According to the embodiment of the invention, firstly operating information of a user in an edge touch area of the terminal is obtained, and then designated desktop icons are hidden according to the operating information of the user in the edge touch area of the terminal. The technical scheme provided by the embodiment is used for solving the problem of low operating efficiency caused by the fact that a privacy mode is set for user's contents which are not wanted to be seen in the prior art, the operation is simple and convenient, and operating efficiency is improved.

Description

【Technical field】 [0001] The present invention relates to the field of communication technology, in particular to a terminal control method and a terminal. 【Background technique】 [0002] Currently, mainstream terminals all use touch screens, and users can control the terminals by operating function keys on the touch screens. When a user uses a terminal, there are some files, pictures, videos, or applications in the terminal that other users do not want to see. The user needs to set access permissions for the content that he does not want to be seen, so as to protect his privacy. [0003] In the course of realizing the present invention, the inventor finds that there are at least the following problems in the prior art: [0004] In the prior art, users set access permissions for content such as files, pictures, videos, or applications that they do not want to be seen, generally by encrypting the content that users do not want to be seen one by one or setting a visitor mode ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0488G06F3/0481
CPCG06F3/04817G06F3/0488
Inventor 索浩森
Owner LETV HLDG BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products