Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In order to illustrate the technical scheme of the application, an application scenario of the application is introduced first, and at present, an interface of an application is usually displayed in a display interface of a mobile terminal such as a mobile phone, or interfaces of two applications are displayed in a split-screen manner, and the display interface of the mobile terminal is occupied no matter one application interface or two application interfaces are displayed. Of course, the multi-window mode includes a split-screen mode (split-screen mode), a Picture-in-Picture mode (Picture-in-Picture mode) in addition to a Free mode (Free form). When the interface of the application is displayed in the form of a Freeform window, the shape, size, or position of the Freeform window may be adjusted. In this way, more than one application program interface may appear in the display interface, and when one application program interface (for watching video) is displayed, and the mobile terminal receives an instruction for calling out another application program (the WeChat has a new message), another application program interface may directly call out (the new message in the WeChat is directly displayed), so that the information security of the user may have a security risk. In the embodiment of the present application, it may be configured that: some applications call out in a Freeform window requiring the user to enter authentication information for authentication. However, this frequent verification process is overly cumbersome. The method can guarantee the information safety of the user and simplify the operation of the user. The following description will be made by way of specific examples.
Fig. 1 is a schematic implementation flowchart of a method for window outgoing call provided in an embodiment of the present application, and as shown in the figure, the method may include the following steps:
step S101, when receiving an instruction for calling an application program in a free window mode, judging whether the application program meets a first preset condition of exempting from decryption.
In the embodiment of the present application, the free window is a manner in which the application program is displayed in the foreground, and if the application program is displayed in a Freeform window, the size, shape, and position of the interface of the application program displayed in the Freeform window may be freely adjusted. When the application program of the mobile terminal runs in the foreground, the application program can be displayed in a mode of a Freeform window, and can also be displayed in a normal mode (the interface of the application program occupies the whole display interface of the mobile terminal).
The user may set the verification information for the application program in advance, for example, the verification information when the application program is displayed from the background calling to the foreground, or the calling verification information when the application program is displayed in a Freeform window, which is not limited herein.
The instruction for calling out the application program in the manner of the Freeform window may be a preset gesture instruction, and the same gesture instruction may be set for all the application programs as the call-out instruction, for example, after the application program is selected, the selected application program is called out in the manner of the Freeform window by sliding three fingers upwards; different call-out instructions can also be set for different applications, for example, a circling gesture instruction is set for application a as the call-out instruction, a two-finger sliding gesture instruction is set for application B as the call-out instruction, and … … is set for application C. It should be noted that if different call-out instructions are set for different application programs, the application program to be called out does not need to be selected in advance before the user inputs the gesture instruction, but the application program to be called out is determined according to the gesture instruction.
When an instruction for calling an application program in a Freeform window mode is received, whether the application program meets a first preset condition which is free of decryption is judged, a user can preset the first preset condition which is free of decryption, and the first preset condition which is free of decryption is as follows: the first preset condition for decryption is not needed when the application program calls out in a mode of a Freeform window.
Step S102, if the application program does not meet the first preset condition of decryption exemption, a decryption interface is displayed in a display interface of the mobile terminal, and the decryption interface is used for prompting a user to input verification information.
In this embodiment of the application, if the application does not satisfy the first preset condition of decryption exemption, it indicates that the application needs to be verified when calling out in a Freeform window, at this time, a decryption interface may be displayed on a display interface of the mobile terminal, where the decryption interface may be prompt information for prompting a user to input verification information, a password input box and a virtual keyboard, or auxiliary information when the user draws a gesture pattern. The user can input fingerprint information according to the prompt message in the decryption interface, can input character information in the password input box through the virtual keyboard, and can input gesture patterns and the like through auxiliary information in the decryption interface.
And step S103, after the verification information input by the user is successfully verified, displaying the application program in the display interface in a free window mode.
In the embodiment of the application, after the user inputs the verification information, the mobile terminal matches the pre-stored verification information according to the verification information input by the user, if the verification information input by the user is matched with the pre-stored verification information, the verification of the verification information input by the user is successful, and if the verification information input by the user is not matched with the pre-stored verification information, the verification of the verification information input by the user is failed.
And if the verification information input by the user is verified successfully, displaying the application program in a mode of a Freeform window in the display interface. After the application program is displayed in the mode of the Freeform window, the size, the position, the shape and the like of the Freeform window corresponding to the application program can be adjusted.
And if the verification information input by the user fails to verify, sending prompt information, wherein the prompt information is used for prompting the user that the verification information is wrong and prompting the user to input the verification information again.
As another embodiment of the present application, if the application program meets a first preset condition of exempting from decryption, the application program is displayed in the display interface in a manner of a Freeform window.
In this embodiment of the application, if the application satisfies the first preset condition of exempting from decryption, it indicates that the application does not need to perform decryption (verification of verification information) when the application calls out in the Freeform window, and at this time, the application may be displayed in the display interface in the Freeform window.
According to the method and the device, the verification information is set for the Freform window in advance when the Freform window is called out, the first preset condition which is free of decryption is set in advance, and when the application program does not meet the first preset condition which is free of decryption, the Freform window can be called out only through decryption of the verification information, so that the information safety in the application program can be improved; when the application program meets a first preset condition of exempting from decryption, the application program is displayed in the display interface in a Freeformal window mode, and therefore the problem that the user experience is poor due to frequent decryption of a user is avoided. Therefore, the method can ensure the information security of the user and simplify the operation of the user.
Fig. 2 is a schematic flowchart of another method for calling out a window according to an embodiment of the present application, and as shown in the diagram, the embodiment shown in fig. 2 describes how to determine whether the application program meets a first preset condition for decryption exemption based on the embodiment shown in fig. 1, and the embodiment of the present application may include the following steps:
step S201, when receiving an instruction to call an application program in a free window manner, determines whether the application program is an encrypted application program.
Step S202, if the application program is an unencrypted application program, determining that the application program meets a first preset condition of decryption exemption.
In the embodiment of the application, a possible user sets authentication information for an application in advance, and the application is called an encrypted application; the authentication information may not be set for the application program, the application program is an unencrypted application program, and the unencrypted application program does not need to perform a decryption operation, so that the unencrypted application program satisfies the first preset condition of exempting from decryption by default.
Step S203, if the application program is an encrypted application program, determining the time when the application program has last exited the display interface, and calculating a first time interval between the time when the application program has last exited the display interface and the current time.
In the embodiment of the present application, it may be set that the encrypted application needs to be authenticated before each outgoing call in the manner of a Freeform window. However, in this method, the user is cumbersome in actual operation, so that the application can determine whether the application program is operated by the user when the application program is called out in a Freeform window at this time according to the habit of the user, and if the application program can be determined to be operated by the user, it can be considered that the first preset condition of no decryption is met.
Step S204, if the first time interval is smaller than a first preset time, determining that the application program meets a first preset condition of decryption exemption.
Step S205, if the first time interval is greater than or equal to the first preset time, determining that the application program does not satisfy a first preset condition of decryption exemption.
In this embodiment of the application, a time when the application program has last exited the display interface is determined, a first time interval between the time when the application program has last exited the display interface and a current time is calculated, a first preset time may also be set, if the first time interval is less than the first preset time, a difference between a time point when a user calls out the application program in a Freeform window this time and a time point when the application program has last exited the display interface is smaller, assuming that the first preset time is 3 minutes, the user controls the application program to exit the display interface before 2 minutes, and currently calls out the application program in the Freeform window, at this time, since the first time interval is shorter, it may be determined that an operation of calling out the application program in the Freeform window this time is a self operation, it may be determined that the application program satisfies a first preset condition of exempting from decryption, the process of authentication may not be used.
Similarly, if the first time interval is greater than or equal to the first preset time, which indicates that the difference between the time point when the user calls the application program in the manner of the Freeform window and the time point when the application program exits the display interface for the last time is large and may not be the operation of the user himself, it is determined that the application program does not satisfy the first preset condition of decryption exemption, and a verification process is required.
Through the above description, it can be seen that satisfying the first preset condition of exempting from decryption includes:
1) the application program is an unencrypted application program;
2) the application program is an encrypted application program, however, a first time interval between the time when the application program last exits the display interface and the current time is less than a first preset time.
The first preset condition that decryption is not satisfied comprises the following steps:
1) the application program is an encrypted application program, and a first time interval between the time when the application program exits the display interface for the last time and the current time is greater than or equal to first preset time.
As another embodiment of the present application, if the first time interval is greater than or equal to the first preset time, determining that the application program does not satisfy the first preset condition of exempting from decryption includes:
and if the first time interval is greater than or equal to the first preset time and the mobile terminal does not meet the second preset condition in the first time interval, determining that the application program does not meet the first preset condition of decryption avoidance.
Correspondingly, if the first time interval is greater than or equal to the first preset time and the mobile terminal meets the second preset condition in the first time interval, it is determined that the application program meets the first preset condition of decryption avoidance.
In this embodiment of the application, although the application is an encrypted application, and a first time interval between a time when the application exits the display interface last time and a current time is greater than or equal to a first preset time, there may be a case where the application is called out in a Freeform window at this time to operate the user, for example, a user is always operating the mobile terminal within the first time interval. Therefore, it is also required to determine whether the mobile terminal satisfies a second preset condition within the first time interval.
As another embodiment of the present application, the second preset condition includes:
the mobile terminal keeps a bright screen state in a first time interval;
or the like, or, alternatively,
and in the first time interval, the second time interval of the received operation instruction of the user is smaller than second preset time.
Through this application embodiment, the setting of the second preset condition can be seen in that, when the mobile terminal meets the second preset condition in the first time interval, it indicates that the user is always operating the mobile terminal in the first time interval, and therefore, if the first time interval is greater than or equal to the first preset time, and the mobile terminal meets the second preset condition in the first time interval, it is determined that the application program meets the first preset condition of exempting from decryption, and thus, the application program can be displayed in a mode of a Freeform window in the display interface. And if the first time interval is greater than or equal to the first preset time and the mobile terminal does not meet the second preset condition in the first time interval, determining that the application program does not meet the first preset condition of decryption exemption, and needing a verification process.
It should be noted that, when the second time interval of the received operation instruction of the user is smaller than the second preset time, the following steps are performed: in the received operation instructions of the user, the second time interval of any two temporally adjacent operation instructions is less than the second preset time.
Through the above description, it can be seen that satisfying the first preset condition of exempting from decryption includes:
1) the application program is an unencrypted application program;
2) the application program is an encrypted application program, however, a first time interval between the time when the application program last exits the display interface and the current time is less than a first preset time;
3) the application program is an encrypted application program, a first time interval between the time when the application program exits the display interface for the last time and the current time is less than or equal to a first preset time, and the mobile terminal meets a second preset condition in the first time interval.
The first preset condition that decryption is not satisfied comprises the following steps:
1) the application program is an encrypted application program, a first time interval between the time when the application program exits the display interface for the last time and the current time is greater than or equal to a first preset time, and the mobile terminal does not meet a second preset condition in the first time interval.
In the embodiment of the application, the decryption-free first preset condition is enriched, so that the information security of the user is ensured, and meanwhile, the operation process of the user in the process of calling out the application program in a Freeform window mode is simplified.
Fig. 3 is a schematic flowchart of another method for window outgoing call provided by the embodiment of the present application, and as shown in the figure, the embodiment of the present application describes a method for outgoing call freeform window that needs decryption and is relatively simplified, and may include the following steps:
step S301, when receiving an instruction for calling out an application program in a Freeform window mode, judging whether the application program meets a first preset condition of decryption exemption.
Step S302, if the application does not satisfy the first preset condition of exempting from decryption, determine whether the verification information of the application includes fingerprint information.
Step S303, if the verification information of the application includes fingerprint information, acquiring touch information on the display interface when the user calls the application in a free window manner.
In the embodiment of the present application, as described above, the authentication information of the application includes: fingerprint information, character information, gesture patterns, etc., which require a user to input in a decryption interface before the mobile terminal can receive the authentication information, however, since the user, when calling out the application in the manner of a Freeform window, is likely to receive a message by touch information, therefore, when the command called out by the application program in the manner of the Freeform window is touch information, meanwhile, the verification information of the application program comprises fingerprint information, and when the mobile terminal supports full-screen fingerprint identification, the verification information does not need to be input through a decryption interface, but instead the acquiring user calls out the application in the manner of a Freeform window, when touch information on the display interface, for example, a user double-clicking operation calls out an application program in a mode of a Freeform window, the mobile terminal supporting full-screen fingerprint identification can acquire the touch information of the user, wherein the touch information comprises the fingerprint information of the user.
As another embodiment of the present application, after determining whether the verification information of the application includes fingerprint information, the method further includes:
and if the verification information of the application program does not include the fingerprint information, displaying a decryption interface in a display interface of the mobile terminal.
In the embodiment of the present application, if the authentication information of the application does not include fingerprint information, the user is required to input a character password or a gesture pattern for authentication. A decryption interface needs to be displayed in the display interface of the mobile terminal so that a user can input a character password or a gesture password through the decryption interface.
Step S304, fingerprint information is extracted from the touch information, and the fingerprint information is verified.
Step S305, if the fingerprint information is successfully verified, displaying the application program in the display interface in a free window manner.
Step S306, if the fingerprint information is failed to be verified, displaying a decryption interface in a display interface of the mobile terminal.
In the embodiment of the application, fingerprint information is extracted from the touch information, the extracted fingerprint information is matched with the pre-stored fingerprint information, if the fingerprint information is matched with the pre-stored fingerprint information, the fingerprint information is verified successfully, and the application program can be displayed in a Freeform window mode in the display interface; if the matching is inconsistent, the fingerprint information verification is failed, and a process of inputting a character password and a gesture pattern by a user to verify the verification information is required, so that a decryption interface needs to be displayed in a display interface of the mobile terminal.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Fig. 4 is a schematic block diagram of a mobile terminal according to an embodiment of the present application, and only a portion related to the embodiment of the present application is shown for convenience of description.
The mobile terminal 4 may be a software unit, a hardware unit or a combination of software and hardware unit built in a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, etc., or may be integrated into a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, etc., as an independent pendant.
The mobile terminal 4 includes:
a judging unit 41, configured to, when receiving an instruction to call out an application program in a free window manner, judge whether the application program satisfies a first preset condition of exempting from decryption;
a decryption interface display unit 42, configured to display a decryption interface in a display interface of the mobile terminal if the application does not meet a first preset condition of decryption exemption, where the decryption interface is used to prompt a user to input verification information;
and a first application display unit 43, configured to display the application in the display interface in a free window manner after the verification of the verification information input by the user is successful.
Optionally, the mobile terminal 4 includes:
and the second application program display unit 44 is configured to, after determining whether the application program meets the first preset condition of exempting from decryption, display the application program in the display interface in a free window manner if the application program meets the first preset condition of exempting from decryption.
Optionally, the judging unit 41 includes:
a judging module 411, configured to judge whether the application is an encrypted application;
a first determining module 412, configured to determine that the application program meets a first preset condition of decryption exemption if the application program is an unencrypted application program;
a first time interval obtaining module 413, configured to determine, if the application is an encrypted application, a time when the application has last exited the display interface, and calculate a first time interval between the time when the application has last exited the display interface and a current time;
a second determining module 414, configured to determine that the application program meets a first preset condition of decryption exemption if the first time interval is less than a first preset time;
the second determining module 414 is further configured to determine that the application program does not satisfy the first preset condition of decryption exemption if the first time interval is greater than or equal to the first preset time.
Optionally, the second determining module 414 is further configured to:
and if the first time interval is greater than or equal to the first preset time and the mobile terminal does not meet the second preset condition in the first time interval, determining that the application program does not meet the first preset condition of decryption avoidance.
And if the first time interval is greater than or equal to the first preset time and the mobile terminal meets a second preset condition in the first time interval, determining that the application program meets a first preset condition of decryption avoidance.
Optionally, the second preset condition includes:
the mobile terminal keeps a bright screen state in a first time interval;
or the like, or, alternatively,
and in the first time interval, the second time interval of the received operation instruction of the user is smaller than second preset time.
Optionally, the mobile terminal 4 further includes: a touch decryption unit 45;
the touch decryption unit 45 is further configured to:
if the application program does not meet the first preset condition of decryption exemption, before a decryption interface is displayed in a display interface of the mobile terminal, judging whether the verification information of the application program comprises fingerprint information or not;
if the verification information of the application program comprises fingerprint information, acquiring touch information on the display interface when a user calls the application program in a free window mode;
extracting fingerprint information from the touch information and verifying the fingerprint information;
if the fingerprint information is successfully verified, displaying the application program in a free window mode in the display interface;
and if the fingerprint information is failed to be verified, displaying a decryption interface in a display interface of the mobile terminal.
It will be apparent to those skilled in the art that, for convenience and simplicity of description, the foregoing functional units and modules are merely illustrated in terms of division, and in practical applications, the foregoing functional allocation may be performed by different functional units and modules as needed, that is, the internal structure of the mobile terminal is divided into different functional units or modules to perform all or part of the above described functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the mobile terminal may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Fig. 5 is a schematic block diagram of a mobile terminal according to another embodiment of the present application. As shown in fig. 5, the mobile terminal 5 of this embodiment includes: one or more processors 50, a memory 51 and a computer program 52 stored in said memory 51 and executable on said processors 50. The processor 50, when executing the computer program 52, implements the steps in the above-described method embodiments of the window outgoing call, such as the steps S101 to S103 shown in fig. 1. Alternatively, the processor 50, when executing the computer program 52, implements the functions of the modules/units in the above-described mobile terminal embodiments, such as the functions of the modules 41 to 43 shown in fig. 4.
Illustratively, the computer program 52 may be partitioned into one or more modules/units, which are stored in the memory 51 and executed by the processor 50 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 52 in the mobile terminal 5. For example, the computer program 52 may be divided into an information judgment unit, a decryption interface display unit, and a first application display unit.
The device comprises a judging unit, a judging unit and a judging unit, wherein the judging unit is used for judging whether an application program meets a first preset condition of decryption prevention when receiving an instruction of calling the application program in a free window mode;
the decryption interface display unit is used for displaying a decryption interface in a display interface of the mobile terminal if the application program does not meet a first preset condition of decryption exemption, and the decryption interface is used for prompting a user to input verification information;
and the first application program display unit is used for displaying the application program in a free window mode in the display interface after the verification information input by the user is verified successfully.
Other units or modules can be referred to the description of the embodiment shown in fig. 4, and are not described again here.
The mobile terminal includes, but is not limited to, a processor 50, a memory 51. Those skilled in the art will appreciate that fig. 5 is only one example of a mobile terminal 5 and is not intended to limit the mobile terminal 5 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the mobile terminal may also include input devices, output devices, network access devices, buses, etc.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may be an internal storage unit of the mobile terminal 5, such as a hard disk or a memory of the mobile terminal 5. The memory 51 may also be an external storage device of the mobile terminal 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the mobile terminal 5. Further, the memory 51 may also include both an internal storage unit and an external storage device of the mobile terminal 5. The memory 51 is used for storing the computer program and other programs and data required by the mobile terminal. The memory 51 may also be used to temporarily store data that has been output or is to be output.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed mobile terminal and method may be implemented in other ways. For example, the above-described embodiments of the mobile terminal are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.