CN105700884A - Application icon hiding method and system, and intelligent terminal - Google Patents

Application icon hiding method and system, and intelligent terminal Download PDF

Info

Publication number
CN105700884A
CN105700884A CN201610023512.9A CN201610023512A CN105700884A CN 105700884 A CN105700884 A CN 105700884A CN 201610023512 A CN201610023512 A CN 201610023512A CN 105700884 A CN105700884 A CN 105700884A
Authority
CN
China
Prior art keywords
described
application icon
instruction
transparent file
file folder
Prior art date
Application number
CN201610023512.9A
Other languages
Chinese (zh)
Inventor
叶川
Original Assignee
成都中科创达软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 成都中科创达软件有限公司 filed Critical 成都中科创达软件有限公司
Priority to CN201610023512.9A priority Critical patent/CN105700884A/en
Publication of CN105700884A publication Critical patent/CN105700884A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object or an image, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention provides an application icon hiding method and system, and an intelligent terminal. The application icon hiding method comprises the steps of when a hiding instruction from a user is detected, judging that that user needs to hide the application icon, and determining the application icon corresponding to the hiding instruction; and dragging the application icon corresponding to the hiding instruction to a transparent folder to finish the hiding of the application. Therefore, compared with the application hiding way in the prior art, the hiding method provided by the invention is convenient and rapid.

Description

A kind of application icon hidden method, system and intelligent terminal

Technical field

The present invention relates to field of information security technology, is specifically related to a kind of application icon hidden method, system and intelligent terminal。

Background technology

The equipment such as mobile phone, computer, PDA generally all start this program by application icon, if some is applied the private data of the user related to and does not want that allowing other staff know is mounted with when these are applied in person, it is necessary to be hidden by the application icon of these application。

The certain methods of hiden application icon is in the market: arrange hiden application icon by other application (such as settings etc.), the application hidden will be needed to be deposited in these application, the application icon hidden is needed to be placed on the hiding page these, conducted interviews by certain gestures or password when needs access these application, but make in this way hiden application icon time, user has to be introduced into an application, at this, application the inside selects and arranges the application icon to hide, operates all complex。

Summary of the invention

In view of this, the embodiment of the present invention provides a kind of application icon hidden method, system and terminal, the problem that during to solve hiden application icon in prior art, process is loaded down with trivial details。

For achieving the above object, the embodiment of the present invention provides following technical scheme:

A kind of application icon hidden method, is applied in desktop control system, including:

Judge whether to get the hiding instruction for hiden application icon, if it is, be saved into by the application icon corresponding with described hiding instruction in described transparent file folder;

Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。

Preferably, in above-mentioned application icon hidden method, the application icon corresponding with described hiding instruction is saved in described transparent file folder, including:

Obtain the unblock instruction of user's input;

Judge that whether described unblock instruction is identical with default unblock instruction, if it is, be saved into by the application icon corresponding with described hiding instruction in described transparent file folder。

Preferably, in above-mentioned application icon hidden method, also include:

Judge whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;

Judge that whether described unblock instruction is identical with default unblock instruction, if it is, show the application icon that described transparent file folder preserves。

Preferably, in above-mentioned application icon hidden method, after showing the application icon that described transparent file folder preserves, also include:

What judge whether to get user removes instruction, if it is, will remove the application icon that instruction matches remove described transparent file folder with described。

Preferably, in above-mentioned application icon hidden method, described hiding instruction, including:

It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;

And/or,

In the first preset time period, continuously click the click commands needing hiding application icon X time, described X be not less than 2 positive integer。

Preferably, in above-mentioned application icon hidden method, described triggering command is that user continuously clicks the click commands that described transparent file presss from both sides n time in the second preset time period, described n be not less than 2 positive integer。

Preferably, in above-mentioned application icon hidden method, described in remove instruction and include:

In the 3rd preset time period, click continuously the click commands of the application icon that the needs during described transparent file presss from both sides unhide for m time, described m be not less than 2 positive integer;

And/or,

The application icon needing to unhide is hauled out the operational order of described transparent file folder。

A kind of application icon hides system, is applied in desktop control system, including:

Monitoring means, for judging whether to get the hiding instruction for hiden application icon, if it is, preserve instruction to performance element output;

Described performance element, for being saved into the application icon corresponding with described hiding instruction in described transparent file folder;

Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。

Preferably, above-mentioned application icon is hidden in system, described performance element, including:

First password matching unit, for, after getting described preservation instruction, obtaining the unblock instruction of user's input, it is judged that whether described unblock instruction is identical with default unblock instruction, if it is, export the first triggering signal to the first sub-performance element;

Described first sub-performance element, for, after getting described first starting signal, being saved into the application icon corresponding with described hiding instruction in described transparent file folder。

Preferably, above-mentioned application icon is hidden in system, described performance element, including:

Second password match unit, for judging whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;Judge that whether described unblock instruction is identical with default unblock instruction, if it is, to the second sub-performance element output display instruction;

Described second sub-performance element, after being used for getting described idsplay order, controls display unit and show the application icon of described transparent file folder preservation。

Preferably, above-mentioned application icon is hidden in system, and described performance element also includes:

Remove unit, remove instruction for what judge whether to get user, if it is, the application icon that instruction matches will be removed remove described transparent file folder with described。

Preferably, above-mentioned application icon is hidden in system, and described hiding instruction includes:

It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;

And/or,

The click commands needing hiding application icon is clicked X time continuously in the first preset time period。

Preferably, above-mentioned application icon is hidden in system, and described triggering command is that user clicks the click commands that described transparent file presss from both sides n time continuously in the second preset time period, described n be not less than 2 positive integer。

Preferably, above-mentioned application icon is hidden in system, described in remove instruction and include:

In the 3rd preset time period, click continuously the click commands of the application icon that the needs during described transparent file presss from both sides unhide for m time, described m be not less than 2 positive integer;

And/or,

The application icon needing to unhide is hauled out the operational order of described transparent file folder。

A kind of intelligent terminal, application has application icon disclosed in above-mentioned any one to hide system。

Preferably, above-mentioned intelligent terminal is mobile phone, computer, PDA or intelligent television。

Based on technique scheme, the such scheme that the embodiment of the present invention provides, when the hiding instruction that user inputs being detected, judge that now user needs application icon is hidden, it is determined that the application icon that described hiding instruction is corresponding, the application icon corresponding with described hiding instruction is dragged in described transparent file folder, hiding this application can be realized, visible, for the Stealth Modus of application of the prior art, convenient and swift。

Accompanying drawing explanation

In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to the accompanying drawing provided。

Fig. 1 is the schematic flow sheet of application icon hidden method disclosed in the embodiment of the present application;

Fig. 2 is the schematic flow sheet of application icon hidden method disclosed in another embodiment of the application;

Fig. 3 is a kind of schematic flow sheet opening transparent file folder disclosed in the embodiment of the present application;

Fig. 4 is the schematic flow sheet of a kind of application icon that unhides disclosed in the embodiment of the present application;

Fig. 5 is the structural representation that a kind of application icon disclosed in the embodiment of the present application hides system;

Fig. 6 is the structural representation that a kind of application icon disclosed in another embodiment of the application hides system。

Detailed description of the invention

Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。

It is directed in prior art in the loaded down with trivial details problem of process application icon being hidden and use, this application discloses a kind of application icon hidden method, the method is applied in desktop control system, wherein, described desktop controls the control system that application icon is managed by the desktop control system etc. of the desktop that system can be cell phone apparatus controls system, the desktop of PDA device controls system intelligent television desktop control system or computer, and the method includes:

Step S101: judge whether to get the hiding instruction for hiden application icon, if it is, perform step S102;

Wherein, the instruction type of described hiding instruction can according to user's request sets itself, such as it can be the application icon being hidden will be needed to be dragged into the operational order that transparent file presss from both sides the position at place, when described hiding instruction is aforesaid operations instruction, when user needs to hide an application icon, only need to will drag to the position at described transparent file folder place, then discharge again, certainly this hiding instruction can also be click the click commands needing hiding application icon X time continuously in the first preset time period, described X be not less than 2 positive integer。Such as, when user needs to be hidden by this application icon to described transparent file folder, only in the first Preset Time, this application icon need to be quickly clicked for X time continuously, after quickly clicking this icon for X time continuously in user's the first Preset Time, this application icon is preserved to described transparent file folder by system automatically;Certainly this hiding instruction can also be the gesture instruction for presetting, after detecting that this gesture performs, application icon on desktop is set to alternative mode, and then user selects the required application icon hidden, and is selected the application icon of state to preserve to described transparent file folder by state。

Step S102: the application icon corresponding with described hiding instruction is saved in described transparent file folder;

Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。

In technical scheme disclosed in the above embodiments of the present application, desktop controls to be provided with a sightless transparent file folder of user on the desktop (this desktop refers to the interface for placing application icon in existing various electronic equipment) of system, the position of this transparent file folder can according to user's request from Row sum-equal matrix, this transparent file folder is for storing the application icon that user needs to hide, after this application icon is saved to described transparent file folder, also can become invisible, thus realizing hiding application icon。

When adopting application icon hidden method disclosed in the above embodiments of the present application that application icon is hidden, user can input default hiding instruction, when system detects the hiding instruction that user inputs, judge that now user needs application icon is hidden, determine the application icon that described hiding instruction is corresponding, the application icon corresponding with described hiding instruction is dragged in described transparent file folder, hiding this application can be realized, visible, for the Stealth Modus of application of the prior art, convenient and swift。

It is understandable that, when should equipment in aforementioned manners lend time, in order to prevent other users malice by when hiding to described transparent file folder without hiding application icon, in method disclosed in the above embodiments of the present application, referring to Fig. 2, step S102 specifically may include that

Step S1021: obtain the unblock instruction of user's input, wherein, described unblock instruction can be that to unlock gesture can also be digital or alphabetical password etc. for type;

Step S1022: judge that whether described unblock instruction is identical with default unblock instruction, if it is, perform step S1023:

Step S1023: the application icon corresponding with described hiding instruction is saved in described transparent file folder。

In the method, when user needs to hide required hiding application icon and presss from both sides to described transparent file, first input is needed to hide instruction, after instruction is hidden in input, system prompts user input unlocks instruction, when the unblock instructions match detecting that user inputs is correct, just the application icon matched in described hiding instruction is preserved to described transparent file folder。

When user needs to access the application icon hidden in described transparent file folder, described transparent file folder can be opened by conventional triggering mode, such as, described transparent file folder is opened by the mode clicked, after described transparent file double-layered quilt is opened, can show, to user, all of application icon preserved in described transparent file folder。Open it of course for preventing other users from touching described transparent file folder by mistake, described transparent file folder is also separately provided one for opening the triggering command of described transparent file folder by the application, this instruction be different from routine click the mode opening application, with reduce other users open described transparent file folder probability。Certainly, in order to further enhance the safety of described transparent file folder, when get user's input for after opening the triggering command of described transparent file folder, it is still necessary to be unlocked after instruction examines, just can display to the user that the application icon that described transparent file folder preserves。Namely said method disclosed in the above embodiments of the present application can also include:

Step S301: judge whether to get the triggering command for opening described transparent file folder of user's input, if it is, perform step S302:

Wherein, in the method, described triggering command can be that user continuously clicks the click commands that described transparent file presss from both sides n time in the second preset time period, described n be not less than 2 positive integer。Such as, described first Preset Time can be 0.3 second, and described n can be 2, i.e. user's described transparent file of double click in 0.3 second just can open this document。

Step S302: obtain the unblock instruction of user's input;

Step S303: judge that whether described unblock instruction is identical with default unblock instruction, if it is, perform step S304;

Step S304: show the application icon that described transparent file folder preserves。

It is understood that some application icon in described transparent file presss from both sides is without time hiding, these icons can be derived described transparent file folder by user, now, referring to Fig. 4, method disclosed in the above embodiments of the present application, after step S304, it is also possible to including:

Step S305: what judge whether to get user removes instruction, if it is, perform step S306;

Wherein, the described click commands removing the application icon that instruction can unhide for the needs that user clicks for m time continuously during described transparent file presss from both sides in the 3rd preset time period, described m be not less than 2 positive integer, wherein, described second Preset Time and described 3rd time can be identical, described m and X can be identical, namely removing instruction described in can be: the click commands that X time is clicked the application icon that needs remove continuously in the first preset time period, described X be not less than 2 positive integer, now, owing to described application icon has been stored in described transparent file folder, it can thus be assumed that this instruction is not for hiding instruction, it should be and removes instruction;Certainly removing instruction described in can also be the operational order that the application icon unhided will be needed to haul out described transparent file folder, now, user only described transparent file need to be pressed from both sides in haul out described transparent file folder without hiding application icon after discharge。

Step S306: the application icon that instruction matches will be removed remove described transparent file folder with described。

It is understood that corresponding with said method, disclosed herein as well is and a kind of should hide system by application icon in aforementioned manners, this system is applied in desktop control system, referring to Fig. 5, it is possible to including:

Monitoring means 10, for judging whether to get the hiding instruction for hiden application icon, if it is, preserve instruction to performance element output;

Described performance element 20, for being saved into the application icon corresponding with described hiding instruction in described transparent file folder;

Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。

When adopting said system that application icon is hidden, user can input default hiding instruction, when monitoring means 10 monitors the hiding instruction of user's input, judge that now user needs application icon is hidden, described performance element 20 determines the application icon that described hiding instruction is corresponding, the application icon corresponding with described hiding instruction is dragged in described transparent file folder, hiding this application can be realized, visible, for the Stealth Modus of application of the prior art, convenient and swift。

It is understood that corresponding with said method, referring to Fig. 6, application icon disclosed in the above embodiments of the present application is hidden in system, and described performance element 20 may include that

First password matching unit 21, for, after getting described preservation instruction, obtaining the unblock instruction of user's input, it is judged that whether described unblock instruction is identical with default unblock instruction, if it is, export the first triggering signal to the first sub-performance element;

Described first sub-performance element 22, for, after getting described first starting signal, being saved into the application icon corresponding with described hiding instruction in described transparent file folder。

Corresponding with said method, referring to Fig. 6, application icon disclosed in the above embodiments of the present application is hidden in system, described performance element 20, it is also possible to including:

Second password match unit 23, for judging whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;Judge that whether described unblock instruction is identical with default unblock instruction, if it is, to the second sub-performance element 24 output display instruction;

Described second sub-performance element 24, after being used for getting described idsplay order, controls display unit and show the application icon of described transparent file folder preservation。

Corresponding with said method, referring to Fig. 6, application icon disclosed in the above embodiments of the present application is hidden in system, described performance element 20, it is also possible to including:

Remove unit 25, remove instruction for what judge whether to get user, if it is, the application icon that instruction matches will be removed remove described transparent file folder with described。

Described hiding instruction includes:

It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;And/or, click the click commands needing hiding application icon X time continuously in the first preset time period。

Described triggering command is that user continuously clicks the click commands that described transparent file presss from both sides n time in the first preset time period, described n be not less than 2 positive integer。

Described remove instruction and include: in the second preset time period, click the click commands of the application icon that the needs during described transparent file presss from both sides unhide continuously for m time, described m be not less than 2 positive integer;And/or, it would be desirable to the application icon unhided hauls out the operational order of described transparent file folder。

It is appreciated of course that, disclosed herein as well is a kind of terminal applying the hiding system of above-mentioned application icon, described terminal can be mobile phone, PDA, computer or intelligent television etc., and when described terminal is mobile phone, it can be desktop starter (launcher) that described desktop controls system。

In this specification, each embodiment adopts the mode gone forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually referring to。For device disclosed in embodiment, owing to it corresponds to the method disclosed in Example, so what describe is fairly simple, relevant part illustrates referring to method part。

Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention。The multiple amendment of these embodiments be will be apparent from for those skilled in the art, and generic principles defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments。Therefore, the present invention is not intended to be limited to the embodiments shown herein, and is to fit to the widest scope consistent with principles disclosed herein and features of novelty。

Claims (16)

1. an application icon hidden method, is applied in desktop control system, it is characterised in that including:
Judge whether to get the hiding instruction for hiden application icon, if it is, be saved into by the application icon corresponding with described hiding instruction in described transparent file folder;
Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。
2. application icon hidden method according to claim 1, it is characterised in that the application icon corresponding with described hiding instruction is saved in described transparent file folder, including:
Obtain the unblock instruction of user's input;
Judge that whether described unblock instruction is identical with default unblock instruction, if it is, be saved into by the application icon corresponding with described hiding instruction in described transparent file folder。
3. application icon hidden method according to claim 1, it is characterised in that also include:
Judge whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;
Judge that whether described unblock instruction is identical with default unblock instruction, if it is, show the application icon that described transparent file folder preserves。
4. application icon hidden method according to claim 3, it is characterised in that after showing the application icon that described transparent file folder preserves, also include:
What judge whether to get user removes instruction, if it is, will remove the application icon that instruction matches remove described transparent file folder with described。
5. application icon hidden method according to claim 1, it is characterised in that described hiding instruction, including:
It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;
And/or,
In the first preset time period, continuously click the click commands needing hiding application icon X time, described X be not less than 2 positive integer。
6. application icon hidden method according to claim 3, it is characterised in that described triggering command is that user continuously clicks the click commands that described transparent file presss from both sides n time in the second preset time period, described n be not less than 2 positive integer。
7. application icon hidden method according to claim 4, it is characterised in that described in remove instruction and include:
In the 3rd preset time period, click continuously the click commands of the application icon that the needs during described transparent file presss from both sides unhide for m time, described m be not less than 2 positive integer;
And/or,
The application icon needing to unhide is hauled out the operational order of described transparent file folder。
8. application icon hides a system, is applied in desktop control system, it is characterised in that including:
Monitoring means, for judging whether to get the hiding instruction for hiden application icon, if it is, preserve instruction to performance element output;
Described performance element, for being saved into the application icon corresponding with described hiding instruction in described transparent file folder;
Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。
9. application icon according to claim 8 hides system, it is characterised in that described performance element, including:
First password matching unit, for, after getting described preservation instruction, obtaining the unblock instruction of user's input, it is judged that whether described unblock instruction is identical with default unblock instruction, if it is, export the first triggering signal to the first sub-performance element;
Described first sub-performance element, for, after getting described first starting signal, being saved into the application icon corresponding with described hiding instruction in described transparent file folder。
10. application icon according to claim 8 hides system, it is characterised in that described performance element, including:
Second password match unit, for judging whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;Judge that whether described unblock instruction is identical with default unblock instruction, if it is, to the second sub-performance element output display instruction;
Described second sub-performance element, after being used for getting described idsplay order, controls display unit and show the application icon of described transparent file folder preservation。
11. application icon according to claim 10 hides system, it is characterised in that described performance element, also include:
Remove unit, remove instruction for what judge whether to get user, if it is, the application icon that instruction matches will be removed remove described transparent file folder with described。
12. application icon according to claim 8 hides system, it is characterised in that described hiding instruction includes:
It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;
And/or,
The click commands needing hiding application icon is clicked X time continuously in the first preset time period。
13. application icon according to claim 8 hides system, it is characterised in that described triggering command is that user continuously clicks the click commands that described transparent file presss from both sides n time in the second preset time period, described n be not less than 2 positive integer。
14. application icon according to claim 8 hides system, it is characterised in that described in remove instruction and include:
In the 3rd preset time period, click continuously the click commands of the application icon that the needs during described transparent file presss from both sides unhide for m time, described m be not less than 2 positive integer;
And/or,
The application icon needing to unhide is hauled out the operational order of described transparent file folder。
15. an intelligent terminal, it is characterised in that apply application icon disclosed in requirement 8-14 any one of having the right and hide system。
16. intelligent terminal according to claim 15, it is characterised in that described intelligent terminal is mobile phone, computer, PDA or intelligent television。
CN201610023512.9A 2016-01-14 2016-01-14 Application icon hiding method and system, and intelligent terminal CN105700884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610023512.9A CN105700884A (en) 2016-01-14 2016-01-14 Application icon hiding method and system, and intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610023512.9A CN105700884A (en) 2016-01-14 2016-01-14 Application icon hiding method and system, and intelligent terminal

Publications (1)

Publication Number Publication Date
CN105700884A true CN105700884A (en) 2016-06-22

Family

ID=56227336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610023512.9A CN105700884A (en) 2016-01-14 2016-01-14 Application icon hiding method and system, and intelligent terminal

Country Status (1)

Country Link
CN (1) CN105700884A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446615A (en) * 2016-09-12 2017-02-22 Tcl集团股份有限公司 Method and device for hiding sensitive applications of intelligent terminal
CN106485113A (en) * 2016-10-18 2017-03-08 上海传英信息技术有限公司 Mobile terminal and the method for secret protection of mobile terminal
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal
CN107145797A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 Display control method, device and the terminal device of application icon
WO2018081919A1 (en) * 2016-11-01 2018-05-11 北京小米移动软件有限公司 Method and apparatus for hiding application icon
WO2019061539A1 (en) * 2017-09-30 2019-04-04 深圳传音通讯有限公司 Application icon hiding method, mobile terminal, and computer readable storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN102750101A (en) * 2012-06-26 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Method and device for triggering application starting instruction
CN102999254A (en) * 2012-11-15 2013-03-27 东莞宇龙通信科技有限公司 Display control method and device for desktop icons
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN104424444A (en) * 2013-09-06 2015-03-18 中兴通讯股份有限公司 Processing method, device and terminal for hidden folder
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN104793849A (en) * 2015-04-30 2015-07-22 努比亚技术有限公司 Application icon display method and device
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN102750101A (en) * 2012-06-26 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Method and device for triggering application starting instruction
CN102999254A (en) * 2012-11-15 2013-03-27 东莞宇龙通信科技有限公司 Display control method and device for desktop icons
CN104424444A (en) * 2013-09-06 2015-03-18 中兴通讯股份有限公司 Processing method, device and terminal for hidden folder
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN104793849A (en) * 2015-04-30 2015-07-22 努比亚技术有限公司 Application icon display method and device
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446615A (en) * 2016-09-12 2017-02-22 Tcl集团股份有限公司 Method and device for hiding sensitive applications of intelligent terminal
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal
CN106485113A (en) * 2016-10-18 2017-03-08 上海传英信息技术有限公司 Mobile terminal and the method for secret protection of mobile terminal
WO2018081919A1 (en) * 2016-11-01 2018-05-11 北京小米移动软件有限公司 Method and apparatus for hiding application icon
CN107145797A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 Display control method, device and the terminal device of application icon
WO2019061539A1 (en) * 2017-09-30 2019-04-04 深圳传音通讯有限公司 Application icon hiding method, mobile terminal, and computer readable storage medium

Similar Documents

Publication Publication Date Title
US8959445B2 (en) Focus change upon use of gesture
EP2684115B1 (en) Method and apparatus for providing quick access to media functions from a locked screen
US9728164B2 (en) Moving a tile across multiple workspaces
CN101149772B (en) Application sharing security
US20130241720A1 (en) Configurable vehicle console
US20130129162A1 (en) Method of Executing Software Functions Using Biometric Detection and Related Electronic Device
US20090289916A1 (en) Electronic device and method for switching between locked state and unlocked state
US8479117B2 (en) Intelligent window sizing for graphical user interfaces
US10078413B2 (en) Graphical association of task bar entries with corresponding desktop locations
US20150040214A1 (en) Method for Starting Application Program and Terminal Device Having Touchscreen
CN105095720B (en) Fingerprint recognition system and method, display device
US9405459B2 (en) Unified desktop laptop dock software operation
EP2620858A3 (en) Mode switching
JP2015130182A (en) Mobile device, security lock control method thereof, and program
US20140317524A1 (en) Automatic magnification and selection confirmation
US20130117840A1 (en) User-driven access control
CN105160228A (en) Mobile terminal unlocking method and mobile terminal
US20130104062A1 (en) Unified desktop input segregation in an application manager
US8990712B2 (en) Unified desktop triad control user interface for file manager
CN101778165A (en) Unlocking method and system of screen and mobile terminal
CN103177206A (en) Information privacy method and electronic terminal
CN103543936B (en) A kind of touch screen terminal quick release enters the method and touch screen terminal of application
US8266637B2 (en) Privacy modes in a remote desktop environment
CN105144036B (en) Method and its electronic installation for display
EP2765494A1 (en) Icon management method for user interface and touch control device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination