CN106228043B - Application icon hidden method and terminal - Google Patents

Application icon hidden method and terminal Download PDF

Info

Publication number
CN106228043B
CN106228043B CN201610604888.9A CN201610604888A CN106228043B CN 106228043 B CN106228043 B CN 106228043B CN 201610604888 A CN201610604888 A CN 201610604888A CN 106228043 B CN106228043 B CN 106228043B
Authority
CN
China
Prior art keywords
application icon
displayed
pressing operation
hiding
position information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610604888.9A
Other languages
Chinese (zh)
Other versions
CN106228043A (en
Inventor
蔡克虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201610604888.9A priority Critical patent/CN106228043B/en
Publication of CN106228043A publication Critical patent/CN106228043A/en
Application granted granted Critical
Publication of CN106228043B publication Critical patent/CN106228043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of application icon hidden methods, which comprises detection user is directed to the first pressing operation of application icon on pressure screen;When determining that the parameter of first pressing operation meets preset condition, at least one preconfigured option of operation is shown;When detecting the second pressing operation at least one option of operation, the application icon is hidden according to second pressing operation corresponding hiding grade.The present invention also discloses a kind of terminals.Using the present invention, the memory consumption of terminal can reduce, improve the safety of hiden application.

Description

Application icon hiding method and terminal
Technical Field
The invention relates to an information display technology in the technical field of communication, in particular to an application icon hiding method and a terminal.
Background
The pressure screen is a screen applied to a smart phone and a notebook computer, the screen needs to depend on an independent pressure sensor, when the pressure sensor monitors that a user presses the pressure screen, the pressing operation is converted into a control instruction and sent to a processing chip in the mobile terminal, and the processing chip completes corresponding operation according to the touch instruction of the user. With the rapid development of mobile terminals, the use of the pressure screen brings more interaction modes and touch experience to users.
At present, the pre-installed applications on the mobile phone are more, and more applications can not be used at some time but do not want to be deleted, in the prior art, the applications are placed at an unobtrusive place or switched to another interface, but common applications and the uncommon applications are mixed at some time, and finding one application is troublesome at some time; yet another solution is to download a third-party hidden application apk on the internet, however, the operation of this solution is complicated, the running apk will also occupy the memory of the mobile phone, and the hidden application is also easy to be found and operated by others.
Disclosure of Invention
In view of this, embodiments of the present invention provide an application icon hiding method and a terminal for solving at least one problem in the prior art.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides a terminal, wherein the terminal comprises:
the detection module is used for detecting a first pressing operation of a user on the pressure screen aiming at the application icon;
the option display module is used for displaying at least one operation option which is configured in advance when the parameter of the first pressing operation meets the preset condition;
and the hiding module is used for hiding the application icon according to a hiding level corresponding to the second pressing operation when the second pressing operation aiming at the at least one operation option is detected.
In the foregoing solution, the option display module is specifically configured to:
and when the continuous pressing time of the first pressing operation is determined to be greater than a preset time threshold, displaying at least one operation option which is configured in advance.
In the above solution, the at least one operation option includes: a first operation option and a second operation option; the hiding module is specifically configured to:
when the second pressing operation is detected to be directed at the first operation option, shielding and displaying the application icon according to a first hiding level corresponding to the first operation option, and storing position information of the application icon into a first hiding area;
and when the second pressing operation is detected to be directed at the second operation option, shielding and displaying the application icon according to a second hiding level corresponding to the second operation option, storing the position information of the application icon into a second hiding area, and storing the identity identification information of the user.
In the above scheme, the terminal further includes:
an icon display module to: when a third pressing operation at a first designated position of the pressure screen is detected, acquiring position information of an application icon to be displayed from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information;
the icon display module is further configured to: when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; and when the identity authentication is determined to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
In the foregoing scheme, the icon display module is specifically configured to:
when detecting a third pressing operation at a first designated position of the pressure screen, acquiring a name abbreviation of an application to be displayed; acquiring position information of an application icon to be displayed corresponding to the name abbreviation from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information;
when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; when the identity authentication is determined to pass, acquiring the name shorthand of the application to be displayed; and acquiring the position information of the application icon to be displayed corresponding to the name abbreviation from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
The embodiment of the invention provides an application icon hiding method, wherein the method comprises the following steps:
detecting a first pressing operation of a user on a pressure screen aiming at an application icon;
when the parameter of the first pressing operation is determined to meet a preset condition, displaying at least one operation option configured in advance;
and when a second pressing operation aiming at the at least one operation option is detected, hiding the application icon according to a hiding level corresponding to the second pressing operation.
In the foregoing aspect, when it is determined that the parameter of the first pressing operation satisfies a preset condition, displaying at least one operation option configured in advance includes:
and when the continuous pressing time of the first pressing operation is determined to be greater than a preset time threshold, displaying at least one operation option which is configured in advance.
In the above solution, the at least one operation option includes: a first operation option and a second operation option;
when a second pressing operation for the at least one operation option is detected, hiding the application icon according to a hiding level corresponding to the second pressing operation, including:
when the second pressing operation is detected to be directed at the first operation option, shielding and displaying the application icon according to a first hiding level corresponding to the first operation option, and storing position information of the application icon into a first hiding area; or,
and when the second pressing operation is detected to be directed at the second operation option, shielding and displaying the application icon according to a second hiding level corresponding to the second operation option, storing the position information of the application icon into a second hiding area, and storing the identity identification information of the user.
In the above aspect, the method further includes:
when a third pressing operation at a first designated position of the pressure screen is detected, acquiring position information of an application icon to be displayed from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information; or,
when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; and when the identity authentication is determined to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
In the foregoing solution, when the third pressing operation at the first designated position of the pressure screen is detected, acquiring position information of an application icon to be displayed from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information, includes:
when detecting a third pressing operation at a first designated position of the pressure screen, acquiring a name abbreviation of an application to be displayed; acquiring position information of an application icon to be displayed corresponding to the name abbreviation from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information;
when the fourth pressing operation at the second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; when the identity authentication is determined to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information, wherein the method comprises the following steps:
when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; when the identity authentication is determined to pass, acquiring the name shorthand of the application to be displayed; and acquiring the position information of the application icon to be displayed corresponding to the name abbreviation from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
Compared with the prior art, in the embodiment of the invention, when the option display module determines that the parameter of the first pressing operation performed by the user on the application icon on the pressure screen meets the preset condition, at least one operation option which is configured in advance is displayed on the pressure screen, and the application icon is hidden according to the hidden grade corresponding to the operation option selected by the user from the at least one operation option, so that the application icon is quickly hidden in a graded way; that is to say, the user can select different hiding levels according to prompt options by pressing the application icon, so that the purpose of classifying and hiding the application can be achieved, the operation is convenient, the memory consumption of the terminal is reduced, and the safety of the hidden application is improved.
Drawings
Fig. 1 is a schematic hardware configuration diagram of an alternative mobile terminal 100 for implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal 100 shown in FIG. 1;
fig. 3 is an alternative structural diagram of the terminal in the embodiment of the present invention;
FIG. 4a is a schematic diagram illustrating an alternative process for hiding application icons according to an embodiment of the present invention;
FIG. 4b shows another alternative diagram of hiding application icons in an embodiment of the present invention;
FIG. 4c is yet another alternative diagram illustrating hiding application icons in an embodiment of the present invention;
fig. 5 is a schematic diagram of another alternative structure of the terminal in the embodiment of the present invention;
FIG. 6 is a schematic flow chart illustrating an alternative method for hiding an application icon according to an embodiment of the present invention;
FIG. 7 is a schematic flow chart illustrating another alternative process for hiding application icons according to an embodiment of the present invention;
FIG. 8a is an alternative flowchart illustrating displaying hidden application icons according to an embodiment of the present invention;
FIG. 8b is a schematic flow chart illustrating another alternative process for displaying hidden application icons according to an embodiment of the present invention;
fig. 8c is a further alternative flowchart illustrating displaying a hidden application icon according to an embodiment of the present invention.
Detailed Description
It should be understood that the embodiments described herein are only for explaining the technical solutions of the present invention, and are not intended to limit the scope of the present invention.
A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
The mobile terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a Portable Multimedia Player (PMP), a navigation device, etc., and a stationary terminal such as a digital TV, a desktop computer, etc. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a hardware configuration diagram of an alternative mobile terminal 100 implementing various embodiments of the present invention, and as shown in fig. 1, the mobile terminal 100 may include a wireless communication unit 110, an audio/video (a/V) input unit 120, a user input unit 130, a sensing unit 140, an output unit 150, a memory 160, an interface unit 170, a controller 180, a power supply unit 190, and the like. Fig. 1 illustrates the mobile terminal 100 having various components, but it is to be understood that not all illustrated components are required to be implemented. More or fewer components may alternatively be implemented. The elements of the mobile terminal 100 will be described in detail below.
The wireless communication unit 110 typically includes one or more components that allow radio communication between the mobile terminal 100 and a wireless communication system or network. For example, the wireless communication unit 110 may include at least one of a broadcast receiving module 111, a mobile communication module 112, a wireless internet module 113, a short-range communication module 114, and a location information module 115.
The broadcast receiving module 111 receives a broadcast signal and/or broadcast associated information from an external broadcast management server via a broadcast channel. The broadcast channel may include a satellite channel and/or a terrestrial channel. The broadcast management server may be a server that generates and transmits a broadcast signal and/or broadcast associated information or a server that receives a previously generated broadcast signal and/or broadcast associated information and transmits it to a terminal. The broadcast signal may include a TV broadcast signal, a radio broadcast signal, a data broadcast signal, and the like. Also, the broadcast signal may further include a broadcast signal combined with a TV or radio broadcast signal. The broadcast associated information may also be provided via a mobile communication network, and in this case, the broadcast associated information may be received by the mobile communication module 112. The broadcast signal may exist in various forms, for example, it may be in an Electronic Program Guide (EPG) of Digital Multimedia Broadcasting (DMB), digital videoA broadcast handheld (DVB-H) Electronic Service Guide (ESG) or the like. The broadcast receiving module 111 may receive a signal broadcast by using various types of broadcasting systems. In particular, the broadcast receiving module 111 may receive a broadcast signal by using a signal such as multimedia broadcasting-terrestrial (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video broadcasting-handheld (DVB-H), forward link media (MediaFLO)@) A digital broadcasting system of a terrestrial digital broadcasting integrated service (ISDB-T), etc. receives digital broadcasting. The broadcast receiving module 111 may be constructed to be suitable for various broadcasting systems that provide broadcast signals as well as the above-mentioned digital broadcasting systems. The broadcast signal and/or broadcast associated information received via the broadcast receiving module 111 may be stored in the memory 160 (or other type of storage medium).
The mobile communication module 112 transmits and/or receives radio signals to and/or from at least one of a base station (e.g., access point, node B, etc.), an external terminal, and a server. Such radio signals may include voice call signals, video call signals, or various types of data transmitted and/or received according to text and/or multimedia messages.
The wireless internet module 113 supports wireless internet access of the mobile terminal 100. The wireless internet module 113 may be internally or externally coupled to the terminal. The wireless internet access technology referred to by the wireless internet module 113 may include Wireless Local Area Network (WLAN), wireless compatibility authentication (Wi-Fi), wireless broadband (Wibro), worldwide interoperability for microwave access (Wimax), High Speed Downlink Packet Access (HSDPA), and the like.
The short-range communication module 114 is a module for supporting short-range communication. Some examples of short-range communication technologies include bluetoothTMRadio Frequency Identification (RFID), infrared data association (IrDA), Ultra Wideband (UWB), zigbeeTMAnd so on.
The location information module 115 is a module for checking or acquiring location information of the mobile terminal 100. A typical example of the location information module 115 is a Global Positioning System (GPS) module 115. According to the current technology, the GPS module 115 calculates distance information and accurate time information from three or more satellites and applies triangulation to the calculated information, thereby accurately calculating three-dimensional current location information according to longitude, latitude, and altitude. Currently, a method for calculating position and time information uses three satellites and corrects an error of the calculated position and time information by using another satellite. In addition, the GPS module 115 can calculate speed information by continuously calculating current position information in real time.
The a/V input unit 120 is used to receive an audio or video signal. The a/V input unit 120 may include a camera 121 and a microphone 122, and the camera 121 processes image data of still pictures or video obtained by an image capturing apparatus in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 151. The image frames processed by the cameras 121 may be stored in the memory 160 (or other storage medium) or transmitted via the wireless communication unit 110, and two or more cameras 121 may be provided according to the construction of the mobile terminal 100. The microphone 122 may receive sounds (audio data) via the microphone in a phone call mode, a recording mode, a voice recognition mode, or the like, and can process such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the mobile communication module 112 in case of a phone call mode. The microphone 122 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The user input unit 130 may generate key input data to control various operations of the mobile terminal 100 according to a command input by a user. The user input unit 130 allows a user to input various types of information, and may include a keyboard, dome sheet, touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), scroll wheel, joystick, and the like. In particular, when the touch pad is superimposed on the display unit 151 in the form of a layer, a touch screen may be formed.
The sensing unit 140 detects a current state of the mobile terminal 100 (e.g., an open or closed state of the mobile terminal 100), a position of the mobile terminal 100, presence or absence of contact (i.e., touch input) by a user with the mobile terminal 100, an orientation of the mobile terminal 100, acceleration or deceleration movement and direction of the mobile terminal 100, and the like, and generates a command or signal for controlling an operation of the mobile terminal 100. For example, when the mobile terminal 100 is implemented as a slide-type mobile phone, the sensing unit 140 may sense whether the slide-type phone is opened or closed. In addition, the sensing unit 140 can detect whether the power supply unit 190 supplies power or whether the interface unit 170 is coupled with an external device.
The interface unit 170 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port (a typical example is a Universal Serial Bus (USB) port), a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The identification module may store various information for authenticating a user using the mobile terminal 100 and may include a User Identity Module (UIM), a Subscriber Identity Module (SIM), a Universal Subscriber Identity Module (USIM), and the like. In addition, a device having an identification module (hereinafter, referred to as an "identification device") may take the form of a smart card, and thus, the identification device may be connected with the mobile terminal 100 via a port or other connection means.
The interface unit 170 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and the external device.
In addition, when the mobile terminal 100 is connected with an external cradle, the interface unit 170 may serve as a path through which power is supplied from the cradle to the mobile terminal 100 or may serve as a path through which various command signals input from the cradle are transmitted to the mobile terminal 100. Various command signals or power input from the cradle may be used as signals for recognizing whether the mobile terminal 100 is accurately mounted on the cradle.
The output unit 150 is configured to provide output signals (e.g., audio signals, video signals, alarm signals, vibration signals, etc.) in a visual, audio, and/or tactile manner. The output unit 150 may include a display unit 151, an audio output module 152, an alarm unit 153, and the like.
The display unit 151 may display information processed in the mobile terminal 100. For example, when the mobile terminal 100 is in a phone call mode, the display unit 151 may display a User Interface (UI) or a Graphical User Interface (GUI) related to a call or other communication (e.g., text messaging, multimedia file downloading, etc.). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display unit 151 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display unit 151 and the touch pad are overlapped with each other in the form of a layer to form a touch screen, the display unit 151 may serve as an input device and an output device. The display unit 151 may include at least one of a Liquid Crystal Display (LCD), a thin film transistor LCD (TFT-LCD), an Organic Light Emitting Diode (OLED) display, a flexible display, a three-dimensional (3D) display, and the like. Some of these displays may be configured to be transparent to allow a user to view from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a TOLED (transparent organic light emitting diode) display or the like. Depending on the particular desired implementation, mobile terminal 100 may include two or more display units (or other display devices), for example, mobile terminal 100 may include an external display unit (not shown) and an internal display unit (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The audio output module 152 may convert audio data received by the wireless communication unit 110 or stored in the memory 160 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output module 152 may provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output module 152 may include a speaker, a buzzer, and the like.
The alarm unit 153 may provide an output to notify the mobile terminal 100 of the occurrence of an event. Typical events may include call reception, message reception, key signal input, touch input, and the like. In addition to audio or video output, the alarm unit 153 may provide output in different ways to notify the occurrence of an event. For example, the alarm unit 153 may provide an output in the form of vibration, and when a call, a message, or some other incoming communication (communicating communication) is received, the alarm unit 153 may provide a tactile output (i.e., vibration) to inform the user thereof. By providing such a tactile output, the user can recognize the occurrence of various events even when the user's mobile phone is in the user's pocket. The alarm unit 153 may also provide an output notifying the occurrence of an event via the display unit 151 or the audio output module 152.
The memory 160 may store software programs or the like for processing and controlling operations performed by the controller 180, or may temporarily store data (e.g., a phonebook, messages, still images, videos, etc.) that has been output or is to be output. Also, the memory 160 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The memory 160 may include at least one type of storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the memory 160 through a network connection.
The controller 180 generally controls the overall operation of the mobile terminal 100. For example, the controller 180 performs control and processing related to voice calls, data communications, video calls, and the like. In addition, the controller 180 may include a multimedia module 181 for reproducing or playing back multimedia data, and the multimedia module 181 may be constructed within the controller 180 or may be constructed to be separated from the controller 180. The controller 180 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image.
The power supply unit 190 receives external power or internal power and provides appropriate power required to operate various elements and components under the control of the controller 180.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the controller 180. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in the memory 160 and executed by the controller 180.
Up to this point, the mobile terminal 100 has been described in terms of its functions. Hereinafter, the slide-type mobile terminal 100 among various types of mobile terminals 100, such as a folder-type, bar-type, swing-type, slide-type mobile terminal 100, and the like, will be described as an example for the sake of brevity. Accordingly, the present invention can be applied to any type of mobile terminal 100, and is not limited to the slide type mobile terminal 100.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which the mobile terminal 100 according to the present invention is capable of operating will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication system includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global system for mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of mobile terminals 100, a plurality of Base Stations (BSs) 270, Base Station Controllers (BSCs) 275, and a Mobile Switching Center (MSC) 280. The MSC 280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC 280 is also configured to interface with a BSC275, which may be coupled to the base station 270 via a backhaul. The backhaul may be constructed according to any of several known interfaces including, for example, E1/T1, ATM, IP, PPP, frame Relay, HDSL, ADSL, or xDSL. It will be understood that a system as shown in fig. 2 may include multiple BSCs 2750.
Each BS 270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS 270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz, 5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS 270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each partition of a particular BS 270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT)295 transmits a broadcast signal to the mobile terminal 100 operating within the system. A broadcast receiving module 111 as shown in fig. 1 is provided at the mobile terminal 100 to receive a broadcast signal transmitted by the BT 295. In fig. 2, several satellites 300 are shown, for example, Global Positioning System (GPS) satellites 300 may be employed. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is understood that useful positioning information may be obtained with any number of satellites. The GPS module 115 as shown in fig. 1 is generally configured to cooperate with satellites 300 to obtain desired positioning information. Other techniques that can track the location of the mobile terminal 100 may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS 270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station 270 is processed within the particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC provides call resource allocation and mobility management functions including coordination of soft handoff procedures between BSs 270. The BSCs 275 also route the received data to the MSC 280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC 280, the MSC interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS 270 to transmit forward link signals to the mobile terminal 100.
The mobile communication module 112 of the wireless communication unit 110 in the mobile terminal accesses the mobile communication network based on the necessary data (including the user identification information and the authentication information) of the mobile communication network (such as the mobile communication network of 2G/3G/4G, etc.) built in the mobile terminal, so as to transmit the mobile communication data (including the uplink mobile communication data and the downlink mobile communication data) for the services of web browsing, network multimedia playing, etc. of the mobile terminal user.
The wireless internet module 113 of the wireless communication unit 110 implements a function of a wireless hotspot by operating a related protocol function of the wireless hotspot, the wireless hotspot supports access by a plurality of mobile terminals (any mobile terminal other than the mobile terminal), transmits mobile communication data (including uplink mobile communication data and downlink mobile communication data) for mobile terminal user's services such as web browsing, network multimedia playing, etc. by multiplexing the mobile communication connection between the mobile communication module 112 and the mobile communication network, since the mobile terminal essentially multiplexes the mobile communication connection between the mobile terminal and the communication network for transmitting mobile communication data, the traffic of mobile communication data consumed by the mobile terminal is charged to the communication tariff of the mobile terminal by a charging entity on the side of the communication network, thereby consuming the data traffic of the mobile communication data included in the communication tariff contracted for use by the mobile terminal.
Based on the above hardware structure of the mobile terminal 100 and the communication system, various embodiments of the method of the present invention are proposed.
Fig. 3 is an alternative structural diagram of the terminal in the embodiment of the present invention. As shown in fig. 3, a terminal provided in an embodiment of the present invention may include: a detection module 301, an option display module 302 and a hiding module 303; wherein,
a detection module 301, configured to detect a first pressing operation of a user on a pressure screen for an application icon;
an option display module 302, configured to display at least one operation option configured in advance when it is determined that the parameter of the first pressing operation satisfies a preset condition;
a hiding module 303, configured to hide the application icon according to a hiding level corresponding to a second pressing operation when the second pressing operation for the at least one operation option is detected.
Here, in a normal working state of the terminal, the detecting module 301 detects a pressing operation of a user on a pressure screen of the terminal, including acquiring parameters corresponding to each detected pressing operation;
the parameters may include, for example, at least any one or a combination of the following: the duration of the pressing; the pressing strength; the number of consecutive presses.
In this embodiment of the present invention, the at least one operation option configured in advance may include: a preset prompt and at least one operation option; each operation option corresponds to different hiding levels; when a certain operation option is selected by the user, the hiding module 303 performs a corresponding hiding operation on the selected application icon according to the hiding level corresponding to the pressing operation, and then the selected application icon is no longer displayed on the pressure screen of the terminal.
In practical applications, the at least one operation option configured in advance may include: a first operation option and a second operation option; the first hiding level corresponds to the first operation option; a second hiding level corresponding to the second operation option; optionally, the second level of concealment has a higher security requirement than the first level of concealment, relatively speaking; for example, the first hidden level may be normal hiding, and when an application corresponding to the normal hiding needs to be displayed, the permission restriction is not needed, but the second hidden level is permission hiding, when an application corresponding to the permission hiding needs to be displayed, permission identification is needed, that is, authentication of a user needs to be performed, and the second hidden level has high security and is intended to prevent others from searching and operating the application.
Here, the identification information for authentication may include: fingerprint, password, etc. The identification information may be preset, or may be obtained in real time during the operation of hiding the application icon, for example, the user is guided to set during the operation of hiding the application icon, or the fingerprint information of the user is actively obtained and stored during the operation of hiding the application icon.
The hiding module 303 is specifically configured to:
when the second pressing operation is detected to be directed at the first operation option, namely when a user selects the first operation option through the second pressing operation, shielding and displaying the application icon according to a first hiding level corresponding to the first operation option, and storing the position information of the application icon into a first hiding area;
when the second pressing operation is detected to be directed at the second operation option, namely the user selects the second operation option through the second pressing operation, the application icon is shielded and displayed according to a second hiding level corresponding to the second operation option, the position information of the application icon is stored in a second hiding area, and the identity identification information of the user is stored. It should be noted that the first hidden area and the second hidden area may be different areas in the terminal.
FIG. 4a is an alternative diagram illustrating hiding application icons in an embodiment of the present invention; fig. 4b shows another alternative diagram of hiding application icons in the embodiment of the present invention. Referring to fig. 4a and 4b, when a certain application on the terminal desktop is pressed for a long time, for example, the chat application 1, when the continuous pressing time is greater than the preset time threshold, the following prompt information is selected, and there are two operation options in the prompt: 1. first-level hiding; 2. and (5) secondary hiding.
When a different hidden function is selected, corresponding hidden icon Identification (ID) information is registered in the corresponding location area:
if the first-level hiding is selected, the selected application can be hidden only by lightly clicking the corresponding position, and the corresponding application can be placed in a first-level position area (the area is a storage area arranged in the mobile phone and is specially used for storing the applications hidden in the same level);
if the secondary hiding option is selected, the corresponding application is placed in the secondary hiding area, and the fingerprint information is stored.
Fig. 4c shows another alternative schematic diagram of hiding the application icon in the embodiment of the present invention, and referring to fig. 4a and 4c, it can be seen that the icon of the chat application 1 has been hidden.
It should be noted that the continuous pressing time can be controlled to be about 5s, the time is long, the selection prompt message caused by the mistaken touch can be avoided, and even if the selection prompt message appears and is not selected in time, the selection prompt message can disappear rapidly.
In practice, the specific implementation of the preset condition has a certain correlation with the parameter; if the parameter of the pressing operation is determined as the continuous pressing time, the preset condition may be a preset time threshold; if the parameter of the pressing operation is determined to be the pressing intensity, the preset condition may be a preset pressing intensity threshold; if the parameter of the pressing operation is determined as the continuous pressing time, the preset condition may be a preset threshold value of the continuous pressing time within the specified time interval. The present invention is not particularly limited in this regard.
The following description will be given taking the parameters of the pressing operation as the duration of the pressing operation: the option display module 302 is specifically configured to display at least one operation option configured in advance when it is determined that the continuous pressing time of the first pressing operation is greater than a preset time threshold.
It should be noted that at least one application icon is displayed on the pressure screen of the terminal. When detecting a first pressing operation of a user on a pressure screen for a target application icon (the target application icon may refer to one application icon or to multiple application icons at the same time), the detection module 301 obtains a parameter of the first pressing operation, and sends the parameter of the first pressing operation to the option display module 302;
when the option display module 302 receives the parameter of the first pressing operation sent by the option display module 302, determining whether the parameter of the first pressing operation meets a preset condition; if the parameter of the first pressing operation meets the preset condition, displaying at least one operation option configured in advance;
in practice, the detection module 301 may detect a pressing operation of the user for at least one operation option pre-configured to be presented by the terminal; when a second press operation for a certain operation option of the at least one operation option is detected, notifying the hiding module 303; or, the hiding module 303 detects a pressing operation of the user for at least one operation option pre-configured to be presented by the terminal;
when detecting a second pressing operation for an operation option in the at least one operation option, the hiding module 303 learns a hiding level selected by the user for the target application icon according to a hiding level corresponding to the operation option selected by the second pressing operation; and hiding the target application icon according to the hiding level.
In the prior art, common applications and uncommon applications are easy to be mixed together, so that the searching is troublesome, and the scheme of using the third-party apk has the defects of complex operation, occupation of mobile phone memory and easy finding and operation by others; compared with the prior art, in the embodiment of the invention, when the option display module determines that the parameter of the first pressing operation performed by the user on the application icon on the pressure screen meets the preset condition, at least one operation option which is configured in advance is displayed on the pressure screen, and the application icon is hidden according to the hidden grade corresponding to the operation option selected by the user from the at least one operation option, so that the application icon is quickly hidden in a graded way; that is to say, the user can select different hiding levels according to prompt options by pressing the application icon, so that the purpose of classifying and hiding the application can be achieved, the operation is convenient, the memory consumption of the terminal is reduced, and the safety of the hidden application is improved.
Fig. 5 is a schematic diagram of another alternative structure of the terminal in the embodiment of the present invention. Fig. 5 shows a terminal based on the structure of fig. 3, and referring to fig. 5, the terminal provided in the embodiment of the present invention also includes: the system comprises a detection module 301, an option display module 302 and a hiding module 303, wherein each functional module also has the functions and the connection relation shown in fig. 3; meanwhile, the terminal provided by the embodiment of the invention further comprises:
an icon display module 501, configured to:
when a third pressing operation at a first designated position of the pressure screen is detected, acquiring position information of an application icon to be displayed from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information;
when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; and when the identity authentication is determined to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
Here, the first designated position and the second designated position may be different position areas on the pressure screen of the terminal, respectively, and the first designated position and the second designated position may be designated in advance. The third pressing operation is a pressing operation whose parameters satisfy a certain condition, for example, the time required for continuously pressing the first designated position is longer than 3 s. The fourth pressing operation is a pressing operation whose parameter satisfies another condition, such as 3 consecutive clicks on the second designated position, that is, 3 consecutive presses.
In practical applications, the icon display module 501 is specifically configured to:
when detecting a third pressing operation at a first designated position of the pressure screen, acquiring a name abbreviation of an application to be displayed; acquiring position information of an application icon to be displayed corresponding to the name abbreviation from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information;
when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; when the identity authentication is determined to pass, acquiring the name shorthand of the application to be displayed; and acquiring the position information of the application icon to be displayed corresponding to the name abbreviation from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
In practice, different display methods can be set according to the requirements of users for displaying different levels of applications; for example, when a first-level hidden application needs to be displayed, the hidden application can be displayed only by pressing a certain position of the screen for 3s, or an option menu can be set in the setting (for example, a 'hidden application display' menu is set, two options are provided after clicking in, one is a first-level hidden display, the other is a second-level hidden display, when clicking the first-level hidden display, all the first-level hidden applications can be displayed, when selecting the second-level hidden menu, a fingerprint input prompt box can be popped up, only correct fingerprint information is input, and the related second-level hidden applications can be displayed), for the application of the second-level hiding, a prompt of 'please input fingerprint information' appears when a certain position of the screen is continuously clicked for 3 times, and the corresponding second-level hidden application can be displayed only after the corresponding fingerprint information is input.
In the embodiment of the invention, when detecting a third pressing operation at a first designated position of the pressure screen, an icon display module acquires position information of an application icon to be displayed from the first hidden area, and displays the application icon to be displayed in an area corresponding to the position information; when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; and when the identity authentication is determined to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information, thereby realizing the purpose of respectively displaying the applications with different hidden levels according to different safety degrees. For the application corresponding to the first hiding level, no authority limit exists, and if a common person knows the pressing rule, the hidden application can be displayed; for the application corresponding to the second hiding level, identity recognition is added, the hidden application can be displayed only after the identity recognition is successful, the hidden application is high in density, and is not found and operated by others, so that the hidden application is convenient to operate, and the security of the hidden application is improved.
Fig. 6 is an optional flowchart of an application icon hiding method according to an embodiment of the present invention. As shown in fig. 6, the method for hiding an application icon according to the embodiment of the present invention includes:
601, detecting a first pressing operation of a user on a pressure screen aiming at an application icon;
step 602, when determining that the parameter of the first pressing operation meets a preset condition, displaying at least one operation option configured in advance;
step 603, hiding the application icon according to the hiding level corresponding to the second pressing operation when the second pressing operation aiming at the at least one operation option is detected.
Here, the execution subject of the application icon hiding method may be a terminal.
In the embodiment of the invention, when determining that the parameter of the first pressing operation performed by the user on the application icon on the pressure screen meets the preset condition, displaying at least one operation option configured in advance on the pressure screen, and hiding the application icon according to the hiding level corresponding to the operation option selected by the user from the at least one operation option, thereby realizing the purpose of quickly hiding the application icon in a grading manner; that is to say, the user can select different hiding levels according to prompt options by pressing the application icon, so that the purpose of classifying and hiding the application can be achieved, the operation is convenient, the memory consumption of the terminal is reduced, and the safety of the hidden application is improved.
On the basis of the above embodiments, one possible implementation manner of step 602 includes: and when the continuous pressing time of the first pressing operation is determined to be greater than a preset time threshold, displaying at least one operation option which is configured in advance.
Here, the at least one operation option includes: a first operation option and a second operation option;
one possible implementation of step 602 includes:
when the second pressing operation is detected to be directed at the first operation option, shielding and displaying the application icon according to a first hiding level corresponding to the first operation option, and storing position information of the application icon into a first hiding area;
and when the second pressing operation is detected to be directed at the second operation option, shielding and displaying the application icon according to a second hiding level corresponding to the second operation option, storing the position information of the application icon into a second hiding area, and storing the identity identification information of the user.
Here, the identification information may include: a fingerprint or a password.
On the basis of the embodiment, when the terminal detects a third pressing operation at the first designated position of the pressure screen, the terminal acquires the position information of the application icon to be displayed from the first hidden area and displays the application icon to be displayed in the area corresponding to the position information; specifically, when the terminal detects a third pressing operation at a first designated position of the pressure screen, acquiring a name abbreviation of an application to be displayed; and acquiring the position information of the application icon to be displayed corresponding to the name abbreviation from the first hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
When the terminal detects a fourth pressing operation at a second appointed position of the pressure screen, the identity of the user is verified based on the identity identification information; when the identity authentication is confirmed to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information; specifically, when a fourth pressing operation at a second appointed position of the pressure screen is detected, the user is authenticated based on the identification information; when the identity authentication is determined to pass, acquiring the name shorthand of the application to be displayed; and acquiring the position information of the application icon to be displayed corresponding to the name abbreviation from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
Fig. 7 is another alternative flow chart illustrating hiding an application icon according to an embodiment of the present invention. As shown in fig. 7, the method for hiding an application icon according to the embodiment of the present invention includes:
step 1) when a certain application is to be hidden, the application is pressed, and when the application is pressed to a certain force, for example, about 3s, a selection prompt appears for a user to select: 1. first-level hiding; 2. secondary hiding;
and 2) storing related hidden application ID (namely application name) and current position coordinate (X, Y) information in a classified manner according to the hidden level selected by the user, and if secondary hiding is selected, storing fingerprint information.
Fig. 8a, 8b and 8c are schematic diagrams illustrating displaying hidden application icons in the embodiment of the present invention. The method provided by the embodiment of the invention comprises the following steps:
step 1, pressing application: pressing any position or a designated position of the mobile phone interface for 3s for a long time or continuously clicking a certain position of a screen for 3 times (3s is for first-level hidden application; 3 times is for second-level hidden application); a press event is triggered.
Step 2, after receiving the pressing event, selecting and displaying the application according to the pressing time:
if the application is continuously pressed for 3s, a prompt box pops up, referring to fig. 8a, the application can be displayed by inputting the abbreviation of the corresponding application name in the prompt box, if the application needs to be searched for the WeChat, only the wx needs to be input, and the application with the wx abbreviation of the two application names can be displayed by a series of matching searches. When displaying, firstly reading back the position coordinates (X, Y) before the application stored in the current hidden area, simultaneously checking whether the position area of the current screen is occupied by other applications, if the hidden application is not displayed in the area, if other applications are available, checking whether the current screen has an application position which can be stored, and placing the application at a corresponding position after finding. And if no available position exists, giving a prompt of 'the hidden application can be displayed only by adjusting the application layout of the screen interface', and the like.
If a certain position of the screen is continuously clicked for 3 times, each interval is less than 1s, if each interval is more than 1s, a prompt box is triggered to be displayed on an interface to enable a user to input fingerprint information, referring to fig. 8c, only if the user inputs a correct fingerprint (note: if no two-stage hidden application exists at present, even if the screen is continuously clicked for 3 times, the prompt box is not popped up, so that the current application without any two-stage hidden application can be prevented, if the prompt box appears for 3 times, bad experience can be brought to the user), the two-stage hidden application can be displayed, when in display, the position coordinates (X, Y) of the application stored in the current hidden area can be read firstly, whether other applications occupy the position area of the current screen or not can be checked, if no hidden application occupies the area, the two-stage hidden applications can be displayed in the area, if other applications exist, whether the applications are displayed in the idle area or not is prompted, whether the application positions which can be stored exist in the current screen or not is checked, and the applications are placed in the corresponding positions after the applications are found. If no position is available, a prompt is given, and similarly, the screen interface application layout needs to be adjusted to display a prompt such as a hidden application.
It should be noted that the application of the secondary hiding is generally an important application, and such an application is generally an application that is not intended to be seen and operated by others, so the secondary hiding is set.
The embodiment of the invention has the advantages that different hiding authorities can be selectively set for the application, the operation is convenient, and the hiding method is novel. Compared with the traditional hiding mode, the method is more convenient.
The application icon hiding method provided by the embodiment of the invention can be applied to a terminal, the function realized by the application icon hiding method can be realized by calling a program code through a processor in the terminal, the program code can be saved in a computer storage medium, and the terminal at least comprises the processor and the storage medium.
Here, it should be noted that: the above description of the embodiment of the apparatus is similar to the above description of the embodiment of the method, and has similar beneficial effects to the embodiment of the method, and therefore, the description thereof is omitted. For technical details that are not disclosed in the method embodiment of the present invention, please refer to the description of the apparatus embodiment of the present invention for understanding, and therefore, for brevity, will not be described again.
Here, it should be noted that: the description of the terminal embodiment is similar to the description of the method, and has the same beneficial effects as the method embodiment, and therefore, the description is omitted. For technical details that are not disclosed in the embodiment of the method of the present invention, those skilled in the art should refer to the description of the embodiment of the terminal of the present invention to understand that, for brevity, detailed description is omitted here.
The detection module, the option display module, the hiding module and the icon display module in the terminal provided by the embodiment of the invention can be realized by a processor in the terminal; of course, the implementation can also be realized through a specific logic circuit; in the course of a particular embodiment, the processor may be a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention. The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a magnetic disk, or an optical disk.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a magnetic or optical disk, or other various media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (8)

1. A terminal having a communication function, the terminal comprising:
the detection module is used for detecting a first pressing operation of a user on the pressure screen aiming at the application icon;
the option display module is used for displaying at least one operation option which is configured in advance when the parameter of the first pressing operation meets the preset condition;
the hiding module is used for hiding the application icon according to a hiding level corresponding to the second pressing operation when the second pressing operation aiming at the at least one operation option is detected;
wherein the at least one operational option comprises: a first operation option and a second operation option;
the hiding module is specifically configured to:
when the second pressing operation is detected to be directed at the first operation option, shielding and displaying the application icon according to a first hiding level corresponding to the first operation option, and storing position information of the application icon into a first hiding area;
and when the second pressing operation is detected to be directed at the second operation option, shielding and displaying the application icon according to a second hiding level corresponding to the second operation option, storing the position information of the application icon into a second hiding area, and storing the identity identification information of the user.
2. The terminal of claim 1, wherein the option display module is specifically configured to:
and when the continuous pressing time of the first pressing operation is determined to be greater than a preset time threshold, displaying at least one operation option which is configured in advance.
3. The terminal of claim 1, further comprising:
an icon display module to: when a third pressing operation at a first designated position of the pressure screen is detected, acquiring position information of an application icon to be displayed from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information;
the icon display module is further configured to: when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; and when the identity authentication is determined to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
4. The terminal according to claim 3, wherein the icon display module is specifically configured to:
when detecting a third pressing operation at a first designated position of the pressure screen, acquiring a name abbreviation of an application to be displayed; acquiring position information of an application icon to be displayed corresponding to the name abbreviation from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information;
when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; when the identity authentication is determined to pass, acquiring the name shorthand of the application to be displayed; and acquiring the position information of the application icon to be displayed corresponding to the name abbreviation from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
5. An application icon hiding method is characterized by comprising the following steps:
detecting a first pressing operation of a user on a pressure screen aiming at an application icon;
when the parameter of the first pressing operation is determined to meet a preset condition, displaying at least one operation option configured in advance;
when a second pressing operation aiming at the at least one operation option is detected, hiding the application icon according to a hiding level corresponding to the second pressing operation;
wherein the at least one operational option comprises: a first operation option and a second operation option;
when a second pressing operation for the at least one operation option is detected, hiding the application icon according to a hiding level corresponding to the second pressing operation, including:
when the second pressing operation is detected to be directed at the first operation option, shielding and displaying the application icon according to a first hiding level corresponding to the first operation option, and storing position information of the application icon into a first hiding area; or,
and when the second pressing operation is detected to be directed at the second operation option, shielding and displaying the application icon according to a second hiding level corresponding to the second operation option, storing the position information of the application icon into a second hiding area, and storing the identity identification information of the user.
6. The method of claim 5, wherein the determining that the parameter of the first pressing operation satisfies a preset condition, the displaying at least one operation option configured in advance comprises:
and when the continuous pressing time of the first pressing operation is determined to be greater than a preset time threshold, displaying at least one operation option which is configured in advance.
7. The method of claim 5, further comprising:
when a third pressing operation at a first designated position of the pressure screen is detected, acquiring position information of an application icon to be displayed from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information; or,
when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; and when the identity authentication is determined to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
8. The method according to claim 7, wherein when detecting a third pressing operation at a first designated position of the pressure screen, acquiring position information of an application icon to be displayed from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information, comprises:
when detecting a third pressing operation at a first designated position of the pressure screen, acquiring a name abbreviation of an application to be displayed; acquiring position information of an application icon to be displayed corresponding to the name abbreviation from the first hidden area, and displaying the application icon to be displayed in an area corresponding to the position information;
when the fourth pressing operation at the second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; when the identity authentication is determined to pass, acquiring the position information of the application icon to be displayed from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information, wherein the method comprises the following steps:
when a fourth pressing operation at a second appointed position of the pressure screen is detected, carrying out identity verification on the user based on the identity identification information; when the identity authentication is determined to pass, acquiring the name shorthand of the application to be displayed; and acquiring the position information of the application icon to be displayed corresponding to the name abbreviation from the second hidden area, and displaying the application icon to be displayed in the area corresponding to the position information.
CN201610604888.9A 2016-07-28 2016-07-28 Application icon hidden method and terminal Active CN106228043B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610604888.9A CN106228043B (en) 2016-07-28 2016-07-28 Application icon hidden method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610604888.9A CN106228043B (en) 2016-07-28 2016-07-28 Application icon hidden method and terminal

Publications (2)

Publication Number Publication Date
CN106228043A CN106228043A (en) 2016-12-14
CN106228043B true CN106228043B (en) 2019-05-24

Family

ID=57533278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610604888.9A Active CN106228043B (en) 2016-07-28 2016-07-28 Application icon hidden method and terminal

Country Status (1)

Country Link
CN (1) CN106228043B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106648324B (en) * 2016-12-28 2020-11-10 合肥恒研智能科技有限公司 Hidden icon control method and device and terminal
CN108536363A (en) * 2017-03-03 2018-09-14 上海传英信息技术有限公司 Program assembly display processing method and system applied to mobile terminal
CN107329662A (en) * 2017-07-14 2017-11-07 深圳天珑无线科技有限公司 The display methods and device of a kind of desktop

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915119A (en) * 2015-06-24 2015-09-16 努比亚技术有限公司 Regulation method and device of terminal desktop icon
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device
CN105224171A (en) * 2015-09-22 2016-01-06 小米科技有限责任公司 icon display method, device and terminal
CN105718199A (en) * 2016-01-20 2016-06-29 广东欧珀移动通信有限公司 Control method of application program and mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140012828A (en) * 2012-07-23 2014-02-04 조성재 The operation method of privacy protection and relief application for smartphone user
KR101683872B1 (en) * 2014-10-22 2016-12-07 편상연 Icon-controllable Terminal using Rotating

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device
CN104915119A (en) * 2015-06-24 2015-09-16 努比亚技术有限公司 Regulation method and device of terminal desktop icon
CN105224171A (en) * 2015-09-22 2016-01-06 小米科技有限责任公司 icon display method, device and terminal
CN105718199A (en) * 2016-01-20 2016-06-29 广东欧珀移动通信有限公司 Control method of application program and mobile terminal

Also Published As

Publication number Publication date
CN106228043A (en) 2016-12-14

Similar Documents

Publication Publication Date Title
CN106130734A (en) The control method of mobile terminal and control device
CN104932697B (en) Gesture unlocking method and device
CN106534560B (en) Mobile terminal control device and method
CN104951229B (en) Screenshot method and device
CN105353947A (en) Mobile terminal and application display content controlling method
CN106843723A (en) A kind of application program associates application method and mobile terminal
CN106485163A (en) Control method and control device that mobile terminal data storehouse accesses
CN106020706A (en) Touch operation processing method and mobile terminal
CN105049612A (en) Method of realizing recording and device of realizing recording
CN106228043B (en) Application icon hidden method and terminal
CN105260096B (en) A kind of method and mobile terminal controlling user's operation
CN106020677A (en) Information processing method and mobile terminal
CN107197084B (en) Method for projection between mobile terminals and first mobile terminal
CN106095308B (en) The method of mobile terminal and dummy keyboard false-touch prevention
CN105094598A (en) Device and method for processing operational objects
CN106569670B (en) Device and method for processing application
CN105045508B (en) The setting device and method of system model
CN105357188B (en) A kind of method that realizing WIFI connections, server and mobile terminal
CN105162967B (en) A kind of apparatus and method searching for focus
CN104978140B (en) A kind of information processing method and mobile terminal
CN106649753B (en) Data processing method and electronic equipment
CN104932711A (en) Method and device for realizing input mode switching
CN105141834A (en) Device and method for controlling picture shooting
CN105094610B (en) The apparatus and method for handling incidence relation
CN106506785B (en) Terminal and encryption method for realizing terminal theft prevention

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant