WO2019227487A1 - Procédé et terminal d'affichage d'élément - Google Patents

Procédé et terminal d'affichage d'élément Download PDF

Info

Publication number
WO2019227487A1
WO2019227487A1 PCT/CN2018/089660 CN2018089660W WO2019227487A1 WO 2019227487 A1 WO2019227487 A1 WO 2019227487A1 CN 2018089660 W CN2018089660 W CN 2018089660W WO 2019227487 A1 WO2019227487 A1 WO 2019227487A1
Authority
WO
WIPO (PCT)
Prior art keywords
interface
item
user
terminal
fingerprint
Prior art date
Application number
PCT/CN2018/089660
Other languages
English (en)
Chinese (zh)
Inventor
李展
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201880088100.0A priority Critical patent/CN111656347B/zh
Priority to PCT/CN2018/089660 priority patent/WO2019227487A1/fr
Publication of WO2019227487A1 publication Critical patent/WO2019227487A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a method and terminal for displaying items.
  • a privacy cabinet can be used to protect users' private information.
  • the user first finds the "File Management” application icon from the home screen interface of the terminal, and clicks the "File Management” application icon to enter the file management interface. Select and click on the control corresponding to "Security Cabinet” to enter the interface of the security cabinet. In the interface of the safe, the user needs to enter the password first. After the password verification is passed, the phone displays the files in the safe. For example, there are 0 pictures in the safe displayed in the control 201. Further, the user clicks the "Move In” control 202, clicks the file type of "Picture” on the menu 203 of "Select File Type", and selects the corresponding album, and then selects one or more pictures in the album, and clicks "OK" "Button.
  • the selected picture is moved from the gallery application to the safe application.
  • the control 204 shows that there are 2 pictures in the safe. In this way, when users browse photos from the gallery, the pictures moved to the safe are no longer displayed in the gallery. From the user ’s perspective, these pictures have been hidden. If users need to view these pictures, they need to view them from the safe in the file management.
  • An item display method and a terminal provided by the present application can simplify the operation of hiding and displaying items by a user, improve the use efficiency of the terminal, and improve the user experience.
  • an item display method provided in an embodiment of the present application is applied to a terminal.
  • the terminal includes a touch screen configured with a fingerprint reader.
  • the method includes: the terminal displays a first interface, and the first item in the first interface is When selected, the first item is at least one; the terminal receives the first operation of the user on the touch screen, the first operation is a preset operation gesture instructing the terminal to hide the first item, and the first operation is an operation on the first interface; In the first operation, the terminal collects the fingerprint information of the user in the first operation through the fingerprint identifier.
  • the terminal In response to the verification of the collected fingerprint information of the user in the first operation, the terminal displays the second interface, and the second interface does not Displaying the first item
  • the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as those of the first interface except the first item.
  • the user can directly operate the items (the first item) that need to be hidden, so that the terminal hides these items. It is no longer necessary to exit the current application and enter a specific application (for example, a "secure cabinet” application) for complex operations to complete the hiding of items in the application. Therefore, the method provided in the embodiment of the present application can simplify the operation of the user, improve the interaction efficiency between the user and the terminal, and is beneficial to improving the user experience.
  • user identity verification is performed, which is also beneficial to avoid the user's misoperation and to avoid the files that do not need to be hidden from being hidden.
  • the first interface further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon.
  • the terminal when the terminal displays the browsing interface or editing interface of the picture folder, it may also first determine whether the user needs to hide the picture file. If the user needs to hide the picture file, the fingerprint icon can be displayed. Otherwise, the fingerprint icon may not be displayed.
  • the foregoing determination of whether the user needs to hide the picture file may be, for example, an operation that the terminal detects that the user turns on the "hide” function.
  • the operation of the user to turn on the "hide” function may be, for example, that the user has turned on the hide function in the system settings of the terminal, or that the user has turned on the hide function button in the settings of the application. This embodiment of the present application does not specifically limit this.
  • the terminal when the terminal displays the picture folder editing interface, the terminal does not display a fingerprint icon until no picture file is selected.
  • the terminal detects that the user has selected a picture file to be hidden, the fingerprint icon is displayed. This embodiment of the present application does not limit this.
  • the first operation that the terminal receives on the touch screen of the user includes: the terminal receives any one of the following operations performed by the user at the display position of the fingerprint icon: tap, double-click, long press; or The control corresponding to the first item is dragged to the display position of the fingerprint icon; or, the terminal receives the user to drag the fingerprint icon to the control corresponding to the first item. It can be seen that the embodiments of the present application provide multiple operation gestures, which is beneficial to simplify user operations and improve user experience.
  • an operation gesture for hiding an item is set in the terminal in advance, for example, after an item is selected as the item to be hidden, tap, long-press, or double-click the fingerprint icon. If the terminal detects that the user's input gesture for the first operation to be a preset hidden item is the same, it can be considered that the user's operation of hiding the item is received. After it is determined that the first operation is a preset operation gesture, and the fingerprint comparison of the user collected according to the first operation is successful, the terminal may determine to hide the first item.
  • the method further includes: the terminal receives a second operation on the touch screen by the user, the second operation is a preset operation gesture that instructs the terminal to display the first item, and the second The operation is an operation on the second interface; in response to the second operation, the terminal collects the fingerprint information of the user in the second operation through the fingerprint identifier; in response to the verification of the fingerprint information of the user in the collected second operation passed, the terminal
  • the third interface is displayed.
  • the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface. It can be seen that the embodiments of the present application also provide a method for displaying hidden items to improve user experience.
  • the method further includes: in response to the verification that the fingerprint information of the user in the collected first operation fails, the terminal displays a fourth interface, A prompt message is displayed on the fourth interface, prompting the user to enter fingerprint information.
  • the first interface is a folder interface
  • the first item is any of the following: picture files, video files, audio files, text files, folders; or, the first interface is a gallery application interface, The first item is a picture file or a video file; or the first interface is the main screen interface and the first item is the application icon; or the first interface is the browsing interface of the short message and the first item is the short message; or the first interface Is the contact list interface, the first item is contact information; or, the first interface is a negative one-screen interface, and the first item is card information.
  • an item display method provided in an embodiment of the present application is applied to a terminal.
  • the terminal includes a touch screen configured with a fingerprint reader.
  • the method further includes: the terminal displays a first interface, and the first interface displays a first Item; the terminal receives the operation of the user to hide the first item; in response to receiving the operation of the user to hide the first item, the terminal displays a second interface, the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as the first
  • the interface is the same except for the first item; the terminal receives the user's first operation on the touch screen, and the first operation is a preset operation gesture that instructs the terminal to display the first item; the first item is not displayed on the first interface
  • the terminal collects fingerprint information of the user in the first operation through the fingerprint identifier; in response to the verification of the collected fingerprint information of the user in the first operation, the terminal displays the second and third interfaces, and The third interface has more first items than the second interface,
  • the first interface may be, for example, a browsing interface or an editing interface of an application or an application function, and the browsing interface or the editing interface includes multiple folder icons or file icons.
  • the first interface may also be a home screen interface of the terminal, and the home screen interface includes multiple application icons or folder icons.
  • the first interface may also be a negative one-screen interface of the terminal, where the negative one-screen interface may refer to an interface that a user swipes from the main screen interface (or desktop) to the right, and the negative one-screen interface may display functions commonly used by users.
  • Applications, and services and information subscribed to, the negative one-screen menu is also called desktop assistant, shortcut menu, etc.
  • the negative screen can also display the "situation intelligence" application, which contains multiple card information.
  • the first interface further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon; the first operation of the terminal receiving the user on the touch screen includes: the terminal receiving the user at the display position of the fingerprint icon Do any of the following: tap, double-tap, long-press.
  • the first interface is a folder interface; the first item is any of the following: picture files, video files, audio files, text files, folders; or the first interface is a gallery application interface, The first item is a picture file or a video file; or the first interface is the main screen interface and the first item is the application icon; or the first interface is the browsing interface of the short message and the first item is the short message; or the first interface Is the contact list interface, the first item is contact information; or, the first interface is a negative one-screen interface, and the first item is card information.
  • a terminal includes a touch screen configured with a fingerprint reader.
  • the terminal includes a display unit for displaying a first interface, a first item in the first interface is selected, and the first item is at least one;
  • the receiving unit is configured to receive a user's first operation on the touch screen.
  • the first operation is a preset operation gesture that instructs the terminal to hide the first item.
  • the processing unit is configured to respond to the first operation and collect the first through the fingerprint reader. Fingerprint information of the user during operation; the display unit is further configured to display the second interface in response to the verification of the fingerprint information of the user during the first operation collected, and the second interface is not displayed in the second interface.
  • the first interface has fewer first items, and the items displayed on the second interface are the same as those of the first interface except the first item.
  • the first interface displayed by the display unit further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon.
  • the receiving unit configured to receive the first operation performed by the user on the touch screen includes: receiving any one of the following operations performed by the user at the display position of the fingerprint icon: click, double-click, or long-press; or, receive The user drags the control corresponding to the first item to the display position of the fingerprint icon; or, the receiving user drags the fingerprint icon to the control corresponding to the first item.
  • the receiving unit is further configured to receive a second operation on the touch screen by the user after the display unit displays the second interface, and the second operation is a preset operation gesture that instructs the terminal to display the first item;
  • the processing unit is further configured to collect fingerprint information of the user in the second operation through the fingerprint identifier in response to the second operation; and the display unit is further configured to respond to the verification of the collected user fingerprint information in the second operation through the fingerprint operation,
  • the third interface is displayed.
  • the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface.
  • the display unit is further configured to, after the receiving unit receives the first operation of the user on the touch screen, in response to the verification that the fingerprint information of the user in the first operation collected fails, the terminal displays the first Five interfaces, the fifth interface displays prompt information, prompting the user to enter fingerprint information.
  • the first interface displayed by the display unit is a folder interface
  • the first item is any of the following: a picture file, a video file, an audio file, a text file, or a folder; or
  • the first interface is a gallery application interface, and the first item is a picture file or a video file; or, the first interface displayed by the display unit is a main screen interface, and the first item is an application icon; or, the first interface displayed by the display unit is a short message , The first item is a short message; or, the first interface displayed by the display unit is an address book interface and the first item is contact information; or the first interface displayed by the display unit is a negative one-screen interface, the first Items are card information.
  • a terminal includes a touch screen, and the touch screen is configured with a fingerprint reader.
  • the terminal further includes: a display unit for displaying a first interface, the first interface displaying a first item; and a receiving unit for receiving a user.
  • the operation of hiding the first item the display unit is further configured to display a second interface in response to the user's operation of hiding the first item, the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as the first item.
  • the interface is the same except for the first item; the receiving unit is further configured to receive a user's first operation on the touch screen.
  • the first operation is a preset operation gesture that instructs the terminal to display the first item; the first item is not in the Displayed in the first interface; a processing unit configured to collect fingerprint information of a user in the first operation through a fingerprint identifier in response to the first operation; a display unit further configured to respond to the collected user in the first operation
  • the verification of the fingerprint information is passed, and the third interface is displayed.
  • the third interface has more first items than the second interface.
  • the other items displayed on the third interface are the same as the second interface.
  • the first show Project II interface.
  • the first interface displayed by the display unit further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon;
  • a receiving unit for receiving a first operation of the user on the touch screen includes: a receiving unit To receive any one of the following actions performed by the user at the display position of the fingerprint icon: click, double-click, long press.
  • the first interface displayed by the display unit is a folder interface; the first item is any of the following: picture files, video files, audio files, text files, folders; or, The first interface is a gallery application interface, and the first item is a picture file or a video file; or, the first interface displayed by the display unit is a main screen interface, and the first item is an application icon; or, the first interface displayed by the display unit is a short message , The first item is a short message; or, the first interface displayed by the display unit is an address book interface and the first item is contact information; or the first interface displayed by the display unit is a negative one-screen interface, the first Items are card information.
  • a graphical user interface is stored in a terminal.
  • the terminal includes a touch screen, a memory, and one or more processors.
  • the one or more processors are configured to execute one or more stored in the memory.
  • Computer programs the touch screen is configured with a fingerprint reader, and the graphical user interface includes: a first interface displayed on the touch screen, the first interface includes a first item, and the first item is selected, and the first item is at least one;
  • the terminal receives the first operation of the user on the touch screen, and the fingerprint information of the user in the collected first operation passes the verification, and the second interface is displayed on the touch screen, and the second interface has fewer first items than the first interface.
  • the items displayed on the second interface are the same as those of the first interface except the first item; the first operation is an operation performed by the user on the first interface, and the first operation is a preset operation gesture that instructs the terminal to hide the first item .
  • the first interface further includes a fingerprint icon, and a fingerprint identifier is configured at a display position of the fingerprint icon.
  • the graphical user interface further includes: in response to the terminal receiving the second operation of the user on the touch screen, and collecting fingerprint information of the user in the second operation through the fingerprint identifier, the verification passes ,
  • the third interface is displayed on the touch screen, the third interface has more first items than the second interface, and other items displayed on the third interface are the same as the second interface;
  • the second operation is the operation performed by the user on the second interface, and the second operation An operation gesture of the first item is displayed for a preset instructing terminal.
  • the first interface is a folder interface
  • the first item is any of the following: picture files, video files, audio files, text files, folders; or, the first interface is a gallery application interface, The first item is a picture file or a video file; or the first interface is the main screen interface and the first item is the application icon; or the first interface is the browsing interface of the short message and the first item is the short message; or the first interface Is the contact list interface, the first item is contact information; or, the first interface is a negative one-screen interface, and the first item is card information.
  • a sixth aspect is a graphical user interface (GUI).
  • the graphical user interface is stored in a terminal.
  • the terminal includes a touch screen, a memory, and one or more processors.
  • the one or more processors are configured to execute one or more stored in the memory.
  • Computer programs the touch screen is equipped with a fingerprint reader, and the graphical user interface includes: a first interface displayed on the touch screen, the first interface including a first item; and a second display on the touch screen in response to receiving an operation of the user to hide the first item Interface, the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as those of the first interface except the first item; in response to the terminal receiving the first operation of the user on the touch screen And the fingerprint information of the user in the first operation collected by the fingerprint identifier is verified, the third interface is displayed on the touch screen, the third interface has more first items than the second interface, and the third interface displays Other items are the same as the second interface; the first operation is the operation performed by the
  • the first interface is a folder interface
  • the first item is any of the following: picture files, video files, audio files, text files, folders; or, the first interface is a gallery application interface, The first item is a picture file or a video file; or the first interface is the main screen interface and the first item is the application icon; or the first interface is the browsing interface of the short message and the first item is the short message; or the first interface Is the contact list interface, the first item is contact information; or, the first interface is a negative one-screen interface, and the first item is card information.
  • a terminal includes a processor, a memory, and a touch screen.
  • the memory and the touch screen are coupled to the processor.
  • the memory is used to store computer program code.
  • the computer program code includes computer instructions.
  • a computer storage medium includes computer instructions, and when the computer instructions are run on a terminal, the terminal is caused to execute the method as described in the first aspect or the second aspect and any one of possible implementation manners.
  • a ninth aspect a computer program product, when the computer program product runs on a computer, causes the computer to perform the method described in the first aspect or the second aspect and any one of the possible implementation manners.
  • a method for displaying an item includes: a user long-pressing a desired application icon on a home screen interface, and directly dragging the target application icon to a display position of a fingerprint icon. During the entire process of the user from long pressing the target application icon to dragging the target application icon to the display position of the fingerprint icon, the user's finger does not leave the touch screen.
  • the terminal collects fingerprint information of the user for comparison. If the comparison is successful, the terminal hides the application icon.
  • FIG. 1 is a schematic diagram of some graphical user interfaces displayed on a terminal in the prior art
  • FIG. 2 is a first schematic structural diagram of a terminal according to an embodiment of the present application.
  • FIG. 3 is a diagram of a terminal in a terminal provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a method for displaying an item according to an embodiment of the present application.
  • 5A is a schematic diagram of some graphical user interfaces displayed on a terminal in some embodiments of the present application.
  • 5B is a schematic diagram of some graphical user interfaces displayed on the terminal in some other embodiments of the present application.
  • FIG. 6 is a schematic flowchart of a method for displaying an item according to another embodiment of the present application.
  • FIG. 7A is a schematic diagram of some graphical user interfaces displayed on a terminal in other embodiments of the present application.
  • FIG. 7B is a schematic diagram of some graphical user interfaces displayed on the terminal in other embodiments of the present application.
  • FIG. 7C is a schematic diagram of some graphical user interfaces displayed on a terminal in other embodiments of the present application.
  • FIG. 8 is a schematic diagram of some graphical user interfaces displayed on a terminal in other embodiments of the present application.
  • FIG. 9 is a schematic diagram of some graphical user interfaces displayed on a terminal in other embodiments of the present application.
  • FIG. 10 is a schematic flowchart of a method for displaying an item provided by other embodiments of the present application.
  • FIG. 11 is a second schematic structural diagram of a terminal according to an embodiment of the present application.
  • FIG. 12 is a third schematic structural diagram of a terminal according to an embodiment of the present application.
  • first and second are used for descriptive purposes only, and cannot be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Therefore, the features defined as “first” and “second” may explicitly or implicitly include one or more of the features. In the description of the embodiments of the present application, unless otherwise stated, the meaning of "a plurality" is two or more.
  • the terminal can both collect the user's fingerprint information, and the terminal can also Identify user gestures. Therefore, the user's fingerprint input operation can not only make the terminal read the user's fingerprint information for user identity verification, but also instruct the terminal to hide items in the selected application. It can be seen that the method provided in the embodiment of the present application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
  • the items in the above applications can be folders (for example: folders in the "File Management” application), files in folders (for example: video files in the video folder, picture files in the picture folder), in the application
  • Certain types of information e.g., itinerary cards in the "Contextual Intelligence” app
  • certain information in the app e.g., one or some text messages in the "SMS” app, one in the "Contacts” app, or Contact information of some people
  • application icons corresponding to applications application icons in the home screen interface
  • the embodiments of the present application do not limit the items in the application.
  • the above-mentioned hiding is from the perspective of the user, and these hidden items are no longer displayed in the application to which they originally belong. For example: After hiding picture files (or video files) in the Gallery application, the Gallery application no longer displays these hidden picture files (or video files).
  • a fingerprint collection device can be configured in the touch screen of the terminal to implement the fingerprint recognition function, that is, the fingerprint collection device can be integrated with the touch screen to implement the fingerprint recognition function of the terminal.
  • the fingerprint collection device is configured in the touch screen, may be a part of the touch screen, or may be configured in the touch screen in other ways.
  • the main component of the fingerprint collection device in the embodiment of the present application may be a fingerprint sensor.
  • the fingerprint sensor may use any type of sensing technology, including but not limited to optical, capacitive, piezoelectric, or ultrasonic sensing technologies.
  • the terminal in this application may be a mobile phone (such as the mobile phone 100 shown in FIG. 2), a tablet computer, a personal computer (PC), and a personal digital assistant (personal) that can install an application and display an application icon.
  • digital assistant PDA
  • smart watches netbooks
  • wearable electronic devices Augmented Reality (AR) devices
  • VR virtual reality
  • this application does not specifically limit the specific form of the terminal .
  • a mobile phone 100 is taken as an example of the foregoing terminal.
  • the mobile phone 100 may specifically include: a processor 101, a radio frequency (RF) circuit 102, a memory 103, a touch screen 104, a Bluetooth device 105, and one or more sensors 106. , Wireless fidelity (WI-FI) device 107, positioning device 108, audio circuit 109, peripheral interface 110, power supply device 111 and other components. These components can communicate via one or more communication buses or signal lines (not shown in FIG. 2).
  • WI-FI Wireless fidelity
  • FIG. 2 does not constitute a limitation on the mobile phone, and the mobile phone 100 may include more or fewer components than shown in the figure, or combine certain components, or arrange different components.
  • the processor 101 is the control center of the mobile phone 100. It uses various interfaces and lines to connect various parts of the mobile phone 100.
  • the processor 101 executes or executes the application programs stored in the memory 103 and calls the data stored in the memory 103 to execute the execution of the mobile phone 100.
  • the processor 101 may include one or more processing units, for example, the processor 101 may include a baseband processor and an application processor.
  • the radio frequency circuit 102 may be used for receiving and transmitting wireless signals during information transmission or communication.
  • the radio frequency circuit 102 may receive the downlink data of the base station and process it to the processor 101; in addition, send the uplink data to the base station.
  • the radio frequency circuit includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency circuit 102 can also communicate with other devices through wireless communication.
  • the wireless communication may use any communication standard or protocol, including but not limited to a global mobile communication system, a general packet wireless service, code division multiple access, wideband code division multiple access, long-term evolution, email, short message service, and the like.
  • the memory 103 is configured to store application programs and data, and the processor 101 executes various functions and data processing of the mobile phone 100 by running the application programs and data stored in the memory 103.
  • the memory 103 mainly includes a storage program area and a storage data area, where the storage program area can store an operating system and at least one application required by a function (such as a sound playback function, an image playback function, etc.); the storage data area can store data according to the use of the mobile phone. Data created at 100 (such as audio data, phone book, etc.).
  • the memory 103 may include a high-speed random access memory (Random Access Memory, RAM), and may also include a non-volatile memory, such as a magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • RAM Random Access Memory
  • the memory 103 may store various operating systems, for example, developed by Apple Inc. Operating system, developed by Google Operating system, etc.
  • the memory 103 may be independent and connected to the processor 101 through the communication bus; the memory 103 may also be integrated with the processor 101.
  • the memory 103 includes a storage device 207.
  • the touch screen 104 may specifically include a touchpad 104-1 and a display 104-2.
  • the touchpad 104-1 can collect touch events on or near the user of the mobile phone 100 (for example, the user uses a finger, a stylus, or any suitable object on the touchpad 104-1 or on the touchpad 104 Near -1), and send the collected touch information to other devices (such as the processor 101).
  • the user's touch event near the touchpad 104-1 can be called hovering touch; hovering touch can mean that the user does not need to directly touch the touchpad in order to select, move or drag an object (such as an icon). , As long as the user is near the device in order to perform the desired function.
  • various types such as resistive, capacitive, infrared, and surface acoustic wave can be used to implement the touch panel 104-1.
  • the display (also referred to as a display screen) 104-2 may be used to display information input by the user or information provided to the user and various menus of the mobile phone 100.
  • the display 104-2 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the touchpad 104-1 may be overlaid on the display 104-2. When the touchpad 104-1 detects a touch event on or near the touchpad 104-1, it transmits it to the processor 101 to determine the type of the touch event, and then the processor 101 may provide a corresponding visual output on the display 104-2 according to the type of the touch event.
  • the touchpad 104-1 and the display screen 104-2 are implemented as two independent components to implement the input and output functions of the mobile phone 100, in some embodiments, the touchpad 104- 1 Integrated with the display screen 104-2 to implement the input and output functions of the mobile phone 100.
  • the touch screen 104 is formed by stacking multiple layers of materials, which will not be described in detail in the embodiments of the present application.
  • the touchpad 104-1 can be configured on the front of the mobile phone 100 in the form of a full board
  • the display panel 104-2 can also be configured on the front of the mobile phone 100 in the form of a full board, so that the front of the phone can be frameless Structure, such as a full-screen phone.
  • the mobile phone 100 may also have a fingerprint recognition function.
  • the fingerprint reader 112 may be disposed on the back of the mobile phone 100 (eg, below the rear camera), or the fingerprint reader 112 may be disposed on the front of the mobile phone 100 (eg, below the touch screen 104).
  • a fingerprint collection device 112 may be configured in the touch screen 104 to implement the fingerprint identification function, that is, the fingerprint collection device 112 may be integrated with the touch screen 104 to implement the fingerprint identification function of the mobile phone 100.
  • the fingerprint collection device 112 is configured in the touch screen 104, may be a part of the touch screen 104, or may be configured in the touch screen 104 in other ways.
  • the main component of the fingerprint collection device 112 in the embodiment of the present application is a fingerprint sensor.
  • the fingerprint sensor may use any type of sensing technology, including, but not limited to, optical, capacitive, piezoelectric, or ultrasonic sensing technologies.
  • the mobile phone 100 may further include a Bluetooth device 105 for implementing data exchange between the mobile phone 100 and other short-range devices (such as a mobile phone, a smart watch, etc.).
  • the Bluetooth device in the embodiment of the present application may be an integrated circuit or a Bluetooth chip.
  • the mobile phone 100 may further include at least one sensor 106, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor may include a proximity sensor, wherein the proximity sensor may turn off the power of the display when the mobile phone 100 is moved to the ear.
  • an accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when it is stationary.
  • attitude of the mobile phone such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition-related functions (such as pedometer, tap), etc .; as for the mobile phone 100, other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. More details.
  • the WI-FI device 107 is used to provide the mobile phone 100 with network access that complies with WI-FI related standard protocols.
  • the mobile phone 100 can access the WI-FI access point through the WI-FI device 107 to help users send and receive email, Browse the web and access streaming media, etc., it provides users with wireless broadband Internet access.
  • the WI-FI device 107 can also be used as a WI-FI wireless access point, and can provide WI-FI network access for other devices.
  • the positioning device 108 is configured to provide a geographic location for the mobile phone 100. It can be understood that the positioning device 108 may specifically be a receiver of a global positioning system (Global Positioning System, GPS) or a positioning system such as Beidou satellite navigation system or Russian GLONASS. After receiving the geographical position sent by the positioning system, the positioning device 108 sends the information to the processor 101 for processing, or sends the information to the memory 103 for storage. In other embodiments, the positioning device 108 may also be a receiver of an assisted global positioning system (AGPS). The AGPS system assists the positioning device 108 to complete ranging and positioning services by serving as an auxiliary server.
  • AGPS assisted global positioning system
  • the auxiliary positioning server provides positioning assistance by communicating with a positioning device 108 (ie, a GPS receiver) of a device such as the mobile phone 100 through a wireless communication network.
  • a positioning device 108 ie, a GPS receiver
  • the positioning device 108 may also be a positioning technology based on a WI-FI access point. Since each WI-FI access point has a globally unique (Media Access Control, MAC) address, the device can scan and collect broadcast signals from surrounding WI-FI access points when WI-FI is turned on.
  • MAC Media Access Control
  • the MAC address broadcast by the WI-FI access point can be obtained; the device sends these data (such as the MAC address) that can indicate the WI-FI access point to the location server through the wireless communication network, and the location server retrieves each The geographical position of the WI-FI access point, combined with the strength of the WI-FI broadcast signal, calculates the geographical position of the device and sends it to the positioning device 108 of the device.
  • the audio circuit 109, the speaker 113, and the microphone 114 may provide an audio interface between the user and the mobile phone 100.
  • the audio circuit 109 may transmit the received electrical data converted electric signal to the speaker 113, and the speaker 113 converts the sound signal into a sound signal for output.
  • the microphone 114 converts the collected sound signal into an electric signal, and the audio circuit 109 After receiving, it is converted into audio data, and then the audio data is output to the RF circuit 102 for sending to another mobile phone, or the audio data is output to the memory 103 for further processing.
  • the peripheral interface 110 is used to provide various interfaces for external input / output devices (such as a keyboard, a mouse, an external display, an external memory, a user identification module card, etc.).
  • external input / output devices such as a keyboard, a mouse, an external display, an external memory, a user identification module card, etc.
  • a universal serial bus (Universal Serial Bus, USB) interface is used to connect with a mouse
  • a metal contact on the card slot of the user identification module is used to connect with a subscriber identification module (SIM) card provided by a telecommunications operator.
  • SIM subscriber identification module
  • the peripheral interface 110 may be used to couple the above-mentioned external input / output peripherals to the processor 101 and the memory 103.
  • the mobile phone 100 may further include a power supply device 111 (such as a battery and a power management chip) for supplying power to various components.
  • the battery may be logically connected to the processor 101 through the power management chip, so as to manage charging, discharging, and power consumption management through the power supply device 111. And other functions.
  • the mobile phone 100 may further include a camera (a front camera and / or a rear camera), a flash, a micro-projection device, a near field communication (NFC) device, and the like, and details are not described herein again.
  • a camera a front camera and / or a rear camera
  • a flash a flash
  • a micro-projection device a micro-projection device
  • NFC near field communication
  • the operating system of the mobile phone 100 may be an operating system such as Android or IOS. Taking the Android operating system as an example, as shown in FIG. 3, the Android operating system may be divided into four layers, namely a kernel 320, a middleware 330, API 360 and / or application 370.
  • the kernel 320 may include a system resource manager 321 and / or a device driver 323.
  • the system resource manager 321 may include a process manager (not shown), a memory manager (not shown), and a file system manager (not shown).
  • the system resource manager 321 can perform control, allocation, restoration, and the like of system resources.
  • the device driver 323 may include, for example, a display driver (not shown), a camera driver (not shown), a Bluetooth driver (not shown), a shared memory driver (not shown), a USB driver (not shown) (Out), a keypad driver (not shown), a Wi-Fi driver (not shown), and / or an audio driver (not shown).
  • the device driver 323 may include an inter-process communication (IPC) driver (not shown).
  • IPC inter-process communication
  • the middleware 330 may include a plurality of modules implemented in advance to provide functions shared by the applications 370.
  • the middleware 330 can provide functions to the application 370 through the API 360, so that the application 370 can efficiently use limited system resources in the electronic device.
  • the middleware 330 may include at least one of the following: runtime 335, application manager 341, window manager 342, multimedia manager 343, resource manager 344, power manager 345, database management Manager 346, package manager 347, connection manager 348, notification manager 349, location manager 350, graphics manager 351, security manager 352, and any other suitable and / or similar manager.
  • the runtime 335 may include, for example, a library module used by a compiler to add new functions by using a programming language during execution of the application 370. According to the embodiments disclosed in this application, the runtime 335 may perform functions related to input and output, management of memory, arithmetic functions, and the like.
  • the application manager 341 may manage a life cycle of at least one application 370, for example.
  • the window manager 342 may manage graphical user interface (GUI) resources used on the screen.
  • the multimedia manager 343 can detect a format for reproducing various media files, and can encode or decode the media files by using a codec suitable for the relevant format.
  • the resource manager 344 can manage resources of at least one application 370, such as source code, memory, storage space, and the like.
  • the power manager 345 can operate with a basic input / output system (BIOS), can manage a battery or a power source, and can provide power source information and the like for operation.
  • the database manager 346 may manage the database in a manner that enables a database to be generated, searched, and / or changed for use by the at least one application 370.
  • the package manager 347 may manage the installation and / or update of applications distributed in the form of a package file.
  • the connection manager 348 can manage wireless connections such as Wi-Fi and BT.
  • the notification manager 349 can display or report to the user events such as arrival messages, appointments, proximity alerts, and the like without disturbing the user.
  • the location manager 350 may manage location information of the electronic device.
  • the graphic manager 351 may manage a graphic effect and / or a graphic effect-related UI to be provided to a user.
  • the security manager 352 may provide various security functions for system security, user authentication, and the like. According to the embodiment disclosed in this application, when the electronic device (for example, the mobile phone 100) has a phone function, the middleware 330 may further include a phone manager (not shown) for managing the voice call function of the electronic device and / or Video phone call function.
  • the middleware 330 may generate and use a new middleware module through various function combinations of the above-mentioned internal element modules.
  • the middleware 330 may provide a module specialized according to the type of the OS to provide a differentiated function.
  • the middleware 330 may also dynamically delete some of the existing elements, or may add new elements. Therefore, the middleware 330 may omit some of the elements described in the various embodiments disclosed in the present application, may further include other elements, or may replace some of these elements with elements that perform similar functions and have different names.
  • API 360 is a collection of API programming functions and can have different configurations depending on the OS. In the case of, for example, Android or iOS, an API collection can be provided to each platform. In the case of Tizen, for example, two or more API sets can be provided to each platform.
  • Applications 370 may include, for example, pre-loaded applications and / or third-party applications. Applications 370 may include, for example, a homepage application 371, a dial-up application 372, an SMS / MMS application 373, an IM application 374, a browser application 375, a camera application 376, an alarm clock application 377, a contact application 378, a voice dial application 379, an email application 380 , Calendar application 381, media player application 382, gallery application 383, safe application 384, and any other suitable and / or similar application.
  • the touch screen can be triggered to pass
  • the driver reports the touch event (such as the number of touch points, position, time, and other parameters) generated by the operation to the kernel 320.
  • the kernel 320 encapsulates the touch event and calls the corresponding API to distribute the touch event to the gallery application 383.
  • the gallery application 383 sets the display state corresponding to the selected picture files to a hidden state. Then, these hidden picture files will no longer be displayed in the browsing interface of the gallery application 383.
  • the touch screen can be triggered to pass the corresponding driver.
  • the touch event (such as the number, position, and time of touch points) generated by the operation is reported to the kernel 320, and the kernel 320 encapsulates the touch event and calls the corresponding API to distribute the touch event to the gallery application 383 and the safe application 384.
  • the gallery application 383 moves the selected picture files to the storage directory of the safe application 384 in response to the trigger event.
  • these picture files will no longer be displayed in the browsing interface of the gallery application 383, that is, the gallery application 383 realizes hiding these picture files.
  • these picture files can be displayed.
  • a method for hiding items in an application includes: a terminal displaying a first interface, where the first interface includes multiple controls, and each control may correspond to an item.
  • the first control is selected, and the first control corresponds to the first item.
  • the terminal receives an operation performed by the user on the touch screen, and the operation is used to instruct the terminal to hide the first item.
  • the terminal obtains user fingerprint information and verifies user identity according to the user's operation on the touch screen.
  • the terminal displays a second interface, and the first item is not displayed in the second interface.
  • the second interface has fewer first items than the first interface, and the items displayed on the second interface are the same as those of the first interface except the first item. In other words, the terminal hides the first item in the application.
  • the first interface may be, for example, a browsing interface or an editing interface of an application or an application function, and the browsing interface or the editing interface includes a plurality of folder icons or file icons.
  • the first interface may also be a home screen interface of the terminal, and the home screen interface includes multiple application icons or folder icons.
  • the first interface may also be a negative one-screen interface of the terminal, where the negative one-screen interface may refer to an interface that a user swipes from the main screen interface (or desktop) to the right, and the negative one-screen interface may display functions commonly used by users. , Applications, and services and information subscribed to, the negative one-screen menu is also called desktop assistant, shortcut menu, etc.
  • the negative screen can also display the "situation intelligence" application, which contains multiple card information.
  • the embodiment of the present application does not specifically limit the first interface.
  • the above first item may be a folder (for example, a folder in the "File Management” application), a file in the folder (for example, a video file in a video folder, a picture file in a picture folder), an Certain types of information (for example: itinerary cards in the "situational intelligence” application), certain information in the application (for example: a certain message or certain messages in the "SMS” application, some or some in the "Contacts” application Contact information of some people), application icons corresponding to applications (application icons in the home screen interface), and the like.
  • a folder for example, a folder in the "File Management” application
  • a file in the folder for example, a video file in a video folder, a picture file in a picture folder
  • Certain types of information for example: itinerary cards in the "situational intelligence” application
  • certain information in the application for example: a certain message or certain messages in the "SMS” application, some or some in the "Contacts” application Contact information of some people
  • application icons corresponding to applications application icons in the
  • the user can directly operate the items that need to be hidden, so that the terminal hides these items. It is no longer necessary to exit the current application and enter a specific application (for example, a "secure cabinet” application) for complex operations to complete the hiding of items in the application. Therefore, the method provided in the embodiment of the present application can simplify the operation of the user, improve the interaction efficiency between the user and the terminal, and is beneficial to improving the user experience.
  • the user identity verification is performed, which is also beneficial to avoid the user's mistaken operations and to avoid the files that do not need to be hidden from being hidden.
  • Application Scenario 1 Take the picture file in the picture folder hidden by the user as an example for illustrative description.
  • the user opens the browsing interface of the picture folder through the "File Management” application. Click the "Edit” button in this browsing interface to enter the editing interface of the picture folder.
  • the picture file to be hidden as shown in interface 401 (first interface) shown in (1) in FIG. 5A.
  • a plurality of controls are displayed in the interface 401, and each control corresponds to a picture file.
  • the picture file 403 is selected (the first control is selected, the first control corresponds to the picture file 403, and the picture file 403 is the first item). It should be noted that, on the interface 401, multiple picture files can also be selected, and the number of selected picture files is not limited in the embodiment of the present application.
  • the terminal when the terminal displays the browsing interface or editing interface of the picture folder, it also displays a fingerprint icon 402, which is used to prompt the user that the picture file can be hidden.
  • the display position of the fingerprint icon 402 is associated with the fingerprint identifier. That is, when the user operates at the display position of the fingerprint icon 402, the terminal can collect the fingerprint information of the user through the fingerprint identifier under the touch screen, and The fingerprint information is compared with the pre-stored fingerprint information to verify the user's identity. After the user authentication is successful, proceed to the next step.
  • the user may also use other icons, or text, or pictures to prompt the user to input fingerprint information, and instruct the terminal to perform hiding of the selected picture file.
  • the terminal may not display the fingerprint icon. This embodiment of the present application does not specifically limit this.
  • the terminal when the terminal displays the browsing interface or editing interface of the picture folder, it may also first determine whether the user needs to hide the picture file. If the user needs to hide the picture file, the fingerprint icon 402 can be displayed. Otherwise, the fingerprint icon 402 may not be displayed.
  • the foregoing determination of whether the user needs to hide the picture file may be, for example, an operation that the terminal detects that the user turns on the "hide” function.
  • the operation of the user to turn on the "hide” function may be, for example, that the user has turned on the hide function in the system settings of the terminal, or that the user has turned on the hide function button in the settings of the application. This embodiment of the present application does not specifically limit this.
  • the terminal when the terminal displays the picture folder editing interface, the terminal does not display the fingerprint icon 402 until no picture file is selected. After the terminal detects that the user has selected a picture file to be hidden, the fingerprint icon 402 is displayed. This embodiment of the present application does not limit this.
  • the terminal detects the operation of hiding the picture file by the user, for example, it is detected that the user presses the fingerprint icon 402 on the interface 401 shown in (1) in FIG. 5A, the terminal collects the user's fingerprint information, and collects The obtained fingerprint information is compared with the stored fingerprint information.
  • the above-mentioned operation of the user to hide the picture file may be an operation performed by the user on the fingerprint input position, such as clicking, long-pressing, double-clicking, etc., and specific operation gestures may be set under the setting function. Not specifically limited. Because the user's finger will touch the touch screen of the terminal when the user performs the operation at the fingerprint input position, the terminal can collect the user's finger information through the fingerprint reader under the touch screen. Then compare the collected fingerprint information with the fingerprint stored in advance by the terminal.
  • the terminal may retain the original position of the picture file 403, that is, the original position of the picture file 403 is displayed as blank, and the positions of other unhidden picture files are unchanged.
  • the terminal may not retain the original position of the picture file 403.
  • the terminal may supplement the picture file originally arranged after the picture file 403.
  • the terminal may also reorder the unhidden picture files, which is not specifically limited in this embodiment of the present application.
  • the terminal may also change the display effect of the fingerprint icon 402 to prompt the user that the fingerprint comparison is successful.
  • the fingerprint icon 402 is changed from gray to other colors, such as red.
  • the above-mentioned fingerprint icon 402 is displayed statically.
  • the fingerprint icon 402 is dynamically displayed by means of flashing, animation and the like.
  • the terminal may continue to display the browsing interface or the editing interface of the picture folder, and the picture file 403 is still displayed in the interface.
  • the picture file 403 may be selected or unselected, which is not specifically limited in the embodiment of the present application.
  • the terminal may also display a prompt message to prompt the user to re-enter the fingerprint for hiding the picture file.
  • the terminal collects the fingerprint information input at this time again, and compares the fingerprint information collected this time with the previously stored fingerprint information. If the comparison is successful, the selected image file is hidden; otherwise, the selected image file is still retained.
  • the terminal may also shake or change the color, grayscale, brightness and other forms of the fingerprint icon 402 to alert the user that the fingerprint comparison fails.
  • the hiding method provided in the embodiment of the present application can also be applied to hiding picture files in a gallery application, video files in a video folder, other files in a folder or other folders, etc. This embodiment of the present application does not limit this.
  • the user can directly select the picture file to be hidden, and then enter the operation of hiding the picture file, so that the terminal can hide the selected picture file. It can be seen that the method provided in the embodiment of the present application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
  • a schematic flowchart of a method for hiding items in an application provided by an embodiment of the present application includes:
  • the terminal displays a file browsing interface, where the browsing interface includes one or more file identifiers.
  • the files may be picture files, video files, audio files, other types of files, folders, and so on.
  • the file identifier may be an icon of a type corresponding to the file, or a thumbnail corresponding to the file, which is not limited in the embodiment of the present application.
  • a user opens a browsing interface of a picture folder through a "file management” application or a "gallery” application, and the browsing interface includes thumbnails corresponding to multiple picture files.
  • the terminal receives the first operation of the user and enters the editing interface of the one or more files.
  • the first operation of the user may be, for example, that the user clicks the "Edit" button in the above-mentioned browsing interface to enter the editing interface of the picture folder, and then the one or more files can be edited, such as: selecting, deleting, sending, etc. operating.
  • the identifiers of the one or more files may be directly selected, and then this step may not be performed.
  • the terminal receives an operation of the user to select a file to be hidden, and determines that the file selected by the user is a target file.
  • the operation of the user to select the file to be hidden may be a user's click operation on the file identifier, or the user may slide on the file identifier, or drag the file identifier to a specified position, etc. No restrictions.
  • the terminal receives an operation of the user to hide the target file.
  • a fingerprint icon is displayed on a file browsing interface or an editing interface, and the fingerprint icon is used to prompt a user to input fingerprint information to hide a target file.
  • a display method of the fingerprint icon reference may be made to the foregoing description, and details are not repeatedly described herein.
  • the terminal has a preset gesture of hiding the target file. For example, after selecting a file as the file to be hidden, click, long-press, double-click the fingerprint icon, etc. If the terminal detects the user's gesture of entering a preset hidden target file, it is receiving. To the user to hide the target file operation.
  • step S105 The terminal collects fingerprint information of the user and verifies the identity of the user according to the operation of the user to hide the target file. If the verification fails, step S106a is performed. If the verification is passed, step S106b is executed.
  • the terminal displays a prompt message, prompting the user that the authentication fails.
  • the picture file 403 is selected.
  • the terminal detects that the user operates the fingerprint icon 402 on the interface 401. Therefore, the terminal collects the fingerprint information of the user, and compares the collected fingerprint information with the fingerprint information stored in advance. If the comparison is successful, the user authentication is passed. Then, the terminal hides the selected target file and displays an interface 404 as shown in (2) in FIG. 5A, and the previously selected image file 403 is not displayed in the interface 404.
  • the terminal receives an operation of displaying a hidden file by the user.
  • the terminal may also display a prompt message to prompt the user that there are hidden files in the interface.
  • the prompt information may be a text message, a specific icon, or the like.
  • the specific icon may be, for example, a fingerprint icon.
  • the fingerprint icon in this step may be different from the fingerprint icon in step S104.
  • the fingerprint icon in this step and the fingerprint icon in step S104 are displayed at different positions, or are marked with different shapes or colors, or are marked with different characters, which are not limited in this embodiment of the present application.
  • the fingerprint icon in this step may be the same fingerprint icon as the fingerprint icon in step S104.
  • the terminal can operate the fingerprint icon according to the user using different operation gestures, or the user uses different fingers (different fingerprint information) Operate the fingerprint icon to distinguish whether the operation is to hide a file or to display a file. For example, the operation of clicking the fingerprint icon is to hide the file, and the operation of long pressing the fingerprint icon is to display the hidden file.
  • the terminal may not need to distinguish a user's operation gesture on the fingerprint icon. Because the user needs to select the file to be hidden before hiding the file. However, users do not need to select any files before they show hidden files. Therefore, after detecting the user's operation on the display of the fingerprint icon, the terminal can also distinguish according to whether a file is selected in the current interface. If a file is selected in the current interface, the operation is to hide the selected file. If no file is selected in the current interface, the operation is to display hidden files. This embodiment of the present application does not limit this.
  • a gesture for displaying a hidden file is preset in the terminal, such as clicking, long-pressing, double-clicking a fingerprint icon, etc. If the terminal detects that the user inputs a preset gesture for displaying a hidden file, the user is received Show actions for hidden files.
  • step S108 The terminal collects the fingerprint information of the user and verifies the identity of the user according to the operation of the user to display the hidden file. If the verification is passed, step S109b is executed. If the verification fails, step S109a is executed.
  • the terminal displays a prompt message, prompting the user that the authentication fails.
  • S109b The terminal displays the hidden file.
  • the terminal takes the fingerprint icon in step S107 and the fingerprint icon in step S104 as the same fingerprint icon, and the terminal does not distinguish the specific operation gesture of displaying a hidden file operation from a specific operation of the hidden file as an example for description.
  • the terminal detects that the user has long-pressed the fingerprint icon 402 on the interface 404 shown in (1) in FIG. 5B. Therefore, the terminal collects the fingerprint information of the user, and compares the collected fingerprint information with the fingerprint information stored in advance. If the comparison is successful, the user authentication is passed. Then, the terminal displays the hidden files in the interface, and displays an interface 405 shown in (2) in FIG. 5B.
  • the interface 405 displays a picture file 403, and an interface 404 shown in (1) in FIG. 5B. Picture file 403 is not displayed.
  • the terminal may display hidden files in a blank position in the current interface, or may display the positions displayed before these files, which is not specifically limited in this embodiment of the present application.
  • the hidden file is an image file for example.
  • the hidden image file can be displayed once. That is to say, when the user exits the current interface (for example, the browsing interface of a picture folder) or the current application (for example, the "gallery” application), the display status of these hidden picture files becomes invalid. That is to say, when the user enters the browsing interface of the picture file again (for example, the browsing interface of the picture folder) or enters the application where the picture file is located (for example, the "Gallery” application), these hidden picture files are still hidden. Is invisible.
  • the time when the terminal displays hidden picture files may be a preset time period, that is, from the time when the terminal starts displaying these hidden picture files, within a preset time period, these hidden image files The picture files are displayed and visible. After a preset period of time, these hidden picture files return to the hidden state and become invisible. In other examples of the present application, the terminal may always display these hidden picture files. This embodiment of the present application does not limit this.
  • Application Scenario 2 Take the user to hide the application icon in the home screen interface as an example for example.
  • the terminal displays a home screen interface.
  • the terminal detects that the user has long pressed any application icon in the home screen interface, and the home screen interface displayed by the terminal is in an editable state.
  • the user may select one or more application icons to be hidden through an operation such as clicking, and the terminal displays an interface 501 (ie, the first interface) shown in (1) of FIG. 7A.
  • the interface 501 includes multiple controls, each of which corresponds to an application icon, of which the “WeChat” application icon and the “CCB” application icon are selected (that is, the first control has two, one corresponding to the “WeChat” application icon, The other corresponds to the "Construction Bank” application icon, the "WeChat” application icon and the “Construction Bank” application icon are the first item).
  • the terminal receives the operation of the user to hide the application icon, and the terminal collects the user's fingerprint information according to the operation, and compares the fingerprint information with the pre-stored fingerprint information. If the comparison is successful, the selected application icon ("WeChat” is hidden) "Application icon and" CCB application icon "), an interface 503 (second interface) shown in (3) in FIG. 7A is displayed.
  • the operation of hiding the application icon by the user may be similar to the operation of hiding the picture file by the user in the application scenario 1.
  • the operation of hiding the application icon by the user may also be that the user presses and holds any selected application icon and drags the application icon to a specified position, which is associated with a fingerprint reader, for example:
  • the application icons that need to be hidden in the interface 601 for example, the "WeChat” application icon and the "Construction Bank” application icon
  • the user can press and hold any selected application icon, for example "Construction Bank” application icon, drag the selected application icon to the display position of the fingerprint icon 602.
  • the terminal may display the fingerprint icon 602 when the home screen interface is displayed or when the home screen interface is in an editable state.
  • the terminal may also not display the fingerprint icon 602 when displaying the home screen interface, and after the user presses and holds the application icon to be hidden, the fingerprint icon 602 is displayed.
  • the terminal may also display a fingerprint icon 602 after the user drags an application icon to be hidden to a specified position and leaves the touch screen.
  • the embodiment of the present application does not specifically limit the time during which the terminal displays the fingerprint icon 602.
  • the terminal can collect the user's fingerprint information through the fingerprint reader under the touch screen.
  • the collected fingerprint information is compared with the fingerprint information stored in advance.
  • the terminal hides the selected application icon ("WeChat” application icon and "Construction Bank” application icon), that is, the interface 603 as shown in (2) of FIG. 7B is displayed.
  • the user can directly hide the application icon by dragging the application icon that needs to be hidden to a specified position through a specific finger (the finger corresponding to the pre-stored fingerprint information).
  • the terminal may display prompt information, prompt the user to re-enter fingerprint information, and display an interface 604 as shown in (3) of FIG. 7B, and the interface 604 displays the prompt information 605. Then, the user may input a fingerprint at the display position of the fingerprint icon 602, for example.
  • the terminal collects the user's fingerprint information again and compares it with the fingerprint information stored in advance.
  • the terminal If the comparison is successful, the user authentication is successful, and the terminal hides the selected application icon ("WeChat” application icon and "Construction Bank” application icon), and an interface 606 shown in (4) in FIG. 7B is displayed. If the comparison fails, it means that the user does not have permission to hide the application icon, and the terminal does not hide the selected hidden icon.
  • the user when the user hides an application icon in the home screen interface by dragging, the user may not need to first click any application icon in the home screen interface, so that the terminal home screen Is in an editable state, and this application icon to be hidden is selected. Instead, the user can directly press and hold the application icon to be hidden directly on the home screen interface, and drag the application icon directly to the display position of the fingerprint icon. During the entire process of the user from long pressing the application icon to dragging the application icon to the display position of the fingerprint icon, the user's finger does not leave the touch screen.
  • the terminal collects fingerprint information of the user for comparison. The process of comparison and subsequent processing can refer to the above description, and will not be repeated here.
  • the user can directly select the application icon to be hidden, and then enter the operation of hiding the application icon (or press and hold any selected application icon and drag it to the position of the fingerprint icon), This completes the hiding of the selected application icon.
  • the user can directly press and hold the application icon that needs to be hidden, and then drag the application icon to the position of the fingerprint icon to complete hiding the application icon.
  • a schematic flowchart of a method for hiding items in an application provided by an embodiment of the present application includes:
  • the terminal displays a home screen interface.
  • the terminal receives the second operation of the user, and the home screen interface enters an editable state.
  • the second operation of the user may be, for example, the user long presses any application icon in the home screen interface, and the home screen interface displayed by the terminal is in an editable state.
  • S203 The terminal receives an operation of the user to select an application icon to be hidden, and determines that the application icon selected by the user is a target application icon.
  • the terminal receives an operation of the user to hide the target application icon.
  • a fingerprint icon is displayed on the home screen interface, and the fingerprint icon is used to prompt the user to input fingerprint information to hide the target application icon.
  • the display method of the fingerprint icon reference may be made to the foregoing related description, and details are not repeatedly described herein.
  • the operation of the user terminal to hide the target application icon may be a user tapping, long-pressing, double-clicking, sliding, rotating, etc. on the fingerprint icon, or the user may press and hold any selected application icon. Drag the selected application icon to the fingerprint icon.
  • step S202 when a user hides an application icon in the home screen interface by dragging, the user may not need to first click any application icon in the home screen interface, so that the terminal home screen In the editable state, select the application icon to be hidden again, that is, the terminal does not need to perform step S202.
  • the operation of the user selecting the application to be hidden in step S203 may be an operation of the user directly pressing and holding the application icon to be hidden directly on the home screen interface.
  • the operation of the user to hide the target application icon in S204 is that the user directly drags the application icon to the display position of the fingerprint icon. It should be noted that during the entire process of the user from long pressing the application icon to dragging the application icon to the display position of the fingerprint icon, the user's finger does not leave the touch screen.
  • step S205 The terminal collects fingerprint information of the user and verifies the identity of the user according to the operation of the user to hide the target application icon. If the verification fails, step S206a is performed. If the verification is passed, step S206b is executed.
  • the terminal displays a prompt message, prompting the user that the authentication fails.
  • a prompt message may be displayed to remind the user that there is a hidden application icon in the interface.
  • the prompt information may be a text message, a specific icon, or the like.
  • the specific icon may be, for example, a fingerprint icon.
  • the fingerprint icon in this step may be different from the fingerprint icon in step S204.
  • the fingerprint icon in this step and the fingerprint icon in step S204 are displayed in different positions, or are marked with different shapes or colors, or are marked with different characters, which are not limited in this embodiment of the present application.
  • the fingerprint icon in this step may be the same fingerprint icon as the fingerprint icon in step S204.
  • the terminal may operate the fingerprint icon according to the user using different operation gestures, or use different fingers (different fingerprint information) to operate.
  • Fingerprint icon to distinguish whether the operation is to hide the application icon or to display the application icon.
  • the operation of clicking the fingerprint icon is an operation of hiding the application icon
  • the operation of long pressing the fingerprint icon is an operation of displaying the hidden application icon.
  • the terminal may not need to distinguish a user's operation gesture on the fingerprint icon. Before the user hides the application icon, the user needs to select the application icon to be hidden or drag the application icon while holding it. However, the user does not need to select the application icon before displaying the application icon.
  • the terminal can also distinguish based on whether an application icon is selected in the current home screen interface. If an application icon is selected in the current interface, the operation is to hide the selected application icon. If no application icon is selected in the current interface, this operation is an operation of displaying a hidden application icon. This embodiment of the present application does not limit this.
  • the terminal receives an operation of the user to display the hidden application icon.
  • step S208 The terminal collects fingerprint information of the user and verifies the identity of the user according to the operation of the user displaying the hidden application icon. If the verification is passed, step S209b is executed. If the verification fails, step S209a is performed.
  • the terminal displays a prompt message, prompting the user that the authentication fails.
  • S209b The terminal displays a hidden application icon.
  • the fingerprint icon in step S206 and the fingerprint icon in step S204 are the same fingerprint icon.
  • the terminal detects that the user operates the fingerprint icon 602 on the interface 606 shown in (1) of FIG. 7C. Therefore, the terminal collects the fingerprint information of the user, and compares the collected fingerprint information with the fingerprint information stored in advance. If the comparison is successful, the user authentication is passed. Because no application icon is selected in the current home screen interface, and the user does not hold down an application icon to drag, the terminal displays the hidden application icon in the home screen interface, as shown in Figure 7C (2 ), An interface 607 is displayed. The interface 607 displays the “WeChat” application icon and the “CCB” application icon, but the two application icons are not displayed in the interface 606 shown in (1) in FIG. 7C. It should be noted that, for example, only two application icons are hidden in the interface 606 shown in (1) in FIG. 7C. If other application icons are hidden in the interface 606, the terminal can display all hidden application icons. This embodiment of the present application does not limit this.
  • the terminal may display the hidden application icons in a blank position in the current interface, or may display the positions displayed before these application icons, which is not specifically limited in this embodiment of the present application.
  • the time when the terminal displays the hidden application icon may be set. Please refer to the relevant description in Application Scenario 1, which will not be repeated here.
  • Application Scenario 3 Take the user to hide the short message of the "SMS" application as an example for illustrative description.
  • the user opens an interface of the "SMS" application to browse the short messages, such as the interface 701 shown in (1) of Fig. 8.
  • the terminal detects that the user clicks the "Edit” button 703
  • the terminal enters the editable state of the short message.
  • the user can select one or more short messages to be hidden through operations such as clicking, and the display is as shown in the figure.
  • the interface 702 (ie, the first interface) shown in (2) of 8.
  • the interface 702 contains multiple controls, and each control corresponds to a short message.
  • a short message sent by Jack and a short message sent by Annie are selected (that is, the first control has two, one corresponding to "Send by Jack (A short message, the other corresponds to a short message sent by Annie, this short message sent by Jack and this short message sent by Annie is the first item).
  • the interface 702 also displays a fingerprint icon 704, The fingerprint icon 704 may be displayed at any position on the interface 702, or the fingerprint icon 704 may not be displayed. This embodiment of the present application does not specifically limit it.
  • the terminal receives the operation of the user to hide the short message, and the terminal collects the fingerprint information of the user according to the operation, and compares the fingerprint information with the pre-stored fingerprint information. If the comparison is successful, the selected short message is hidden, and the display is shown as An interface 705 (second interface) shown in (3) in FIG. 8.
  • the above-mentioned operation of the user to hide the short message may be similar to the operation of the user to hide the picture file in the application scenario 1.
  • the user is on the interface 702 shown in (2) in FIG. 8, Tap, double-click, or long-press the fingerprint icon 704.
  • the operation of the user to hide the short message may also be that the user presses the fingerprint icon 704 and drags the fingerprint icon 704 to any selected short message.
  • the terminal may display the fingerprint icon 704 when the short message browsing interface or the editing interface is displayed.
  • the terminal may also not display the fingerprint icon 704 when displaying the short message browsing interface and the editing interface, and after the user selects any short message, the fingerprint icon 704 is displayed.
  • the embodiment of the present application does not specifically limit the time during which the terminal displays the fingerprint icon 704.
  • the terminal can collect the user's fingerprint information through the fingerprint reader under the touch screen.
  • the collected fingerprint information is compared with the fingerprint information stored in advance.
  • the terminal hides the selected short message, that is, displays the interface 705 as described in (3) in FIG. 8.
  • the user can directly drag the required fingerprint icon onto any selected short message through a specific finger (the finger corresponding to the pre-stored fingerprint information) to complete the hiding of the selected short message.
  • the terminal may display prompt information to prompt the user to re-enter fingerprint information. Then, the user may input a fingerprint at the display position of the fingerprint icon 704, for example.
  • the terminal collects the user's fingerprint information again and compares it with the fingerprint information stored in advance. If the comparison is successful, the user authentication is successful and the terminal hides the selected short message. If the comparison fails, it means that the user does not have the right to hide the short message, and the terminal does not hide the selected short message.
  • the user when the user hides one of the short messages by dragging the fingerprint icon, the user can select the one that needs to be hidden without first clicking the "Edit" button in the short message browsing interface. SMS. Instead, the user can directly drag and hold the fingerprint icon 704 in the short message browsing interface, and drag the fingerprint icon 704 to the control corresponding to the short message to be hidden. During the entire process from the user pressing the fingerprint icon to dragging the fingerprint icon to the control that needs to hide the short message, the user's finger does not leave the touch screen. The terminal collects fingerprint information of the user for comparison. The process of comparison and subsequent processing can refer to the above description, and will not be repeated here.
  • the user can directly hide the selected short message by selecting the short message to be hidden, and then holding down the fingerprint icon and dragging the fingerprint icon to any selected short message. .
  • the user can complete the hiding of the short message by holding the fingerprint icon and dragging the fingerprint icon to the short message to be hidden. It can be seen that the method provided in the embodiment of the present application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
  • the embodiment of the present application further includes a process of displaying the hidden short message again.
  • the displayed process is similar to the method in other application scenarios described above, and is not repeated here.
  • Application Scenario 4. Take the user to hide the contact information in the "Address Book" as an example for an example.
  • the user opens an interface of the "Contacts" application to browse the contact information, such as interface 801 (ie, the first interface) shown in (1) in FIG. 9.
  • the interface 801 contains multiple controls, and each control corresponds to information of a contact.
  • the terminal also displays a corresponding fingerprint icon at the information of each contact, which is used to prompt the user to enter fingerprint information to hide the contact information.
  • the contact "Bella" corresponds to the fingerprint icon 802.
  • the fingerprint icon 802 is used to prompt the user to input a fingerprint, so that the terminal hides the information of the contact “Bella”.
  • the user may also use other icons, or text, or pictures to prompt the user to input fingerprint information, and instruct the terminal to perform hiding of the selected contact information.
  • the terminal since the position of the fingerprint reader in the terminal is a fixed position, the terminal may not display the fingerprint icon. This embodiment of the present application does not specifically limit this.
  • the operation may be, for example, the user acting on the fingerprint input position (for example, it may be the display position of the fingerprint icon corresponding to the contact information to be hidden, or it may be hidden Contact control).
  • the terminal presets an operation gesture for hiding contact information, for example, it can be a long press and a double tap. This embodiment of the present application does not specifically limit this. Because the user's finger will touch the touch screen of the terminal when the user performs the operation at the fingerprint input position, the terminal can collect the user's finger information through the fingerprint reader under the touch screen. Then compare the collected fingerprint information with the fingerprint stored in advance by the terminal.
  • the terminal detects that the user, for example, long-pressed or double-clicked (a preset operation gesture) the fingerprint icon 802 (the contact information corresponding to the fingerprint icon 802 is the first item , The control corresponding to the contact information is the first control), the terminal collects the fingerprint information of the user, and compares the collected fingerprint information with the pre-stored fingerprint information. If the comparison is successful, it indicates that the user authentication is successful, and the terminal hides the selected contact information, that is, the interface 803 shown in (2) in FIG. 9 is displayed.
  • each control does not display a corresponding fingerprint icon, and the user may directly pass a specific finger (with a pre-stored fingerprint).
  • the finger corresponding to the information) Long press or double-click the contact information to be hidden or slide on the contact information to be hidden to complete the hiding of the contact information.
  • the terminal may display prompt information to prompt the user to re-enter fingerprint information. After the user re-enters the fingerprint information, the terminal collects the user's fingerprint information again and compares it with the previously stored fingerprint information again. If the comparison is successful, the user authentication is successful, and the terminal hides the selected contact information. If the comparison fails, it means that the user does not have permission to hide the contact information, and the terminal does not hide the contact information.
  • the terminal detects that the user clicks the control corresponding to the contact information on the interface 801 shown in (1) of FIG. 9, the terminal displays the specific contact information of the contact Bella, that is, displays The interface 804 is shown in (3) in FIG. 9. It should be noted that, because the control of the contact information and the fingerprint icon 802 overlap in some areas, the click operation can be performed on the fingerprint icon. Because the tap operation is not a gesture for hiding contact information preset by the terminal, the terminal does not hide the contact information, but displays the specific contact method of the contact.
  • the user can complete the hiding of the contact information to be hidden by long-pressing or double-clicking the contact information to be hidden (or the fingerprint icon corresponding to the contact information to be hidden). It can be seen that the method provided in the embodiment of the present application simplifies the operation of the user, improves the interaction efficiency between the user and the terminal, and improves the user experience.
  • the method for hiding any item provided in the embodiment of the present application may be any one or any combination of the possible implementation manners in the above application scenarios, which is not limited in the embodiment of the present application.
  • the embodiment of the present application further includes a process of displaying the hidden contact information again.
  • the displayed process is similar to the method in other application scenarios described above, and is not repeated here.
  • the process of displaying hidden items by the terminal and the process of hiding items by the terminal may be independent processes. That is, one, after the terminal hides an item by using the above method in the embodiment of the present application, the terminal may use the method of displaying the hidden item in the embodiment of the present application to display the hidden item again, or other display methods may be adopted. To show hidden items. 2. The terminal may use the above method in the embodiment of the application to hide the item, or use other hiding methods to hide the item, and then use the method for displaying hidden items provided in the embodiment of the application to display the hidden item.
  • the method for displaying hidden items specifically includes: the terminal displays a third interface, wherein the second item in the third interface has been hidden.
  • the terminal receives an operation performed by the user on the touch screen, and the operation is used to instruct the terminal to display the hidden second item.
  • the terminal obtains the fingerprint information of the user and verifies the identity of the user according to this operation.
  • the terminal displays a fourth interface, and the fourth item is displayed in the fourth interface.
  • the fourth interface has more second items than the third interface, and other items displayed on the fourth interface are the same as those on the third interface. In other words, the terminal displays the hidden items in the third interface.
  • FIG. 10 it is a schematic flowchart of a method for displaying a hidden item according to an embodiment of the present application.
  • the method specifically includes:
  • the terminal displays a third interface, and the second item in the third interface is hidden.
  • the third interface may be, for example, a browsing interface or an editing interface of an application or an application function.
  • the third interface may be an interface for browsing picture files in the “Gallery” application, an interface for browsing short messages in the “SMS” application, and an “Address Book” application. Interface for browsing contact information.
  • the first interface may also be a folder browsing interface or an editing interface.
  • the third interface may also be a home screen interface of the terminal. The embodiment of the present application does not specifically limit the third interface.
  • the terminal receives an operation of displaying the second item by the user.
  • the operation of displaying the second item by the user is a preset operation of instructing the terminal to display the hidden item.
  • it may be the operation of the user at the position where the fingerprint icon is displayed.
  • the operation gesture may be clicking, long pressing, double-clicking, sliding Either one.
  • step S303 The terminal collects the fingerprint information of the user and verifies the identity of the user according to the operation of the user to display the second item. If the verification is passed, step S304b is performed. If the verification fails, step S304a is performed.
  • the terminal displays a prompt message, prompting the user that the authentication fails.
  • S304b The fourth interface of the terminal, where the second item is displayed on the fourth interface.
  • the fourth interface has a second item in the fourth interface, and other items are the same. That is, the fourth interface displays items hidden in the third interface.
  • the terminal may display hidden items in a blank position in the current interface, or may display the positions displayed before these hidden items, which is not specifically limited in this embodiment of the present application.
  • the number or time of displaying hidden files by the terminal may be set. For details, refer to the related description in step S109b, and details are not described herein again.
  • the foregoing terminal and the like include a hardware structure and / or a software module corresponding to executing each function.
  • the embodiments of the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application and design constraints of the technical solution. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of the embodiments of the present invention.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of the modules in the embodiment of the present invention is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • FIG. 11 illustrates a possible structural diagram of a terminal involved in the foregoing embodiment.
  • the terminal 1000 includes a display unit 1001, a processing unit 1002, and a receiving unit 1003.
  • the display unit 1001 is used to support the terminal to display the interfaces in steps S101, S106a, S106b, S109a, and S109b in FIG. 4, the interfaces in S201, S206a, S206b, S209a, and S209b in FIG. 6, and S301, S304a in FIG.
  • the processing unit 1002 is configured to support the terminal to execute the determination process in S103, S105, S108, S203, and S208 in FIG. 4, S205 in FIG. 6, S303 in FIG. 10, and / or other processes for the technology described herein.
  • the receiving unit 1003 is used to support the terminal to perform operations of S102, S104, and S107 in FIG. 4, S202, S203, S204, and S207 in FIG. 6, and S302 in FIG. 10 to receive user operations, and / or other techniques used in the technology described herein process.
  • the terminal 1000 may further include a storage unit for the terminal to interact with other devices.
  • the functions that can be implemented by the above functional units also include but are not limited to the functions corresponding to the method steps described in the above examples. For detailed descriptions of other units of the terminal 1000, refer to the detailed description of the corresponding method steps. Examples are not repeated here.
  • the above-mentioned display unit 1001 may be a terminal display module, such as a touch screen.
  • the processing unit 1002 may be a processing module of a terminal.
  • the receiving unit 1003 may be a communication module of a terminal, such as an RF circuit, a WiFi module, or a Bluetooth module.
  • the storage unit may be a storage module of the terminal.
  • FIG. 12 shows a possible structural diagram of a terminal involved in the foregoing embodiment.
  • the terminal 1100 includes a processing module 1101, a storage module 1102, and a communication module 1103.
  • the processing module 1101 is configured to control and manage the actions of the terminal.
  • the storage module 1102 is configured to store program codes and data of the terminal.
  • the communication module 1103 is configured to communicate with other terminals.
  • the processing module 1101 may be a processor or a controller.
  • the processing module 1101 may be a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA), or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It may implement or execute various exemplary logical blocks, modules, and circuits described in connection with the present disclosure.
  • the processor may also be a combination that realizes computing functions, for example, a combination including one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • the communication module 1303 may be a transceiver, a transceiver circuit, or a communication interface.
  • the storage module 1102 may be a memory.
  • the processing module 1101 is a processor (such as the processor 101 shown in FIG. 2)
  • the communication module 1103 is an RF transceiver circuit (such as the radio frequency circuit 102 shown in FIG. 2)
  • the storage module 1102 is a memory (as shown in FIG. 2) Memory 103)
  • the terminal provided in this embodiment of the present application may be the terminal 100 shown in FIG. 2.
  • the communication module 1103 may include not only an RF circuit, but also a WiFi module and a Bluetooth module. Communication modules such as RF circuits, WiFi modules, and Bluetooth modules can be collectively referred to as communication interfaces.
  • the processor, the communication interface, and the memory may be coupled together through a bus.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the modules or units is only a logical function division.
  • multiple units or components may be divided.
  • the combination can either be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially a part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium , Including a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the method described in the embodiments of the present application.
  • the foregoing storage medium includes: various types of media that can store program codes, such as a flash memory, a mobile hard disk, a read-only memory, a random access memory, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention appartient au domaine technique des communications. Elle concerne un procédé d'affichage d'élément, et un terminal. L'invention vise à faciliter le masquage et l'affichage d'un élément par un utilisateur, de sorte à améliorer l'efficacité d'utilisation du terminal et l'expérience de l'utilisateur. Le procédé est applicable à un terminal comprenant un écran tactile configuré avec un identifiant d'empreinte digitale. Le procédé comprend les étapes suivantes : un terminal affiche une première interface sur laquelle un ou plusieurs premiers éléments sont sélectionnés ; le terminal reçoit une première commande d'un utilisateur sur un écran tactile, la première commande étant un geste de commande prédéfini commandant au terminal de masquer le premier élément ; en réponse à la première commande, le terminal acquiert des informations d'empreinte digitale de l'utilisateur ayant transmis la première commande, au moyen d'un identifiant d'empreinte digitale ; en réponse au fait que les informations d'empreinte digitale acquises de l'utilisateur ayant transmis la première commande ont réussi la vérification, le terminal affichant une seconde interface sur laquelle aucun premier élément n'est affiché, à la différence de la première interface, les éléments affichés dans la seconde interface étant identiques aux autres éléments mis à part le premier élément sur la première interface.
PCT/CN2018/089660 2018-06-01 2018-06-01 Procédé et terminal d'affichage d'élément WO2019227487A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201880088100.0A CN111656347B (zh) 2018-06-01 2018-06-01 一种项目的显示方法及终端
PCT/CN2018/089660 WO2019227487A1 (fr) 2018-06-01 2018-06-01 Procédé et terminal d'affichage d'élément

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/089660 WO2019227487A1 (fr) 2018-06-01 2018-06-01 Procédé et terminal d'affichage d'élément

Publications (1)

Publication Number Publication Date
WO2019227487A1 true WO2019227487A1 (fr) 2019-12-05

Family

ID=68696799

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/089660 WO2019227487A1 (fr) 2018-06-01 2018-06-01 Procédé et terminal d'affichage d'élément

Country Status (2)

Country Link
CN (1) CN111656347B (fr)
WO (1) WO2019227487A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022446A (zh) * 2021-10-09 2022-09-06 荣耀终端有限公司 一种用户界面管理方法及终端设备

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115484395A (zh) * 2021-06-16 2022-12-16 荣耀终端有限公司 一种视频处理方法及电子设备
CN113434846B (zh) * 2021-06-22 2023-06-09 青岛海尔科技有限公司 投屏数据的处理方法及装置
CN116560865A (zh) * 2022-01-27 2023-08-08 华为技术有限公司 一种应用间信息的共享方法及终端

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825105A (zh) * 2015-11-30 2016-08-03 南京步步高通信科技有限公司 隐藏界面上显示的对象的方法和电子设备
CN105955587A (zh) * 2016-06-15 2016-09-21 广东欧珀移动通信有限公司 一种隐藏应用图标显示方法及装置
CN107145272A (zh) * 2017-04-27 2017-09-08 努比亚技术有限公司 一种图标隐藏显示终端及方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10229258B2 (en) * 2013-03-27 2019-03-12 Samsung Electronics Co., Ltd. Method and device for providing security content

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825105A (zh) * 2015-11-30 2016-08-03 南京步步高通信科技有限公司 隐藏界面上显示的对象的方法和电子设备
CN105955587A (zh) * 2016-06-15 2016-09-21 广东欧珀移动通信有限公司 一种隐藏应用图标显示方法及装置
CN107145272A (zh) * 2017-04-27 2017-09-08 努比亚技术有限公司 一种图标隐藏显示终端及方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022446A (zh) * 2021-10-09 2022-09-06 荣耀终端有限公司 一种用户界面管理方法及终端设备

Also Published As

Publication number Publication date
CN111656347A (zh) 2020-09-11
CN111656347B (zh) 2024-02-09

Similar Documents

Publication Publication Date Title
US11861161B2 (en) Display method and apparatus
JP7110451B2 (ja) 通知処理方法、電子デバイス、コンピュータ可読記憶媒体、およびプログラム
US10734831B2 (en) Device for performing wireless charging and method thereof
US10853979B2 (en) Electronic device and method for displaying screen thereof
EP3483715B1 (fr) Dispositif électronique et procédé de commande d'affichage
KR102497195B1 (ko) 컨텐츠를 처리하는 방법 및 이를 위한 전자 장치 및 저장 매체
EP3764253B1 (fr) Procédé d'ouverture rapide d'application ou de fonction d'application, et terminal
WO2019227488A1 (fr) Procédé de visualisation de contenu d'informations, et terminal
EP3021562B1 (fr) Procédé de partage d'écran et son dispositif électronique
US20170011557A1 (en) Method for providing augmented reality and virtual reality and electronic device using the same
WO2018040010A1 (fr) Procédé d'affichage d'interface d'application et dispositif terminal
EP3811191B1 (fr) Dispositif électronique pour afficher une liste d'applications exécutables sur un écran partagé, et procédé de fonctionnement associé
US20210357105A1 (en) Method and apparatus for operating functions of electronic device having flexible display
WO2019227487A1 (fr) Procédé et terminal d'affichage d'élément
EP3410282B1 (fr) Dispositif électronique et procédé de commande d'interface utilisateur de dispositif électronique
EP4280058A1 (fr) Procédé d'affichage d'informations et dispositif électronique
CN108780400B (zh) 数据处理方法及电子设备
US10303351B2 (en) Method and apparatus for notifying of content change
US20160196030A1 (en) Method and electronic device for displaying electronic document
JP7319431B2 (ja) アプリケーション機能の実施方法及び電子装置
WO2020000276A1 (fr) Procédé et terminal de commande de bouton de raccourci
CN111656346B (zh) 一种显示方法及终端
US20220075518A1 (en) Fast Data Copying Method and Electronic Device
CN118260742A (en) Cross-system information processing method and electronic equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18920903

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18920903

Country of ref document: EP

Kind code of ref document: A1