CN111492336B - Hiding method of application icon, mobile terminal and computer readable storage medium - Google Patents

Hiding method of application icon, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN111492336B
CN111492336B CN201780097087.0A CN201780097087A CN111492336B CN 111492336 B CN111492336 B CN 111492336B CN 201780097087 A CN201780097087 A CN 201780097087A CN 111492336 B CN111492336 B CN 111492336B
Authority
CN
China
Prior art keywords
icon
hidden
hiding
mobile terminal
application icon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780097087.0A
Other languages
Chinese (zh)
Other versions
CN111492336A (en
Inventor
桂明建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Communication Co Ltd
Original Assignee
Shenzhen Transsion Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Communication Co Ltd filed Critical Shenzhen Transsion Communication Co Ltd
Publication of CN111492336A publication Critical patent/CN111492336A/en
Application granted granted Critical
Publication of CN111492336B publication Critical patent/CN111492336B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a hiding method of application icons, which is applied to a mobile terminal, wherein the mobile terminal is provided with a fingerprint receiving device, and the hiding method of the application icons comprises the following steps: when the running state of the mobile terminal meets the application icon hiding condition, fingerprint information input by a user is received; when fingerprint information is received, determining an icon to be hidden corresponding to the fingerprint information; hiding the icon to be hidden. The invention also discloses a mobile terminal and a computer readable storage medium. According to the invention, the mobile terminal can hide the application icon according to the fingerprint information, so that the purpose of hiding the application icon can be achieved without unloading software corresponding to the application icon, the hiding flow of the application icon is simplified, and the user experience is improved.

Description

Hiding method of application icon, mobile terminal and computer readable storage medium
Technical Field
The present invention relates to the field of intelligent mobile terminals, and in particular, to a method for hiding an application icon, a mobile terminal, and a computer readable storage medium.
Background
Along with the improvement of the living standard of people, the intelligent mobile terminal becomes an indispensable personal object in the life of people. A variety of applications are loaded on the intelligent mobile terminal, and the applications are displayed in the form of application icons.
In some cases, the user wants to hide the application icon to protect the privacy and the interests of the user, but in the prior art, the application icon is hidden by unloading the program corresponding to the application icon, and when the user wants to use the program again, reloading the program; namely, the hiding process of the application icons is complicated, and the user experience is reduced.
Disclosure of Invention
The invention mainly aims to provide an application icon hiding method, a mobile terminal and a computer readable storage medium, and aims to solve the problems that the hiding process of the application icon of the mobile terminal is complicated and the user experience is reduced.
In order to achieve the above object, the present invention provides a hiding method for an application icon, the hiding method for an application icon includes the following steps:
when the running state of the mobile terminal meets the application icon hiding condition, fingerprint information input by a user is received;
when fingerprint information is received, determining an icon to be hidden corresponding to the fingerprint information;
hiding the icon to be hidden.
Preferably, the step of determining the icon to be hidden corresponding to the fingerprint information includes:
determining an application icon corresponding to the fingerprint information;
when the fingerprint information corresponds to a plurality of application icons, generating a selection interface containing each application icon and outputting the selection interface;
when receiving information of the completion of the operation of the selection interface, determining an icon to be hidden according to the operated selection interface;
and when the fingerprint information corresponds to one application icon, the application icon is used as an icon to be hidden.
Preferably, before the step of determining the application icon corresponding to the fingerprint information, the method further includes:
when a pressure signal is detected, acquiring the duration of the pressure signal;
and when the duration reaches a first preset duration, judging that the running state of the mobile terminal meets the application icon hiding condition.
Preferably, after the step of acquiring the duration of the pressure signal, the method further comprises:
when the duration reaches a preset duration, determining a terminal operation interface corresponding to the pressing operation of the pressure signal;
and when the terminal operation interface is a hidden interface, judging that the running state of the mobile terminal meets the application icon hiding condition.
Preferably, the hiding method of the application icon further includes:
after hiding the icons to be hidden, exchanging the positions of the application icons arranged at the tail of the hiding interface with the positions of the icons to be hidden.
Preferably, after the step of hiding the icon to be hidden, the method further includes:
and displaying the icon to be hidden when fingerprint information corresponding to the icon to be hidden is received.
Preferably, after the step of hiding the icon to be hidden, the method further includes:
and displaying the icon to be hidden when the hiding time length of the icon to be hidden is detected to reach a second preset time length.
In order to achieve the above object, the present invention further provides a mobile terminal, which includes a fingerprint receiving device, a processor, a memory, and a hiding program of an application icon stored in the memory and executable on the processor, wherein the hiding program of the application icon implements the steps of the hiding method of the application icon as described above when being executed by the processor.
To achieve the above object, the present invention also provides a computer-readable storage medium storing a hiding program of an application icon, which when executed by a processor, implements the steps of the hiding method of an application icon as described above.
According to the application icon hiding method, the mobile terminal and the computer readable storage medium, when the running state of the mobile terminal is detected to meet the application icon hiding condition, the corresponding icon to be hidden is determined according to the received fingerprint information, so that the icon to be hidden is hidden; because the mobile terminal can hide the application icon according to the fingerprint information, the purpose of hiding the application icon can be achieved without unloading software corresponding to the application icon, the hiding flow of the application icon is simplified, and the user experience is improved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a mobile terminal according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a hiding method for application icons according to the present invention;
FIG. 3 is a schematic diagram of a refinement flow chart of step S100 in FIG. 2;
FIG. 4 is a schematic diagram of a refinement flow chart of step S200 in FIG. 2;
FIG. 5 is a flowchart illustrating a hiding method for application icons according to a second embodiment of the present invention;
fig. 6 is a flowchart of a third embodiment of a hiding method for application icons according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The main solutions of the embodiments of the present invention are: when the running state of the mobile terminal meets the application icon hiding condition, fingerprint information input by a user is received; when fingerprint information is received, determining an icon to be hidden corresponding to the fingerprint information; hiding the icon to be hidden.
In the prior art, a user wants to hide an application icon to protect privacy and interests of the user, but in the prior art, the application icon is hidden by unloading a program corresponding to the application icon, and when the user wants to use the program again, reloading the program; namely, the hiding process of the application icons is complicated, and the user experience is reduced.
The invention provides a solution: the mobile terminal can hide the application icons according to the fingerprint information, the purpose of hiding the application icons can be achieved without unloading software corresponding to the application icons, the hiding flow of the application icons is simplified, and the user experience is improved.
As shown in fig. 1, fig. 1 is a schematic structural diagram of a hardware running environment according to an embodiment of the present invention.
The embodiment of the invention relates to a mobile terminal, which comprises: a processor 1001, such as a CPU, a fingerprint receiving apparatus 1002, a memory 1003, and a communication bus 1004. Wherein the communication bus 1004 is used for realizing connection communication between the components, and the fingerprint receiving device 1002 is used for acquiring fingerprint information of a user.
The memory 1003 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. As shown in fig. 1, a hidden program of an application icon may be included in a memory 1003 as a kind of computer storage medium; and the processor 1001 may be configured to call a hidden program of the application icon stored in the memory 1003 and perform the following operations:
when the running state of the mobile terminal meets the application icon hiding condition, fingerprint information input by a user is received;
when fingerprint information is received, determining an icon to be hidden corresponding to the fingerprint information;
hiding the icon to be hidden.
Further, the processor 1001 may be configured to call a hidden program of the application icon stored in the memory 1003, and perform the following operations:
determining an application icon corresponding to the fingerprint information;
when the fingerprint information corresponds to a plurality of application icons, generating a selection interface containing each application icon and outputting the selection interface;
when receiving information of the completion of the operation of the selection interface, determining an icon to be hidden according to the operated selection interface;
and when the fingerprint information corresponds to one application icon, the application icon is used as an icon to be hidden.
Further, the processor 1001 may be configured to call a hidden program of the application icon stored in the memory 1003, and perform the following operations:
when a pressure signal is detected, acquiring the duration of the pressure signal;
and when the duration reaches a first preset duration, judging that the running state of the mobile terminal meets the application icon hiding condition.
Further, the processor 1001 may be configured to call a hidden program of the application icon stored in the memory 1003, and perform the following operations:
when the duration reaches a preset duration, determining a terminal operation interface corresponding to the pressing operation of the pressure signal;
and when the terminal operation interface is a hidden interface, judging that the running state of the mobile terminal meets the application icon hiding condition.
Further, the processor 1001 may be configured to call a hidden program of the application icon stored in the memory 1003, and perform the following operations:
after hiding the icons to be hidden, exchanging the positions of the application icons arranged at the tail of the hiding interface with the positions of the icons to be hidden.
Further, the processor 1001 may be configured to call a hidden program of the application icon stored in the memory 1003, and perform the following operations:
and displaying the icon to be hidden when fingerprint information corresponding to the icon to be hidden is received.
Further, the processor 1001 may be configured to call a hidden program of the application icon stored in the memory 1003, and perform the following operations:
and displaying the icon to be hidden when the hiding time length of the icon to be hidden is detected to reach a second preset time length.
According to the scheme, when the running state of the mobile terminal is detected to meet the hiding condition of the application icon, the corresponding icon to be hidden is determined according to the received fingerprint information, so that the icon to be hidden is hidden; because the mobile terminal can hide the application icon according to the fingerprint information, the purpose of hiding the application icon can be achieved without unloading software corresponding to the application icon, the hiding flow of the application icon is simplified, and the user experience is improved.
Based on the hardware architecture, the embodiment of the hiding method of the application icon is provided.
Referring to fig. 2, fig. 2 is a first embodiment of a hiding method for application icons according to the present invention, where the hiding method for application icons includes the following steps:
step S100, when the running state of the mobile terminal meets the application icon hiding condition, fingerprint information input by a user is received;
in the invention, the mobile terminal can be an intelligent device with a fingerprint receiving device, such as a mobile phone, a PC, a notebook and the like. When the running state of the mobile terminal meets the hiding condition of the application icon, the mobile terminal generates a fingerprint information acquisition interface (fingerprint information comprises fingerprint characteristics) and outputs the fingerprint information acquisition interface, and a user inputs the fingerprint information on a fingerprint receiving device according to the fingerprint information acquisition interface; of course, the mobile terminal may also generate prompt information for acquiring the fingerprint information so as to prompt the user to input the fingerprint information on the fingerprint receiving device.
It should be noted that, the mobile terminal is provided with a hiding condition of the application icon, when the running state of the mobile terminal meets the hiding condition of the application icon, that is, a mechanism for hiding the application icon is triggered, and the specific flow for determining that the running state of the mobile terminal meets the hiding condition of the application icon is shown in fig. 3, that is, step S100 includes:
step S110, when a pressure signal is detected, acquiring the duration of the pressure signal;
step S120, when the duration reaches a first preset duration, determining a terminal operation interface corresponding to the pressing operation of the pressure signal;
step S130, when the terminal operation interface is a hidden interface, judging that the running state of the mobile terminal meets the application icon hiding condition;
the user can place application icons to be hidden on a specific operation interface of the mobile terminal, wherein the specific operation interface is the hidden interface, the user sets corresponding fingerprint information for each application icon, namely the preset fingerprint information of the application icons of the hidden interface is the fingerprint characteristics of any finger among ten fingers of the user, and the fingerprint characteristics of each finger of the user can correspond to a plurality of application icons. When a long-time pressing operation is performed on the hidden interface (the long time may be any suitable duration, such as 10 s), the mobile terminal determines that the running state of the mobile terminal satisfies the hiding condition of the application icon.
It can be understood that when the mobile terminal detects the pressure signal, the duration of the pressure signal is determined first, when the duration reaches the preset duration, the mobile terminal further determines the terminal operation interface of the pressing operation corresponding to the pressure signal, and when the terminal operation interface is a hidden interface, the mobile terminal can determine that the user needs to hide the application icon. It should be noted that, the user may add or delete an application icon to the hidden interface, that is, when it is determined that the running condition of the mobile terminal meets the hidden condition of the application icon, the user may not add or delete the application icon to the hidden interface.
Of course, the user can set a hiding time period of the application icon, namely when the current time point reaches a preset time point, the running state of the mobile terminal is judged to meet the hiding condition of the application icon; or when the position of the mobile terminal is a preset position, judging that the running state of the mobile terminal meets the hiding condition of the application icon, for example, a user can set the game icon on the hiding interface, and the user sets the game icon in a home to hide the game icon, so that the child is prevented from playing a game through the mobile terminal.
Step S200, when fingerprint information is received, determining an icon to be hidden corresponding to the fingerprint information;
the user may correspond the fingerprint information to a plurality of application icons, that is, when the mobile terminal receives the fingerprint information, the user needs to determine the corresponding application icon according to the received fingerprint information, and then select an application icon to be hidden from the plurality of application icons, specifically, please refer to fig. 4, that is, step S200 includes:
step S210, determining an application icon corresponding to the fingerprint information;
step S220, when the fingerprint information corresponds to a plurality of application icons, generating a selection interface containing each application icon and outputting the selection interface;
step S230, when receiving the information of the completion of the operation of the selection interface, determining an icon to be hidden according to the operated selection interface;
step S240, when the fingerprint information corresponds to an application icon, the application icon is used as an icon to be hidden;
when the fingerprint information input by the user corresponds to a plurality of application icons, the mobile terminal generates a selection interface containing each application icon and outputs the selection interface so that the user can select the application icon (to-be-hidden icon) to be hidden by himself, and the user can select a plurality of to-be-hidden icons, not only one but also start timing after the mobile terminal outputs the selection interface, and if the mobile terminal does not receive the information of completion of the operation of the selection interface within a preset time period (the preset time period can be any proper value, such as 5 minutes), the action that the user gives up to hide the application icon is judged; when the fingerprint information corresponds to one application icon, the application icon is directly used as an icon to be hidden. It should be noted that, the user may input incorrect fingerprint information, at this time, the mobile terminal may set a virtual key for re-inputting the fingerprint information on the selection interface, so that the user re-inputs the fingerprint information, and when the user re-inputs the fingerprint information, update the application icon on the selection interface.
Step S300, hiding the icons to be hidden;
when the fingerprint information corresponds to an application icon, the mobile terminal generates prompt information (containing the name of the application icon) for confirming whether to hide the application icon before hiding the application icon, so that a user can judge whether the application icon is the application icon which needs to be hidden.
It should be noted that, after the icon to be hidden is hidden, the positions of the application icons arranged at the tail of the hidden interface and the icon to be hidden are exchanged, so that the icon to be hidden is not found by others.
In the technical scheme provided by the embodiment, when the running state of the mobile terminal is detected to meet the hiding condition of the application icon, the corresponding icon to be hidden is determined according to the received fingerprint information, so that the icon to be hidden is hidden; because the mobile terminal can hide the application icon according to the fingerprint information, the purpose of hiding the application icon can be achieved without unloading software corresponding to the application icon, the hiding flow of the application icon is simplified, and the user experience is improved.
Referring to fig. 5, fig. 5 is a second embodiment of the application icon hiding method according to the present invention, based on the above embodiment, after the step S300, further includes:
step S400, when fingerprint information corresponding to the icon to be hidden is received, displaying the icon to be hidden;
when the mobile terminal receives the fingerprint information of the hidden application icons again, the hidden icons to be hidden are displayed, when the mobile terminal contains a plurality of icons to be hidden, the mobile terminal generates and outputs a selection interface containing each icon to be hidden, and a user can select the icons to be hidden to be displayed according to the selection interface.
In the technical scheme provided by the embodiment, after the icon to be hidden is hidden by the mobile terminal and fingerprint information corresponding to the icon to be hidden is received, the icon to be hidden is displayed, so that the hidden icon is intelligently displayed by the mobile terminal, and the user experience is improved.
Referring to fig. 6, fig. 6 is a third embodiment of the hiding method of application icons according to the present invention, based on the first embodiment, after the step S300, further includes:
step S500, when the hiding time length of the icon to be hidden is detected to reach a second preset time length, displaying the icon to be hidden;
the user can set the hiding time length of the icon to be hidden by himself, that is, when the mobile terminal does not receive the fingerprint information, if the hiding time length is set by the icon to be hidden, and when the hiding time length reaches a second preset time length (the second preset time length can be any suitable value, such as 1 h), the mobile terminal displays the icon to be hidden by himself.
Of course, the user may also set the display belt hiding interface when the mobile terminal is at the preset position, for example, when the mobile terminal is at the train station, the icon to be hidden (for example, the icon to be hidden is 12306 official network) is displayed; or the user can automatically display the icon to be hidden when the mobile terminal is connected with the WIFI (for example, the icon to be hidden is the software to be upgraded).
In the technical scheme provided by the embodiment, after the icon to be hidden is hidden by the mobile terminal, and when the hiding time length of the icon to be hidden is detected to reach the preset time length, the icon to be hidden is displayed, so that the hidden icon is intelligently displayed by the mobile terminal, and the user experience is improved.
The invention also provides a mobile terminal which comprises a fingerprint receiving device, a processor, a memory and a hiding program of the application icon stored in the memory and capable of running on the processor, wherein the hiding program of the application icon realizes the steps of the hiding method of the application icon in the embodiment when being executed by the processor.
The present invention also provides a computer-readable storage medium storing a hiding program of an application icon, which when executed by a processor, implements the steps of the hiding method of an application icon as described in the above embodiment.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (8)

1. The application icon hiding method is characterized by being applied to a mobile terminal, wherein the mobile terminal is provided with a fingerprint receiving device, and the application icon hiding method comprises the following steps of:
when the mobile terminal is at a preset position, displaying a hidden interface;
when a pressure signal is detected, acquiring the duration of the pressure signal;
when the duration reaches a first preset duration and the terminal operation interface corresponding to the pressing operation of the pressure signal is the hidden interface, judging that the running state of the mobile terminal meets the application icon hiding condition;
when the running state of the mobile terminal meets the application icon hiding condition, fingerprint information is received;
determining an icon to be hidden corresponding to the fingerprint information;
hiding the icon to be hidden;
and when the mobile terminal meets the application icon display condition, displaying the icon to be hidden.
2. The method of claim 1, wherein the step of determining the icon to be hidden corresponding to the fingerprint information comprises:
determining an application icon corresponding to the fingerprint information;
generating a selection interface when the fingerprint information corresponds to at least two application icons, and determining an icon to be hidden in response to the operation on the selection interface;
and/or when the fingerprint information only corresponds to one application icon, the application icon is used as an icon to be hidden.
3. The method of claim 1, wherein the hiding method of the application icon further comprises:
after hiding the icons to be hidden, exchanging the positions of the application icons arranged at the tail of the hiding interface with the positions of the icons to be hidden.
4. The method of claim 1, wherein after the step of hiding the icon to be hidden, further comprising:
and displaying the icon to be hidden in response to receiving fingerprint information corresponding to the icon to be hidden.
5. The method of claim 1, wherein after the step of hiding the icon to be hidden, further comprising:
and displaying the icon to be hidden in response to detecting that the hiding time length of the icon to be hidden reaches a second preset time length.
6. The method of claim 1, wherein the step of displaying the hidden interface when the mobile terminal is in the preset position comprises:
the position information of the mobile terminal is judged,
and when the mobile terminal is at the preset position, displaying the hidden interface according to a preset rule.
7. A mobile terminal, characterized in that it comprises a processor, a memory, a hiding program of application icons stored in said memory and executable on said processor, said hiding program of application icons, when executed by the processor, implementing the steps of the hiding method of application icons according to any one of claims 1 to 6.
8. A computer-readable storage medium, wherein the computer-readable storage medium stores a hiding program of an application icon, which when executed by a processor, implements the steps of the hiding method of an application icon as claimed in any one of claims 1 to 6.
CN201780097087.0A 2017-09-30 2017-09-30 Hiding method of application icon, mobile terminal and computer readable storage medium Active CN111492336B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/105153 WO2019061539A1 (en) 2017-09-30 2017-09-30 Application icon hiding method, mobile terminal, and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111492336A CN111492336A (en) 2020-08-04
CN111492336B true CN111492336B (en) 2024-02-13

Family

ID=65902785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780097087.0A Active CN111492336B (en) 2017-09-30 2017-09-30 Hiding method of application icon, mobile terminal and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN111492336B (en)
WO (1) WO2019061539A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN113805751A (en) * 2021-09-23 2021-12-17 上海闻泰信息技术有限公司 Application opening method and device, electronic equipment, storage medium and program product

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850433A (en) * 2015-04-30 2015-08-19 广东欧珀移动通信有限公司 Mobile terminal application starting method and mobile terminal
CN105005436A (en) * 2015-06-26 2015-10-28 宇龙计算机通信科技(深圳)有限公司 Program processing method and mobile terminal
CN105825105A (en) * 2015-11-30 2016-08-03 南京步步高通信科技有限公司 Method and electronic equipment for displaying objects hidden on interface
CN105930145A (en) * 2016-04-12 2016-09-07 广东欧珀移动通信有限公司 Information hiding method and mobile terminal
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system
CN106484301A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method of hiden application and terminal
CN106845199A (en) * 2017-01-24 2017-06-13 北京小米移动软件有限公司 Object authentication method and device
CN107111763A (en) * 2017-03-27 2017-08-29 深圳市汇顶科技股份有限公司 The reminding method and electronic equipment of fingerprinting operation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9996254B2 (en) * 2015-09-23 2018-06-12 Samsung Electronics Co., Ltd. Hidden application icons
CN105700884A (en) * 2016-01-14 2016-06-22 成都中科创达软件有限公司 Application icon hiding method and system, and intelligent terminal
CN105843483A (en) * 2016-04-06 2016-08-10 上海斐讯数据通信技术有限公司 Method for managing APP icons and mobile terminal
CN106484231A (en) * 2016-09-30 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application hides

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850433A (en) * 2015-04-30 2015-08-19 广东欧珀移动通信有限公司 Mobile terminal application starting method and mobile terminal
CN105005436A (en) * 2015-06-26 2015-10-28 宇龙计算机通信科技(深圳)有限公司 Program processing method and mobile terminal
CN105825105A (en) * 2015-11-30 2016-08-03 南京步步高通信科技有限公司 Method and electronic equipment for displaying objects hidden on interface
CN105930145A (en) * 2016-04-12 2016-09-07 广东欧珀移动通信有限公司 Information hiding method and mobile terminal
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system
CN106484301A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method of hiden application and terminal
CN106845199A (en) * 2017-01-24 2017-06-13 北京小米移动软件有限公司 Object authentication method and device
CN107111763A (en) * 2017-03-27 2017-08-29 深圳市汇顶科技股份有限公司 The reminding method and electronic equipment of fingerprinting operation

Also Published As

Publication number Publication date
WO2019061539A1 (en) 2019-04-04
CN111492336A (en) 2020-08-04

Similar Documents

Publication Publication Date Title
CN107643977B (en) Anti-addiction method and related product
CN107515764B (en) Application page opening method, terminal and computer readable storage medium
EP3163854A1 (en) Reduced notifications for same push messages
CN108135033B (en) Bluetooth connection method and mobile terminal
CN108038729B (en) Reward issuing method, device and server
EP3731088B1 (en) Method and device for displaying information and storage medium
CN108121631B (en) Screen abnormal state reminding method and device
CN108037990B (en) Task information processing method and device and server
CN111492336B (en) Hiding method of application icon, mobile terminal and computer readable storage medium
CN104881304B (en) Resource downloading method and device
CN111818499B (en) Quick pairing method, device, equipment and computer readable storage medium
EP3232325A1 (en) Method and device for starting application interface
CN112672794A (en) Game page display method and related product
CN111309416B (en) Information display method, device and equipment of application interface and readable medium
CN105373370B (en) Control display method and device
CN111050414B (en) Prompt display method and device and computer readable storage medium
CN108304123A (en) Page display control method and related product
CN109902232B (en) Display control method and terminal
CN109814953B (en) Wearable device view processing method and device, wearable device and storage medium
CN106899687A (en) A kind of information prompting method and terminal
CN107241439B (en) Message pushing method and device for H5 page
WO2020073242A1 (en) Minigame access method and related device
CN109740361B (en) Data processing method, device and computer readable storage medium
CN112149195A (en) Privacy protection method, device, equipment and computer readable storage medium
CN108536508B (en) Interface processing method and device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant