CN106126077B - Display control method of application program icons and mobile terminal - Google Patents

Display control method of application program icons and mobile terminal Download PDF

Info

Publication number
CN106126077B
CN106126077B CN201610431331.XA CN201610431331A CN106126077B CN 106126077 B CN106126077 B CN 106126077B CN 201610431331 A CN201610431331 A CN 201610431331A CN 106126077 B CN106126077 B CN 106126077B
Authority
CN
China
Prior art keywords
icon
application
target
mobile terminal
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610431331.XA
Other languages
Chinese (zh)
Other versions
CN106126077A (en
Inventor
江苏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610431331.XA priority Critical patent/CN106126077B/en
Publication of CN106126077A publication Critical patent/CN106126077A/en
Application granted granted Critical
Publication of CN106126077B publication Critical patent/CN106126077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop

Abstract

The embodiment of the invention provides a display control method of an application icon and a mobile terminal, wherein the method comprises the following steps: detecting the dragging operation of a mobile terminal user on the first application program icon when a standby desktop of the mobile terminal is in an editing state; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon. The display control method of the application icon and the mobile terminal provided by the embodiment of the invention can effectively simplify the operation of hiding the application, thereby improving the operation efficiency.

Description

Display control method of application program icons and mobile terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a display control method for an application icon and a mobile terminal.
Background
At present, Applications (APP) are various, more and more applications include more privacy, and a user needs to hide an Application icon more and more. At present, the icon can be hidden through security software, a control is arranged in the security software interface through entering the security software interface, and an application on a desktop can be selected by clicking to hide the icon. An application entrance is arranged in the security software, and the application entrance entering the security software interface can be opened when the hidden application needs to be started.
Therefore, in the prior art, the application program is hidden and started through the security software, the security software needs to be opened for hiding and starting, the operation is performed in a security software interface, and the operation is complicated.
Disclosure of Invention
The embodiment of the invention provides a display control method of an application icon and a mobile terminal, and aims to solve the problems of complicated operation and long time consumption of hiding and displaying of an application.
In a first aspect, an embodiment of the present invention provides a method for controlling display of an application icon, where the method is applied to a mobile terminal, and the method includes: when a standby desktop of a mobile terminal is in an editing state, detecting the dragging operation of a mobile terminal user on the first application program icon; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon.
On the other hand, an embodiment of the present invention further provides a mobile terminal, where the mobile terminal includes:
the operation detection module is used for detecting the dragging operation of the mobile terminal user on the first application program icon when the standby desktop of the mobile terminal is in an editing state; the relation determining module is used for determining the first application icon as a target icon and determining the second application icon as a host icon if the overlapping area of the first application icon and the second application icon exceeds a preset threshold; the relationship establishing module is used for establishing a first incidence relationship between the target icon and the host icon; and the application hiding module is used for hiding the first application program icon.
In this way, in the embodiment of the present invention, when the standby desktop of the mobile terminal is in an editing state, the dragging operation of the mobile terminal user on the first application icon is detected; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon. Therefore, the embodiment of the invention can effectively simplify the operation of the hidden application, thereby improving the operation efficiency.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a flowchart of a method for controlling display of an application icon according to a first embodiment of the present invention;
fig. 2a is a flowchart of a method for controlling display of application icons according to a second embodiment of the present invention;
fig. 2b is a flowchart of an application program corresponding to a target icon according to a second embodiment of the present invention;
FIG. 2c is a flowchart illustrating replacement of a host icon and a target icon according to a second embodiment of the present invention;
FIG. 3 is a diagram illustrating the movement of applications in the desktop according to a second embodiment of the present invention;
FIG. 4 is a mobile diagram of a host application according to the second embodiment of the present invention;
FIG. 5 is a hidden list diagram of the host application according to the second embodiment of the present invention;
fig. 6 is a block diagram of a mobile terminal according to a third embodiment of the present invention;
fig. 7 is a second block diagram of the mobile terminal according to the third embodiment of the present invention;
fig. 8 is a block diagram of a mobile terminal according to a fourth embodiment of the present invention;
fig. 9 is a block diagram of a mobile terminal according to a fifth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, a flowchart of an embodiment of a method for controlling display of an application icon according to the present invention is shown, which may specifically include the following steps:
step 101, when a standby desktop of a mobile terminal is in an editing state, detecting a dragging operation of a mobile terminal user on a first application program icon.
The applications in the terminal are of a wide variety, and some applications, for example, contain more user privacy, such as WeChat, and need to be kept secret for special reasons. According to the embodiment of the invention, the application needing to be hidden, such as the first application icon, is selected, another application icon, such as the second application icon, is selected in the desktop to serve as the hosted application of the first application icon, and the first application icon is hidden by dragging the first application icon to the position of the second application icon. And when the desktop of the mobile terminal is pressed, entering an editing state. And adding a monitoring process in the terminal, and monitoring and controlling a plurality of application icons in the desktop in an editing state through the monitoring process. In the embodiment of the invention, the application icon can be triggered to be selected by pressing for a long time, wherein the long pressing refers to that the pressing time of the application exceeds a certain threshold value, such as 2 s. And when the monitoring process detects that the first application icon and the second application icon in the terminal are triggered, monitoring the positions of the triggered first application icon and the triggered second application icon to detect whether a mobile terminal user drags the first application icon.
And 102, if the area of the overlapping area of the first application icon and the second application icon exceeds a preset threshold value, determining the first application icon as a target icon and determining the second application icon as a host icon.
When the user drags the first application icon, the monitoring process can calculate the area of the overlapping area of the first application icon and the second application icon by acquiring the position information of the first application icon and the second application icon, and judge whether the area of the overlapping area of the first application icon and the second application icon exceeds a preset threshold value. When the preset threshold value is exceeded, the first application icon is determined as a target application icon, namely, an application icon needing to be hidden, the second application icon is determined as a host application icon, namely, the first application icon is hosted in the second application icon, and a search path is provided for the first application icon through the second application icon.
And 103, establishing a first association relation between the target icon and the host icon.
In order to facilitate finding the target application icon through the host application icon, a first association relationship between the target application icon and the host application icon may be established, that is, the target application icon and the host application icon are bound to achieve finding the target application icon through the host application icon.
And step 104, hiding the first application program icon.
After the target application icon and the host application icon establish an association relationship, the monitoring process hides the target application icon in the display interface, for example, hides an icon identifier of the target application icon, namely, a first application icon program icon, so as to realize the confidentiality of the target application icon. When a user needs to search for a hidden target application icon, the target application icon can be displayed through the host application icon which is associated with the target application icon. In order not to affect the normal start of the host application icon, when the user searches the target application icon, the host application icon may be triggered by a target gesture, i.e., a different manner from the normal start gesture of the host application icon, such as a long press or double click, to display the hidden target application icon.
In summary, in the display control method for the application icon according to the embodiment of the present invention, when the standby desktop of the mobile terminal is in the editing state, the dragging operation of the mobile terminal user on the first application icon is detected; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon. Therefore, the embodiment of the invention can effectively simplify the operation of hiding the application program icon, thereby improving the operation efficiency.
Example two
Referring to fig. 2a, a flowchart of another embodiment of a method for controlling display of an application icon according to the present invention is shown, which may specifically include the following steps:
step 201, when a standby desktop of a mobile terminal is in an editing state, detecting a dragging operation of a mobile terminal user on the first application program icon.
According to the embodiment of the invention, the application icon needing to be hidden, such as the first application icon, is selected, another application icon, such as the second application icon, is selected in the desktop to serve as the hosted application icon of the first application icon, and the first application icon is hidden by dragging the first application icon to the position of the second application icon. And when the desktop of the mobile terminal is pressed, entering an editing state. And adding a monitoring process in the terminal, and monitoring and controlling a plurality of application icons in the desktop in an editing state through the monitoring process. When the monitoring process detects that the first application icon and the second application icon in the terminal are triggered, for example, by long-press, the monitoring process starts to monitor the positions of the triggered first application icon and the triggered second application icon. To detect whether the mobile terminal user performs a drag operation on the first application icon.
As shown in fig. 3, there are three application icons A, B, C in the desktop, and the user selects application icon a and application icon B, drags application icon a to the application icon B and overlaps application icon B, so that application icon a can be hidden. The monitoring process determines the position changes, i.e. the movement tracks, of the first application icon, such as the first coordinate information of the application icon a in fig. 3, and the second coordinate information of the second application icon, such as the second coordinate information of the application icon B in fig. 3, by acquiring the first coordinate information of the first application icon and the second coordinate information of the second application icon, so that whether the mobile terminal user performs the dragging operation on the first application icon can be determined.
Step 202, if the area of the overlapping area of the first application icon and the second application icon exceeds a preset threshold, determining the first application icon as a target icon and determining the second application icon as a host icon.
The application icon occupies an area in the interface, that is, the first coordinate information and the second coordinate information both represent coordinate information of an area, and it can be determined that the first application icon covers the second application icon according to the first coordinate information and the second coordinate information, for example, the application icon a covers the application icon B in fig. 3. When the first application icon is dragged to the position of the second application icon and covers the second application icon, area information, e.g., area, of an overlapping area, e.g., overlapping area d in fig. 3, of the overlapping area, i.e., the area of the overlapping area where the first application icon covers the second application icon, is calculated. And presetting an overlapping threshold, such as 10% of the icon area, and judging whether the overlapping area of the first application icon and the second application icon exceeds the preset threshold. When the area of the overlapping area exceeds a preset threshold, the first application icon may be determined as a target icon, that is, an application icon that needs to be hidden, and the second application icon may be determined as a host icon, that is, an application icon that provides a search path for the hidden application icon.
Step 203, establishing a first association relationship between the target icon and the host icon.
In order to facilitate finding the target application icon through the host application icon, a first association relationship between the target application icon and the host application icon may be established, that is, the target application icon and the host application icon are bound to achieve finding the target application icon through the host application icon.
And step 204, acquiring a target password set by the mobile terminal user.
The embodiment of the invention can set an associated password aiming at each host application program icon so as to keep the hidden target icon secret. Generally, before the host application icon and the target application icon establish the association relationship for the first time, the user may be prompted to set an association password. If the associated password is not successfully set, the user can be continuously prompted to set the associated password when the host application program icon is associated with other target application program icons. In the embodiment of the invention, the screen locking password or the fingerprint password of the user can be selected as the associated password, and a new password can be input as the target password. And acquiring a target password set by a mobile terminal user.
The method for judging whether the host application icon is associated with the application icon for the first time can be as follows: when the first association relation between the host application program icon and the target application program icon is established for the first time, the identification position of the host application program icon is modified to identify that the target application program icon is hidden in the host application program icon. For example, the initial value of the identification bit of the host application icon is 0, that is, the host application icon does not have an association relationship with the target application icon, and the identification bit of the host application icon is 0; when the incidence relation between the host application program icon and the target application program icon is established for the first time, the identification bit of the host application program icon is changed into 1, and the target application program icon is hidden in the host application program icon. And acquiring the identification bit of the host application program icon, and judging whether the host application program icon is associated with the application program icon or not, namely whether the host application program icon is associated with the application program icon for the first time or not.
Step 205, encrypting the first application icon based on the target password.
And encrypting the first application program icon based on the target password set by the mobile terminal user. After a mobile terminal user sets a target password, when a first application program icon needs to be displayed, the target password needs to be input, and the target icon hidden by the host icon is displayed only after the monitoring software detects that the user inputs the target password.
Step 206, hiding the first application icon.
After the target application icon and the host application icon establish an association relationship, the monitoring process hides the target application icon in the display interface, for example, hides an icon identifier of the target application icon, namely, a first application icon program icon, so as to realize the confidentiality of the target application icon. When a user needs to search for a hidden target application icon, the target application icon can be displayed through the host application icon which is associated with the target application icon. In order not to affect the normal start of the host application icon, when the user searches the target application icon, the host application icon may be triggered by a target gesture, i.e., a different manner from the normal start gesture of the host application icon, such as a long press or double click, to display the hidden target application icon.
And step 207, receiving the target gesture operation of the mobile terminal user on the second application program icon.
The target gesture operation at least comprises one or more of long press operation, double-click operation, multi-click operation and operation of dragging the second application program icon to a preset area.
And receiving target gesture operation of a mobile terminal user on a second application program icon, namely the host icon, wherein the target gesture comprises long-time pressing operation, double-click operation, multi-click operation and operation of dragging the second application program icon to a preset area.
The detection method of the long press operation comprises the following steps: and when the monitoring software detects that the host icon is triggered, acquiring the time when the host icon is triggered. It is determined whether the trigger time is greater than a preset time threshold, e.g., 2 s. And when the triggering time is greater than a preset time threshold, determining that the operation is a long-press operation and belongs to target gesture operation.
The detection method for dragging the second application program icon to the preset area comprises the following steps: and acquiring the coordinate information of the status bar in advance, and monitoring the position of the host icon by the monitoring process when the host icon is triggered so as to acquire the coordinate information of the host icon. Whether the host icon is dragged to the state bar and the state bar is overlapped can be judged through the coordinate information of the host icon and the coordinate information of the state bar. As shown in fig. 4, if the host icon B is dragged to the lower status bar, which coincides with the status bar, it may be determined that the host icon B is triggered by the target gesture operation.
And 208, displaying a password verification interface based on the target gesture operation.
And after detecting that the host icon is triggered by the target gesture operation, acquiring the identification position of the host icon to determine whether the host icon has a target icon bound with the host icon. For example, when the flag is 1, it indicates that there is a target icon bound to the host icon. And after determining that the target icon bound with the host icon exists in the host icon, displaying a password verification interface.
And step 209, acquiring the verification password input by the mobile terminal user.
And the monitoring process acquires the verification password input by the mobile terminal user.
Step 210, comparing the verification password with the target password.
And comparing the verification data input by the user with the target password of the host icon. And judging whether the verification data input by the user is the same as the target password of the host icon or not.
When the verification password is consistent with the target password, executing step 211; when the verification password is not consistent with the target password, the step 208 is returned.
Step 211, if the verification password is consistent with the target password, displaying the hidden first application icon through a window.
And if the verification password is consistent with the target password, acquiring the association relation between the host icon and the target icon, and displaying the target icon through a window. When a plurality of target icons bound with the host icon exist, the plurality of target icons can be sequentially displayed through the list. The host icon is typically displayed above the list and the other target icons are displayed below the host icon.
As shown in fig. 2b, a flowchart illustrating the starting of the target icon includes the following specific steps:
and 212, receiving the clicking operation of the mobile terminal user on the window.
After the mobile terminal user clicks a certain position of the window, the monitoring process can receive the clicking operation of the mobile terminal user on the window.
Step 213, determining the application icon corresponding to the click operation position as the first application icon.
And displaying a plurality of application program icons in the list of the window, and determining the application program icon corresponding to the clicking operation position as a first application program icon.
And step 214, starting the application program corresponding to the first application program icon.
And starting the first application program according to the triggering of the first application program icon. As shown in fig. 5, in the target icon list of the host icon B, the host icon B is displayed uppermost, and a plurality of target icons a and C hidden in the host icon B are displayed below the host icon B. The user selects an application icon to be started from the target icons, for example, clicking the icon A, and the monitoring software starts the application icon A when detecting that the application icon A is triggered.
As shown in fig. 2c, a flowchart of replacing the host icon and the target icon is shown, and the specific steps are as follows:
step 215, receiving a preset operation of the mobile terminal user.
The embodiment of the invention can replace the host icon, namely hide the original host icon into the selected target icon, namely the replacement application icon, and display the original host icon by triggering the replacement application icon. The mobile terminal user can replace the host icon through preset operation, for example, a target icon triggered by a specific gesture such as long pressing can be used as a replacement application icon, the replacement application icon is monitored, and when it is monitored that the replacement application icon is dragged to the position of the host icon, it is determined that the host icon needs to be replaced.
Step 216, based on the preset operation, determining the first application icon as a host icon, and determining the second application icon as a target icon.
When the situation that a user long presses a target icon, namely a first application icon, through a preset operation and drags the target icon to the position of a host icon is detected, the first application icon is determined as the host icon and a second application icon is determined as the target icon based on the preset operation.
And step 217, establishing a second association relationship between the target icon and the host icon.
And establishing a second incidence relation between the target icon and the host icon. When the host icon before replacement has an incidence relation with the plurality of target icons, a second incidence relation between the target icons and the host icons is established, and meanwhile, a second incidence relation between the host icons and the target icons except the replacement application program icons in the host icons before replacement is established. As shown in fig. 5, when it is detected that the target icon C is triggered by a preset operation, the target icon C is taken as a replacement application icon. And monitoring the target application program icon C, and determining that the host application program icon B needs to be replaced when the replaced application program icon C is monitored to be dragged to the position of the host application program icon B. And taking the host application icon B as a new target icon, taking the replacement application icon C as a replacement host icon, establishing a second incidence relation between the host icon B before replacement and the replacement host icon A, and establishing a second incidence relation between the replacement host icon C and other target icons A.
In summary, in the display control method for the application icon according to the embodiment of the present invention, the preset operation of the mobile terminal user is received; determining the first application icon as a host icon and determining the second application icon as a target icon based on the preset operation; and establishing a second incidence relation between the target icon and the host icon. Hiding the application icons is made more flexible.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
EXAMPLE III
Referring to fig. 6, a block diagram of a mobile terminal according to an embodiment of the present invention is shown, which may specifically include the following modules:
the first operation detection module 601 is configured to detect a dragging operation of the first application icon by the mobile terminal user when the standby desktop of the mobile terminal is in an editing state.
A first relation determining module 602, configured to determine the first application icon as a target icon and determine the second application icon as a host icon if an area of an overlapping area of the first application icon and the second application icon exceeds a preset threshold.
A first relationship establishing module 603, configured to establish a first association relationship between the target icon and the host icon.
An application hiding module 604, configured to hide the first application icon.
In summary, when the standby desktop of the mobile terminal is in an editing state, the dragging operation of the mobile terminal user on the first application icon is detected; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon. Therefore, the embodiment of the invention can effectively simplify the operation of hiding the application program icon, thereby improving the operation efficiency.
Referring to fig. 7, a block diagram of another mobile terminal according to another embodiment of the present invention is shown, which may specifically include the following modules:
the first operation detection module 601 is configured to detect a dragging operation of the first application icon by the mobile terminal user when the standby desktop of the mobile terminal is in an editing state.
A first relation determining module 602, configured to determine the first application icon as a target icon and determine the second application icon as a host icon if an area of an overlapping area of the first application icon and the second application icon exceeds a preset threshold.
A first relationship establishing module 603, configured to establish a first association relationship between the target icon and the host icon.
A password setting module 605, configured to obtain a target password set by the mobile terminal user; encrypting the first application icon based on the target password.
An application hiding module 604, configured to hide the first application icon.
And a target operation detection module 606, configured to receive a target gesture operation of the mobile terminal user on the second application icon.
And the application display module 607 is configured to display all the application programs related to the host icon through a window based on the target gesture operation.
The target gesture operation at least comprises one or more of long press operation, double-click operation, multi-click operation and operation of dragging the second application program icon to a preset area.
In a preferred embodiment of the present invention, the application display module 607 includes:
and the password verification sub-module 6071 is configured to display a password verification interface based on the target gesture operation.
And a password obtaining sub-module 6072, configured to obtain the verification password input by the mobile terminal user.
And a password comparison sub-module 6073, configured to compare the verification password with the target password. And if the verification password is consistent with the target password, displaying the hidden first application icon through a window.
An operation receiving module 608, configured to receive a click operation of the window by the mobile terminal user.
An icon determining module 609, configured to determine the application icon corresponding to the click operation position as the first application icon.
And the application starting module 610 is used for starting the application program corresponding to the first application program icon.
A second operation detection module 611, configured to receive a preset operation of the mobile terminal user;
a second relation determining module 612, configured to determine, based on the preset operation, the first application icon as a host icon, and determine the second application icon as a target icon.
A second relationship establishing module 613, configured to establish a second association relationship between the target icon and the host icon.
In summary, in the mobile terminal according to the embodiment of the present invention, when the standby desktop of the mobile terminal is in the editing state, the dragging operation of the mobile terminal user on the first application icon is detected; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon. Therefore, the embodiment of the invention can effectively simplify the operation of hiding the application program icon, thereby improving the operation efficiency.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Example four
Fig. 8 is a block diagram of a mobile terminal according to another embodiment of the present invention. The mobile terminal 900 shown in fig. 9 includes: at least one processor 801, memory 802, at least one network interface 804, and a user interface 803. The various components in the mobile terminal 800 are coupled together by a bus system 805. It is understood that the bus system 805 is used to enable communications among the components connected. The bus system 805 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 805 in fig. 8.
The user interface 803 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, or touch screen, among others.
It will be appreciated that the memory 802 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a Read-only memory (ROM), a programmable Read-only memory (PROM), an erasable programmable Read-only memory (erasabprom, EPROM), an electrically erasable programmable Read-only memory (EEPROM), or a flash memory. The volatile memory may be a Random Access Memory (RAM) which functions as an external cache. By way of example, but not limitation, many forms of RAM are available, such as static random access memory (staticiram, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (syncronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced synchronous SDRAM (ESDRAM), synchronous link SDRAM (SLDRAM), and direct memory bus SDRAM (DRRAM). The memory 802 of the subject systems and methods described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 802 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 8021 and application programs 8022.
The operating system 8021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 8022 includes various applications, such as a media player (MediaPlayer), a Browser (Browser), and the like, for implementing various application services. A program implementing a method according to an embodiment of the present invention may be included in application program 8022.
In the embodiment of the present invention, by calling a program or an instruction stored in the memory 802, specifically, a program or an instruction stored in the application program 8022, the processor 801 detects a dragging operation of the mobile terminal user on the first application program icon when the standby desktop of the mobile terminal is in an editing state; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon.
The methods disclosed in the embodiments of the present invention described above may be implemented in the processor 801 or implemented by the processor 801. The processor 801 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 801. The processor 801 may be a general-purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 802, and the processor 801 reads the information in the memory 802, and combines the hardware to complete the steps of the method.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described in this disclosure may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described in this disclosure. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Optionally, as another embodiment, the processor 801 is further configured to: receiving target gesture operation of the mobile terminal user on the second application program icon; and displaying all application programs related to the host icon through a window based on the target gesture operation.
Optionally, the processor 801 is further configured to: acquiring a target password set by the mobile terminal user; encrypting the first application icon based on the target password.
Optionally, the processor 801 is further configured to: displaying a password verification interface based on the target gesture operation; acquiring an authentication password input by the mobile terminal user; comparing the verification password with the target password; and if the verification password is consistent with the target password, displaying the hidden first application icon through a window.
Optionally, the processor 801 is further configured to: triggering the host application through a second gesture; and when the trigger time of the host application is greater than a preset time threshold, determining that the second gesture is a target gesture.
Optionally, the processor 801 is further configured to: receiving preset operation of the mobile terminal user; determining the first application icon as a host icon and determining the second application icon as a target icon based on the preset operation; and establishing a second incidence relation between the target icon and the host icon.
Optionally, the processor 801 is further configured to: receiving the clicking operation of the mobile terminal user on the window; determining an application program icon corresponding to the clicking operation position as the first application program icon; and starting the application program corresponding to the first application program icon.
The mobile terminal 800 can implement each process implemented by the mobile terminal in the foregoing embodiments, and details are not repeated here to avoid repetition.
According to the mobile terminal provided by the embodiment of the invention, when the standby desktop of the mobile terminal is in an editing state, the dragging operation of the mobile terminal user on the first application program icon is detected; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon. Therefore, the embodiment of the invention can effectively simplify the operation of hiding the application program icon, thereby improving the operation efficiency.
EXAMPLE five
Fig. 9 is a block diagram of a mobile terminal according to another embodiment of the present invention. Specifically, the mobile terminal 900 in fig. 9 may be a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), or a vehicle-mounted computer.
The mobile terminal 900 in fig. 9 includes a Radio Frequency (RF) circuit 910, a memory 920, an input unit 930, a display unit 940, a processor 960, an audio circuit 970, a wifi (wireless fidelity) module 980, and a power supply 990.
The input unit 930 may be used, among other things, to receive numeric or character information input by a user and to generate signal inputs related to user settings and function control of the mobile terminal 900. Specifically, in the embodiment of the present invention, the input unit 930 may include a touch panel 931. The touch panel 931, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 931 (for example, a user may operate the touch panel 931 by using a finger, a stylus pen, or any other suitable object or accessory), and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 931 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, and sends the touch point coordinates to the processor 960, where the touch controller can receive and execute commands sent by the processor 960. In addition, the touch panel 931 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 931, the input unit 930 may also include other input devices 932, and the other input devices 932 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
Among other things, the display unit 940 may be used to display information input by the user or information provided to the user and various menu interfaces of the mobile terminal 900. The display unit 940 may include a display panel 941, and optionally, the display panel 941 may be configured in the form of an LCD or an organic light-emitting diode (OLED).
It should be noted that the touch panel 931 may overlay the display panel 941 to form a touch display screen, and when the touch display screen detects a touch operation on or near the touch display screen, the touch display screen transmits the touch operation to the processor 960 to determine the type of the touch event, and then the processor 960 provides a corresponding visual output on the touch display screen according to the type of the touch event.
The touch display screen comprises an application program interface display area and a common control display area. The arrangement modes of the application program interface display area and the common control display area are not limited, and can be an arrangement mode which can distinguish two display areas, such as vertical arrangement, left-right arrangement and the like. The application interface display area may be used to display an interface of an application. Each interface may contain at least one interface element such as an icon and/or widget desktop control for an application. The application interface display area may also be an empty interface that does not contain any content. The common control display area is used for displaying controls with high utilization rate, such as application icons like setting buttons, interface numbers, scroll bars, phone book icons and the like.
The processor 960 is a control center of the mobile terminal 900, connects various parts of the entire mobile phone using various interfaces and lines, and performs various functions of the mobile terminal 900 and processes data by operating or executing software programs and/or modules stored in the first memory 921 and calling data stored in the second memory 922, thereby integrally monitoring the mobile terminal 900. Optionally, processor 960 may include one or more processing units.
In this embodiment of the present invention, by invoking the software program and/or module stored in the first memory 921 and/or the data stored in the second memory 922, the processor 960 detects the dragging operation of the mobile terminal user on the first application icon when the standby desktop of the mobile terminal is in an editing state; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon.
Optionally, the processor 960 is further configured to: receiving target gesture operation of the mobile terminal user on the second application program icon; and displaying all application programs related to the host icon through a window based on the target gesture operation.
Optionally, the processor 960 is further configured to: acquiring a target password set by the mobile terminal user; encrypting the first application icon based on the target password.
Optionally, the processor 960 is further configured to: displaying a password verification interface based on the target gesture operation; acquiring an authentication password input by the mobile terminal user; comparing the verification password with the target password; and if the verification password is consistent with the target password, displaying the hidden first application icon through a window.
Optionally, the processor 960 is further configured to: triggering the host application through a second gesture; and when the trigger time of the host application is greater than a preset time threshold, determining that the second gesture is a target gesture.
Optionally, the processor 960 is further configured to: receiving preset operation of the mobile terminal user; determining the first application icon as a host icon and determining the second application icon as a target icon based on the preset operation; and establishing a second incidence relation between the target icon and the host icon.
Optionally, the processor 960 is further configured to: receiving the clicking operation of the mobile terminal user on the window; determining an application program icon corresponding to the clicking operation position as the first application program icon; and starting the application program corresponding to the first application program icon.
In summary, in the mobile terminal according to the embodiment of the present invention, when the standby desktop of the mobile terminal is in the editing state, the dragging operation of the mobile terminal user on the first application icon is detected; if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon; establishing a first incidence relation between the target icon and the host icon; hiding the first application icon. Therefore, the embodiment of the invention can effectively simplify the operation of hiding the application program icon, thereby improving the operation efficiency.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A display control method of an application icon is applied to a mobile terminal, and is characterized by comprising the following steps:
when a standby desktop of a mobile terminal is in an editing state, detecting the dragging operation of a mobile terminal user on a first application program icon;
if the area of the overlapping area of the first application program icon and the second application program icon exceeds a preset threshold value, determining the first application program icon as a target icon and determining the second application program icon as a host icon;
establishing a first incidence relation between the target icon and the host icon;
hiding the first application icon;
wherein after the step of hiding the first application icon, the method further comprises:
receiving target gesture operation of the mobile terminal user on the second application program icon;
displaying all application programs related to the host icon through a window based on the target gesture operation; the window is used for starting an application program corresponding to the application program icon corresponding to the clicking operation position after the clicking operation of the window by the user is received;
after the step of displaying the hidden first application icon through a window based on the target gesture operation, the method further comprises:
receiving preset operation of the mobile terminal user;
determining the first application icon as a host icon and determining the second application icon as a target icon based on the preset operation; the preset operation is long-time pressing of the first application icon and dragging of the first application icon to the position of the second application icon;
establishing a second incidence relation between the target icon and the host icon;
the method further comprises the following steps: when the first incidence relation is established between the host icon and the target icon for the first time, the identification position of the host icon is modified, and the identification position is used for identifying that the target icon is hidden in the host icon.
2. The method according to claim 1, wherein the target gesture operation at least comprises one or more of a long press operation, a double-click operation, a multi-click operation and an operation of dragging the second application icon to a preset area.
3. The method of claim 1, wherein hiding the first application icon is preceded by:
acquiring a target password set by the mobile terminal user;
encrypting the first application icon based on the target password.
4. The method of claim 3, wherein the step of displaying the hidden first application icon through a window based on the target gesture operation comprises:
displaying a password verification interface based on the target gesture operation;
acquiring an authentication password input by the mobile terminal user;
comparing the verification password with the target password;
and if the verification password is consistent with the target password, displaying the hidden first application icon through a window.
5. The method of claim 1, wherein after the step of displaying the hidden first application icon through a window, the method further comprises:
receiving the clicking operation of the mobile terminal user on the window;
determining an application program icon corresponding to the clicking operation position as the first application program icon;
and starting the application program corresponding to the first application program icon.
6. A mobile terminal, comprising:
the mobile terminal comprises a first operation detection module, a second operation detection module and a third operation detection module, wherein the first operation detection module is used for detecting the dragging operation of a mobile terminal user on a first application program icon when a standby desktop of the mobile terminal is in an editing state;
the first relation determination module is used for determining the first application icon as a target icon and determining the second application icon as a host icon if the overlapping area of the first application icon and the second application icon exceeds a preset threshold;
the first relation establishing module is used for establishing a first incidence relation between the target icon and the host icon; the application hiding module is used for hiding the first application program icon;
the target operation detection module is used for receiving target gesture operation of the mobile terminal user on the second application program icon;
the application display module is used for displaying all application programs related to the host icon through a window based on the target gesture operation; the window is used for starting an application corresponding to the application program icon corresponding to the clicking operation position after the clicking operation of the window by the user is received;
the mobile terminal further comprises:
the second operation detection module is used for receiving the preset operation of the mobile terminal user;
the second relation determination module is used for determining the first application icon as a host icon and determining the second application icon as a target icon based on the preset operation;
the second relation establishing module is used for establishing a second incidence relation between the target icon and the host icon;
the mobile terminal further includes: and the identification position modification module is used for modifying the identification position of the host icon when the first incidence relation is established between the host icon and the target icon for the first time, and the identification position is used for identifying that the target icon is hidden in the host icon.
7. The mobile terminal according to claim 6, wherein the target gesture operation includes at least one or more of a long press operation, a double-click operation, a multi-click operation, and an operation of dragging the second application icon to a preset area.
8. The mobile terminal of claim 6, further comprising:
the password setting module is used for acquiring a target password set by the mobile terminal user; encrypting the first application icon based on the target password.
9. The mobile terminal of claim 8, wherein the application display module comprises:
the password verification sub-module is used for displaying a password verification interface based on the target gesture operation;
the password acquisition submodule is used for acquiring the verification password input by the mobile terminal user;
the password comparison submodule is used for comparing the verification password with the target password; and if the verification password is consistent with the target password, displaying the hidden first application icon through a window.
10. The mobile terminal of claim 6, further comprising:
the operation receiving module is used for receiving the clicking operation of the mobile terminal user on the window;
the icon determining module is used for determining the application program icon corresponding to the clicking operation position as the first application program icon;
and the application starting module is used for starting the application program corresponding to the first application program icon.
CN201610431331.XA 2016-06-15 2016-06-15 Display control method of application program icons and mobile terminal Active CN106126077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610431331.XA CN106126077B (en) 2016-06-15 2016-06-15 Display control method of application program icons and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610431331.XA CN106126077B (en) 2016-06-15 2016-06-15 Display control method of application program icons and mobile terminal

Publications (2)

Publication Number Publication Date
CN106126077A CN106126077A (en) 2016-11-16
CN106126077B true CN106126077B (en) 2020-06-05

Family

ID=57470591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610431331.XA Active CN106126077B (en) 2016-06-15 2016-06-15 Display control method of application program icons and mobile terminal

Country Status (1)

Country Link
CN (1) CN106126077B (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106445290B (en) * 2016-09-19 2019-08-23 宇龙计算机通信科技(深圳)有限公司 A kind of method and device that application is hiding
CN106484301A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method of hiden application and terminal
CN106598433A (en) * 2016-12-06 2017-04-26 腾讯科技(深圳)有限公司 Insertion method of virtual resource object in application, and terminals
WO2018103515A1 (en) 2016-12-06 2018-06-14 腾讯科技(深圳)有限公司 Method for inserting virtual resource object in application, and terminal
CN106951143B (en) * 2017-03-21 2020-09-01 海信集团有限公司 Method and device for hiding application icons
CN106990886B (en) * 2017-04-01 2018-09-04 维沃移动通信有限公司 A kind of mobile display methods and mobile terminal of icon
CN108664180B (en) * 2017-04-02 2020-12-01 北京拓思德科技有限公司 Information transmission method and system
CN107102802A (en) * 2017-04-19 2017-08-29 网易(杭州)网络有限公司 Overlay target system of selection and device, storage medium, electronic equipment
CN107423585A (en) * 2017-07-31 2017-12-01 上海爱优威软件开发有限公司 The concealed application method and system of a kind of application
CN109744960A (en) * 2017-11-07 2019-05-14 青岛海尔洗碗机有限公司 A kind of cleaning machine
CN108021305B (en) * 2017-12-11 2020-05-26 维沃移动通信有限公司 Application association starting method and device and mobile terminal
CN108491148B (en) * 2018-03-12 2021-06-08 维沃移动通信有限公司 Application sharing method and terminal
CN108446058B (en) * 2018-03-12 2020-05-26 维沃移动通信有限公司 Mobile terminal operation method and mobile terminal
CN108449259B (en) * 2018-03-12 2021-04-06 维沃移动通信有限公司 Communication processing method and mobile terminal
CN108494754B (en) * 2018-03-12 2020-06-12 维沃移动通信有限公司 Account information processing method and mobile terminal
CN108803960A (en) * 2018-05-22 2018-11-13 珠海格力电器股份有限公司 The treating method and apparatus of application icon
CN108984225B (en) * 2018-06-19 2023-05-30 上海掌门科技有限公司 Method and device for quickly starting hosted application
CN109245883A (en) * 2018-09-21 2019-01-18 深圳市德名利电子有限公司 A kind of randomizer and production methods are counted at any time
CN109408184A (en) * 2018-10-29 2019-03-01 努比亚技术有限公司 A kind of icon processing method, mobile terminal and computer storage medium
CN111625306A (en) * 2019-02-28 2020-09-04 上海博泰悦臻电子设备制造有限公司 Display control method and device for suspension icon in vehicle machine
CN111176512B (en) * 2019-12-31 2022-03-04 维沃移动通信有限公司 Icon processing method and electronic equipment
CN113067934B (en) * 2021-03-15 2022-06-14 Oppo广东移动通信有限公司 Encrypted content decryption method, terminal equipment and computer readable storage medium
CN113608732A (en) * 2021-08-20 2021-11-05 车主邦(北京)科技有限公司 Control editing method and device, computer readable medium and electronic equipment
CN114866641B (en) * 2022-07-07 2022-11-11 荣耀终端有限公司 Icon processing method, terminal equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989176A (en) * 2009-08-04 2011-03-23 Lg电子株式会社 Mobile terminal and icon collision controlling method thereof
GB2480825B (en) * 2010-06-02 2013-10-09 Displaylink Uk Ltd Application windows and display devices
CN103927495A (en) * 2014-04-16 2014-07-16 深圳市中兴移动通信有限公司 Method and device for hiding objects
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN105335048A (en) * 2015-10-09 2016-02-17 惠州Tcl移动通信有限公司 Electron equipment with concealed application icon and application icon conceal method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7730427B2 (en) * 2005-12-29 2010-06-01 Sap Ag Desktop management scheme
US8321802B2 (en) * 2008-11-13 2012-11-27 Qualcomm Incorporated Method and system for context dependent pop-up menus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989176A (en) * 2009-08-04 2011-03-23 Lg电子株式会社 Mobile terminal and icon collision controlling method thereof
GB2480825B (en) * 2010-06-02 2013-10-09 Displaylink Uk Ltd Application windows and display devices
CN103927495A (en) * 2014-04-16 2014-07-16 深圳市中兴移动通信有限公司 Method and device for hiding objects
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN105335048A (en) * 2015-10-09 2016-02-17 惠州Tcl移动通信有限公司 Electron equipment with concealed application icon and application icon conceal method

Also Published As

Publication number Publication date
CN106126077A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN106126077B (en) Display control method of application program icons and mobile terminal
CN107678644B (en) Image processing method and mobile terminal
CN107219988B (en) Interface operation guiding method and mobile terminal
CN107526492B (en) Interface display method of application program and mobile terminal
WO2018196699A1 (en) Method for displaying fingerprint recognition region, and mobile terminal
CN107193438B (en) Method for managing desktop icons and mobile terminal
US20180041506A1 (en) Biometric Capture for Unauthorized User Identification
CN106203061B (en) Encryption method of application program and mobile terminal
CN106354373B (en) Icon moving method and mobile terminal
CN107229396B (en) Mobile terminal application icon hiding method and mobile terminal
CN105868617B (en) Application program encryption method and mobile terminal
CN107562345B (en) Information storage method and mobile terminal
CN106873874B (en) Application program starting method and mobile terminal
CN106874046B (en) Application program operation method and mobile terminal
CN107172287B (en) Multi-card communication method and mobile terminal
CN107506130B (en) Character deleting method and mobile terminal
CN106383638B (en) Payment mode display method and mobile terminal
CN107450799B (en) Message display method and mobile terminal
CN107566622B (en) Temperature control method and mobile terminal
CN106970752B (en) Screen capturing method and mobile terminal
CN106775378B (en) Method for determining candidate words of input method and mobile terminal
CN107103224B (en) Unlocking method and mobile terminal
CN107959789B (en) Image processing method and mobile terminal
CN106873891B (en) Touch operation method and mobile terminal
CN107087075B (en) Prompting method based on screen fingerprint identification and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant