Method for batch uninstalling programs of mobile terminal equipment
A mobile terminal, batch technology, applied in branch equipment, program control device, input/output process of data processing, etc., can solve the problems of complicated operation and tedious operation, and achieve the effect of reducing the number of checking operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0018] Such as figure 1 As shown, the operation steps are as follows:
[0019] S1. Batch uninstall intention monitoring: After the mobile phone is started, the monitoring process is started to monitor the operation gestures. The so-called "monitoring" here refers to analyzing the action mode of each received operation gesture and analyzing its intention. When the action pattern of "sliding two fingers outward" on the desktop is detected, it is interpreted as the operator's intention to uninstall in batches, and the desktop enters the batch uninstalling mode.
[0020] S2. Uninstallation target selection: After the desktop enters the batch uninstallation mode, only one of the operation gestures on the desktop is valid, which is the "select uninstallation target" gesture, and the rest of the gestures are all interpreted as invalid gestures. In this example, the "select uninstallation target" gesture is realized through the action mode of "swipe a single finger on the desktop fo...
Embodiment 2
[0037] The difference between this example and Example 1 is that a residual file uninstallation step is added: in order to facilitate the uninstallation of residual files specific to the application program, this embodiment also sets the attribution number for the new program when the program is installed, and when a new file is created , if the new file belongs to a program, mark the new file with the corresponding attribution number. When uninstalling, find the corresponding residual file according to the attribution number and delete it, that is, if the attribution number of a file is the same as that of the uninstalled application, delete the file together.
Embodiment 3
[0039] The difference between this example and the second example is that a boot recovery prompt is added.
[0040] Although the situation of avoiding unintentional unloading has been considered in the first and second embodiments, it is still unavoidable that misoperation occurs in practice. History and list of uninstalled files, asking whether to restore. If so, restore the uninstalled application. For this purpose, it is necessary to establish an uninstallation history and a list of uninstalled files when uninstalling.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com