CN114546217A - Application identifier control method and device - Google Patents

Application identifier control method and device Download PDF

Info

Publication number
CN114546217A
CN114546217A CN202210192688.2A CN202210192688A CN114546217A CN 114546217 A CN114546217 A CN 114546217A CN 202210192688 A CN202210192688 A CN 202210192688A CN 114546217 A CN114546217 A CN 114546217A
Authority
CN
China
Prior art keywords
target
application
input
application identifier
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210192688.2A
Other languages
Chinese (zh)
Inventor
孙家圆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202210192688.2A priority Critical patent/CN114546217A/en
Publication of CN114546217A publication Critical patent/CN114546217A/en
Priority to PCT/CN2023/078046 priority patent/WO2023160640A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Abstract

The application discloses a control method and a device of an application identifier, and belongs to the technical field of communication. The method comprises the following steps: receiving a first input of a target application identification; responding to the first input, controlling the target application identification to move to a corresponding target position, and controlling the target application identification at the target position to execute a corresponding target operation; and the target application identifier, the target position and the target operation have a second association relationship.

Description

Application identifier control method and device
Technical Field
The present application belongs to the field of communication technology, and in particular, to a method and an apparatus for controlling an application identifier.
Background
At present, on an electronic device, when a user wants to lock or hide some application icons, the user can only lock or hide the application icons by setting passwords, fingerprints and faces, or lock or hide the application icons by adding the application to a private folder.
However, no matter in a mode of setting a password, a fingerprint and a face, or in a mode of setting a privacy folder, the operation process is complicated, the setting is generally required to be entered, the application icon can be locked or hidden after the password is input for confirmation, the application icon can be opened after the password is input and the authentication is successful when the application is required to be opened or the application icon is displayed, and the operation process is complicated.
Disclosure of Invention
An object of the embodiments of the present application is to provide a method and an apparatus for controlling an application identifier, which can solve the problem that an operation process of locking or hiding an application icon in the prior art is relatively complicated.
In a first aspect, an embodiment of the present application provides a method for controlling an application identifier, including:
receiving a first input of a target application identification;
responding to the first input, controlling the target application identification to move to a corresponding target position, and controlling the target application identification at the target position to execute a corresponding target operation;
and the target application identifier, the target position and the target operation have a second association relationship.
In a second aspect, an embodiment of the present application provides a control apparatus for application identification, including:
the first receiving module is used for receiving a first input of a target application identifier;
the control module is used for responding to the first input, controlling the target application identification to move to a corresponding target position, and controlling the target application identification at the target position to execute corresponding target operation;
and the target application identifier, the target position and the target operation have a second association relationship.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor, implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product, stored on a storage medium, for execution by at least one processor to implement the method according to the first aspect.
In the embodiment of the application, by receiving a first input to a target application identifier, responding to the first input, and according to a first relation between the target application identifier and a target position, controlling the target application identifier to move to the corresponding target position, and according to a second relation between the target application identifier, the target position and a target operation, controlling the target application identifier at the target position to execute the corresponding target operation, that is, by moving the target application identifier to the corresponding target position, the target operation corresponding to the target application identifier at the target position can be triggered, the target operation corresponding to the target application identifier can be completed on a desktop, and a password does not need to be input for authentication, so that an operation process of a user is simplified, and the operation cost of the user is reduced.
Drawings
Fig. 1 is a flowchart of a control method for an application identifier according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an embodiment of the present application;
FIG. 3 is a second schematic diagram illustrating the execution of a target operation according to an embodiment of the present application;
FIG. 4 is a third schematic diagram illustrating a third exemplary implementation of the target operation provided in the present application;
FIG. 5 is a fourth schematic diagram illustrating the execution of a target operation according to an embodiment of the present application;
FIG. 6 is a fifth schematic diagram illustrating a target operation performed according to an embodiment of the present application;
FIG. 7 is a schematic diagram illustrating the type of hiding manner provided by an embodiment of the present application;
FIG. 8 is a schematic illustration showing a dual application hiding manner provided by an embodiment of the present application;
fig. 9 is a schematic display diagram of a four-application hiding manner provided in an embodiment of the present application;
fig. 10 is a schematic display diagram of an eight-application hiding manner provided in the embodiment of the present application;
FIG. 11 is a schematic diagram illustrating a selection of a target application identifier provided by an embodiment of the present application;
FIG. 12 is a schematic diagram of a selection of target locations provided by an embodiment of the present application;
FIG. 13 is a second schematic diagram of a selection of target locations provided by an embodiment of the present application;
FIG. 14 is a schematic diagram illustrating a selection of target operations provided by an embodiment of the present application;
fig. 15 is a schematic structural diagram of a control device for application identification according to an embodiment of the present application;
fig. 16 is a block diagram of an electronic device according to an embodiment of the present application;
fig. 17 is a block diagram of another electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The following describes in detail a control method of an application identifier provided in the embodiment of the present application through a specific embodiment and an application scenario thereof with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present application provides a method for controlling an application identifier, including the following steps:
step 101, a first input to a target application identification is received.
Specifically, the control method for an application identifier provided in the embodiment of the present application may be applied to an electronic device, and the electronic device receives a first input of a target application identifier.
The target application identifier is one of a plurality of application identifiers or a plurality of application identifiers on the desktop of the electronic equipment. The first input may be a click input, a double click input, a slide input, a long press input, etc. for the target application identifier, which is not particularly limited herein.
Further, the target application identification includes, but is not limited to, at least one of:
at least one application icon;
at least one atomic component.
Specifically, the target application identifier may be a combination of at least one application identifier and at least one atomic component; alternatively, the target application identifier may also be one or more application identifiers; alternatively, the target application identification may be one or more atomic components.
The application icons are desktop icons of application programs in the electronic equipment; the atomic component can only occupy small areas of 1x2 and 2x1 on the desktop to show the internal functions of a plurality of applications in the electronic equipment, and the applications can be directly controlled and operated through the atomic component without entering the applications, so that a plurality of complicated steps can be reduced.
Step 102, responding to the first input, controlling the target application identifier to move to a corresponding target position, and controlling the target application identifier at the target position to execute a corresponding target operation;
and the target application identifier, the target position and the target operation have a second association relationship.
Specifically, under the condition that the first input is received, in response to the first input, the target application identifier can be controlled to move to the target position corresponding to the target application identifier according to the first association relationship, and the target application identifier already at the target position is controlled to execute the target operation corresponding to the target application identifier according to the second association relationship, that is, the target operation can be executed on the target application identifier by moving the target application identifier to the target position on the desktop, so that the operation cost of the user is reduced.
Before receiving the first input, a first association relationship between the target application identifier and the target location needs to be established, that is, each application icon in the target application identifier needs to be associated with a corresponding target location, and each atomic component in the target application identifier also needs to be associated with a corresponding target location. The target positions corresponding to different application icons or different atomic components may be the same position or different positions, and may be set as needed, which is not specifically limited herein.
Before receiving the first input, a second association relationship among the target application identifier, the target position and the target operation needs to be established, wherein the second association relationship can be established on the basis of the first association relationship, namely, the first association relationship between the target application identifier and the target position is established first, and the second association relationship between the target application identifier at the target position and the target operation is established on the basis of the first association relationship; that is, each application icon at the target location needs to be associated with a corresponding target operation, and each atomic component at the target location also needs to be associated with a corresponding target operation. The target operations corresponding to different application icons or different atomic components at the target position may be the same operation or different operations, and may be set as needed, which is not specifically limited herein.
Or, the second association relation does not need to be established on the basis of the first association relation, and only needs to establish one association relation among the target application identifier, the target location and the target operation before the first input is received. That is, each application icon in the target application identifier needs to be associated with a corresponding target location and a corresponding target operation, and each atomic component in the target application identifier also needs to be associated with a corresponding target location and a corresponding target operation.
In the above embodiment of the present application, by obtaining a first input to a target application identifier, responding to the first input, and according to a first relationship between the target application identifier and a target position, controlling the target application identifier to move to a corresponding target position, and according to a second relationship between the target application identifier, the target position, and a target operation, controlling the target application identifier at the target position to execute the corresponding target operation, that is, by moving the target application identifier to the corresponding target position, the target operation corresponding to the target application identifier at the target position can be triggered, the target operation corresponding to the target application identifier can be completed on a desktop, and a password does not need to be input for authentication, thereby simplifying an operation process of a user, and reducing an operation cost of the user.
As an alternative embodiment, the target operation may include, but is not limited to, one of a display operation, a hide operation, a lock operation, and an unlock operation.
Specifically, when the target operation is a display operation, the target application identifier at the target position needs to be controlled to execute the corresponding display operation, that is, if the target application identifier is at the target position, the state of the target application identifier needs to be changed to a display state, and the display state is displayed on the desktop. For example: as shown in fig. 2, if the target application is identified as the application icon 3, the application icon 3 is in the first position 21 when in the hidden state, and the target position corresponding to the application icon 3 is the second position 22. That is, when the application icon 3 is at the first position 21, the application icon 3 is in a hidden state, and if the application icon 3 is moved from the first position 21 to the second position 22 along the arrow direction, a display operation is triggered, and the application icon 3 is changed from the hidden state to the display state. It should be noted that, in fig. 2, the hidden state of the application icon 3 is represented by a dashed line frame, and the display state of the application icon 3 is identified by a solid line frame, in an actual use process, the hidden state is that the application icon is not displayed on the desktop, and the display state is that the application icon is displayed on the desktop.
When the target operation is a hidden operation, the target application identifier at the target position needs to be controlled to execute the corresponding hidden operation, that is, if the target application identifier is at the target position, the state of the target application identifier needs to be changed into a hidden state, at this time, the target application identifier is in a non-display state on the desktop, and a user cannot see the target application identifier hidden at the target position when using the electronic device. For example: as shown in fig. 3, if the target application is identified as the application icon 3, the application icon 3 is in the first position 31 when in the display state, and the target position corresponding to the application icon 3 is the second position 32. That is, when the application icon 3 is at the first position 31, the application icon 3 is in the display state, and if the application icon 3 is moved from the first position 31 to the second position 32 along the arrow direction, the hiding operation is triggered, and the application icon 3 is changed from the display state to the hiding state. It should be noted that, in fig. 3, the hidden state of the application icon 3 is represented by a dashed line frame, and the display state of the application icon 3 is represented by a solid line frame, in an actual use process, the hidden state is not displayed on the desktop, and the display state is displayed on the desktop.
When the target operation is a locking operation, the target application identifier at the target position needs to be controlled to execute the corresponding locking operation, that is, if the target application identifier is at the target position, the state of the target application identifier needs to be changed into a locking state, at this time, the target application identifier is in the locking state on the desktop, and when the user uses the electronic device, the user cannot operate the application program corresponding to the target application identifier, that is, the user cannot use the application program corresponding to the target application identifier at the target position. For example: as shown in fig. 4, if the target application is identified as the application icon 3, the application icon 3 is in the first position 41 when in the unlocked state, and the target position corresponding to the application icon 3 is the second position 42. That is, when the application icon 3 is at the first position 41, the application icon 3 is in the unlocked state, and if the application icon 3 is moved from the first position 41 to the second position 42 in the arrow direction, the locking operation is triggered, and the application icon 3 is changed from the unlocked state to the locked state. In fig. 4, the lock pattern 43 represents the locked state of the application icon 3, and the application icon without the lock pattern 43 is set to the unlocked state, during actual use, if the application icon 3 is in the unlocked state, the application program corresponding to the application icon 3 may be used, and if the application icon 3 is in the locked state, the application program corresponding to the application icon 3 cannot be used, and the application icon 3 is in the locked state.
When the target operation is an unlocking operation, the target application identifier at the target position needs to be controlled to execute the corresponding unlocking operation, that is, if the target application identifier is at the target position, the state of the target application identifier needs to be changed into a state of unlocking, and at this time, the target application identifier is in an operable state on a desktop, so that a user can operate an application program corresponding to the target application identifier when using the electronic device. For example: as shown in fig. 5, if the target application is identified as the application icon 3, the application icon 3 is in the first position 51 when in the locked state, and the target position corresponding to the application icon 3 is the second position 52. That is, when the application icon 3 is at the first position 51, the application icon 3 is in the locked state, and if the application icon 3 is moved from the first position 51 to the second position 52 along the arrow direction, the unlocking operation is triggered, and the application icon 3 is changed from the locked state to the unlocked state. In fig. 5, the lock pattern 53 represents the locked state of the application icon 3, and the application icon without the lock pattern 53 is set to the unlocked state, during actual use, if the application icon 3 is in the unlocked state, the application program corresponding to the application icon 3 may be used, and if the application icon 3 is in the locked state, the application program corresponding to the application icon 3 cannot be used, and the application icon 3 is in the locked state.
As an optional embodiment, the controlling, in the step 102, the target application identifier at the target location to execute a corresponding target operation specifically includes:
and under the condition that the target application identifier comprises at least two application identifiers and the at least two application identifiers are located at corresponding target positions, controlling the at least two application identifiers to execute target operation.
Specifically, if the target application identifier includes at least two application identifiers, the at least two application identifiers are combined application identifiers, and each application identifier in the combined application identifiers needs to be located at a corresponding target position, so that the target operation is triggered. That is, if the target application identifier includes a first application identifier and a second application identifier, where the first application identifier and the second application identifier are combined application identifiers, and if the first application identifier is located at a target position corresponding to the first application identifier and the second application identifier is also located at a target position corresponding to the second application identifier, the target operation of the first application identifier and the second application identifier may be triggered. If the first application identifier is located at the corresponding target position, and the second application identifier is not located at the corresponding target position, not only the target operation of the second application identifier but also the target operation of the first application identifier cannot be triggered. Similarly, if the first application identifier is not located at the corresponding target position, but the second application identifier is located at the corresponding target position, not only the target operation of the first application identifier but also the target operation of the second application identifier will not be triggered. Namely, the combination modes of the target application identifiers are various, so that the cracking difficulty is greatly improved, and the information safety is improved.
For example: as shown in fig. 6, the target application identifier includes an application icon 2 and an application icon 3, where the application icon 2 and the application icon 3 are combined application icons, and when the combined application icons are located at their corresponding target positions, the triggered target operation is a hidden operation. When the application icon 2 is at the first position 61, the application icon 2 is in a display state, and the target position corresponding to the application icon 2 is the second position 62. When the application icon 3 is at the third position 63, the application icon 3 is in a display state, and the target position corresponding to the application icon 3 is the fourth position 64. If the application icon 2 is moved from the first position 61 to the second position 62 in the direction of the arrow and the application icon 3 is moved from the third position 63 to the fourth position 64 in the direction of the arrow, a hiding operation is triggered, i.e. the application icon 2 in the second position 62 and the application icon 3 in the fourth position 64 are both in a hidden state, and the hidden state of the application icons is indicated by dashed boxes in the figure. If the application icon 2 is moved from the first position 61 to the second position 62 in the direction of the arrow, but the application icon 3 is still in the third position 63, the hiding operation is not triggered, that is, the application icon 2 in the second position 62 and the application icon 3 in the third position 63 are both in the display state. Similarly, if the application icon 3 is moved from the third position 63 to the fourth position 64 along the arrow direction, but the application icon 2 is still in the first position 61, the hiding operation will not be triggered, that is, the application icon 2 in the first position 61 and the application icon 3 in the fourth position 64 are both in the display state.
The above embodiment of the present application may further select the number of the application identifiers included in the target application identifier, and preset the area range of the target location corresponding to the number of the application identifiers. The following description takes the target operation as the hidden operation as an example:
as shown in fig. 7, if the target operation is a hidden operation, an interface entering a hidden mode can be set, that is, the number of application identifiers can be selected on the interface, where the interface includes a dual-application hidden control 71, a four-application hidden control 72, and an eight-application hidden control 73. The dual-application hidden control 71 can correspondingly control two application identifiers to perform hidden operation, the quad-application hidden control 72 can correspondingly control four application identifiers to perform hidden operation, and the eight-application hidden control 73 can correspondingly control eight application identifiers to perform hidden operation. If the dual-application hiding control 71 is selected for operation, the page shown in fig. 8 is entered, the position 1 and the position 4 are displayable regions, the position 2 and the position 3 are regions where the target application identifier can be hidden, that is, the position between the position 1 and the position 4 is a region where the target application identifier can be hidden, and the target positions corresponding to two different application identifiers in the target application identifier are selected from the position 2 and the position 3. If the four-application hiding control 72 is selected for operation, the page shown in fig. 9 is entered, where the position 1, the position 2, the position 3, and the position 4 are displayable regions, and the position 5, the position 6, the position 7, and the position 8 are regions where target application identifiers can be hidden, that is, the position enclosed by the position 1, the position 2, the position 3, and the position 4 is a region where target applications can be hidden, and target positions corresponding to four different application identifiers in the target application identifiers are selected from the position 5, the position 6, the position 7, and the position 8. If the eight-application hiding control 73 is selected for operation, the page shown in fig. 10 is entered, and the position 1, the position 2, the position 3, the position 4, the position 5, the position 6, the position 7 and the position 8 are displayable regions, the position 9, the position 10, the position 11, the position 12, the position 13, the position 14, the position 15 and the position 16 are regions where target application identifications can be hidden, that is, the positions between the position 1, the position 2, the position 3, the position 4, the position 5, the position 6, the position 7 and the position are regions where target application identifications can be hidden, and target positions corresponding to eight different application identifications in the target application identifications are selected from the position 9, the position 10, the position 11, the position 12, the position 13, the position 14, the position 15 and the position 16.
As an optional embodiment, the establishment manner of the first association relationship may include the following steps:
receiving a second input;
and responding to the second input, selecting a target application identifier from a plurality of application identifiers, selecting a target position from a plurality of desktop positions, and establishing a first association relationship between the target application identifier and the target position.
Specifically, a second input of at least one application identifier in the plurality of application identifiers is received, at least one application identifier is selected from the plurality of application identifiers in response to the second input, and the at least one application identifier is determined to be a target application identifier; and selecting at least one position from a plurality of desktop positions, and determining the at least one position as a target position, thereby establishing a first association relationship between the target application identifier and the target position.
Before receiving the second input, the establishing interface of the first incidence relation can be entered from the setting, and the second input is received in the establishing interface of the first incidence relation. The second input may be a click input, a double click input, a slide input, a long press input, or the like for at least one of the plurality of application identifiers, which is not limited herein.
As an optional embodiment, the step of selecting a target application identifier from a plurality of application identifiers, selecting a target location from a plurality of desktop locations, and establishing a first association relationship between the target application identifier and the target location may specifically include:
selecting a target application identifier from a plurality of application identifiers;
receiving a movement input to the target application identification;
and responding to the movement input, controlling the target application identification to move to a target position, and establishing a first association relation between the target application identification and the target position.
Specifically, after receiving the second input, in response to the second input, at least one application identifier is selected from the plurality of application identifiers, and the at least one application identifier is determined to be the target application identifier. After the target application identification is determined, movement input to the target application identification is received, and the target application identification is controlled to move to the target position in response to the movement input, so that a first association relationship between the target application identification and the target position is established. The movement input may be a drag input or other inputs that can achieve the same effect, and is not limited in this respect.
For example: as shown in fig. 11, in response to the second input, an application icon 1 is selected as a target application identifier from among the application icons 1 to 5, each application icon corresponding to a selection frame, and in the case where the application icon 1 is selected, the selection frame 71 corresponding to the application icon 1 is distinguished from the unselected application icons by a fill color. The manner of distinguishing whether to select an application icon is not limited to filling the selection frame corresponding to the application icon in the above embodiment, and the distinguishing manner is merely an example and is not specifically limited herein.
In a case that the selected application icon 1 is the target application icon, receiving a movement input to the application icon, in response to the movement input, controlling the application icon 1 to move to the corresponding target position, as shown in fig. 12, where the target position 81 corresponding to the application icon 1 is the upper left corner position, and after the application icon 1 moves to the corresponding target position 81, establishing a first association relationship between the application icon 1 and the target position 81.
As an optional embodiment, the step of selecting a target application identifier from a plurality of application identifiers, selecting a target location from a plurality of desktop locations, and establishing a first association relationship between the target application identifier and the target location may specifically include:
selecting a target location from a plurality of desktop locations;
receiving a third input to the target location;
responding to the third input, and displaying a first selection interface, wherein the first selection interface comprises a plurality of application identifications;
receiving a first selection input to the first selection interface;
and responding to the first selection input, selecting a target application identifier from the plurality of application identifiers of the first selection interface, and establishing a first association relation between the target application identifier and the target position.
Specifically, after receiving the second input, in response to the second input, the user enters a selection page of the desktop location, and selects at least one location from the plurality of desktop locations, where the selected at least one location is the target location. For example: as shown in fig. 13, each "+" sign indicates a desktop position, and if an upper left-hand position is selected from the plurality of desktop positions, the upper left-hand desktop position is the target position 91.
After the target position is selected, a third input to the target position is received, and a first selection interface containing a plurality of application identifications is displayed in response to the third input, wherein the first selection interface contains the plurality of application identifications. Receiving a first selection input to the first selection interface, responding to the first selection input, selecting at least one application identifier from the multiple application identifiers in the first selection interface as a target application identifier, and after determining the target application identifier, establishing a first association relationship between a target position and the target application identifier. The first selection input may be a click input, a double click input, a long press input, a slide input, or the like for at least one of the plurality of application identifiers, which is not limited herein.
For example: as shown in FIG. 13, after selecting the target location, a third input is received for target location 91, and in response to the third input, the first selection interface is entered. The third input may be a single-click input, a double-click input, a long-press input, a sliding operation, etc. to the target position 91, which is not limited herein.
As shown in fig. 11, the first selection interface includes an application icon 1, an application icon 2, an application icon 3, an application icon 4, and an application icon 5. Receiving a first selection input to the first selection interface, in response to the first selection input, selecting an application icon 1 from application icons 1, 2, 3, 4 and 5 in the first selection interface as a target application identifier, and after determining that the target application identifier is the application icon 1, establishing a first association relationship between the target position 91 and the application icon 1.
As an optional embodiment, the establishment manner of the second association relationship may include:
receiving a third input;
selecting a target operation from a plurality of operations in response to the third input;
and establishing a second association relation among the target application identifier, the target position and the target operation.
Specifically, a third input for at least one operation in the plurality of operations is received, in response to the third input, at least one operation is selected from the plurality of operations, and the at least one operation is determined to be a target operation; and establishing a first association relation between the target application identifier and the target position through an establishment mode of the first association relation, and then establishing a second association relation between the target operation and the target application identifier and the target position, namely triggering the corresponding target operation only under the condition that the target application identifier is at the target position.
Before receiving the third input, the establishing interface of the second incidence relation can be entered from the setting, and the third input is received in the establishing interface of the second incidence relation.
As an alternative embodiment, the step of selecting the target operation from the plurality of operations in response to the third input includes:
responding to the third input, and displaying a second selection interface, wherein the second selection interface comprises a plurality of operation identifiers;
receiving a second selection input to the second selection interface;
and responding to the second selection input, and selecting a target operation identifier from a plurality of operation identifiers of the second selection interface, wherein each operation identifier corresponds to one operation.
Specifically, after receiving a third input, a second selection interface containing a plurality of operation identifiers is displayed in response to the third input. And receiving a second selection input of one of the operation identifiers in the second selection interface, and responding to the second selection input to select one of the operation identifiers in the second selection interface as the target operation identifier. Each operation mark corresponds to one operation, and the operation marks are marks which are displayed in the second selection interface and indicate that the corresponding operation can be carried out. The second selection input may be a click input, a double click input, a long press input, a slide input, etc. for one of the operation identifiers, which is not specifically limited herein.
For example: as shown in fig. 14, after receiving the third input, in response to the third input, a second selection interface, that is, an application and permission interface, including four operation identifiers, that is, an application hiding interface 141, an application displaying interface 142, an application locking interface 143, an application unlocking interface 144, is displayed, where each operation identifier corresponds to one operation. Receiving a second selection input of the operation identifier of the application hiding 141 in the second selection interface, and determining that the hidden operation corresponding to the operation identifier of the application hiding 141 is the target operation in response to the second selection input.
As an alternative embodiment, before the step 102 responding to the first input, the method further comprises:
receiving identity authentication information of a user;
under the condition that the identity authentication information is consistent with preset information, determining that the user is a target user;
wherein the step 102 is responsive to the first input, comprising:
in the event that the user is a target user, responding to the first input.
Specifically, after receiving the first input, the identity authentication information of the user is acquired, the identity of the user is verified, and if the identity authentication information of the user is consistent with the preset information, the user can be determined as a target user, and the application identifier can be controlled, including the establishment operation of the first association relationship, the establishment operation of the second association relationship, the movement of the target application identifier, and the like.
In summary, in the embodiments of the present application, the first association relationship between the target application identifier and the target location may be established as needed, the second association relationship between the target application identifier, the target location, and the target operation may be established, and the establisher needs to perform identity information authentication, and only when the authentication passes, the first association relationship and the second association relationship may be modified or established, so that the triggering manner of the target operation is not easily cracked, and the information security is improved.
And the target operation corresponding to the target application identifier at the target position can be triggered by moving the target application identifier to the corresponding target position, and the target operation corresponding to the target application identifier can be finished on the desktop without inputting a password for authentication, so that the operation process of a user is simplified, and the operation cost of the user is reduced.
In the control method of the application identifier provided in the embodiment of the present application, the execution subject may be a control device of the application identifier. In the embodiment of the present application, a control method for a control device of an application identifier to execute the application identifier is taken as an example, and the control device of the application identifier provided in the embodiment of the present application is described.
As shown in fig. 15, an embodiment of the present application further provides a control apparatus for application identification, including:
a first receiving module 1501, configured to receive a first input of a target application identifier;
a control module 1502, configured to, in response to the first input, control the target application identifier to move to a corresponding target location, and control the target application identifier at the target location to perform a corresponding target operation;
and the target application identifier, the target position and the target operation have a second association relationship.
Optionally, when the control module 1502 controls the target application identifier at the target location to execute a corresponding target operation, specifically configured to:
and under the condition that the target application identifier comprises at least two application identifiers and the at least two application identifiers are located at corresponding target positions, controlling the at least two application identifiers to execute target operation.
Optionally, the establishing manner of the first association relationship includes:
receiving a second input;
and responding to the second input, selecting a target application identifier from a plurality of application identifiers, selecting a target position from a plurality of desktop positions, and establishing a first association relationship between the target application identifier and the target position.
Optionally, the selecting a target application identifier from the multiple application identifiers, selecting a target location from the multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location includes:
selecting a target location from a plurality of desktop locations;
receiving a third input to the target location;
responding to the third input, and displaying a first selection interface, wherein the first selection interface comprises a plurality of application identifications;
receiving a first selection input to the first selection interface;
and responding to the first selection input, selecting a target application identifier from the plurality of application identifiers of the first selection interface, and establishing a first association relation between the target application identifier and the target position.
Optionally, the establishing manner of the second association relationship includes:
receiving a third input;
selecting a target operation from a plurality of operations in response to the third input;
and establishing a second association relation among the target application identifier, the target position and the target operation.
Optionally, the selecting a target operation from a plurality of operations in response to the third input includes:
responding to the third input, and displaying a second selection interface, wherein the second selection interface comprises a plurality of operation identifiers;
receiving a second selection input to the second selection interface;
and responding to the second selection input, and selecting a target operation identifier from a plurality of operation identifiers of the second selection interface, wherein each operation identifier corresponds to one operation.
In summary, in the embodiments of the present application, the first association relationship between the target application identifier and the target location may be established as needed, and the second association relationship between the target application identifier, the target location, and the target operation may be established, so that the trigger mode of the target operation is not easy to be cracked, and the information security is improved.
And the target operation corresponding to the target application identifier at the target position can be triggered by moving the target application identifier to the corresponding target position, and the target operation corresponding to the target application identifier can be finished on the desktop without inputting a password for authentication, so that the operation process of a user is simplified, and the operation cost of the user is reduced.
The control device of the application identifier in the embodiment of the present application may be an electronic device, and may also be a component in the electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. By way of example, the electronic Device may be a Mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the embodiment of the present application is not particularly limited.
The control device of the application identifier in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The control device of the application identifier provided in the embodiment of the present application can implement each process implemented by the method embodiments in fig. 1 to 14, and is not described here again to avoid repetition.
Optionally, as shown in fig. 16, an electronic device 1600 is further provided in this embodiment of the present application, and includes a processor 1601 and a memory 1602, where the memory 1602 stores a program or an instruction that can be executed on the processor 1601, and when the program or the instruction is executed by the processor 1601, the steps of the above embodiment of the control method for application identification are implemented, and the same technical effect can be achieved, and no repeated description is provided here to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 17 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 1000 includes, but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, and a processor 1010.
Those skilled in the art will appreciate that the electronic device 1000 may further comprise a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 1010 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 17 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description thereof is omitted.
The input unit 1004 is used for receiving a first input of the target application identification;
a processor 1010, configured to, in response to the first input, control the target application identifier to move to a corresponding target location, and control the target application identifier at the target location to perform a corresponding target operation;
and the target application identifier, the target position and the target operation have a second association relationship.
In the above embodiment of the present application, by obtaining a first input to a target application identifier, responding to the first input, and according to a first relationship between the target application identifier and a target position, controlling the target application identifier to move to a corresponding target position, and according to a second relationship between the target application identifier, the target position, and a target operation, controlling the target application identifier at the target position to execute the corresponding target operation, that is, by moving the target application identifier to the corresponding target position, the target operation corresponding to the target application identifier at the target position can be triggered, the target operation corresponding to the target application identifier can be completed on a desktop, and a password does not need to be input for authentication, thereby simplifying an operation process of a user, and reducing an operation cost of the user.
Optionally, when controlling the target application identifier at the target location to execute a corresponding target operation, the processor 1010 is specifically configured to:
and under the condition that the target application identifier comprises at least two application identifiers and the at least two application identifiers are located at corresponding target positions, controlling the at least two application identifiers to execute target operation.
Optionally, the establishing manner of the first association relationship includes:
receiving a second input;
and responding to the second input, selecting a target application identifier from a plurality of application identifiers, selecting a target position from a plurality of desktop positions, and establishing a first association relationship between the target application identifier and the target position.
Optionally, the selecting a target application identifier from the multiple application identifiers, selecting a target location from the multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location includes:
selecting a target location from a plurality of desktop locations;
receiving a third input to the target location;
responding to the third input, and displaying a first selection interface, wherein the first selection interface comprises a plurality of application identifications;
receiving a first selection input to the first selection interface;
and responding to the first selection input, selecting a target application identifier from the plurality of application identifiers of the first selection interface, and establishing a first association relation between the target application identifier and the target position.
Optionally, the establishing manner of the second association relationship includes:
receiving a third input;
selecting a target operation from a plurality of operations in response to the third input;
and establishing a second association relation among the target application identifier, the target position and the target operation.
Optionally, said selecting a target operation from a plurality of operations in response to said third input comprises:
responding to the third input, and displaying a second selection interface, wherein the second selection interface comprises a plurality of operation identifiers;
receiving a second selection input to the second selection interface;
and responding to the second selection input, and selecting a target operation identifier from a plurality of operation identifiers of the second selection interface, wherein each operation identifier corresponds to one operation.
In summary, in the embodiments of the present application, the first association relationship between the target application identifier and the target location may be established as needed, and the second association relationship between the target application identifier, the target location, and the target operation may be established, so that the trigger mode of the target operation is not easily cracked, and the information security is improved.
And the target operation corresponding to the target application identifier at the target position can be triggered by moving the target application identifier to the corresponding target position, and the target operation corresponding to the target application identifier can be finished on the desktop without inputting a password for authentication, so that the operation process of a user is simplified, and the operation cost of the user is reduced.
It should be understood that in the embodiment of the present application, the input Unit 1004 may include a Graphics Processing Unit (GPU) 10041 and a microphone 10042, and the Graphics Processing Unit 10041 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 1006 may include a display panel 10061, and the display panel 10061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1007 includes at least one of a touch panel 10071 and other input devices 10072. The touch panel 10071 is also referred to as a touch screen. The touch panel 10071 may include two parts, a touch detection device and a touch controller. Other input devices 10072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory 1009 may be used to store software programs as well as various data. The memory 1009 may mainly include a first storage area for storing a program or an instruction and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, and the like) required for at least one function, and the like. Further, the memory 1009 may include volatile memory or nonvolatile memory, or the memory 1009 may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct Memory bus RAM (DRRAM). The memory 1009 in the embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
Processor 1010 may include one or more processing units; optionally, the processor 1010 integrates an application processor, which primarily handles operations related to the operating system, user interface, and applications, and a modem processor, which primarily handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into processor 1010.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned control method for an application identifier, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the control method embodiment of the application identifier, and can achieve the same technical effect, and in order to avoid repetition, the description is omitted here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
Embodiments of the present application provide a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the control method embodiment of the application identifier as described above, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (12)

1. A control method for application identification is characterized by comprising the following steps:
receiving a first input of a target application identification;
responding to the first input, controlling the target application identification to move to a corresponding target position, and controlling the target application identification at the target position to execute a corresponding target operation;
the target application identifier and the target position have a first association relationship, and the target application identifier, the target position and the target operation have a second association relationship.
2. The method of claim 1, wherein controlling the target application identifier at the target location to perform a corresponding target operation comprises:
and under the condition that the target application identifier comprises at least two application identifiers and the at least two application identifiers are located at corresponding target positions, controlling the at least two application identifiers to execute target operation.
3. The method according to claim 1, wherein the first association relationship is established in a manner that includes:
receiving a second input;
and responding to the second input, selecting a target application identifier from a plurality of application identifiers, selecting a target position from a plurality of desktop positions, and establishing a first association relationship between the target application identifier and the target position.
4. The method of claim 3, wherein selecting a target application identifier from the plurality of application identifiers and a target location from the plurality of desktop locations, and establishing a first association between the target application identifier and the target location comprises:
selecting a target location from a plurality of desktop locations;
receiving a third input to the target location;
responding to the third input, and displaying a first selection interface, wherein the first selection interface comprises a plurality of application identifications;
receiving a first selection input to the first selection interface;
and responding to the first selection input, selecting a target application identifier from the plurality of application identifiers of the first selection interface, and establishing a first association relation between the target application identifier and the target position.
5. The method according to claim 3, wherein the second association relationship is established in a manner that includes:
receiving a third input;
selecting a target operation from a plurality of operations in response to the third input;
and establishing a second association relation among the target application identifier, the target position and the target operation.
6. The method of claim 5, wherein selecting a target operation from a plurality of operations in response to the third input comprises:
responding to the third input, and displaying a second selection interface, wherein the second selection interface comprises a plurality of operation identifiers;
receiving a second selection input to the second selection interface;
and responding to the second selection input, and selecting a target operation identifier from a plurality of operation identifiers of the second selection interface, wherein each operation identifier corresponds to one operation.
7. A control device for application identification, comprising:
the first receiving module is used for receiving a first input of a target application identifier;
the control module is used for responding to the first input, controlling the target application identifier to move to a corresponding target position, and controlling the target application identifier at the target position to execute corresponding target operation;
and the target application identifier, the target position and the target operation have a second association relationship.
8. The apparatus according to claim 7, wherein the control module, when controlling the target application identifier at the target location to execute the corresponding target operation, is specifically configured to:
and under the condition that the target application identifier comprises at least two application identifiers and the at least two application identifiers are located at corresponding target positions, controlling the at least two application identifiers to execute target operation.
9. The apparatus according to claim 7, wherein the first association relationship is established in a manner that includes:
receiving a second input;
and responding to the second input, selecting a target application identifier from a plurality of application identifiers, selecting a target position from a plurality of desktop positions, and establishing a first association relationship between the target application identifier and the target position.
10. The apparatus of claim 9, wherein selecting a target application identifier from a plurality of application identifiers and a target location from a plurality of desktop locations, and establishing a first association between the target application identifier and the target location comprises:
selecting a target location from a plurality of desktop locations;
receiving a third input to the target location;
responding to the third input, and displaying a first selection interface, wherein the first selection interface comprises a plurality of application identifications;
receiving a first selection input to the first selection interface;
and responding to the first selection input, selecting a target application identifier from the plurality of application identifiers of the first selection interface, and establishing a first association relation between the target application identifier and the target position.
11. The apparatus according to claim 9, wherein the second association relationship is established in a manner that includes:
receiving a third input;
selecting a target operation from a plurality of operations in response to the third input;
and establishing a second association relation among the target application identifier, the target position and the target operation.
12. The apparatus of claim 11, wherein the selecting a target operation from a plurality of operations in response to the third input comprises:
responding to the third input, and displaying a second selection interface, wherein the second selection interface comprises a plurality of operation identifiers;
receiving a second selection input to the second selection interface;
and responding to the second selection input, and selecting a target operation identifier from a plurality of operation identifiers of the second selection interface, wherein each operation identifier corresponds to one operation.
CN202210192688.2A 2022-02-28 2022-02-28 Application identifier control method and device Pending CN114546217A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210192688.2A CN114546217A (en) 2022-02-28 2022-02-28 Application identifier control method and device
PCT/CN2023/078046 WO2023160640A1 (en) 2022-02-28 2023-02-24 Application identifier control method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210192688.2A CN114546217A (en) 2022-02-28 2022-02-28 Application identifier control method and device

Publications (1)

Publication Number Publication Date
CN114546217A true CN114546217A (en) 2022-05-27

Family

ID=81661143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210192688.2A Pending CN114546217A (en) 2022-02-28 2022-02-28 Application identifier control method and device

Country Status (2)

Country Link
CN (1) CN114546217A (en)
WO (1) WO2023160640A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023160640A1 (en) * 2022-02-28 2023-08-31 维沃移动通信有限公司 Application identifier control method and apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903A (en) * 2013-04-12 2013-08-07 广东欧珀移动通信有限公司 Processing method and device for hiding programs of mobile terminal
CN105335048A (en) * 2015-10-09 2016-02-17 惠州Tcl移动通信有限公司 Electron equipment with concealed application icon and application icon conceal method
CN105549810A (en) * 2015-10-28 2016-05-04 东莞酷派软件技术有限公司 Application icon processing method and device, and terminal
CN106126026A (en) * 2016-06-24 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The management method of application program, managing device and terminal
CN106155489A (en) * 2016-07-29 2016-11-23 宇龙计算机通信科技(深圳)有限公司 The locking means of a kind of desktop application and device
CN107765948A (en) * 2017-10-20 2018-03-06 珠海市魅族科技有限公司 Application control method, terminal, computer installation and storage medium
CN109284040A (en) * 2018-08-28 2019-01-29 珠海格力电器股份有限公司 Application management method, device and terminal and computer storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016022634A1 (en) * 2014-08-05 2016-02-11 Alibaba Group Holding Limited Display and management of application icons
CN106775217B (en) * 2016-11-30 2019-10-25 Oppo广东移动通信有限公司 A kind of application identities processing method, device and terminal
CN110007822B (en) * 2019-03-29 2021-06-15 维沃移动通信有限公司 Interface display method and terminal equipment
CN110515508B (en) * 2019-08-16 2021-05-07 维沃移动通信有限公司 Icon control method, terminal equipment and computer readable storage medium
CN111562961B (en) * 2020-04-29 2024-01-23 维沃移动通信有限公司 Icon management method and device and electronic equipment
CN114546217A (en) * 2022-02-28 2022-05-27 维沃移动通信有限公司 Application identifier control method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903A (en) * 2013-04-12 2013-08-07 广东欧珀移动通信有限公司 Processing method and device for hiding programs of mobile terminal
CN105335048A (en) * 2015-10-09 2016-02-17 惠州Tcl移动通信有限公司 Electron equipment with concealed application icon and application icon conceal method
CN105549810A (en) * 2015-10-28 2016-05-04 东莞酷派软件技术有限公司 Application icon processing method and device, and terminal
CN106126026A (en) * 2016-06-24 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The management method of application program, managing device and terminal
CN106155489A (en) * 2016-07-29 2016-11-23 宇龙计算机通信科技(深圳)有限公司 The locking means of a kind of desktop application and device
CN107765948A (en) * 2017-10-20 2018-03-06 珠海市魅族科技有限公司 Application control method, terminal, computer installation and storage medium
CN109284040A (en) * 2018-08-28 2019-01-29 珠海格力电器股份有限公司 Application management method, device and terminal and computer storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023160640A1 (en) * 2022-02-28 2023-08-31 维沃移动通信有限公司 Application identifier control method and apparatus

Also Published As

Publication number Publication date
WO2023160640A1 (en) 2023-08-31

Similar Documents

Publication Publication Date Title
US9064104B2 (en) Graphical authentication
CN112148198B (en) Display method and device of payment interface and electronic equipment
CN106203061B (en) Encryption method of application program and mobile terminal
CN114117263A (en) Page display method, device, equipment and storage medium
WO2023160640A1 (en) Application identifier control method and apparatus
WO2023103901A1 (en) Application management method and apparatus, and electronic device
CN105930717A (en) Picture unlocking method and mobile terminal
CN105787335A (en) Switching control method and device for password input interface
CN114779977A (en) Interface display method and device, electronic equipment and storage medium
CN113238691A (en) Application icon management method and device and electronic equipment
CN114679546A (en) Display method and device, electronic equipment and readable storage medium
CN114518926A (en) Notification message display method and device, electronic equipment and medium
CN114416269A (en) Interface display method and display device
CN115390712A (en) Icon hiding method and device, electronic equipment and storage medium
CN115408676A (en) Unlocking method and device, electronic equipment and storage medium
CN114528530A (en) Application icon display method and device
CN115795429A (en) Application interface management method and device, electronic equipment and readable storage medium
CN113378145B (en) Unlocking method and system of electronic product
CN114117534A (en) Privacy protection method and device and electronic equipment
CN115270089A (en) Unlocking method and device and electronic equipment
CN115964744A (en) Display method and device and electronic equipment
CN114491440A (en) Authority control method and device
CN115390778A (en) Interface display method and device
CN115933925A (en) Display control method and device and electronic equipment
KR20140139704A (en) User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination