CN111656347A - Project display method and terminal - Google Patents

Project display method and terminal Download PDF

Info

Publication number
CN111656347A
CN111656347A CN201880088100.0A CN201880088100A CN111656347A CN 111656347 A CN111656347 A CN 111656347A CN 201880088100 A CN201880088100 A CN 201880088100A CN 111656347 A CN111656347 A CN 111656347A
Authority
CN
China
Prior art keywords
interface
user
terminal
item
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201880088100.0A
Other languages
Chinese (zh)
Other versions
CN111656347B (en
Inventor
李展
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN111656347A publication Critical patent/CN111656347A/en
Application granted granted Critical
Publication of CN111656347B publication Critical patent/CN111656347B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a project display method and a project display terminal, relates to the technical field of communication, and is beneficial to simplifying the operation of hiding and displaying projects by a user, improving the use efficiency of the terminal and improving the user experience. The method is applicable to a terminal comprising a touch screen provided with a fingerprint recognizer, and comprises the following steps: the terminal displays a first interface, wherein a first item is selected from the first interface, and the number of the first item is at least one; the method comprises the steps that a terminal receives a first operation of a user on a touch screen, wherein the first operation is a preset operation gesture for indicating the terminal to hide a first item; responding to the first operation, and acquiring fingerprint information of the user in the first operation by the terminal through a fingerprint identifier; and responding to the verification of the acquired fingerprint information of the user in the first operation, and displaying a second interface by the terminal, wherein the second interface has fewer first items than the first interface, and the items displayed by the second interface are the same as the other items except the first item in the first interface.

Description

Project display method and terminal Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and a terminal for displaying a project.
Background
In the process of using the mobile phone, users pay more and more attention to protection of personal information, especially privacy information. Currently, privacy information of a user may be protected, for example, using a privacy cabinet.
As shown in fig. 1, the user first finds the "file management" application icon from the home screen interface of the terminal, clicks the "file management" application icon, and enters the file management interface. And selecting and clicking a control corresponding to the confidential cabinet to enter an interface of the confidential cabinet. In the interface of the confidential cabinet, a user needs to input a password first, and after the password passes the verification, the mobile phone displays the files in the confidential cabinet. For example: the control 201 displays 0 picture in the privacy cabinet. Further, the user clicks the "move in" control 202, clicks the file type of "picture" on the "select file type" menu 203, selects the corresponding album, selects one or more pictures in the album, and clicks the "ok" button. At this point, the selected picture is moved from the gallery application to the lockers application. In the interface shown in (8) of fig. 1, the control 204 displays 2 pictures in the lockers. Thus, when the user browses the photos from the gallery, the pictures moved to the privacy cabinet are not displayed in the gallery, and the pictures are hidden from the user. If the user needs to view the pictures, the pictures need to be viewed from a confidential cabinet in the file management.
Therefore, the operation process of hiding the picture in the terminal by the user is complicated, the service efficiency of the terminal is low, and the user experience is poor.
Disclosure of Invention
According to the project display method and the project display terminal, the operation of hiding and displaying the project by a user can be simplified, the use efficiency of the terminal is improved, and the user experience is improved.
In a first aspect, an embodiment of the present application provides a method for displaying an item, where the method is applied to a terminal, the terminal includes a touch screen, and the touch screen is configured with a fingerprint identifier, and the method includes: the terminal displays a first interface, wherein a first item is selected from the first interface, and the number of the first item is at least one; the method comprises the steps that a terminal receives a first operation of a user on a touch screen, wherein the first operation is a preset operation gesture for indicating the terminal to hide a first item, and the first operation is an operation on a first interface; responding to the first operation, and acquiring fingerprint information of the user in the first operation by the terminal through a fingerprint identifier; and responding to the verification of the acquired fingerprint information of the user in the first operation, and displaying a second interface by the terminal, wherein the second interface does not display the first item, and the second interface displays less first items than the first interface, and the items displayed by the second interface are the same as other items except the first item in the first interface.
From the above, in the process of using the application, the user can directly operate the items (first items) to be hidden, so that the items are hidden by the terminal. And the current application is not required to be exited, and a special application (such as a 'secret cabinet' application) is entered to carry out complex operation so as to hide items in the application. Therefore, the method provided by the embodiment of the application can simplify the operation of the user, improve the interaction efficiency between the user and the terminal, and is beneficial to improving the user experience.
In addition, in the process of hiding the project in the application, the embodiment of the application carries out user identity verification, is favorable for avoiding misoperation of the user, and avoids files which do not need to be hidden from being hidden.
In some possible implementations, the first interface further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon.
In other examples of the application, when the terminal displays a browsing interface or an editing interface of the picture folder, it may be further determined whether the user needs to hide the picture file. If the user needs to hide the picture file, a fingerprint icon may be displayed. Otherwise, the fingerprint icon may not be displayed.
The above-mentioned determination of whether the user needs to hide the picture file may be, for example, an operation that the terminal detects that the user opens a "hide" function. The operation of the user opening the "hidden" function may be, for example, that the user opens the hidden function in the system setting of the terminal, or that the user opens the hidden function button in the setting of the application, or the like. This is not particularly limited in the embodiments of the present application.
In other examples of the present application, the terminal does not display the fingerprint icon while displaying the picture folder editing interface until no picture files are selected. And after the terminal detects that the user selects the picture file to be hidden, the fingerprint icon is displayed. The embodiment of the present application does not limit this.
In some possible implementations, the receiving, by the terminal, the first operation of the user on the touch screen includes: the terminal receives any one of the following operations executed by a user at the display position of the fingerprint icon: clicking, double clicking and long pressing; or the terminal receives that the user drags the control corresponding to the first item to the display position of the fingerprint icon; or, the terminal receives that the user drags the fingerprint icon to the control corresponding to the first item. Therefore, the embodiment of the application provides various operation gestures, which is beneficial to simplifying user operation and improving user experience.
In other examples of the present application, an operation gesture for hiding an item is preset in the terminal, for example: clicking, long-pressing, double-clicking a fingerprint icon and the like after the selected item is taken as an item to be hidden. If the terminal detects that the first operation input by the user is the same as the preset operation gesture of the hidden item, the terminal can determine that the operation of the hidden item is received. And when the first operation is determined to be the preset operation gesture and the comparison is successful according to the user fingerprint acquired by the first operation, the terminal can determine to hide the first item.
In some possible implementations, after the terminal displays the second interface, the method further includes: the terminal receives a second operation of the user on the touch screen, wherein the second operation is a preset operation gesture for indicating the terminal to display the first item, and the second operation is an operation on a second interface; responding to the second operation, and acquiring the fingerprint information of the user in the second operation by the terminal through the fingerprint identifier; and responding to the verification of the collected fingerprint information of the user in the second operation, and displaying a third interface by the terminal, wherein the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface. Therefore, the embodiment of the application also provides a method for displaying the hidden item, and user experience is improved.
In some possible implementations, after the terminal receives the first operation of the user on the touch screen, the method further includes: and responding to the verification failure of the acquired fingerprint information of the user in the first operation, and displaying a fourth interface by the terminal, wherein prompt information is displayed on the fourth interface and prompts the user to input the fingerprint information.
In some possible implementations, the first interface is a folder interface, and the first item is any one of: picture files, video files, audio files, text files, folders; or the first interface is a gallery application interface, and the first project is a picture file or a video file; or the first interface is a home screen interface, and the first item is an application icon; or the first interface is a browsing interface of the short message, and the first item is the short message; or the first interface is an address book interface, and the first item is contact information; or the first interface is a negative one-screen interface, and the first item is card information.
In a second aspect, an item display method provided in an embodiment of the present application is applied to a terminal, where the terminal includes a touch screen, and the touch screen is configured with a fingerprint identifier, and the method further includes: the terminal displays a first interface, and a first item is displayed on the first interface; the terminal receives the operation that a user hides a first item; in response to receiving an operation that a user hides a first item, the terminal displays a second interface, the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as the other items except the first item in the first interface; the method comprises the steps that a terminal receives a first operation of a user on a touch screen, wherein the first operation is a preset operation gesture for indicating the terminal to display a first item; the first item is not displayed in the first interface; responding to the first operation, and acquiring fingerprint information of the user in the first operation by the terminal through a fingerprint identifier; and responding to the verification of the acquired fingerprint information of the user in the first operation, and displaying a second third interface by the terminal, wherein the third interface has more first items than the second interface, and other items displayed by the third interface are the same as the second interface, and the first items are displayed in the second interface.
The first interface may be, for example, a browsing interface or an editing interface of an application or an application function, where the browsing interface or the editing interface includes a plurality of folder icons or file icons. The first interface may also be a home screen interface of the terminal, and the home screen interface includes a plurality of application icons or folder icons. The first interface may also be a negative one-screen interface of the terminal, where the negative one-screen interface may refer to an interface where the user slides in from a main screen interface (or desktop) to the right, the negative one-screen interface may display functions, applications, subscribed services and information, etc. commonly used by the user, and the negative one-screen menu is also referred to as a desktop assistant, a shortcut menu, etc. For example: the negative screen can also display a scene intelligence application, and the scene intelligence application comprises a plurality of card information.
In some possible implementation manners, the first interface further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon; the terminal receiving a first operation of a user on the touch screen comprises the following steps: the terminal receives any one of the following operations executed by a user at the display position of the fingerprint icon: click, double click, long press.
In some possible implementations, the first interface is a folder interface; the first item is any one of: picture files, video files, audio files, text files, folders; or the first interface is a gallery application interface, and the first project is a picture file or a video file; or the first interface is a home screen interface, and the first item is an application icon; or the first interface is a browsing interface of the short message, and the first item is the short message; or the first interface is an address book interface, and the first item is contact information; or the first interface is a negative one-screen interface, and the first item is card information.
In a third aspect, a terminal includes a touch screen configured with a fingerprint identifier, and includes: the display unit is used for displaying a first interface, wherein a first item is selected in the first interface, and the number of the first item is at least one; the receiving unit is used for receiving a first operation of a user on the touch screen, wherein the first operation is a preset operation gesture for indicating the terminal to hide a first item; the processing unit is used for responding to the first operation and acquiring the fingerprint information of the user in the first operation through the fingerprint identifier; and the display unit is also used for responding to the verification of the acquired fingerprint information of the user in the first operation, displaying a second interface, wherein the second interface does not display the first item, and the second interface displays less first items than the first interface, and the items displayed on the second interface are the same as the other items except the first item in the first interface.
In some possible implementations, the first interface displayed by the display unit further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon.
In some possible implementations, the receiving unit, configured to receive a first operation of a user on a touch screen, includes: receiving any one of the following operations performed by a user at the display position of the fingerprint icon: clicking, double clicking and long pressing; or receiving that the user drags the control corresponding to the first item to the display position of the fingerprint icon; or, receiving that the user drags the fingerprint icon to the control corresponding to the first item.
In some possible implementation manners, the receiving unit is further configured to receive a second operation of the user on the touch screen after the display unit displays the second interface, where the second operation is an operation gesture preset to instruct the terminal to display the first item; the processing unit is also used for responding to the second operation and acquiring the fingerprint information of the user in the second operation through the fingerprint identifier; and the display unit is also used for responding to the verification of the collected user fingerprint information in the second operation, displaying a third interface, wherein the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface.
In some possible implementation manners, the display unit is further configured to, after the receiving unit receives the first operation of the user on the touch screen, in response to that the collected fingerprint information of the user in the first operation is not verified, display a fifth interface on the terminal, where the fifth interface displays prompt information to prompt the user to input the fingerprint information.
In some possible implementations, the first interface displayed by the display unit is a folder interface, and the first item is any one of the following items: picture files, video files, audio files, text files, folders; or the first interface displayed by the display unit is a gallery application interface, and the first item is a picture file or a video file; or the first interface displayed by the display unit is a home screen interface, and the first item is an application icon; or the first interface displayed by the display unit is a browsing interface of the short message, and the first item is the short message; or the first interface displayed by the display unit is an address book interface, and the first item is contact information; or the first interface displayed by the display unit is a negative one-screen interface, and the first item is card information.
The fourth aspect, a terminal, the terminal includes the touch-sensitive screen, and the touch-sensitive screen disposes fingerprint identification ware, and this terminal still includes: the display unit is used for displaying a first interface, and a first item is displayed on the first interface; the receiving unit is used for receiving the operation of hiding the first item by the user; the display unit is also used for responding to the operation of hiding the first item by the user and displaying a second interface, the second interface has less first items than the first interface, and the items displayed on the second interface are the same as the other items except the first item in the first interface; the receiving unit is further used for receiving a first operation of a user on the touch screen, wherein the first operation is an operation gesture for displaying a first item by a preset indication terminal; the first item is not displayed in the first interface; the processing unit is used for responding to the first operation and acquiring the fingerprint information of the user in the first operation through the fingerprint identifier; and the display unit is also used for responding to the verification of the acquired fingerprint information of the user in the first operation, displaying a third interface, wherein the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface, and the first items are displayed in the second interface.
In some possible implementation manners, the first interface displayed by the display unit further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon; the receiving unit is used for receiving a first operation of a user on the touch screen and comprises the following steps: a receiving unit configured to receive any one of the following operations performed by a user at a display position of the fingerprint icon: click, double click, long press.
In some possible implementations, the first interface displayed by the display unit is a folder interface; the first item is any one of: picture files, video files, audio files, text files, folders; or the first interface displayed by the display unit is a gallery application interface, and the first item is a picture file or a video file; or the first interface displayed by the display unit is a home screen interface, and the first item is an application icon; or the first interface displayed by the display unit is a browsing interface of the short message, and the first item is the short message; or the first interface displayed by the display unit is an address book interface, and the first item is contact information; or the first interface displayed by the display unit is a negative one-screen interface, and the first item is card information.
A fifth aspect, a Graphical User Interface (GUI) stored in a terminal, the terminal comprising a touchscreen, memory, one or more processors to execute one or more computer programs stored in the memory, the touchscreen configured with a fingerprint recognizer, the GUI comprising: the method comprises the steps that a first interface is displayed on the touch screen and comprises at least one first item, and the first item is selected; responding to the first operation of the terminal on the touch screen received by the user, and the collected fingerprint information of the user in the first operation passes verification, and displaying a second interface on the touch screen, wherein the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as the other items except the first items in the first interface; the first operation is an operation performed by a user on a first interface, and the first operation is a preset operation gesture for indicating the terminal to hide the first item.
In some possible implementations, the first interface further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon.
In some possible implementations, the graphical user interface further includes: responding to the fact that the terminal receives a second operation of the user on the touch screen, the fingerprint information of the user in the second operation is collected through the fingerprint recognizer and passes verification, and displaying a third interface on the touch screen, wherein the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface; the second operation is the operation performed by the user on the second interface, and the second operation is the operation gesture of displaying the first item by the preset indication terminal.
In some possible implementations, the first interface is a folder interface, and the first item is any one of: picture files, video files, audio files, text files, folders; or the first interface is a gallery application interface, and the first project is a picture file or a video file; or the first interface is a home screen interface, and the first item is an application icon; or the first interface is a browsing interface of the short message, and the first item is the short message; or the first interface is an address book interface, and the first item is contact information; or the first interface is a negative one-screen interface, and the first item is card information.
A sixth aspect, a Graphical User Interface (GUI) stored in a terminal, the terminal comprising a touchscreen, memory, one or more processors to execute one or more computer programs stored in the memory, the touchscreen configured with a fingerprint recognizer, the GUI comprising: a first interface displayed on the touch screen, the first interface including a first item; in response to receiving an operation that a user hides a first item, displaying a second interface on the touch screen, wherein the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as the other items except the first item in the first interface; responding to the terminal to receive a first operation of a user on the touch screen, and displaying a third interface on the touch screen when the fingerprint information of the user in the first operation collected by the fingerprint recognizer passes verification, wherein the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface; the first operation is the operation of the user on the second interface, and the first operation is the operation gesture of displaying the first item by the preset indication terminal.
In some possible implementations, the first interface is a folder interface, and the first item is any one of: picture files, video files, audio files, text files, folders; or the first interface is a gallery application interface, and the first project is a picture file or a video file; or the first interface is a home screen interface, and the first item is an application icon; or the first interface is a browsing interface of the short message, and the first item is the short message; or the first interface is an address book interface, and the first item is contact information; or the first interface is a negative one-screen interface, and the first item is card information.
A seventh aspect is a terminal, including: a processor, a memory and a touch screen, the memory and the touch screen being coupled to the processor, the memory being adapted to store computer program code comprising computer instructions which, when read by the processor from the memory, cause the terminal to perform the method as described in the first aspect or the second aspect and any possible implementation thereof.
An eighth aspect is a computer storage medium comprising computer instructions which, when executed on a terminal, cause the terminal to perform a method as described in the first or second aspect and any one of its possible implementations.
A ninth aspect, a computer program product, for causing a computer to perform the method as described in the first or second aspect and any one of its possible implementations, when the computer program product runs on a computer.
In a tenth aspect, a method of displaying an item, includes: the user grows the desired target application icon on the home screen interface and drags the target application icon directly to the display location of the fingerprint icon. The user's finger does not leave the touch screen throughout the process from long-pressing the target application icon to dragging the target application icon to the display location of the fingerprint icon. And the terminal collects the fingerprint information of the user and compares the fingerprint information. And if the comparison is successful, the terminal hides the application icon.
It should be appreciated that the description of technical features, solutions, benefits, or similar language in this application does not imply that all of the features and advantages may be realized in any single embodiment. Rather, it is to be understood that the description of a feature or advantage is intended to include the specific features, aspects or advantages in at least one embodiment. Therefore, the descriptions of technical features, technical solutions or advantages in the present specification do not necessarily refer to the same embodiment. Furthermore, the technical features, technical solutions and advantages described in the present embodiments may also be combined in any suitable manner. One skilled in the relevant art will recognize that an embodiment may be practiced without one or more of the specific features, aspects, or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments.
Drawings
FIG. 1 is a schematic diagram of some graphical user interfaces displayed on a terminal in the prior art;
fig. 2 is a first schematic structural diagram of a terminal according to an embodiment of the present disclosure;
FIG. 3 is a block diagram of a terminal according to an embodiment of the present application
Figure PCTCN2018089660-APPB-000001
A software architecture diagram of an operating system;
fig. 4 is a flowchart illustrating a method for displaying an item according to an embodiment of the present application;
FIG. 5A is a schematic illustration of some graphical user interfaces displayed on a terminal in some embodiments of the present application;
FIG. 5B is a schematic illustration of some graphical user interfaces displayed on a terminal in some other embodiments of the present application;
FIG. 6 is a flowchart illustrating a method for displaying items according to another embodiment of the present application;
FIG. 7A is a schematic illustration of some graphical user interfaces displayed on a terminal in accordance with further embodiments of the present application;
FIG. 7B is a schematic illustration of some graphical user interfaces displayed on a terminal in accordance with further embodiments of the present application;
FIG. 7C is a schematic illustration of some graphical user interfaces displayed on a terminal in accordance with further embodiments of the present application;
FIG. 8 is a schematic illustration of some graphical user interfaces displayed on a terminal in further embodiments of the present application;
FIG. 9 is a schematic illustration of some graphical user interfaces displayed on a terminal in further embodiments of the present application;
FIG. 10 is a flowchart illustrating a method for displaying items according to another embodiment of the present application;
fig. 11 is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 12 is a third schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the embodiments of the present application, "a plurality" means two or more unless otherwise specified.
There are often scenarios where a user may need to hide some files while using a terminal to browse a certain type of files (e.g. photos in a gallery, videos in a video folder, etc.). Then the user needs to exit the current application first. Then, the file management application is found from the main screen interface of the terminal, and then the hiding of the files can be realized through a series of complex operations, such as the operation process shown in fig. 1.
It should be noted that when the user hides the files, user authentication is required to implement the hiding function. This is because: if the identity of the user is not limited in the process of hiding the file, any user has the authority to hide the file. However, the identity of the user needs to be verified when the files are viewed subsequently, that is, only a specific user has the right to view the hidden files. In other words, the user hiding the file and the user viewing the file may not be consistent, and then the privacy and security of the file cannot be guaranteed. Thus, when the user hides the file, the identity of the user also needs to be verified.
In order to simplify the operation of the user, in the item display method provided in the embodiment of the present application, in combination with the feature that the fingerprint is located on the finger of the user, in the process of inputting the fingerprint by the user, the terminal may collect fingerprint information of the user, and the terminal may also recognize an operation gesture of the user. Therefore, the operation of inputting the fingerprint by the user can not only enable the terminal to read the fingerprint information of the user for the verification of the user identity, but also indicate the terminal to hide the item in the selected application. Therefore, the method provided by the embodiment of the application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
The items in the application can be folders (such as folders in a file management application), files in the folders (such as video files in a video folder and picture files in a picture folder), some information in the application (such as travel cards in a scene intelligence application), some information in the application (such as some short messages or some short messages in a short message application, contact information of some person or some people in an address book application), application icons corresponding to the application (application icons in a main screen interface), and the like. The embodiments of the present application do not limit the items in the application.
The hiding is from the user's perspective where the hidden items are no longer displayed in the application to which they originally belong. For example: after the picture files (or video files) in the "gallery" application are hidden, the "gallery" application no longer displays these hidden picture files (or video files).
The method provided by the embodiment of the application can be applied to the terminal with the fingerprint identification function. The fingerprint acquisition device can be configured in the touch screen of the terminal to realize the fingerprint identification function, namely, the fingerprint acquisition device can be integrated with the touch screen to realize the fingerprint identification function of the terminal. In this case, the fingerprint acquisition device is configured in the touch screen, may be a part of the touch screen, and may be configured in other manners in the touch screen. The main component of the fingerprint acquisition device in the embodiments of the present application may be a fingerprint sensor, which may employ any type of sensing technology, including but not limited to optical, capacitive, piezoelectric, or ultrasonic sensing technologies, etc.
For example, the terminal in the present application may be a mobile phone (such as the mobile phone 100 shown in fig. 2), a tablet Computer, a Personal Computer (PC), a Personal Digital Assistant (PDA), a smart watch, a netbook, a wearable electronic device, an Augmented Reality (AR) device, a Virtual Reality (VR) device, and the like, in which an application program may be installed and an application program icon may be displayed.
As shown in fig. 2, taking the mobile phone 100 as the terminal for example, the mobile phone 100 may specifically include: processor 101, Radio Frequency (RF) circuitry 102, memory 103, touch screen 104, bluetooth device 105, one or more sensors 106, Wireless Fidelity (WI-FI) device 107, pointing device 108, audio circuitry 109, peripheral interface 110, and power supply 111. These components may communicate over one or more communication buses or signal lines (not shown in fig. 2). Those skilled in the art will appreciate that the hardware configuration shown in fig. 2 is not intended to be limiting, and that the handset 100 may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes the components of the handset 100 in detail with reference to fig. 2:
the processor 101 is a control center of the cellular phone 100, connects various parts of the cellular phone 100 using various interfaces and lines, and performs various functions of the cellular phone 100 and processes data by running or executing an application program stored in the memory 103 and calling data stored in the memory 103. In some embodiments, processor 101 may include one or more processing units, for example, processor 101 may include a baseband processor and an applications processor.
The rf circuit 102 may be used for receiving and transmitting wireless signals during the transmission and reception of information or calls. In particular, the rf circuit 102 may receive downlink data of the base station and then process the received downlink data to the processor 101; in addition, data relating to uplink is transmitted to the base station. Typically, the radio frequency circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency circuitry 102 may also communicate with other devices via wireless communication. The wireless communication may use any communication standard or protocol including, but not limited to, global system for mobile communications, general packet radio service, code division multiple access, wideband code division multiple access, long term evolution, email, short message service, etc.
The memory 103 is used for storing application programs and data, and the processor 101 executes various functions and data processing of the mobile phone 100 by running the application programs and data stored in the memory 103. The memory 103 mainly includes a program storage area and a data storage area, wherein the program storage area can store an operating system and application programs (such as a sound playing function and an image playing function) required by at least one function; the storage data area may store data (e.g., audio data, a phonebook, etc.) created from use of the handset 100. In addition, the Memory 103 may include a high-speed Random Access Memory (RAM), and may further include a nonvolatile Memory, such as a magnetic disk storage device, a flash Memory device, or other volatile solid-state storage device. The memory 103 may store various operating systems, such as those developed by apple Inc
Figure PCTCN2018089660-APPB-000002
Operating System, developed by Google
Figure PCTCN2018089660-APPB-000003
An operating system, etc. The memory 103 may be independent and connected to the processor 101 through the communication bus; memory 103 may also be capable of processingThe devices 101 are integrated together. In the present embodiment, memory 103 includes a memory device 207.
The touch screen 104 may specifically include a touch pad 104-1 and a display 104-2.
Wherein the touch pad 104-1 can capture touch events on or near the touch pad 104-1 by a user of the cell phone 100 (e.g., user operation on or near the touch pad 104-1 using any suitable object such as a finger, a stylus, etc.) and transmit the captured touch information to other devices (e.g., the processor 101). Among them, a touch event of a user near the touch pad 104-1 can be called a hover touch; hover touch may refer to a user not having to directly contact the touchpad in order to select, move, or drag a target (e.g., an icon, etc.), but rather only having to be in proximity to the device in order to perform a desired function. In addition, the touch pad 104-1 can be implemented by various types, such as resistive, capacitive, infrared, and surface acoustic wave.
Display (also referred to as a display screen) 104-2 may be used to display information entered by or provided to the user as well as various menus for handset 100. The display 104-2 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The touch pad 104-1 may be overlaid on the display 104-2, and when the touch pad 104-1 detects a touch event thereon or nearby, it may be communicated to the processor 101 to determine the type of touch event, and the processor 101 may then provide a corresponding visual output on the display 104-2 according to the type of touch event. Although in FIG. 2, the touch pad 104-1 and the display screen 104-2 are shown as two separate components to implement the input and output functions of the cell phone 100, in some embodiments, the touch pad 104-1 and the display screen 104-2 may be integrated to implement the input and output functions of the cell phone 100. It is understood that the touch screen 104 is formed by stacking multiple layers of materials, and the details thereof are not described in the embodiments of the present application. In addition, the touch pad 104-1 may be disposed on the front surface of the mobile phone 100 in a full-panel manner, and the display screen 104-2 may also be disposed on the front surface of the mobile phone 100 in a full-panel manner, so that a frameless structure, such as a full-screen mobile phone, can be implemented on the front surface of the mobile phone.
In addition, the mobile phone 100 may also have a fingerprint recognition function. For example, the fingerprint identifier 112 may be disposed on the back side of the handset 100 (e.g., below the rear facing camera), or the fingerprint identifier 112 may be disposed on the front side of the handset 100 (e.g., below the touch screen 104). For another example, the fingerprint acquisition device 112 may be configured in the touch screen 104 to realize the fingerprint identification function, i.e., the fingerprint acquisition device 112 may be integrated with the touch screen 104 to realize the fingerprint identification function of the mobile phone 100. In this case, the fingerprint acquisition device 112 is disposed in the touch screen 104, may be a part of the touch screen 104, and may be disposed in the touch screen 104 in other manners. The main component of the fingerprint acquisition device 112 in the present embodiment is a fingerprint sensor, which may employ any type of sensing technology, including but not limited to optical, capacitive, piezoelectric, or ultrasonic sensing technologies, among others.
The handset 100 may also include a bluetooth device 105 for enabling data exchange between the handset 100 and other short-range devices (e.g., cell phones, smart watches, etc.). The bluetooth device in the embodiment of the present application may be an integrated circuit or a bluetooth chip.
The handset 100 may also include at least one sensor 106, such as a light sensor, motion sensor, and other sensors. In particular, the light sensor may comprise a proximity sensor, wherein the proximity sensor may power off the display when the cell phone 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone 100, further description is omitted here.
The WI-FI device 107 is used for providing the mobile phone 100 with network access conforming to WI-FI related standard protocols, the mobile phone 100 can be accessed to a WI-FI access point through the WI-FI device 107, so as to help a user to send and receive e-mails, browse webpages, access streaming media and the like, and the WI-FI device provides wireless broadband internet access for the user. In other embodiments, the WI-FI apparatus 107 may also be a WI-FI wireless access point, which may provide WI-FI network access to other devices.
And a positioning device 108 for providing a geographical position for the handset 100. It can be understood that the Positioning device 108 may specifically be a receiver of a Global Positioning System (GPS) or a Positioning System such as the beidou satellite navigation System, russian GLONASS, and the like. After receiving the geographical location transmitted by the positioning system, the positioning device 108 transmits the information to the processor 101 for processing or transmits the information to the memory 103 for storage. In some other embodiments, the Positioning device 108 may also be an Assisted Global Positioning System (AGPS) receiver that assists the Positioning device 108 in performing ranging and Positioning services by acting as an assistance server, in which case the assistance server provides Positioning assistance by communicating with the Positioning device 108 (i.e., GPS receiver) of the apparatus, such as the handset 100, over a wireless communication network. In other embodiments, the positioning device 108 may also be a WI-FI access point based positioning technology. Because each WI-FI Access point has a globally unique (Media Access Control, MAC) address, the device can scan and collect broadcast signals of surrounding WI-FI Access points under the condition of opening the WI-FI, and therefore the MAC address broadcasted by the WI-FI Access point can be acquired; the device sends the data (e.g., MAC address) identifying the WI-FI access points to the location server via the wireless communication network, the location server retrieves the geographic location of each of the WI-FI access points, and calculates the geographic location of the device and sends the geographic location to the positioning device 108 of the device in accordance with the strength of the WI-FI broadcast signal.
The audio circuitry 109, speaker 113, microphone 114 can provide an audio interface between a user and the handset 100. The audio circuit 109 may transmit the electrical signal converted from the received audio data to the speaker 113, and convert the electrical signal into a sound signal by the speaker 113 for output; on the other hand, the microphone 114 converts the collected sound signal into an electrical signal, converts the electrical signal into audio data after being received by the audio circuit 109, and outputs the audio data to the RF circuit 102 to be transmitted to, for example, another cellular phone, or outputs the audio data to the memory 103 for further processing.
Peripheral interface 110, which is used to provide various interfaces for external input/output devices (e.g., keyboard, mouse, external display, external memory, SIM card, etc.). For example, the mouse is connected through a Universal Serial Bus (USB) interface, and the Subscriber Identity Module (SIM) card provided by a telecom operator is connected through a metal contact on a SIM card slot. Peripheral interface 110 may be used to couple the aforementioned external input/output peripherals to processor 101 and memory 103.
The mobile phone 100 may further include a power supply device 111 (such as a battery and a power management chip) for supplying power to each component, and the battery may be logically connected to the processor 101 through the power management chip, so as to implement functions of managing charging, discharging, and power consumption through the power supply device 111.
Although not shown in fig. 2, the mobile phone 100 may further include a camera (front camera and/or rear camera), a flash, a micro-projector, a Near Field Communication (NFC) device, etc., which will not be described in detail herein.
The methods in the following embodiments can be implemented in the mobile phone 100 having the above hardware structure.
For example, the operating system of the mobile phone 100 may be an operating system such as Android or IOS, taking an Android operating system as an example, as shown in fig. 3, the Android operating system may be divided into four layers, which are a kernel 320, a middleware 330, an API 360 and/or an application 370.
In particular, the kernel 320 may include a system resource manager 321 and/or a device driver 323. The system resource manager 321 may include a process manager (not shown), a memory manager (not shown), and a file system manager (not shown). The system resource manager 321 may perform control, allocation, recovery, etc. of system resources. The device drivers 323 may include, for example, a display driver (not shown), a camera driver (not shown), a bluetooth driver (not shown), a shared memory driver (not shown), a USB driver (not shown), a keypad driver (not shown), a Wi-Fi driver (not shown), and/or an audio driver (not shown). Further, the device driver 323 may include an inter-process communication (IPC) driver (not shown) according to embodiments disclosed herein.
The middleware 330 may include a plurality of modules implemented in advance to provide a function shared by the applications 370. Further, the middleware 330 may provide functionality to the application 370 through the API 360 to enable the application 370 to efficiently use limited system resources within the electronic device. For example, as shown in fig. 3, middleware 330 may include at least one of: runtime 335, application manager 341, window manager 342, multimedia manager 343, resource manager 344, power manager 345, database manager 346, package manager 347, connection manager 348, notification manager 349, location manager 350, graphics manager 351, security manager 352, and any other suitable and/or similar manager.
The runtime 335 may include a library module, for example, used by a compiler, to add new functionality through the use of a programming language during execution of the application 370. The runtime 335 may perform functions related to input and output, management of memory, arithmetic functions, and the like, according to embodiments disclosed herein.
The application manager 341 may manage, for example, a lifecycle of at least one application 370. The window manager 342 may manage Graphical User Interface (GUI) resources used on the screen. The multimedia manager 343 may detect formats for reproducing various media files and may encode or decode the media files by using a codec suitable for the associated format. The resource manager 344 may manage resources, such as source code, memory, storage space, etc., of at least one application 370.
The power manager 345 may operate with a basic input/output system (BIOS), may manage a battery or power, may provide power information for operation, and the like. The database manager 346 may manage the database in the following manner: enabling the generation, searching and/or alteration of a database to be used by at least one application 370. The package manager 347 may manage installation and/or update of applications distributed in the form of package files.
The connection manager 348 may manage wireless connections such as Wi-Fi and BT. The notification manager 349 may display or report events, such as arrival messages, appointments, proximity alerts, etc., to the user in a manner that does not bother the user. The location manager 350 may manage location information of the electronic device. The graphic manager 351 may manage graphic effects to be provided to the user and/or UIs related to the graphic effects. The security manager 352 may provide various security functions for system security, user authentication, and the like. According to the embodiments disclosed herein, when the electronic device (e.g., the handset 100) has a telephone function, the middleware 330 may further include a telephone manager (not shown) for managing a voice telephone call function and/or a video telephone call function of the electronic device.
The middleware 330 may generate and use a new middleware module through various functional combinations of the above-described internal element modules. The middleware 330 may provide modules specialized according to the type of OS to provide differentiated functions. Middleware 330 may also dynamically delete some of the existing elements, or may add new elements. Accordingly, the middleware 330 may omit some of the elements described in the various embodiments disclosed in the present application, may also include other elements, or may replace some of the elements with elements performing similar functions and having different names.
The API 360 is a set of API programming functions and may have different configurations according to the OS. In the case of Android or iOS, for example, one set of APIs may be provided for each platform. In the case of, for example, Tizen, two or more API sets may be provided to each platform.
The applications 370 may include, for example, preloaded applications and/or third party applications. The applications 370 may include, for example, a home application 371, a dialing application 372, an SMS/MMS application 373, an IM application 374, a browser application 375, a camera application 376, an alarm application 377, a contacts application 378, a voice dialing application 379, an email application 380, a calendar application 381, a media player application 382, a gallery application 383, a lockers application 384, and any other suitable and/or similar applications.
The technical solutions in the following embodiments can be implemented in a terminal (e.g., the mobile phone 100) having the above hardware architecture and software architecture.
Taking the picture file in the user hidden gallery application 383 as an example, a process of implementing the hiding function of the terminal related to the embodiment of the present application will be described.
In some examples of the application, during the process of the user viewing the picture files in the application through the gallery application 383, the user needs to hide some of the picture files. Then, after the user performs an operation (for example, an operation of selecting a corresponding picture file in the browsing interface of the gallery application 383 and an operation of starting a terminal to hide the selected picture file) through the touch screen of the hardware layer, the touch screen may be triggered to report a touch event (for example, parameters such as the number, the position, the time, and the like of touch points) generated by the operation to the kernel 320 through a corresponding driver, and the kernel 320 encapsulates the touch event and calls a corresponding API to distribute the touch event to the gallery application 383. Then the gallery application 383 sets the display state corresponding to these selected picture files to the hidden state in response to the trigger event. Then these hidden state picture files will no longer be displayed in the browsing interface of gallery application 383.
In another example of the present application, during the process of the user viewing the picture files in the gallery application 383, the user needs to hide some of the picture files. Then, after the user performs an operation (including an operation of selecting a corresponding picture file in the browsing interface of the gallery application 383 and an operation of starting a terminal to hide the selected picture file) through the touch screen of the hardware layer, the touch screen may be triggered to report a touch event (for example, parameters such as the number, position, time, and the like of touch points) generated by the operation to the kernel 320 through a corresponding driver, and the kernel 320 encapsulates the touch event and calls a corresponding API to distribute the touch event to the gallery application 383 and the lockbox application 384. Then the gallery application 383 moves these selected picture files under the storage directory of the lockers application 384 in response to the triggering event. In other words, these picture files will no longer be displayed in the browsing interface of gallery application 383, i.e., gallery application 383 enables hiding of these picture files. However, in the interface that browses pictures in the lockbox application 384, these picture files may be displayed.
It should be noted that the embodiment of the present application does not limit the specific implementation manner of the terminal hiding function.
In general, a method for hiding items in an application provided by an embodiment of the present application includes: the terminal displays a first interface, the first interface comprises a plurality of controls, and each control can correspond to one project. And the first control is selected and corresponds to the first item. The terminal receives an operation of a user on the touch screen, wherein the operation is used for indicating the terminal to hide the first item. And the terminal acquires the fingerprint information of the user according to the operation of the user on the touch screen and verifies the identity of the user. And after the user identity authentication is passed, the terminal displays a second interface, and the first item is not displayed in the second interface. The second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as the other items except the first item in the first interface. In other words, the terminal hides the first item in the application.
The first interface may be, for example, a browsing interface or an editing interface of an application or an application function, where the browsing interface or the editing interface includes a plurality of folder icons or icons of files. The first interface may also be a home screen interface of the terminal, and the home screen interface includes a plurality of application icons or folder icons. The first interface may also be a negative one-screen interface of the terminal, where the negative one-screen interface may refer to an interface where the user slides in from a main screen interface (or desktop) to the right, the negative one-screen interface may display functions, applications, subscribed services and information, etc. commonly used by the user, and the negative one-screen menu is also referred to as a desktop assistant, a shortcut menu, etc. For example: the negative screen can also display a scene intelligence application, and the scene intelligence application comprises a plurality of card information. The first interface is not particularly limited in the embodiment of the present application.
The first item can be a folder (for example, a folder in a file management application), a file in the folder (for example, a video file in the video folder, a picture file in the picture folder), some kind of information in the application (for example, a travel card in a scene intelligence application), some information in the application (for example, some or some short messages in a short message application, contact information of some or some people in an address book application), an application icon corresponding to the application (an application icon in a home screen interface), and the like. The first item is not limited in the embodiment of the present application.
Therefore, in the process of using the application, the user can directly operate the items to be hidden, so that the items are hidden by the terminal. And the current application is not required to be exited, and a special application (such as a 'secret cabinet' application) is entered to carry out complex operation so as to hide items in the application. Therefore, the method provided by the embodiment of the application can simplify the operation of the user, improve the interaction efficiency between the user and the terminal, and is beneficial to improving the user experience.
In addition, the user identity authentication is carried out in the process of hiding the project in the application, so that the misoperation of the user is avoided, and the files which do not need to be hidden are prevented from being hidden.
The technical solutions provided in the embodiments of the present application will be described below with reference to specific application scenarios.
The first application scenario is exemplified by hiding the picture file in the picture folder by the user.
Illustratively, the user opens the browsing interface of the picture folder through a "file management" application. And clicking an 'edit' button in the browsing interface to enter an editing interface of the picture folder. A picture file to be hidden is selected in an editing interface of the picture folder, such as an interface 401 (first interface) shown in (1) in fig. 5A. A plurality of controls are displayed in the interface 401, and each control corresponds to a picture file. Wherein, the picture file 403 is selected (the first control is selected, the first control corresponds to the picture file 403, and the picture file 403 is a first item). It should be noted that, on the interface 401, a plurality of picture files may also be selected, and the number of the selected picture files is not limited in the embodiment of the present application.
In some examples of the present application, when the terminal displays a browsing interface or an editing interface of the picture folder, a fingerprint icon 402 is further displayed to prompt a user that a hiding operation can be performed on the picture file. The display position of the fingerprint icon 402 is associated with a fingerprint identifier, that is, when a user operates at the display position of the fingerprint icon 402, the terminal can collect fingerprint information of the user through the fingerprint identifier under the touch screen, and compare the fingerprint information of the user with the pre-stored fingerprint information to verify the identity of the user. And after the user identity authentication is successful, carrying out the next operation. Optionally, the user may also use other icons, or characters, or pictures to prompt the user to input fingerprint information, and instruct the terminal to perform hiding of the selected picture file. Optionally, if the position of the fingerprint identifier in the terminal is a fixed position, the terminal may not display the fingerprint icon. This is not particularly limited in the embodiments of the present application.
In other examples of the application, when the terminal displays a browsing interface or an editing interface of the picture folder, it may be further determined whether the user needs to hide the picture file. If the user desires to hide the picture file, a fingerprint icon 402 may be displayed. Otherwise, the fingerprint icon 402 may not be displayed.
The above-mentioned determination of whether the user needs to hide the picture file may be, for example, an operation that the terminal detects that the user opens a "hide" function. The operation of the user opening the "hidden" function may be, for example, that the user opens the hidden function in the system setting of the terminal, or that the user opens the hidden function button in the setting of the application, or the like. This is not particularly limited in the embodiments of the present application.
In other examples of the present application, the terminal does not display the fingerprint icon 402 while displaying the picture folder editing interface until no picture files are selected. And the fingerprint icon 402 is displayed after the terminal detects that the user selects the picture file to be hidden. The embodiment of the present application does not limit this.
Then, when the terminal detects that the user hides the picture file, for example, it detects that the user presses the fingerprint icon 402 for a long time on the interface 401 shown in (1) in fig. 5A, the terminal collects fingerprint information of the user, and compares the collected fingerprint information with the pre-stored fingerprint information.
The operation of hiding the picture file by the user may be an operation performed by the user on a fingerprint input location, for example, a click, a long press, a double click, or the like, and a specific operation gesture may be set under a setting function, which is not specifically limited in this embodiment of the present application. Since the finger of the user can contact the touch screen of the terminal when the user performs the operation at the fingerprint input position, the terminal can collect the finger information of the user through the fingerprint recognizer under the touch screen. And then comparing the acquired fingerprint information with the fingerprint prestored in the terminal.
If the comparison is successful, it indicates that the user performing the above operation is a valid user, that is, the user identity authentication is successful, the selected picture file may be hidden, that is, a second interface, such as the interface 404 shown in (2) in fig. 5A, is displayed. The picture file 403 is not displayed in the interface 404, that is, the terminal hides the picture file 403. In some examples of the present application, in the second interface, the terminal may keep the original position of the picture file 403, that is, the original position of the picture file 403 is displayed as blank, and the positions of other non-hidden picture files are not changed. The terminal may not retain the original position of the picture file 403, and may be complemented by, for example, a picture file originally arranged after the picture file 403. The terminal may also reorder the unhidden picture files, and the like, which is not specifically limited in this embodiment of the application.
In some embodiments of the present application, after the user identity authentication is successful, the terminal may further change the display effect of the fingerprint icon 402 to prompt the user that the fingerprint comparison is successful. For example, the fingerprint icon 402 may be changed from gray to another color, such as red. For another example, the fingerprint icon 402 is statically displayed before performing the fingerprint comparison. After the fingerprint comparison is successful, the fingerprint icon 402 is dynamically displayed in a flashing, animation, or other manner. For another example, the brightness, contrast, and gradation of the fingerprint icon 402 may be changed. The embodiments of the present application are not limited.
If the comparison fails, it indicates that the user performing the operation is an illegal user, or the user performing the operation does not use a specific finger (a finger corresponding to the pre-stored fingerprint information), that is, the user identity authentication fails, and the selected picture file cannot be hidden. In some examples, the terminal may continue to display the browsing interface or editing interface of the picture folder in which the picture file 403 is still displayed. The picture file 403 may be in a selected state or in an unselected state, which is not specifically limited in this embodiment of the application. In other examples, the terminal may further display a prompt message prompting the user to re-enter the fingerprint for hiding the picture file. Then, after the user re-inputs the fingerprint information, the terminal re-collects the fingerprint information input at this time, and compares the fingerprint information collected this time with the fingerprint information stored in advance. If the comparison is successful, hiding the selected picture file, otherwise, still keeping the selected picture file. Optionally, the terminal may also vibrate or change the color, grayscale, brightness, etc. of the fingerprint icon 402 to prompt the user that the fingerprint comparison fails.
The hiding method provided by the embodiment of the present application may also be applicable to hiding picture files in gallery applications, video files in video folders, other files in folders or other folders, and the like, which is not limited in the embodiment of the present application.
In summary, in the process of browsing the picture file, the user can directly select the picture file to be hidden and then input the operation of hiding the picture file, so that the terminal can complete the hiding of the selected picture file. Therefore, the method provided by the embodiment of the application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
After the image file is hidden, the embodiment of the application further includes a process of displaying the hidden image file again. Specifically, as shown in fig. 4, a schematic flow chart of a method for hiding an item in an application provided in an embodiment of the present application includes:
s101, the terminal displays a file browsing interface, and the browsing interface comprises one or more file identifiers.
The files may be picture files, video files, audio files, other types of files, folders, etc. The file identifier may be an icon of a type corresponding to the file, or a thumbnail corresponding to the file, and the like.
For example: a user opens a browsing interface of the picture folder through a file management application or a gallery application, wherein the browsing interface comprises thumbnails corresponding to a plurality of picture files.
S102, the terminal receives a first operation of the user and enters an editing interface of the one or more files.
The first operation of the user may be, for example, the user clicks an "edit" button in the browsing interface, and enters an editing interface of the picture folder, so that the one or more files may be edited, for example: select, delete, send, etc.
In other examples of the present application, the identity of the one or more files may be directly selected in the browsing interface, and this step may not be performed.
S103, the terminal receives the operation that the user selects the file needing to be hidden, and the file selected by the user is determined to be the target file.
For example, the operation of the user selecting the file to be hidden may be a click operation of the user on the file identifier, or may also be a sliding operation of the user on the file identifier, or dragging the file identifier to a specified position, and the like, which is not limited in this embodiment of the application.
And S104, the terminal receives the operation of hiding the target file by the user.
In some examples of the application, a fingerprint icon is displayed on a browsing interface or an editing interface of the file, and the fingerprint icon is used for prompting a user to input fingerprint information so as to hide the target file. The display method of the fingerprint icon can refer to the above description, and the description is not repeated here.
The method comprises the steps that a gesture for hiding a target file is preset in a terminal, for example, after the file is selected as the file to be hidden, a fingerprint icon is clicked, pressed for a long time, double-clicked and the like, and if the terminal detects that a preset gesture for hiding the target file is input by a user, the operation for hiding the target file by the user is received.
For the operation of hiding the target file by the user, reference may be made to the above description of the operation of hiding the picture file by the user, for example, in (1) in fig. 5A, the user presses the fingerprint icon 402 for a long time, which is not repeated herein.
And S105, the terminal collects fingerprint information of the user according to the operation of hiding the target file by the user and verifies the identity of the user. If the verification is not passed, step S106a is executed. If the verification is passed, step S106b is executed.
S106, displaying prompt information by the terminal to prompt that the user fails in authentication.
And S106, hiding the target file by the terminal 106 b.
For example: in the interface 401 as shown in (1) in fig. 5A, a picture file 403 is selected. The terminal detects that the user operates the fingerprint icon 402 on the interface 401. Then, the terminal collects the fingerprint information of the user and compares the collected fingerprint information with the fingerprint information stored in advance. And if the comparison is successful, the user identity authentication is passed. Then, the terminal hides the selected target file and displays an interface 404 as shown in (2) in fig. 5A, in which interface 404 the previously selected picture file 403 is not displayed.
S107, the terminal receives the operation of displaying the hidden file by the user.
In some examples of the present application, after the terminal performs step S106, that is, after the terminal hides the target file, the terminal may further display a prompt message to prompt the user that the hidden file exists in the interface. The prompt message may be a text message, a specific icon, etc. The specific icon may also be a fingerprint icon, for example, and the fingerprint icon in this step may be distinguished from the fingerprint icon in step S104. For example, the fingerprint icon in this step and the fingerprint icon in step S104 are displayed at different positions, or different shapes, colors, or other marks are adopted, or different characters are used for labeling, and the like, which is not limited in this embodiment of the application. Optionally, the fingerprint icon in this step may also be the same fingerprint icon as the fingerprint icon in step S104, and then, the terminal may distinguish whether the operation is an operation of hiding the file or an operation of displaying the file by operating the fingerprint icon with different operation gestures or by operating the fingerprint icon with different fingers (different fingerprint information). For example: the operation of clicking the fingerprint icon is an operation of hiding the file, and the operation of long-time pressing the fingerprint icon is an operation of displaying the hidden file. Optionally, the terminal may not distinguish the operation gesture of the user on the fingerprint icon. Since the user needs to select the file to be hidden before hiding the file. However, the user does not need to select any file before the hidden file is displayed. Therefore, after the terminal detects the operation of the user at the display position of the fingerprint icon, the terminal can also distinguish according to whether a file is selected in the current interface or not. If the file in the current interface is selected, the operation is the operation of hiding the selected file. If no file in the current interface is selected, the operation is the operation of displaying the hidden file. The embodiment of the present application does not limit this.
In some examples of the application, a gesture for displaying the hidden file, such as clicking, long-pressing, double-clicking a fingerprint icon, or the like, is preset in the terminal, and if the terminal detects that the preset gesture for displaying the hidden file is input by the user, an operation for displaying the hidden file by the user is received.
And S108, the terminal collects fingerprint information of the user according to the operation of displaying the hidden file by the user and verifies the identity of the user. If the verification is passed, step S109b is executed. If the verification is not passed, step S109a is executed.
S109a, the terminal displays prompt information to prompt the user that the authentication fails.
And S109b, displaying the hidden file by the terminal.
Taking the fingerprint icon in step S107 and the fingerprint icon in step S104 as the same fingerprint icon, and taking a specific operation gesture in which the terminal does not distinguish between the operation of displaying the hidden file and the operation of hiding the file as an example, the description will be given. For example: the terminal detects that the user presses the fingerprint icon 402 long on the interface 404 as shown in (1) in fig. 5B. Then, the terminal collects the fingerprint information of the user and compares the collected fingerprint information with the fingerprint information stored in advance. And if the comparison is successful, the user identity authentication is passed. Then, the terminal displays the file hidden in the interface, displays an interface 405 as shown in (2) in fig. 5B, displays a picture file 403 in the interface 405, and does not display the picture file 403 in the interface 404 shown in (1) in fig. 5B. Here, only the picture file 403 is hidden in the interface 404 shown in (1) in fig. 5B, for example, and the description is given. If other picture files are hidden in the interface 404, the terminal can display all the hidden picture files. The embodiment of the present application does not limit this.
It should also be noted that the terminal may display the hidden files in the blank positions in the current interface, or may display the hidden files in the positions displayed before the hidden files, which is not specifically limited in this embodiment of the application.
In some examples of the application, the number of times or the time when the terminal displays the hidden file may be set. Here, the hidden file is described as an example of a picture file. For example: after the user performs the display operation once and the user passes the authentication, the hidden picture file can be displayed once. That is, the display status of these hidden picture files is disabled when the user exits the current interface (e.g., the browsing interface for the picture folder) or the current application (e.g., "gallery" application). That is, when the user enters the browsing interface of the picture file (e.g., browsing interface of the picture folder) or enters the application (e.g., "gallery" application) where the picture file is located again, the hidden picture file is still hidden and invisible. The user is required to perform the display operation again before the picture files can be displayed. In other examples of the present application, the time when the terminal displays the hidden picture files may be a preset time period, that is, from the time when the terminal starts to display the hidden picture files, the hidden picture files are all in a display state and are visible within the preset time period. After a preset period of time, these hidden picture files are restored to a hidden state and are invisible. In other examples of the present application, the terminal may always display these hidden picture files. The embodiment of the present application does not limit this.
The second application scenario is exemplified by an application icon in the home screen interface hidden by the user.
In some examples of the application, the terminal displays a home screen interface. The terminal detects that the user presses any application icon in the home screen interface for a long time, and the home screen interface displayed by the terminal is in an editable state. The user may select one or more application icons to be hidden by an operation such as clicking, and the terminal displays an interface 501 (i.e., a first interface) as shown in (1) in fig. 7A. The interface 501 includes a plurality of controls, each of which corresponds to an application icon, where the "WeChat" application icon and the "construction bank" application icon are selected (i.e., there are two first controls, one corresponding to the "WeChat" application icon, the other corresponding to the "construction bank" application icon, and the "WeChat" application icon and the "construction bank" application icon are first items).
Then, the terminal receives an operation of hiding the application icon by the user, acquires fingerprint information of the user according to the operation, compares the fingerprint information with the pre-stored fingerprint information, and if the comparison is successful, hides the selected application icon (the application icon of "WeChat" and the application icon of "building a bank"), and displays an interface 503 (a second interface) as shown in (3) in fig. 7A.
In some examples of the present application, the operation of hiding the application icon by the user may be similar to the operation of hiding the picture file by the user in application scenario one, for example: as shown in (2) in fig. 7A, the user clicks, double clicks, or long presses on the fingerprint icon 502.
In other examples of the application, the operation of hiding the application icon by the user may be that the user holds down any selected application icon and drags the application icon to a specified location, where the specified location is associated with a fingerprint identifier, for example: as shown in (1) of fig. 7B, application icons (for example, "wechat" application icon and "construction bank" application icon) that need to be hidden in the interface 601 are selected, and the user can press any selected application icon, for example, "construction bank" application icon, and drag the selected application icon to the display position of the fingerprint icon 602.
In this example, the terminal may display fingerprint icon 602 while the home screen interface is displayed or while the home screen interface is in an editable state. The terminal may also not display the fingerprint icon 602 when displaying the home screen interface, and may display the fingerprint icon 602 after the user holds the application icon that needs to be hidden. The terminal can also display the fingerprint icon 602 after the user drags the application icon to be hidden to a designated position and leaves the touch screen. The time when the terminal displays the fingerprint icon 602 is not specifically limited in the embodiment of the present application.
When the user drags the application icon to be hidden to the designated position, the finger touches the touch screen, and the terminal can acquire the fingerprint information of the user through the fingerprint identifier below the touch screen. And comparing the acquired fingerprint information with the prestored fingerprint information.
If the comparison is successful, which indicates that the user identity authentication is successful, the terminal hides the selected application icons (the "WeChat" application icon and the "construction bank" application icon), that is, displays the interface 603 as shown in (2) in fig. 7B. In other words, the user can drag the application icon to be hidden to the designated position directly by a specific finger (the finger corresponding to the pre-stored fingerprint information), and the hiding of the application icon can be completed.
If the comparison fails, it indicates that the user performing the operation is an illegal user, or that the user performing the operation does not use a specific finger (a finger corresponding to the pre-stored fingerprint information), i.e., it indicates that the user authentication has failed. The terminal may then display a prompt prompting the user to re-enter the fingerprint information, displaying an interface 604 as shown in (3) in fig. 7B, with a prompt 605 displayed in the interface 604. Then, the user may enter a fingerprint at, for example, the display location of fingerprint icon 602. And the terminal collects the fingerprint information of the user again and compares the fingerprint information with the fingerprint information stored in advance again. If the comparison is successful, the user identity authentication is successful, and the terminal hides the selected application icons (the 'WeChat' application icon and the 'construction bank' application icon), that is, displays an interface 606 shown in (4) in fig. 7B. If the comparison fails, the user does not have the permission to hide the application icon, and the terminal does not hide the selected hidden icon.
In another example of the application, in a case that a user hides an application icon in a home screen interface in a dragging manner, the user may not need to click any application icon in the home screen interface first, so that the terminal home screen is in an editable state, and the application icon needing to be hidden is selected. Instead, the user may press the one application icon that needs to be hidden directly on the home screen interface and drag the application icon directly to the displayed location of the fingerprint icon. The user's finger does not leave the touch screen throughout the process from long-pressing the application icon to dragging the application icon to the display location of the fingerprint icon. And the terminal collects the fingerprint information of the user and compares the fingerprint information. The comparison process and the subsequent processing can refer to the above description, and are not repeated herein.
It should be noted that other contents in the application scenario may refer to the description of the related content in the application scenario one, which is not described herein again.
In summary, in the home screen interface, the user can directly select an application icon to be hidden, and then input an operation of hiding the application icon (or press and hold any selected application icon and drag it to the position of the fingerprint icon), so as to complete the hiding of the selected application icon. Or, on the home screen interface, the user can directly grow the application icon to be hidden as required, and then drag the application icon to the position of the fingerprint icon, so that the application icon can be hidden. Therefore, the method provided by the embodiment of the application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
After hiding the application icon, the embodiment of the application further includes a process of redisplaying the hidden application icon. Specifically, as shown in fig. 6, a schematic flow chart of a method for hiding an item in an application provided in an embodiment of the present application includes:
s201, displaying a main screen interface by the terminal.
S202, the terminal receives a second operation of the user, and the main screen interface enters an editable state.
For example, the second operation of the user may be that the user presses any application icon in the home screen interface for a long time, and the home screen interface displayed by the terminal is in an editable state.
S203, the terminal receives the operation that the user selects the application icon needing to be hidden, and determines that the application icon selected by the user is the target application icon.
And S204, the terminal receives the operation of hiding the target application icon by the user.
In some examples of the application, a fingerprint icon is displayed on the home screen interface for prompting a user to input fingerprint information to hide the target application icon. The display method of the fingerprint icon may refer to the related description above, and the description is not repeated here.
In other examples of the application, the operation of hiding the target application icon by the user terminal may be a user clicking, long-pressing, double-clicking, sliding, rotating and the like at the fingerprint icon, or a user holding any selected application icon and dragging the selected application icon to the fingerprint icon. Reference may be made to the above description, and details are not repeated here.
In other examples of the present application, in a case that the user hides one application icon in the home screen interface in a dragging manner, the user may not need to click any application icon in the home screen interface first, so that the terminal home screen is in an editable state, and then select the application icon that needs to be hidden, that is, the terminal does not need to perform step S202. The operation of the user selecting the application to be hidden in step S203 may be an operation of the user directly long-pressing the application icon to be hidden on the home screen interface. In S204, the user hides the target application icon by dragging the application icon directly to the display position of the fingerprint icon. It should be noted that the user's finger does not leave the touch screen during the whole process from long-time pressing of the application icon to dragging of the application icon to the display position of the fingerprint icon.
S205, the terminal collects fingerprint information of the user according to the operation of the user hidden target application icon, and verifies the user identity. If the verification is not passed, step S206a is executed. If the verification is passed, step S206b is executed.
S206a, the terminal displays prompt information to prompt the user that the authentication fails.
S206b, hiding the target application icon by the terminal.
In some examples of the application, after the terminal hides the target application icon, a prompt message may be displayed to prompt a user that the hidden application icon exists in the interface. The prompt message may be a text message, a specific icon, etc. The specific icon may also be a fingerprint icon, for example, and the fingerprint icon in this step may be distinguished from the fingerprint icon in step S204. For example, the fingerprint icon in this step and the fingerprint icon in step S204 are displayed at different positions, or different shapes, colors, or other marks are adopted, or different characters are used for labeling, and the like. Optionally, the fingerprint icon in this step may also be the same fingerprint icon as the fingerprint icon in step S204, and then, the terminal may distinguish whether the operation is an operation of hiding the application icon or an operation of displaying the application icon by operating the fingerprint icon with different operation gestures or by operating the fingerprint icon with different fingers (different fingerprint information). For example: the operation of clicking the fingerprint icon is an operation of hiding the application icon, and the operation of long-time pressing the fingerprint icon is an operation of displaying the hidden application icon. Optionally, the terminal may not distinguish the operation gesture of the user on the fingerprint icon. Before hiding the application icon, the user needs to select the application icon to be hidden, or has an operation of pressing and holding the application icon to drag. However, before the user displays the application icon, the application icon need not be selected. Therefore, after detecting the operation of the user at the display position of the fingerprint icon, the terminal can also distinguish according to whether the application icon is selected in the current home screen interface. And if the application icon is selected in the current interface, the operation is the operation of hiding the selected application icon. And if no application icon in the current interface is selected, the operation is the operation of displaying the hidden application icon. The embodiment of the present application does not limit this.
And S207, the terminal receives the operation of displaying the hidden application icon by the user.
And S208, the terminal collects fingerprint information of the user according to the operation of the user to display the hidden application icon, and verifies the identity of the user. If the verification is passed, step S209b is executed. If the verification is not passed, step S209a is executed.
S209a, the terminal displays a prompt message to prompt the user that the authentication fails.
S209b, the terminal displays the hidden application icon.
Taking the fingerprint icon in step S206 and the fingerprint icon in step S204 as the same fingerprint icon as an example, the description will be given. For example: the terminal detects that the user operates the fingerprint icon 602 on the interface 606 as shown in (1) in fig. 7C. Then, the terminal collects the fingerprint information of the user and compares the collected fingerprint information with the fingerprint information stored in advance. And if the comparison is successful, the user identity authentication is passed. Since no application icon in the current home screen interface is selected, and the user does not press and drag an application icon, the terminal displays the application icon hidden in the home screen interface, and displays an interface 607 as shown in (2) of fig. 7C, in which an application icon "WeChat" and an application icon "build Bank" are displayed in the interface 607, but the two application icons are not displayed in the interface 606 shown in (1) of fig. 7C. Here, it is described by taking an example in which only two application icons are hidden in the interface 606 shown in (1) in fig. 7C. If other application icons in the interface 606 are hidden, the terminal may display all the hidden application icons. The embodiment of the present application does not limit this.
It should also be noted that the terminal may display the hidden application icons in the blank position in the current interface, or may display the hidden application icons in the position displayed before the application icons, which is not specifically limited in this embodiment of the application.
In some examples of the application, a time when the terminal displays the hidden application icon may be set. Reference may be made to the related description in the application scenario one, and details are not repeated here.
And an application scenario three is exemplarily illustrated by taking the example that the user hides the short message of the short message application.
In some examples of the present application, the user opens an interface for the "short message" application to browse short messages, such as interface 701 shown in (1) in fig. 8. On the interface 701, after the terminal detects that the user clicks the "edit" button 703, the terminal enters an editable state of the short messages, and the user may select one or more short messages to be hidden by an operation such as clicking, that is, the interface 702 (i.e., the first interface) shown in (2) in fig. 8 is displayed. The interface 702 includes a plurality of controls, each of which corresponds to a short message, wherein a short message sent by Jack and a short message sent by anie are selected (i.e. the first control has two controls, one control corresponds to "a short message sent by Jack, the other control corresponds to a short message sent by anie, and the short message sent by Jack and the short message sent by anie are the first item). In some examples, a fingerprint icon 704 is also displayed on the interface 702, and the fingerprint icon 704 may be displayed at any position on the interface 702 or the fingerprint icon 704 may not be displayed. The embodiments of the present application are not particularly limited.
Then, the terminal receives an operation of hiding the short message by the user, acquires the fingerprint information of the user according to the operation, compares the fingerprint information with the fingerprint information stored in advance, and if the comparison is successful, hides the selected short message and displays an interface 705 (a second interface) as shown in (3) in fig. 8.
In some examples of the present application, the operation of hiding the short message by the user may be similar to the operation of hiding the picture file by the user in the application scenario one, for example: the user clicks, double clicks, or long presses on the fingerprint icon 704 on the interface 702 as shown in (2) in fig. 8.
In other examples of the application, the operation of hiding the short message by the user may be that the user holds down the fingerprint icon 704 and drags the fingerprint icon 704 to any selected short message.
In this example, the terminal may display the fingerprint icon 704 when displaying a short message browsing interface or an editing interface. The terminal may also not display the fingerprint icon 704 when displaying the short message browsing interface and the editing interface, and display the fingerprint icon 704 after the user selects any one of the short messages. The time when the terminal displays the fingerprint icon 704 is not specifically limited in the embodiment of the present application.
Since the user touches the touch screen with a finger while dragging the fingerprint icon 704 to any selected short message, the terminal can collect the user's fingerprint information through the fingerprint recognizer under the touch screen. And comparing the acquired fingerprint information with the prestored fingerprint information.
If the comparison is successful, which indicates that the user identity authentication is successful, the terminal hides the selected short message, i.e., displays an interface 705 as described in (3) in fig. 8. In other words, the user can directly drag the icon needing the fingerprint to any selected short message through a specific finger (the finger corresponding to the pre-stored fingerprint information), and then the hiding of the selected short message can be completed.
If the comparison fails, it indicates that the user performing the operation is an illegal user, or that the user performing the operation does not use a specific finger (a finger corresponding to the pre-stored fingerprint information), i.e., it indicates that the user authentication has failed. The terminal may then display a prompt prompting the user to re-enter the fingerprint information. Then the user may enter a fingerprint at, for example, the display location of fingerprint icon 704. And the terminal collects the fingerprint information of the user again and compares the fingerprint information with the fingerprint information stored in advance again. If the comparison is successful, the user identity authentication is successful, and the terminal hides the selected short message. If the comparison fails, the user does not have the right of hiding the short message, and the terminal does not hide the selected short message.
In other examples of the present application, in a case where the user hides one of the short messages by dragging the fingerprint icon, the user may select the short message to be hidden without clicking an "edit" button in a browsing interface of the short message. Instead, the user can directly drag and hold the fingerprint icon 704 in the browsing interface of the short message, and drag the fingerprint icon 704 to the control corresponding to the short message to be hidden. And in the whole process from the step of pressing the fingerprint icon to the step of dragging the fingerprint icon to the control corresponding to the short message to be hidden, the finger of the user does not leave the touch screen. And the terminal collects the fingerprint information of the user and compares the fingerprint information. The comparison process and the subsequent processing can refer to the above description, and are not repeated herein.
It should be noted that other contents in the application scenario may refer to the description of the related contents in the other application scenarios, and are not described herein again.
In summary, on the short message editing interface, the user can directly select the short message to be hidden, and then press the fingerprint icon to drag the fingerprint icon to any selected short message, thereby completing the hiding of the selected short message. Or, on the browsing interface or the editing interface of the short message, the user can press the fingerprint icon and drag the fingerprint icon to the short message to be hidden, so that the short message can be hidden. Therefore, the method provided by the embodiment of the application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
After the terminal hides the short message, the embodiment of the application also comprises a process of redisplaying the hidden short message. The display process is similar to the method in the other application scenarios described above, and the description is not repeated here.
And an application scenario four is exemplarily illustrated by taking the contact information in the address book hidden by the user as an example.
In some examples of the application, the user opens an interface for the "contacts" application to browse contact information, such as interface 801 (i.e., the first interface) shown in fig. 9 (1). A plurality of controls are included in the interface 801, each control corresponding to information of a contact.
In some examples, the terminal further displays a corresponding fingerprint icon at the information of each contact for prompting the user to input fingerprint information to hide the contact information. For example: contact "Bella" corresponds to fingerprint icon 802. The fingerprint icon 802 is used to prompt the user to input a fingerprint so that the terminal hides the information of the contact "Bella". Optionally, the user may also use other icons, or characters, or pictures to prompt the user to input fingerprint information, and instruct the terminal to hide the selected contact information. Optionally, the terminal may not display the fingerprint icon because the position of the fingerprint identifier in the terminal is a fixed position. This is not particularly limited in the embodiments of the present application.
Then, when the terminal detects an operation of hiding the contact information by the user, the operation may be, for example, an operation of the user acting on a fingerprint input location (for example, a display location of a fingerprint icon corresponding to the contact information to be hidden, or a control corresponding to the contact information to be hidden). In other examples of the application, the terminal is preset with an operation gesture for hiding the contact information, for example, the operation gesture may be long-press or double-click. This is not particularly limited in the embodiments of the present application. Since the finger of the user can contact the touch screen of the terminal when the user performs the operation at the fingerprint input position, the terminal can collect the finger information of the user through the fingerprint recognizer under the touch screen. And then comparing the acquired fingerprint information with the fingerprint prestored in the terminal. For example: on the interface 801 shown in fig. 9 (1), the terminal detects that a user presses or double-clicks (a preset operation gesture) a fingerprint icon 802 for example for a long time (the contact information corresponding to the fingerprint icon 802 is a first item, and the control corresponding to the contact information is a first control), collects fingerprint information of the user, and compares the collected fingerprint information with fingerprint information stored in advance. If the comparison is successful, which indicates that the user identity authentication is successful, the terminal hides the selected contact information, i.e., displays the interface 803 as shown in (2) in fig. 9. Optionally, in some embodiments of the present application, in the interface 801 shown in (1) in fig. 9, each control does not display a corresponding fingerprint icon, and a user may directly perform long-time pressing or double-clicking on contact information to be hidden by a specific finger (a finger corresponding to pre-stored fingerprint information) or slide on the contact information to be hidden, so that hiding of the contact information may be completed.
If the comparison fails, it indicates that the user performing the operation is an illegal user, or that the user performing the operation does not use a specific finger (a finger corresponding to the pre-stored fingerprint information), i.e., it indicates that the user authentication has failed. The terminal may then display a prompt prompting the user to re-enter the fingerprint information. And after the user inputs the fingerprint information again, the terminal acquires the fingerprint information of the user again and compares the fingerprint information with the fingerprint information stored in advance again. If the comparison is successful, the user identity authentication is successful, and the terminal hides the selected contact information. If the comparison fails, the user does not have the authority to hide the contact information, and the terminal does not hide the contact information.
In other examples of the application, if the terminal detects that the user clicks a control corresponding to the contact information on the interface 801 shown in (1) in fig. 9, the terminal displays a specific contact address of the contact Bella, that is, displays the interface 804 shown in (3) in fig. 9. It should be noted that, since the control of the contact information overlaps with a partial area of the fingerprint icon 802, the click operation may be performed on the fingerprint icon. Because the clicking operation is not an operation gesture preset by the terminal for hiding the contact information, the terminal does not hide the contact information, but displays the specific contact information of the contact.
It should be noted that other contents in the application scenario may refer to the description of the related contents in the other application scenarios, and are not described herein again.
In summary, the user can complete hiding the contact information to be hidden by long pressing or double clicking the contact information to be hidden (or the fingerprint icon corresponding to the contact information to be hidden). Therefore, the method provided by the embodiment of the application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
It should be noted that the hiding method for any item provided in the embodiment of the present application may be implemented in any one or any combination of possible implementation manners in the application scenarios described above, and the embodiment of the present application is not limited.
After the terminal hides the contact information, the embodiment of the application further comprises a process of displaying the hidden contact information again. The display process is similar to the method in the other application scenarios described above, and the description is not repeated here.
It should be noted that the process of displaying the hidden item by the terminal and the process of hiding the item by the terminal may be independent processes. That is to say, after the terminal hides the item by using the method in the embodiment of the present application, the hidden item may be displayed again by using the method for displaying the hidden item in the embodiment of the present application, or the hidden item may be displayed by using another display method. Secondly, the terminal can hide the item by adopting the method in the embodiment of the application, and can also hide the item by adopting other hiding methods, and then the hidden item is displayed by adopting the method for displaying the hidden item provided by the embodiment of the application.
In general, the method for displaying hidden items provided in the embodiment of the present application specifically includes: the terminal displays a third interface in which the second item has been hidden. The terminal receives an operation of a user on the touch screen, wherein the operation is used for instructing the terminal to display the hidden second item. And the terminal acquires the fingerprint information of the user according to the operation and verifies the identity of the user. And after the user identity authentication is passed, the terminal displays a fourth interface, and the second item is displayed in the fourth interface. And the fourth interface has more second items than the third interface, and other items displayed on the fourth interface are the same as those in the third interface. In other words, the terminal displays the items that have been hidden in the third interface.
As shown in fig. 10, a schematic flow chart of a method for displaying a hidden item provided in an embodiment of the present application is shown, where the method specifically includes:
s301, the terminal displays a third interface, and a second item in the third interface is hidden.
The third interface may be, for example, a browsing interface or an editing interface of an application or an application function, and may be, for example, an interface for browsing a picture file in a "gallery" application, an interface for browsing a short message in a "short message" application, and an interface for browsing contact information in an "address book" application. The first interface may also be a browsing interface or an editing interface of a folder. The third interface may also be a home screen interface of the terminal, and the third interface is not specifically limited in this embodiment of the application.
S302, the terminal receives the operation of displaying the second item by the user.
Illustratively, the user displays the operation of the second item, and the preset operation for indicating the terminal to display the hidden item may be, for example, the user's operation at the fingerprint icon display position, and the operation gesture may be, for example, any one of clicking, long-pressing, double-clicking and sliding.
And S303, the terminal collects the fingerprint information of the user according to the operation of the second item displayed by the user and verifies the identity of the user. If the verification is passed, step S304b is executed. If the verification is not passed, step S304a is executed.
S304a, the terminal displays prompt information to prompt the user that the authentication fails.
S304b, and a fourth interface of the terminal, wherein the second item is displayed in the fourth interface.
And comparing the fourth interface with the third interface, wherein the fourth interface has more second items, and other items are the same. That is, items hidden in the third interface are displayed in the fourth interface.
It should be noted that the terminal may display the hidden items in the blank position in the current interface, or may display the hidden items in the position displayed before the hidden items, which is not specifically limited in this embodiment of the application.
In some examples of the application, the number of times or the time when the terminal displays the hidden file may be set. Reference may be specifically made to the related description in step S109b, and details are not repeated here.
Other contents in the embodiment of the present application may refer to the description of the related contents in each application scenario, and are not repeated herein.
It is to be understood that the above-mentioned terminal and the like include hardware structures and/or software modules corresponding to the respective functions for realizing the above-mentioned functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
In the embodiment of the present application, the terminal and the like may be divided into functional modules according to the method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, the division of the modules in the embodiment of the present invention is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 11 shows a possible structure diagram of the terminal involved in the above embodiment in the case of dividing each functional module by corresponding functions. As shown in fig. 11, terminal 1000 can include: a display unit 1001, a processing unit 1002, and a receiving unit 1003.
Among them, the display unit 1001 is used to support the terminal to display the interfaces in steps S101, S106a, S106b, S109a, S109b in fig. 4, the interfaces in S201, S206a, S206b, S209a, S209b in fig. 6, the interfaces in S301, S304a, S304b in fig. 10, and/or other processes for the technology described herein.
The processing unit 1002 is configured to support the terminal to perform the determination process in S103, S105, S108, S203, S208 in fig. 4, S205 in fig. 6, S303 in fig. 10, and/or other processes for the techniques described herein.
The receiving unit 1003 is configured to support the terminal to perform operations of receiving the user in S102, S104, and S107 in fig. 4, S202, S203, S204, and S207 in fig. 6, S302 in fig. 10, and/or other processes for the technology described herein.
Of course, terminal 1000 can also include a storage unit for terminal interaction with other devices. Moreover, the functions that can be specifically implemented by the above functional units also include, but are not limited to, the functions corresponding to the method steps described in the above examples, and the detailed description of the corresponding method steps may be referred to for the detailed description of other units of the terminal 1000, which is not described herein again in this embodiment of the present application.
In case of using an integrated unit, the display unit 1001 may be a terminal display module, such as a touch screen. The processing unit 1002 may be a processing module of the terminal. The receiving unit 1003 may be a communication module of the terminal, such as an RF circuit, a WiFi module, or a bluetooth module. The storage unit may be a storage module of the terminal.
Fig. 12 shows a schematic diagram of a possible structure of the terminal involved in the above embodiment. The terminal 1100 includes: a processing module 1101, a storage module 1102 and a communication module 1103. The processing module 1101 is configured to control and manage the operation of the terminal. The storage module 1102 is used for storing program codes and data of the terminal. The communication module 1103 is used for communicating with other terminals. The Processing module 1101 may be a Processor or a controller, such as a Central Processing Unit (CPU), a general purpose Processor, a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 1303 may be a transceiver, a transceiver circuit, a communication interface, or the like. The storage module 1102 may be a memory.
When the processing module 1101 is a processor (e.g., the processor 101 shown in fig. 2), the communication module 1103 is an RF transceiver circuit (e.g., the radio frequency circuit 102 shown in fig. 2), and the storage module 1102 is a memory (e.g., the memory 103 shown in fig. 2), the terminal provided in the embodiment of the present application may be the terminal 100 shown in fig. 2. The communication module 1103 may include not only an RF circuit, but also a WiFi module and a bluetooth module. The communication modules such as the RF circuit, WiFi module, and bluetooth module may be collectively referred to as a communication interface. Wherein the processor, the communication interface, and the memory may be coupled together by a bus.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a processor to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: flash memory, removable hard drive, read only memory, random access memory, magnetic or optical disk, and the like.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (30)

  1. A display method of an item, applied to a terminal including a touch screen provided with a fingerprint recognizer, the method comprising:
    the terminal displays a first interface, wherein a first item is selected from the first interface, and the number of the first item is at least one;
    the terminal receives a first operation of a user on the touch screen, wherein the first operation is a preset operation gesture for indicating the terminal to hide the first item;
    responding to the first operation, the terminal collects fingerprint information of the user in the first operation through the fingerprint recognizer;
    in response to the verification of the collected fingerprint information of the user in the first operation passing, the terminal displays a second interface, the second interface has less first items than the first interface, and the items displayed on the second interface are the same as the other items in the first interface except the first items.
  2. The method of claim 1, wherein the first interface further comprises a fingerprint icon, and wherein the fingerprint identifier is configured at a display location of the fingerprint icon.
  3. The method of claim 2, wherein the terminal receiving a first operation of a user on the touch screen comprises:
    the terminal receives any one of the following operations executed by a user at the display position of the fingerprint icon: clicking, double clicking and long pressing;
    or the terminal receives that the user drags the control corresponding to the first item to the display position of the fingerprint icon;
    or the terminal receives that the user drags the fingerprint icon to the control corresponding to the first item.
  4. The method according to any one of claims 1-3, wherein after the terminal displays the second interface, the method further comprises:
    the terminal receives a second operation of a user on the touch screen, wherein the second operation is a preset operation gesture for indicating the terminal to display a first item;
    responding to the second operation, the terminal collects fingerprint information of the user in the second operation through the fingerprint identifier;
    and responding to the verification of the collected fingerprint information of the user in the second operation, and displaying a third interface by the terminal, wherein the third interface has more first items than the second interface, and other items displayed by the third interface are the same as the second interface.
  5. The method according to any one of claims 1-4, wherein after the terminal receives a first operation of a user on the touch screen, the method further comprises:
    and responding to the collected fingerprint information of the user in the first operation that the verification is not passed, and displaying a fourth interface by the terminal, wherein prompt information is displayed on the fourth interface to prompt the user to input the fingerprint information.
  6. The method according to any one of claims 1 to 5,
    the first interface is a folder interface, and the first item is any one of the following items: picture files, video files, audio files, text files, folders;
    or, the first interface is a gallery application interface, and the first item is a picture file or a video file;
    or, the first interface is a home screen interface, and the first item is an application icon;
    or, the first interface is a browsing interface of a short message, and the first item is a short message;
    or the first interface is an address book interface, and the first item is contact information;
    or the first interface is a negative one-screen interface, and the first item is card information.
  7. A display method of an item, applied to a terminal including a touch screen provided with a fingerprint identifier, the method further comprising:
    the terminal displays a first interface, and a first item is displayed on the first interface;
    the terminal receives an operation that a user hides the first item;
    in response to receiving an operation of hiding the first item by a user, the terminal displays a second interface, wherein the second interface has less first items than the first interface, and the items displayed by the second interface are the same as the other items except the first item in the first interface;
    the terminal receives a first operation of a user on the touch screen, wherein the first operation is a preset operation gesture for indicating the terminal to display the first item;
    responding to the first operation, the terminal collects fingerprint information of the user in the first operation through the fingerprint recognizer;
    and in response to the verification of the collected fingerprint information of the user in the first operation passing, the terminal displays a third interface, wherein the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface.
  8. The method of claim 7, wherein the first interface further comprises a fingerprint icon, and wherein the fingerprint identifier is configured at a display location of the fingerprint icon;
    the terminal receiving a first operation of a user on the touch screen comprises the following steps:
    the terminal receives any one of the following operations executed by a user at the display position of the fingerprint icon: click, double click, long press.
  9. The method of claim 7 or 8, wherein the first interface is a folder interface; the first item is any one of: picture files, video files, audio files, text files, folders;
    or, the first interface is a gallery application interface, and the first item is a picture file or a video file;
    or, the first interface is a home screen interface, and the first item is an application icon;
    or, the first interface is a browsing interface of a short message, and the first item is a short message;
    or the first interface is an address book interface, and the first item is contact information;
    or the first interface is a negative one-screen interface, and the first item is card information.
  10. A terminal, characterized in that the terminal comprises a touch screen configured with a fingerprint identifier, the terminal comprising:
    the display unit is used for displaying a first interface, wherein a first item is selected in the first interface, and the number of the first item is at least one;
    the receiving unit is used for receiving a first operation of a user on the touch screen, wherein the first operation is a preset operation gesture for indicating the terminal to hide the first item;
    the processing unit is used for responding to the first operation and acquiring fingerprint information of a user in the first operation through the fingerprint identifier;
    the display unit is further configured to display a second interface in response to that the collected fingerprint information of the user in the first operation passes verification, wherein the second interface does not display the first item, the second interface has fewer first items than the first interface, and the items displayed by the second interface are the same as the other items in the first interface except the first item.
  11. The terminal according to claim 10, wherein the first interface displayed by the display unit further includes a fingerprint icon, and the fingerprint identifier is configured at a display position of the fingerprint icon.
  12. The terminal of claim 11, wherein the receiving unit, configured to receive a first operation performed by a user on the touch screen, comprises:
    receiving any one of the following operations performed by a user at the display position of the fingerprint icon: clicking, double clicking and long pressing;
    or, receiving that a user drags a control corresponding to the first item to the display position of the fingerprint icon;
    or, receiving that the user drags the fingerprint icon to a control corresponding to the first item.
  13. The terminal according to any of claims 10-12,
    the receiving unit is further configured to receive a second operation of the user on the touch screen after the display unit displays a second interface, where the second operation is a preset operation gesture indicating that the terminal displays a first item;
    the processing unit is further used for responding to the second operation and collecting the fingerprint information of the user in the second operation through the fingerprint recognizer;
    the display unit is further configured to display a third interface in response to that the collected user fingerprint information in the second operation passes verification, where the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface.
  14. The terminal according to any of claims 10-13,
    the display unit is further configured to, after the receiving unit receives a first operation of a user on the touch screen, respond to that the collected fingerprint information of the user in the first operation is not verified, display a fifth interface on the terminal, where prompt information is displayed on the fifth interface to prompt the user to input the fingerprint information.
  15. The terminal according to any of claims 10-14,
    the first interface displayed by the display unit is a folder interface, and the first item is any one of the following items: picture files, video files, audio files, text files, folders;
    or the first interface displayed by the display unit is a gallery application interface, and the first item is a picture file or a video file;
    or the first interface displayed by the display unit is a home screen interface, and the first item is an application icon;
    or the first interface displayed by the display unit is a browsing interface of the short message, and the first item is the short message;
    or the first interface displayed by the display unit is an address book interface, and the first item is contact information;
    or the first interface displayed by the display unit is a negative one-screen interface, and the first item is card information.
  16. A terminal, characterized in that the terminal includes a touch screen, the touch screen is configured with a fingerprint recognizer, the terminal further includes:
    the display unit is used for displaying a first interface, and the first interface displays the first item;
    a receiving unit, configured to receive an operation of hiding the first item by a user;
    the display unit is further used for responding to the operation that a user hides the first item, and displaying a second interface, wherein the second interface has less first items than the first interface, and the items displayed on the second interface are the same as the other items except the first item in the first interface;
    the receiving unit is further configured to receive a first operation of a user on the touch screen, where the first operation is a preset operation gesture indicating that the terminal displays a first item; the first item is not displayed in the first interface;
    the processing unit is used for responding to the first operation and acquiring fingerprint information of a user in the first operation through the fingerprint identifier;
    the display unit is further configured to display a third interface in response to that the collected fingerprint information of the user in the first operation passes verification, where the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface, and the first items are displayed in the second interface.
  17. The terminal according to claim 16, wherein the first interface displayed by the display unit further comprises a fingerprint icon, and the fingerprint identifier is configured at a display position of the fingerprint icon;
    the receiving unit is used for receiving a first operation of a user on the touch screen and comprises the following steps:
    the receiving unit is used for receiving any one of the following operations executed by a user at the display position of the fingerprint icon: click, double click, long press.
  18. The terminal according to claim 16 or 17, wherein the first interface displayed by the display unit is a folder interface; the first item is any one of: picture files, video files, audio files, text files, folders;
    or the first interface displayed by the display unit is a gallery application interface, and the first item is a picture file or a video file;
    or the first interface displayed by the display unit is a home screen interface, and the first item is an application icon;
    or the first interface displayed by the display unit is a browsing interface of the short message, and the first item is the short message;
    or the first interface displayed by the display unit is an address book interface, and the first item is contact information;
    or the first interface displayed by the display unit is a negative one-screen interface, and the first item is card information.
  19. A Graphical User Interface (GUI) stored in a terminal comprising a touchscreen, memory, one or more processors to execute one or more computer programs stored in the memory, the touchscreen being configured with a fingerprint recognizer, the GUI comprising:
    a first interface displayed on the touch screen, wherein the first interface comprises first items, the first items are selected, and the number of the first items is at least one;
    responding to the terminal to receive a first operation of a user on the touch screen, and the collected fingerprint information of the user in the first operation passes verification, and displaying a second interface on the touch screen, wherein the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as the other items except the first item in the first interface; the first operation is an operation performed by a user on the first interface, and the first operation is a preset operation gesture for indicating the terminal to hide the first item.
  20. A gui according to claim 19, wherein the first interface further comprises a fingerprint icon, the fingerprint identifier being arranged at a display location of the fingerprint icon.
  21. The graphical user interface of claim 20, further comprising:
    in response to the terminal receiving a second operation of the user on the touch screen and the verification that the fingerprint information of the user in the second operation is collected by the fingerprint recognizer is passed, displaying a third interface on the touch screen, wherein the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface; the second operation is the operation of the user on the second interface, and the second operation is a preset operation gesture for indicating the terminal to display the first item.
  22. A gui according to any of claims 19 to 21, wherein the first interface is a folder interface and the first item is any of: picture files, video files, audio files, text files, folders;
    or, the first interface is a gallery application interface, and the first item is a picture file or a video file;
    or, the first interface is a home screen interface, and the first item is an application icon;
    or, the first interface is a browsing interface of a short message, and the first item is a short message;
    or the first interface is an address book interface, and the first item is contact information;
    or the first interface is a negative one-screen interface, and the first item is card information.
  23. A Graphical User Interface (GUI) stored in a terminal comprising a touchscreen, memory, one or more processors to execute one or more computer programs stored in the memory, the touchscreen being configured with a fingerprint recognizer, the GUI comprising:
    a first interface displayed on the touch screen, the first interface including a first item;
    in response to receiving an operation of hiding the first item by a user, displaying a second interface on the touch screen, wherein the second interface has less first items than the first interface, and the displayed items of the second interface are the same as the other items except the first item in the first interface;
    responding to the terminal receiving a first operation of a user on the touch screen, and the fingerprint information of the user in the first operation collected by the fingerprint recognizer passes verification, and displaying a third interface on the touch screen, wherein the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface; the first operation is the operation of the user on the second interface, and the first operation is a preset operation gesture for indicating the terminal to display the first item.
  24. A gui according to claim 23, wherein the first interface is a folder interface and the first item is any one of: picture files, video files, audio files, text files, folders;
    or, the first interface is a gallery application interface, and the first item is a picture file or a video file;
    or, the first interface is a home screen interface, and the first item is an application icon;
    or, the first interface is a browsing interface of a short message, and the first item is a short message;
    or the first interface is an address book interface, and the first item is contact information;
    or the first interface is a negative one-screen interface, and the first item is card information.
  25. A terminal, comprising: a processor, a memory and a touch screen, the memory, the touch screen being coupled to the processor, the memory for storing computer program code, the computer program code comprising computer instructions that, when read from the memory by the processor, cause the terminal to perform the method of any of claims 1-6.
  26. A terminal, comprising: a processor, a memory and a touch screen, the memory and the touch screen being coupled to the processor, the memory for storing computer program code comprising computer instructions which, when read from the memory by the processor, cause the terminal to perform the method of any of claims 7-9.
  27. A computer storage medium comprising computer instructions which, when run on a terminal, cause the terminal to perform the method of any one of claims 1-6.
  28. A computer storage medium comprising computer instructions which, when run on a terminal, cause the terminal to perform the method of any one of claims 7-9.
  29. A computer program product, characterized in that, when the computer program product is run on a computer, it causes the computer to perform the method according to any of claims 1-6.
  30. A computer program product, characterized in that, when the computer program product is run on a computer, it causes the computer to perform the method according to any of claims 7-9.
CN201880088100.0A 2018-06-01 2018-06-01 Project display method and terminal Active CN111656347B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/089660 WO2019227487A1 (en) 2018-06-01 2018-06-01 Item display method and terminal

Publications (2)

Publication Number Publication Date
CN111656347A true CN111656347A (en) 2020-09-11
CN111656347B CN111656347B (en) 2024-02-09

Family

ID=68696799

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880088100.0A Active CN111656347B (en) 2018-06-01 2018-06-01 Project display method and terminal

Country Status (2)

Country Link
CN (1) CN111656347B (en)
WO (1) WO2019227487A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113434846A (en) * 2021-06-22 2021-09-24 青岛海尔科技有限公司 Method and device for processing screen projection data
WO2022262536A1 (en) * 2021-06-16 2022-12-22 荣耀终端有限公司 Video processing method and electronic device
WO2023142763A1 (en) * 2022-01-27 2023-08-03 华为技术有限公司 Inter-application information sharing method and terminal

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022446B (en) * 2021-10-09 2023-06-13 荣耀终端有限公司 User interface management method and terminal equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160042166A1 (en) * 2013-03-27 2016-02-11 Samsung Electronics Co., Ltd. Method and device for providing security content
CN105825105A (en) * 2015-11-30 2016-08-03 南京步步高通信科技有限公司 Method and electronic equipment for displaying objects hidden on interface
CN105955587A (en) * 2016-06-15 2016-09-21 广东欧珀移动通信有限公司 Hidden application icon display method and device
CN107145272A (en) * 2017-04-27 2017-09-08 努比亚技术有限公司 A kind of icon hiding display terminal and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160042166A1 (en) * 2013-03-27 2016-02-11 Samsung Electronics Co., Ltd. Method and device for providing security content
CN105825105A (en) * 2015-11-30 2016-08-03 南京步步高通信科技有限公司 Method and electronic equipment for displaying objects hidden on interface
CN105955587A (en) * 2016-06-15 2016-09-21 广东欧珀移动通信有限公司 Hidden application icon display method and device
CN107145272A (en) * 2017-04-27 2017-09-08 努比亚技术有限公司 A kind of icon hiding display terminal and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022262536A1 (en) * 2021-06-16 2022-12-22 荣耀终端有限公司 Video processing method and electronic device
CN113434846A (en) * 2021-06-22 2021-09-24 青岛海尔科技有限公司 Method and device for processing screen projection data
CN113434846B (en) * 2021-06-22 2023-06-09 青岛海尔科技有限公司 Screen-throwing data processing method and device
WO2023142763A1 (en) * 2022-01-27 2023-08-03 华为技术有限公司 Inter-application information sharing method and terminal

Also Published As

Publication number Publication date
WO2019227487A1 (en) 2019-12-05
CN111656347B (en) 2024-02-09

Similar Documents

Publication Publication Date Title
CN114449091B (en) Display method and device
EP3764253B1 (en) Method for quickly opening application or application function, and terminal
US11934505B2 (en) Information content viewing method and terminal
CN114741011B (en) Terminal display method and electronic equipment
CN110168487B (en) Touch control method and device
CN111247510B (en) Display method of application window and terminal
CN111656347B (en) Project display method and terminal
EP4280058A1 (en) Information display method and electronic device
KR20150031588A (en) Electronic Device And Method for Handling Incoming Call Of The Same
CN108153460B (en) Icon hiding method and terminal
CN108780400B (en) Data processing method and electronic equipment
EP3185515B1 (en) Method and device for inputting information
CN111656346B (en) Display method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant