CN105700884A - Application icon hiding method and system, and intelligent terminal - Google Patents

Application icon hiding method and system, and intelligent terminal Download PDF

Info

Publication number
CN105700884A
CN105700884A CN201610023512.9A CN201610023512A CN105700884A CN 105700884 A CN105700884 A CN 105700884A CN 201610023512 A CN201610023512 A CN 201610023512A CN 105700884 A CN105700884 A CN 105700884A
Authority
CN
China
Prior art keywords
application icon
instruction
transparent file
file folder
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610023512.9A
Other languages
Chinese (zh)
Inventor
叶川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU THUNDERSOFT SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
CHENGDU THUNDERSOFT SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU THUNDERSOFT SOFTWARE TECHNOLOGY Co Ltd filed Critical CHENGDU THUNDERSOFT SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201610023512.9A priority Critical patent/CN105700884A/en
Publication of CN105700884A publication Critical patent/CN105700884A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides an application icon hiding method and system, and an intelligent terminal. The application icon hiding method comprises the steps of when a hiding instruction from a user is detected, judging that that user needs to hide the application icon, and determining the application icon corresponding to the hiding instruction; and dragging the application icon corresponding to the hiding instruction to a transparent folder to finish the hiding of the application. Therefore, compared with the application hiding way in the prior art, the hiding method provided by the invention is convenient and rapid.

Description

A kind of application icon hidden method, system and intelligent terminal
Technical field
The present invention relates to field of information security technology, is specifically related to a kind of application icon hidden method, system and intelligent terminal。
Background technology
The equipment such as mobile phone, computer, PDA generally all start this program by application icon, if some is applied the private data of the user related to and does not want that allowing other staff know is mounted with when these are applied in person, it is necessary to be hidden by the application icon of these application。
The certain methods of hiden application icon is in the market: arrange hiden application icon by other application (such as settings etc.), the application hidden will be needed to be deposited in these application, the application icon hidden is needed to be placed on the hiding page these, conducted interviews by certain gestures or password when needs access these application, but make in this way hiden application icon time, user has to be introduced into an application, at this, application the inside selects and arranges the application icon to hide, operates all complex。
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of application icon hidden method, system and terminal, the problem that during to solve hiden application icon in prior art, process is loaded down with trivial details。
For achieving the above object, the embodiment of the present invention provides following technical scheme:
A kind of application icon hidden method, is applied in desktop control system, including:
Judge whether to get the hiding instruction for hiden application icon, if it is, be saved into by the application icon corresponding with described hiding instruction in described transparent file folder;
Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。
Preferably, in above-mentioned application icon hidden method, the application icon corresponding with described hiding instruction is saved in described transparent file folder, including:
Obtain the unblock instruction of user's input;
Judge that whether described unblock instruction is identical with default unblock instruction, if it is, be saved into by the application icon corresponding with described hiding instruction in described transparent file folder。
Preferably, in above-mentioned application icon hidden method, also include:
Judge whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;
Judge that whether described unblock instruction is identical with default unblock instruction, if it is, show the application icon that described transparent file folder preserves。
Preferably, in above-mentioned application icon hidden method, after showing the application icon that described transparent file folder preserves, also include:
What judge whether to get user removes instruction, if it is, will remove the application icon that instruction matches remove described transparent file folder with described。
Preferably, in above-mentioned application icon hidden method, described hiding instruction, including:
It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;
And/or,
In the first preset time period, continuously click the click commands needing hiding application icon X time, described X be not less than 2 positive integer。
Preferably, in above-mentioned application icon hidden method, described triggering command is that user continuously clicks the click commands that described transparent file presss from both sides n time in the second preset time period, described n be not less than 2 positive integer。
Preferably, in above-mentioned application icon hidden method, described in remove instruction and include:
In the 3rd preset time period, click continuously the click commands of the application icon that the needs during described transparent file presss from both sides unhide for m time, described m be not less than 2 positive integer;
And/or,
The application icon needing to unhide is hauled out the operational order of described transparent file folder。
A kind of application icon hides system, is applied in desktop control system, including:
Monitoring means, for judging whether to get the hiding instruction for hiden application icon, if it is, preserve instruction to performance element output;
Described performance element, for being saved into the application icon corresponding with described hiding instruction in described transparent file folder;
Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。
Preferably, above-mentioned application icon is hidden in system, described performance element, including:
First password matching unit, for, after getting described preservation instruction, obtaining the unblock instruction of user's input, it is judged that whether described unblock instruction is identical with default unblock instruction, if it is, export the first triggering signal to the first sub-performance element;
Described first sub-performance element, for, after getting described first starting signal, being saved into the application icon corresponding with described hiding instruction in described transparent file folder。
Preferably, above-mentioned application icon is hidden in system, described performance element, including:
Second password match unit, for judging whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;Judge that whether described unblock instruction is identical with default unblock instruction, if it is, to the second sub-performance element output display instruction;
Described second sub-performance element, after being used for getting described idsplay order, controls display unit and show the application icon of described transparent file folder preservation。
Preferably, above-mentioned application icon is hidden in system, and described performance element also includes:
Remove unit, remove instruction for what judge whether to get user, if it is, the application icon that instruction matches will be removed remove described transparent file folder with described。
Preferably, above-mentioned application icon is hidden in system, and described hiding instruction includes:
It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;
And/or,
The click commands needing hiding application icon is clicked X time continuously in the first preset time period。
Preferably, above-mentioned application icon is hidden in system, and described triggering command is that user clicks the click commands that described transparent file presss from both sides n time continuously in the second preset time period, described n be not less than 2 positive integer。
Preferably, above-mentioned application icon is hidden in system, described in remove instruction and include:
In the 3rd preset time period, click continuously the click commands of the application icon that the needs during described transparent file presss from both sides unhide for m time, described m be not less than 2 positive integer;
And/or,
The application icon needing to unhide is hauled out the operational order of described transparent file folder。
A kind of intelligent terminal, application has application icon disclosed in above-mentioned any one to hide system。
Preferably, above-mentioned intelligent terminal is mobile phone, computer, PDA or intelligent television。
Based on technique scheme, the such scheme that the embodiment of the present invention provides, when the hiding instruction that user inputs being detected, judge that now user needs application icon is hidden, it is determined that the application icon that described hiding instruction is corresponding, the application icon corresponding with described hiding instruction is dragged in described transparent file folder, hiding this application can be realized, visible, for the Stealth Modus of application of the prior art, convenient and swift。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to the accompanying drawing provided。
Fig. 1 is the schematic flow sheet of application icon hidden method disclosed in the embodiment of the present application;
Fig. 2 is the schematic flow sheet of application icon hidden method disclosed in another embodiment of the application;
Fig. 3 is a kind of schematic flow sheet opening transparent file folder disclosed in the embodiment of the present application;
Fig. 4 is the schematic flow sheet of a kind of application icon that unhides disclosed in the embodiment of the present application;
Fig. 5 is the structural representation that a kind of application icon disclosed in the embodiment of the present application hides system;
Fig. 6 is the structural representation that a kind of application icon disclosed in another embodiment of the application hides system。
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
It is directed in prior art in the loaded down with trivial details problem of process application icon being hidden and use, this application discloses a kind of application icon hidden method, the method is applied in desktop control system, wherein, described desktop controls the control system that application icon is managed by the desktop control system etc. of the desktop that system can be cell phone apparatus controls system, the desktop of PDA device controls system intelligent television desktop control system or computer, and the method includes:
Step S101: judge whether to get the hiding instruction for hiden application icon, if it is, perform step S102;
Wherein, the instruction type of described hiding instruction can according to user's request sets itself, such as it can be the application icon being hidden will be needed to be dragged into the operational order that transparent file presss from both sides the position at place, when described hiding instruction is aforesaid operations instruction, when user needs to hide an application icon, only need to will drag to the position at described transparent file folder place, then discharge again, certainly this hiding instruction can also be click the click commands needing hiding application icon X time continuously in the first preset time period, described X be not less than 2 positive integer。Such as, when user needs to be hidden by this application icon to described transparent file folder, only in the first Preset Time, this application icon need to be quickly clicked for X time continuously, after quickly clicking this icon for X time continuously in user's the first Preset Time, this application icon is preserved to described transparent file folder by system automatically;Certainly this hiding instruction can also be the gesture instruction for presetting, after detecting that this gesture performs, application icon on desktop is set to alternative mode, and then user selects the required application icon hidden, and is selected the application icon of state to preserve to described transparent file folder by state。
Step S102: the application icon corresponding with described hiding instruction is saved in described transparent file folder;
Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。
In technical scheme disclosed in the above embodiments of the present application, desktop controls to be provided with a sightless transparent file folder of user on the desktop (this desktop refers to the interface for placing application icon in existing various electronic equipment) of system, the position of this transparent file folder can according to user's request from Row sum-equal matrix, this transparent file folder is for storing the application icon that user needs to hide, after this application icon is saved to described transparent file folder, also can become invisible, thus realizing hiding application icon。
When adopting application icon hidden method disclosed in the above embodiments of the present application that application icon is hidden, user can input default hiding instruction, when system detects the hiding instruction that user inputs, judge that now user needs application icon is hidden, determine the application icon that described hiding instruction is corresponding, the application icon corresponding with described hiding instruction is dragged in described transparent file folder, hiding this application can be realized, visible, for the Stealth Modus of application of the prior art, convenient and swift。
It is understandable that, when should equipment in aforementioned manners lend time, in order to prevent other users malice by when hiding to described transparent file folder without hiding application icon, in method disclosed in the above embodiments of the present application, referring to Fig. 2, step S102 specifically may include that
Step S1021: obtain the unblock instruction of user's input, wherein, described unblock instruction can be that to unlock gesture can also be digital or alphabetical password etc. for type;
Step S1022: judge that whether described unblock instruction is identical with default unblock instruction, if it is, perform step S1023:
Step S1023: the application icon corresponding with described hiding instruction is saved in described transparent file folder。
In the method, when user needs to hide required hiding application icon and presss from both sides to described transparent file, first input is needed to hide instruction, after instruction is hidden in input, system prompts user input unlocks instruction, when the unblock instructions match detecting that user inputs is correct, just the application icon matched in described hiding instruction is preserved to described transparent file folder。
When user needs to access the application icon hidden in described transparent file folder, described transparent file folder can be opened by conventional triggering mode, such as, described transparent file folder is opened by the mode clicked, after described transparent file double-layered quilt is opened, can show, to user, all of application icon preserved in described transparent file folder。Open it of course for preventing other users from touching described transparent file folder by mistake, described transparent file folder is also separately provided one for opening the triggering command of described transparent file folder by the application, this instruction be different from routine click the mode opening application, with reduce other users open described transparent file folder probability。Certainly, in order to further enhance the safety of described transparent file folder, when get user's input for after opening the triggering command of described transparent file folder, it is still necessary to be unlocked after instruction examines, just can display to the user that the application icon that described transparent file folder preserves。Namely said method disclosed in the above embodiments of the present application can also include:
Step S301: judge whether to get the triggering command for opening described transparent file folder of user's input, if it is, perform step S302:
Wherein, in the method, described triggering command can be that user continuously clicks the click commands that described transparent file presss from both sides n time in the second preset time period, described n be not less than 2 positive integer。Such as, described first Preset Time can be 0.3 second, and described n can be 2, i.e. user's described transparent file of double click in 0.3 second just can open this document。
Step S302: obtain the unblock instruction of user's input;
Step S303: judge that whether described unblock instruction is identical with default unblock instruction, if it is, perform step S304;
Step S304: show the application icon that described transparent file folder preserves。
It is understood that some application icon in described transparent file presss from both sides is without time hiding, these icons can be derived described transparent file folder by user, now, referring to Fig. 4, method disclosed in the above embodiments of the present application, after step S304, it is also possible to including:
Step S305: what judge whether to get user removes instruction, if it is, perform step S306;
Wherein, the described click commands removing the application icon that instruction can unhide for the needs that user clicks for m time continuously during described transparent file presss from both sides in the 3rd preset time period, described m be not less than 2 positive integer, wherein, described second Preset Time and described 3rd time can be identical, described m and X can be identical, namely removing instruction described in can be: the click commands that X time is clicked the application icon that needs remove continuously in the first preset time period, described X be not less than 2 positive integer, now, owing to described application icon has been stored in described transparent file folder, it can thus be assumed that this instruction is not for hiding instruction, it should be and removes instruction;Certainly removing instruction described in can also be the operational order that the application icon unhided will be needed to haul out described transparent file folder, now, user only described transparent file need to be pressed from both sides in haul out described transparent file folder without hiding application icon after discharge。
Step S306: the application icon that instruction matches will be removed remove described transparent file folder with described。
It is understood that corresponding with said method, disclosed herein as well is and a kind of should hide system by application icon in aforementioned manners, this system is applied in desktop control system, referring to Fig. 5, it is possible to including:
Monitoring means 10, for judging whether to get the hiding instruction for hiden application icon, if it is, preserve instruction to performance element output;
Described performance element 20, for being saved into the application icon corresponding with described hiding instruction in described transparent file folder;
Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。
When adopting said system that application icon is hidden, user can input default hiding instruction, when monitoring means 10 monitors the hiding instruction of user's input, judge that now user needs application icon is hidden, described performance element 20 determines the application icon that described hiding instruction is corresponding, the application icon corresponding with described hiding instruction is dragged in described transparent file folder, hiding this application can be realized, visible, for the Stealth Modus of application of the prior art, convenient and swift。
It is understood that corresponding with said method, referring to Fig. 6, application icon disclosed in the above embodiments of the present application is hidden in system, and described performance element 20 may include that
First password matching unit 21, for, after getting described preservation instruction, obtaining the unblock instruction of user's input, it is judged that whether described unblock instruction is identical with default unblock instruction, if it is, export the first triggering signal to the first sub-performance element;
Described first sub-performance element 22, for, after getting described first starting signal, being saved into the application icon corresponding with described hiding instruction in described transparent file folder。
Corresponding with said method, referring to Fig. 6, application icon disclosed in the above embodiments of the present application is hidden in system, described performance element 20, it is also possible to including:
Second password match unit 23, for judging whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;Judge that whether described unblock instruction is identical with default unblock instruction, if it is, to the second sub-performance element 24 output display instruction;
Described second sub-performance element 24, after being used for getting described idsplay order, controls display unit and show the application icon of described transparent file folder preservation。
Corresponding with said method, referring to Fig. 6, application icon disclosed in the above embodiments of the present application is hidden in system, described performance element 20, it is also possible to including:
Remove unit 25, remove instruction for what judge whether to get user, if it is, the application icon that instruction matches will be removed remove described transparent file folder with described。
Described hiding instruction includes:
It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;And/or, click the click commands needing hiding application icon X time continuously in the first preset time period。
Described triggering command is that user continuously clicks the click commands that described transparent file presss from both sides n time in the first preset time period, described n be not less than 2 positive integer。
Described remove instruction and include: in the second preset time period, click the click commands of the application icon that the needs during described transparent file presss from both sides unhide continuously for m time, described m be not less than 2 positive integer;And/or, it would be desirable to the application icon unhided hauls out the operational order of described transparent file folder。
It is appreciated of course that, disclosed herein as well is a kind of terminal applying the hiding system of above-mentioned application icon, described terminal can be mobile phone, PDA, computer or intelligent television etc., and when described terminal is mobile phone, it can be desktop starter (launcher) that described desktop controls system。
In this specification, each embodiment adopts the mode gone forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually referring to。For device disclosed in embodiment, owing to it corresponds to the method disclosed in Example, so what describe is fairly simple, relevant part illustrates referring to method part。
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention。The multiple amendment of these embodiments be will be apparent from for those skilled in the art, and generic principles defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments。Therefore, the present invention is not intended to be limited to the embodiments shown herein, and is to fit to the widest scope consistent with principles disclosed herein and features of novelty。

Claims (16)

1. an application icon hidden method, is applied in desktop control system, it is characterised in that including:
Judge whether to get the hiding instruction for hiden application icon, if it is, be saved into by the application icon corresponding with described hiding instruction in described transparent file folder;
Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。
2. application icon hidden method according to claim 1, it is characterised in that the application icon corresponding with described hiding instruction is saved in described transparent file folder, including:
Obtain the unblock instruction of user's input;
Judge that whether described unblock instruction is identical with default unblock instruction, if it is, be saved into by the application icon corresponding with described hiding instruction in described transparent file folder。
3. application icon hidden method according to claim 1, it is characterised in that also include:
Judge whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;
Judge that whether described unblock instruction is identical with default unblock instruction, if it is, show the application icon that described transparent file folder preserves。
4. application icon hidden method according to claim 3, it is characterised in that after showing the application icon that described transparent file folder preserves, also include:
What judge whether to get user removes instruction, if it is, will remove the application icon that instruction matches remove described transparent file folder with described。
5. application icon hidden method according to claim 1, it is characterised in that described hiding instruction, including:
It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;
And/or,
In the first preset time period, continuously click the click commands needing hiding application icon X time, described X be not less than 2 positive integer。
6. application icon hidden method according to claim 3, it is characterised in that described triggering command is that user continuously clicks the click commands that described transparent file presss from both sides n time in the second preset time period, described n be not less than 2 positive integer。
7. application icon hidden method according to claim 4, it is characterised in that described in remove instruction and include:
In the 3rd preset time period, click continuously the click commands of the application icon that the needs during described transparent file presss from both sides unhide for m time, described m be not less than 2 positive integer;
And/or,
The application icon needing to unhide is hauled out the operational order of described transparent file folder。
8. application icon hides a system, is applied in desktop control system, it is characterised in that including:
Monitoring means, for judging whether to get the hiding instruction for hiden application icon, if it is, preserve instruction to performance element output;
Described performance element, for being saved into the application icon corresponding with described hiding instruction in described transparent file folder;
Described transparent file folder is be arranged on desktop to control the sightless transparent file folder of the user on the desktop of system。
9. application icon according to claim 8 hides system, it is characterised in that described performance element, including:
First password matching unit, for, after getting described preservation instruction, obtaining the unblock instruction of user's input, it is judged that whether described unblock instruction is identical with default unblock instruction, if it is, export the first triggering signal to the first sub-performance element;
Described first sub-performance element, for, after getting described first starting signal, being saved into the application icon corresponding with described hiding instruction in described transparent file folder。
10. application icon according to claim 8 hides system, it is characterised in that described performance element, including:
Second password match unit, for judging whether to get the triggering command for opening described transparent file folder of user's input, if it is, obtain the unblock instruction of user's input;Judge that whether described unblock instruction is identical with default unblock instruction, if it is, to the second sub-performance element output display instruction;
Described second sub-performance element, after being used for getting described idsplay order, controls display unit and show the application icon of described transparent file folder preservation。
11. application icon according to claim 10 hides system, it is characterised in that described performance element, also include:
Remove unit, remove instruction for what judge whether to get user, if it is, the application icon that instruction matches will be removed remove described transparent file folder with described。
12. application icon according to claim 8 hides system, it is characterised in that described hiding instruction includes:
It is dragged into the operational order that transparent file presss from both sides the position at place by needing the application icon being hidden;
And/or,
The click commands needing hiding application icon is clicked X time continuously in the first preset time period。
13. application icon according to claim 8 hides system, it is characterised in that described triggering command is that user continuously clicks the click commands that described transparent file presss from both sides n time in the second preset time period, described n be not less than 2 positive integer。
14. application icon according to claim 8 hides system, it is characterised in that described in remove instruction and include:
In the 3rd preset time period, click continuously the click commands of the application icon that the needs during described transparent file presss from both sides unhide for m time, described m be not less than 2 positive integer;
And/or,
The application icon needing to unhide is hauled out the operational order of described transparent file folder。
15. an intelligent terminal, it is characterised in that apply application icon disclosed in requirement 8-14 any one of having the right and hide system。
16. intelligent terminal according to claim 15, it is characterised in that described intelligent terminal is mobile phone, computer, PDA or intelligent television。
CN201610023512.9A 2016-01-14 2016-01-14 Application icon hiding method and system, and intelligent terminal Pending CN105700884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610023512.9A CN105700884A (en) 2016-01-14 2016-01-14 Application icon hiding method and system, and intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610023512.9A CN105700884A (en) 2016-01-14 2016-01-14 Application icon hiding method and system, and intelligent terminal

Publications (1)

Publication Number Publication Date
CN105700884A true CN105700884A (en) 2016-06-22

Family

ID=56227336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610023512.9A Pending CN105700884A (en) 2016-01-14 2016-01-14 Application icon hiding method and system, and intelligent terminal

Country Status (1)

Country Link
CN (1) CN105700884A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446615A (en) * 2016-09-12 2017-02-22 Tcl集团股份有限公司 Method and device for hiding sensitive applications of intelligent terminal
CN106485113A (en) * 2016-10-18 2017-03-08 上海传英信息技术有限公司 Mobile terminal and the method for secret protection of mobile terminal
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal
CN107122677A (en) * 2017-04-27 2017-09-01 广东小天才科技有限公司 Application program management method and device and mobile terminal
CN107145797A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 Display control method, device and the terminal device of application icon
CN107402763A (en) * 2017-07-27 2017-11-28 深圳市泰衡诺科技有限公司 A kind of icon control method and control system based on intelligent terminal
WO2018081919A1 (en) * 2016-11-01 2018-05-11 北京小米移动软件有限公司 Method and apparatus for hiding application icon
CN108803959A (en) * 2018-04-28 2018-11-13 上海爱优威软件开发有限公司 A kind of quickly management application drawing calibration method and terminal
WO2019061539A1 (en) * 2017-09-30 2019-04-04 深圳传音通讯有限公司 Application icon hiding method, mobile terminal, and computer readable storage medium
CN109711195A (en) * 2018-12-25 2019-05-03 努比亚技术有限公司 Control method, device, mobile terminal and the storage medium that 3D icon is shown
CN110503912A (en) * 2019-08-23 2019-11-26 Oppo(重庆)智能科技有限公司 A kind of display control method of transparent display screen, device and terminal device
CN111562961A (en) * 2020-04-29 2020-08-21 维沃移动通信有限公司 Icon management method and device and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN102750101A (en) * 2012-06-26 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Method and device for triggering application starting instruction
CN102999254A (en) * 2012-11-15 2013-03-27 东莞宇龙通信科技有限公司 Display control method and device for desktop icons
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN104424444A (en) * 2013-09-06 2015-03-18 中兴通讯股份有限公司 Processing method, device and terminal for hidden folder
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN104793849A (en) * 2015-04-30 2015-07-22 努比亚技术有限公司 Application icon display method and device
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN102750101A (en) * 2012-06-26 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Method and device for triggering application starting instruction
CN102999254A (en) * 2012-11-15 2013-03-27 东莞宇龙通信科技有限公司 Display control method and device for desktop icons
CN104424444A (en) * 2013-09-06 2015-03-18 中兴通讯股份有限公司 Processing method, device and terminal for hidden folder
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN104793849A (en) * 2015-04-30 2015-07-22 努比亚技术有限公司 Application icon display method and device
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446615A (en) * 2016-09-12 2017-02-22 Tcl集团股份有限公司 Method and device for hiding sensitive applications of intelligent terminal
CN106658489B (en) * 2016-09-30 2020-05-05 Oppo广东移动通信有限公司 Terminal application processing method and device and mobile terminal
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal
CN106485113A (en) * 2016-10-18 2017-03-08 上海传英信息技术有限公司 Mobile terminal and the method for secret protection of mobile terminal
WO2018081919A1 (en) * 2016-11-01 2018-05-11 北京小米移动软件有限公司 Method and apparatus for hiding application icon
CN107122677A (en) * 2017-04-27 2017-09-01 广东小天才科技有限公司 Application program management method and device and mobile terminal
CN107145797A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 Display control method, device and the terminal device of application icon
CN107402763B (en) * 2017-07-27 2020-07-03 深圳市泰衡诺科技有限公司 Icon control method and control system based on intelligent terminal
CN107402763A (en) * 2017-07-27 2017-11-28 深圳市泰衡诺科技有限公司 A kind of icon control method and control system based on intelligent terminal
WO2019061539A1 (en) * 2017-09-30 2019-04-04 深圳传音通讯有限公司 Application icon hiding method, mobile terminal, and computer readable storage medium
CN108803959A (en) * 2018-04-28 2018-11-13 上海爱优威软件开发有限公司 A kind of quickly management application drawing calibration method and terminal
CN109711195A (en) * 2018-12-25 2019-05-03 努比亚技术有限公司 Control method, device, mobile terminal and the storage medium that 3D icon is shown
CN109711195B (en) * 2018-12-25 2023-11-14 努比亚技术有限公司 Control method and device for 3D icon display, mobile terminal and storage medium
CN110503912A (en) * 2019-08-23 2019-11-26 Oppo(重庆)智能科技有限公司 A kind of display control method of transparent display screen, device and terminal device
CN110503912B (en) * 2019-08-23 2022-11-04 Oppo(重庆)智能科技有限公司 Display control method and device of transparent display screen and terminal equipment
CN111562961A (en) * 2020-04-29 2020-08-21 维沃移动通信有限公司 Icon management method and device and electronic equipment
CN111562961B (en) * 2020-04-29 2024-01-23 维沃移动通信有限公司 Icon management method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN105700884A (en) Application icon hiding method and system, and intelligent terminal
CN103984885B (en) Application program hiding method applied to touch screen terminal and touch screen terminal
CN103543936B (en) A kind of touch screen terminal quick release enters the method and touch screen terminal of application
CN105335048B (en) Electronic equipment with hidden application icon and method for hiding application icon
CN107636595B (en) Method for starting second application by using first application icon in electronic equipment
CN104679387B (en) A kind of method for protecting privacy and terminal
US20140267120A1 (en) Touch control terminal and method and device for unlocking touch control
CN104049806A (en) Touch terminal and control method and system of touch terminal
CN107102891B (en) Application management method based on dual systems and mobile terminal
CN103605459A (en) Fast application launching method and fast application launching terminal
CN104866752B (en) A kind of application guard method and user terminal
CN105205374A (en) Application program encrypting method and user terminal
WO2016155072A1 (en) Method and apparatus for hiding and opening applications
WO2022012614A1 (en) Data processing method and apparatus, and electronic device
CN106502544A (en) A kind of application program launching method and device
CN105701381A (en) Method and device for starting application and electronic equipment
CN106919328A (en) Start method, device and the electronic equipment of application program
CN103309615A (en) Terminal equipment and control method thereof
CN105511723A (en) Icon moving method and mobile terminal
CN106354396A (en) Interface adjustment method and device
CN105005436A (en) Program processing method and mobile terminal
CN106096385A (en) A kind of unlocking processing method based on mobile terminal and system
CN103870120A (en) Information processing method and electronic equipment
CN105487807A (en) Theme replacing method and system
CN106529264A (en) Application locking and unlocking method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160622