CN108153460B - Icon hiding method and terminal - Google Patents

Icon hiding method and terminal Download PDF

Info

Publication number
CN108153460B
CN108153460B CN201711376280.6A CN201711376280A CN108153460B CN 108153460 B CN108153460 B CN 108153460B CN 201711376280 A CN201711376280 A CN 201711376280A CN 108153460 B CN108153460 B CN 108153460B
Authority
CN
China
Prior art keywords
icon
interface
hidden
user
icons
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711376280.6A
Other languages
Chinese (zh)
Other versions
CN108153460A (en
Inventor
郭广饶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201711376280.6A priority Critical patent/CN108153460B/en
Publication of CN108153460A publication Critical patent/CN108153460A/en
Application granted granted Critical
Publication of CN108153460B publication Critical patent/CN108153460B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
    • H04M1/72472User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons wherein the items are sorted according to specific criteria, e.g. frequency of use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/12Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses an icon hiding method and a terminal, relates to the technical field of terminals, and aims to solve the problem that when an application program is hidden in the prior art, a folder in which the application program and a file to be hidden are placed cannot be effectively hidden, so that the hiding effect is poor. The method comprises the following steps: receiving a first operation, wherein the first operation is an operation of moving a first icon on a first interface by a user; responding to a first operation, and controlling a first icon to move on the first interface; and displaying the second interface under the condition that the arrangement mode of at least two second icons in the first interface is the same as the arrangement mode of the preset icons, wherein the arrangement mode of the at least two second icons is determined according to the result of the first icon moving on the first interface, and the second interface comprises at least one hidden icon.

