CN112559110B - Window penetration method of magnifying glass based on windows system - Google Patents
Window penetration method of magnifying glass based on windows system Download PDFInfo
- Publication number
- CN112559110B CN112559110B CN202110195632.8A CN202110195632A CN112559110B CN 112559110 B CN112559110 B CN 112559110B CN 202110195632 A CN202110195632 A CN 202110195632A CN 112559110 B CN112559110 B CN 112559110B
- Authority
- CN
- China
- Prior art keywords
- window
- magnifier
- shared
- current
- windows
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
- G06F9/452—Remote windowing, e.g. X-Window System, desktop virtualisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/14—Digital output to display device ; Cooperation and interconnection of the display device with other functional units
- G06F3/1454—Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses a method for a magnifying glass to penetrate a window based on a windows system, which comprises the following steps: when the current shared window is detected to be shielded by the non-shared window, calling a magnifier application program built in the windows system, and setting the magnifier program as a hidden attribute; acquiring the position and the size of a current sharing window in a screen; selecting all non-shared window objects which cover the shared window and setting the non-shared window objects in the magnifier interface; moving the position area corresponding to the hidden magnifying glass to coincide with the position of the current sharing window; and intercepting the image corresponding to the covered area through a magnifier interface, importing a sharing window program in real time, and then closing the magnifier. The method has the advantages of higher intelligent program, no influence on sharing efficiency and better compatibility with a windows operating system.
Description
Technical Field
The invention relates to the technical field of remote conference shared windows under a windows system; in particular to a method for magnifying a windows-based magnifying glass to penetrate a window for magnifying a remote conference shared window.
Background
Currently, the demand for sharing desktops is increasingly diversified due to the development of teleconferencing. The corresponding sharing technology is developed from the original technology that only the whole desktop can be shared to the technology that only the content of a single window on the desktop can be shared, so that not only is the privacy of a user protected, but also the data flow is reduced, and images can reach a sharing end more quickly and clearly. However, in the process of technical improvement, a new problem is also encountered, that is, when a window is remotely shared, if a window which is separately shared is set to be blocked by other windows which are not set to be shared, the remote sharing end cannot acquire an image, that is, only a black blocking block can be seen, so that the interactive experience is poor.
In view of the emerging problems, various solutions are proposed in the prior art, and in combination with a search situation, the following common solutions are listed:
in the prior art, the first scheme has the following patent application numbers by retrieval: 201310351368.8, title of the invention: the invention discloses a method for identifying the window occlusion of a shared application program, and simultaneously provides a method for informing an operator to refresh a window again or close a window occluded before when the window is identified to be occluded so as to remove the occlusion state, namely solving the problem that the shared window is occluded by a scheme of automatic detection and manual removal.
In the second existing scheme, the patent application numbers are found through retrieval: 200810085444, title of the invention: the invention discloses a method and a device for recovering an occluded window in application sharing software, and discloses a technical scheme for detecting whether a sharing window is occluded or not and solving the problem of occlusion.
The inventor of the present patent application finds, through practice, that the above method still has the following disadvantages: in the method 1, a window needs to be manually operated, the intelligent degree is deficient, and the efficiency of sharing activities is influenced; in the method 2, the semitransparent processing algorithm occupies a large amount of computer memory, and affects the use of the unshared window, that is, when a user needs to look up the content on the unshared window in the sharing process, the user still needs to manually move the unshared window to a position where the unshared window is not overlapped with the shared window to remove the semitransparent state. Besides the two methods, there are other methods which can only penetrate the layered window, but most program windows do not have the property, so the part of the window cannot be penetrated. And if the shared window itself has hierarchical properties, its pass-through function will fail. In use it requires modification of the windows system's interface effects, affects the user experience, and is not already available in the win10 system, and software that obscures the monitoring and semi-transparent algorithm processing may also present compatibility issues with the operating system.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method for blocking a shared window, which has higher intelligent program, does not influence the sharing efficiency and has better compatibility with a windows operating system, in particular to a method for enabling a magnifying glass based on a windows system to penetrate through a window.
In order to solve the technical problems, the technical scheme provided by the invention is as follows: a method for a magnifying glass to penetrate a window based on a windows system comprises the following steps:
s10, regularly monitoring whether the current shared window is blocked by the non-shared window;
s11, when it is detected that the current shared window is shielded by the unshared window, starting a pre-programmed program, calling a magnifier application program built in the windows system, and setting the magnifier program to be a hidden attribute, namely, not displaying the magnifier application operation interface on the desktop of the computer;
s12, acquiring the position and the size of the current sharing window in the screen;
s13, selecting all non-shared window objects which shield the shared window;
s14, setting all window objects selected in the previous step into a magnifier interface;
s15, moving the position area corresponding to the hidden magnifying glass to coincide with the position of the current sharing window;
s16, intercepting the image corresponding to the covered area through the magnifier interface, wherein the acquired image is all the contents of the shared window and is not blocked;
and S17, importing the image intercepted by the magnifier interface into a shared window program in real time, and then closing the magnifier.
Preferably, the specific method for regularly monitoring whether the current shared window is blocked by the non-shared window in step S10 includes calling a screenshot application of the windows system at a preset time interval, intercepting a screen of the computer, selecting and activating the current shared window at the same time, calling the screenshot application of the windows system to intercept the current active window again, calling image analysis software to compare, determining whether the intercepted current active window can completely coincide with a partial area in the intercepted computer screen, and if so, indicating that the current shared window is not blocked by other windows; if the result is negative, the current shared window is indicated to be blocked by other windows.
Preferably, after the step S16 is completed, the position and size information of the clipped window is extracted after the clipped image is obtained, the position and size information is compared with the position and size information of the current sharing window in the screen obtained in S12, if the comparison result is consistent, the clipped window is determined to be correct, if the comparison result is inconsistent, the step S12 is repeatedly performed once to obtain the latest position and size information of the current sharing window again for comparison again, if the comparison result is consistent, the clipped window is determined to be correct, and if the comparison result is still inconsistent, the user of the sharing window is notified to perform manual verification in the form of a system message.
Preferably, all kinds of pictures intercepted in the whole process are encrypted.
Preferably, a virtual button which is actively triggered by the user to penetrate the non-shared window is added on the user shared window client.
After the scheme is adopted, the invention has the following beneficial effects: the inventor of the patent application finds that in a development interface provided by a windows system, an interface related to a magnifier is provided, and the interface is originally used for magnifying an image of a certain area in a desktop and providing help for a person with visual impairment. But some characteristics of the interface can be skillfully used so as to penetrate a window and acquire an occluded image. The patent application of the invention is creative and adopts the magnifying glass technology of the windows system to solve the problem of image acquisition of the part shielded by the unshared window in the process of sharing the window. The method adopts the program interface of the operating system, so that the compatibility is better, the applicability is wider, the problem of window shielding of all types can be solved, and real penetration is realized. And the whole process is software automatic detection, automatic penetration and high intelligent degree.
Meanwhile, the automatic detection technology in the preferred item directly calls a self-contained screen capture program of the windows system, so that the applicability of the scheme is further improved, built-in function modules required by software corresponding to the method are reduced, and the cost is reduced. A comparison verification program is added after the window is penetrated, so that the penetrating accuracy is further ensured, and the user cannot find the window in time after the window is penetrated by mistake and the penetrating fails. All the pictures intercepted in the whole process are encrypted, so that the safety of the method is improved, and the intermediate files acquired in the using process are prevented from being cracked and leaked easily. And finally, the active triggering function is added, so that the opportunity of active intervention is given to the user, and meanwhile, when the shielded program is detected to be invalid, the user can continue to realize the penetrating function of the shielding window through active intervention.
In summary, the present invention provides a solution for blocking a shared window, which has a higher intelligent program, does not affect the sharing efficiency, and has a better compatibility with a windows operating system, that is, a method for a magnifying glass to penetrate a window based on a windows system.
Drawings
FIG. 1 is a flow chart illustrating a core step of a window penetrating method based on a magnifying glass of a windows system in the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
With reference to fig. 1, a method for a magnifier based on a windows system to penetrate a window includes the following steps:
s10, regularly monitoring whether the current shared window is blocked by the non-shared window;
s11, when it is detected that the current shared window is shielded by the unshared window, starting a pre-programmed program, calling a magnifier application program built in the windows system, and setting the magnifier program to be a hidden attribute, namely, not displaying the magnifier application operation interface on the desktop of the computer;
s12, acquiring the position and the size of the current sharing window in the screen;
s13, selecting all non-shared window objects which shield the shared window;
s14, setting all window objects selected in the previous step into a magnifier interface;
s15, moving the position area corresponding to the hidden magnifying glass to coincide with the position of the current sharing window;
s16, intercepting the image corresponding to the covered area through the magnifier interface, wherein the acquired image is all the contents of the shared window and is not blocked;
and S17, importing the image intercepted by the magnifier interface into a shared window program in real time, and then closing the magnifier.
Preferably, the specific method for regularly monitoring whether the current shared window is blocked by the non-shared window in step S10 includes calling a screenshot application of the windows system at a preset time interval, intercepting a screen of the computer, selecting and activating the current shared window at the same time, calling the screenshot application of the windows system to intercept the current active window again, calling image analysis software to compare, determining whether the intercepted current active window can completely coincide with a partial area in the intercepted computer screen, and if so, indicating that the current shared window is not blocked by other windows; if the result is negative, the current shared window is indicated to be blocked by other windows.
Preferably, after the step S16 is completed, the position and size information of the clipped window is extracted after the clipped image is obtained, the position and size information is compared with the position and size information of the current sharing window in the screen obtained in S12, if the comparison result is consistent, the clipped window is determined to be correct, if the comparison result is inconsistent, the step S12 is repeatedly performed once to obtain the latest position and size information of the current sharing window again for comparison again, if the comparison result is consistent, the clipped window is determined to be correct, and if the comparison result is still inconsistent, the user of the sharing window is notified to perform manual verification in the form of a system message.
Preferably, all kinds of pictures intercepted in the whole process are encrypted.
Preferably, a virtual button which is actively triggered by the user to penetrate the non-shared window is added on the user shared window client.
The following specific examples are listed for the above technical scheme:
detailed description of the preferred embodiment
A method for a magnifying glass to penetrate a window based on a windows system comprises the following steps:
s10, monitoring whether the current shared window is blocked by the non-shared window at regular time by adopting screen monitoring software disclosed in the prior art, and monitoring time intervals; set to once every 5 seconds.
S11, when it is detected that the current shared window is shielded by the unshared window, starting a pre-programmed program to call a magnifier application program built in the windows system, and setting the magnifier program to be a hidden attribute, namely, not displaying the magnifier application operation interface on the desktop of the computer;
s12, acquiring the position and size of the current sharing window in the screen through screen monitoring software or other programmed programs;
s13, selecting all non-shared window objects which shield the shared window;
s14, setting all window objects selected in the previous step into a magnifier interface;
s15, moving the position area corresponding to the hidden magnifying glass to coincide with the position of the current sharing window;
s16, intercepting the image corresponding to the covered area through the magnifier interface, wherein the acquired image is all the contents of the shared window and is not blocked;
and S17, importing the image intercepted by the magnifier interface into a shared window program in real time, and then closing the magnifier.
And detecting whether the window which is currently shared is monitored to be blocked by the non-shared window or not again at intervals of 5 seconds, and if the blocking event is monitored, recycling the steps from S11 to S17 again.
Detailed description of the invention
A method for a magnifying glass to penetrate a window based on a windows system comprises the following steps:
s10, calling a screenshot application carried by the windows system once every preset time (such as 5 seconds), intercepting a screen of the computer, simultaneously selecting and activating a current shared window, calling the screenshot application carried by the windows system to intercept a current active window again, calling image analysis software (AI codes disclosed in the prior art can be adopted, and programs can be written by self) to compare, judging whether the intercepted current active window can be completely overlapped with a part of the intercepted area in the computer screen, and if so, indicating that the current shared window is not shielded by other windows; if the result is negative, the current shared window is indicated to be blocked by other windows.
S11, when it is detected that the current shared window is shielded by the unshared window, starting a pre-programmed program to call a magnifier application program built in the windows system, and setting the magnifier program to be a hidden attribute, namely, not displaying the magnifier application operation interface on the desktop of the computer;
s12, acquiring the position and size of the current sharing window in the screen through screen monitoring software or other programmed programs;
s13, selecting all non-shared window objects which shield the shared window;
s14, setting all window objects selected in the previous step into a magnifier interface;
s15, moving the position area corresponding to the hidden magnifying glass to coincide with the position of the current sharing window;
s16, intercepting the image corresponding to the covered area through the magnifier interface, wherein the acquired image is all the contents of the shared window and is not blocked;
and S17, importing the image intercepted by the magnifier interface into a shared window program in real time, and then closing the magnifier.
And detecting whether the window which is currently shared is monitored to be blocked by the non-shared window or not again at intervals of 5 seconds, and if the blocking event is monitored, recycling the steps from S11 to S17 again.
Detailed description of the preferred embodiment
A method for a magnifying glass to penetrate a window based on a windows system comprises the following steps:
s10, calling a screenshot application carried by the windows system once every preset time (such as 5 seconds), intercepting a screen of the computer, simultaneously selecting and activating a current shared window, calling the screenshot application carried by the windows system to intercept a current active window again, calling image analysis software (AI codes disclosed in the prior art can be adopted, and programs can be written by self) to compare, judging whether the intercepted current active window can be completely overlapped with a part of the intercepted area in the computer screen, and if so, indicating that the current shared window is not shielded by other windows; if the result is negative, the current shared window is indicated to be blocked by other windows.
S11, when it is detected that the current shared window is shielded by the unshared window, starting a pre-programmed program to call a magnifier application program built in the windows system, and setting the magnifier program to be a hidden attribute, namely, not displaying the magnifier application operation interface on the desktop of the computer;
s12, acquiring the position and size of the current sharing window in the screen through screen monitoring software or other programmed programs;
s13, selecting all non-shared window objects which shield the shared window;
s14, setting all window objects selected in the previous step into a magnifier interface;
s15, moving the position area corresponding to the hidden magnifying glass to coincide with the position of the current sharing window;
s16, intercepting the image corresponding to the covered area through the magnifier interface, wherein the acquired image is all the contents of the shared window and is not blocked;
s17, completing the execution in the step S16, extracting the position and size information of the intercepted window after the intercepted image is obtained, comparing the position and size information with the position and size information of the current shared window in the screen obtained in the step S12, if the comparison result is consistent, judging that the intercepted window is correct, if the comparison result is inconsistent, repeatedly executing the step S12 once to obtain the latest position and size information of the current shared window again for comparison again, if the comparison result is consistent, judging that the intercepted window is correct, and if the comparison result is still inconsistent, adopting a system message form to inform a user of the shared window to perform manual verification.
And S18, importing the image intercepted by the magnifier interface into a shared window program in real time, and then closing the magnifier.
And detecting whether the window which is currently shared is monitored to be blocked by the non-shared window or not again at intervals of 5 seconds, and if the blocking event is monitored, recycling the steps from S11 to S18 again.
In the above three embodiments, as an optimization, various pictures captured in the whole process are encrypted, and meanwhile, a virtual button actively triggered by the user to penetrate the non-shared window is added on the user shared window client.
After the scheme is adopted, the invention has the following beneficial effects: the inventor of the patent application finds that in a development interface provided by a windows system, an interface related to a magnifier is provided, and the interface is originally used for magnifying an image of a certain area in a desktop and providing help for a person with visual impairment. But some characteristics of the interface can be skillfully used so as to penetrate a window and acquire an occluded image. The patent application of the invention is creative and adopts the magnifying glass technology of the windows system to solve the problem of image acquisition of the part shielded by the unshared window in the process of sharing the window. The method adopts the program interface of the operating system, so that the compatibility is better, the applicability is wider, the problem of window shielding of all types can be solved, and real penetration is realized. And the whole process is software automatic detection, automatic penetration and high intelligent degree.
Meanwhile, the automatic detection technology in the preferred item directly calls a self-contained screen capture program of the windows system, so that the applicability of the scheme is further improved, built-in function modules required by software corresponding to the method are reduced, and the cost is reduced. A comparison verification program is added after the window is penetrated, so that the penetrating accuracy is further ensured, and the user cannot find the window in time after the window is penetrated by mistake and the penetrating fails. All the pictures intercepted in the whole process are encrypted, so that the safety of the method is improved, and the intermediate files acquired in the using process are prevented from being cracked and leaked easily. And finally, the active triggering function is added, so that the opportunity of active intervention is given to the user, and meanwhile, when the shielded program is detected to be invalid, the user can continue to realize the penetrating function of the shielding window through active intervention.
In summary, the present invention provides a solution for blocking a shared window, which has a higher intelligent program, does not affect the sharing efficiency, and has a better compatibility with a windows operating system, that is, a method for a magnifying glass to penetrate a window based on a windows system.
Several concepts mentioned in this patent application are described in detail herein as follows:
a magnifying glass: the windows system provides a general name for an interface for enlarging image functions.
Window: program interface and popup frame in the windows system.
Layered windows: windows in windows have hierarchical properties.
Penetration: the image of the occluded window can be seen.
Sharing the desktop: and sharing the screen image of the windows system to other people for watching.
It should be noted that, although the present patent application is developed based on a windows operating system, if there are other operating systems that are the same as the windows operating system or are considered as kernels in the art and are also compatible with a magnifier program, the method provided in the present patent application can also be applied. The core processing flow of the invention patent is only illustrated in fig. 1, and the steps mentioned in other specifications before and after the core processing flow are not shown in the picture. The patent application provides a specific technical solution to solve the problem, and when the specific implementation is implemented, the specific program code is realized by writing a program through software, and programmers in the industry can select a familiar programming language under the guidance of the method disclosed by the patent application and combine conventional programming knowledge to realize the functions to be described in the patent application.
The invention and its embodiments have been described above, the description is not restrictive, the figures shown in the drawings are only one embodiment of the invention, and the actual steps are not limited thereto. In summary, those skilled in the art should appreciate that methods and embodiments similar to those described above can be devised without departing from the spirit and scope of the present invention.
Claims (3)
1. A method for a magnifying glass to penetrate a window based on a windows system is characterized in that: it comprises the following steps:
s10, regularly monitoring whether the current shared window is blocked by the non-shared window; the method specifically comprises the following steps: calling a screen capture application carried by the windows system once every other preset time, capturing a screen of the computer, selecting and activating a current shared window, calling the screen capture application carried by the windows system to capture a current active window again, calling image analysis software to compare, judging whether the captured current active window can be completely overlapped with a part of area in the corresponding captured computer screen, and if so, indicating that the current shared window is not shielded by other windows; if the result is negative, the current sharing window is shielded by other windows;
s11, when it is detected that the current shared window is shielded by the unshared window, starting a pre-programmed program, calling a magnifier application program built in the windows system, and setting the magnifier program to be a hidden attribute, namely, not displaying the magnifier application operation interface on the desktop of the computer;
s12, acquiring the position and the size of the current sharing window in the screen;
s13, selecting all non-shared window objects which shield the shared window;
s14, setting all window objects selected in the previous step into a magnifier interface;
s15, moving the position area corresponding to the hidden magnifying glass to coincide with the position of the current sharing window;
s16, intercepting the image corresponding to the covered area through the magnifier interface, wherein the acquired image is all the contents of the shared window and is not blocked; after obtaining the intercepted image, extracting information of the position and the size of the intercepted window, comparing the information with the information of the position and the size of the current sharing window in the screen obtained in S12, if the comparison result is consistent, judging that the intercepted window is correct, if the comparison result is inconsistent, repeatedly executing the step S12 once to obtain the latest information of the position and the size of the current sharing window again for comparison again, if the comparison result is consistent, judging that the intercepted window is correct, and if the comparison result is still inconsistent, adopting a system message form to inform a user of the sharing window to perform manual verification;
and S17, importing the image intercepted by the magnifier interface into a shared window program in real time, and then closing the magnifier.
2. The windows-system-based magnifier window penetrating method of claim 1, wherein: all kinds of pictures intercepted in the whole process are encrypted.
3. The windows-system-based magnifier window penetrating method of claim 1, wherein: a virtual button which is actively triggered by a user to penetrate through a non-shared window is added on the user shared window client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110195632.8A CN112559110B (en) | 2021-02-22 | 2021-02-22 | Window penetration method of magnifying glass based on windows system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110195632.8A CN112559110B (en) | 2021-02-22 | 2021-02-22 | Window penetration method of magnifying glass based on windows system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112559110A CN112559110A (en) | 2021-03-26 |
CN112559110B true CN112559110B (en) | 2021-05-25 |
Family
ID=75034473
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110195632.8A Active CN112559110B (en) | 2021-02-22 | 2021-02-22 | Window penetration method of magnifying glass based on windows system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112559110B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116107845B (en) * | 2023-04-12 | 2023-07-14 | 浙江保融科技股份有限公司 | Window object monitoring and processing method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1995035535A1 (en) * | 1994-06-17 | 1995-12-28 | Intel Corporation | Apparatus and method for application sharing in a graphic user interface |
US20060190826A1 (en) * | 2005-02-22 | 2006-08-24 | Elaine Montgomery | Methods and apparatuses for dynamically sharing a portion of a display during a collaboration session |
US8407605B2 (en) * | 2009-04-03 | 2013-03-26 | Social Communications Company | Application sharing |
CN101539856B (en) * | 2008-03-17 | 2013-01-16 | 国际商业机器公司 | Method and device for restoring overlapped window in application sharing software |
US8898577B2 (en) * | 2010-03-09 | 2014-11-25 | Microsoft Corporation | Application sharing with occlusion removal |
-
2021
- 2021-02-22 CN CN202110195632.8A patent/CN112559110B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112559110A (en) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9555544B2 (en) | Robotic process automation | |
WO2020224122A1 (en) | Video monitoring method and apparatus, computer device, and storage medium | |
EP3614317A1 (en) | Robotic process automation | |
US10657036B2 (en) | Determining visual testing coverages | |
US20140189576A1 (en) | System and method for visual matching of application screenshots | |
US20140325482A1 (en) | Method for creating a label | |
CN108491729B (en) | Method and device for dynamically protecting user privacy in android system | |
CN104391797A (en) | GUI (graphical user interface) widget identification method and device | |
CN107710280B (en) | Object visualization method | |
CN111179268B (en) | Abnormality detection method and device for vehicle-mounted terminal and vehicle-mounted terminal | |
RU2713876C1 (en) | Method and system for detecting alarm events when interacting with self-service device | |
CN104246696B (en) | application automation based on image | |
CN112559110B (en) | Window penetration method of magnifying glass based on windows system | |
CN111488109A (en) | Method, device, terminal and storage medium for acquiring control information of user interface | |
WO2017001560A1 (en) | Robotic process automation | |
US20220229764A1 (en) | Automated test replay with sensitive information obfuscation | |
WO2008097222A2 (en) | System and method for video-processing algorithm improvement | |
RU2611961C2 (en) | Method and system of regression testing of web page functionality, machine-readable data storage media | |
US7007241B2 (en) | Display device with a focus buoy facility | |
CN108845924B (en) | Control response area display control method, electronic device, and storage medium | |
CN115205087A (en) | Screen watermark generation method, system, device and storage medium | |
US11403209B2 (en) | Rendering GUI test object of application under test to reflect test information | |
CN113378139B (en) | Interface content peep-proof method, device, equipment and storage medium | |
CN116522299A (en) | Application program window watermark adding method and device based on Linux system | |
CN107491778B (en) | Intelligent device screen extraction method and system based on positioning image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |