CN113835809A - Hiding processing method and device - Google Patents

Hiding processing method and device Download PDF

Info

Publication number
CN113835809A
CN113835809A CN202111120687.9A CN202111120687A CN113835809A CN 113835809 A CN113835809 A CN 113835809A CN 202111120687 A CN202111120687 A CN 202111120687A CN 113835809 A CN113835809 A CN 113835809A
Authority
CN
China
Prior art keywords
hidden
target object
interface
identifier
input operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111120687.9A
Other languages
Chinese (zh)
Inventor
董子尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xumi Yuntu Space Technology Co Ltd
Original Assignee
Shenzhen Jizhi Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jizhi Digital Technology Co Ltd filed Critical Shenzhen Jizhi Digital Technology Co Ltd
Priority to CN202111120687.9A priority Critical patent/CN113835809A/en
Publication of CN113835809A publication Critical patent/CN113835809A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages

Abstract

The disclosure relates to the technical field of computers, and provides a hiding processing method and device. The method comprises the following steps: receiving an input operation sequence aiming at a target object; if the input operation sequence meets a hidden trigger condition, moving the target object to a display area corresponding to a hidden object identifier in the object display interface; and if the target object moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the target object. Therefore, the embodiment can realize that the target object which the user wants not to be seen by other people is hidden and not displayed by the input operation sequence meeting the hidden trigger condition, thereby achieving the effect of protecting privacy, improving the safety and the concealment of the target object viewing mode and further improving the user experience.

Description

Hiding processing method and device
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a hidden processing method and apparatus.
Background
With the development of the instant messaging technology, the contact between people is mostly realized by the instant messaging software for communication and chat, and the chat contents are very various after long-term accumulation. However, if the mobile phone of the user is used by others or other users are nearby, some private information of the user (such as bank card amount information, chat records with friends, confidential information related to work, and the like) is easily seen by others, so that the privacy of the user is revealed. Therefore, the existing information checking mode has the problems of low safety and concealment, and further influences the user experience.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a hiding method and apparatus, a computer device, and a computer readable storage medium, so as to solve the problem that an information viewing manner in the prior art is low in security and concealment.
In a first aspect of the embodiments of the present disclosure, a hidden processing method is provided, where the method includes:
receiving an input operation sequence aiming at a target object; the target object is an object in an object display interface;
if the input operation sequence meets a hidden trigger condition, moving the target object to a display area corresponding to a hidden object identifier in the object display interface;
and if the target object moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the target object.
In a second aspect of the embodiments of the present disclosure, there is provided a hidden processing apparatus, including:
the receiving module is used for receiving an input operation sequence aiming at a target object; the target object is an object in an object display interface;
the moving module is used for moving the target object to a display area corresponding to a hidden object identifier in the object display interface if the input operation sequence meets a hidden trigger condition;
and the hiding module is used for adjusting the state attribute of the target object to be in a hidden state and hiding the target object if the target object moves to the display area corresponding to the hidden object identifier.
In a third aspect of the embodiments of the present disclosure, a computer device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the steps of the above method when executing the computer program.
In a fourth aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, which stores a computer program, which when executed by a processor, implements the steps of the above-mentioned method.
Compared with the prior art, the embodiment of the disclosure has the following beneficial effects: the method and the device for displaying the object can receive an input operation sequence aiming at a target object, wherein the target object is an object in an object display interface; if the input operation sequence meets a hidden trigger condition, the target object can be moved to a display area corresponding to a hidden object identifier in the object display interface; and if the target object moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the target object. As can be seen, in this embodiment, if an input operation sequence for a target object that meets a hidden trigger condition is detected, a hidden object identifier may be used to trigger execution to adjust a state attribute of the target object to a hidden state, and hide the target object; therefore, the input operation sequence meeting the hidden trigger condition is realized, the target object which the user wants not to see by other people is hidden and not displayed, the effect of protecting privacy is achieved, the safety and the concealment of the target object viewing mode are improved, and the user experience is further improved.
Drawings
To more clearly illustrate the technical solutions in the embodiments of the present disclosure, the drawings needed for the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without inventive efforts.
FIG. 1 is a scenario diagram of an application scenario of an embodiment of the present disclosure;
fig. 2 is a flowchart of a concealment processing method provided by the embodiment of the present disclosure;
FIG. 3 is a schematic diagram of an object presentation interface provided by an embodiment of the present disclosure;
FIG. 4 is a schematic diagram of an object presentation interface provided by an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of an object presentation interface provided by an embodiment of the present disclosure;
fig. 6 is an interface schematic diagram of a hiding processing method provided by the embodiment of the present disclosure;
FIG. 7 is a schematic diagram of a hidden object interface provided by an embodiment of the present disclosure;
fig. 8 is a block diagram of a hidden processing device provided by an embodiment of the present disclosure;
fig. 9 is a schematic diagram of a computer device provided by an embodiment of the disclosure.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the disclosed embodiments. However, it will be apparent to one skilled in the art that the present disclosure may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present disclosure with unnecessary detail.
A concealment processing method and apparatus according to an embodiment of the present disclosure will be described in detail below with reference to the accompanying drawings.
In the prior art, if a mobile phone of a user is used by others or other users are nearby, some private information (such as bank card amount information, chat records with friends, confidential information related to work, and the like) of the user can be easily seen by others, so that the privacy of the user is revealed. Therefore, the existing information checking mode has the problems of low safety and concealment.
To solve the above problems. The invention provides a hiding processing method, in the method, as the input operation sequence aiming at a target object is received firstly, wherein the target object is an object in an object display interface; if the input operation sequence meets a hidden trigger condition, the target object can be moved to a display area corresponding to a hidden object identifier in the object display interface; and if the target object moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the target object. As can be seen, in this embodiment, if an input operation sequence for a target object that meets a hidden trigger condition is detected, a hidden object identifier may be used to trigger execution to adjust a state attribute of the target object to a hidden state, and hide the target object; therefore, the input operation sequence meeting the hidden trigger condition is realized, the target object which the user wants not to see by other people is hidden and not displayed, the effect of protecting privacy is achieved, the safety and the concealment of the target object viewing mode are improved, and the user experience is further improved.
For example, the embodiment of the present invention may be applied to an application scenario as shown in fig. 1. In this scenario, a terminal device 1 may be included.
The terminal device 1 may be hardware or software. When the terminal device 1 is hardware, it may be various electronic devices having a display screen, including but not limited to smart phones, tablet computers, laptop portable computers, televisions, desktop computers, and the like; when the terminal device 1 is software (such as a client, a web page version application), it may be installed in the electronic device as described above, for example, the terminal device 1 may be installed with various instant messaging applications, such as short message, QQ, WeChat, nailing and the like, or various image browsing applications and other applications for displaying information. The terminal device 1 may be implemented as a plurality of software or software modules, or may be implemented as a single software or software module, which is not limited by the embodiment of the present disclosure.
Specifically, a user may implement an input operation sequence on a target message in an object display interface currently displayed by the terminal device through the terminal device, and a client corresponding to the object display interface in the terminal device may receive the input operation sequence for a target object. If the input operation sequence meets the hiding trigger condition, the client can move the target object to the display area corresponding to the hidden object identifier in the object display interface. If the client detects that the target object moves into the display area corresponding to the hidden object identifier, the client may adjust the state attribute of the target object to a hidden state and hide the target object. Therefore, the client can enable the target object which the user wants not to see to be hidden and not displayed by the input operation sequence meeting the hidden trigger condition, the effect of protecting privacy is achieved, the safety and the concealment of the target object viewing mode are improved, and the user experience is improved.
It should be noted that the above application scenarios are only illustrated for the convenience of understanding the present disclosure, and the embodiments of the present disclosure are not limited in any way in this respect. Rather, embodiments of the present disclosure may be applied to any scenario where applicable.
Fig. 2 is a flowchart of a concealment processing method according to an embodiment of the present disclosure. One concealment processing method of fig. 2 may be performed by a client in the terminal device of fig. 1. As shown in fig. 2, the hiding processing method includes:
s201: an input operation sequence for a target object is received.
In this embodiment, the target object may be an object in the object presentation interface. The object display interface can be understood as an interface for displaying a plurality of objects of the client or the operating system; for convenience of description, an object on which an input operation sequence is performed by a user in an object presentation interface currently displayed by a client or an operating system may be referred to as a target object.
In an implementation manner, if the object display interface is an interface of a client for displaying a plurality of objects, the client may be an instant messaging client, an image display client, or other types of clients, and accordingly, the target object may be information such as a chat record, a picture, a file, or the like; if the object display interface is an interface for displaying a plurality of objects in an operating system, the target object may be an application program accordingly. For example, when the object display interface is an interface of a client for displaying a plurality of objects, and the client is an instant messaging client (such as "short message", "wechat", etc.), the object display interface may be a chat list interface, and the target object may be a chat record in the chat list interface; for another example, when the client is an image presentation client (such as "album"), the object presentation interface may be a picture list interface, and the target object may be an image in the picture list interface. It should be emphasized that, for convenience of description, in the following description of the present embodiment, an object display interface is mainly taken as an interface for displaying a plurality of objects of a client, and the client is an instant messaging client.
The input operation sequence may be an operation action combination obtained by arranging operation actions made by a user on the terminal device according to the execution sequence of each operation action. At least one operation action can be included in the operation sequence, and the operation action can be a single action, for example, a bottom-up sliding action, a clicking action. For example, if the user performs a bottom-up sliding action on the screen of the terminal and then performs a clicking action, the bottom-up sliding action and the clicking action may be arranged according to the execution sequence of the two actions, so as to obtain an operation action combination: bottom slide-up operation → click action, and the operation actions can be combined as the input operation sequence of the user for the target object. Of course, in order to facilitate recording and storing the operation sequence, in an implementation manner, the input operation sequence may also be an identifier corresponding to an operation action made by at least one user on the terminal, for example, the identifier may be a character, a number, or the like; for example, assuming that the corresponding identifier of the operation action "bottom slide up" is "a" and the corresponding identifier of the operation action "left slide operation" is "B", when the user sequentially inputs "bottom slide up operation" and "left slide operation", the acquired operation sequence may be "a → B".
In this embodiment, when a user performs an operation action on a terminal device displaying an object presentation interface, the terminal device may detect each operation action performed by the user for a target object in the object presentation interface, and may arrange the detected operation actions according to an input order of each operation action, so as to obtain an operation sequence of the user for the target object. It should be noted that, when the user operates the terminal device, if the user does not operate the target object within the preset time length, the previously recorded and arranged operation actions are cleared, and the recording is restarted from the next operation action of the user.
S202: and if the input operation sequence meets the hiding trigger condition, moving the target object to a display area corresponding to the hidden object identifier in the object display interface.
In this embodiment, the hidden trigger condition may be a preset operation sequence for triggering hiding of an object, for example, in an implementation, the hidden trigger condition may be that the input operation sequence performs right sliding and up sliding on the drag target object in sequence, that is, the hidden trigger condition may be that the input operation sequence is an operation action combination: dragging the target object to slide to the right → dragging the target object to slide to the top, it is understood that dragging the target object may be understood as long pressing the target object and dragging. In a specific implementation, the hidden trigger condition may be that the input operation sequence is an operation action combination: dragging the target object to slide to the right over a first preset distance (e.g., 2-3 cm) → dragging the target object to slide upward over a second preset distance (e.g., 2-3 cm).
It should be noted that the hidden object identifier may be understood as a service entry that adjusts the state attribute of the target to be in a hidden state, that is, an entry that determines that the target object is an object to be hidden. In this embodiment, the hidden object identifier may be set at any position in the object display interface, for example, as shown in fig. 3, when the object display interface is a chat list interface, the hidden object identifier a may be set at the top navigation, and of course, the hidden object identifier a may also be set at any area or position in the chat list interface according to the requirement of the user.
Specifically, after receiving an input operation sequence for a target object, it may be determined whether the input operation sequence satisfies a hidden trigger condition. If the input operation sequence meets the hidden trigger condition, the target object can be moved to the display area corresponding to the hidden object identifier in the object display interface, that is, if the input operation sequence meets the hidden trigger condition and it is detected that the user releases his/her hand from the target object, the target object can be controlled to move to the position of the hidden object identifier in the object display interface.
S203: and if the target object moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the target object.
In this embodiment, if it is detected that the target object has moved into the display area corresponding to the hidden object identifier, it may be determined that the target object needs to be hidden. Specifically, the state attribute of the target object may be adjusted to be in a hidden state, that is, the target object is set as a hidden object, for example, the target object may be added to a hidden object list (such as a hidden object interface); meanwhile, the target object is also hidden, for example, the display attribute of the target object may be set to be hidden from the display, and at this time, the target object is no longer displayed in the object display interface.
Next, an example will be described with reference to fig. 4. As shown in fig. 4, it is assumed that the object presentation interface is a chat list interface, and the target object is "chat record three"; if it is detected that the target object moves into the display area corresponding to the hidden object identifier, the state attribute of "third chat record" may be adjusted to the hidden state, and "third chat record" is hidden, as shown in fig. 4, at this time, the "third chat record" is no longer displayed in the chat list interface.
Compared with the prior art, the embodiment of the disclosure has the following beneficial effects: the method and the device for displaying the object can receive an input operation sequence aiming at a target object, wherein the target object is an object in an object display interface; if the input operation sequence meets a hidden trigger condition, the target object can be moved to a display area corresponding to a hidden object identifier in the object display interface; and if the target object moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the target object. As can be seen, in this embodiment, if an input operation sequence for a target object that meets a hidden trigger condition is detected, a hidden object identifier may be used to trigger execution to adjust a state attribute of the target object to a hidden state, and hide the target object; therefore, the input operation sequence meeting the hidden trigger condition is realized, the target object which the user wants not to see by other people is hidden and not displayed, the effect of protecting privacy is achieved, the safety and the concealment of the target object viewing mode are improved, and the user experience is further improved.
In this embodiment, the hidden object identifier may be always displayed in the object display interface, or may be displayed in the object display interface only when there is an object whose state attribute is a hidden state, or may be displayed in the object display interface only after an input operation sequence satisfying a hidden trigger condition is detected.
Next, a display timing of the hidden object identifier in a case where the hidden object identifier is not always displayed in the object presentation interface will be described. In one implementation, before the step of receiving the input operation sequence for the target object, the hidden object identifier is not displayed in the object display interface; s202, that is, if the input operation sequence satisfies the hidden trigger condition, the step of moving the target object to the display area corresponding to the hidden object identifier in the object display interface may include:
if the input operation sequence meets a hidden trigger condition, displaying the hidden object identifier in a navigation area of the object display interface;
and moving the target object to a display area corresponding to a hidden object identifier in the object display interface.
In this embodiment, the hidden object identifier is not displayed in the object display interface when there is no object whose state attribute is a hidden state or when an input operation sequence satisfying a hidden trigger condition is not detected. After detecting the input operation sequence for the target object and the input operation sequence satisfies the hiding trigger condition, the hidden object identifier may be displayed in the navigation area of the object presentation interface first, for example, a display attribute of the hidden object identifier may be set to be displayed from hiding. In one implementation, the hidden object identifier may be displayed in a fading manner in the navigation area of the object display interface. For example, as shown in fig. 3, it is assumed that the object presentation interface is a chat list interface, and the display area B in fig. 3 may be a navigation area in the object presentation interface.
Then, the target object may be moved to a display area corresponding to the hidden object identifier in the object presentation interface. It is understood that, after detecting that the input operation sequence for the target object is completed, the target object may be controlled to move to the display area corresponding to the hidden object identifier. In one implementation, in the process of controlling the target object to move to the display area corresponding to the hidden object identifier, the size of the display area corresponding to the target object may gradually decrease.
As an example, after detecting that the input operation sequence for the target object is completed, a tag corresponding to the target object may be generated and hidden. Next, a manner of generating a tag corresponding to a target object will be described, and in one implementation, the tag corresponding to the target object may be generated according to content displayed by the target object, that is, the tag corresponding to the target object has a corresponding relationship with display content of the target object. For example, if the target object is a chat record and the name of the target object is "chat record three", the tag corresponding to the target object may be "chat record three"; of course, the tag corresponding to the target object may also be a tag in a picture form, or may also be a tag in other forms, and the form of the tag of the target object is not limited in this embodiment. Next, various implementations of generating a tag corresponding to a target object are specifically described.
In an implementation manner of this embodiment, the step of generating the tag corresponding to the target object may specifically be: and determining a keyword corresponding to the target object, and generating a label corresponding to the target object according to the keyword. The keyword may be a topic or a name corresponding to the target object. Since the target object may be generated according to the keyword, the tag corresponding to the target object may include the keyword, that is, the tag may include a subject or a name corresponding to the target object. For example, when the target object is a chat log, the topic or name corresponding to the target object may be the topic or the opposite user name of the chat log, so the keyword corresponding to the target object may be the topic or the opposite user name of the chat log, and the tag corresponding to the target object may be generated according to the keyword (i.e., the topic or the opposite user name of the chat log), that is, the tag may include the topic or the opposite user name of the chat log.
After the tag corresponding to the target object is generated, the tag may be moved to the display area corresponding to the hidden object identifier. If the tag corresponding to the target object moves into the display area corresponding to the hidden object identifier, where the display area corresponding to the hidden object identifier may be an identifier position of the hidden object identifier or an image area (e.g., a circular area, a rectangular area, etc.) with the hidden object identifier as a center, the state attribute of the target object may be adjusted to be in a hidden state, and the tag is hidden, for example, the display attribute of the tag is set to be hidden by the display. In one implementation, in the process of controlling the tag to move to the display area corresponding to the hidden object identifier, the size of the display area corresponding to the tag gradually decreases.
For ease of understanding, a specific implementation of hiding the target object is now illustrated in conjunction with FIG. 5. As shown in fig. 5, it is assumed that the object presentation interface is a chat list interface, and the target object is "chat record three"; if the input operation sequence is an operation action combination: dragging the target object to slide to the right → dragging the target object to slide to the upper side, and the input operation sequence satisfies the hidden trigger condition; after the input operation sequence is completed, a label "third chat record" corresponding to the target object is generated according to the name "third chat record" of the opposite party user of the target object, and the label can be moved to the display area corresponding to the hidden object identifier. If the tag corresponding to the target object is moved to the identifier position of the hidden object identifier pair, the state attribute of the target object (i.e., chat record three) can be adjusted to be a hidden state, and the tag is hidden, so that chat record three and tag "chat record three" are no longer displayed on the chat list interface.
It should be noted that, because the target object in the object display interface is hidden, other objects in the object display interface need to be adaptively adjusted. Specifically, after S203, the method further includes: and adjusting the display position of the object in the object display interface. It is to be understood that, in the present embodiment, the display positions of all objects whose display positions are located behind the target object may be sequentially complemented one display position upwards. For example, as shown in fig. 5, after hiding chat log three, the display position of chat log four may be complemented from the fourth display position to the third display position, and similarly, chat logs five to eight may be complemented one display position sequentially upward.
In order to ensure that the user can quickly find the object with the state attribute being the hidden state through the object display interface, in an implementation manner of this embodiment, after S203, the method may further include: and responding to the trigger operation aiming at the hidden object identification, and switching the current display interface from the object display interface to a hidden object interface.
The hidden object interface may be an interface including objects whose all state attributes are in a hidden state, that is, the hidden object interface may include objects whose all state attributes are in a hidden state. The trigger operation may be to click the hidden object identifier, for example, may be to click the hidden object identifier, double click the hidden object identifier, or click the hidden object identifier for a preset number of times; of course, the fourth preset operation may also be in other forms, such as pressing the hidden object identifier for a long time, and the like.
Next, description will be made with reference to fig. 6. As shown in fig. 6, assuming that the object display interface is a chat list interface, if it is detected that the user performs a trigger operation (i.e., clicks the hidden object identifier) on the hidden object identifier, the current display interface may be switched from the object display interface to the hidden object interface, where the hidden object interface includes chat records three and eleven whose state attributes are hidden.
After the display attribute of the target object is adjusted to be hidden, if the user does not need to hide the target object any more, for example, the target object is a chat record, and the chat record is notified to the public by others, the chat record does not need to be hidden any more, and at this time, the user may cancel hiding the target object. Next, a manner of canceling the hidden target object provided in the present embodiment will be described. Specifically, the method further comprises:
responding to an unhidking operation aiming at an object in the hidden object interface, and adjusting the state attribute of the object to be in a non-hidden state; removing the object from the hidden object interface and moving the object into the object presentation interface.
In this embodiment, the hiding cancellation operation may be performed on different execution objects in an object, for example, when an execution object is an avatar of an object, the hiding cancellation operation may be to press the avatar of the object for a long time and slide to the right for a distance longer than a preset length, or may be to click the avatar of the object, for example, click the avatar of the object, double click the avatar of the object, or click the avatar of the object for a preset number of consecutive times; for another example, when the execution object is a region other than the avatar in the display region corresponding to the object, the hiding cancellation operation may be clicking the region other than the avatar, for example, clicking the region other than the avatar, double clicking the region other than the avatar, or clicking the region other than the avatar a preset number of times, or the hiding cancellation operation may be long-pressing the region other than the avatar and sliding the region other than the avatar to the right over a preset length distance. It should be noted that, after the object whose state attribute is adjusted from hidden to displayed is moved to the object display interface, the display position of the object in the object display interface may be the first display position in the object display interface, may also be the display position located in the object display interface before being moved to the hidden object interface, and may also be the last display position in the object display interface; it should be noted that the display positions of the objects in the object display interface may also be adjusted in other manners, for example, all the objects in the object display interface may be reordered according to the generation time of all the objects in the object display interface, and the display positions of all the objects in the object display interface may be adjusted according to the ordering result, which is not listed here.
Next, an example will be described with reference to fig. 7. As shown in fig. 7, assuming that the object display interface is a hidden chat interface, if it is detected that a hiding cancellation operation is performed on an avatar of an object (i.e., eleven chat records) in the hidden chat interface (e.g., the avatar of eleven chat records is pressed for a long time and slides to the right for more than a preset length distance), the status attribute of eleven chat records may be adjusted to be in a non-hidden state, and eleven chat records are removed from the hidden object interface (i.e., hidden chat interface), and eleven chat records are moved into the object display interface (i.e., chat list interface), where the display position of eleven chat records in the chat list interface is the display position of elechat records in the chat list interface before being moved into the hidden chat interface.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 8 is a schematic diagram of a hidden processing device according to an embodiment of the disclosure. As shown in fig. 8, the concealment processing apparatus includes:
a receiving module 801, configured to receive an input operation sequence for a target object; the target object is an object in an object display interface;
a moving module 802, configured to move the target object to a display area corresponding to a hidden object identifier in the object display interface if the input operation sequence meets a hidden trigger condition;
a hiding module 803, configured to adjust the state attribute of the target object to a hidden state and hide the target object if the target object moves into the display area corresponding to the hidden object identifier.
Optionally, the hidden trigger condition is that the input operation sequence drags the target object to sequentially execute sliding to the right side and sliding to the upper side.
Optionally, before the step of receiving the input operation sequence for the target object, the hidden object identifier is not displayed in the object display interface;
the moving module 802 is specifically configured to:
if the input operation sequence meets a hidden trigger condition, displaying the hidden object identifier in a navigation area of the object display interface;
and moving the target object to a display area corresponding to a hidden object identifier in the object display interface.
Optionally, the moving module 802 is specifically configured to:
generating a label corresponding to the target object, and hiding the target object;
moving the label to a display area corresponding to the hidden object identifier;
correspondingly, the hiding module is specifically configured to:
and if the label moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the label.
Optionally, the apparatus further includes an adjusting module, configured to:
and adjusting the display position of the object in the object display interface.
Optionally, the apparatus further includes a switching module, configured to:
responding to the trigger operation aiming at the hidden object identifier, and switching the current display interface from the object display interface to a hidden object interface; the hidden object interface comprises a plurality of objects with hidden state attributes.
Optionally, the adjusting module is further configured to:
responding to an unhidking operation aiming at an object in the hidden object interface, and adjusting the state attribute of the object to be in a non-hidden state; removing the object from the hidden object interface and moving the object into the object presentation interface.
Optionally, the target object is a chat record.
Compared with the prior art, the embodiment of the disclosure has the following beneficial effects: a receiving module in an embodiment of the present disclosure, configured to receive an input operation sequence for a target object; the target object is an object in an object display interface; the moving module is used for moving the target object to a display area corresponding to a hidden object identifier in the object display interface if the input operation sequence meets a hidden trigger condition; and the hiding module is used for adjusting the state attribute of the target object to be in a hidden state and hiding the target object if the target object moves to the display area corresponding to the hidden object identifier. As can be seen, in this embodiment, if an input operation sequence for a target object that meets a hidden trigger condition is detected, a hidden object identifier may be used to trigger execution to adjust a state attribute of the target object to a hidden state, and hide the target object; therefore, the input operation sequence meeting the hidden trigger condition is realized, the target object which the user wants not to see by other people is hidden and not displayed, the effect of protecting privacy is achieved, the safety and the concealment of the target object viewing mode are improved, and the user experience is further improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present disclosure.
Fig. 9 is a schematic diagram of a computer device 9 provided by an embodiment of the present disclosure. As shown in fig. 9, the computer device 9 of this embodiment includes: a processor 901, a memory 902 and a computer program 903 stored in the memory 902 and operable on the processor 901. The steps in the various method embodiments described above are implemented when the processor 901 executes the computer program 903. Alternatively, the processor 901 implements the functions of each module/module in the above-described apparatus embodiments when executing the computer program 903.
Illustratively, the computer program 903 may be partitioned into one or more modules/modules, which are stored in the memory 902 and executed by the processor 901 to accomplish the present disclosure. One or more modules/modules may be a series of computer program instruction segments capable of performing certain functions, which are used to describe the execution of computer program 903 in computer device 9.
The computer device 9 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computer devices. The computer device 9 may include, but is not limited to, a processor 901 and a memory 902. Those skilled in the art will appreciate that fig. 9 is merely an example of a computer device 9 and is not intended to limit the computer device 9 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the computer device may also include input output devices, network access devices, buses, etc.
The Processor 901 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 902 may be an internal storage module of the computer device 9, for example, a hard disk or a memory of the computer device 9. The memory 902 may also be an external storage device of the computer device 9, such as a plug-in hard disk provided on the computer device 9, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 902 may also include both internal and external memory modules of the computer device 9. The memory 902 is used for storing computer programs and other programs and data required by the computer device. The memory 902 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned functional modules and modules are illustrated as examples, and in practical applications, the above-mentioned functional allocation may be performed by different functional modules and modules according to requirements, that is, the internal structure of the apparatus is divided into different functional modules or modules to perform all or part of the above-mentioned functions. In the embodiments, each functional module and each module may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module, and the integrated modules may be implemented in a form of hardware or a form of software functional modules. In addition, specific names of the functional modules and modules are only used for distinguishing one functional module from another, and are not used for limiting the protection scope of the present disclosure. The modules and the specific working processes of the modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
In the embodiments provided in the present disclosure, it should be understood that the disclosed apparatus/computer device and method may be implemented in other ways. For example, the above-described apparatus/computer device embodiments are merely illustrative, e.g., a division of modules or modules into only one logical division, another division may be present in an actual implementation, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present disclosure may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated modules/modules, if implemented in the form of software functional modules and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, the present disclosure may implement all or part of the flow of the method in the above embodiments, and may also be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of the above methods and embodiments. The computer program may comprise computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain suitable additions or additions that may be required in accordance with legislative and patent practices within the jurisdiction, for example, in some jurisdictions, computer readable media may not include electrical carrier signals or telecommunications signals in accordance with legislative and patent practices.
The above examples are only intended to illustrate the technical solutions of the present disclosure, not to limit them; although the present disclosure has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present disclosure, and are intended to be included within the scope of the present disclosure.