Description

Icon hiding method and terminal
Technical Field
The invention relates to the technical field of terminals, in particular to an icon hiding method and a terminal.
Background
With the gradual increase of hardware configuration and function expansion of mobile terminals (e.g., mobile phones), mobile terminals have become indispensable in daily life, and a large number of users are more accustomed to directly storing information on the mobile terminals. At this time, security of information stored in the mobile terminal also becomes important. Nowadays, many applications are installed in most mobile terminals, and the entry of each application appears on the desktop in the form of an icon, but for some private applications (e.g. applications for payment) and files (e.g. notebooks with important data recorded therein), the user may not want to find them out. For this situation, the processing method common today is: these private applications and files are stored in the handset in a hidden form.
In the prior art, an application program and a file which need to be hidden are mainly placed in a folder, the folder is encrypted, and the application program and the file stored in the folder can be hidden after the folder is encrypted. However, the encrypted folder is still displayed on the desktop, and for an operator of the mobile terminal (e.g., a mobile phone), the operator can still see the encrypted folder and know that the hidden application and the hidden file exist in the terminal, so that the hiding effect is not good.
Disclosure of Invention
The embodiment of the invention provides an icon hiding method and a terminal, which are used for solving the problem of poor hiding effect caused by the fact that a folder in which an application program and a file to be hidden are placed cannot be effectively hidden when the application program is hidden in the prior art.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an icon hiding method, where the method includes:
receiving a first operation, wherein the first operation is an operation of moving a first icon on a first interface by a user;
in response to the first operation, controlling the first icon to move on the first interface;
and under the condition that the arrangement mode of at least two second icons in the first interface is the same as the arrangement mode of preset icons, displaying at least one hidden icon in the second interface, wherein the arrangement mode of the at least two second icons is determined according to the result of the first icon moving on the first interface.
In a second aspect, an embodiment of the present invention provides a terminal, where the terminal includes:
the receiving module is used for receiving a first operation, wherein the first operation is an operation of moving a first icon on a first interface by a user;
a response module to respond to the first operation;
the control module is used for controlling the first icon to move on the first interface;
and the display module is used for displaying at least one hidden icon in the second interface under the condition that the arrangement mode of at least two second icons in the first interface is the same as the arrangement mode of preset icons, wherein the arrangement mode of the at least two second icons is determined according to the result of the first icon moving on the first interface.
In a third aspect, an embodiment of the present invention provides a terminal, including a processor, a memory, and a computer program stored on the memory and operable on the processor, where the computer program, when executed by the processor, implements the steps of the icon hiding method according to the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the icon hiding method according to the first aspect.
In the embodiment of the invention, after receiving a first operation of moving a first icon on a first interface by a user, a terminal responds to the first operation and controls the first icon to move on the first interface, and then displays a hidden icon in a second interface under the condition that the arrangement mode of a plurality of second icons in the first interface is the same as the arrangement mode of preset icons. Because the second interface comprises at least one hidden icon and the arrangement mode of the plurality of second icons is determined according to the result of the first icon moving on the first interface, the embodiment of the invention can use the arrangement mode of the icons in the interface as a password to hide the application program icons. Thus, for an operator of a terminal (e.g., a mobile phone), unless the set password is known, the operator cannot know the hidden application program, or even know whether the application program is hidden in the current terminal at all.
Drawings
FIG. 1 is a schematic diagram of icon hiding in a conventional icon hiding method;
fig. 2 is a schematic structural diagram of an android operating system according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of an icon hiding method according to an embodiment of the present invention;
FIG. 4 is a schematic interface diagram of a second interface according to an embodiment of the present invention;
fig. 5 is a schematic diagram of an arrangement shape of icons according to an embodiment of the present invention;
fig. 6 is a schematic diagram of an arrangement sequence of icons according to an embodiment of the present invention;
fig. 7 is a flowchart illustrating another icon hiding method according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a setting interface of a hidden icon password according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
Detailed Description
In the prior art, a terminal encrypts a folder mainly by placing an application program to be hidden in the folder, and the folder can hide the application program stored in the folder after being encrypted. For example, taking a mobile phone as an example, as shown in fig. 1(a), when a user needs to hide icons a1, a2, and a3 corresponding to three applications, respectively, the icons a1, a2, and a3 may be placed in folders (e.g., b1 in fig. 1 (a)) to encrypt files. After the file is encrypted, as shown in fig. 1(b), the encrypted folder (e.g., b2 in fig. 1 (b)) is still displayed on the desktop, and although the folder is opened to be empty, for the operator of the terminal (e.g., a mobile phone), the operator can still see the encrypted folder and can know that the hidden application exists in the terminal, so that the hiding effect is not good.
The problem that when an application program or a file is hidden in the prior art, the hiding effect is poor is solved. The icon hiding method provided by the embodiment of the invention uses the arrangement mode of the icons in the interface as the password to hide the application program icons. Thus, for an operator of a mobile terminal (e.g., a mobile phone), unless the set password is known, the operator cannot know the hidden application program, or even know whether the application program is hidden in the current terminal.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship. The term "plurality" herein means two or more, unless otherwise specified.
For the convenience of clearly describing the technical solutions of the embodiments of the present invention, in the embodiments of the present invention, the words "first", "second", and the like are used to distinguish the same items or similar items with basically the same functions or actions, and those skilled in the art can understand that the words "first", "second", and the like do not limit the quantity and execution order.
It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion. In the embodiments of the present invention, "of", "corresponding" and "corresponding" may be sometimes used in combination, and it should be noted that the intended meaning is consistent when the difference is not emphasized.
The terminal provided by the embodiment of the invention is a terminal with a foldable screen, and comprises a plurality of sub-screens, and adjacent sub-screens can be combined for use. Illustratively, the terminal may be a mobile phone with a foldable screen, a tablet Computer, a desktop Computer, a laptop Computer, a notebook Computer, an Ultra-mobile Personal Computer (UMPC), a handheld Computer, a netbook, a Personal Digital Assistant (PDA), a wearable electronic device, or a smart watch, and the embodiment of the present invention is not limited to a specific form of the terminal.
Icons mentioned in embodiments of the present invention include, but are not limited to: graphical identifiers of applications displayed in each display interface in the terminal, i.e., application icons, for example, icons a 1-a 3 in fig. 1; and graphic marks of each file in the terminal, such as WORD icon, notepad icon, photo thumbnail icon, etc.
The terminal in the embodiment of the present invention may be a terminal having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present invention are not limited in particular.
The following describes a software environment to which the icon hiding method provided by the embodiment of the present invention is applied, by taking an android operating system as an example.
Fig. 2 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention. In fig. 2, the architecture of the android operating system includes 4 layers, which are respectively: an application program layer, an application program framework layer, a system runtime library layer and a kernel layer (specifically, the system runtime library layer may be a Linux kernel layer), wherein:
the application layer comprises various applications (including system applications and third party applications) in the android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of complying with the development principle of the framework of the application.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the icon hiding method provided in the embodiment of the present invention based on the system architecture of the android operating system shown in fig. 2, so that the icon hiding method may operate based on the android operating system shown in fig. 2. Namely, the processor or the terminal can implement the icon hiding method provided by the embodiment of the invention by running the software program in the android operating system.
The icon hiding method provided by the embodiment of the present invention may be applied to a terminal, and may also be applied to other terminal devices such as a terminal device with an operating system.
The first embodiment:
referring to fig. 3, a method for hiding an icon according to an embodiment of the present invention is described, as shown in fig. 3, the method for hiding an icon may include:
s201, the terminal receives a first operation.
The first operation is an operation of moving a first icon on the first interface by a user, and the first icon is one or more icons in the first interface.
The first operation input by the user may specifically be: and the user drags the first icon on the first interface to move the position of the first icon. Further, the first operation may also be other touch operations of the user, or a voice instruction input by the user, or a specific gesture input by the user. Illustratively, the specific gesture may be any one of a single-tap gesture, a swipe gesture, a pressure recognition gesture, a long-tap gesture, an area change gesture, a double-tap gesture, and a double-tap gesture.
S202, the terminal responds to the first operation and controls the first icon to move on the first interface.
After the user moves the first icon on the first interface, the terminal controls the first icon to move on the first interface by monitoring the moving track of the first icon on the first interface.
S203, the terminal displays at least one hidden icon in the second interface under the condition that the arrangement mode of at least two second icons in the first interface is the same as the arrangement mode of the preset icons.
The arrangement mode of at least two second icons in the first interface is determined according to the result of the first icon moving on the first interface.
Wherein, the second interface is a hidden icon display interface, and the second interface includes: at least one hidden icon. The hidden icon is an icon of an application or a file (e.g., a notepad) that needs to be hidden, wherein the application that needs to be hidden includes: APP and terminal-carried system application.
Further, in some embodiments of the present invention, the second interface further comprises: and adding a function button for hiding the icon. Through which the user can add hidden icons. Furthermore, in order to facilitate management, the second interface includes two function buttons, namely a function button for adding an APP icon and a function button for adding a file icon, wherein the function button for adding the APP icon is mainly used for adding the APP icon, and the function button for adding the file icon is mainly used for adding the file icon.
For example, as shown in the second interface schematic diagram shown in fig. 4, the second interface c shown in fig. 4 includes: a hidden icon c1 and function controls (c 21 and c22 in fig. 4) for adding hidden icons, wherein the hidden icon c1 is further divided into hidden APP icons (such as a pan icon, a WeChat icon and a stock icon in fig. 4) and hidden file icons (such as a notepad), and the function buttons include a function button c21 for adding APP application icons (a function button c21 with a button name of "application hidden" in fig. 4) and a function button c22 for adding file icons (a function button c22 with a button name of "file hidden" in fig. 4).
For example, after the user moves the first icon on the first interface, the terminal determines that the arrangement mode of some or all icons in the first interface is the same as the preset icon arrangement mode according to the result of the movement of the first icon on the first interface, and unlocks and displays the second interface, so that the user can view the hidden icon in the second interface.
Optionally, the icon arrangement manner in the embodiment of the present invention includes: icon arrangement shape and/or icon arrangement order. The arrangement order of the icons refers to the application names of the icons or the arrangement order of the patterns corresponding to the icons.
For the icon arrangement shape:
in one example, when a user moves an icon on a first interface, the terminal compares the arrangement shape formed by the icons in the first interface with a preset icon arrangement shape by monitoring the arrangement shape formed by the icons in the first interface after the icon is moved, and displays a second interface if the arrangement shape formed by all or part of the icons in the first interface is consistent with the preset icon arrangement shape.
For example, the preset icon arrangement shape set by the terminal is shown in fig. 5 (a). As shown in fig. 5(b), the main interface of the terminal includes 5 icons, and the arrangement shape of the start icon of the 5 icons is shown in fig. 5 (b). If the user moves the icon 2, the icon 3, and the icon 4 in the main interface to form the shape as shown in fig. 5(c), since the icon arrangement shape formed by the icon 1, the icon 2, the icon 3, and the icon 4 in fig. 4(c) is consistent with the preset icon arrangement shape as shown in fig. 5(a), the second interface is opened, and the second interface is as shown in fig. 4.
Aiming at the arrangement sequence of the icons:
in one example, when a user moves icons on a first interface, the terminal compares the icon arrangement sequence of the icons in the first interface with a preset icon arrangement sequence by monitoring the icon arrangement sequence in the first interface after the icons are moved, and displays a second interface if the icon arrangement sequence of all or part of the icons in the first interface is consistent with the preset icon arrangement sequence.
For example, the preset icon arrangement sequence set by the terminal is shown in fig. 6(a), and the specific icon arrangement sequence set by the user is photographing, weather, microblog and browser. As shown in fig. 6(b), the main interface of the terminal includes 5 icons, which are a photograph, a microblog, a calculator, a browser, and weather, respectively, and the initial icon arrangement shapes of the 5 icons are as shown in fig. 6 (b). If the user moves the microblog, the calculator and the weather in the main interface (i.e., the icons in the circle in fig. 6 (b)) to form the shape shown in fig. 6(c), since the arrangement order of the icons in fig. 6(c) is consistent with the arrangement order of the preset icons shown in fig. 6(a), the second interface is opened, and the second interface is shown in fig. 4.
Of course, the embodiment of the present invention may also combine the icon arrangement shape with the icon arrangement order for use, and the user may open the second interface only if the icon arrangement order of all or part of the icons in the first interface is consistent with the predetermined icon arrangement order, and the icon arrangement shape of all or part of the icons in the first interface is consistent with the preset icon arrangement shape.
It should be noted that the first interface in the embodiment of the present invention is mainly used to provide an interface capable of forming icons in different arrangement modes for a user, so that the user forms an icon arrangement shape and/or an icon arrangement sequence capable of decrypting the second interface by moving the icon in the first interface. Therefore, the first interface in the embodiment of the present invention is not limited to the main interface of the terminal, and may be any interface including an icon in the terminal.
The first interface in the embodiment of the present invention is not limited to an interface in a terminal, and may also be an interface of another terminal (e.g., a wearable mobile terminal, such as a smart terminal, etc.). For example, the user uses the icon arrangement mode of the icons in the interface of the smart watch as the password for opening the second interface in the terminal, so that the security and the concealment of the data hidden in the terminal are further improved.
In addition, when the second interface is displayed and then switched to the first interface again, the terminal can disturb the arrangement shape and sequence of the icons in the first interface by reminding the user to move the icons in the first interface so as to avoid password leakage.
In the embodiment of the invention, after receiving a first operation of moving a first icon on a first interface by a user, a terminal responds to the first operation and controls the first icon to move on the first interface, and then displays a hidden icon in a second interface under the condition that the arrangement mode of a plurality of second icons in the first interface is the same as the arrangement mode of preset icons. Because the second interface comprises at least one hidden icon and the arrangement mode of the plurality of second icons is determined according to the result of the first icon moving on the first interface, the embodiment of the invention can use the arrangement mode of the icons in the interface as a password to hide the application program icons. Thus, for an operator of a mobile terminal (e.g., a terminal), unless the set password is known, the hidden application cannot be known, and even whether the application is hidden in the current terminal is not known at all. Compared with the existing hiding method, the hiding method provided by the embodiment of the invention is simple to operate, low in cost, high in safety and good in hiding performance, and can bring better user experience to users.
After the second interface is displayed, the user can perform various operations on the second interface.
Optionally, after the second interface is displayed, the user may perform the next operation on the hidden icon in the second interface. Illustratively, after S203, the method further includes the steps of:
s204a, the terminal receives the second operation.
The second operation is the operation of the first hidden icon by the user. The at least one hidden icon includes a first hidden icon, and the first hidden icon is one or more hidden icons.
Specifically, the second operation input by the user may specifically be: the first hidden icon is pressed by the user, or the first hidden icon is clicked by the user, or a voice instruction input by the user, or a specific gesture input by the user. Illustratively, the specific gesture may be any one of a single-tap gesture, a swipe gesture, a pressure recognition gesture, a long-press gesture, a double-press gesture, and a double-tap gesture. Illustratively, the second operation of user input includes: opening the application or file corresponding to the hidden icon, deleting the hidden icon, moving the hidden icon, and the like.
And S204b, the terminal responds to the second operation and executes a control action corresponding to the second operation on the first hidden icon.
Further, in one example, the second operation includes: an operation of opening an application program or a file corresponding to the first hidden icon, where the corresponding 204b specifically includes:
204b1, the terminal opens the application or file corresponding to the first hidden icon.
For example, the second operation may be a click operation or a press operation of the first hidden icon by the user.
Further, in one example, the second operation includes: deleting the first hidden icon, where the corresponding 204b specifically includes:
204b2, the terminal deletes the first hidden icon.
For example, the second operation may be a long-press operation or a double-click operation of the first hidden icon by the user.
Optionally, after the second interface is displayed, if the second interface further includes: and adding the function control of the hidden icon, and then the user can execute the next operation on the function control added with the hidden icon in the second interface.
Illustratively, after S203, the method further includes the steps of:
s205a, the terminal receives the third operation.
The third operation is the operation of the user on the function control.
Specifically, the third operation input by the user may specifically be: the pressing operation of the user on the function control, or the clicking operation of the function control, or the voice instruction input by the user, or the specific gesture input by the user. Illustratively, the specific gesture may be any one of a single-tap gesture, a swipe gesture, a pressure recognition gesture, a long-press gesture, a double-press gesture, and a double-tap gesture.
And S205b, the terminal responds to the third operation and displays the icon to be selected in the third interface.
It should be noted that the third interface may be an interface newly displayed by the terminal, or may be a floating interface displayed on an upper layer of the second interface in a floating manner, which is not limited herein.
S205c, the terminal receives the fourth operation.
The fourth operation is a selection operation of the user on the icon to be selected.
Specifically, the fourth operation input by the user may specifically be: the method comprises the following steps that a user presses or clicks a to-be-selected icon, or a voice instruction input by the user, or a specific gesture input by the user. Illustratively, the specific gesture may be any one of a single-tap gesture, a swipe gesture, a pressure recognition gesture, a long-press gesture, a double-press gesture, and a double-tap gesture.
And S205d, the terminal responds to the fourth operation and adds the icon selected by the user in the second interface.
Illustratively, the terminal adds the icon selected by the user in the second interface, including but not limited to the following two ways:
mode 1: after receiving the fourth operation, the terminal may directly jump to the second interface and display the icon selected by the user in the second interface. For example, as shown in the second interface shown in fig. 4, a user may click a hidden icon that has been hidden, and open an application program corresponding to the hidden icon, or, a user clicks a function button for adding an APP application icon, and enters a desktop, and selects an application icon that needs to be hidden, where the third interface is a main interface of the terminal, or a user clicks a function button for adding a file icon, enters a file manager, and selects a file icon that needs to be hidden, where the third interface is an interface of the file manager.
Mode 2: after receiving the fourth operation, the terminal directly responds to the fourth operation without jumping to a new interface, and adds the icon to the hidden icon list for display, namely, when the user unlocks the second interface again, the hidden icon in the hidden icon list is displayed in the second interface.
Further, when the terminal adds the icon selected by the user in the second interface, it indicates that the application program or file corresponding to the icon selected by the user is the application program or file that the user needs to hide. In order to ensure the hiding effect, the terminal can hide the application program or the file corresponding to the icon selected by the user while adding the icon selected by the user in the second interface, so that the user can be further ensured not to open the application program or the file corresponding to the icon selected by the user through other ways. For example, when an icon is in a hidden state, an application program or a file corresponding to the icon is in a state that cannot be started; or, for a file to be hidden, the terminal may set that when an icon of the file to be hidden is in a hidden state, the content of the file to be hidden is in a scrambled format.
In the embodiment of the invention, after the terminal displays the second interface, a user can perform various operations on the second interface, so that the terminal can hide the application program or the file to be hidden by adding or deleting the hidden icon in the second interface according to different requirements of the user.
Second embodiment:
with reference to fig. 7, a flowchart of an icon hiding method provided in the embodiment of the present invention is described, in this embodiment, a password setting process for hiding an application icon is mainly described, as shown in fig. 7, the icon hiding method may include:
s301, the terminal receives a fifth operation input by the user.
The fifth operation is used for triggering a setting interface of the hidden icon password.
Specifically, the fifth operation input by the user may specifically be: the method comprises the following steps that a user presses a function control on a terminal desktop, or clicks the terminal desktop, or a voice instruction input by the user, or a specific gesture input by the user. Illustratively, the specific gesture may be any one of a single-tap gesture, a swipe gesture, a pressure recognition gesture, a long-press gesture, a double-press gesture, and a double-tap gesture.
And S302, the terminal responds to the fifth operation and displays a setting interface of the hidden icon password.
And S303, the terminal receives a sixth operation.
The sixth operation is an operation of moving the third icon on the setting interface by the user.
The sixth operation input by the user may specifically be: and the user drags the third icon on the setting interface to move the position of the third icon. Further, the sixth operation may also be other touch operations of the user, or a voice instruction input by the user, or a specific gesture input by the user. Illustratively, the specific gesture may be any one of a single-tap gesture, a swipe gesture, a pressure recognition gesture, a long-tap gesture, an area change gesture, a double-tap gesture, and a double-tap gesture.
And S304, the terminal responds to the sixth operation, controls the second icon to move on the setting interface, and adds the arrangement modes of all the icons in the equipment interface into the preset icon arrangement mode after the second icon moves on the setting interface.
For example, a button for data encryption hiding may be added at the terminal setting menu, and the user needs to input a terminal unlocking password by clicking the button. And after the terminal unlocking password passes, entering a setting interface of the hidden icon password. As shown in fig. 8, the user moves the icon in the setting interface, and clicks to determine that the password can be set quickly, at this time, the terminal uses the icon arrangement mode in the device interface as the password, clicks the "+" key, and can add the icon to construct a more complicated icon arrangement shape as the password, and moves the icon out of the screen, so that the icon can be deleted to construct a simple arrangement shape.
The user carries out the mode that the data encryption is hidden through the icon mode of arranging as the password with arranging wantonly like this, easy operation, and the cost is lower, and the security is high, and the disguise is good, can bring better user experience for the user.
The third embodiment:
fig. 9 shows a schematic diagram of a possible structure of a terminal provided by the present invention, and as shown in fig. 9, the terminal 400 may include: a receiving module 401, a response module 402, a control module 403, and a display module 404, wherein:
the receiving module 401 is configured to receive a first operation, where the first operation is an operation of a user moving a first icon on a first interface.
A response module 402 for responding to the first operation.
And a control module 403, configured to control the first icon to move on the first interface.
A display module 404, configured to display at least one hidden icon in the second interface when the arrangement manner of the at least two second icons in the first interface is the same as the preset icon arrangement manner, where the arrangement manner of the at least two second icons is determined according to a result of the first icon moving on the first interface.
Optionally, the at least one hidden icon includes a first hidden icon;
the receiving module 401 is further configured to receive a second operation, where the second operation is an operation of the first hidden icon by the user.
A response module 402, further configured to respond to the second operation.
The control module 403 is further configured to execute a control action corresponding to the second operation on the first hidden icon.
Optionally, the second operation includes: and opening the application program or the file corresponding to the first hidden icon.
The control module 403 is further configured to open an application program or a file corresponding to the first hidden icon.
Optionally, the second operation includes: and deleting the first hidden icon.
The control module 403 is further configured to delete the first hidden icon.
Optionally, the second interface further includes: and adding a function control for hiding the icon.
The receiving module 401 is further configured to receive a third operation, where the third operation is an operation of the function control by the user.
A response module 402. And the display module is also used for responding to a third operation and displaying the icon to be selected in a third interface.
The receiving module 401 is further configured to receive a fourth operation, where the fourth operation is a selection operation of the user on an icon to be selected.
A response module 402, further configured to respond to the fourth operation.
The display module 404 is further configured to add the icon selected by the user in the second interface.
Optionally, the control module 403 is further configured to hide an application program or a file corresponding to the icon selected by the user when the icon selected by the user is added to the second interface.
Optionally, the receiving module 401 is further configured to receive a fifth operation input by the user, where the fifth operation is used to trigger a setting interface of the hidden icon password.
A response module 402, further configured to respond to a fifth operation.
The display module 404 is further configured to display a setting interface.
The receiving module 401 is further configured to receive a sixth operation, where the sixth operation is an operation of a user moving the second icon on the setting interface.
A response module 402, further configured to respond to a sixth operation.
The control module 403 is further configured to control the second icon to move on the setting interface, and add the arrangement modes of all the icons in the device interface after the second icon moves on the setting interface to the preset icon arrangement mode.
Optionally, the icon arrangement mode includes: icon arrangement shape and/or icon arrangement order.
The terminal provided by the embodiment of the present invention can implement each process implemented by the terminal in the above method embodiments, and is not described herein again to avoid repetition.
In the terminal in the embodiment of the invention, after receiving a first operation of a user for moving a first icon on a first interface, the first operation is responded, the first icon is controlled to move on the first interface, and then a second interface is displayed under the condition that the arrangement mode of a plurality of second icons in the first interface is the same as the arrangement mode of preset icons. Because the second interface comprises at least one hidden icon and the arrangement mode of the plurality of second icons is determined according to the result of the first icon moving on the first interface, the embodiment of the invention can display the hidden application icons by taking the arrangement mode of the icons in the interface as a password. Thus, for an operator of a mobile terminal (e.g., a mobile phone), unless the set password is known, the operator cannot know the hidden application program, or even know whether the application program is hidden in the current terminal. Compared with the existing hiding method, the hiding method provided by the embodiment of the invention is simple to operate, low in cost, high in safety and good in hiding performance, and can bring better user experience to users.
The fourth embodiment:
fig. 10 is a schematic diagram of a hardware structure of a terminal for implementing various embodiments of the present invention, where the terminal 500 includes, but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, a sensor 505, a display unit 506, a user input unit 507, an interface unit 508, a memory 509, a processor 510, and a power supply 511. Those skilled in the art will appreciate that the terminal configuration shown in fig. 10 is not intended to be limiting, and that the terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
Wherein, the processor 510 is configured to: and in response to a first operation, controlling the first icon to move on the first interface, wherein the first operation is an operation of moving the first icon on the first interface by a user, and under the condition that the arrangement mode of at least two second icons in the first interface is the same as the arrangement mode of preset icons, displaying at least one hidden icon in the second interface, wherein the arrangement mode of the at least two second icons is determined according to the result of the first icon after moving on the first interface.
In the terminal in the embodiment of the invention, after receiving a first operation of a user for moving a first icon on a first interface, the first operation is responded, the first icon is controlled to move on the first interface, and then a hidden icon is displayed in a second interface under the condition that the arrangement mode of a plurality of second icons in the first interface is the same as the arrangement mode of a preset icon. Because the second interface comprises at least one hidden icon and the arrangement mode of the plurality of second icons is determined according to the result of the first icon moving on the first interface, the embodiment of the invention can display the hidden application icons by taking the arrangement mode of the icons in the interface as a password. Thus, for an operator of a mobile terminal (e.g., a mobile phone), unless the set password is known, the operator cannot know the hidden application program, or even know whether the application program is hidden in the current terminal. Compared with the existing hiding method, the hiding method provided by the embodiment of the invention is simple to operate, low in cost, high in safety and good in hiding performance, and can bring better user experience to users.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 501 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 510; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 501 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 501 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through the network module 502, such as helping the user send and receive e-mails, browse web pages, access streaming media, and the like.
The audio output unit 503 may convert audio data received by the radio frequency unit 501 or the network module 502 or stored in the memory 509 into an audio signal and output as sound. Also, the audio output unit 503 may also provide audio output related to a specific function performed by the terminal 500 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 503 includes a speaker, a buzzer, a receiver, and the like.
The input unit 504 is used to receive an audio or video signal. The input Unit 504 may include a Graphics Processing Unit (GPU) 5041 and a microphone 5042, and the Graphics processor 5041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 506. The image frames processed by the graphic processor 5041 may be stored in the memory 509 (or other storage medium) or transmitted via the radio frequency unit 501 or the network module 502. The microphone 5042 may receive sounds and may be capable of processing such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 501 in case of the phone call mode.
The terminal 500 also includes at least one sensor 505, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 5061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 5061 and/or a backlight when the terminal 500 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 505 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 506 is used to display information input by the user or information provided to the user. The Display unit 506 may include a Display panel 5065, and the Display panel 5065 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 507 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 507 includes a touch panel 5071 and other input devices 5072. Touch panel 5071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 5071 using a finger, stylus, or any suitable object or attachment). The touch panel 5071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 510, and receives and executes commands sent by the processor 510. In addition, the touch panel 5071 may be implemented in various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 5071, the user input unit 507 may include other input devices 5072. In particular, other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 5071 may be overlaid on the display panel 5061, and when the touch panel 5071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 510 to determine the type of the touch event, and then the processor 510 provides a corresponding visual output on the display panel 5061 according to the type of the touch event. Although in fig. 10, the touch panel 5071 and the display panel 5061 are two independent components to implement the input and output functions of the terminal, in some embodiments, the touch panel 5071 and the display panel 5061 may be integrated to implement the input and output functions of the terminal, and is not limited herein.
The interface unit 508 is an interface for connecting an external device to the terminal 500. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 508 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the terminal 500 or may be used to transmit data between the terminal 500 and external devices.
The memory 509 may be used to store software programs as well as various data. The memory 509 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 509 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 510 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 509 and calling data stored in the memory 509, thereby performing overall monitoring of the terminal. Processor 510 may include one or more processing units; preferably, the processor 510 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 510.
The terminal 500 may further include a power supply 511 (e.g., a battery) for supplying power to various components, and preferably, the power supply 511 may be logically connected to the processor 510 through a power management system, so that functions of managing charging, discharging, and power consumption are performed through the power management system.
In addition, the terminal 500 includes some functional modules that are not shown, and are not described in detail herein.
Fifth embodiment:
optionally, an embodiment of the present invention further provides a terminal, including a processor 510, a memory 509, and a computer program stored in the memory 509 and capable of running on the processor 510, where the computer program, when executed by the processor 510, implements each process of the above-mentioned icon hiding method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
Sixth embodiment:
the embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the embodiment of the icon hiding method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (17)

1. An icon hiding method, comprising:
receiving a first operation, wherein the first operation is an operation of moving a first icon on a first interface by a user;
in response to the first operation, controlling the first icon to move on the first interface;
displaying at least one hidden icon in the second interface under the condition that the arrangement mode of at least two second icons in the first interface is matched with a preset icon arrangement mode;
the arrangement mode of the at least two second icons is determined according to the result of the first icon moving on the first interface, the arrangement positions of the at least two second icons are different from the arrangement positions of the preset icons, and the arrangement shapes of the at least two second icons are the same as the arrangement shapes of the preset icons.
2. The method of claim 1, wherein the at least one hidden icon comprises a first hidden icon, and wherein after displaying the at least one hidden icon in the second interface, the method further comprises:
receiving a second operation, wherein the second operation is an operation of a user on the first hidden icon;
and responding to the second operation, and executing a control action corresponding to the second operation on the first hidden icon.
3. The method of claim 2,
the second operation includes: opening an application program or a file corresponding to the first hidden icon;
the executing the control action corresponding to the second operation on the first hidden icon includes:
and opening an application program or a file corresponding to the first hidden icon.
4. The method of claim 2,
the second operation includes: deleting the first hidden icon;
the executing the control action corresponding to the second operation on the first hidden icon includes:
deleting the first hidden icon.
5. The method of claim 1, wherein the second interface further comprises: adding a function control for hiding the icon; after displaying the at least one hidden icon in the second interface, the method further comprises:
receiving a third operation, wherein the third operation is an operation of a user on the function control;
responding to the third operation, and displaying an icon to be selected in a third interface;
receiving a fourth operation, wherein the fourth operation is a selection operation of the user on the icon to be selected;
and responding to the fourth operation, and adding the icon selected by the user on the second interface.
6. The method of claim 5, wherein when the second interface adds a user-selected icon, the method further comprises:
and hiding the application program or the file corresponding to the icon selected by the user.
7. The method of claim 1, wherein prior to receiving the first operation, the method further comprises:
receiving a fifth operation input by a user, wherein the fifth operation is used for triggering a setting interface of a hidden icon password;
responding to the fifth operation, and displaying the setting interface;
receiving a sixth operation, wherein the sixth operation is an operation of moving a third icon on the setting interface by a user;
and responding to the sixth operation, controlling the third icon to move on the setting interface, and adding the arrangement modes of all icons in the setting interface after the third icon moves on the setting interface into the preset icon arrangement mode.
8. The method according to any one of claims 1 to 7, wherein the icon arrangement comprises: the icon arrangement method comprises the following steps of arranging icon arrangement shapes and/or icon arrangement orders, wherein the icon arrangement orders refer to the application names or patterns of the icons arranged in order.
9. An icon hiding apparatus, comprising:
the receiving module is used for receiving a first operation, wherein the first operation is an operation of moving a first icon on a first interface by a user;
a response module to respond to the first operation;
the control module is used for controlling the first icon to move on the first interface;
the display module is used for displaying at least one hidden icon in the second interface under the condition that the arrangement mode of at least two second icons in the first interface is the same as the arrangement mode of preset icons;
the arrangement mode of the at least two second icons is determined according to the result of the first icon moving on the first interface, the arrangement positions of the at least two second icons are different from the arrangement positions of the preset icons, and the arrangement shapes of the at least two second icons are the same as the arrangement shapes of the preset icons.
10. The apparatus of claim 9, wherein the at least one hidden icon comprises a first hidden icon;
the receiving module is further configured to receive a second operation, where the second operation is an operation of the first hidden icon by a user;
the response module is further used for responding to the second operation;
the control module is further configured to execute a control action corresponding to the second operation on the first hidden icon.
11. The apparatus of claim 10,
the second operation includes: opening an application program or a file corresponding to the first hidden icon;
the control module is further configured to open an application program or a file corresponding to the first hidden icon.
12. The apparatus of claim 10,
the second operation includes: deleting the first hidden icon;
the control module is further configured to delete the first hidden icon.
13. The apparatus of claim 9, wherein the second interface further comprises: adding a function control for hiding the icon;
the receiving module is further configured to receive a third operation, where the third operation is an operation of the function control by a user;
the response module is further used for responding to the third operation and displaying icons to be selected in a third interface;
the receiving module is further configured to receive a fourth operation, where the fourth operation is a selection operation of the user on the icon to be selected;
the response module is further configured to respond to the fourth operation;
the control module is further used for adding icons selected by the user on the second interface.
14. The apparatus of claim 13, wherein the control module is further configured to hide an application or a file corresponding to the icon selected by the user when the icon selected by the user is added to the second interface.
15. The apparatus of claim 9,
the receiving module is further configured to receive a fifth operation input by a user, where the fifth operation is used to trigger a setting interface of the hidden icon password;
the response module is further configured to respond to the fifth operation;
the display module is also used for displaying the setting interface;
the receiving module is further configured to receive a sixth operation, where the sixth operation is an operation of a user moving a third icon on the setting interface;
the response module is further configured to respond to the sixth operation;
the control module is further configured to control the third icon to move on the setting interface, and add the arrangement mode of all icons in the setting interface after the third icon moves on the setting interface into the preset icon arrangement mode.
16. The apparatus of any one of claims 9 to 15, wherein the icon arrangement comprises: the icon arrangement method comprises the following steps of arranging icon arrangement shapes and/or icon arrangement orders, wherein the icon arrangement orders refer to the application names or patterns of the icons arranged in order.
17. A terminal, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the icon hiding method as claimed in any one of claims 1 to 8.
CN201711376280.6A 2017-12-19 2017-12-19 Icon hiding method and terminal Active CN108153460B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711376280.6A CN108153460B (en) 2017-12-19 2017-12-19 Icon hiding method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711376280.6A CN108153460B (en) 2017-12-19 2017-12-19 Icon hiding method and terminal

Publications (2)

Publication Number Publication Date
CN108153460A CN108153460A (en) 2018-06-12
CN108153460B true CN108153460B (en) 2021-01-08

Family

ID=62463924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711376280.6A Active CN108153460B (en) 2017-12-19 2017-12-19 Icon hiding method and terminal

Country Status (1)

Country Link
CN (1) CN108153460B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190388B (en) * 2018-08-01 2020-11-06 维沃移动通信有限公司 Encryption method, decryption method and terminal equipment
CN111176512B (en) * 2019-12-31 2022-03-04 维沃移动通信有限公司 Icon processing method and electronic equipment
CN112684954A (en) * 2020-12-25 2021-04-20 深圳市艾酷通信软件有限公司 Data transmission method and device
CN113176846A (en) * 2021-04-27 2021-07-27 Oppo广东移动通信有限公司 Picture display method, device, equipment and storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4982505B2 (en) * 2007-01-25 2012-07-25 シャープ株式会社 Multi-window management apparatus, program, storage medium, and information processing apparatus
JP5683997B2 (en) * 2011-02-24 2015-03-11 京セラ株式会社 Electronics
CN102722359A (en) * 2011-03-30 2012-10-10 汉王科技股份有限公司 Method and device for displaying application program and portable mobile terminal
CN102722333B (en) * 2012-06-04 2016-01-20 深圳天珑无线科技有限公司 A kind of touch screen unlocking method and terminal
CN103092468B (en) * 2013-01-30 2016-03-02 上海斐讯数据通信技术有限公司 Mobile terminal system for unlocking and mobile terminal unlock method
KR101504237B1 (en) * 2013-11-15 2015-03-19 엘지전자 주식회사 Mobile terminal and method of controlling the mobile terminal
KR102409782B1 (en) * 2015-07-14 2022-06-17 삼성전자주식회사 Method for initial setup and electronic device thereof
CN105511732B (en) * 2015-12-25 2019-03-05 北京奇虎科技有限公司 The display methods and device of page entry icon
CN106055196B (en) * 2016-05-25 2019-08-16 维沃移动通信有限公司 A kind of method and mobile terminal starting application program
CN106557254A (en) * 2016-11-03 2017-04-05 深圳天珑无线科技有限公司 The quick method and system for opening hide application program
CN107315584A (en) * 2017-06-19 2017-11-03 维沃移动通信有限公司 The switching method and mobile terminal of a kind of mode of operation

Also Published As

Publication number Publication date
CN108153460A (en) 2018-06-12

Similar Documents

Publication Publication Date Title
CN108491133B (en) Application program control method and terminal
WO2019174611A1 (en) Application configuration method and mobile terminal
CN110221885B (en) Interface display method and terminal equipment
CN109407921B (en) Application processing method and terminal device
WO2021169959A1 (en) Application starting method and electronic device
CN108446058B (en) Mobile terminal operation method and mobile terminal
CN111027030B (en) Permission setting method and terminal device
KR20160087268A (en) Mobile terminal and control method for the same
CN109241775B (en) Privacy protection method and terminal
CN108153460B (en) Icon hiding method and terminal
CN111078076A (en) Application program switching method and electronic equipment
CN109815676B (en) Privacy space operation method and terminal equipment
WO2019000287A1 (en) Icon display method and device
CN109407948B (en) Interface display method and mobile terminal
CN110007822B (en) Interface display method and terminal equipment
CN111163260B (en) Camera starting method and electronic equipment
CN107992342B (en) Application configuration changing method and mobile terminal
CN108681427B (en) Access right control method and terminal equipment
CN109901976B (en) Application program management method and terminal equipment
CN110703972B (en) File control method and electronic equipment
CN110308834B (en) Setting method of application icon display mode and terminal
CN109062634B (en) Application starting method and mobile terminal
CN111459362A (en) Information display method, information display device, electronic apparatus, and storage medium
CN108710806B (en) Terminal unlocking method and mobile terminal
CN111338524A (en) Application program control method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant