CN115390712A - Icon hiding method and device, electronic equipment and storage medium - Google Patents

Icon hiding method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115390712A
CN115390712A CN202211013678.4A CN202211013678A CN115390712A CN 115390712 A CN115390712 A CN 115390712A CN 202211013678 A CN202211013678 A CN 202211013678A CN 115390712 A CN115390712 A CN 115390712A
Authority
CN
China
Prior art keywords
icon
unlocking
icons
input
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211013678.4A
Other languages
Chinese (zh)
Inventor
黄东发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202211013678.4A priority Critical patent/CN115390712A/en
Publication of CN115390712A publication Critical patent/CN115390712A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses an icon hiding method, an icon hiding device, electronic equipment and a storage medium, wherein the method comprises the following steps: receiving a first input under the condition that a target interface is displayed, wherein the target interface comprises at least one icon and at least one icon position; in response to a first input, determining M unlocking icon positions, M unlocking icons and icons to be hidden, wherein the M unlocking icon positions are icon positions in at least one icon position, the M unlocking icons are icons in at least one icon, the icons to be hidden are one or more icons in the at least one icon except the M unlocking icons, the M unlocking icon positions correspond to the M unlocking icons one to one, and M is a positive integer; and hiding the icon to be hidden under the condition that N unlocking icons in the M unlocking icons are not in the unlocking icon position, wherein N is a positive integer less than or equal to M.

Description

Icon hiding method and device, electronic equipment and storage medium
Technical Field
The application belongs to the technical field of communication, and particularly relates to an icon hiding method and device, electronic equipment and a storage medium.
Background
With the development of electronic devices, some applications (for example, chat-type applications, shopping-type applications, payment-type applications, etc.) may have privacy data, and in order to prevent the privacy data of a user from being leaked due to being seen by other users, a user may set icons of the applications in a hidden state in a setting interface of the electronic device, and implement encryption and hiding of the icons by setting a password.
However, the encryption hiding mode is often universal, and other users can know that the hidden icon exists in the electronic device through the setting interface, so that the hidden icon is displayed by cracking the hidden password of the electronic device. Therefore, the icon hiding mode in the prior art is not secret enough, and the safety of the electronic equipment is low.
Disclosure of Invention
An object of the embodiments of the present application is to provide an icon hiding method and apparatus, an electronic device, and a storage medium, which can solve the problems that in the prior art, a manner of hiding an icon is not sufficiently hidden, and the security of the electronic device is low.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides an icon hiding method, where the icon hiding method includes: receiving a first input under the condition that a target interface is displayed, wherein the target interface comprises at least one icon and at least one icon position; in response to a first input, determining M unlocking icon positions, M unlocking icons and icons to be hidden, wherein the M unlocking icon positions are icon positions in at least one icon position, the M unlocking icons are icons in at least one icon, the icons to be hidden are one or more icons in the at least one icon except the M unlocking icons, the M unlocking icon positions correspond to the M unlocking icons one to one, and M is a positive integer; and hiding the icon to be hidden under the condition that N unlocking icons in the M unlocking icons are not at the unlocking icon position, wherein N is a positive integer less than or equal to M.
In a second aspect, an embodiment of the present application provides an icon hiding device, including: : the device comprises a receiving module, a determining module and a hiding module. The receiving module is used for receiving a first input under the condition that a target interface is displayed, wherein the target interface comprises at least one icon and at least one icon position. The determining module is used for responding to the first input received by the receiving module, and determining M unlocking icon positions, M unlocking icons and icons to be hidden, wherein the M unlocking icon positions are icon positions in at least one icon position, the M unlocking icons are icons in at least one icon, the icons to be hidden are one or more icons in the at least one icon except the M unlocking icons, the M unlocking icon positions correspond to the M unlocking icons one to one, and M is a positive integer. And the hiding module is used for hiding the icon to be hidden under the condition that N unlocking icons in the M unlocking icons are not at the unlocking icon position, wherein N is a positive integer less than or equal to M.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor, implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product, stored on a storage medium, for execution by at least one processor to implement the method according to the first aspect.
In the embodiment of the application, when the electronic device displays the target interface, a user can input so that the electronic device determines M unlocking icon positions, M unlocking icons and icons to be hidden in at least one icon and at least one icon position, wherein the M unlocking icon positions correspond to the M unlocking icons one to one, and then the icons to be hidden are hidden under the condition that N unlocking icons in the M unlocking icons are not located in the unlocking icon positions. In the scheme, when the electronic device displays the target interface comprising at least one icon and at least one icon position, a user can input to trigger the electronic device to determine that part of the icon positions are unlocking icon positions from the at least one icon position, determine that part of the icons are unlocking icons corresponding to the unlocking icon positions from the at least one icon, that is, one unlocking icon position corresponds to one unlocking icon, and determine one or more icons to be hidden, and then hide the icons to be hidden when one or more unlocking icons in the part of the unlocking icons are not located in the unlocking icon positions (that is, located in non-unlocking icon positions), so that the icons to be hidden can be displayed only when the user wants to display the icons to be hidden subsequently, the unlocking icon or unlocking icons must be located in the unlocking icon positions, and thus, the mode of hiding the electronic device is more secret, and the safety of an application program in the electronic device is improved.