Claims (11)

1. A concealment processing method, characterized in that the method comprises:
receiving an input operation sequence aiming at a target object; the target object is an object in an object display interface;
if the input operation sequence meets a hidden trigger condition, moving the target object to a display area corresponding to a hidden object identifier in the object display interface;
and if the target object moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the target object.
2. The method according to claim 1, wherein the hidden trigger condition is that the input operation sequence performs rightward sliding and upward sliding in sequence for dragging the target object.
3. The method according to claim 1, wherein the hidden object identifier is not displayed in the object display interface before the step of receiving the input operation sequence for the target object;
if the input operation sequence meets a hidden trigger condition, moving the target object to a display area corresponding to a hidden object identifier in the object display interface, including:
if the input operation sequence meets a hidden trigger condition, displaying the hidden object identifier in a navigation area of the object display interface;
and moving the target object to a display area corresponding to a hidden object identifier in the object display interface.
4. The method according to claim 1 or 3, wherein the moving the target object to the display area corresponding to the hidden object identifier in the object display interface comprises:
generating a label corresponding to the target object, and hiding the target object;
moving the label to a display area corresponding to the hidden object identifier;
correspondingly, if the target object moves into the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the target object, including:
and if the label moves to the display area corresponding to the hidden object identifier, adjusting the state attribute of the target object to be in a hidden state, and hiding the label.
5. The method according to any one of claims 1-3, further comprising:
and adjusting the display position of the object in the object display interface.
6. The method according to any one of claims 1-3, further comprising:
responding to the trigger operation aiming at the hidden object identifier, and switching the current display interface from the object display interface to a hidden object interface; the hidden object interface comprises a plurality of objects with hidden state attributes.
7. The method of claim 6, further comprising:
responding to an unhidking operation aiming at an object in the hidden object interface, and adjusting the state attribute of the object to be in a non-hidden state; removing the object from the hidden object interface and moving the object into the object presentation interface.
8. The method of any one of claims 1-3, wherein the target object is a chat log.
9. A concealment processing apparatus, characterized in that the apparatus comprises:
the receiving module is used for receiving an input operation sequence aiming at a target object; the target object is an object in an object display interface;
the moving module is used for moving the target object to a display area corresponding to a hidden object identifier in the object display interface if the input operation sequence meets a hidden trigger condition;
and the hiding module is used for adjusting the state attribute of the target object to be in a hidden state and hiding the target object if the target object moves to the display area corresponding to the hidden object identifier.
10. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 8 when executing the computer program.
11. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN202111120687.9A 2021-09-24 2021-09-24 Hiding processing method and device Pending CN113835809A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111120687.9A CN113835809A (en) 2021-09-24 2021-09-24 Hiding processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111120687.9A CN113835809A (en) 2021-09-24 2021-09-24 Hiding processing method and device

Publications (1)

Publication Number Publication Date
CN113835809A true CN113835809A (en) 2021-12-24

Family

ID=78969747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111120687.9A Pending CN113835809A (en) 2021-09-24 2021-09-24 Hiding processing method and device

Country Status (1)

Country Link
CN (1) CN113835809A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN104834449A (en) * 2015-05-28 2015-08-12 广东欧珀移动通信有限公司 Mobile terminal icon managing method and device
CN106354379A (en) * 2015-07-15 2017-01-25 中国移动通信集团公司 Method for hiding multiple objects on basis of gestures and method and device for restoring display
CN107295186A (en) * 2017-07-03 2017-10-24 广东欧珀移动通信有限公司 Method for hidden controlling, device and the storage medium and mobile terminal of application message
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Control method, device, storage medium and the mobile terminal of application program
CN109032447A (en) * 2018-07-26 2018-12-18 维沃移动通信有限公司 A kind of icon processing method and mobile terminal
CN111580730A (en) * 2020-04-29 2020-08-25 掌阅科技股份有限公司 Background display method of application program, electronic device and storage medium
CN112596645A (en) * 2020-12-18 2021-04-02 维沃移动通信有限公司 Application identifier hiding method and device and electronic equipment
CN113194198A (en) * 2021-04-29 2021-07-30 维沃移动通信有限公司 Message processing method and message processing device
WO2022242376A1 (en) * 2021-05-19 2022-11-24 腾讯科技(深圳)有限公司 Message processing method and apparatus, and device, storage medium and program product

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN104834449A (en) * 2015-05-28 2015-08-12 广东欧珀移动通信有限公司 Mobile terminal icon managing method and device
CN106354379A (en) * 2015-07-15 2017-01-25 中国移动通信集团公司 Method for hiding multiple objects on basis of gestures and method and device for restoring display
CN107295186A (en) * 2017-07-03 2017-10-24 广东欧珀移动通信有限公司 Method for hidden controlling, device and the storage medium and mobile terminal of application message
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Control method, device, storage medium and the mobile terminal of application program
CN109032447A (en) * 2018-07-26 2018-12-18 维沃移动通信有限公司 A kind of icon processing method and mobile terminal
CN111580730A (en) * 2020-04-29 2020-08-25 掌阅科技股份有限公司 Background display method of application program, electronic device and storage medium
CN112596645A (en) * 2020-12-18 2021-04-02 维沃移动通信有限公司 Application identifier hiding method and device and electronic equipment
CN113194198A (en) * 2021-04-29 2021-07-30 维沃移动通信有限公司 Message processing method and message processing device
WO2022242376A1 (en) * 2021-05-19 2022-11-24 腾讯科技(深圳)有限公司 Message processing method and apparatus, and device, storage medium and program product

Similar Documents

Publication Publication Date Title
US9594496B2 (en) Method and apparatus for playing IM message
US10567481B2 (en) Work environment for information sharing and collaboration
US10705671B2 (en) Information sharing method, terminal, and storage medium
US9635027B1 (en) Data transmission using dynamically rendered message content prestidigitation
CN108170342B (en) Application program interface display method and device, terminal and readable storage medium
US10127529B2 (en) User attribute value transfer method and terminal
WO2019242542A1 (en) Screenshot processing method and device
WO2017032066A1 (en) Contact management method and mobile terminal
US11209951B2 (en) Method and apparatus for displaying application program, terminal device, and storage medium
CN104796487A (en) Social interaction method and related equipment
CN112215924A (en) Picture comment processing method and device, electronic equipment and storage medium
CN111190677A (en) Information display method, information display device and terminal equipment
CN110333919A (en) A kind of method and apparatus that social object information is presented
CN107204914B (en) Information processing method and device, computer device and storage medium
CN108174009B (en) Business card sharing method based on double screens, mobile terminal and device
CN113835809A (en) Hiding processing method and device
CN107562327B (en) Management method and device of mailbox account, computer device and storage medium
CN105988758B (en) Display mode adjusting method and electronic equipment
CN114301861B (en) Method, equipment and medium for presenting mail
CN114780504B (en) Web end interaction management method and device, storage medium and electronic equipment
CN112684961B (en) Method and equipment for processing session information
CN107992369B (en) Data transmission method and device, terminal device and computer readable storage medium
CN107864291B (en) Information pushing method and device, terminal and readable storage medium
CN113852541A (en) Message processing method and device, computer equipment and computer readable storage medium
CN115309309A (en) Content sharing method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230119

Address after: 518054 cable information transmission building 25f2504, no.3369 Binhai Avenue, Haizhu community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Xumi yuntu Space Technology Co.,Ltd.

Address before: No.103, no.1003, Nanxin Road, Nanshan community, Nanshan street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen Jizhi Digital Technology Co.,Ltd.