Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method of penetrating a window with a magnifying glass based on windows system

A magnifying glass and window technology, which is applied in the field of remote conference sharing windows, can solve the problems of affecting the use of non-sharing windows, affecting the efficiency of sharing activities, and lack of intelligence, so as to prevent easy cracking and leakage, ensure accuracy, and good compatibility Effect

Active Publication Date: 2021-05-25
G NET INTEGRATED SERVICE
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The inventor of this patent application found through practice that the above method still has the following disadvantages: in method 1, the window needs to be manually operated, which is lacking in intelligence, and at the same time will affect the efficiency of sharing activities; in method 2, the translucent The processing algorithm takes up a lot of computer memory, and at the same time affects the use of non-shared windows. That is, when users need to view the content on non-shared windows during the sharing process, they still need to manually move them to a position that does not overlap with the shared window. Remove the translucent state
At the same time, in addition to the above two methods, there are some other methods, all of which can only penetrate layered windows, but most program windows do not have this property, so these windows are still unable to penetrate
And if the shared window itself has layered properties, its penetration function will be invalid at this time
In use, it needs to modify the interface effect of the windows system, which affects the user experience, and it can no longer be used in the win10 system, and the software for occlusion monitoring and translucency algorithm processing may also have compatibility issues with the operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of penetrating a window with a magnifying glass based on windows system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0041] A method for a magnifying glass penetrating a window based on a windows system, comprising the following steps:

[0042] S10. Using the screen monitoring software disclosed in the prior art, regularly monitor whether the current shared window is blocked by a non-shared window, and the monitoring time interval is set to once every 5 seconds.

[0043] S11. When it is detected that the current shared window is blocked by a non-shared window, start a pre-programmed program to call the built-in magnifying glass application program under the windows system, and set the magnifying glass program as a hidden attribute, that is, the magnifying glass application is not displayed on the desktop of the computer Operation interface;

[0044] S12. Obtain the position and size of the current shared window on the screen through screen monitoring software or a program compiled separately;

[0045] S13. Select all non-shared window objects that block the shared window;

[0046] S14. Set...

specific Embodiment 2

[0052] A method for a magnifying glass penetrating a window based on a windows system, comprising the following steps:

[0053] S10. Call the screen capture application that comes with the windows system every preset time (for example, 5 seconds) to capture the computer screen, select and activate the current shared window at the same time, and call the screen capture application that comes with the windows system to capture the current screen again. Active window, and then call the image analysis software (you can use the AI ​​code disclosed in the prior art, or you can write the program yourself) to compare and judge whether the intercepted current active window can completely overlap with the part of the corresponding intercepted computer screen , if the result is yes, it means that the current shared window is not blocked by other windows; if the result is no, it means that the current shared window is blocked by other windows.

[0054] S11. When it is detected that the cu...

specific Embodiment 3

[0063] A method for a magnifying glass penetrating a window based on a windows system, comprising the following steps:

[0064] S10. Call the screen capture application that comes with the windows system every preset time (for example, 5 seconds) to capture the computer screen, select and activate the current shared window at the same time, and call the screen capture application that comes with the windows system to capture the current screen again. Active window, and then call the image analysis software (you can use the AI ​​code disclosed in the prior art, or you can write the program yourself) to compare and judge whether the intercepted current active window can completely overlap with the part of the corresponding intercepted computer screen , if the result is yes, it means that the current shared window is not blocked by other windows; if the result is no, it means that the current shared window is blocked by other windows.

[0065] S11. When it is detected that the cu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a window-penetrating method for a magnifying glass based on the windows system, which includes the following steps: when detecting that the current shared window is blocked by a non-shared window, calling a built-in magnifying glass application program under the windows system, and setting the magnifying glass program It is a hidden attribute; get the position and size of the current shared window on the screen; select all non-shared window objects that block the shared window and set them in the magnifying glass interface; move the position area corresponding to the hidden magnifying glass to the position corresponding to the current shared window Coincidence; intercept the image corresponding to the covered area through the magnifying glass interface, and import it into the shared window program in real time, and then close the magnifying glass. The method has the beneficial effects of higher intelligent program, no influence on sharing efficiency, and better compatibility with the windows operating system.

Description

technical field [0001] The invention relates to the technical field of remote conference sharing windows under the windows system; in particular, it refers to a window-penetrating window-penetrating method based on the magnifying glass of the windows system for zooming in on the remote conference sharing window. Background technique [0002] At present, due to the development of remote conferences, the demands for desktop sharing are increasingly diversified. The corresponding sharing technology has also been developed from only sharing the entire desktop to only sharing the content of a single window on the desktop. This not only protects user privacy, but also reduces data traffic, so that images can reach the shared screen faster and clearer. end. However, in the process of technical improvement, new problems have also been encountered, that is, when the window is shared remotely, if the window that is set to be shared separately is blocked by other windows that are not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/451G06F3/14G06F3/0481
CPCG06F3/0481G06F3/1454G06F9/452
Inventor 戴东
Owner G NET INTEGRATED SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products