CN109085976A - Interface hidden method and device - Google Patents

Interface hidden method and device Download PDF

Info

Publication number
CN109085976A
CN109085976A CN201810904551.9A CN201810904551A CN109085976A CN 109085976 A CN109085976 A CN 109085976A CN 201810904551 A CN201810904551 A CN 201810904551A CN 109085976 A CN109085976 A CN 109085976A
Authority
CN
China
Prior art keywords
mentioned
target interface
target
interface
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810904551.9A
Other languages
Chinese (zh)
Inventor
李晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201810904551.9A priority Critical patent/CN109085976A/en
Publication of CN109085976A publication Critical patent/CN109085976A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a kind of interface hidden method and devices.Wherein, this method comprises: determining target interface to be concealed, wherein above-mentioned target interface is any one interface on the display desktop of terminal device, is provided with target widget in above-mentioned target interface, above-mentioned target widget, which is used to indicate, hides above-mentioned target interface;Detect whether above-mentioned target widget receives the first trigger action;In the case where detecting that above-mentioned target widget receives above-mentioned first trigger action, above-mentioned target interface is hidden from above-mentioned display desktop.The technical issues of present invention solves interface in the prior art and hides scheme, cannot achieve the privacy interface quickly and easily created in mobile phone.

Description

Interface hidden method and device
Technical field
The present invention relates to terminal control technical fields, in particular to a kind of interface hidden method and device.
Background technique
With the development of the times with the explosion of information, people increasingly focus on the protection of privacy, and mobile phone is to carry An article of most privacies prevents footpath between fields although screen-lock password can be set in present smart phone mostly in modern life The unlatching mobile phone invasion of privacy of stranger, for people similar in acquaintanceship at one's side, although we can share therewith in mobile phone Partial content therefore, create and use privacy circle in mobile phone it is desired that a piece of individual privacy space out can be retained silently Face is just particularly important.
The project plan comparison trouble of existing mobile phone creation private space at present, needs the system setting function into mobile phone, Find private space setting function, private space will be added to using choosing one by one again after creation, and later period addition and The operation applied and require to come again front is deleted, is required to enter private space setting function, the setting behaviour searched layer by layer Make very complicated, mobile phone user fast easily can not create and use mobile phone private interface, and user experience is poor.
For above-mentioned problem, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides a kind of interface hidden method and devices, hidden at least to solve interface in the prior art Hiding scheme, cannot achieve quickly and easily create mobile phone in privacy interface the technical issues of.
According to an aspect of an embodiment of the present invention, a kind of interface hidden method is provided, comprising: determine mesh to be concealed It demarcates face, wherein above-mentioned target interface is any one interface on the display desktop of terminal device, is arranged in above-mentioned target interface There is target widget, above-mentioned target widget, which is used to indicate, hides above-mentioned target interface;Detect whether above-mentioned target widget receives One trigger action;In the case where detecting that above-mentioned target widget receives above-mentioned first trigger action, by above-mentioned target interface It is hidden from above-mentioned display desktop.
According to another aspect of an embodiment of the present invention, a kind of interface concealing device is additionally provided, comprising: determining module is used In determining target interface to be concealed, wherein above-mentioned target interface is any one interface on the display desktop of terminal device, on It states and is provided with target widget in target interface, above-mentioned target widget, which is used to indicate, hides above-mentioned target interface;Detection module is used for Detect whether above-mentioned target widget receives the first trigger action;Hidden module, for detecting above-mentioned target widget reception In the case where above-mentioned first trigger action, above-mentioned target interface is hidden from above-mentioned display desktop.
According to another aspect of an embodiment of the present invention, a kind of storage medium is additionally provided, above-mentioned storage medium includes storage Program, wherein above procedure operation when control above-mentioned storage medium where equipment execute following steps: determine to be concealed Target interface, wherein above-mentioned target interface is any one interface on the display desktop of terminal device, is set in above-mentioned target interface It is equipped with target widget, above-mentioned target widget, which is used to indicate, hides above-mentioned target interface;Detect whether above-mentioned target widget receives First trigger action;In the case where detecting that above-mentioned target widget receives above-mentioned first trigger action, by above-mentioned target circle Face hides from above-mentioned display desktop.
According to another aspect of an embodiment of the present invention, a kind of processor is additionally provided, above-mentioned processor is used to run program, Wherein, following steps are executed when above procedure is run: determining target interface to be concealed, wherein above-mentioned target interface is terminal Any one interface on the display desktop of equipment is provided with target widget in above-mentioned target interface, and above-mentioned target widget is for referring to Show and hides above-mentioned target interface;Detect whether above-mentioned target widget receives the first trigger action;Detecting above-mentioned target control In the case that part receives above-mentioned first trigger action, above-mentioned target interface is hidden from above-mentioned display desktop.
In embodiments of the present invention, the target interface to be concealed by determination, wherein above-mentioned target interface is terminal device Display desktop on any one interface, be provided with target widget in above-mentioned target interface, above-mentioned target widget is used to indicate hidden Hide above-mentioned target interface;Detect whether above-mentioned target widget receives the first trigger action;Detecting that above-mentioned target widget connects In the case where receiving above-mentioned first trigger action, above-mentioned target interface is hidden from above-mentioned display desktop, has been reached quickly just The purpose of privacy interface in prompt creation mobile phone, to realize the technical effect for improving the usage experience sense of user, in turn It solves interface in the prior art and hides scheme, the technology that cannot achieve the privacy interface in quickly and easily creation mobile phone is asked Topic.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of interface hidden method according to an embodiment of the present invention;
Fig. 2 is a kind of flow chart of optional interface hidden method according to an embodiment of the present invention;
Fig. 3 is a kind of flow chart of optional interface hidden method according to an embodiment of the present invention;
Fig. 4 is a kind of flow chart of optional interface hidden method according to an embodiment of the present invention;And
Fig. 5 is a kind of structural schematic diagram of interface concealing device according to an embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Embodiment 1
According to embodiments of the present invention, a kind of embodiment of interface hidden method is provided, it should be noted that in attached drawing The step of process illustrates can execute in a computer system such as a set of computer executable instructions, although also, Logical order is shown in flow chart, but in some cases, it can be to be different from shown by sequence execution herein or retouch The step of stating.
Fig. 1 is a kind of flow chart of interface hidden method according to an embodiment of the present invention, as shown in Figure 1, this method includes Following steps:
Step S102 determines target interface to be concealed, wherein above-mentioned target interface is on the display desktop of terminal device Any one interface is provided with target widget in above-mentioned target interface, and above-mentioned target widget, which is used to indicate, hides above-mentioned target circle Face.
In above-mentioned steps S102, above-mentioned terminal device can for it is following any one: smart phone, IPAD, computer Equipment etc.;Above-mentioned target interface can be with any one display circle on the display desktop for any one of the above terminal device Face, for example, the display interface on smart phone;Above-mentioned target widget can be the hiding button being arranged in above-mentioned target interface, For example, the function button for " the whole screen private collection " being arranged in below target interface.
Step S104, detects whether above-mentioned target widget receives the first trigger action.
Optionally, above-mentioned first trigger action the operation such as can be, but not limited to click, touch, in the embodiment of the present application In, the type of above-mentioned first trigger action can be preset.
Step S106, in the case where detecting that above-mentioned target widget receives above-mentioned first trigger action, by above-mentioned mesh Demarcate face from above-mentioned display desktop hide.
In the alternative embodiment of the application, if user operates above-mentioned target widget by the modes such as clicking, touching, really Fixed above-mentioned target widget receives above-mentioned first trigger action, and then can be hidden from above-mentioned display desktop by above-mentioned target interface Hiding.
In an alternative embodiment, by taking above-mentioned terminal device is smart phone as an example, user can be by intelligence The white space of the display desktop of mobile phone executes predetermined operation (for example, long-pressing, double-click or two refer to the operation such as scaling), enters Desktop editing mode, user determine user's target interface to be concealed by modes such as slide handover, clicks, or in mobile phone table Face edit page increases user target interface to be concealed, by clicking or touching " the whole screen in above-mentioned target interface Private collection " function button, can be got up all application hides in the target interface and the target interface with a key.
In above-mentioned optional embodiment, by mobile phone desktop edit page add whole screen be set as hiding function by All applications in the target interface and the target interface can be set as private space with a key by button, user, not shown in current Show and shown on desktop, implementation is convenient and efficient.
In embodiments of the present invention, the target interface to be concealed by determination, wherein above-mentioned target interface is terminal device Display desktop on any one interface, be provided with target widget in above-mentioned target interface, above-mentioned target widget is used to indicate hidden Hide above-mentioned target interface;Detect whether above-mentioned target widget receives the first trigger action;Detecting that above-mentioned target widget connects In the case where receiving above-mentioned first trigger action, above-mentioned target interface is hidden from above-mentioned display desktop, has been reached quickly just The purpose of privacy interface in prompt creation mobile phone, to realize the technical effect for improving the usage experience sense of user, in turn It solves interface in the prior art and hides scheme, the technology that cannot achieve the privacy interface in quickly and easily creation mobile phone is asked Topic.
In an alternative embodiment, Fig. 2 is a kind of optional interface hidden method according to an embodiment of the present invention Flow chart, as shown in Fig. 2, the above method further includes following method and step before determining target interface to be concealed:
Step S202 detects whether the predetermined operational instructions for receiving target object.
Optionally, above-mentioned target object is the user for using or holding smart phone;Above-mentioned predetermined operational instructions can be with But it is not limited to the operational orders such as long-pressing, double-click or two finger scalings.
Step S204, in the case where receiving above-mentioned predetermined operational instructions, into desktop editing mode.
In above-mentioned steps S204, above-mentioned desktop editing mode is the mode of editing mobile phone desktop, can be to mobile phone desktop On display interface edited, for example, deleting or increasing at least one display interface;It can also be to the application on display interface Program is edited, for example, delete or increase at least one application program etc..
Step S206 determines above-mentioned target interface to be concealed under above-mentioned desktop editing mode.
In an alternative embodiment, still by taking above-mentioned terminal device is smart phone as an example, user can be by intelligence Can mobile phone display desktop white space, execute predetermined operation (for example, long-pressing, double-click or two refer to scaling etc. operation), it is defeated Enter corresponding predetermined operational instructions to terminal device, terminal device is after receiving above-mentioned predetermined operational instructions, into desktop Edit pattern, user determines user's target interface to be concealed by modes such as slide handover, clicks, or compiles in mobile phone desktop It collects the page and increases user target interface to be concealed.
In an alternative embodiment, Fig. 3 is a kind of optional interface hidden method according to an embodiment of the present invention Flow chart, as shown in figure 3, the above method further includes as follows before hiding above-mentioned target interface from above-mentioned display desktop Method and step:
Step S302 shows pop-up control in above-mentioned target interface, and detects whether above-mentioned pop-up control receives Two trigger actions or third trigger action, wherein above-mentioned pop-up control hides above-mentioned mesh for prompting target object whether to determine It demarcates face.
In above-mentioned steps S302, above-mentioned pop-up control can be used for being confirmed whether to user that above-mentioned target circle is hidden in determination Face influences user experience in order to avoid there is the case where user accidentally touches.Wherein, above-mentioned second trigger action is the behaviour of user's confirmation Make, above-mentioned third trigger action is the operation that user denies, for example, can be by clicking or touching the "Yes" on pop-up control Function button inputs above-mentioned second trigger action, by clicking or touching the function button of the "No" on pop-up control, in input State third trigger action.
Step S304, in the case where detecting that above-mentioned pop-up control receives above-mentioned second trigger action, execution will be upper State the step that target interface is hidden from above-mentioned display desktop;
Step S306 is returned and is executed in the case where detecting that above-mentioned pop-up control receives above-mentioned third trigger action The step of above-mentioned determination target interface to be concealed.
As a kind of optional embodiment, before hiding above-mentioned target interface from above-mentioned display desktop, above-mentioned mesh Demarcating will pop up a pop-up control on face, wherein can show similar prompt information below in above-mentioned pop-up control: " be All applications in this interface and the interface are set as hiding by no confirmation? ";Detecting the "No" on user's selection pop-up control Function button, that is, receive user receives above-mentioned third trigger action, then returns and execute above-mentioned determination mesh to be concealed Demarcate face the step of, reselect target interface to be concealed;In the function of detecting that user selects the "Yes" on pop-up control Button, that is, receive user receives above-mentioned second trigger action, then executes above-mentioned target interface from above-mentioned display desktop Upper hiding step.
In an alternative embodiment, before hiding above-mentioned target interface from above-mentioned display desktop, above-mentioned side Method further include:
Step S402a receives the first key of target object input, wherein above-mentioned first key is used in above-mentioned terminal In the case that equipment is screen lock state, into the key of the above-mentioned target interface in hidden state, and above-mentioned first key is not It is same as the Personal Unlocking Key of above-mentioned terminal device;
Step S404a stores above-mentioned first key.
In the embodiment of the present application, before hiding above-mentioned target interface from above-mentioned display desktop, use is being received After second triggering command of family confirmation, terminal device can also prompt user to input first key, i.e., in above-mentioned terminal device In the case where for screen lock state, into the key of the above-mentioned target interface in hidden state.
Optionally, above-mentioned first key can be fingerprint, figure, gesture, letter, number, Chinese character, quickly percussion screen three The key of any one inferior type.
In an alternative embodiment, when entering the first key of concealed space under screen lock state is arranged, setting Key form can be consistent with the form of principal space Personal Unlocking Key, for example, Personal Unlocking Key is numerical ciphers, then first key can be with But be not limited to be set as numerical ciphers, and can not be repeated with above-mentioned Personal Unlocking Key, confirmation the above-mentioned first key of user setting at After function, user can be allowed to confirm again one time, for example, the prompt secondary input first key of user, and it is defeated to match above-mentioned first time Whether the first key entered and the first key of second of input are consistent, to avoid the more situation of key digital or letter Under, the case where there is mistake, cause user that can not unlock, and in the case where confirming that first key is errorless, storage above-mentioned first Key.
In an alternative embodiment, before hiding above-mentioned target interface from above-mentioned display desktop, above-mentioned side Method further include:
Step S402b receives the second key of target object input, wherein above-mentioned second key is used in above-mentioned terminal In the case that equipment is unlocked state, enter the close of the above-mentioned target interface in hidden state from the desktop of above-mentioned terminal device Key;
Step S404b stores above-mentioned second key.
In an alternative embodiment, it before hiding above-mentioned target interface from above-mentioned display desktop, is receiving After the second triggering command confirmed to user, terminal device can also prompt user to input the second key, i.e., in above-mentioned terminal In the case that equipment is unlocked state, enter the close of the above-mentioned target interface in hidden state from the desktop of above-mentioned terminal device Key.
Optionally, above-mentioned second key can be fingerprint, figure, gesture, letter, number, Chinese character, quickly percussion screen three The key of any one inferior type.
In a kind of optional embodiment, when entering the second key of concealed space under unlocked state is arranged, setting it is close Key form can avoid the gesture of mobile phone common function, for example, can be figure, letter, number, Chinese character, quickly tap screen Three is inferior, after the above-mentioned second key success of confirmation user setting, user can be allowed to confirm again one time, for example, prompt user The second key of secondary input, and match the input of above-mentioned first time the second key and second of input the second key whether one Cause, to avoid key digital or letter it is more in the case where, the case where there is mistake, cause user that can not unlock, and true Recognize the second key it is errorless in the case where, store above-mentioned second key.
It should be noted that above-mentioned steps S402a to step S404a and step S402b execute sequence to step S404b Can be inconsistent, for example, first key can first be arranged, in the success of setting first key and then above-mentioned second key is set, Above-mentioned second key can also be first set, and the success of the second key is being set and then above-mentioned first key is set.But it executes Successive the embodiment of the present application of sequence is subject to and the embodiment of the present application may be implemented without limiting.
As a kind of optional embodiment, in the first creation privacy page (target interface under hidden state) When, it is to rapidly enter privacy page under non-unlocked state (screen lock state) that the system of terminal device, which can prompt user setting terminal device, The Personal Unlocking Key (first key) and terminal device in face are the solution for entering the privacy page under unlocked state by normal desktop interface It locks key (the second key), for example, customized gesture.
In an alternative embodiment, after hiding above-mentioned target interface from above-mentioned display desktop, above-mentioned side Method further include:
Step S502, detects whether above-mentioned target interface is hidden successfully;
Step S504 is exited in the case where detecting that above-mentioned target interface hides successful situation in the above-mentioned of hidden state Target interface returns to above-mentioned display desktop.
In above-mentioned optional embodiment, in the case where confirming that above-mentioned first key, the setting of the second key are errorless, then really Surely above-mentioned target interface can be successfully hidden, pop-up reminds the hidden state of target interface to be arranged successfully, automatically falls back on display Desktop, target interface is from display desktop " disappearance ".
In an alternative embodiment, in above-mentioned steps S504, the above-mentioned target interface in hidden state is exited, Back to above-mentioned display desktop, comprising:
Step S5042a detects whether the exit instruction for receiving target object.
Optionally, user can by clicking or touching the return key on terminal device, home key (originates Key, a key return to main screen interface), above-mentioned exit instruction is inputted to terminal device.
Step S5044a exits above-mentioned target circle in hidden state in the case where receiving above-mentioned exit instruction Face returns to above-mentioned display desktop.
In an alternative embodiment, user can be after the hidden function of setting target interface, or is using After the application program of the complete target interface under hidden state, the return key of a terminal device is clicked or touched, is returned The desktop homepage of concealed space is returned to, then clicks or touches a return key and can return to above-mentioned display desktop.
In an alternative embodiment, user can be after the hidden function of setting target interface, or makes It is finished after the application program of the target interface under hidden state, clicks or touch the home key of a terminal device, The above-mentioned target interface in hidden state can be exited, above-mentioned display desktop is returned to.
There is also a kind of optional embodiments, in above-mentioned steps S504, exit above-mentioned target circle in hidden state Face returns to above-mentioned display desktop, comprising:
Step S5042a detects whether the screen locking instruction for receiving target object;
Step S5044b detects whether to receive above-mentioned target object defeated in the case where receiving above-mentioned screen locking instruction The Personal Unlocking Key entered;
Step S5046b exits above-mentioned target circle in hidden state in the case where receiving above-mentioned Personal Unlocking Key Face returns to above-mentioned display desktop.
In above-mentioned optional embodiment, if detecting the screen locking instruction of user, such as detects that user has pressed and put out Shield key, then the key of user's input to be detected can be waited to exit in the case that the key is Personal Unlocking Key in hidden state Above-mentioned target interface, return to above-mentioned display desktop;In addition, in the case where the key is first key, still current In target interface in hidden state.
In an alternative embodiment, above-mentioned target interface includes: the application program shown in above-mentioned target interface;? After above-mentioned target interface is hidden from above-mentioned display desktop, the above method further include:
Step S602 detects whether that the addition instruction for receiving target object, above-mentioned addition instruction are used to indicate addition and answer With in program to the above-mentioned target interface for being in hidden state.
Optionally, the application program that user can be to be added by long-pressing, inputs above-mentioned addition and instructs to terminal device.
Step S604 is jumped in the case where receiving above-mentioned addition instruction from the above-mentioned target interface in hidden state Go to above-mentioned display desktop;
Step S606 receives at least one first choice instruction that above-mentioned target object inputs on above-mentioned display desktop, Determine application program corresponding with the instruction of above-mentioned first choice, wherein above-mentioned first choice instruction is used to indicate above-mentioned target pair As the application program selected on above-mentioned display desktop;
The relevant information of above-mentioned application program and above-mentioned application program is transferred to by step S608 from above-mentioned display desktop Above-mentioned target interface in hidden state.
Optionally, above-mentioned relevant information can be pushed information, pop-up, message etc..
In an alternative embodiment, application program that can be to be added by long-pressing in user, inputs above-mentioned addition After instruction to terminal device, terminal device enters private space editing mode, from the above-mentioned target interface for being in hidden state Above-mentioned display desktop is jumped to, user can click the addition icon of at least one application program, input at least one first choosing Instruction is selected, determines institute's application program to be added, and then in user after display desktop single choice or multiselect application program, eventually The relevant information of above-mentioned application program and above-mentioned application program is transferred to from above-mentioned display desktop in hidden state by end equipment Above-mentioned target interface.
In an alternative embodiment, above-mentioned target interface includes: the application program shown in above-mentioned target interface;? After above-mentioned target interface is hidden from above-mentioned display desktop, the above method further includes following method and step:
Step S502, detects whether to receive the deletion instruction of target object, and above-mentioned deletion instruction is used to indicate from being in Application program is deleted in the above-mentioned target interface of hidden state.
Optionally, above-mentioned deletion instruction is the finger that application program is deleted from the above-mentioned target interface in hidden state It enables, the application program that user can be to be deleted by long-pressing inputs above-mentioned deletion and instructs to terminal device.
Step S504 receives at least one of above-mentioned target object input in the case where receiving above-mentioned deletion instruction Second selection instruction determines application program corresponding with above-mentioned second selection instruction, wherein above-mentioned second selection instruction is for referring to Show the application program that above-mentioned target object selects in the above-mentioned target interface in hidden state.
Step S506, by the relevant information of above-mentioned application program and above-mentioned application program, from above-mentioned in hidden state Target interface is transferred to above-mentioned display desktop.
Optionally, above-mentioned relevant information can be pushed information, pop-up, message etc..
In an alternative embodiment, application program that can be to be deleted by long-pressing in user, inputs above-mentioned deletion After instruction to terminal device, terminal device enters private space editing mode, and user can click at least one application program Deletion icon, input at least one second selection instruction, determine the application program to be deleted, and then in user from showing table After face single choice or multiselect application program, terminal device by the relevant information of above-mentioned application program and above-mentioned application program, from Above-mentioned target interface in hidden state is transferred to above-mentioned display desktop.
In an alternative embodiment, above-mentioned target interface includes: the application program shown in above-mentioned target interface;? After above-mentioned target interface is hidden from above-mentioned display desktop, the above method further includes following method and step:
Step S602 detects whether that the unloading command for receiving target object, above-mentioned unloading command are used to indicate in unloading State the application program installed on terminal device.
Optionally, user can be dragged in the dustbin in target interface after the icon by long-pressing application program, with Above-mentioned unloading command is inputted to terminal device.
Step S604, in the case where receiving above-mentioned unloading command, unloading and above-mentioned unloading from above-mentioned terminal device Instruct corresponding application program.
In an alternative embodiment, if user needs to unload the application program in target interface, the long-pressing application It is dragged in the dustbin in target interface and is unloaded after the icon of program, is not present in target interface and display desktop The application program.
In the application optional embodiment, when user needs to add and delete the application program in target interface, use Family needs to enter in target interface, long-pressing application program, and program either above or below to be applied addition icon occurs or deletes When icon, clicks the addition icon of application program or delete icon and operated.
As a kind of optional embodiment, when user need to add the application program in target interface, user can be clicked Add icon, then the page automatic jumps to display desktop, for user batch choose application icon, user click " completion " it Afterwards, then target interface is jumped back to, the application program that user is chosen appears in the target interface, and user clicks primary true again It after determining key, that is, operates successfully, application program and all information of application application program, pop-up, message are from principal space movement To private collection space.
As an alternative embodiment, when user needs the application program in delete target interface, i.e., user need by Application program in target interface moves back to display desktop, and user can click deletion icon, clicks selection " completion " in user Later, the application program chosen and its information, pop-up, message can be all moved back into the display desktop of the principal space.
Below by way of an optional embodiment, to the optional interface hidden method of one of the embodiment of the present application, Fig. 4 It is a kind of flow chart of optional interface hidden method according to an embodiment of the present invention, is illustrated below by way of Fig. 4:
Step S40 detects whether the predetermined operational instructions for receiving target object.
Optionally, above-mentioned target object is the user for using or holding smart phone;Above-mentioned predetermined operational instructions can be with But it is not limited to the operational orders such as long-pressing, double-click or two finger scalings.
Step S41, in the case where receiving above-mentioned predetermined operational instructions, into desktop editing mode.
In above-mentioned steps S41, above-mentioned desktop editing mode is the mode of editing mobile phone desktop, can be on mobile phone desktop Display interface edited, for example, deleting or increasing at least one display interface;It can also be to the application journey on display interface Sequence is edited, for example, delete or increase at least one application program etc..
Step S42 determines target interface to be concealed under above-mentioned desktop editing mode.
In an alternative embodiment, still by taking above-mentioned terminal device is smart phone as an example, user can be by intelligence Can mobile phone display desktop white space, execute predetermined operation (for example, long-pressing, double-click or two refer to scaling etc. operation), it is defeated Enter corresponding predetermined operational instructions to terminal device, terminal device is after receiving above-mentioned predetermined operational instructions, into desktop Edit pattern, user determines user's target interface to be concealed by modes such as slide handover, clicks, or compiles in mobile phone desktop It collects the page and increases user target interface to be concealed.
Whether step S43, detection target widget receive the first trigger action.
Optionally, above-mentioned target widget can be the hiding button being arranged in above-mentioned target interface, for example, being arranged in target The function button of " whole screen private collection " below interface.
Optionally, above-mentioned first trigger action the operation such as can be, but not limited to click, touch, in the embodiment of the present application In, the type of above-mentioned first trigger action can be preset.
Step S44 receives the first key and the second key of target object input.
Optionally, above-mentioned first key is used in the case where above-mentioned terminal device is screen lock state, into hiding The key of the above-mentioned target interface of state, and above-mentioned first key is different from the Personal Unlocking Key of above-mentioned terminal device;Above-mentioned second Key is used to enter from the desktop of above-mentioned terminal device in the case where above-mentioned terminal device is unlocked state and be in hidden state Above-mentioned target interface key.
In an alternative embodiment, it before hiding above-mentioned target interface from above-mentioned display desktop, is receiving After the second triggering command confirmed to user, terminal device can also prompt user to input first key, i.e., in above-mentioned terminal In the case that equipment is screen lock state, into the key of the above-mentioned target interface in hidden state.
In an alternative embodiment, before hiding above-mentioned target interface from above-mentioned display desktop, connecing After the second triggering command for receiving user's confirmation, terminal device can also prompt user to input the second key, i.e., at above-mentioned end In the case that end equipment is unlocked state, enter the above-mentioned target interface in hidden state from the desktop of above-mentioned terminal device Key.
Step S45, in the case where detecting that above-mentioned target widget receives above-mentioned first trigger action, by above-mentioned target Interface hides from above-mentioned display desktop.
In the alternative embodiment of the application, if user operates above-mentioned target widget by the modes such as clicking, touching, really Fixed above-mentioned target widget receives above-mentioned first trigger action, and then can be hidden from above-mentioned display desktop by above-mentioned target interface Hiding.
In an alternative embodiment, by taking above-mentioned terminal device is smart phone as an example, user can be by intelligence The white space of the display desktop of mobile phone executes predetermined operation (for example, long-pressing, double-click or two refer to the operation such as scaling), enters Desktop editing mode, user determine user's target interface to be concealed by modes such as slide handover, clicks, or in mobile phone table Face edit page increases user target interface to be concealed, by clicking or touching " the whole screen in above-mentioned target interface Private collection " function button, can be got up all application hides in the target interface and the target interface with a key.
In above-mentioned optional embodiment, by mobile phone desktop edit page add whole screen be set as hiding function by All applications in the target interface and the target interface can be set as private space with a key by button, user, not shown in current Show and shown on desktop, implementation is convenient and efficient.
Embodiment 2
According to embodiments of the present invention, it additionally provides a kind of for implementing the Installation practice of above-mentioned interface hidden method, Fig. 5 It is a kind of structural schematic diagram of interface concealing device according to an embodiment of the present invention, as shown in figure 5, above-mentioned interface concealing device, Comprise determining that module 50, detection module 52 and hidden module 56, in which:
Determining module 50, for determining target interface to be concealed, wherein above-mentioned target interface is the display of terminal device Any one interface on desktop, is provided with target widget in above-mentioned target interface, above-mentioned target widget be used to indicate hide it is above-mentioned Target interface;Detection module 52, for detecting whether above-mentioned target widget receives the first trigger action;Hidden module 56 is used In in the case where detecting that above-mentioned target widget receives above-mentioned first trigger action, by above-mentioned target interface from above-mentioned display It is hidden on desktop.
It should be noted that above-mentioned modules can be realized by software or hardware, for example, for the latter, Can be accomplished by the following way: above-mentioned modules can be located in same processor;Alternatively, above-mentioned modules are with any Combined mode is located in different processors.
Herein it should be noted that above-mentioned determining module 50, detection module 52 and hidden module 56 correspond in embodiment 1 Step S102 to step S106, above-mentioned module is identical as example and application scenarios that corresponding step is realized, but is not limited to 1 disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in computer as a part of device In terminal.
It should be noted that the optional or preferred embodiment of the present embodiment may refer to the associated description in embodiment 1, Details are not described herein again.
Above-mentioned interface concealing device can also include processor and memory, above-mentioned determining module 50, detection module 52 It waits with hidden module 56 and is stored in memory as program unit, above-mentioned journey stored in memory is executed by processor Sequence unit realizes corresponding function.
Include kernel in processor, is gone in memory to transfer corresponding program unit by kernel, above-mentioned kernel can be set One or more.Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) And/or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM), memory includes at least one Storage chip.
According to the embodiment of the present application, a kind of storage medium embodiment is additionally provided.Optionally, in the present embodiment, above-mentioned Storage medium includes the program of storage, wherein equipment where controlling above-mentioned storage medium in above procedure operation executes above-mentioned Any one interface hidden method.
Optionally, in the present embodiment, above-mentioned storage medium can be located in computer network in computer terminal group In any one terminal, or in any one mobile terminal in mobile terminal group, above-mentioned storage medium packet Include the program of storage.
Optionally, when program is run, equipment where control storage medium executes following functions: determining target to be concealed Interface, wherein above-mentioned target interface is any one interface on the display desktop of terminal device, is provided in above-mentioned target interface Target widget, above-mentioned target widget, which is used to indicate, hides above-mentioned target interface;Detect whether above-mentioned target widget receives first Trigger action;In the case where detecting that above-mentioned target widget receives above-mentioned first trigger action, by above-mentioned target interface from It is hidden on above-mentioned display desktop.
Optionally, when program is run, equipment where control storage medium executes following functions: detecting whether to receive mesh Mark the predetermined operational instructions of object;In the case where receiving above-mentioned predetermined operational instructions, into desktop editing mode;Above-mentioned Under desktop editing mode, above-mentioned target interface to be concealed is determined.
Optionally, when program is run, equipment where control storage medium executes following functions: in above-mentioned target interface It shows pop-up control, and detects whether above-mentioned pop-up control receives the second trigger action or third trigger action, wherein is above-mentioned Pop-up control hides above-mentioned target interface for prompting target object whether to determine;Detecting that above-mentioned pop-up control receives In the case where stating the second trigger action, the step for hiding above-mentioned target interface from above-mentioned display desktop is executed;It is detecting In the case that above-mentioned pop-up control receives above-mentioned third trigger action, returns and execute above-mentioned determination target interface to be concealed Step.
Optionally, when program is run, equipment where control storage medium executes following functions: receiving target object input First key, wherein above-mentioned first key be used for above-mentioned terminal device be screen lock state in the case where, into hide The key of the above-mentioned target interface of state, and above-mentioned first key is different from the Personal Unlocking Key of above-mentioned terminal device;It stores above-mentioned First key.
Optionally, when program is run, equipment where control storage medium executes following functions: receiving target object input The second key, wherein above-mentioned second key be used for above-mentioned terminal device be unlocked state in the case where, set from above-mentioned terminal Standby desktop enters the key of the above-mentioned target interface in hidden state;Store above-mentioned second key.
Optionally, when program is run, equipment where control storage medium executes following functions: detecting above-mentioned target interface Whether hide successfully;In the case where detecting that above-mentioned target interface hides successful situation, the above-mentioned target in hidden state is exited Interface returns to above-mentioned display desktop.
Optionally, when program is run, equipment where control storage medium executes following functions: detecting whether to receive mesh Mark the exit instruction of object;In the case where receiving above-mentioned exit instruction, the above-mentioned target interface in hidden state is exited, Back to above-mentioned display desktop.
Optionally, when program is run, equipment where control storage medium executes following functions: detecting whether to receive mesh Mark the screen locking instruction of object;In the case where receiving above-mentioned screen locking instruction, detect whether to receive above-mentioned target object input Personal Unlocking Key;In the case where receiving above-mentioned Personal Unlocking Key, the above-mentioned target interface in hidden state is exited, is returned to Above-mentioned display desktop.
Optionally, when program is run, equipment where control storage medium executes following functions: detecting whether to receive mesh The addition instruction of object is marked, above-mentioned addition instruction is used to indicate addition application program to the above-mentioned target interface for being in hidden state On;In the case where receiving above-mentioned addition instruction, above-mentioned display table is jumped to from the above-mentioned target interface in hidden state Face;At least one first choice instruction that above-mentioned target object inputs on above-mentioned display desktop is received, is determined and above-mentioned first The corresponding application program of selection instruction, wherein above-mentioned first choice instruction is used to indicate above-mentioned target object in above-mentioned display table The application program selected on face;By the relevant information of above-mentioned application program and above-mentioned application program, shifted from above-mentioned display desktop To the above-mentioned target interface for being in hidden state.
Optionally, when program is run, equipment where control storage medium executes following functions: detecting whether to receive mesh The deletion instruction of object is marked, above-mentioned deletion instruction, which is used to indicate, deletes from the above-mentioned target interface in hidden state using journey Sequence;In the case where receiving above-mentioned deletion instruction, at least one second selection instruction of above-mentioned target object input is received, really Fixed application program corresponding with above-mentioned second selection instruction, wherein above-mentioned second selection instruction is used to indicate above-mentioned target object The application program selected in the above-mentioned target interface in hidden state;By the phase of above-mentioned application program and above-mentioned application program Information is closed, is transferred to above-mentioned display desktop from the above-mentioned target interface in hidden state.
Optionally, when program is run, equipment where control storage medium executes following functions: detecting whether to receive mesh The unloading command of object is marked, above-mentioned unloading command is used to indicate the application program for unloading and installing on above-mentioned terminal device;It is receiving In the case where above-mentioned unloading command, application program corresponding with above-mentioned unloading command is unloaded from above-mentioned terminal device.
According to the embodiment of the present application, a kind of processor embodiment is additionally provided.Optionally, in the present embodiment, above-mentioned place Reason device is for running program, wherein above procedure executes any one of the above interface hidden method when running.
The embodiment of the present application provides a kind of equipment, equipment include processor, memory and storage on a memory and can The program run on a processor, processor performs the steps of when executing program determines target interface to be concealed, wherein Above-mentioned target interface is any one interface on the display desktop of terminal device, is provided with target widget in above-mentioned target interface, Above-mentioned target widget, which is used to indicate, hides above-mentioned target interface;Detect whether above-mentioned target widget receives the first trigger action; In the case where detecting that above-mentioned target widget receives above-mentioned first trigger action, by above-mentioned target interface from above-mentioned display table It is hidden on face.
Optionally, when above-mentioned processor executes program, it can also detect whether that the predetermined operation for receiving target object refers to It enables;In the case where receiving above-mentioned predetermined operational instructions, into desktop editing mode;Under above-mentioned desktop editing mode, really Fixed above-mentioned target interface to be concealed.
Optionally, when above-mentioned processor executes program, pop-up control can also be shown in above-mentioned target interface, and detect Whether above-mentioned pop-up control receives the second trigger action or third trigger action, wherein above-mentioned pop-up control is for prompting mesh Whether mark object, which determines, is hidden above-mentioned target interface;Detecting that above-mentioned pop-up control receives the feelings of above-mentioned second trigger action Under condition, the step for hiding above-mentioned target interface from above-mentioned display desktop is executed;Detecting that above-mentioned pop-up control receives In the case where above-mentioned third trigger action, the step of executing above-mentioned determination target interface to be concealed is returned.
Optionally, when above-mentioned processor executes program, the first key of target object input can also be received, wherein on It states first key to be used in the case where above-mentioned terminal device is screen lock state, into the above-mentioned target interface for being in hidden state Key, and above-mentioned first key be different from above-mentioned terminal device Personal Unlocking Key;Store above-mentioned first key.
Optionally, when above-mentioned processor executes program, the second key of target object input can also be received, wherein on The second key is stated for entering in hidden from the desktop of above-mentioned terminal device in the case where above-mentioned terminal device is unlocked state The key of the above-mentioned target interface of hiding state;Store above-mentioned second key.
Optionally, when above-mentioned processor executes program, it can also detect whether above-mentioned target interface is hidden successfully;It is detecting It is hidden in successful situation to above-mentioned target interface, exits the above-mentioned target interface in hidden state, return to above-mentioned display Desktop.
Optionally, when above-mentioned processor executes program, the exit instruction for receiving target object can also be detected whether;? In the case where receiving above-mentioned exit instruction, the above-mentioned target interface in hidden state is exited, returns to above-mentioned display desktop.
Optionally, when above-mentioned processor executes program, the screen locking instruction for receiving target object can also be detected whether;? In the case where receiving above-mentioned screen locking instruction, the Personal Unlocking Key for receiving above-mentioned target object input is detected whether;It is receiving In the case where above-mentioned Personal Unlocking Key, the above-mentioned target interface in hidden state is exited, returns to above-mentioned display desktop.
Optionally, when above-mentioned processor executes program, the addition instruction for receiving target object can also be detected whether, on Addition instruction is stated to be used to indicate in addition application program to the above-mentioned target interface for being in hidden state;Receiving above-mentioned addition In the case where instruction, above-mentioned display desktop is jumped to from the above-mentioned target interface in hidden state;Receive above-mentioned target object At least one first choice instruction inputted on above-mentioned display desktop determines corresponding with the instruction of above-mentioned first choice using journey Sequence, wherein above-mentioned first choice instruction is used to indicate the application program that above-mentioned target object selects on above-mentioned display desktop;It will The relevant information of above-mentioned application program and above-mentioned application program is transferred to the above-mentioned mesh in hidden state from above-mentioned display desktop It demarcates face.
Optionally, when above-mentioned processor executes program, the deletion instruction for receiving target object can also be detected whether, on It states to delete to instruct to be used to indicate and deletes application program from the above-mentioned target interface in hidden state;Receiving above-mentioned deletion In the case where instruction, at least one second selection instruction of above-mentioned target object input is received, it is determining to refer to above-mentioned second selection Enable corresponding application program, wherein above-mentioned second selection instruction is used to indicate above-mentioned target object upper in hidden state State the application program selected in target interface;By the relevant information of above-mentioned application program and above-mentioned application program, from hiding The above-mentioned target interface of state is transferred to above-mentioned display desktop.
Optionally, when above-mentioned processor executes program, the unloading command for receiving target object can also be detected whether, on It states unloading command and is used to indicate the application program for unloading and installing on above-mentioned terminal device;The case where receiving above-mentioned unloading command Under, application program corresponding with above-mentioned unloading command is unloaded from above-mentioned terminal device.
Present invention also provides a kind of computer program products, when executing on data processing equipment, are adapted for carrying out just The program of beginningization there are as below methods step: target interface to be concealed is determined, wherein above-mentioned target interface is the aobvious of terminal device Show any one interface on desktop, target widget is provided in above-mentioned target interface, above-mentioned target widget, which is used to indicate, to be hidden State target interface;Detect whether above-mentioned target widget receives the first trigger action;Detecting that above-mentioned target widget receives In the case where above-mentioned first trigger action, above-mentioned target interface is hidden from above-mentioned display desktop.
Optionally, it when above-mentioned computer program product executes program, can also detect whether to receive the pre- of target object Determine operational order;In the case where receiving above-mentioned predetermined operational instructions, into desktop editing mode;In above-mentioned desktop editing mould Under formula, above-mentioned target interface to be concealed is determined.
Optionally, when above-mentioned computer program product executes program, pop-up control can also be shown in above-mentioned target interface Part, and detect whether above-mentioned pop-up control receives the second trigger action or third trigger action, wherein above-mentioned pop-up control is used Above-mentioned target interface is hidden in whether prompt target object determines;Detect above-mentioned pop-up control receive it is above-mentioned second triggering In the case where operation, the step for hiding above-mentioned target interface from above-mentioned display desktop is executed;Detecting above-mentioned pop-up control In the case that part receives above-mentioned third trigger action, the step of executing above-mentioned determination target interface to be concealed is returned.
Optionally, when above-mentioned computer program product executes program, the first key of target object input can also be received, Wherein, above-mentioned first key is used in the case where above-mentioned terminal device is screen lock state, into above-mentioned in hidden state The key of target interface, and above-mentioned first key is different from the Personal Unlocking Key of above-mentioned terminal device;Store above-mentioned first key.
Optionally, when above-mentioned computer program product executes program, the second key of target object input can also be received, Wherein, above-mentioned second key is used in the case where above-mentioned terminal device is unlocked state, from the desktop of above-mentioned terminal device into Enter the key of the above-mentioned target interface in hidden state;Store above-mentioned second key.
Optionally, when above-mentioned computer program product executes program, it can also detect whether above-mentioned target interface is hidden into Function;In the case where detecting that above-mentioned target interface hides successful situation, the above-mentioned target interface in hidden state is exited, is returned to Above-mentioned display desktop.
Optionally, it when above-mentioned computer program product executes program, can also detect whether to receive moving back for target object It instructs out;In the case where receiving above-mentioned exit instruction, the above-mentioned target interface in hidden state is exited, is returned to above-mentioned Show desktop.
Optionally, when above-mentioned computer program product executes program, the lock for receiving target object can also be detected whether Screen instruction;In the case where receiving above-mentioned screen locking instruction, the Personal Unlocking Key for receiving above-mentioned target object input is detected whether; In the case where receiving above-mentioned Personal Unlocking Key, the above-mentioned target interface in hidden state is exited, returns to above-mentioned display table Face.
Optionally, it when above-mentioned computer program product executes program, can also detect whether to receive adding for target object Add instruction, above-mentioned addition instruction is used to indicate in addition application program to the above-mentioned target interface for being in hidden state;It is receiving In the case where above-mentioned addition instruction, above-mentioned display desktop is jumped to from the above-mentioned target interface in hidden state;In reception State at least one first choice instruction that target object inputs on above-mentioned display desktop, the instruction pair of determining and above-mentioned first choice The application program answered, wherein above-mentioned first choice instruction is used to indicate what above-mentioned target object selected on above-mentioned display desktop Application program;By the relevant information of above-mentioned application program and above-mentioned application program, it is transferred to from above-mentioned display desktop in hiding The above-mentioned target interface of state.
Optionally, it when above-mentioned computer program product executes program, can also detect whether to receive deleting for target object Except instruction, above-mentioned deletion instruction, which is used to indicate, deletes application program from the above-mentioned target interface in hidden state;It is receiving In the case where above-mentioned deletion instruction, receive at least one second selection instruction of above-mentioned target object input, it is determining with it is above-mentioned The corresponding application program of second selection instruction, wherein above-mentioned second selection instruction is used to indicate above-mentioned target object in hidden The application program selected in the above-mentioned target interface of hiding state;By the relevant information of above-mentioned application program and above-mentioned application program, Above-mentioned display desktop is transferred to from the above-mentioned target interface in hidden state.
Optionally, it when above-mentioned computer program product executes program, can also detect whether to receive unloading for target object Instruction is carried, above-mentioned unloading command is used to indicate the application program for unloading and installing on above-mentioned terminal device;Receiving above-mentioned unloading In the case where instruction, application program corresponding with above-mentioned unloading command is unloaded from above-mentioned terminal device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (14)

1. a kind of interface hidden method characterized by comprising
Determining target interface to be concealed, wherein the target interface is any one interface on the display desktop of terminal device, Target widget is provided in the target interface, the target widget, which is used to indicate, hides the target interface;
Detect whether the target widget receives the first trigger action;
In the case where detecting that the target widget receives first trigger action, the target interface is shown from described Show and is hidden on desktop.
2. the method according to claim 1, wherein before determining target interface to be concealed, the method Further include:
Detect whether to receive the predetermined operational instructions of target object;
In the case where receiving the predetermined operational instructions, into desktop editing mode;
Under the desktop editing mode, the target interface to be concealed is determined.
3. the method according to claim 1, wherein the target interface is hidden from the display desktop Before, the method also includes:
Pop-up control is shown in the target interface, and detects whether the pop-up control receives the second trigger action or Three trigger actions, wherein the pop-up control hides the target interface for prompting target object whether to determine;
In the case where detecting that the pop-up control receives second trigger action, execute the target interface from institute State the step hidden on display desktop;
In the case where detecting that the pop-up control receives the third trigger action, it is to be concealed to return to the execution determination Target interface the step of.
4. the method according to claim 1, which is characterized in that by the target interface from described It shows before being hidden on desktop, the method also includes:
Receive the first key of target object input, wherein the first key is used in the terminal device be screen lock state In the case where, into the key of the target interface in hidden state, and the first key is different from the terminal and sets Standby Personal Unlocking Key;
Store the first key.
5. the method according to claim 1, which is characterized in that by the target interface from described It shows before being hidden on desktop, the method also includes:
Receive the second key of target object input, wherein second key is used in the terminal device be unlocked state In the case where, the key of the target interface in hidden state is entered from the desktop of the terminal device;
Store second key.
6. the method according to claim 1, which is characterized in that by the target interface from described It shows after being hidden on desktop, the method also includes:
Detect whether the target interface is hidden successfully;
In the case where detecting that the target interface hides successful situation, the target interface in hidden state is exited, is returned To the display desktop.
7. according to the method described in claim 6, returning it is characterized in that, exit the target interface in hidden state To the display desktop, comprising:
Detect whether to receive the exit instruction of target object;
In the case where receiving the exit instruction, the target interface in hidden state is exited, is shown back to described Show desktop.
8. according to the method described in claim 6, returning it is characterized in that, exit the target interface in hidden state To the display desktop, comprising:
Detect whether that the screen locking for receiving target object instructs;
In the case where receiving screen locking instruction, the Personal Unlocking Key for receiving the target object input is detected whether;
In the case where receiving the Personal Unlocking Key, the target interface in hidden state is exited, is shown back to described Show desktop.
9. the method according to claim 1, wherein the target interface includes: to show in the target interface Application program;After the target interface is hidden from the display desktop, the method also includes:
Detect whether to receive the addition instruction of target object, the addition instruction, which is used to indicate, adds application program to being in hidden In the target interface of hiding state;
In the case where receiving addition instruction, the display table is jumped to from the target interface in hidden state Face;
At least one first choice instruction that the target object inputs on the display desktop is received, is determined and described first The corresponding application program of selection instruction, wherein the first choice instruction is used to indicate the target object in the display table The application program selected on face;
By the relevant information of the application program and the application program, it is transferred to from the display desktop in hidden state The target interface.
10. the method according to claim 1, wherein the target interface includes: to show in the target interface Application program;After the target interface is hidden from the display desktop, the method also includes:
Detect whether that the deletion for receiving target object instructs, the deletion instruction is used to indicate from described in hidden state Application program is deleted in target interface;
In the case where receiving deletion instruction, at least one second selection instruction of the target object input is received, Determine application program corresponding with second selection instruction, wherein second selection instruction is used to indicate the target pair As the application program selected in the target interface in hidden state;
By the relevant information of the application program and the application program, it is transferred to from the target interface in hidden state The display desktop.
11. the method according to claim 1, wherein the target interface includes: to show in the target interface Application program;After the target interface is hidden from the display desktop, the method also includes:
Detect whether to receive the unloading command of target object, the unloading command, which is used to indicate on the unloading terminal device, pacifies The application program of dress;
In the case where receiving the unloading command, application corresponding with the unloading command is unloaded from the terminal device Program.
12. a kind of interface concealing device characterized by comprising
Determining module, for determining target interface to be concealed, wherein the target interface is on the display desktop of terminal device Any one interface is provided with target widget in the target interface, and the target widget, which is used to indicate, hides target circle Face;
Detection module, for detecting whether the target widget receives the first trigger action;
Hidden module, in the case where detecting that the target widget receives first trigger action, by the mesh Demarcate face from the display desktop hide.
13. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When control the storage medium where equipment execute following steps: determine target interface to be concealed, wherein the target interface For any one interface on the display desktop of terminal device, target widget, the target widget are provided in the target interface It is used to indicate and hides the target interface;Detect whether the target widget receives the first trigger action;It is described detecting In the case that target widget receives first trigger action, the target interface is hidden from the display desktop.
14. a kind of processor, which is characterized in that the processor is for running program, wherein executed when described program is run with Lower step: target interface to be concealed is determined, wherein the target interface is any one boundary on the display desktop of terminal device Face is provided with target widget in the target interface, and the target widget, which is used to indicate, hides the target interface;Described in detection Whether target widget receives the first trigger action;Detecting that the target widget receives the feelings of first trigger action Under condition, the target interface is hidden from the display desktop.
CN201810904551.9A 2018-08-09 2018-08-09 Interface hidden method and device Pending CN109085976A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810904551.9A CN109085976A (en) 2018-08-09 2018-08-09 Interface hidden method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810904551.9A CN109085976A (en) 2018-08-09 2018-08-09 Interface hidden method and device

Publications (1)

Publication Number Publication Date
CN109085976A true CN109085976A (en) 2018-12-25

Family

ID=64834477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810904551.9A Pending CN109085976A (en) 2018-08-09 2018-08-09 Interface hidden method and device

Country Status (1)

Country Link
CN (1) CN109085976A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110007822A (en) * 2019-03-29 2019-07-12 维沃移动通信有限公司 A kind of interface display method and terminal device
CN111913761A (en) * 2020-08-18 2020-11-10 网易(杭州)网络有限公司 Plug-in processing method, device, equipment and storage medium for live channel
CN112099694A (en) * 2020-09-24 2020-12-18 维沃移动通信有限公司 Desktop control processing method and device
CN112835483A (en) * 2021-01-29 2021-05-25 中汽创智科技有限公司 Method, system, device and medium for starting vehicle-mounted application to different display screens
CN115344185A (en) * 2021-04-28 2022-11-15 Oppo广东移动通信有限公司 Interface interaction method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424412A (en) * 2013-09-03 2015-03-18 北京三星通信技术研究有限公司 Method for protecting information in intelligent terminal, page switching method and intelligent terminal
CN104424444A (en) * 2013-09-06 2015-03-18 中兴通讯股份有限公司 Processing method, device and terminal for hidden folder
CN104992121A (en) * 2015-07-02 2015-10-21 成都亿邻通科技有限公司 Hidden management method for application icons
CN105159542A (en) * 2015-09-21 2015-12-16 北京元心科技有限公司 Desktop icon display method and apparatus for intelligent device
CN105471811A (en) * 2014-06-19 2016-04-06 北京搜狗科技发展有限公司 Privacy space processing method and privacy space processing device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424412A (en) * 2013-09-03 2015-03-18 北京三星通信技术研究有限公司 Method for protecting information in intelligent terminal, page switching method and intelligent terminal
CN104424444A (en) * 2013-09-06 2015-03-18 中兴通讯股份有限公司 Processing method, device and terminal for hidden folder
CN105471811A (en) * 2014-06-19 2016-04-06 北京搜狗科技发展有限公司 Privacy space processing method and privacy space processing device
CN104992121A (en) * 2015-07-02 2015-10-21 成都亿邻通科技有限公司 Hidden management method for application icons
CN105159542A (en) * 2015-09-21 2015-12-16 北京元心科技有限公司 Desktop icon display method and apparatus for intelligent device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110007822A (en) * 2019-03-29 2019-07-12 维沃移动通信有限公司 A kind of interface display method and terminal device
CN111913761A (en) * 2020-08-18 2020-11-10 网易(杭州)网络有限公司 Plug-in processing method, device, equipment and storage medium for live channel
CN112099694A (en) * 2020-09-24 2020-12-18 维沃移动通信有限公司 Desktop control processing method and device
CN112099694B (en) * 2020-09-24 2022-06-03 维沃移动通信有限公司 Desktop control processing method and device
CN112835483A (en) * 2021-01-29 2021-05-25 中汽创智科技有限公司 Method, system, device and medium for starting vehicle-mounted application to different display screens
CN115344185A (en) * 2021-04-28 2022-11-15 Oppo广东移动通信有限公司 Interface interaction method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109085976A (en) Interface hidden method and device
CN104077518A (en) Device and method for unlocking and executing application
CN105487707B (en) A kind of intelligent wearable device and its data inputting method
CN107194235B (en) A kind of application program launching method and mobile terminal
CN105677222B (en) Application message methods of exhibiting, application message show device and terminal
CN104424412A (en) Method for protecting information in intelligent terminal, page switching method and intelligent terminal
CN105956444A (en) Private application display method and device and terminal equipment
CN104424444A (en) Processing method, device and terminal for hidden folder
CN105224194B (en) A kind of data processing method and terminal
CN104360805A (en) Application icon management method and application icon management device
CN105847130A (en) Instant messaging application chatting record processing method and device
CN104951093A (en) Mobile terminal capable of calling programs or functions by customizing keys and method of mobile terminal
CN104572175B (en) A kind of method and device for quickly starting non-privacy type application
CN106815509B (en) A kind of multimedia file guard method, device and electronic equipment
CN106033507A (en) Screen unlocking methods and devices for touch screen devices
CN106547451A (en) Open application program method more, open application programmer and terminal more
CN111866270A (en) Application program control method and device and electronic equipment
CN105045465A (en) Method and terminal for accessing to applications quickly from unlock interface
CN107423369A (en) A kind of method and device for handling file to be deleted
CN106020637A (en) An application start method and a mobile terminal
CN104216648A (en) Information input method and device
CN108108084A (en) Show the method, apparatus and electronic equipment of message details
CN105808032B (en) Focus control method and device based on android control
CN104809373B (en) A kind of method of terminal unlocking
CN104991702B (en) A kind of method and terminal of terminal display picture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181225