TWI666584B - Electronic device and operation method thereof - Google Patents

Electronic device and operation method thereof Download PDF

Info

Publication number
TWI666584B
TWI666584B TW107114629A TW107114629A TWI666584B TW I666584 B TWI666584 B TW I666584B TW 107114629 A TW107114629 A TW 107114629A TW 107114629 A TW107114629 A TW 107114629A TW I666584 B TWI666584 B TW I666584B
Authority
TW
Taiwan
Prior art keywords
encryption layer
electronic device
touch screen
desktop
display
Prior art date
Application number
TW107114629A
Other languages
Chinese (zh)
Other versions
TW201939255A (en
Inventor
梁小君
Original Assignee
緯創資通股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 緯創資通股份有限公司 filed Critical 緯創資通股份有限公司
Application granted granted Critical
Publication of TWI666584B publication Critical patent/TWI666584B/en
Publication of TW201939255A publication Critical patent/TW201939255A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本揭露提供一種電子裝置及其運作方法。所述運作方法包括:啟動觸控螢幕以及覆蓋至少一層加密層。所述加密層包括對應於觸控螢幕的顯示桌面的區域特性。顯示桌面包括多個桌面區域,並且區域特性決定各個桌面區域中的物件覆蓋了加密層後的權限。The disclosure provides an electronic device and an operation method thereof. The operation method includes: activating a touch screen and covering at least one encryption layer. The encryption layer includes a region characteristic of a display desktop corresponding to a touch screen. The display desktop includes multiple desktop areas, and the area characteristics determine the permissions of the objects in each desktop area after covering the encryption layer.

Description

電子裝置及其運作方法Electronic device and operation method thereof

本揭露是有關於一種電子裝置及其運作方法。This disclosure relates to an electronic device and a method for operating the same.

現今諸如智慧型手機等行動電子裝置中,在啟動螢幕後會進入解鎖介面,使用者必須要在解鎖介面中輸入正確的解碼,才能夠進入桌面看到其中的應用程式並進行操作。這樣的解鎖介面主要作用在於防止他人存取或操作行動電子裝置中重要的資料或應用程式。在日常生活的使用中,解鎖介面與其操作在一天之中可能會發生數十、甚至是數百次。In today's mobile electronic devices such as smart phones, the unlock interface is entered after the screen is activated. The user must enter the correct decode in the unlock interface to be able to enter the desktop to see the applications and perform operations. The main purpose of such an unlocking interface is to prevent others from accessing or operating important data or applications in the mobile electronic device. In daily use, the unlocking interface and its operation may occur dozens or even hundreds of times in a day.

然而,在行動電子裝置中並非是所有的資料或應用程式不能公開給所有人。舉例而言,一些時間、天氣等資訊程式或遊戲程式可能是可以允許所有人操作,而這些資訊或程式也可能是被點擊使用的。在上述的情況當中,解鎖介面就顯得多餘且繁瑣。However, not all data or applications on mobile electronic devices are not available to everyone. For example, some time or weather information programs or game programs may allow everyone to operate, and these information or programs may also be clicked and used. In these cases, unlocking the interface is redundant and cumbersome.

有鑑於此,本揭露實施例提供一種電子裝置及其運作方法,能夠分別針對不同的資訊內容或應用程式進行加鎖或設定權限,提升彈性與便利性,又同時確保安全性。In view of this, the embodiments of the present disclosure provide an electronic device and an operation method thereof, which can respectively lock or set permissions for different information content or application programs, improve flexibility and convenience, and at the same time ensure security.

本揭露實施例提出一種電子裝置運作方法,包括:啟動觸控螢幕以及覆蓋至少一層加密層。所述加密層包括對應於觸控螢幕的顯示桌面的區域特性。顯示桌面包括多個桌面區域,並且區域特性決定各個桌面區域中的物件覆蓋了加密層後的權限。An embodiment of the disclosure provides a method for operating an electronic device, including: activating a touch screen and covering at least one encryption layer. The encryption layer includes a region characteristic of a display desktop corresponding to a touch screen. The display desktop includes multiple desktop areas, and the area characteristics determine the permissions of the objects in each desktop area after covering the encryption layer.

從另一觀點來看,本揭露實施例提出一種電子裝置,包括儲存裝置、觸控螢幕以及耦接於儲存裝置與觸控螢幕的處理器。儲存裝置用以記錄至少一層加密層,其中所述加密層包括對應於觸控螢幕的顯示桌面的區域特性。觸控螢幕用以顯示顯示桌面,其中顯示桌面包括多個桌面區域,並且區域特性決定各個桌面區域中的物件覆蓋加密層後的權限。處理器用以啟動觸控螢幕以及覆蓋至少一層加密層。From another perspective, an embodiment of the disclosure provides an electronic device including a storage device, a touch screen, and a processor coupled to the storage device and the touch screen. The storage device is used to record at least one encryption layer, wherein the encryption layer includes an area characteristic of a display desktop corresponding to a touch screen. The touch screen is used to display a display desktop. The display desktop includes multiple desktop areas, and the area characteristics determine the permissions of objects in each desktop area after the encryption layer is overlaid. The processor is used to activate the touch screen and cover at least one encryption layer.

從又另一觀點來看,本揭露實施例提出一種非暫態電腦可讀取媒體,儲存有程式碼,當所述程式碼被載入至電腦並執行後,可完成電子裝置的運作方法。所述運作方法包括:啟動觸控螢幕以及覆蓋至少一層加密層。所述加密層包括對應於觸控螢幕的顯示桌面的區域特性。顯示桌面包括多個桌面區域,並且區域特性決定各個桌面區域中的物件覆蓋了加密層後的權限。From another point of view, the embodiment of the present disclosure proposes a non-transitory computer-readable medium, which stores a program code. When the program code is loaded into the computer and executed, the operation method of the electronic device can be completed. The operation method includes: activating a touch screen and covering at least one encryption layer. The encryption layer includes a region characteristic of a display desktop corresponding to a touch screen. The display desktop includes multiple desktop areas, and the area characteristics determine the permissions of the objects in each desktop area after covering the encryption layer.

本揭露實施例提出一種電子裝置運作方法,用以透過觸控螢幕解鎖電子裝置。所述運作方法包括:藉由觸控螢幕依序接收多條軌跡;以及依據所述多條軌跡的有序角度變化判斷是否解鎖電子裝置。The embodiment of the disclosure provides a method for operating an electronic device for unlocking the electronic device through a touch screen. The operation method includes: sequentially receiving a plurality of tracks through a touch screen; and determining whether to unlock the electronic device according to an orderly angle change of the plurality of tracks.

從另一觀點來看,本揭露實施例提出一種電子裝置,包括觸控螢幕以及耦接於觸控螢幕的處理器。所述處理器用以:藉由觸控螢幕依序接收多條軌跡;以及依據所述多條軌跡的有序角度變化判斷是否解鎖電子裝置。From another perspective, an embodiment of the disclosure provides an electronic device including a touch screen and a processor coupled to the touch screen. The processor is configured to: sequentially receive multiple trajectories through a touch screen; and determine whether to unlock the electronic device according to an orderly angle change of the multiple trajectories.

從又另一觀點來看,本揭露實施例提出一種非暫態電腦可讀取媒體,儲存有程式碼,當所述程式碼被載入至電腦並執行後,可完成電子裝置的運作方法。所述運作方法用以透過觸控螢幕解鎖電子裝置,並且包括:藉由觸控螢幕依序接收多條軌跡;以及依據所述多條軌跡的有序角度變化判斷是否解鎖電子裝置。From another point of view, the embodiment of the present disclosure proposes a non-transitory computer-readable medium, which stores a program code. When the program code is loaded into the computer and executed, the operation method of the electronic device can be completed. The operation method is used to unlock the electronic device through the touch screen, and includes: sequentially receiving a plurality of tracks through the touch screen; and determining whether to unlock the electronic device according to the orderly angle change of the plurality of tracks.

基於上述,本揭露實施例所提供的電子裝置及其運作方法,覆蓋一或多層加密層以提供顯示桌面,再讓使用者自行解開特定的加密層使其失效。據此,能夠針對不同的資訊內容或應用程式進行加鎖或設定權限,提升彈性與便利性,又同時確保安全性。本揭露實施例所提供的電子裝置及其運作方法更利用多條軌跡之間的有序角度變化來作為是否解鎖的判斷依據。據此,使用者能夠以任何角度來直觀的解鎖電子裝置。Based on the above, the electronic device and its operation method provided in the embodiments of the present disclosure cover one or more encryption layers to provide a display desktop, and then allow the user to unlock a specific encryption layer and make it invalid. According to this, it is possible to lock or set permissions for different information content or applications, improving flexibility and convenience, while ensuring security. The electronic device and the operation method thereof provided in the embodiments of the present disclosure further use an orderly angle change between multiple trajectories as a judgment basis for unlocking. Accordingly, the user can intuitively unlock the electronic device at any angle.

為讓本揭露的上述特徵和優點能更明顯易懂,下文特舉實施例,並配合所附圖式作詳細說明如下。In order to make the above-mentioned features and advantages of the present disclosure more comprehensible, embodiments are described below in detail with reference to the accompanying drawings.

本揭露的實施例中,透過一或多層加密層的來對電子裝置的操作方式進行定義。概略來說,加密層是用以覆蓋顯示桌面的內容,且各層加密層的不同區域具有不同的覆蓋特性。如此一來,層層覆蓋的加密層便決定了顯示桌面中的內容是否可視或可操作。在一些實施例中,不同的加密層對應於不同的解鎖手勢,因此使用者能夠利用手勢來選擇性地解鎖加密層以使其失效。以下將舉實施例來對本揭露實施例的電子裝置及其運作方法進行更詳細的說明。In the embodiment of the present disclosure, the operation mode of the electronic device is defined by one or more encryption layers. In summary, the encryption layer is used to cover the contents of the display desktop, and different areas of the encryption layer of each layer have different coverage characteristics. In this way, the encryption layer covered by the layers determines whether the content in the display desktop is visible or operable. In some embodiments, different encryption layers correspond to different unlock gestures, so a user can use gestures to selectively unlock the encryption layer to disable it. The embodiments below are used to describe the electronic device and the operation method thereof in the embodiments of the present disclosure in more detail.

圖1繪示本揭露一實施例的電子裝置的方塊圖。請參照圖1,在一實施例中,電子裝置100例如為智慧型手機或平板電腦等可攜式電子裝置,但本揭露並不在此限。電子裝置100包括儲存裝置110、觸控螢幕120以及處理器130,其中,處理器130耦接於儲存裝置110以及觸控螢幕120。FIG. 1 is a block diagram of an electronic device according to an embodiment of the disclosure. Referring to FIG. 1, in an embodiment, the electronic device 100 is, for example, a portable electronic device such as a smart phone or a tablet computer, but the disclosure is not limited thereto. The electronic device 100 includes a storage device 110, a touch screen 120, and a processor 130. The processor 130 is coupled to the storage device 110 and the touch screen 120.

儲存模組110用以儲存電子裝置100的各種資料,例如是應用程式、捷徑、資料夾與對應的圖示,以及加解密的相關資料等。在一實施例中,儲存裝置110包括硬碟、用於儲存短時間使用的程序的隨機存取記憶體(Random Access Memory, RAM)與用於儲存資料、作業系統或作為系統快取的唯讀記憶體(Read-Only Memory, ROM)等,但本揭露不限於此。在其他實施例中,儲存裝置110更包括其他用以記錄資料的儲存媒介。The storage module 110 is used to store various data of the electronic device 100, such as applications, shortcuts, folders and corresponding icons, and related data such as encryption and decryption. In one embodiment, the storage device 110 includes a hard disk, a random access memory (RAM) for storing programs used for a short period of time, and a read-only storage for storing data, an operating system, or a system cache. Memory (Read-Only Memory, ROM), etc., but this disclosure is not limited to this. In other embodiments, the storage device 110 further includes other storage media for recording data.

觸控螢幕120是用以接收來自處理器130的圖像訊號或影音訊號,並且將所接收的圖像訊號或影音訊號顯示出來。觸控螢幕120例如是液晶顯示螢幕或其他各種類型的觸控螢幕。舉例來說,觸控螢幕120例如是在顯示面板上覆蓋一層壓力感測層,當有壓力施於其上時,便會產生電流訊號或電阻變化以定出壓力產生的位置。據此,觸控螢幕120在顯示圖像或影音的同時,還附帶有觸控輸入的功能。又例如,觸控螢幕120可以是利用電極放電在顯示面板上產生均勻電場。當導電物質接近於面板時,面板上的電容量便會產生差異,以此來計算出導電物質在面板上的位置。換句話說,觸控螢幕120可以是電阻式、電容式等類型的觸控螢幕,本揭露不在此限。The touch screen 120 is used to receive an image signal or a video signal from the processor 130 and display the received image signal or a video signal. The touch screen 120 is, for example, a liquid crystal display screen or other various types of touch screens. For example, the touch screen 120 is, for example, covered with a pressure sensing layer on the display panel. When pressure is applied to it, a current signal or a resistance change is generated to determine the location where the pressure is generated. Accordingly, while the touch screen 120 displays an image or a video, it also has a touch input function. As another example, the touch screen 120 may use an electrode discharge to generate a uniform electric field on the display panel. When the conductive substance is close to the panel, the capacitance on the panel will be different, so as to calculate the position of the conductive substance on the panel. In other words, the touch screen 120 may be a touch screen of a resistive type, a capacitive type, or the like, which is not limited in this disclosure.

處理器130耦接至儲存裝置110以及觸控螢幕120,用以控制電子裝置100的整體運作。在一實施例中,處理器130可例如是雙核心、四核心或八核心等各類型的中央處理器(central processing unit, CPU)、系統晶片(system-on-chip, SOC)、應用處理器(application processor)、媒體處理器(media processor)、微處理器(microprocessor)、數位信號處理器(digital signal processor)或其他類似者,本揭露不在此限制實作時所使用的處理器類型。The processor 130 is coupled to the storage device 110 and the touch screen 120 to control the overall operation of the electronic device 100. In an embodiment, the processor 130 may be, for example, a central processing unit (CPU), a system-on-chip (SOC), or an application processor, such as a dual-core, quad-core, or octa-core. (application processor), media processor, microprocessor, digital signal processor, or the like, this disclosure does not limit the type of processor used in implementation.

以下將藉由圖1實施例所介紹的電子裝置100中的各項元件來對本揭露之電子裝置的運作方法進行說明。The operation method of the electronic device disclosed in this disclosure will be described below by using various components in the electronic device 100 described in the embodiment of FIG. 1.

《加密層》Encryption Layer

圖2繪示本揭露一實施例中加密層及其區域特性的示意圖。請參考圖2,在本實施例中,未覆蓋加密層的顯示桌面例如為桌面D0,其中至少包括三個桌面區域A、B與C,各個區域中例如包括小部件(widget)、資訊與至少一個應用程式的其中之一或其組合。在未覆蓋任何加密層時,桌面D0上的區域A、B與C中的物件權限皆為「顯示且可執行」。換言之,使用者可以看到位於區域A、B與C中的所有內容,並且可點擊其中的部件或應用程式來執行之。在其他實施例中,覆蓋了加密層後各區域中的物件的權限可能會發生改變,包括改變為「顯示且不可執行」或「不顯示且不可執行」等,但本揭露並不以此為限。詳細來說,「顯示且不可執行」的物件權限表示使用者可以透過觸控螢幕120看到物件,但點擊物件時處理器130將判斷為無操作,因此使用者並不能夠透過點擊來進行存取或執行此物件;而「不顯示且不可執行」的物件權限則表示使用者並無法透過觸控螢幕120看到區域中的物件,區域中只顯示背景(例如,桌布)。FIG. 2 is a schematic diagram illustrating an encryption layer and its area characteristics according to an embodiment of the disclosure. Please refer to FIG. 2. In this embodiment, the display desktop that does not cover the encryption layer is, for example, desktop D0, which includes at least three desktop areas A, B, and C. Each area includes, for example, widgets, information, and at least One or a combination of an application. When no encryption layer is covered, the object permissions in areas A, B, and C on the desktop D0 are "display and executable". In other words, the user can see everything in areas A, B, and C, and can click on the widget or application to execute it. In other embodiments, the permissions of objects in various areas may be changed after covering the encryption layer, including changing to "display and unexecutable" or "not display and unexecutable", but this disclosure does not take this as limit. In detail, the "display and not executable" object permission means that the user can see the object through the touch screen 120, but the processor 130 will judge that there is no operation when the object is clicked, so the user cannot save it by clicking. Fetch or execute this object; the object permissions of "not displayed and not executable" means that the user cannot see the objects in the area through the touch screen 120, and only the background (for example, wallpaper) is displayed in the area.

加密層包括了對應於顯示桌面的區域特性。在一實施例中,加密層L1對應於區域A的區域特性是類似於中空窗(圖2中以白色表示),對應於區域B的區域特性是類似於不透明窗(圖2中以黑色表示),而對應其他區域的區域特性則是類似於透明窗(圖2中以灰色表示)。The encryption layer includes region characteristics corresponding to the display desktop. In one embodiment, the area characteristic of the encryption layer L1 corresponding to the area A is similar to a hollow window (shown in white in FIG. 2), and the area characteristic corresponding to the area B is similar to an opaque window (shown in black in FIG. 2) The area characteristics corresponding to other areas are similar to transparent windows (indicated by gray in Figure 2).

詳細來說,類似於中空窗的區域特性使得加密層覆蓋至桌面後,桌面上對應區域中的物件並不會被覆蓋,使此些物件的權限不變;類似於透明窗的區域特性使得加密層覆蓋至桌面後,桌面上對應區域中的物件的可顯示但不可執行;而類似於不透明窗的區域特性使得加密層覆蓋至桌面後,桌面上對應區域中的物件的不顯示也不可執行。In detail, the area characteristics similar to the hollow window make the encryption layer cover the desktop, and the objects in the corresponding area on the desktop will not be covered, making the permissions of these objects unchanged; the area characteristics similar to the transparent window make encryption After the layer is overlaid on the desktop, the objects in the corresponding area on the desktop can be displayed but not executable; while the area characteristics similar to opaque windows make the encryption layer overlaid on the desktop, the objects in the corresponding area on the desktop are not displayed or executable.

在一實施例中,當加密層L1覆蓋至桌面D0後形成桌面D1,桌面D1的區域A相當於覆蓋了中空窗,因此其中的物件權限為「顯示且可執行」,區域B相當於覆蓋了不透明窗,因此其中的物件權限為「不顯示且不可執行」,而區域C相當於覆蓋了透明窗,因此其中的物件權限皆為「顯示且不可執行」。In an embodiment, the desktop D1 is formed after the encryption layer L1 is covered on the desktop D0. The area A of the desktop D1 is equivalent to covering the hollow window, so the object permissions therein are "display and executable", and the area B is equivalent to covering The opaque window, so the object permissions in it are "not displayed and not executable", and the area C is equivalent to covering the transparent window, so the object permissions in it are all "display and not executable".

另一方面,加密層L2對應於區域A的區域特性是類似於不透明窗,對應於區域B的區域特性則是類似於透明窗,而對應於區域C的區域特性是類似於中空窗。On the other hand, the area characteristics of the encryption layer L2 corresponding to area A are similar to opaque windows, the area characteristics corresponding to area B are similar to transparent windows, and the area characteristics corresponding to area C are similar to hollow windows.

在一實施例中,當加密層L2覆蓋至桌面D0後形成桌面D2,桌面D2的區域A相當於覆蓋了不透明窗,因此其中的物件權限為「不顯示且不可執行」,區域B相當於覆蓋了透明窗,因此其中的物件權限為「顯示且不可執行」,而區域C相當於覆蓋了中空窗,因此其中的物件權限為「顯示且可執行」。In one embodiment, the desktop D2 is formed after the encryption layer L2 is covered on the desktop D0. The area A of the desktop D2 is equivalent to covering the opaque window. Therefore, the object permissions therein are "not displayed and not executable", and the area B is equivalent to covering. Since the transparent window is set, the object permissions in it are "displayed and unexecutable", and area C is equivalent to covering the hollow window, so the object permissions in it are "displayed and executable".

在一實施例中,當加密層L1與加密層L2同時覆蓋至桌面D0後形成桌面D12,桌面D12的區域A相當於覆蓋了中空窗以及不透明窗,因此其中的物件權限為「不顯示且不可執行」,區域B相當於覆蓋了不透明窗以及透明窗,因此其中的物件權限為「不顯示且不可執行」,而區域C相當於覆蓋了透明窗以及中空窗,因此其中的物件權限為「顯示且不可執行」。In an embodiment, when the encryption layer L1 and the encryption layer L2 cover the desktop D0 at the same time, a desktop D12 is formed. The area A of the desktop D12 is equivalent to covering the hollow window and the opaque window. Therefore, the object permissions therein are "not displayed and cannot "Execute", area B is equivalent to covering opaque windows and transparent windows, so the object permissions in it are "not displayed and not executable", and area C is equivalent to covering transparent windows and hollow windows, so the object permissions in it are "display And not enforceable. "

特別是,加密層L1與加密層L2可分別對應於不同的解鎖方式,藉由此些解鎖方式,使用者便能夠決定電子裝置100觸控螢幕120是顯示桌面D0、桌面D1、桌面D2或桌面D12。在一實施例中,上述的各個加密層與其對應的解鎖方式是記錄於儲存裝置110中,但不在此限。詳細來說,在顯示桌面D12時,使用者可輸入對應於加密層L1的解鎖方式來使加密層L1失效以顯示桌面D2,或在顯示桌面D12時輸入對應於加密層L2的解鎖方式來使加密層L2失效以顯示桌面D1,或在顯示桌面D12時輸入對應於加密層L1的解鎖方式以及加密層L2的解鎖方式來使加密層L1以及加密層L2都失效以顯示桌面D0。值得一提的是,上述的多種解鎖方式例如是對應於在觸控螢幕120上的多個不同的輸入軌跡、對應於不同的認證指紋、認證手勢或聲紋等,以下將舉例說明之,但本揭露並不限於此。In particular, the encryption layer L1 and the encryption layer L2 can respectively correspond to different unlocking methods. With these unlocking methods, the user can determine whether the touch screen 120 of the electronic device 100 displays the desktop D0, the desktop D1, the desktop D2, or the desktop. D12. In one embodiment, the above-mentioned respective encryption layers and their corresponding unlocking methods are recorded in the storage device 110, but not limited thereto. In detail, when the desktop D12 is displayed, the user may enter the unlocking method corresponding to the encryption layer L1 to disable the encryption layer L1 to display the desktop D2, or enter the unlocking method corresponding to the encryption layer L2 to display the desktop D12 to enable The encryption layer L2 is invalidated to display the desktop D1, or when the desktop D12 is displayed, an unlock mode corresponding to the encryption layer L1 and an unlock mode of the encryption layer L2 are input to disable both the encryption layer L1 and the encryption layer L2 to display the desktop D0. It is worth mentioning that the above-mentioned multiple unlocking methods correspond to, for example, multiple different input tracks on the touch screen 120, corresponding to different authentication fingerprints, authentication gestures or voiceprints, etc., which will be exemplified below, but This disclosure is not limited to this.

在一實施例中,上述的多種解鎖方式例如是多個不同的輸入軌跡,而各個輸入軌跡分別是用於解鎖其中一個加密層。例如,第一輸入軌跡是用以解鎖加密層L1,且第二輸入軌跡是用以解鎖加密層L2,則使用者輸入第一輸入軌跡時加密層L1會被解鎖而失效,而使用者輸入第二輸入軌跡時加密層L2會被解鎖而失效。In one embodiment, the foregoing multiple unlocking methods are, for example, multiple different input tracks, and each input track is used to unlock one of the encryption layers. For example, if the first input trajectory is used to unlock the encryption layer L1 and the second input trajectory is used to unlock the encryption layer L2, when the user enters the first input trajectory, the encryption layer L1 is unlocked and becomes invalid, and the user enters the first When two trajectories are input, the encryption layer L2 will be unlocked and become invalid.

在一實施例中,上述的多種解鎖方式例如是多個不同的認證指紋,而各個認證指紋分別是用於解鎖其中一個加密層。例如,使用者的右手拇指指紋是用以解鎖加密層L1,且使用者的右手食指指紋是用以解鎖加密層L2,則當使用者以右手拇指指紋來通過認證時,加密層L1會被解鎖而失效,而當使用者以右手食指指紋來通過認證時,加密層L2會被解鎖而失效。如此一來,使用者能夠利用認證時所使用的手指來控制觸控螢幕120所顯示的內容。In one embodiment, the foregoing multiple unlocking methods are, for example, multiple different authentication fingerprints, and each authentication fingerprint is used to unlock one of the encryption layers, respectively. For example, the fingerprint of the user's right thumb is used to unlock the encryption layer L1, and the fingerprint of the user's right index finger is used to unlock the encryption layer L2. When the user passes the authentication with the fingerprint of the right thumb, the encryption layer L1 will be unlocked However, when the user uses the fingerprint of the right index finger to pass the authentication, the encryption layer L2 is unlocked and becomes invalid. In this way, the user can control the content displayed on the touch screen 120 with a finger used during authentication.

值得一提的是,本揭露的加密層並不限於圖2實施例中的加密層L1與加密層L2,且其所對應的區域也不限於區域A、B與C。在其他實施例中,加密層可具有更多種類的區域特性,以決定覆蓋後桌面對應區域中的物件的更多權限,本揭露並不限於此。舉例來說,除了對應於上述實施例中的三種權限之外,物件還可例如以其所能夠被存取的程度(例如,僅限應用程式中特定功能可被執行等)來定義出更多的權限。換言之,本揭露並不在此限制加密層的組態。It is worth mentioning that the encryption layer disclosed in this disclosure is not limited to the encryption layer L1 and the encryption layer L2 in the embodiment of FIG. 2, and the corresponding areas are not limited to the areas A, B, and C. In other embodiments, the encryption layer may have more types of regional characteristics to determine more permissions of objects in the corresponding area of the desktop after coverage, and the disclosure is not limited thereto. For example, in addition to corresponding to the three permissions in the above embodiment, an object can also define more by, for example, the degree to which it can be accessed (for example, only certain functions in an application can be performed, etc.) permission. In other words, this disclosure does not limit the configuration of the encryption layer here.

《產生加密層》"Generating the Encryption Layer"

使用者可透過觸控螢幕120來設定電子裝置100的一或多層加密層。在一實施例中,使用者例如是直接對各加密層設定其多個區域各自的區域特性。以圖2實施例為例,使用者可例如以最左上角與最右下角的座標來設定加密層L1對應矩形區域A處的區域特性,以座標來設定加密層L1對應矩形區域B處的區域特性,並且以座標來設定加密層L1對應矩形區域C處的區域特性。在其他實施例中,使用者也可例如是設定圓心座標與半徑長度來設定加密層對應特定區域的區域特性。換言之,本揭露並不在此限制在設定加密層的各個區域特性時的具體實作方法,所屬領域具備通常知識者當可依其需求來加以實施。The user can set one or more encryption layers of the electronic device 100 through the touch screen 120. In one embodiment, for example, the user directly sets the region characteristics of each of the plurality of regions for each encryption layer. Taking the embodiment in FIG. 2 as an example, the user can set the area characteristics of the encryption layer L1 corresponding to the rectangular area A by using the coordinates of the upper-left corner and the lower-right corner, and set the area of the encryption layer L1 corresponding to the rectangular area B by using the coordinates. Characteristics, and set the area characteristics of the encryption layer L1 corresponding to the rectangular area C with coordinates. In other embodiments, the user may also set the center coordinates and the radius length to set the area characteristics of the encryption layer corresponding to the specific area. In other words, this disclosure does not limit the specific implementation method when setting the characteristics of each area of the encryption layer. Those with ordinary knowledge in the field can implement it according to their needs.

在一實施例中,使用者亦可例如是針對物件(例如,部件或應用程式)來設定物件在不同加密層中的權限,再由處理器130來計算各加密層的多個區域各自的區域特性。詳細來說,使用者在針對各個應用程式設定其在各層加密層中的權限後,處理器130會根據使用者的設定來給予各個應用程式特定的標記(例如,包括圖示區域與在各加密層中的權限等),並且記錄於儲存裝置110中。在一實施例中,各個應用程式的矩形圖示區域可例如以最左上角的座標以及最右下角的座標來被記錄,而各個應用程式在各層加密層中的權限可例如是以2個位元來定義,例如,「顯示且可執行」定義為「11」,「顯示且不可執行」定義為「00」,而「不顯示且不可執行」定義為「10」。In an embodiment, the user can also set the permissions of the object in different encryption layers for the object (for example, a component or an application), and the processor 130 can calculate the respective areas of the multiple areas of each encryption layer. characteristic. In detail, after the user sets the permissions in each encryption layer for each application, the processor 130 will give each application a specific mark (for example, including the icon area and the Layer, etc.), and recorded in the storage device 110. In an embodiment, the rectangular icon area of each application can be recorded, for example, with the coordinates of the upper-left corner and the coordinates of the lower-right corner, and the authority of each application in each encryption layer can be, for example, 2 bits. For example, "display and executable" is defined as "11", "display and executable" is defined as "00", and "not displayed and executable" is defined as "10".

舉例而言,各個應用程式例如被賦予一個標記,標記結構包括文件頭、應用程式標識、縱座標、橫坐標、多層加密層標記以及文件尾等部分。文件頭例如包括8位元,用以識別標記的序號;應用程式標識例如包括8位元,用以識別此應用程式的編號;縱座標例如包括16位元,其中前8個位元用以表示此應用程式的矩形圖示區域的縱軸起始位置,後8個位元用以表示此應用程式的矩形圖示區域的縱軸終結位置;橫座標例如包括16位元,其中前8個位元用以表示此應用程式的矩形圖示區域的橫軸起始位置,後8個位元用以表示此應用程式的矩形圖示區域的橫軸終結位置;文件尾例如包括12位元,用以記錄校驗碼等資訊。For example, each application is given a mark. The mark structure includes a file header, an application identifier, an ordinate, an abscissa, a multi-layer encryption layer mark, and a file end. The file header includes, for example, 8 bits to identify the serial number of the mark; the application identifier includes, for example, 8 bits to identify the number of the application; the vertical coordinate includes, for example, 16 bits, where the first 8 bits are used to indicate The starting position of the vertical axis of the rectangular icon area of this application, the last 8 bits are used to indicate the ending position of the vertical axis of the rectangular icon area of this application; the horizontal coordinates include, for example, 16 bits, of which the first 8 bits The element is used to indicate the starting position of the horizontal axis of the rectangular icon area of this application, and the last 8 bits are used to indicate the end of the horizontal axis of the rectangular icon area of this application; the end of the file includes 12 bits, for example, To record information such as check codes.

應用程式在各層加密層中的權限利用多層加密層標記來進行定義。以圖2實施例來說,區域A中的物件(例如,第一應用程式)的權限例如是設定為「1110」,以前兩個位元「11」來表示物件在第一層加密層L1中的權限為「顯示且可執行」,以及以後兩個位元「10」來表示物件在第二層加密層L2中的權限為「不顯示且不可執行」;區域B中的物件(例如,第二應用程式)的權限例如是設定為「1000」,以前兩個位元「10」來表示物件在第一層加密層L1中的權限為「不顯示且不可執行」,以及以後兩個位元「00」來表示物件在第二層加密層L2中的權限為「顯示且不可執行」;區域C中的物件(例如,第三應用程式)的權限例如是設定為「0011」,以前兩個位元「00」來表示物件在第一層加密層L1中的權限為「顯示且不可執行」,以及以後兩個位元「11」來表示物件在第二層加密層L2中的權限為「顯示且可執行」。The permissions of the application in each encryption layer are defined using multiple encryption layer tags. In the embodiment of FIG. 2, the permission of the object (for example, the first application) in the area A is set to “1110”, for example, the previous two bits “11” indicate that the object is in the first encryption layer L1. The permission of the display is "executable" and the next two bits "10" indicate that the permission of the object in the second encryption layer L2 is "not displayed and not executable"; the object in the area B (for example, the first Two applications) permissions are set to "1000", for example, the previous two bits "10" indicate that the object's permissions in the first encryption layer L1 are "not displayed and not executable", and the next two bits "00" to indicate that the permission of the object in the second encryption layer L2 is "show and cannot be executed"; the permission of the object (for example, the third application) in the area C is set to "0011", for example, the previous two Bit "00" to indicate that the object's permission in the first-level encryption layer L1 is "displayed and not executable", and the next two bits "11" to indicate that the object's permission in the second-level encryption layer L2 is " Show and execute. "

如此一來,在啟動或覆蓋加密層時,處理器130可根據解鎖方式或手勢(例如,觸控螢幕120所接收的輸入軌跡)判斷哪些加密層被解鎖或哪些加密層有效,再根據儲存裝置110中各個應用程式或各物件的標記,來產生並覆蓋對應的加密層。例如,當只有第一層加密層L1有效時,處理器130可根據第一應用程式的標記中的「1110」的前兩個位元「11」,來產生並覆蓋第一層加密層L1,以在第一應用程式的對應區域以類似中空窗的區域特性進行覆蓋,使其權限為「顯示且可執行」;根據第二應用程式標記中的「1000」的前兩個位元「10」,來產生並覆蓋第一層加密層L1,以在第二應用程式的對應區域以類似不透明窗的區域特性進行覆蓋,使其權限為「不顯示且不可執行」;根據第三應用程式標記中的「0011」的前兩個位元「00」,來產生並覆蓋第一層加密層L1,以在第三應用程式的對應區域以類似透明窗的區域特性進行覆蓋,使其權限為「顯示且不可執行」,以此類推。In this way, when activating or overlaying the encryption layer, the processor 130 may determine which encryption layer is unlocked or which encryption layer is valid according to the unlocking method or gesture (for example, the input track received by the touch screen 120), and then according to the storage device Mark each application or object in 110 to generate and cover the corresponding encryption layer. For example, when only the first encryption layer L1 is valid, the processor 130 may generate and cover the first encryption layer L1 according to the first two bits "11" of "1110" in the mark of the first application. In order to cover the corresponding area of the first application with a hollow window-like area characteristic, make its permission "display and executable"; according to the first two bits "10" of "1000" in the second application mark To generate and cover the first encryption layer L1 to cover the corresponding area of the second application with an area characteristic similar to an opaque window, so that its permission is "not displayed and not executable"; according to the third application mark The first two bits "00" of "0011" are used to generate and cover the first layer of encryption layer L1 to cover the corresponding area of the third application with a transparent window-like area characteristic so that its permission is "display" And not enforceable ", and so on.

在一實施例中,電子裝置100若未覆蓋任何加密層時是透過觸控函數(例如,函數「Touch()」)來識別觸控螢幕120上的各種輸入,例如在觸碰觸控螢幕120後短時間離開則可判斷為單擊或返回並輸出參數(例如,參數「Click」或參數「Return」),而在觸碰觸控螢幕120後較長時間離開則可判斷為長按並輸出參數(例如,參數「LongClick」)等。各個應用程式本身也透過應用程式函數(例如,函數「APPClick()」)來判斷是否運行應用程式。舉例來說,當觸控函數判斷在應用程式圖示範圍中接收到單擊時,會調用應用程式函數並賦予對應單擊的參數(例如,參數「Click」)給應用程式函數而生成值(例如,「APPClick(Click)」所對應的值),進而運行應用程式。In an embodiment, if the electronic device 100 is not covered with any encryption layer, various inputs on the touch screen 120 are identified by a touch function (for example, the function “Touch ()”), for example, when the touch screen 120 is touched. After leaving for a short time, it can be judged as clicking or returning and outputting a parameter (for example, the parameter "Click" or "Return"), and after leaving for a long time after touching the touch screen 120, it can be judged as long-pressing and outputting Parameters (for example, parameter "LongClick"), etc. Each application itself also uses an application function (for example, the function "APPClick ()") to determine whether to run the application. For example, when the touch function determines that a click is received in the application icon range, the application function is called and a parameter corresponding to the click (for example, the parameter "Click") is given to the application function to generate a value ( Such as "APPClick (Click)") to run the application.

在此實施例中,電子裝置100覆蓋加密層的操作例如是以新的觸控函數(例如,函數「TouchClick()」)來取代原有的觸控函數(例如,函數「Touch()」),以使對權限為「顯示且可執行」的應用程式的單擊或長按不變,使對權限為「顯示且不可執行」的應用程式的單擊或長按失效。In this embodiment, the operation of covering the encryption layer of the electronic device 100 is to replace the original touch function (for example, the function "Touch ()") with a new touch function (for example, the function "TouchClick ()"). , So that clicking or long-pressing on the application whose permission is "display and executable" is not changed, and clicking or long-pressing on the application whose permission is "display and executable" is invalid.

此外,於另一實施例中,當處理器130判斷某一應用程式在其中一個有效加密層中的權限為標記「10」的「不可顯示且不可執行」時,會勾選此應用程式的隱藏標記,應用程式的隱藏屬性即根據隱藏標記相應致能。當處理器130在解鎖上述有效加密層時,會先取消勾選此應用程式的隱藏標記,應用程式的隱藏屬性即根據隱藏標記相應禁能。In addition, in another embodiment, when the processor 130 determines that the permission of an application in one of the valid encryption layers is "not displayable and executable" marked with "10", it will check the hiding of this application Tag, the hidden attribute of the app is enabled according to the hidden tag. When the processor 130 unlocks the effective encryption layer, the hidden mark of the application is unchecked first, and the hidden attribute of the application is disabled according to the hidden mark accordingly.

如此一來,在得知當前是哪些加密層生效後,新的觸控函數(例如,函數「TouchClick()」)只要從儲存裝置110中取得各個應用程式的標記,便能夠依據各個應用程式的標記來決定各個應用程式當前的權限,以實現覆蓋加密層的效果。In this way, after knowing which encryption layers are currently in effect, the new touch function (for example, the function "TouchClick ()") can obtain the tags of each application from the storage device 110, and then can be based on the Mark to determine the current permissions of each application to achieve the effect of covering the encryption layer.

在一實施例中,使用者例如是透過長按並拖移來移動特定應用程式的圖示位置或改變其大小。此時,處理器130只需要修改儲存裝置110中對應此特定應用程式的標記(例如,修改縱座標以及橫坐標),以使新的觸控函數(例如,函數「TouchClick()」)在調用此特定應用程式的標記時能夠取得移動後的位置或改變後的大小。In an embodiment, the user moves or changes the icon position of a specific application by long pressing and dragging, for example. At this time, the processor 130 only needs to modify the mark corresponding to the specific application in the storage device 110 (for example, modify the ordinate and the abscissa) so that a new touch function (for example, the function “TouchClick ()”) is called This specific app can be used to get the position or size of the post-movement when it is changed.

值得一提的是,圖2實施例係將未設定標記的應用程式在各加密層中的預設權限為「顯示且不可執行」。也就是說,顯示桌面中沒有被設定的區域(例如,第一、第二與第三應用程式所對應的區域A、B、C以外的區域)中的物件的預設權限為「顯示且不可執行」,但本揭露並不限於此。It is worth mentioning that, in the embodiment of FIG. 2, the default permission of the application without the mark in each encryption layer is “display and not executable”. In other words, the default permission to display objects in areas that are not set on the desktop (for example, areas other than areas A, B, and C corresponding to the first, second, and third applications) is "display and cannot be Implementation ", but this disclosure is not limited to this.

圖3繪示本揭露一實施例的電子裝置運作方法的流程圖。請參照圖3,在步驟S310中,處理器130啟動觸控螢幕120,並且隨即進入步驟S320,啟動並覆蓋至少一個加密層並顯示顯示桌面。詳細來說,處理器130在啟動觸控螢幕120之後,不經過解鎖介面而直接顯示包括應用程式的顯示桌面。由於不顯示解鎖介面,當使用者在他人眼前操作電子裝置100時,他人並不能夠確實地分辨出正常操作與解鎖操作,進而能夠提升安全性。FIG. 3 is a flowchart illustrating an operation method of an electronic device according to an embodiment of the disclosure. Referring to FIG. 3, in step S310, the processor 130 activates the touch screen 120, and then proceeds to step S320 to activate and cover at least one encryption layer and display a display desktop. Specifically, after the touch screen 120 is activated, the processor 130 directly displays a display desktop including an application program without going through the unlocking interface. Since the unlocking interface is not displayed, when the user operates the electronic device 100 in front of others, the other person cannot reliably distinguish between the normal operation and the unlocking operation, thereby improving security.

必須注意的是,剛啟動觸控螢幕120時的加密層皆未失效,因此處理器130例如會從儲存裝置110中取得各個應用程式的標記來以前述段落所介紹的方式產生一或多層加密層,並且覆蓋所產生的加密層來顯示桌面。隨後,在步驟S330中,處理器130會藉由觸控螢幕120來接收輸入軌跡,並且在步驟S340中判斷所接收的輸入軌跡是否對應於至少一層加密層的其中之一。詳細來說,各加密層分別對應於一個輸入軌跡,處理器130會判斷在預設時間內所接收到的輸入軌跡是否對應於其中一個加密層。若是,則進入步驟S350,反之則回到步驟S330以繼續接收其他輸入軌跡。在步驟S350中,處理器130會解鎖輸入軌跡所對應的加密層,以使其失效,並且在步驟S360中根據尚未解鎖的加密層所包括的區域特性,藉由觸控螢幕120來提供顯示桌面。值得一提的是,在步驟S360中顯示桌面後,處理器130會回到步驟S330以繼續接收其他輸入軌跡。It must be noted that the encryption layer is not invalid when the touch screen 120 is just activated, so the processor 130 may obtain the mark of each application from the storage device 110 to generate one or more encryption layers in the manner described in the previous paragraph. , And overlay the resulting encryption layer to display the desktop. Subsequently, in step S330, the processor 130 receives the input trajectory through the touch screen 120, and determines in step S340 whether the received input trajectory corresponds to one of the at least one encryption layer. In detail, each encryption layer corresponds to an input trajectory, and the processor 130 determines whether the input trajectory received within a preset time corresponds to one of the encryption layers. If yes, go to step S350, otherwise go back to step S330 to continue receiving other input trajectories. In step S350, the processor 130 unlocks the encryption layer corresponding to the input trajectory to make it invalid, and in step S360, according to the area characteristics included in the encryption layer that has not been unlocked, the touch screen 120 is used to provide a display desktop. . It is worth mentioning that after the desktop is displayed in step S360, the processor 130 returns to step S330 to continue receiving other input tracks.

以圖2實施例為例,處理器130在步驟S310中啟動觸控螢幕120後,會在步驟S320中以前述實施例所介紹的方式來產生並覆蓋加密層L1以及加密層L2以顯示桌面D12。在桌面D12當中,使用者僅能夠看到區域C中的物件(例如,第三應用程式),並且整個桌面D12的所有物件都不可藉由點擊而執行。此時,處理器130例如在步驟S330中接收到輸入軌跡。若此輸入軌跡是對應於加密層L2,處理器130會在步驟S340中判斷所接收到的輸入軌跡是對應於加密層L2後,進入步驟S350來解鎖加密層L2,隨後在進入步驟S360以提供顯示桌面D1。此時,區域A中的物件(例如,第一應用程式)的權限是「顯示且可執行」,區域B的權限為「不顯示且不可執行」,例如是顯示背景(例如,桌布),且區域C中的物件(例如,第三應用程式)的權限是「顯示且不可執行」。換言之,使用者可以看見區域A與區域C中的物件(例如,第一應用程式與第三應用程式)但無法看見區域B中的物件(例如,第二應用程式),並且可以對區域A中的物件(例如,第一應用程式)進行點擊而執行。Taking the embodiment in FIG. 2 as an example, after the processor 130 starts the touch screen 120 in step S310, it will generate and cover the encryption layer L1 and the encryption layer L2 to display the desktop D12 in the manner described in the previous embodiment in step S320. . In the desktop D12, the user can only see the objects (for example, the third application) in the area C, and all the objects in the entire desktop D12 cannot be executed by clicking. At this time, the processor 130 receives the input trajectory, for example, in step S330. If the input trajectory corresponds to the encryption layer L2, the processor 130 determines that the received input trajectory corresponds to the encryption layer L2 in step S340, and proceeds to step S350 to unlock the encryption layer L2, and then proceeds to step S360 to provide Display desktop D1. At this time, the permissions of the objects in area A (for example, the first application) are "display and executable", and the permissions of area B are "not displayed and not executable", such as displaying the background (for example, wallpaper), and The permissions of the objects in area C (for example, the third application) are "show and not executable". In other words, the user can see the objects in area A and area C (for example, the first application and the third application) but cannot see the objects in area B (for example, the second application), and can view the objects in area A. Object (for example, the first app) to execute.

此時,處理器130例如可回到步驟S330中接收到另一個輸入軌跡。若處理器130在步驟S340中判斷所接收到的輸入軌跡不對應於任何加密層,則回到步驟S330;若處理器130在步驟S340中判斷所接收到的輸入軌跡是對應於加密層L1,則進入步驟S350以解鎖加密層L1,並在步驟S360中提供顯示桌面D0。此時,加密層已經全部被解鎖而失效,因此區域A、B與C以及桌面D0其他區域中的物件的權限皆是「顯示且可執行」。換言之,使用者可以看見區域A、B與C以及桌面D0的其他區域中的物件,並且可以對其中的物件進行點擊而執行。At this time, the processor 130 may return to, for example, receive another input track in step S330. If the processor 130 determines in step S340 that the received input trajectory does not correspond to any encryption layer, it returns to step S330; if the processor 130 determines in step S340 that the received input trajectory corresponds to the encryption layer L1, Then go to step S350 to unlock the encryption layer L1, and provide a display desktop D0 in step S360. At this point, the encryption layer has all been unlocked and invalidated, so the permissions of objects in areas A, B, and C and other areas of desktop D0 are "display and executable". In other words, the user can see the objects in the areas A, B, and C and other areas of the desktop D0, and can click and execute the objects in them.

值得一提的是,若觸控螢幕120被關閉,會在下一次重新啟動後重置所有的加密層(例如,啟動並覆蓋加密層L1以及加密層L2)以提供顯示桌面(例如,桌面D12)。It is worth mentioning that if the touch screen 120 is turned off, all encryption layers will be reset after the next restart (for example, the encryption layer L1 and the encryption layer L2 are activated and overlaid) to provide a display desktop (for example, desktop D12) .

《解鎖方式》"Unlocking Method"

如前段落所述,本揭露實施例中的各加密層可例如是對應於至少一個輸入軌跡以作為解鎖手段。在一實施例中,上述的輸入軌跡例如包括有順序的多條軌跡,而這些有順序的多條軌跡的有序角度變化將用以作為是否解鎖的參考,其中,有序角度變化至少包括角度變化方向以及角度變化大小兩種資訊。As mentioned in the previous paragraph, each encryption layer in the embodiment of the present disclosure may, for example, correspond to at least one input track as an unlocking means. In an embodiment, the above-mentioned input trajectory includes, for example, sequential multiple trajectories, and the ordered angular changes of the ordered multiple trajectories will be used as a reference for unlocking, wherein the ordered angular changes include at least an angle Two kinds of information: direction of change and angle change.

圖4繪示本揭露一實施例中解鎖電子裝置的示意圖。請參考圖4,一個加密層所對應的輸入軌跡TR例如是定義為中文字「天」,其中包括有順序的四條軌跡,且有序角度變化為「0度、順時針120度、逆時針60度」。因此,只要符合上述的有序角度變化,無論是以何種方向(如圖4所示的橫向(landscape)或縱向(portrait))操作電子裝置100,都能夠以手寫的「天」字作為此加密層的解鎖手段。FIG. 4 is a schematic diagram of unlocking an electronic device according to an embodiment of the disclosure. Please refer to FIG. 4. For example, the input trajectory TR corresponding to an encryption layer is defined as the Chinese character “天”, which includes four trajectories in order, and the order angle changes are “0 degrees, 120 degrees clockwise, 60 counterclockwise”. degree". Therefore, as long as the orderly angle change described above is met, no matter which direction (landscape or portrait) as shown in FIG. 4 is used to operate the electronic device 100, the handwritten “天” character can be used for this. The means of unlocking the encryption layer.

圖5繪示本揭露一實施例的軌跡的角度的示意圖。請參考圖5,為了判斷上述的有序角度變化,處理器130可例如是將軌跡區分八種,分別對應到數字1至8,如下表一所示。 數字 軌跡 1 由下到上,偏移角度不超過22.5度 2 由左下到右上,偏移角度不超過22.5度 3 由左到右,偏移角度不超過22.5度 4 由左上到右下,偏移角度不超過22.5度 5 由上到下,偏移角度不超過22.5度 6 由右上到左下,偏移角度不超過22.5度 7 由右到左,偏移角度不超過22.5度 8 由右下到左上,偏移角度不超過22.5度 表一 FIG. 5 is a schematic diagram illustrating an angle of a track according to an embodiment of the disclosure. Please refer to FIG. 5. In order to determine the above-mentioned orderly angle change, the processor 130 may, for example, distinguish eight types of trajectories, corresponding to the numbers 1 to 8, respectively, as shown in Table 1 below. digital Track 1 From bottom to top, the offset angle does not exceed 22.5 degrees 2 From lower left to upper right, the offset angle does not exceed 22.5 degrees 3 From left to right, the offset angle does not exceed 22.5 degrees 4 From top left to bottom right, the offset angle does not exceed 22.5 degrees 5 From top to bottom, the offset angle does not exceed 22.5 degrees 6 From top right to bottom left, the offset angle does not exceed 22.5 degrees 7 From right to left, the offset angle does not exceed 22.5 degrees 8 From bottom right to top left, the offset angle does not exceed 22.5 degrees Table I

在此實施例中所指的上、下、左、右各方向是指以縱向(landscape)使用電子裝置100時,使用者所感知的方向。The up, down, left, and right directions referred to in this embodiment refer to the directions perceived by the user when the electronic device 100 is used in a landscape orientation.

據此,電子裝置100以縱向操作時書寫的「天」可以對應到數字組「3364」(如圖4中左方顯示畫面),而有序角度變化可從其間的數字差來代表。具體來說,對應數字組「3364」的四個直線軌跡的有序角度變化可以「0、3、-2」來代表。也就是說,只要數字組間的數字差同樣為「0、3、-2」的所有數字組都可以對應到相同的有序角度變化,都可以判斷為「天」的輸入軌跡TR。According to this, the “day” written by the electronic device 100 when it is operated in the vertical direction can correspond to the number group “3364” (as shown on the left of the screen in FIG. 4), and the ordered angle change can be represented by the number difference between them. Specifically, the ordered angular changes of the four straight trajectories corresponding to the number group "3364" can be represented by "0, 3, -2". In other words, as long as the number difference between the digital groups is also "0, 3, -2", all the digital groups can correspond to the same orderly angular change, and can be judged as the input trajectory TR of "day".

舉例而言,電子裝置100以橫向操作時書寫的「天」可以對應到數字組「1142」(如圖4中右方顯示畫面),其數字差同樣為「0、3、-2」。值得一提的是,由於此實施例是將360度區分為8等分以定義八種直線軌跡,而順時針旋轉θ度與逆時針旋轉360-θ度的意義相同,因此數字差「x」與數字差「x-8」的意義相同。因此,數字組「2253」、「4475」、「5586」、「6617」、「7728」與「8831」所對應的直線軌跡都可以對應到「天」字的輸入軌跡TR。For example, the "day" written when the electronic device 100 is operated in a horizontal direction may correspond to the number group "1142" (as shown on the right of the screen in Fig. 4), and the number difference is also "0, 3, -2". It is worth mentioning that because this embodiment divides 360 degrees into 8 equal divisions to define eight kinds of straight trajectories, and the rotation of θ degrees clockwise has the same meaning as 360-θ degrees of counterclockwise rotation, so the number difference is "x" It has the same meaning as the number difference "x-8". Therefore, the linear trajectories corresponding to the number groups "2253", "4475", "5586", "6617", "7728" and "8831" can all correspond to the input trajectory TR of the word "天".

這樣的解鎖方式無須考慮電子裝置100的放置角度,能夠大幅提升便利性。另一方面,除了輸入「天」字,使用者還能夠在觸控螢幕120上依序輸入「一」、「一」、「人」三字或依序輸入「二」、「人」二字都可以達到解鎖的目的。據此,他人並無法得知正確的解鎖方式中的各個筆劃應是從何處起始又從何處結束,有迷惑性的效果,因而提升了裝置安全性。Such an unlocking method does not need to consider the placement angle of the electronic device 100, and can greatly improve convenience. On the other hand, in addition to inputting the word "天", the user can also input the three characters "one", "one", and "person" or the two characters "two" and "person" in sequence on the touch screen 120. Can achieve the purpose of unlocking. According to this, others cannot know where each stroke in the correct unlocking method should start and end, which has a confusing effect, thereby improving the security of the device.

圖6繪示本揭露一實施例的解鎖電子裝置的流程圖。請參考圖6,在步驟S610中,電子裝置100的處理器130會藉由觸控螢幕120來依序接收多條軌跡。在步驟S620中,處理器130會依據所接收的多條軌跡的有序角度變化來判斷是否解鎖電子裝置100。FIG. 6 is a flowchart of unlocking an electronic device according to an embodiment of the disclosure. Please refer to FIG. 6. In step S610, the processor 130 of the electronic device 100 receives a plurality of tracks sequentially through the touch screen 120. In step S620, the processor 130 determines whether to unlock the electronic device 100 according to the ordered angle changes of the received multiple trajectories.

在一實施例中,處理器130會設定一預設時間(例如但不限於,5秒)來依序接收多條軌跡。並且判斷預設時間內所接收的多條軌跡的有序角度變化是否對應到多個加密層的其中之一。以圖2的實施例來說,處理器130會判斷預設時間內所接收的多條軌跡是否對應到加密層L1或加密層L2,並且解鎖所接收的軌跡所對應的加密層L1或加密層L2以使其失效。換言之,本實施例所介紹的解鎖方式可以實作於圖3的步驟S330與步驟S340中。藉由本實施例所介紹的解鎖方式,無論使用者是以何種角度操作電子裝置100,都能夠直觀的進行解鎖。In one embodiment, the processor 130 sets a preset time (for example, but not limited to, 5 seconds) to sequentially receive multiple tracks. And it is determined whether the ordered angle change of the multiple trajectories received within a preset time corresponds to one of the multiple encryption layers. In the embodiment of FIG. 2, the processor 130 determines whether the multiple trajectories received within a preset time correspond to the encryption layer L1 or the encryption layer L2, and unlocks the encryption layer L1 or the encryption layer corresponding to the received trajectory. L2 to disable it. In other words, the unlocking method described in this embodiment can be implemented in steps S330 and S340 in FIG. 3. With the unlocking method described in this embodiment, no matter what angle the user operates the electronic device 100, the unlocking can be performed intuitively.

在本揭露的一實施例中更提出一種非暫態之電腦可讀取記錄媒體,其中記錄電腦程式。此電腦程式被用以執行上述的電子裝置運作方法的各個步驟。此電腦程式由多個程式碼片段所組成,這些程式碼片段在被載入至電子裝置並執行後,便可以執行上述電子裝置運作方法的步驟。In an embodiment of the present disclosure, a non-transitory computer-readable recording medium is further provided, in which a computer program is recorded. This computer program is used to perform each step of the operation method of the electronic device described above. This computer program is composed of a plurality of code snippets. After these code snippets are loaded into an electronic device and executed, the steps of the method for operating an electronic device described above can be performed.

綜上所述,本揭露實施例所提供的電子裝置及其運作方法,覆蓋一或多層加密層以提供顯示桌面,再讓使用者自行解開特定的加密層使其失效。據此,能夠針對不同的資訊內容或應用程式進行加鎖,提升彈性與便利性,又同時確保安全性。本揭露實施例所提供的電子裝置及其運作方法更利用多條軌跡之間的有序角度變化來作為是否解鎖的判斷依據。據此,使用者能夠以任何角度來直觀的解鎖電子裝置。In summary, the electronic device and the operation method thereof provided in the embodiments of the present disclosure cover one or more encryption layers to provide a display desktop, and then allow the user to unlock a specific encryption layer and make it invalid. According to this, it can lock different information contents or applications, improve flexibility and convenience, and at the same time ensure security. The electronic device and the operation method thereof provided in the embodiments of the present disclosure further use an orderly angle change between multiple trajectories as a judgment basis for unlocking. Accordingly, the user can intuitively unlock the electronic device at any angle.

雖然本揭露已以實施例揭露如上,然其並非用以限定本揭露,任何所屬技術領域中具有通常知識者,在不脫離本揭露的精神和範圍內,當可作些許的更動與潤飾,故本揭露的保護範圍當視後附的申請專利範圍所界定者為準。Although the present disclosure has been disclosed as above by way of example, it is not intended to limit the present disclosure. Any person with ordinary knowledge in the technical field should make some changes and modifications without departing from the spirit and scope of the present disclosure. The scope of protection of this disclosure shall be determined by the scope of the attached patent application.

100‧‧‧電子裝置100‧‧‧ electronic device

110‧‧‧儲存裝置 110‧‧‧Storage device

120‧‧‧觸控螢幕 120‧‧‧Touch screen

130‧‧‧處理器 130‧‧‧ processor

A、B、C‧‧‧區域 Areas A, B, C‧‧‧

D0、D1、D2、D12‧‧‧桌面 D0, D1, D2, D12‧‧‧ Desktop

L1、L2‧‧‧加密層 L1, L2 ‧‧‧ encryption layer

S310~S360‧‧‧電子裝置運作方法的步驟 Steps of S310 ~ S360‧‧‧Electronic device operation method

S610、S620‧‧‧電子裝置解鎖方法的步驟 Steps of S610, S620‧‧‧Unlocking electronic device

TR‧‧‧輸入軌跡 TR‧‧‧Input track

圖1繪示本揭露一實施例的電子裝置的方塊圖。 圖2繪示本揭露一實施例的加密層及其區域特性的示意圖。 圖3繪示本揭露一實施例的電子裝置運作方法的流程圖。 圖4繪示本揭露一實施例的解鎖電子裝置的示意圖。 圖5繪示本揭露一實施例的軌跡的角度的示意圖。 圖6繪示本揭露一實施例的解鎖電子裝置的流程圖。FIG. 1 is a block diagram of an electronic device according to an embodiment of the disclosure. FIG. 2 is a schematic diagram illustrating an encryption layer and its area characteristics according to an embodiment of the disclosure. FIG. 3 is a flowchart illustrating an operation method of an electronic device according to an embodiment of the disclosure. FIG. 4 is a schematic diagram of an unlocking electronic device according to an embodiment of the disclosure. FIG. 5 is a schematic diagram illustrating an angle of a track according to an embodiment of the disclosure. FIG. 6 is a flowchart of unlocking an electronic device according to an embodiment of the disclosure.

Claims (20)

一種電子裝置運作方法,包括:啟動觸控螢幕,並且在啟動該觸控螢幕後顯示顯示桌面以及對該顯示桌面覆蓋至少一加密層,其中該至少一加密層包括對應於該觸控螢幕的顯示桌面的區域特性,其中該顯示桌面包括多個桌面區域,並且該區域特性決定各該桌面區域中的物件覆蓋該至少一加密層後的權限。An electronic device operating method includes: activating a touch screen, displaying a display desktop after the touch screen is activated, and covering the display desktop with at least one encryption layer, wherein the at least one encryption layer includes a display corresponding to the touch screen The regional characteristics of the desktop, where the display desktop includes multiple desktop regions, and the regional characteristics determine the permissions of the objects in each desktop region after covering the at least one encryption layer. 如申請專利範圍第1項所述的電子裝置運作方法,更包括:藉由該觸控螢幕接收輸入軌跡;判斷該輸入軌跡是否對應於該至少一加密層的其中之一,並且解鎖該輸入軌跡所對應的該加密層;以及根據尚未解鎖的該至少一加密層所包括的該至少一區域特性,藉由該觸控螢幕提供該顯示桌面。The method for operating an electronic device according to item 1 of the patent application scope further comprises: receiving an input track through the touch screen; determining whether the input track corresponds to one of the at least one encryption layer, and unlocking the input track The corresponding encryption layer; and the display desktop provided by the touch screen according to the at least one area characteristic included in the at least one encryption layer that has not been unlocked. 如申請專利範圍第1項所述的電子裝置運作方法,其中啟動該觸控螢幕後直接顯示該顯示桌面,其中該物件包括至少一應用程式。The method for operating an electronic device according to item 1 of the scope of patent application, wherein the display desktop is directly displayed after the touch screen is activated, and the object includes at least one application program. 如申請專利範圍第3項所述的電子裝置運作方法,更包括:記錄各該應用程式的圖示區域;定義各該應用程式於各該加密層中的該權限;以及根據該些應用程式的該些圖示區域以及該些權限,產生該至少一加密層。The operation method of the electronic device according to item 3 of the scope of patent application, further comprising: recording the icon area of each application; defining the permission of each application in each of the encryption layers; and according to the application's The illustrated areas and the permissions generate the at least one encryption layer. 如申請專利範圍第1項所述的電子裝置運作方法,其中各該物件於各該加密層中的一預設權限為顯示且不可執行。According to the method for operating an electronic device according to item 1 of the scope of patent application, a preset permission of each object in each encryption layer is displayed and cannot be executed. 如申請專利範圍第1項所述的電子裝置運作方法,其中該物件的該權限包括顯示且可執行、顯示且不可執行以及不顯示且不可執行的其中之一。The method for operating an electronic device according to item 1 of the scope of patent application, wherein the authority of the object includes one of display and executable, display and non-executable, and non-display and non-executable. 如申請專利範圍第2項所述的電子裝置運作方法,其中藉由該觸控螢幕接收該輸入軌跡包括:在一預設時間內依序接收多條軌跡,其中該些軌跡包括一有序角度變化。The method for operating an electronic device according to item 2 of the scope of patent application, wherein receiving the input track through the touch screen includes: sequentially receiving a plurality of tracks within a preset time, wherein the tracks include an ordered angle Variety. 如申請專利範圍第7項所述的電子裝置運作方法,其中判斷該輸入軌跡是否對應於該至少一加密層的其中之一,並且解鎖該輸入軌跡所對應的該加密層包括:判斷該些軌跡的該有序角度變化是否對應於該至少一加密層的其中之一;以及解鎖該軌跡的該有序角度變化所對應的該加密層。The method for operating an electronic device according to item 7 of the scope of patent application, wherein determining whether the input track corresponds to one of the at least one encryption layer, and unlocking the encryption layer corresponding to the input track includes determining the tracks Whether the ordered angle change corresponds to one of the at least one encryption layer; and unlocks the encryption layer corresponding to the ordered angle change of the trajectory. 一種電子裝置,包括:一儲存裝置,用以記錄至少一加密層,其中該至少一加密層包括對應於顯示桌面的區域特性;一觸控螢幕,用以顯示該顯示桌面,其中該顯示桌面包括多個桌面區域,並且該區域特性決定各該桌面區域中的物件覆蓋該至少一加密層後的權限;以及一處理器,耦接於該儲存裝置以及該觸控螢幕,並且用以:啟動該觸控螢幕,並且在啟動該觸控螢幕後顯示顯示桌面以及對該顯示桌面覆蓋該至少一加密層的至少其中之一。An electronic device includes: a storage device for recording at least one encryption layer, wherein the at least one encryption layer includes an area characteristic corresponding to a display desktop; and a touch screen for displaying the display desktop, wherein the display desktop includes Multiple desktop areas, and the characteristics of the area determine the permissions of objects in each desktop area after covering the at least one encryption layer; and a processor coupled to the storage device and the touch screen, and used to: A touch screen, and after the touch screen is activated, a display desktop is displayed and at least one of the display desktop is covered with the at least one encryption layer. 如申請專利範圍第9項所述的電子裝置,其中該儲存裝置更用以記錄各該加密層所對應的輸入軌跡,並且該處理器更用以:藉由該觸控螢幕接收一輸入軌跡;判斷該輸入軌跡是否對應於該至少一加密層的其中之一,並且解鎖該輸入軌跡所對應的該加密層;以及根據尚未解鎖的該至少一加密層所包括的該至少一區域特性,藉由該觸控螢幕提供該顯示桌面。The electronic device according to item 9 of the scope of patent application, wherein the storage device is further configured to record an input trace corresponding to each encryption layer, and the processor is further configured to: receive an input trace through the touch screen; Determine whether the input trajectory corresponds to one of the at least one encryption layer, and unlock the encryption layer corresponding to the input trajectory; and according to the at least one region characteristic included in the at least one encryption layer that has not been unlocked, by The touch screen provides the display desktop. 如申請專利範圍第9項所述的電子裝置,其中該處理器啟動該觸控螢幕後,直接藉由該觸控螢幕顯示該顯示桌面,其中該物件包括至少一應用程式。The electronic device according to item 9 of the scope of patent application, wherein the processor directly activates the touch screen to display the display desktop through the touch screen, and the object includes at least one application program. 如申請專利範圍第11項所述的電子裝置,其中該處理器更用以:記錄各該應用程式的圖示區域;定義各該應用程式於各該加密層中的該權限;以及根據該些應用程式的該些圖示區域以及該些權限,產生該至少一加密層。The electronic device according to item 11 of the patent application scope, wherein the processor is further configured to: record an icon area of each application; define the authority of each application in each encryption layer; and according to the The icon areas of the application and the permissions generate the at least one encryption layer. 如申請專利範圍第9項所述的電子裝置,其中各該物件於各該加密層中的一預設權限為顯示且不可執行。The electronic device according to item 9 of the scope of patent application, wherein a preset permission of each object in each encryption layer is displayed and cannot be executed. 如申請專利範圍第9項所述的電子裝置,其中該物件的該權限包括顯示且可執行、顯示且不可執行以及不顯示且不可執行的其中之一。The electronic device according to item 9 of the scope of patent application, wherein the authority of the object includes one of display and executable, display and non-executable, and non-display and non-executable. 如申請專利範圍第10項所述的電子裝置,其中該處理器藉由該觸控螢幕接收該輸入軌跡時包括:在一預設時間內依序接收多條軌跡,其中該些軌跡包括一有序角度變化。According to the electronic device described in claim 10, when the processor receives the input track through the touch screen, the processor includes: sequentially receiving a plurality of tracks within a preset time, wherein the tracks include an Sequence angle changes. 如申請專利範圍第15項所述的電子裝置,其中該處理器判斷該輸入軌跡是否對應於該至少一加密層的其中之一,並且解鎖該輸入軌跡所對應的該加密層時包括:判斷該些軌跡的該有序角度變化是否對應於該至少一加密層的其中之一;以及解鎖該軌跡的該有序角度變化所對應的該加密層。The electronic device according to item 15 of the scope of patent application, wherein the processor determines whether the input track corresponds to one of the at least one encryption layer, and unlocking the encryption layer corresponding to the input track includes determining the Whether the ordered angle changes of the trajectories correspond to one of the at least one encryption layer; and unlocking the encryption layer corresponding to the ordered angle changes of the trajectory. 一種非暫態電腦可讀取媒體,儲存有一程式碼,當該程式碼被載入至一電腦並執行後,可完成如申請專利範圍第1項所述的電子裝置運作方法。A non-transitory computer-readable medium stores a program code. When the program code is loaded into a computer and executed, the electronic device operation method described in item 1 of the scope of patent application can be completed. 一種電子裝置運作方法,用以透過一觸控螢幕解鎖一電子裝置,包括:藉由該觸控螢幕依序接收多條軌跡;以及無論該些軌跡在該觸控螢幕上的位置,依據該些軌跡的一有序角度變化判斷是否解鎖該電子裝置。An electronic device operating method for unlocking an electronic device through a touch screen includes: sequentially receiving a plurality of tracks through the touch screen; and regardless of the positions of the tracks on the touch screen, according to the An ordered angle change of the trajectory determines whether the electronic device is unlocked. 一種電子裝置,包括:一觸控螢幕;以及一處理器,耦接於該觸控螢幕,並且用以:藉由該觸控螢幕依序接收多條軌跡;以及無論該些軌跡在該觸控螢幕上的位置,依據該些軌跡的一有序角度變化判斷是否解鎖該電子裝置。An electronic device includes: a touch screen; and a processor coupled to the touch screen and configured to: sequentially receive a plurality of tracks through the touch screen; and whether or not the tracks are in the touch screen The position on the screen determines whether to unlock the electronic device according to an ordered angle change of the trajectories. 一種非暫態電腦可讀取媒體,儲存有一程式碼,當該程式碼被載入至一電腦並執行後,可完成如申請專利範圍第18項所述的電子裝置運作方法。A non-transitory computer-readable medium has a code stored therein. When the code is loaded into a computer and executed, the electronic device operation method described in item 18 of the scope of patent application can be completed.
TW107114629A 2018-03-12 2018-04-30 Electronic device and operation method thereof TWI666584B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810199978.3A CN110263506B (en) 2018-03-12 2018-03-12 Electronic device, electronic device operation method and non-transitory computer readable medium
??201810199978.3 2018-03-12

Publications (2)

Publication Number Publication Date
TWI666584B true TWI666584B (en) 2019-07-21
TW201939255A TW201939255A (en) 2019-10-01

Family

ID=67911387

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107114629A TWI666584B (en) 2018-03-12 2018-04-30 Electronic device and operation method thereof

Country Status (2)

Country Link
CN (1) CN110263506B (en)
TW (1) TWI666584B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120030623A1 (en) * 2010-07-30 2012-02-02 Hoellwarth Quin C Device, Method, and Graphical User Interface for Activating an Item in a Folder
CN104156637A (en) * 2014-07-11 2014-11-19 北京奇虎科技有限公司 Method and device for protecting private contents in intelligent terminal
CN104573451A (en) * 2013-10-29 2015-04-29 深圳市腾讯计算机***有限公司 User verification method and device and electronic device
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords
TW201624336A (en) * 2014-12-27 2016-07-01 Chih-Yu Lee Permission-rating screen-locking system for single user operating interface
CN106980439A (en) * 2017-03-21 2017-07-25 海信集团有限公司 The method and device of hiden application icon
CN107229396A (en) * 2017-06-20 2017-10-03 维沃移动通信有限公司 A kind of hiding method of mobile terminal application icon and mobile terminal
CN107273107A (en) * 2016-04-08 2017-10-20 阿里巴巴集团控股有限公司 The unlocking method and device of terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809417A (en) * 2014-01-29 2015-07-29 北京三星通信技术研究有限公司 Method and device for shielding information on display screen and equipment
US20150213274A1 (en) * 2014-01-29 2015-07-30 Samsung Electronics Co., Ltd. Device and method of shielding region of display screen
TWI502477B (en) * 2014-01-29 2015-10-01 Wistron Corp Method, electronic device and computer program product for screen shield
CN105389523A (en) * 2015-12-28 2016-03-09 杭州安司源科技有限公司 Information display method
CN106503599B (en) * 2016-11-23 2019-09-17 北京小米移动软件有限公司 Display methods and device, electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120030623A1 (en) * 2010-07-30 2012-02-02 Hoellwarth Quin C Device, Method, and Graphical User Interface for Activating an Item in a Folder
CN104573451A (en) * 2013-10-29 2015-04-29 深圳市腾讯计算机***有限公司 User verification method and device and electronic device
CN104156637A (en) * 2014-07-11 2014-11-19 北京奇虎科技有限公司 Method and device for protecting private contents in intelligent terminal
TW201624336A (en) * 2014-12-27 2016-07-01 Chih-Yu Lee Permission-rating screen-locking system for single user operating interface
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords
CN107273107A (en) * 2016-04-08 2017-10-20 阿里巴巴集团控股有限公司 The unlocking method and device of terminal
CN106980439A (en) * 2017-03-21 2017-07-25 海信集团有限公司 The method and device of hiden application icon
CN107229396A (en) * 2017-06-20 2017-10-03 维沃移动通信有限公司 A kind of hiding method of mobile terminal application icon and mobile terminal

Also Published As

Publication number Publication date
CN110263506A (en) 2019-09-20
CN110263506B (en) 2021-08-10
TW201939255A (en) 2019-10-01

Similar Documents

Publication Publication Date Title
US20230005288A1 (en) Enrollment Using Synthetic Fingerprint Image and Fingerprint Sensing Systems
US9996176B2 (en) Multi-touch uses, gestures, and implementation
CN106575203B (en) Hover-based interaction with rendered content
US9182854B2 (en) System and method for multi-touch interactions with a touch sensitive screen
US9367235B2 (en) Detecting and interpreting real-world and security gestures on touch and hover sensitive devices
US8294682B2 (en) Displaying system and method thereof
AU2015362286A1 (en) Method and apparatus for arranging objects according to content of background image
KR20140082411A (en) Method for managing security for applications and an electronic device thereof
US20140366127A1 (en) Touchscreen security user input interface
CN106485173A (en) Sensitive information methods of exhibiting and device
US20140191970A1 (en) Terminal to set a touch lock layer, and method thereof
TW201512966A (en) Unlocking system and method of electronic device
TWI666584B (en) Electronic device and operation method thereof
US9501210B2 (en) Information processing apparatus
US10019127B2 (en) Remote display area including input lenses each depicting a region of a graphical user interface
JP6945345B2 (en) Display device, display method and program
TWI767623B (en) Method for protecting application program of electronic computing devices
WO2023131022A1 (en) Display control method, electronic device, and readable storage medium
CN112148120A (en) Method, equipment and storage medium for displaying virtual interface