Key control method and apparatus, and terminal

A control method and key technology, applied in the field of communications, can solve problems such as poor user experience and misoperation, and achieve the effect of improving user experience and avoiding misoperation

Inactive Publication Date: 2017-04-26
SHENZHEN TINNO WIRELESS TECH
View PDF4 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of this, the embodiment of this solution provides a button control method, device, and terminal to solve the problem that in the prior art, when users use a certain application of the terminal, they often cause misoperations due to mistaken touches of buttons, resulting in poor user experience. poor problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key control method and apparatus, and terminal
  • Key control method and apparatus, and terminal
  • Key control method and apparatus, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] An embodiment of the present invention provides a button control method, which can be applied to terminals such as mobile phones and tablet computers. The information processing method can be realized through an application program, and the application program can be installed on terminals such as mobile phones and tablet computers.

[0065] figure 1 It is an example flow diagram of the button control method provided by the embodiment of the present invention. The process of the button control method is applied to a terminal. Such as figure 1 As shown, in this embodiment, the button control method may include the following steps:

[0066] S101. In response to receiving a trigger message for a specified key on the terminal, determine whether the current foreground application of the terminal requires shielding the specified key;

[0067] S102. In response to the request of the foreground application program to shield the specified key, prohibit execution of the opera...

example 1

[0080] The user adds the UID corresponding to the application of game A on the mobile phone to the set of blocked applications corresponding to the return key.

[0081] When the user opens the application of game A to play the game, he accidentally touches the return key. At this time, the mobile phone obtains the UID corresponding to the application of game A and the shielded application set corresponding to the return key, and then judges according to the obtained information. When the mobile phone determines that the UID corresponding to the application of game A is in the shielded application set corresponding to the return key , the return operation corresponding to the return key is prohibited, thereby preventing the mobile phone from exiting the application program interface of game A.

example 2

[0083] The user adds the UID corresponding to the Alipay application on the mobile phone to the set of blocked applications corresponding to the HOME key.

[0084] When the user opened the Alipay app to transfer money, he accidentally touched the HOME button. At this time, the mobile phone obtains the UID corresponding to the Alipay application and the shielded application set corresponding to the HOME key, and then judges based on the obtained information. When the mobile phone determines that the UID corresponding to the Alipay application is in the shielded application set corresponding to the HOME key, It is forbidden to perform the operation corresponding to the HOME key to return to the main desktop of the mobile phone, thereby preventing the mobile phone from exiting from the Alipay application interface. In this way, the unsafe exit of Alipay is prevented, and the user can only exit safely through the Alipay interface, thereby protecting the security of the user accoun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a key control method and apparatus, and a terminal. The method comprises the steps of judging whether a current foreground application of a terminal requires shielding of a specified key or not in response to operation of receiving a triggering message for the specified key on the terminal; and prohibiting execution of operation corresponding to the specified key in response to the fact that the foreground application requires the shielding of the specified key. When the triggering message for the specified key on the terminal is received, whether the current foreground application of the terminal requires the shielding of the specified key or not is judged, and whether the operation corresponding to the specified key is executed or not is determined according to a judgment result, so that the terminal can intelligently understand whether the operation corresponding to the specified key is truly executed or not according to an intention of a user, the misoperation caused by false touch of a key is avoided, the usage experience of the user is improved, and the problem of relatively poor usage experience of the user due to the misoperation often caused by false touch of the key during use of an application of the terminal by the user in the prior art is solved.

Description

[0001] 【Technical field】 [0002] The solution relates to the communication field, in particular to a button control method, device and terminal. [0003] 【Background technique】 [0004] At present, terminals such as mobile phones and tablet computers have been widely used in people's daily life. And with the continuous development of technology, these terminals have more and more functions. Correspondingly, more and more application programs (that is, APPs, applications for short) are installed on these terminals. [0005] When an application program is running in the foreground of the terminal, it often happens that the user accidentally touches a button on the terminal to cause a misoperation, thus causing the terminal to quit the application program against the user's intention. In particular, the sensitivity of the touch-type physical keys currently applied to the terminal is getting higher and higher, and the probability of exiting the foreground application program due...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44
CPCG06F9/451
Inventor 陈帅
Owner SHENZHEN TINNO WIRELESS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products