Drawings
Fig. 1 is a schematic diagram of an icon hiding method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an example of a target interface displayed by a mobile phone according to an embodiment of the present application;
fig. 3 is a schematic diagram of an example of setting an unlocking icon and unlocking icon bits according to an embodiment of the present application;
fig. 4 is a schematic diagram illustrating an example of setting an icon to be hidden according to an embodiment of the present application;
fig. 5 is a schematic diagram illustrating an example of hiding an icon to be hidden according to an embodiment of the present application;
fig. 6 is a schematic diagram illustrating an example of displaying an icon to be hidden according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an icon hiding apparatus according to an embodiment of the present application;
fig. 8 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present disclosure;
fig. 9 is a second schematic diagram of a hardware structure of an electronic device according to an embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The icon hiding method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
The icon hiding method in the embodiment of the application can be applied to the scene of hiding the icon.
At present, some application programs have private data, and if a user does not want to be seen by others, icons of the application programs are hidden through password encryption and the like. However, the encryption hiding mode is general, and other people can easily know that the electronic device has the hidden application program, so that the hidden application program can be found out by cracking the password of the electronic device. The embodiment of the application provides an icon hiding mode, and the hiding mode is more hidden; the difficulty of cracking is increased, and other users cannot easily know that the electronic equipment has the hidden icon.
In the scheme provided by the embodiment of the application, when the electronic device displays the target interface, a user can input the target interface, so that the electronic device determines M unlocking icon positions, M unlocking icons and icons to be hidden in at least one icon and at least one icon position, the M unlocking icon positions correspond to the M unlocking icons one by one, and then the icons to be hidden are hidden under the condition that N unlocking icons in the M unlocking icons are not in the unlocking icon positions. In the scheme, when the electronic device displays the target interface comprising at least one icon and at least one icon position, a user can input to trigger the electronic device to determine that part of the icon positions are unlocking icon positions from the at least one icon position, determine that part of the icons are unlocking icons corresponding to the unlocking icon positions from the at least one icon, that is, one unlocking icon position corresponds to one unlocking icon, and determine one or more icons to be hidden, and then hide the icons to be hidden when one or more unlocking icons in the part of the unlocking icons are not located in the unlocking icon positions (that is, located in non-unlocking icon positions), so that the icons to be hidden can be displayed only when the user wants to display the icons to be hidden subsequently, the unlocking icon or unlocking icons must be located in the unlocking icon positions, and thus, the mode of hiding the electronic device is more secret, and the safety of an application program in the electronic device is improved.
An embodiment of the present application provides an icon hiding method, and fig. 1 shows a flowchart of the icon hiding method provided in the embodiment of the present application, where the method may be applied to an electronic device. As shown in fig. 1, the icon hiding method provided in the embodiment of the present application may include steps 201 to 203 described below.
Step 201, in the case of displaying the target interface, the electronic device receives a first input.
In this embodiment, the target interface includes at least one icon and at least one icon position.
Optionally, in this embodiment of the application, the first input is used to determine M unlocking icon positions, M unlocking icons, and an icon to be hidden.
Optionally, in this embodiment of the application, the at least one icon may include at least one of: an icon of at least one application, an icon of at least one folder.
Optionally, in this embodiment of the application, the at least one icon bit may be at least one of: at least one empty icon position, at least one icon position with an icon displayed.
It should be noted that, in the embodiment of the present application, the empty icon position may be understood as: if no icon (i.e., an icon of an application and/or an icon of a folder) is displayed in the icon bit in the desktop, the icon bit is referred to as an empty icon bit.
Optionally, in this embodiment of the present application, the target interface may be an interface corresponding to a folder expansion interface; or, the target interface is an interface corresponding to one page in the desktop.
Optionally, in this embodiment of the application, before the electronic device receives the first input, the user may input one folder icon, and trigger the electronic device to enter an icon hiding setting interface (i.e., a target interface), where the icon hiding setting interface includes all icons in the one folder, and mark an empty icon position in the one folder in a target manner.
Optionally, in this embodiment of the application, before the electronic device receives the first input, a user may input any position in the desktop, and trigger the electronic device to enter an icon hiding setting interface (i.e., a target interface), where the icon hiding setting interface includes all icons of a currently displayed page of the desktop, and mark a vacant icon position in the currently displayed page of the desktop in a target manner.
Illustratively, taking an electronic device as a mobile phone as an example, as shown in fig. 2 (a), a user presses a desktop for a long time, as shown in fig. 2 (B), the mobile phone is triggered to display an icon hiding setting interface (i.e., a target interface) corresponding to a currently displayed page of the desktop, where the icon hiding setting interface includes at least one icon (e.g., an icon of application 1, an icon of application 2, an icon of application 3, an icon of application 4, an icon of application 5, an icon of application 6, an icon of application 7, and an icon of application 8) and at least one icon position (e.g., an empty icon position 11, an empty icon position 12, an empty icon position 13, and an empty icon position 14), and the empty icon position is indicated by a dashed-line frame in fig. 2.
Optionally, in this embodiment of the present application, the target mode may be any one of the following: a dashed frame, a solid frame, a dotted frame, a double frame, etc.
Optionally, in this embodiment of the present application, the target interface may be a folder expansion interface or a page in a desktop.
Step 202, the electronic device determines M unlocking icon positions, M unlocking icons, and icons to be hidden in response to the first input.
In an embodiment of the application, the M unlocking icon positions are icon positions in at least one icon position, the M unlocking icons are icons in at least one icon, the icon to be hidden is one or more icons in the at least one icon except the M unlocking icons, the M unlocking icon positions correspond to the M unlocking icons one to one, and M is a positive integer.
It is understood that one unlock icon is displayed on each of the M unlock icon positions.
Optionally, in this embodiment of the application, the first input includes a first sub-input and a second sub-input. The step 202 can be specifically realized by the following steps 202a and 202 b.
Step 202a, the electronic device responds to the first sub-input, and moves M icons of the at least one icon to M icon positions of the at least one icon position respectively to determine M unlocking icon positions and M unlocking icons.
In an embodiment of the application, the first sub-input is an input of dragging M icons to M icon positions, respectively.
In the embodiment of the application, a user can drag the M icons to the M icon positions respectively to trigger the electronic device to move the M icons in the at least one icon to the M icon positions in the at least one icon position respectively, so that the M unlocking icon positions and the M unlocking icons are determined.
It can be understood that the electronic device moves the M icons to M icon positions on the target interface, that is, the M icons are determined to be unlocking icons, and the M icon positions are unlocking icon positions.
Optionally, in this embodiment of the application, the electronic device moves the M icons to M icon positions according to a dragging sequence of the user.
For example, referring to fig. 2 (B), as shown in fig. 3 (a), when the mobile phone displays an icon hiding setting interface (i.e., a target interface) corresponding to a currently displayed page of the desktop, a user may drag each of M icons (e.g., an icon of application 1, an icon of application 2, and an icon of application 3) to one of M icon positions (e.g., an empty icon position 11, an empty icon position 12, and an empty icon position 13), for example, drag the icon of application 1 to the empty icon position 11, drag the icon of application 2 to the empty icon position 12, and drag the icon of application 3 to the empty icon position 13 (which is only indicated by the icon of application 1 in fig. 3); as shown in fig. 3 (B), the mobile phone is triggered to move the M icons to M icon positions according to the sequence dragged by the user (for example, the icon of the application 1 is moved to the empty icon position 11, the icon of the application 2 is moved to the empty icon position 12, and the icon of the application 3 is moved to the empty icon position 13), so that the empty icon position 11, the empty icon position 12, and the empty icon position 13 are determined to be unlocking icon positions, and the icon of the application 1, the icon of the application 2, and the icon of the application 3 are unlocking icons.
Optionally, in this embodiment of the application, the first sub-input may be a selection input (for example, a click input) of the user on the M icons and the M icon positions to trigger the electronic device to move the M icons to the M icon positions, so as to determine the M unlocking icon positions and the M unlocking icons.
Step 202b, the electronic device responds to the second sub-input, and determines the target icon as an icon to be hidden.
In this embodiment of the application, the second sub-input is a selection input to a target icon, and the target icon is one or more icons of at least one icon, except for the M unlocking icons.
Optionally, in this embodiment of the application, the second sub-input may be any one of the following: and inputting any possible form of input such as clicking input, long-time pressing input, sliding input, repeated pressing input or double-click input of the target icon by the user to trigger the electronic equipment to determine the target icon as the icon to be hidden. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Exemplarily, in conjunction with (B) in fig. 3, as shown in (a) in fig. 4, the user clicks an icon (i.e., a target icon) of the application 4, as shown in (B) in fig. 4, and the mobile phone is triggered to determine the icon of the application 4 as the icon to be hidden.
Optionally, in this embodiment of the present application, the execution relationship between the step 202a and the step 202b may be: step 202a is executed first, and then step 202b is executed; alternatively, the step 202b may be executed first, and then the step 202a may be executed, which is not limited in the embodiment of the present application.
Step 203, hiding the icon to be hidden by the electronic device under the condition that N unlocking icons in the M unlocking icons are not located in the unlocking icon position.
Wherein N is a positive integer less than or equal to M.
It can be understood that when the display positions of the N unlocking icons are changed from the unlocking icon bit to the non-unlocking icon bit, the icon to be hidden is hidden by the electronic device.
Alternatively, in this embodiment of the application, the step 203 may be specifically implemented by the following steps 203a and 203 b.
Step 203a, the electronic device receives a second input.
In an embodiment of the application, the second input is an input for moving N unlocking icons of the M unlocking icons to N non-unlocking icon positions, respectively, where the N non-unlocking icon positions are icon positions of at least one icon position except for the M unlocking icon positions.
It is understood that the user may move some or all of the M unlock icons (i.e., N unlock icons) out of the N unlock icon positions to other non-unlock icon positions to trigger the electronic device to hide the target icon.
Optionally, in this embodiment of the application, the second input is an input that a user drags N unlocking icons to N non-unlocking icon positions, so as to trigger the electronic device to move N unlocking icons in the M unlocking icons to the N non-unlocking icon positions, respectively, thereby hiding the target icon.
And step 203b, the electronic equipment responds to the second input and hides the icon to be hidden.
It should be noted that the hidden target icon of the electronic device may be understood as: the electronic device cancels the display of the target icon.
Optionally, in this embodiment of the application, when M is greater than or equal to 1 and N is equal to 1, a user may move an unlock icon to a non-unlock icon position, and trigger the electronic device to hide the target icon, that is, encrypt and hide the target icon by moving a display position of the unlock icon, so that when the user wants to redisplay the target icon on the electronic device, the user may move the unlock icon from the non-unlock icon position back to the corresponding unlock icon position, so as to trigger the electronic device to resume displaying the target icon.
Illustratively, in conjunction with (B) in fig. 4, as shown in (a) in fig. 5, the user drags N unlock icons (e.g., the icon of app 1) to the non-unlock icon position 14, as shown in (B) in fig. 5, and triggers the cell phone to move the N unlock icons (e.g., the icon of app 1) to the non-unlock icon position 14 to hide the icon of app 4. Namely, the icon of the application 4 is encrypted and hidden by moving the display position of the unlocking icon (for example, the icon of the application 1), so that when a user wants to redisplay the icon of the application 4 on the mobile phone, the user needs to move the unlocking icon (for example, the icon of the application 1) back to the corresponding unlocking icon position 11 to trigger the mobile phone to restore the icon of the application 4.
It can be understood that when the icon to be hidden is hidden in the target interface, the icon to be hidden is hidden in the folder expansion interface or the desktop display page of the electronic device.
Optionally, in this embodiment of the application, when M is greater than 1 and N is greater than 1, a user first moves one of the unlocking icons to a non-unlocking icon position to trigger the electronic device to hide the target icon, and then the user can move the unlocking icons except the one unlocking icon among the unlocking icons to other non-unlocking icon positions on the basis of moving the display position of the one unlocking icon, that is, by moving the display positions of the unlocking icons, the target icon is encrypted and hidden, so that when the user wants the electronic device to redisplay the target icon, each unlocking icon among the unlocking icons can be respectively moved back to the corresponding unlocking icon position to trigger the electronic device to cancel the hidden target icon, and thus, the security of the electronic device hiding the target icon is higher.
The embodiment of the application provides an icon hiding method, wherein when an electronic device displays a target interface, a user can input the icon, so that the electronic device determines M unlocking icon positions, M unlocking icons and icons to be hidden in at least one icon and at least one icon position, the M unlocking icon positions correspond to the M unlocking icons one by one, and then the icons to be hidden are hidden under the condition that N unlocking icons in the M unlocking icons are not in the unlocking icon positions. In the scheme, when the electronic device displays the target interface comprising at least one icon and at least one icon position, a user can input to trigger the electronic device to determine that part of the icon positions are unlocking icon positions from the at least one icon position, determine that part of the icons are unlocking icons corresponding to the unlocking icon positions from the at least one icon, that is, one unlocking icon position corresponds to one unlocking icon, and determine one or more icons to be hidden, and then hide the icons to be hidden when one or more unlocking icons in the part of the unlocking icons are not located in the unlocking icon positions (that is, located in non-unlocking icon positions), so that the icons to be hidden can be displayed only when the user wants to display the icons to be hidden subsequently, the unlocking icon or unlocking icons must be located in the unlocking icon positions, and thus, the mode of hiding the electronic device is more secret, and the safety of an application program in the electronic device is improved.
Optionally, in this embodiment of the present application, after the step 203, the icon hiding method provided in this embodiment of the present application further includes the following steps 301 and 302.
Step 301, the electronic device receives a third input.
In an embodiment of the application, the third input is an input for moving the N unlocking icons to N unlocking icon positions, respectively, and the N unlocking icon positions are icon positions occupied by the N unlocking icons before the electronic device receives the second input.
Optionally, in this embodiment of the application, the third input is input that a user drags N unlocking icons from N non-unlocking icon positions to N unlocking icon positions, so as to trigger the electronic device to display the target icon.
It can be understood that, after the target icon is hidden by the electronic device, if the user wants to cancel the hidden target icon (i.e., display the target icon), the N icons may be dragged from the N non-unlock icon positions to the N unlock icon positions, that is, the electronic device is triggered to move the N icons from the N non-unlock icon positions to the N unlock icon positions, so as to display the target icon.
Optionally, in this embodiment of the application, the third input may be an input of a user on a target interface, or an input of the user directly on a desktop or a folder expansion interface, so as to trigger the electronic device to display the icon to be hidden.
Step 302, the electronic device displays the icon to be hidden in response to the third input.
It should be noted that, displaying the icon to be hidden (i.e. the target icon) by the electronic device may be understood as: the electronic device cancels the hiding of the target icon.
Optionally, in this embodiment of the application, after the user moves the display positions of the N unlocking icons so that the target icon is encrypted and hidden by the electronic device, the user may move the N unlocking icons back to the unlocking icon position to trigger the electronic device to cancel hiding the target icon when N is equal to 1; and under the condition that N is greater than 1, the user can respectively move each unlocking icon in the N unlocking icons back to the corresponding unlocking icon position so as to trigger the electronic equipment to cancel the hidden target icon.
Illustratively, in conjunction with fig. 5 (B), after the cell phone hides the icon of the application 4 as shown in fig. 6 (a), the user can move N unlock icons (e.g., the icon of the application 1) back to the original display position on the desktop as shown in fig. 6 (B) to trigger the cell phone to display the icon of the application 4.
Optionally, in this embodiment of the application, when the user moves each of the N unlocking icons back to the corresponding unlocking icon position, if no other icon is displayed on the N unlocking icon positions, the electronic device displays N icons on the N unlocking icon positions; if other icons are displayed on the N unlocking icon positions, the electronic equipment displays the N icons on the N unlocking icon positions, and the other icons displayed on the N unlocking icon positions automatically move to the vacant icon positions in the target interface.
It should be noted that, for the description of canceling the hidden target icon, reference may be made to the description in step 203b, which is not described herein again.
Optionally, in this embodiment of the application, the step 302 may be specifically implemented by the following step 302a or step 302 b.
Step 302a, under the condition that the target icon position is an empty icon position, the electronic device displays the icon to be hidden in the target icon position.
In an embodiment of the application, the target icon position is an icon position where an icon to be hidden is located before the icon to be hidden is hidden.
Optionally, in this embodiment of the application, when the user moves each of the N unlocking icons back to the corresponding unlocking icon position, if the icon position originally displayed by the target icon (i.e., the target icon position) is an empty icon position, the electronic device directly displays the target icon at the target icon position.
And step 302b, under the condition that the icon is displayed in the target icon position, the electronic equipment displays the icon to be hidden in the vacant icon position.
Optionally, in this embodiment of the application, when the user moves each of the N unlocking icons back to the corresponding unlocking icon position, if other icons are displayed on the icon position (i.e., the target icon position) originally displayed by the target icon, the electronic device displays the target icon at an empty icon position in the current interface, so that the flexibility of the electronic device in displaying the target icon is improved.
Optionally, in this embodiment of the present application, before the step 301, the icon hiding method provided in this embodiment of the present application further includes the following step 401 and step 402.
Step 401, under the condition that K unlocking icons in the N unlocking icons are in the hidden state, the electronic device receives a fourth input.
In an embodiment of the application, the fourth input is an input for canceling hiding K unlocking icons, where K is a positive integer less than or equal to N.
It can be understood that after the target icon is hidden by the electronic device, if the user wants to cancel the hidden target icon, the N unlocking icons need to be moved from the N non-unlocking icon positions to the N unlocking icon positions, at this time, if K unlocking icons in the N unlocking icons are in a hidden state, the electronic device needs to cancel the hidden K icons first, and then when the N unlocking icons are in a display state, the N unlocking icons are moved from the N non-unlocking icon positions to the N unlocking icon positions, so that the target icon is displayed by the electronic device.
It should be noted that, after hiding the target icon, the electronic device may continue to perform the above steps 201 to 203 and the related schemes thereof to hide K unlocking icons of the N unlocking icons, that is, to make the K unlocking icons in a hidden state.
Specifically, after the target icon is hidden by the electronic device, a user can input a icons in the at least one icon and a icon positions in the at least one icon position, where the a icons are icons in the at least one icon except the target icon, so that the electronic device moves the a icons to the a icon positions, and the a icons correspond to the a icon positions one to one, thereby determining that the a icon positions are unlocking icon positions and the a icons are unlocking icons; then, the user can input K unlocking icons in the N unlocking icons, so that the electronic equipment determines the K unlocking icons as icons to be hidden; finally, the user can move B unlocking icons in the A unlocking icons from B unlocking icon positions to B non-unlocking icon positions, K icons are triggered to be hidden by the electronic equipment, B is a positive integer smaller than or equal to A, and the B unlocking icons correspond to the B unlocking icon positions one by one.
And 402, the electronic equipment responds to the fourth input and displays K unlocking icons.
Optionally, in this embodiment of the application, after the electronic device hides the K unlocking icons, if the user wants to cancel the hiding of the K unlocking icons, each unlocking icon in the B unlocking icons may be moved back to the corresponding unlocking icon position, so as to trigger the electronic device to display the K unlocking icons.
It can be understood that after the electronic device hides the K unlocking icons, if the user wants to display the target icon, the N unlocking icons may be moved from the N non-unlocking icon positions to the N unlocking icon positions to trigger the electronic device to display the target icon, however, at this time, the K unlocking icons in the N unlocking icons are in a hidden state, the user may first trigger the electronic device to move each unlocking icon in the B unlocking icons back to the corresponding unlocking icon position respectively to display the K unlocking icons, and then trigger the electronic device to move the N unlocking icons from the N non-unlocking icon positions to the N unlocking icon positions to display the target icon.
It should be noted that, for specific description of displaying K unlocking icons by the electronic device, reference may be made to the description of displaying the target icon by the electronic device in step 302, which is not described herein again.
It should be noted that, in the icon hiding method provided in the embodiment of the present application, the execution subject may be an electronic device or an icon hiding device. In the embodiment of the present application, an example in which an electronic device executes an icon hiding method is taken as an example to describe the icon hiding device provided in the embodiment of the present application.
Fig. 7 shows a schematic diagram of a possible structure of the icon hiding device involved in the embodiment of the present application. As shown in fig. 7, the icon hiding means 70 may include: a receiving module 71, a determining module 72 and a hiding module 73.
The receiving module 71 is configured to receive a first input when a target interface is displayed, where the target interface includes at least one icon and at least one icon position. The determining module 72 is configured to determine, in response to the first input received by the receiving module 71, M unlocking icon positions, M unlocking icons, and icons to be hidden, where the M unlocking icon positions are icon positions in at least one icon position, the M unlocking icons are icons in the at least one icon, the icons to be hidden are one or more icons in the at least one icon except the M unlocking icons, the M unlocking icon positions are in one-to-one correspondence with the M unlocking icons, and M is a positive integer. And the hiding module 73 is configured to hide the icon to be hidden under the condition that N unlocking icons in the M unlocking icons are not located in the unlocking icon position, where N is a positive integer smaller than or equal to M.
The embodiment of the application provides an icon hiding device, and when an electronic device displays a target interface comprising at least one icon and at least one icon position, a user can input to trigger the electronic device to determine that a part of icon positions are unlocking icon positions from the at least one icon position, determine that a part of icons from the at least one icon are unlocking icons corresponding to the unlocking icon positions, namely one unlocking icon position corresponds to one unlocking icon, and determine one or more icons to be hidden, and then hide the icons to be hidden when one or more unlocking icons in the part of unlocking icons are not in the unlocking icon positions (namely are not in the unlocking icon positions), so that when the user subsequently wants to display the icons to be hidden, the one or more unlocking icons must be located in the unlocking icon positions to display the icons to be hidden, and thus, the icon hiding mode of the electronic device is more secret, and the security of an application program in the electronic device is improved.
In one possible implementation, the first input includes a first sub-input and a second sub-input; the determining module 72 is specifically configured to, in response to a first sub-input, move M icons in at least one icon to M icon positions in at least one icon position, respectively, to determine M unlocked icon positions and M unlocked icons, where the first sub-input is an input of dragging the M icons to the M icon positions, respectively; and in response to a second sub-input, determining the target icon as an icon to be hidden, wherein the second sub-input is a selection input of the target icon, and the target icon is one or more icons of the at least one icon except the M unlocking icons.
In a possible implementation manner, the receiving module 71 is further configured to receive a second input, where the second input is an input that moves N unlocking icons of the M unlocking icons to N non-unlocking icon positions respectively, and the N non-unlocking icon positions are icon positions of at least one icon position except for the M unlocking icon positions. The hiding module 73 is specifically configured to hide the icon to be hidden in response to the second input received by the receiving module 71.
In a possible implementation manner, the icon hiding apparatus 70 provided in the embodiment of the present application further includes: and a display module. The receiving module 71 is further configured to receive a third input after the icon to be hidden is hidden by the hiding module 73, where the third input is an input for moving the N unlocking icons to N unlocking icon positions respectively, and the N unlocking icon positions are icon positions occupied by the N unlocking icons before the electronic device receives the second input. And a display module, configured to display the icon to be hidden in response to the third input received by the receiving module 71.
In a possible implementation manner, the display module is specifically configured to display the icon to be hidden in the target icon position when the target icon position is an empty icon position; or, the display module is specifically configured to display the icon to be hidden at the vacant icon position when the icon is displayed at the target icon position; the target icon position is the icon position where the icon to be hidden is located before the icon to be hidden is hidden.
In a possible implementation manner, the receiving module 71 is further configured to receive a fourth input before receiving the third input, where the fourth input is an input for canceling hiding K unlocking icons, and K is a positive integer smaller than or equal to N, in a case that K unlocking icons in the N unlocking icons are in a hidden state. The display module is further configured to display K unlocking icons in response to the fourth input received by the receiving module 71.
The icon hiding device in the embodiment of the present application may be a device, and may also be a component, an integrated circuit, or a chip in an electronic device. The device can be mobile electronic equipment or non-mobile electronic equipment. The Mobile electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (Storage), a personal computer (NAS), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not limited in particular.
The icon hiding device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, which is not specifically limited in the embodiment of the present application.
The icon hiding device provided by the embodiment of the application can implement each process implemented by the method embodiment, and is not described herein again to avoid repetition.
Optionally, as shown in fig. 8, an electronic device 900 is further provided in this embodiment of the present application, and includes a processor 901 and a memory 902, where the memory 902 stores a program or an instruction that can be executed on the processor 901, and when the program or the instruction is executed by the processor 901, the steps of the foregoing method embodiment are implemented, and the same technical effect can be achieved, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 100 includes, but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, and a processor 110.
Those skilled in the art will appreciate that the electronic device 100 may further comprise a power supply (e.g., a battery) for supplying power to various components, and the power supply may be logically connected to the processor 110 via a power management system, so as to implement functions of managing charging, discharging, and power consumption via the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The user input unit 107 is configured to receive a first input when a target interface is displayed, where the target interface includes at least one icon and at least one icon position.
The processor 110 is configured to determine M unlocking icon positions, M unlocking icons, and an icon to be hidden in response to the first input, where the M unlocking icon positions are icon positions in at least one icon position, the M unlocking icons are icons in the at least one icon, the icon to be hidden is one or more icons in the at least one icon except the M unlocking icons, the M unlocking icon positions are in one-to-one correspondence with the M unlocking icons, and M is a positive integer. And hiding the icon to be hidden under the condition that N unlocking icons in the M unlocking icons are not located in the unlocking icon position, wherein N is a positive integer less than or equal to M.
The embodiment of the application provides an electronic device, wherein when the electronic device displays a target interface including at least one icon and at least one icon position, a user can input to trigger the electronic device to determine that a part of icon positions are unlocking icon positions from the at least one icon position, determine that a part of icons from the at least one icon are unlocking icons corresponding to the unlocking icon positions, that is, one unlocking icon position corresponds to one unlocking icon, and determine one or more icons to be hidden, and then hide the icons to be hidden when one or more unlocking icons in the part of unlocking icons are not in the unlocking icon positions (that is, are not in the unlocking icon positions), so that when the user subsequently wants to display the icons to be hidden, the one or more unlocking icons must be located in the unlocking icon positions to display the icons to be hidden, and thus, the way of hiding the icons in the electronic device is more secret, and thus the security of an application program in the electronic device is improved.
Optionally, the first input comprises a first sub-input and a second sub-input; the processor 110 is specifically configured to, in response to a first sub-input, move M icons in the at least one icon to M icon positions in the at least one icon position, respectively, to determine M unlocked icon positions and M unlocked icons, where the first sub-input is an input of dragging the M icons to the M icon positions, respectively; and determining the target icon as the icon to be hidden in response to a second sub-input, wherein the second sub-input is a selection input of the target icon, and the target icon is one or more icons of the at least one icon except the M unlocking icons.
Optionally, the user input unit 107 is further configured to receive a second input, where the second input is an input of moving N unlocking icons of the M unlocking icons to N non-unlocking icon positions respectively, and the N non-unlocking icon positions are icon positions of at least one icon position except for the M unlocking icon positions.
The processor 110 is specifically configured to hide the icon to be hidden in response to the second input.
Optionally, the user input unit 107 is further configured to receive, after the processor 110 hides the icon to be hidden, a third input, where the third input is an input for moving the N unlocking icons to N unlocking icon positions, respectively, where the N unlocking icon positions are occupied by the N unlocking icons before the electronic device receives the second input.
And a display unit 106 for displaying the icon to be hidden in response to the third input.
Optionally, the display unit 106 is specifically configured to display the icon to be hidden in the target icon position when the target icon position is an empty icon position; or, the method is specifically used for displaying the icon to be hidden at the vacant icon position under the condition that the icon is displayed at the target icon position; and the target icon position is the icon position where the icon to be hidden is located before the icon to be hidden is hidden.
Optionally, the user input unit 107 is further configured to, before receiving the third input, receive a fourth input in a case where K unlocking icons of the N unlocking icons are in a hidden state, where the fourth input is an input for canceling hiding of the K unlocking icons, and K is a positive integer less than or equal to N.
The display unit 106 is further configured to display K unlock icons in response to a fourth input.
The electronic device provided by the embodiment of the application can realize each process realized by the method embodiment, and can achieve the same technical effect, and for avoiding repetition, the details are not repeated here.
The beneficial effects of the various implementation manners in this embodiment may specifically refer to the beneficial effects of the corresponding implementation manners in the above method embodiments, and are not described herein again to avoid repetition.
It should be understood that, in the embodiment of the present application, the input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics Processing Unit 1041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 107 includes at least one of a touch panel 1071 and other input devices 1072. The touch panel 1071 is also referred to as a touch screen. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a first storage area storing a program or an instruction and a second storage area storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, memory 109 may include volatile memory or non-volatile memory, or memory 109 may include both volatile and non-volatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct Memory bus RAM (DRRAM). Memory 109 in the embodiments of the subject application includes, but is not limited to, these and any other suitable types of memory.
Processor 110 may include one or more processing units; optionally, the processor 110 integrates an application processor, which mainly handles operations related to the operating system, user interface, application programs, etc., and a modem processor, which mainly handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements the processes of the foregoing method embodiments, and can achieve the same technical effects, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the foregoing method embodiments, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
Embodiments of the present application provide a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the foregoing method embodiments, and achieve the same technical effects, and in order to avoid repetition, details are not described here again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (14)

1. A method for hiding an icon, the method comprising:
receiving a first input under the condition that a target interface is displayed, wherein the target interface comprises at least one icon and at least one icon position;
in response to the first input, determining M unlocking icon positions, M unlocking icons and icons to be hidden, wherein the M unlocking icon positions are icon positions in the at least one icon position, the M unlocking icons are icons in the at least one icon, the icons to be hidden are one or more icons in the at least one icon except the M unlocking icons, the M unlocking icon positions correspond to the M unlocking icons one to one, and M is a positive integer;
and hiding the icon to be hidden under the condition that N unlocking icons in the M unlocking icons are not in unlocking icon positions, wherein N is a positive integer less than or equal to M.
2. The method of claim 1, wherein the first input comprises a first sub-input and a second sub-input;
the determining M unlocking icon positions, M unlocking icons and icons to be hidden in response to the first input comprises:
moving M icons of the at least one icon to M icon positions of the at least one icon position, respectively, in response to the first sub-input, to determine the M unlocked icon positions and the M unlocked icons, the first sub-input being an input that drags the M icons to the M icon positions, respectively;
determining a target icon as the icon to be hidden in response to the second sub-input, wherein the second sub-input is a selection input of the target icon, and the target icon is one or more icons of the at least one icon except for the M unlocking icons.
3. The method according to claim 1, wherein the hiding the icon to be hidden comprises:
receiving a second input, where the second input is an input for moving N unlocking icons of the M unlocking icons to N non-unlocking icon positions, respectively, and the N non-unlocking icon positions are icon positions of the at least one icon position except for the M unlocking icon positions;
and hiding the icon to be hidden in response to the second input.
4. The method according to any one of claims 1 to 3, wherein after hiding the icon to be hidden, the method further comprises:
receiving a third input, wherein the third input is used for moving the N unlocking icons to N unlocking icon positions respectively, and the N unlocking icon positions are icon positions occupied by the N unlocking icons before the electronic equipment receives the second input;
and responding to the third input, and displaying the icon to be hidden.
5. The method of claim 4, wherein the displaying the icon to be hidden comprises:
under the condition that the target icon position is an empty icon position, displaying the icon to be hidden in the target icon position; alternatively, the first and second electrodes may be,
under the condition that the target icon position is displayed with an icon, displaying the icon to be hidden at an empty icon position;
and the target icon position is the icon position where the icon to be hidden is located before the icon to be hidden is hidden.
6. The method of claim 4, wherein prior to said receiving a third input, the method further comprises:
receiving a fourth input under the condition that K unlocking icons in the N unlocking icons are in a hidden state, wherein the fourth input is used for canceling the hiding of the K unlocking icons, and K is a positive integer less than or equal to N;
displaying the K unlock icons in response to the fourth input.
7. An icon hiding apparatus, comprising: the device comprises a receiving module, a determining module and a hiding module;
the receiving module is used for receiving a first input under the condition that a target interface is displayed, wherein the target interface comprises at least one icon and at least one icon position;
the determining module is configured to determine M unlocking icon positions, M unlocking icons, and an icon to be hidden in response to the first input received by the receiving module, where the M unlocking icon positions are icon positions in the at least one icon position, the M unlocking icons are icons in the at least one icon, the icon to be hidden is one or more icons in the at least one icon except the M unlocking icons, the M unlocking icon positions are in one-to-one correspondence with the M unlocking icons, and M is a positive integer;
the hiding module is used for hiding the icon to be hidden under the condition that N unlocking icons in the M unlocking icons are not located in the unlocking icon position, wherein N is a positive integer smaller than or equal to M.
8. The apparatus of claim 7, wherein the first input comprises a first sub-input and a second sub-input;
the determining module is specifically configured to move, in response to the first sub-input, M icons of the at least one icon to M icon positions of the at least one icon position, respectively, to determine the M unlock icon positions and the M unlock icons, where the first sub-input is an input of dragging the M icons to the M icon positions, respectively; and in response to the second sub-input, determining a target icon as the icon to be hidden, wherein the second sub-input is a selection input for the target icon, and the target icon is one or more icons of the at least one icon except for the M unlocking icons.
9. The apparatus of claim 7,
the receiving module is further configured to receive a second input, where the second input is an input of moving N unlocking icons in the M unlocking icons to N non-unlocking icon positions, respectively, and the N non-unlocking icon positions are icon positions in the at least one icon position except for the M unlocking icon positions;
the hiding module is specifically configured to hide the icon to be hidden in response to the second input received by the receiving module.
10. The apparatus according to any one of claims 7 to 9, wherein the icon hiding means further comprises: a display module;
the receiving module is further configured to receive a third input after the icon to be hidden is hidden by the hiding module, where the third input is an input for moving the N unlocking icons to N unlocking icon positions respectively, and the N unlocking icon positions are icon positions occupied by the N unlocking icons before the electronic device receives the second input;
the display module is configured to display the icon to be hidden in response to the third input received by the receiving module.
11. The apparatus of claim 10,
the display module is specifically used for displaying the icon to be hidden at the target icon position under the condition that the target icon position is an empty icon position; alternatively, the first and second electrodes may be,
the display module is specifically used for displaying the icon to be hidden at an empty icon position under the condition that the icon is displayed at the target icon position;
and the target icon position is the icon position where the icon to be hidden is located before the icon to be hidden is hidden.
12. The apparatus of claim 10,
the receiving module is further configured to receive a fourth input before receiving a third input, where the fourth input is an input for canceling hiding of K unlocking icons in the N unlocking icons, and K is a positive integer less than or equal to N;
the display module is further configured to display the K unlocking icons in response to the fourth input received by the receiving module.
13. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the icon hiding method as claimed in any one of claims 1 to 6.
14. A readable storage medium, characterized in that the readable storage medium stores thereon a program or instructions which, when executed by a processor, implement the steps of the icon hiding method as claimed in any one of claims 1 to 6.
CN202211013678.4A 2022-08-23 2022-08-23 Icon hiding method and device, electronic equipment and storage medium Pending CN115390712A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211013678.4A CN115390712A (en) 2022-08-23 2022-08-23 Icon hiding method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211013678.4A CN115390712A (en) 2022-08-23 2022-08-23 Icon hiding method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115390712A true CN115390712A (en) 2022-11-25

Family

ID=84120698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211013678.4A Pending CN115390712A (en) 2022-08-23 2022-08-23 Icon hiding method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115390712A (en)

Similar Documents

Publication Publication Date Title
US20230385426A1 (en) Encryption Method and Apparatus, Electronic Device, and Medium
CN115357173A (en) Screen control method and device and electronic equipment
CN114779977A (en) Interface display method and device, electronic equipment and storage medium
CN112148167A (en) Control setting method and device and electronic equipment
WO2023160640A1 (en) Application identifier control method and apparatus
WO2023155745A1 (en) Interface display method and apparatus
WO2023103901A1 (en) Application management method and apparatus, and electronic device
CN111817944A (en) Picture sharing method and device and electronic equipment
CN115795429A (en) Application interface management method and device, electronic equipment and readable storage medium
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
CN115202524B (en) Display method and device
CN116107531A (en) Interface display method and device
CN115756238A (en) Component display method and device, electronic equipment and medium
CN114416269A (en) Interface display method and display device
CN115167721A (en) Display method and device of functional interface
CN115390712A (en) Icon hiding method and device, electronic equipment and storage medium
CN114817784A (en) Message processing method and device, electronic equipment and readable storage medium
CN114253449A (en) Screen capturing method, device, equipment and medium
CN112506404B (en) Screen unlocking method, device, equipment and storage medium
CN114528530A (en) Application icon display method and device
CN115600229A (en) Information display method and device
CN115562607A (en) Display method and display device
CN115826826A (en) File transmission method and device
CN115309309A (en) Content sharing method and device, electronic equipment and medium
CN116755591A (en) Application component display method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination