WO2023160640A1 - Application identifier control method and apparatus - Google Patents

Application identifier control method and apparatus Download PDF

Info

Publication number
WO2023160640A1
WO2023160640A1 PCT/CN2023/078046 CN2023078046W WO2023160640A1 WO 2023160640 A1 WO2023160640 A1 WO 2023160640A1 CN 2023078046 W CN2023078046 W CN 2023078046W WO 2023160640 A1 WO2023160640 A1 WO 2023160640A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
application
input
application identifier
identifier
Prior art date
Application number
PCT/CN2023/078046
Other languages
French (fr)
Chinese (zh)
Inventor
孙家圆
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023160640A1 publication Critical patent/WO2023160640A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Definitions

  • the present application belongs to the technical field of communications, and in particular relates to a method and device for controlling an application identification.
  • the operation process is relatively cumbersome. Generally, you need to enter the settings, enter the password for confirmation, and then you can lock or hide the application icon, and you want to open the application. Or when the application icon is displayed, it is necessary to enter the password and then open it after the authentication is successful. The operation process is rather cumbersome.
  • the purpose of the embodiments of the present application is to provide a method and device for controlling application identification, which can solve the problem of complicated operations for locking or hiding application icons in the prior art.
  • the embodiment of the present application provides a method for controlling application identification, including:
  • the target application identifier and the target location have a first association relationship
  • the target application identifier, the target location, and the target operation have a second association relationship
  • the embodiment of the present application provides a device for controlling application identification, including:
  • a first receiving module configured to receive a first input of a target application identifier
  • a control module configured to, in response to the first input, control the target application identifier to move to a corresponding target position, and control the target application identifier at the target position to perform a corresponding target operation;
  • the target application identifier and the target location have a first association relationship
  • the target application identifier, the target location, and the target operation have a second association relationship
  • the embodiment of the present application provides an electronic device, the electronic device includes a processor and a memory, the memory stores programs or instructions that can run on the processor, and the programs or instructions are processed by the The steps of the method described in the first aspect are realized when the controller is executed.
  • an embodiment of the present application provides a readable storage medium, on which a program or an instruction is stored, and when the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented .
  • the embodiment of the present application provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run programs or instructions, so as to implement the first aspect the method described.
  • an embodiment of the present application provides a computer program product, the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the method described in the first aspect.
  • an embodiment of the present application provides an apparatus for controlling an application identifier, including that the apparatus is configured to execute the method as described in the first aspect.
  • the target application identifier by receiving the first input of the target application identifier, in response to the first input, according to the first relationship between the target application identifier and the target location, the target application identifier is controlled to move to the corresponding target location , and according to the second association between the target application ID, the target location, and the target operation, the target application ID at the target position is controlled to execute the corresponding target operation, that is, by moving the target application ID to the corresponding target position, the The target operation corresponding to the target application ID at the target location can be completed on the desktop without entering a password for authentication, thereby simplifying the user's operation process and reducing the user's operation cost.
  • FIG. 1 is a flow chart of a method for controlling application identification provided by an embodiment of the present application
  • Fig. 2 is one of the schematic diagrams of executing the target operation provided by the embodiment of the present application.
  • Fig. 3 is the second schematic diagram of executing the target operation provided by the embodiment of the present application.
  • Fig. 4 is the third schematic diagram of executing the target operation provided by the embodiment of the present application.
  • Fig. 5 is the fourth schematic diagram of executing the target operation provided by the embodiment of the present application.
  • Fig. 6 is the fifth schematic diagram of executing the target operation provided by the embodiment of the present application.
  • Fig. 7 is a schematic diagram of the types of concealment methods provided by the embodiment of the present application.
  • Fig. 8 is a schematic display of the dual application hiding method provided by the embodiment of the present application.
  • Fig. 9 is a schematic diagram of displaying four application hiding methods provided by the embodiment of the present application.
  • Fig. 10 is a schematic diagram of displaying eight application hiding methods provided by the embodiment of the present application.
  • Fig. 11 is a schematic diagram of selection of a target application identifier provided by an embodiment of the present application.
  • Fig. 12 is one of the schematic diagrams for selecting the target position provided by the embodiment of the present application.
  • Fig. 13 is the second schematic diagram of the selection of the target position provided by the embodiment of the present application.
  • Figure 14 is a schematic diagram of the selection of the target operation provided by the embodiment of the present application.
  • Fig. 15 is a schematic structural diagram of a control device for application identification provided by an embodiment of the present application.
  • Fig. 16 is a structural block diagram of an electronic device provided by an embodiment of the present application.
  • Fig. 17 is a structural block diagram of another electronic device provided by an embodiment of the present application.
  • the embodiment of the present application provides a method for controlling application identification, including the following steps:
  • Step 101 receiving a first input of a target application identifier.
  • the method for controlling an application identification provided in the embodiment of the present application may be applied to an electronic device, and the electronic device receives a first input of a target application identification.
  • the target application identifier is one or more application identifiers among the multiple application identifiers on the desktop of the electronic device.
  • the first input may be a click input, double-click input, slide input, long-press input, etc. of the target application identifier, which is not specifically limited here.
  • target application identification includes but is not limited to at least one of the following:
  • At least one atomic component At least one atomic component.
  • the target application identifier may be a combination of at least one application identifier and at least one atomic component; or, the target application identifier may also be one or more application identifiers; or, the target application identifier may also be one or more atomic components.
  • the application icon is the desktop icon of the application program in the electronic device;
  • the atomic component can display the internal functions of many applications in the electronic device in a small area of 1x2 or 2x1 on the desktop, and can directly control the application through the atomic component , operation without having to enter the application again, which can reduce many tedious steps.
  • Step 102 in response to the first input, controlling the target application identifier to move to a corresponding target position, and controlling the target application identifier at the target position to perform a corresponding target operation;
  • the target application identifier and the target location have a first association relationship
  • the target application identifier, the target location, and the target operation have a second association relationship
  • the The first association relationship controls the movement of the target application identifier to its corresponding target location, and, according to the second association relationship, controls the target application identifier already at the target location to perform the corresponding target operation, that is, moves the target application identifier to the target location on the desktop Then the target operation can be performed on the target application identifier, which reduces the user's operation cost.
  • the target positions corresponding to different application icons or different atomic components may be the same position or different positions, which may be set according to needs, and are not specifically limited here.
  • the second association can be established on the basis of the first association, that is, the target
  • the first association relationship between the application identifier and the target location, and the second association relationship between the target application identifier at the target location and the target operation is established on the basis of the first association relationship;
  • the application icon is associated with a corresponding target operation, and each atomic component at the target position needs to be associated with a corresponding target operation.
  • the target operations corresponding to different application icons at the target positions or different atomic components at the target positions may be the same operation or different operations, which may be set as required, and are not specifically limited here.
  • the second association relationship does not need to be established on the basis of the first association relationship, and it is only necessary to establish an association relationship among the target application identifier, the target location, and the target operation before receiving the first input. That is, each application icon in the target application identification needs to be associated with a corresponding target location and a corresponding target operation, and each atomic component in the target application identification needs to be associated with a corresponding target location and a corresponding target operation.
  • the target application identifier by acquiring the first input to the target application identifier, in response to the first input, the target application identifier is controlled to move to the corresponding target location according to the first relationship between the target application identifier and the target location , and according to the second association relationship between the target application ID, the target location, and the target operation, control the target application ID at the target location to execute the corresponding target Operation, that is, by moving the target application ID to the corresponding target position, the target operation corresponding to the target application ID at the target position can be triggered, and the target operation corresponding to the target application ID can be completed on the desktop without entering a password for authentication.
  • the user's operation process is simplified, and the user's operation cost is reduced.
  • the target operation may include but not limited to one of a display operation, a hide operation, a lock operation, and an unlock operation.
  • the target operation is a display operation
  • it is necessary to control the target application ID at the target position to perform the corresponding display operation that is, if the target application ID is at the target position, the state of the target application ID needs to be changed to the display state, displayed on the desktop.
  • the target application is identified as the application icon 3
  • the application icon 3 is in the first position 21 when it is hidden
  • the target position corresponding to the application icon 3 is the second position 22 . That is, when the application icon 3 is in the first position 21, the application icon 3 is in the hidden state. If the application icon 3 is moved from the first position 21 to the second position 22 along the direction of the arrow, the display operation will be triggered.
  • the application icon 3 Change from hidden state to visible state.
  • the hidden state of the application icon 3 is represented by a dotted line frame, and the display state of the application icon 3 is marked by a solid line frame.
  • the hidden state means that it is not displayed on the desktop, and the displayed state is for display on the desktop.
  • the target operation is a hidden operation
  • it is necessary to control the target application ID at the target position to perform the corresponding hidden operation that is, if the target application ID is at the target position, the state of the target application ID needs to be changed to the hidden state.
  • the application identification is in a non-display state on the desktop, and the user cannot see the target application identification hidden in the target position when using the electronic device. For example: as shown in FIG. 3 , if the target application is identified as the application icon 3 , the application icon 3 is in the first position 31 when it is displayed, and the target position corresponding to the application icon 3 is the second position 32 .
  • the application icon 3 when the application icon 3 is at the first position 31, the application icon 3 is in the displayed state, and if the application icon 3 is moved from the first position 31 to the second position 32 along the direction of the arrow, the hiding operation is triggered, and at this time the application icon 3 Change from display state to hidden state.
  • the hidden state of the application icon 3 is represented by a dotted line frame, and the display state of the application icon 3 is marked by a solid line frame. for display on the desktop.
  • the target operation is a lock operation
  • it is necessary to control the target application ID at the target position to perform the corresponding lock operation that is, if the target application ID is at the target position, the state of the target application ID needs to be changed to the locked state, and the target The application identification is locked on the desktop, and the user cannot operate the application program corresponding to the target application identification when using the electronic device, that is, the user cannot use the application program corresponding to the target application identification at the target location.
  • the target application is identified as the application icon 3
  • the application icon 3 is in the first position 41 when it is in the unlocked state
  • the target position corresponding to the application icon 3 is the second position 42 .
  • the application icon 3 when the application icon 3 is at the first position 41, the application icon 3 is in the unlocked state, and if the application icon 3 is moved from the first position 41 to the second position 42 along the direction of the arrow, the locking operation is triggered, and at this time the application icon 3 From unlocked state to locked state.
  • the locked state of the application icon 3 is represented by the lock pattern 43 in FIG. 4 , and the application icon without the lock pattern 43 is in the unlocked state.
  • the application program corresponding to the application icon 3 if the application icon 3 is in the locked state, the application program corresponding to the application icon 3 cannot be used, and the application icon 3 is in the locked state.
  • the target operation is an unlocking operation
  • it is necessary to control the target application ID at the target position to perform the corresponding unlocking operation that is, if the target application ID is at the target position, the state of the target application ID needs to be changed to the unlocked state.
  • the target application identifier is in an operable state on the desktop
  • the user can operate the application program corresponding to the target application identifier when using the electronic device. For example, as shown in FIG. 5 , if the target application is identified as the application icon 3 , the application icon 3 is in the first position 51 when the application icon is locked, and the target position corresponding to the application icon 3 is the second position 52 . That is, when the application icon 3 is in the first position 51, the application icon 3 is in the locked state.
  • the unlocking operation is triggered. At this time, the application icon 3 From locked state to unlocked state.
  • the locked state of the application icon 3 is represented by the lock pattern 53 in FIG. 5 , and the application icon without the lock pattern 53 is in the unlocked state.
  • the application program corresponding to the application icon 3 if the application icon 3 is in the locked state, the application program corresponding to the application icon 3 cannot be used, and the application icon 3 is in the locked state.
  • controlling the target application identifier at the target location to perform a corresponding target operation specifically includes:
  • the target application identifiers include at least two application identifiers, and the at least two application identifiers are located at corresponding target positions, the at least two application identifiers are controlled to perform the target operation.
  • the target application identifier includes at least two application identifiers
  • the at least two application identifiers are combined application identifiers, and each application identifier in the combined application identifier needs to be in its corresponding target position before the target operation can be triggered . That is, if the target application identifier includes the first application identifier and the second application identifier, the first application identifier and the second application identifier are combined application identifiers, and if the first application identifier is in its corresponding target position, the second application identifier is also in its corresponding target location, the target operations of the first application identifier and the second application identifier may be triggered.
  • target application identifiers can be combined in various ways, which greatly increases the difficulty of cracking and improves information security.
  • the target application identifier includes application icon 2 and application icon 3, and application icon 2 and application icon 3 are combined application icons.
  • the triggered target operation is Hide actions.
  • the application icon 2 is at the first position 61
  • the application icon 2 is in the displayed state
  • the target position corresponding to the application icon 2 is the second position 62 .
  • the application icon 3 is in the third position 63
  • the application icon 3 is in the displayed state
  • the target position corresponding to the application icon 3 is the fourth position 64 .
  • the hiding operation will be triggered at this time, namely
  • the application icon 2 at the second position 62 and the application icon 3 at the fourth position 64 are both in a hidden state, and the dotted box in the figure indicates the hidden state of the application icons.
  • the hiding operation will not be triggered at this time, that is, the application icon 2 in the second position 62 and the application icon 3 in the third position 63 are both displayed.
  • the application icon 3 is moved from the third position 63 to the fourth position 64 along the direction of the arrow, but the application icon 2 is still at the first position 61, the hiding operation will not be triggered at this time, that is, the user at the first position 61 Both the application icon 2 and the application icon 3 at the fourth position 64 are displayed.
  • the number of application identifiers included in the target application identifiers may be selected, and the area range of the target location corresponding to the number of application identifiers may be preset.
  • the target operation is a hidden operation
  • the dual-application hiding control 71 can control two application identifications to hide
  • the four-application hiding control 72 can control four application identifications to hide
  • the eight-application hiding control 73 can control eight application identifications to hide.
  • position 1 and position 4 are areas that can be displayed, and positions 2 and 3 are areas where the target application logo can be hidden, that is, position 1 and position 4
  • positions in between are areas that can be hidden, and the target positions corresponding to two different application identifications in the target application identification are selected from position 2 and position 3.
  • position 1, position 2, position 3 and position 4 are displayable areas, and position 5, position 6, position 7 and position 8 are possible targets
  • the area where the application identification is hidden, that is, the area enclosed by position 1, position 2, position 3 and position 4 is the area that can be hidden.
  • the target positions corresponding to the four different application identifications in the target application identification are from position 5, position 6, position Choose between 7 and 8. If you choose the eight application hidden control 73 to operate, you will enter the page shown in Figure 10. Position 1, position 2, position 3, position 4, position 5, position 6, position 7 and position 8 are displayable areas, position 9, position 3, position 4, position 5, position 6, position 7 and position 8 Position 10, position 11, position 12, position 13, position 14, position 15, and position 16 are areas where target application identification can be hidden, namely position 1, position 2, position 3, position 4, position 5, The positions between position 6, position 7 and position are areas that can be hidden.
  • the target positions corresponding to the eight different application identifications in the target application identification range from position 9, position 10, position 11, position 12, position 13, position 14, Choose between position 15 and position 16.
  • the method for establishing the first association relationship may include the following steps:
  • a target application identifier is selected from multiple application identifiers, a target location is selected from multiple desktop locations, and a first association relationship is established between the target application identifier and the target location.
  • receiving a second input of at least one application identifier among the multiple application identifiers selecting at least one application identifier from the multiple application identifiers in response to the second input, and determining the at least one application identifier as the target application identifier and selecting at least one location from a plurality of desktop locations, and determining the at least one location as the target location, thereby establishing a first association relationship between the target application identifier and the target location.
  • the interface for establishing the first association relationship may be entered from the settings, and the second input is received in the interface for establishing the first association relationship.
  • the second input may be a click input, a double-click input, a slide input, a long-press input, etc. for at least one application identifier among the plurality of application identifiers, which is not specifically limited here.
  • the above step of selecting a target application identifier from multiple application identifiers, selecting a target location from multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location Specifically can include:
  • the target application identifier In response to the movement input, the target application identifier is controlled to move to a target location, and a first association relationship between the target application identifier and the target location is established.
  • At least one application identifier is selected from multiple application identifiers, and the at least one application identifier is determined as the target application identifier.
  • a movement input of the target application is received, and in response to the movement input, the target application is controlled to move to the target position, thereby establishing a first association relationship between the target application and the target position.
  • the movement input may be a drag input or other input capable of achieving the same effect, etc., which is not specifically limited here.
  • each application icon corresponds to a selection box, when application icon 1 is selected,
  • the selection box 71 corresponding to the application icon 1 is distinguished from unselected application icons by filling color.
  • the manner of distinguishing whether to select an application icon is not limited to filling the selection box corresponding to the application icon in the above-mentioned embodiment, and the above-mentioned distinguishing manner is only an example, and is not specifically limited here.
  • the selected application icon 1 is the target application icon
  • a movement input to the application icon is received, and in response to the movement input, the application icon 1 is controlled to move to the corresponding target position, as shown in FIG. 12 , the application icon 1
  • the corresponding target position 81 is the position of the upper left corner.
  • the above step of selecting a target application identifier from multiple application identifiers, selecting a target location from multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location Specifically can include:
  • the first selection interface includes a plurality of application identifiers
  • a target application identifier is selected from multiple application identifiers on the first selection interface, and a first association relationship between the target application identifier and the target location is established.
  • the selection page of the desktop position After receiving the second input, in response to the second input, enter the selection page of the desktop position, select at least one position from a plurality of desktop positions, and the selected at least one position is the target Location.
  • the selection page of the desktop position is as shown in Figure 13, each "+" sign represents a desktop position, select the position in the upper left corner from multiple desktop positions, then the desktop position in the upper left corner is the target position 91.
  • a third input on the target location is received, and in response to the third input, a first selection interface including a plurality of application identifiers is displayed, and the first selection interface includes a plurality of application identifiers.
  • Receiving a first selection input to the first selection interface in response to the first selection input, selecting at least one application identification from multiple application identifications in the first selection interface as a target application identification, after determining the target application identification, that is A first association relationship between the target location and the target application identifier may be established.
  • the first selection input may be click input, double click input, long press input, slide input, etc. of at least one application identifier among the multiple application identifiers, which is not specifically limited here.
  • a third input to the target position 91 is received, and the first selection interface is entered in response to the third input.
  • the third input may be single-click input, double-click input, long-press input, sliding operation, etc. of the target position 91 , which is not specifically limited here.
  • the first selection interface includes application icon 1 , application icon 2 , application icon 3 , application icon 4 and application icon 5 .
  • Receiving a first selection input on the first selection interface in response to the first selection input, selecting an application icon from application icon 1, application icon 2, application icon 3, application icon 4, and application icon 5 in the first selection interface 1 as the target application identifier, after determining that the target application identifier is the application icon 1, the first association relationship between the target location 91 and the application icon 1 can be established.
  • the manner for establishing the second association relationship may include:
  • a second association relationship is established between the target application identifier, the target location, and the target operation.
  • receiving a third input for at least one operation among the multiple operations selecting at least one operation from the multiple operations in response to the third input, and determining the at least one operation as the target operation;
  • the first association relationship between the target application identifier and the target location is established, and then the second association relationship is established between the target operation, the target application identifier, and the target location, that is, only when the target application identifier is in the The corresponding target operation will only be triggered if the target position is reached.
  • the interface for establishing the second association relationship Before receiving the third input, the interface for establishing the second association relationship may be entered from the settings, and the third input is received in the interface for establishing the second association relationship.
  • the above step of selecting a target operation from multiple operations in response to the third input includes:
  • the second selection interface includes a plurality of operation identifiers
  • a target operation identifier is selected from a plurality of operation identifiers on the second selection interface, wherein each operation identifier corresponds to an operation.
  • a second selection interface including a plurality of operation identifiers is displayed.
  • each operation identifier corresponds to an operation
  • the operation identifier is an identifier displayed on the second selection interface, indicating that the corresponding operation can be performed.
  • the second selection input may be a click input, a double-click input, a long-press input, a slide input, etc. on one of the multiple operation identifiers, which is not specifically limited herein.
  • a second selection interface including four operation signs including application hiding 141, application display 142, application locking 143, and application unlocking 144 is displayed, That is, the application and permission interface, and each operation identifier corresponds to an operation.
  • a second selection input for the operation identifier of the application hide 141 in the second selection interface is received, and in response to the second selection input, it is determined that the hidden operation corresponding to the operation identifier of the application hide 141 is a target operation.
  • the method before the step 102 responds to the first input, the method further includes:
  • step 102 responds to the first input, including:
  • the user's identity authentication information is obtained, and the user's identity is verified. If the user's identity authentication information is consistent with the preset information, the user can be determined as the target user, and the application identification Performing control operations, including the establishment of the first association relationship, the establishment of the second association relationship, and the movement of the target application identification, etc., are not specifically limited here, which can increase information security and prevent non-target users from performing operations on the application identification. Operations that result in information disclosure, etc.
  • the first association relationship between the target application identifier and the target location can be established as required, and the second association relationship between the target application identifier, the target location, and the target operation can be established, and The creator needs to authenticate the identity information. Only after the authentication is passed can the first association relationship and the second association relationship be modified or established. It is not easy to crack the trigger mode of the target operation, which improves the information security.
  • the target operation corresponding to the target application identifier at the target position can be triggered, and the target operation corresponding to the target application identifier can be completed on the desktop without entering a password for authentication. This simplifies the user's operation process and reduces the user's operation cost.
  • the execution subject may be an application identification control device.
  • the device for controlling the application identifier provided by the embodiment of the present application is described by taking the method for controlling the application identifier executed by the device for controlling the application identifier as an example.
  • control device for application identification including:
  • a first receiving module 1501 configured to receive a first input of a target application identifier
  • a control module 1502 configured to, in response to the first input, control the target application identifier to move to a corresponding target position, and control the target application identifier at the target position to perform a corresponding target operation;
  • the target application identifier and the target location have a first association relationship
  • the target application identifier, the target location, and the target operation have a second association relationship
  • control module 1502 controls the target application identifier at the target location to perform a corresponding target operation, it is specifically configured to:
  • the target application identifiers include at least two application identifiers, and the at least two application identifiers are located at corresponding target positions, the at least two application identifiers are controlled to perform the target operation.
  • the method for establishing the first association relationship includes:
  • a target application identifier is selected from multiple application identifiers, a target location is selected from multiple desktop locations, and a first association relationship is established between the target application identifier and the target location.
  • the selecting a target application identifier from multiple application identifiers, selecting a target location from multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location includes:
  • the first selection interface includes a plurality of application identifiers
  • a target application identifier is selected from multiple application identifiers on the first selection interface, and a first association relationship between the target application identifier and the target location is established.
  • the method for establishing the second association relationship includes:
  • the selecting a target operation from multiple operations in response to the third input includes:
  • the second selection interface includes a plurality of operation identifiers
  • a target operation identifier is selected from a plurality of operation identifiers on the second selection interface, wherein each operation identifier corresponds to an operation.
  • the first association relationship between the target application ID and the target location can be established as required, and the second association relationship between the target application ID, the target location, and the target operation can be established, which is not easy
  • the trigger mode of the cracked target operation improves the information security.
  • the target operation corresponding to the target application identifier at the target position can be triggered, and the target operation corresponding to the target application identifier can be completed on the desktop without entering a password for authentication. This simplifies the user's operation process and reduces the user's operation cost.
  • the device for controlling the application identification in the embodiment of the present application may be an electronic device, or may be a component in the electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a terminal, or other devices other than the terminal.
  • the electronic device can be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle electronic device, a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) ) equipment, robot, wearable device, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook or personal digital assistant (personal digital assistant, PDA), etc.
  • the embodiment of the present application does not specifically limit it.
  • the device for controlling the application identifier in the embodiment of the present application may be a device with an operating system.
  • the operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, which are not specifically limited in this embodiment of the present application.
  • the device for controlling the application identification provided by the embodiment of the present application can realize various processes realized by the method embodiments in FIG. 1 to FIG. 14 , and details are not repeated here to avoid repetition.
  • the embodiment of the present application also provides an electronic device 1600, including a processor 1601 and a memory 1602, and the memory 1602 stores programs or instructions that can run on the processor 1601.
  • the programs or instructions are executed by the processor 1601, the various steps of the above-mentioned application identification control method embodiments can be achieved, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
  • the electronic devices in the embodiments of the present application include the above-mentioned mobile electronic devices and non-mobile electronic devices.
  • FIG. 17 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
  • the electronic device 1000 includes, but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, and a processor 1010, etc. part.
  • the electronic device 1000 can also include a power supply (such as a battery) for supplying power to various components, and the power supply can be logically connected to the processor 1010 through the power management system, so that the management of charging, discharging, and function can be realized through the power management system. Consumption management and other functions.
  • a power supply such as a battery
  • the structure of the electronic device shown in FIG. 17 does not constitute a limitation on the electronic device.
  • the electronic device may include more or fewer components than shown in the figure, or combine certain components, or arrange different components, and details will not be repeated here. .
  • the input unit 1004 is configured to receive a first input of the target application identifier
  • a processor 1010 configured to, in response to the first input, control the target application identifier to move to a corresponding target position, and control the target application identifier at the target position to perform a corresponding target operation;
  • the target application identifier and the target location have a first association relationship
  • the target application identifier, the target location, and the target operation have a second association relationship
  • the target application identifier by acquiring the first input to the target application identifier, in response to the first input, the target application identifier is controlled to move to the corresponding target location according to the first relationship between the target application identifier and the target location , and according to the second association relationship between the target application ID, the target location, and the target operation, control the target application ID at the target location to execute the corresponding target Operation, that is, by moving the target application ID to the corresponding target position, the target operation corresponding to the target application ID at the target position can be triggered, and the target operation corresponding to the target application ID can be completed on the desktop without entering a password for authentication.
  • the user's operation process is simplified, and the user's operation cost is reduced.
  • the processor 1010 controls the target application identifier at the target location to perform a corresponding target operation, it is specifically configured to:
  • the target application identifiers include at least two application identifiers, and the at least two application identifiers are located at corresponding target positions, the at least two application identifiers are controlled to perform the target operation.
  • the manner for establishing the first association relationship includes:
  • a target application identifier is selected from multiple application identifiers, a target location is selected from multiple desktop locations, and a first association relationship is established between the target application identifier and the target location.
  • the selecting a target application identifier from multiple application identifiers, selecting a target location from multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location includes:
  • the first selection interface includes a plurality of application identifiers
  • a target application identifier is selected from multiple application identifiers on the first selection interface, and a first association relationship between the target application identifier and the target location is established.
  • the method for establishing the second association relationship includes:
  • a second association relationship is established between the target application identifier, the target location, and the target operation.
  • the selecting a target operation from multiple operations in response to the third input includes:
  • the second selection interface includes a plurality of operation identifiers
  • a target operation identifier is selected from a plurality of operation identifiers on the second selection interface, wherein each operation identifier corresponds to an operation.
  • the first association relationship between the target application ID and the target location can be established as required, and the second association relationship between the target application ID, the target location, and the target operation can be established, which is not easy
  • the trigger mode of the cracked target operation improves the information security.
  • the target operation corresponding to the target application identifier at the target position can be triggered, and the target operation corresponding to the target application identifier can be completed on the desktop without entering a password for authentication. This simplifies the user's operation process and reduces the user's operation cost.
  • the input unit 1004 may include a graphics processor (Graphics Processing Unit, GPU) 10041 and a microphone 10042, and the graphics processor 10041 is used for the image capture device (such as the image data of the still picture or video obtained by the camera) for processing.
  • the display unit 1006 may include a display panel 10061, and the display panel 10061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 1007 includes at least one of a touch panel 10071 and other input devices 10072 .
  • the touch panel 10071 is also called a touch screen.
  • the touch panel 10071 may include two parts, a touch detection device and a touch controller.
  • Other input devices 10072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be repeated here.
  • the memory 1009 can be used to store software programs as well as various data.
  • the memory 1009 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area The area can store an operating system, an application program or an instruction required for at least one function (such as a sound playing function, an image playing function, etc.), and the like.
  • memory 1009 may include volatile memory or nonvolatile memory, or, memory 1009 may include both volatile and nonvolatile memory.
  • the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electronically programmable Erase Programmable Read-Only Memory (Electrically EPROM, EEPROM) or Flash.
  • ROM Read-Only Memory
  • PROM programmable read-only memory
  • Erasable PROM Erasable PROM
  • EPROM electronically programmable Erase Programmable Read-Only Memory
  • Flash Flash
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (Synch link DRAM , SLDRAM) and Direct Memory Bus Random Access Memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM Double Data Rate SDRAM
  • DDRSDRAM double data rate synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM enhanced synchronous dynamic random access memory
  • Synch link DRAM , SLDRAM
  • Direct Memory Bus Random Access Memory Direct Rambus
  • the processor 1010 may include one or more processing units; optionally, the processor 1010 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to the operating system, user interface, and application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the foregoing modem processor may not be integrated into the processor 1010 .
  • the embodiment of the present application also provides a readable storage medium, the readable storage medium stores a program or an instruction, and when the program or instruction is executed by the processor, each process of the above-mentioned control method embodiment of the application identification is realized, and can To achieve the same technical effect, in order to avoid repetition, no more details are given here.
  • the processor is the processor in the electronic device described in the above embodiments.
  • the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk, and the like.
  • the embodiment of the present application further provides a chip, the chip includes a processor and a communication interface, the The communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned application identification control method embodiment, and can achieve the same technical effect. To avoid repetition, details are not repeated here.
  • chips mentioned in the embodiments of the present application may also be called system-on-chip, system-on-chip, system-on-a-chip, or system-on-a-chip.
  • An embodiment of the present application provides a computer program product, the program product is stored in a non-transitory storage medium, and the program product is executed by at least one processor to implement the various processes in the control method embodiment of the above application identification, and can To achieve the same technical effect, in order to avoid repetition, no more details are given here.
  • the term “comprising”, “comprising” or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or device. Without further limitations, an element defined by the phrase “comprising a " does not preclude the presence of additional identical elements in the process, method, article, or apparatus comprising that element.
  • the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, and may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions are performed, for example, the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

An application identifier control method and apparatus, which belong to the technical field of communications. The method comprises: receiving a first input for a target application identifier (101); and in response to the first input, controlling the target application identifier to move to a corresponding target position, and controlling the target application identifier at the target position to execute a corresponding target operation, wherein there is a first association relationship between the target application identifier and the target position, and there is a second association relationship among the target application identifier, the target position, and the target operation (102).

Description

应用标识的控制方法及其装置Application identification control method and device thereof
相关申请的交叉引用Cross References to Related Applications
本申请要求在2022年02月28日提交中国专利局、申请号为202210192688.2、名称为“应用标识的控制方法及其装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with application number 202210192688.2 and titled "Control Method and Apparatus for Application Identification" submitted to the China Patent Office on February 28, 2022, the entire contents of which are incorporated in this application by reference .
技术领域technical field
本申请属于通信技术领域,具体涉及一种应用标识的控制方法及其装置。The present application belongs to the technical field of communications, and in particular relates to a method and device for controlling an application identification.
背景技术Background technique
目前,在电子设备上,当用户想要锁定或者隐藏某些应用图标时,只能通过设置密码、指纹、面容的方式对应用图标进行锁定或隐藏,或者通过将应用加入私密文件夹的方式对应用图标进行锁定或隐藏。At present, on electronic devices, when users want to lock or hide certain application icons, they can only lock or hide application icons by setting passwords, fingerprints, and faces, or by adding applications to private folders. App icon to lock or hide.
但是,无论是通过设置密码、指纹、面容的方式,还是设置隐私文件夹的方式,操作过程都较为繁琐,一般需要进入设置,输入密码确认后才可以锁定或者隐藏应用图标,且想要打开应用或者显示应用图标的时候也需要输入密码并认证成功后才可以打开,操作过程比较繁琐。However, whether it is through setting a password, fingerprint, face, or setting a private folder, the operation process is relatively cumbersome. Generally, you need to enter the settings, enter the password for confirmation, and then you can lock or hide the application icon, and you want to open the application. Or when the application icon is displayed, it is necessary to enter the password and then open it after the authentication is successful. The operation process is rather cumbersome.
发明内容Contents of the invention
本申请实施例的目的是提供一种应用标识的控制方法及其装置,能够解决现有技术对应用图标进行锁定或隐藏的操作过程比较繁琐的问题。The purpose of the embodiments of the present application is to provide a method and device for controlling application identification, which can solve the problem of complicated operations for locking or hiding application icons in the prior art.
第一方面,本申请实施例提供了一种应用标识的控制方法,包括:In the first aspect, the embodiment of the present application provides a method for controlling application identification, including:
接收对目标应用标识的第一输入;receiving a first input of a target application identification;
响应于所述第一输入,控制所述目标应用标识移动至对应的目标位置,并控制处于所述目标位置的所述目标应用标识执行对应的目标操作;In response to the first input, controlling the target application identifier to move to a corresponding target position, and controlling the target application identifier at the target position to perform a corresponding target operation;
其中,所述目标应用标识与所述目标位置之间具有第一关联关系,所述目标应用标识、所述目标位置以及所述目标操作之间具有第二关联关系。Wherein, the target application identifier and the target location have a first association relationship, and the target application identifier, the target location, and the target operation have a second association relationship.
第二方面,本申请实施例提供了一种应用标识的控制装置,包括: In the second aspect, the embodiment of the present application provides a device for controlling application identification, including:
第一接收模块,用于接收对目标应用标识的第一输入;A first receiving module, configured to receive a first input of a target application identifier;
控制模块,用于响应于所述第一输入,控制所述目标应用标识移动至对应的目标位置,并控制处于所述目标位置的所述目标应用标识执行对应的目标操作;A control module, configured to, in response to the first input, control the target application identifier to move to a corresponding target position, and control the target application identifier at the target position to perform a corresponding target operation;
其中,所述目标应用标识与所述目标位置之间具有第一关联关系,所述目标应用标识、所述目标位置以及所述目标操作之间具有第二关联关系。Wherein, the target application identifier and the target location have a first association relationship, and the target application identifier, the target location, and the target operation have a second association relationship.
第三方面,本申请实施例提供了一种电子设备,该电子设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。In the third aspect, the embodiment of the present application provides an electronic device, the electronic device includes a processor and a memory, the memory stores programs or instructions that can run on the processor, and the programs or instructions are processed by the The steps of the method described in the first aspect are realized when the controller is executed.
第四方面,本申请实施例提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤。In a fourth aspect, an embodiment of the present application provides a readable storage medium, on which a program or an instruction is stored, and when the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented .
第五方面,本申请实施例提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法。In the fifth aspect, the embodiment of the present application provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run programs or instructions, so as to implement the first aspect the method described.
第六方面,本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如第一方面所述的方法。In a sixth aspect, an embodiment of the present application provides a computer program product, the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the method described in the first aspect.
第七方面,本申请实施例提供一种应用标识的控制装置,包括所述装置被配置成用于执行如第一方面所述的方法。In a seventh aspect, an embodiment of the present application provides an apparatus for controlling an application identifier, including that the apparatus is configured to execute the method as described in the first aspect.
在本申请实施例中,通过接收对目标应用标识的第一输入,响应于该第一输入,根据目标应用标识与目标位置之间的第一关系联系,控制目标应用标识移动至对应的目标位置,并根据目标应用标识、目标位置以及目标操作之间的第二关联关系,控制处于目标位置的目标应用标识执行对应的目标操作,即通过将目标应用标识移动至对应的目标位置,就可以触发处于目标位置的目标应用标识对应的目标操作,能够在桌面完成对目标应用标识对应的目标操作,不需要输入密码进行认证,由此简化了用户的操作过程,降低了用户的操作成本。 In the embodiment of the present application, by receiving the first input of the target application identifier, in response to the first input, according to the first relationship between the target application identifier and the target location, the target application identifier is controlled to move to the corresponding target location , and according to the second association between the target application ID, the target location, and the target operation, the target application ID at the target position is controlled to execute the corresponding target operation, that is, by moving the target application ID to the corresponding target position, the The target operation corresponding to the target application ID at the target location can be completed on the desktop without entering a password for authentication, thereby simplifying the user's operation process and reducing the user's operation cost.
附图说明Description of drawings
图1是本申请实施例提供的一种应用标识的控制方法的流程图;FIG. 1 is a flow chart of a method for controlling application identification provided by an embodiment of the present application;
图2是本申请实施例提供的执行目标操作的示意图之一;Fig. 2 is one of the schematic diagrams of executing the target operation provided by the embodiment of the present application;
图3是本申请实施例提供的执行目标操作的示意图之二;Fig. 3 is the second schematic diagram of executing the target operation provided by the embodiment of the present application;
图4是本申请实施例提供的执行目标操作的示意图之三;Fig. 4 is the third schematic diagram of executing the target operation provided by the embodiment of the present application;
图5是本申请实施例提供的执行目标操作的示意图之四;Fig. 5 is the fourth schematic diagram of executing the target operation provided by the embodiment of the present application;
图6是本申请实施例提供的执行目标操作的示意图之五;Fig. 6 is the fifth schematic diagram of executing the target operation provided by the embodiment of the present application;
图7是本申请实施例提供的隐藏方式的类型示意图;Fig. 7 is a schematic diagram of the types of concealment methods provided by the embodiment of the present application;
图8是本申请实施例提供的双应用隐藏方式的显示示意图;Fig. 8 is a schematic display of the dual application hiding method provided by the embodiment of the present application;
图9是本申请实施例提供的四应用隐藏方式的显示示意图;Fig. 9 is a schematic diagram of displaying four application hiding methods provided by the embodiment of the present application;
图10是本申请实施例提供的八应用隐藏方式的显示示意图;Fig. 10 is a schematic diagram of displaying eight application hiding methods provided by the embodiment of the present application;
图11是本申请实施例提供的目标应用标识的选择示意图;Fig. 11 is a schematic diagram of selection of a target application identifier provided by an embodiment of the present application;
图12是本申请实施例提供的目标位置的选择示意图之一;Fig. 12 is one of the schematic diagrams for selecting the target position provided by the embodiment of the present application;
图13是本申请实施例提供的目标位置的选择示意图之二;Fig. 13 is the second schematic diagram of the selection of the target position provided by the embodiment of the present application;
图14是本申请实施例提供的目标操作的选择示意图;Figure 14 is a schematic diagram of the selection of the target operation provided by the embodiment of the present application;
图15是本申请实施例提供的一种应用标识的控制装置的结构示意图;Fig. 15 is a schematic structural diagram of a control device for application identification provided by an embodiment of the present application;
图16是本申请实施例提供的一种电子设备的结构框图;Fig. 16 is a structural block diagram of an electronic device provided by an embodiment of the present application;
图17是本申请实施例提供的另一种电子设备的结构框图。Fig. 17 is a structural block diagram of another electronic device provided by an embodiment of the present application.
具体实施例specific embodiment
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符 “/”,一般表示前后关联对象是一种“或”的关系。The terms "first", "second" and the like in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific sequence or sequence. It should be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application can be practiced in sequences other than those illustrated or described herein, and that references to "first,""second," etc. distinguish Objects are generally of one type, and the number of objects is not limited. For example, there may be one or more first objects. In addition, "and/or" in the specification and claims means at least one of the connected objects, and the characters "/" generally means that the associated objects before and after are in an "or" relationship.
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的应用标识的控制方法进行详细地说明。The method for controlling the application identification provided by the embodiment of the present application will be described in detail below through specific embodiments and application scenarios with reference to the accompanying drawings.
如图1所示,本申请实施例提供了一种应用标识的控制方法,包括如下步骤:As shown in Figure 1, the embodiment of the present application provides a method for controlling application identification, including the following steps:
步骤101,接收对目标应用标识的第一输入。Step 101, receiving a first input of a target application identifier.
具体的,本申请实施例提供的一个应用标识的控制方法可以应用于电子设备,电子设备接收对目标应用标识的第一输入。Specifically, the method for controlling an application identification provided in the embodiment of the present application may be applied to an electronic device, and the electronic device receives a first input of a target application identification.
其中,目标应用标识为电子设备桌面上的多个应用标识中的其中一个应用标识或者多个应用标识。第一输入可以为对目标应用标识的点击输入、双击输入、滑动输入、长按输入等,在此不做具体限定。Wherein, the target application identifier is one or more application identifiers among the multiple application identifiers on the desktop of the electronic device. The first input may be a click input, double-click input, slide input, long-press input, etc. of the target application identifier, which is not specifically limited here.
进一步的,所述目标应用标识包括但不限于如下至少一项:Further, the target application identification includes but is not limited to at least one of the following:
至少一个应用图标;at least one application icon;
至少一个原子组件。At least one atomic component.
具体的,目标应用标识可以为至少一个应用标识和至少一个原子组件的组合;或者,目标应用标识也可以为一个或多个应用标识;或者,目标应用标识也可以为一个或多个原子组件。Specifically, the target application identifier may be a combination of at least one application identifier and at least one atomic component; or, the target application identifier may also be one or more application identifiers; or, the target application identifier may also be one or more atomic components.
其中,应用图标为电子设备中的应用程序的桌面图标;原子组件能够将电子设备中的很多应用的内部功能在桌面仅占用1x2、2x1小区域进行展现,并且可以通过原子组件直接对应用进行控制、操作,而不必再进入应用内,可以减少很多繁琐的步骤。Among them, the application icon is the desktop icon of the application program in the electronic device; the atomic component can display the internal functions of many applications in the electronic device in a small area of 1x2 or 2x1 on the desktop, and can directly control the application through the atomic component , operation without having to enter the application again, which can reduce many tedious steps.
步骤102,响应于所述第一输入,控制所述目标应用标识移动至对应的目标位置,并控制处于所述目标位置的所述目标应用标识执行对应的目标操作;Step 102, in response to the first input, controlling the target application identifier to move to a corresponding target position, and controlling the target application identifier at the target position to perform a corresponding target operation;
其中,所述目标应用标识与所述目标位置之间具有第一关联关系,所述目标应用标识、所述目标位置以及所述目标操作之间具有第二关联关系。Wherein, the target application identifier and the target location have a first association relationship, and the target application identifier, the target location, and the target operation have a second association relationship.
具体的,在接收到第一输入的情况下,响应于该第一输入,可以根据第 一关联关系,控制目标应用标识移动至与其对应的目标位置,并且,根据第二关联关系,控制已经处于目标位置的目标应用标识执行与其对应的目标操作,即在桌面移动目标应用标识至目标位置就可以对该目标应用标识执行目标操作,降低了用户的操作成本。Specifically, in the case of receiving the first input, in response to the first input, the The first association relationship controls the movement of the target application identifier to its corresponding target location, and, according to the second association relationship, controls the target application identifier already at the target location to perform the corresponding target operation, that is, moves the target application identifier to the target location on the desktop Then the target operation can be performed on the target application identifier, which reduces the user's operation cost.
在接收第一输入之前,需要建立目标应用标识与目标位置之间的第一关联关系,即需要将目标应用标识中的每一个应用图标关联一个对应的目标位置,也需要将目标应用标识中的每一个原子组件关联一个对应的目标位置。其中,不同的应用图标或者不同的原子组件对应的目标位置可以为相同的位置,也可以为不同的位置,可以根据需要进行设定,在此不做具体限定。Before receiving the first input, it is necessary to establish the first association relationship between the target application ID and the target location, that is, it is necessary to associate each application icon in the target application ID with a corresponding target location, and it is also necessary to associate the target application ID with the Each atomic component is associated with a corresponding target location. Wherein, the target positions corresponding to different application icons or different atomic components may be the same position or different positions, which may be set according to needs, and are not specifically limited here.
在接收第一输入之前,需要建立目标应用标识、目标位置以及目标操作三者之间的第二关联关系,该第二关联关系可以是在第一关联关系的基础上建立的,即先建立目标应用标识与目标位置之间的第一关联关系,在第一关联关系的基础上再建立处于目标位置的目标应用标识与目标操作之间的第二关联关系;即需要将每一个处于目标位置的应用图标关联一个对应的目标操作,也需要将每一个处于目标位置的原子组件关联一个对应的目标操作。其中,不同的处于目标位置的应用图标或者不同的处于目标位置的原子组件对应的目标操作可以为相同的操作,也可以为不同的操作,可以根据需要进行设定,在此不做具体限定。Before receiving the first input, it is necessary to establish a second association between the target application identifier, the target location, and the target operation. The second association can be established on the basis of the first association, that is, the target The first association relationship between the application identifier and the target location, and the second association relationship between the target application identifier at the target location and the target operation is established on the basis of the first association relationship; The application icon is associated with a corresponding target operation, and each atomic component at the target position needs to be associated with a corresponding target operation. Wherein, the target operations corresponding to different application icons at the target positions or different atomic components at the target positions may be the same operation or different operations, which may be set as required, and are not specifically limited here.
或者,第二关联关系不需要在第一关联关系的基础上建立,仅需要在接收第一输入之前,建立目标应用标识、目标位置以及目标操作三者之间的一种关联关系即可。即需要将目标应用标识中的每一个应用图标关联一个对应的目标位置以及一个对应的目标操作,也需要将目标应用标识中的每一个原子组件关联一个对应的目标位置以及一个对应的目标操作。Alternatively, the second association relationship does not need to be established on the basis of the first association relationship, and it is only necessary to establish an association relationship among the target application identifier, the target location, and the target operation before receiving the first input. That is, each application icon in the target application identification needs to be associated with a corresponding target location and a corresponding target operation, and each atomic component in the target application identification needs to be associated with a corresponding target location and a corresponding target operation.
本申请上述实施例中,通过获取对目标应用标识的第一输入,响应于该第一输入,根据目标应用标识与目标位置之间的第一关系联系,控制目标应用标识移动至对应的目标位置,并根据目标应用标识、目标位置以及目标操作之间的第二关联关系,控制处于目标位置的目标应用标识执行对应的目标 操作,即通过将目标应用标识移动至对应的目标位置,就可以触发处于目标位置的目标应用标识对应的目标操作,能够在桌面完成对目标应用标识对应的目标操作,不需要输入密码进行认证,由此简化了用户的操作过程,降低了用户的操作成本。In the above embodiments of the present application, by acquiring the first input to the target application identifier, in response to the first input, the target application identifier is controlled to move to the corresponding target location according to the first relationship between the target application identifier and the target location , and according to the second association relationship between the target application ID, the target location, and the target operation, control the target application ID at the target location to execute the corresponding target Operation, that is, by moving the target application ID to the corresponding target position, the target operation corresponding to the target application ID at the target position can be triggered, and the target operation corresponding to the target application ID can be completed on the desktop without entering a password for authentication. Thus, the user's operation process is simplified, and the user's operation cost is reduced.
作为一可选的实施例,所述目标操作可以包括但不限于显示操作、隐藏操作、锁定操作和解锁操作中的其中一项。As an optional embodiment, the target operation may include but not limited to one of a display operation, a hide operation, a lock operation, and an unlock operation.
具体的,在目标操作为显示操作的情况下,需要控制处于目标位置的目标应用标识执行对应的显示操作,即如果目标应用标识处于目标位置,则需要将目标应用标识的状态更改为显示状态,显示在桌面。例如:如图2所示,如果目标应用标识为应用图标3,应用图标3在隐藏状态时,处于第一位置21,与应用图标3对应的目标位置为第二位置22。即当应用图标3处于第一位置21时,应用图标3处于隐藏状态,如果将应用图标3沿着箭头方向从第一位置21移动至第二位置22,则触发显示操作,此时应用图标3由隐藏状态变为显示状态。需要说明的是,图2中通过虚线框表示应用图标3的隐藏状态,通过实线框标识应用图标3的显示状态,在实际使用过程中,隐藏状态即为在桌面不进行显示,显示状态即为在桌面进行显示。Specifically, when the target operation is a display operation, it is necessary to control the target application ID at the target position to perform the corresponding display operation, that is, if the target application ID is at the target position, the state of the target application ID needs to be changed to the display state, displayed on the desktop. For example: as shown in FIG. 2 , if the target application is identified as the application icon 3 , the application icon 3 is in the first position 21 when it is hidden, and the target position corresponding to the application icon 3 is the second position 22 . That is, when the application icon 3 is in the first position 21, the application icon 3 is in the hidden state. If the application icon 3 is moved from the first position 21 to the second position 22 along the direction of the arrow, the display operation will be triggered. At this time, the application icon 3 Change from hidden state to visible state. It should be noted that in FIG. 2, the hidden state of the application icon 3 is represented by a dotted line frame, and the display state of the application icon 3 is marked by a solid line frame. In actual use, the hidden state means that it is not displayed on the desktop, and the displayed state is for display on the desktop.
在目标操作为隐藏操作的情况下,需要控制处于目标位置的目标应用标识执行对应的隐藏操作,即如果目标应用标识处于目标位置,则需要将目标应用标识的状态更改为隐藏状态,此时目标应用标识在桌面处于非显示状态,用户在使用电子设备时无法看到隐藏在目标位置的目标应用标识。例如:如图3所示,如果目标应用标识为应用图标3,应用图标3在显示状态时,处于第一位置31,与应用图标3对应的目标位置为第二位置32。即当应用图标3处于第一位置31时,应用图标3处于显示状态,如果将应用图标3沿着箭头方向从第一位置31移动至第二位置32,则触发隐藏操作,此时应用图标3由显示状态变为隐藏状态。需要说明的是,图3中通过虚线框表示应用图标3的隐藏状态,通过实线框标识应用图标3的显示状态,在实际使用过程中,隐藏状态即为在桌面不进行显示,显示状态即为在桌面进行显示。 When the target operation is a hidden operation, it is necessary to control the target application ID at the target position to perform the corresponding hidden operation, that is, if the target application ID is at the target position, the state of the target application ID needs to be changed to the hidden state. The application identification is in a non-display state on the desktop, and the user cannot see the target application identification hidden in the target position when using the electronic device. For example: as shown in FIG. 3 , if the target application is identified as the application icon 3 , the application icon 3 is in the first position 31 when it is displayed, and the target position corresponding to the application icon 3 is the second position 32 . That is, when the application icon 3 is at the first position 31, the application icon 3 is in the displayed state, and if the application icon 3 is moved from the first position 31 to the second position 32 along the direction of the arrow, the hiding operation is triggered, and at this time the application icon 3 Change from display state to hidden state. It should be noted that in Figure 3, the hidden state of the application icon 3 is represented by a dotted line frame, and the display state of the application icon 3 is marked by a solid line frame. for display on the desktop.
在目标操作为锁定操作的情况下,需要控制处于目标位置的目标应用标识执行对应的锁定操作,即如果目标应用标识处于目标位置,则需要将目标应用标识的状态更改为锁定状态,此时目标应用标识在桌面处于锁定状态,用户在使用电子设备时,无法对目标应用标识对应的应用程序进行操作,即用户无法使用处于目标位置的目标应用标识对应的应用程序。例如:如图4所示,如果目标应用标识为应用图标3,应用图标3在解锁状态时,处于第一位置41,与应用图标3对应的目标位置为第二位置42。即当应用图标3处于第一位置41时,应用图标3处于解锁状态,如果将应用图标3沿着箭头方向从第一位置41移动至第二位置42,则触发锁定操作,此时应用图标3由解锁状态变为锁定状态。需要说明的是,图4中通过锁图案43来表示应用图标3的锁定状态,不设置锁图案43的应用图标为解锁状态,在实际使用过程中,如果应用图标3处于解锁状态,则可以使用应用图标3对应的应用程序,如果应用图标3处于锁定状态,则不能使用应用图标3对应的应用程序,应用图标3处于锁定状态。When the target operation is a lock operation, it is necessary to control the target application ID at the target position to perform the corresponding lock operation, that is, if the target application ID is at the target position, the state of the target application ID needs to be changed to the locked state, and the target The application identification is locked on the desktop, and the user cannot operate the application program corresponding to the target application identification when using the electronic device, that is, the user cannot use the application program corresponding to the target application identification at the target location. For example: as shown in FIG. 4 , if the target application is identified as the application icon 3 , the application icon 3 is in the first position 41 when it is in the unlocked state, and the target position corresponding to the application icon 3 is the second position 42 . That is, when the application icon 3 is at the first position 41, the application icon 3 is in the unlocked state, and if the application icon 3 is moved from the first position 41 to the second position 42 along the direction of the arrow, the locking operation is triggered, and at this time the application icon 3 From unlocked state to locked state. It should be noted that the locked state of the application icon 3 is represented by the lock pattern 43 in FIG. 4 , and the application icon without the lock pattern 43 is in the unlocked state. For the application program corresponding to the application icon 3, if the application icon 3 is in the locked state, the application program corresponding to the application icon 3 cannot be used, and the application icon 3 is in the locked state.
在目标操作为解锁操作的情况下,需要控制处于目标位置的目标应用标识执行对应的解锁操作,即如果目标应用标识处于目标位置,则需要将目标应用标识的状态更改为解除锁定的状态,此时目标应用标识在桌面处于可操作状态,用户在使用电子设备时可以对目标应用标识对应的应用程序进行操作。例如:如图5所示,如果目标应用标识为应用图标3,应用图标3在锁定状态时,处于第一位置51,与应用图标3对应的目标位置为第二位置52。即当应用图标3处于第一位置51时,应用图标3处于锁定状态,如果将应用图标3沿着箭头方向从第一位置51移动至第二位置52,则触发解锁操作,此时应用图标3由锁定状态变为解锁状态。需要说明的是,图5中通过锁图案53来表示应用图标3的锁定状态,不设置锁图案53的应用图标为解锁状态,在实际使用过程中,如果应用图标3处于解锁状态,则可以使用应用图标3对应的应用程序,如果应用图标3处于锁定状态,则不能使用应用图标3对应的应用程序,应用图标3处于锁定状态。 When the target operation is an unlocking operation, it is necessary to control the target application ID at the target position to perform the corresponding unlocking operation, that is, if the target application ID is at the target position, the state of the target application ID needs to be changed to the unlocked state. When the target application identifier is in an operable state on the desktop, the user can operate the application program corresponding to the target application identifier when using the electronic device. For example, as shown in FIG. 5 , if the target application is identified as the application icon 3 , the application icon 3 is in the first position 51 when the application icon is locked, and the target position corresponding to the application icon 3 is the second position 52 . That is, when the application icon 3 is in the first position 51, the application icon 3 is in the locked state. If the application icon 3 is moved from the first position 51 to the second position 52 along the direction of the arrow, the unlocking operation is triggered. At this time, the application icon 3 From locked state to unlocked state. It should be noted that the locked state of the application icon 3 is represented by the lock pattern 53 in FIG. 5 , and the application icon without the lock pattern 53 is in the unlocked state. For the application program corresponding to the application icon 3, if the application icon 3 is in the locked state, the application program corresponding to the application icon 3 cannot be used, and the application icon 3 is in the locked state.
作为一可选的实施例,所述步骤102中控制处于所述目标位置的所述目标应用标识执行对应的目标操作,具体包括:As an optional embodiment, in the step 102, controlling the target application identifier at the target location to perform a corresponding target operation specifically includes:
在所述目标应用标识包括至少两个应用标识、且所述至少两个应用标识均位于对应的目标位置的情况下,控制所述至少两个应用标识执行目标操作。In a case where the target application identifiers include at least two application identifiers, and the at least two application identifiers are located at corresponding target positions, the at least two application identifiers are controlled to perform the target operation.
具体的,如果目标应用标识包括至少两个应用标识,则该至少两个应用标识为组合应用标识,该组合应用标识中的每一个应用标识均需要处于其对应的目标位置,才会触发目标操作。即如果目标应用标识包括第一应用标识和第二应用标识,第一应用标识和第二应用标识为组合应用标识,如果第一应用标识处于其对应的目标位置,第二应用标识也处于其对应的目标位置,则可以触发第一应用标识和第二应用标识的目标操作。如果第一应用标识处于其对应的目标位置,而第二应用标识未处于其对应的目标位置,则不仅不会触发第二应用标识的目标操作,也不会触发第一应用标识的目标操作。同理,如果第一应用标识未处于其对应的目标位置,而第二应用标识处于其对应的目标位置,则不仅不会触发第一应用标识的目标操作,也不会触发第二应用标识的目标操作。即目标应用标识的组合方式多样,极大提高了破解难度,提高信息安全性。Specifically, if the target application identifier includes at least two application identifiers, the at least two application identifiers are combined application identifiers, and each application identifier in the combined application identifier needs to be in its corresponding target position before the target operation can be triggered . That is, if the target application identifier includes the first application identifier and the second application identifier, the first application identifier and the second application identifier are combined application identifiers, and if the first application identifier is in its corresponding target position, the second application identifier is also in its corresponding target location, the target operations of the first application identifier and the second application identifier may be triggered. If the first application identifier is at its corresponding target position but the second application identifier is not at its corresponding target position, not only the target operation of the second application identifier but also the target operation of the first application identifier will not be triggered. Similarly, if the first application identification is not at its corresponding target position, but the second application identification is at its corresponding target position, not only will the target operation of the first application identification not be triggered, but also the second application identification will not be triggered. target action. That is, target application identifiers can be combined in various ways, which greatly increases the difficulty of cracking and improves information security.
例如:如图6所示,目标应用标识包括应用图标2和应用图标3,应用图标2和应用图标3为组合应用图标,在组合应用图标均处于其对应的目标位置时,触发的目标操作为隐藏操作。在应用图标2处于第一位置61时,应用图标2处于显示状态,与应用图标2对应的目标位置为第二位置62。在应用图标3处于第三位置63时,应用图标3处于显示状态,与应用图标3对应的目标位置为第四位置64。如果将应用图标2从第一位置61沿着箭头方向移动至第二位置62、且将应用图标3从第三位置63沿着箭头方向移动至第四位置64,此时会触发隐藏操作,即处于第二位置62的应用图标2以及处于第四位置64的应用图标3均处于隐藏状态,图中用虚线框表示应用图标的隐藏状态。如果将应用图标2从第一位置61沿着箭头方向移动至第 二位置62、但应用图标3仍然处于第三位置63,此时不会触发隐藏操作,即处于第二位置62的应用图标2以及处于第三位置63的应用图标3均处于显示状态。同理,如果将应用图标3从第三位置63沿着箭头方向移动至第四位置64、但应用图标2仍然处于第一位置61,此时不会触发隐藏操作,即处于第一位置61的应用图标2以及处于第四位置64的应用图标3均处于显示状态。For example: as shown in Figure 6, the target application identifier includes application icon 2 and application icon 3, and application icon 2 and application icon 3 are combined application icons. When the combined application icons are at their corresponding target positions, the triggered target operation is Hide actions. When the application icon 2 is at the first position 61 , the application icon 2 is in the displayed state, and the target position corresponding to the application icon 2 is the second position 62 . When the application icon 3 is in the third position 63 , the application icon 3 is in the displayed state, and the target position corresponding to the application icon 3 is the fourth position 64 . If the application icon 2 is moved from the first position 61 to the second position 62 along the direction of the arrow, and the application icon 3 is moved from the third position 63 to the fourth position 64 along the direction of the arrow, the hiding operation will be triggered at this time, namely The application icon 2 at the second position 62 and the application icon 3 at the fourth position 64 are both in a hidden state, and the dotted box in the figure indicates the hidden state of the application icons. If the application icon 2 is moved from the first position 61 to the second position along the direction of the arrow In the second position 62, but the application icon 3 is still in the third position 63, the hiding operation will not be triggered at this time, that is, the application icon 2 in the second position 62 and the application icon 3 in the third position 63 are both displayed. Similarly, if the application icon 3 is moved from the third position 63 to the fourth position 64 along the direction of the arrow, but the application icon 2 is still at the first position 61, the hiding operation will not be triggered at this time, that is, the user at the first position 61 Both the application icon 2 and the application icon 3 at the fourth position 64 are displayed.
本申请上述实施例还可以选择目标应用标识中包含的应用标识数量,并预先设置应用标识数量对应的目标位置的区域范围。下面以目标操作为隐藏操作为例进行说明:In the above embodiments of the present application, the number of application identifiers included in the target application identifiers may be selected, and the area range of the target location corresponding to the number of application identifiers may be preset. The following takes the target operation as a hidden operation as an example for illustration:
如图7所示,如果目标按操作为隐藏操作,则可以通过设置进入选择隐藏方式的界面,即可以在该界面对应用标识数量进行选择,包括双应用隐藏控件71、四应用隐藏控件72、八应用隐藏控件73。其中,双应用隐藏控件71对应可以控制两个应用标识进行隐藏操作,四应用隐藏控件72对应可以控制四个应用标识进行隐藏操作,八应用隐藏控件73对应可以控制八个应用标识进行隐藏操作。如果选择双应用隐藏控件71进行操作,则进入如图8所示页面,位置1和位置4为可以显示区域,位置2和位置3为可以进行目标应用标识隐藏的区域,即位置1和位置4之间的位置为可以隐藏的区域,目标应用标识中的两个不同应用标识对应的目标位置从位置2和位置3进行选择。如果选择四应用隐藏控件72进行操作,则进入如图9所示页面,位置1、位置2、位置3和位置4为可以显示区域,位置5、位置6、位置7和位置8为可以进行目标应用标识隐藏的区域,即位置1、位置2、位置3和位置4围起来的位置为可以隐藏的区域,目标应用标识中的四个不同应用标识对应的目标位置从位置5、位置6、位置7和位置8中进行选择。如果选择八应用隐藏控件73进行操作,则进入如图10所示页面,位置1、位置2、位置3、位置4、位置5、位置6、位置7和位置8为可以显示区域,位置9、位置10、位置11、位置12、位置13、位置14、位置15和位置16为可以进行目标应用标识隐藏的区域,即位置1、位置2、位置3、位置4、位置5、 位置6、位置7和位置之间的位置为可以隐藏的区域,目标应用标识中的八个不同应用标识对应的目标位置从位置9、位置10、位置11、位置12、位置13、位置14、位置15和位置16中进行选择。As shown in Figure 7, if the target operation is a hidden operation, you can enter the interface for selecting the hiding mode by setting, that is, you can select the number of application identifiers on this interface, including double application hidden controls 71, four application hidden controls 72, Eight application hide controls 73 . Among them, the dual-application hiding control 71 can control two application identifications to hide, the four-application hiding control 72 can control four application identifications to hide, and the eight-application hiding control 73 can control eight application identifications to hide. If you choose the dual-application hidden control 71 to operate, you will enter the page shown in Figure 8, where position 1 and position 4 are areas that can be displayed, and positions 2 and 3 are areas where the target application logo can be hidden, that is, position 1 and position 4 The positions in between are areas that can be hidden, and the target positions corresponding to two different application identifications in the target application identification are selected from position 2 and position 3. If you choose the four-application hidden control 72 to operate, you will enter the page shown in Figure 9. Position 1, position 2, position 3 and position 4 are displayable areas, and position 5, position 6, position 7 and position 8 are possible targets The area where the application identification is hidden, that is, the area enclosed by position 1, position 2, position 3 and position 4 is the area that can be hidden. The target positions corresponding to the four different application identifications in the target application identification are from position 5, position 6, position Choose between 7 and 8. If you choose the eight application hidden control 73 to operate, you will enter the page shown in Figure 10. Position 1, position 2, position 3, position 4, position 5, position 6, position 7 and position 8 are displayable areas, position 9, position 3, position 4, position 5, position 6, position 7 and position 8 Position 10, position 11, position 12, position 13, position 14, position 15, and position 16 are areas where target application identification can be hidden, namely position 1, position 2, position 3, position 4, position 5, The positions between position 6, position 7 and position are areas that can be hidden. The target positions corresponding to the eight different application identifications in the target application identification range from position 9, position 10, position 11, position 12, position 13, position 14, Choose between position 15 and position 16.
作为一可选的实施例,所述第一关联关系的建立方式可以包括如下步骤:As an optional embodiment, the method for establishing the first association relationship may include the following steps:
接收第二输入;receiving a second input;
响应于所述第二输入,从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系。In response to the second input, a target application identifier is selected from multiple application identifiers, a target location is selected from multiple desktop locations, and a first association relationship is established between the target application identifier and the target location.
具体的,接收对多个应用标识中的至少一个应用标识的第二输入,响应于该第二输入,从多个应用标识中选择至少一个应用标识,并确定该至少一个应用标识为目标应用标识;并从多个桌面位置中选择至少一个位置,确定该至少一个位置为目标位置,由此将上述目标应用标识与上述目标位置之间建立第一关联关系。Specifically, receiving a second input of at least one application identifier among the multiple application identifiers, selecting at least one application identifier from the multiple application identifiers in response to the second input, and determining the at least one application identifier as the target application identifier and selecting at least one location from a plurality of desktop locations, and determining the at least one location as the target location, thereby establishing a first association relationship between the target application identifier and the target location.
在接收第二输入之前,可以从设置中进入第一关联关系的建立界面,在第一关联关系的建立界面中接收第二输入。其中,第二输入可以为对多个应用标识中的至少一个应用标识的点击输入、双击输入、滑动输入、长按输入等,在此不做具体限定。Before receiving the second input, the interface for establishing the first association relationship may be entered from the settings, and the second input is received in the interface for establishing the first association relationship. Wherein, the second input may be a click input, a double-click input, a slide input, a long-press input, etc. for at least one application identifier among the plurality of application identifiers, which is not specifically limited here.
作为一可选的实施例,上述从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系的步骤,具体可以包括:As an optional embodiment, the above step of selecting a target application identifier from multiple application identifiers, selecting a target location from multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location, Specifically can include:
从多个应用标识中选择目标应用标识;Selecting a target application identifier from multiple application identifiers;
接收对所述目标应用标识的移动输入;receiving a mobile input of the target application identification;
响应于所述移动输入,控制所述目标应用标识移动至目标位置,建立所述目标应用标识与所述目标位置的第一关联关系。In response to the movement input, the target application identifier is controlled to move to a target location, and a first association relationship between the target application identifier and the target location is established.
具体的,接收第二输入之后,响应于该第二输入,从多个应用标识中选择至少一个应用标识,并确定该至少一个应用标识为目标应用标识。在确定 目标应用标识之后,接收对该目标应用标识的移动输入,响应于该移动输入,控制该目标应用标识移动至目标位置,由此建立目标应用标识与目标位置的第一关联关系。其中,移动输入可以为拖动输入或者其他能够达到相同效果的输入等,在此不做具体限定。Specifically, after receiving the second input, in response to the second input, at least one application identifier is selected from multiple application identifiers, and the at least one application identifier is determined as the target application identifier. in ok After the target application is identified, a movement input of the target application is received, and in response to the movement input, the target application is controlled to move to the target position, thereby establishing a first association relationship between the target application and the target position. Wherein, the movement input may be a drag input or other input capable of achieving the same effect, etc., which is not specifically limited here.
例如:如图11所示,响应于第二输入,从应用图标1~应用图标5中选择应用图标1作为目标应用标识,每一个应用图标对应有选择框,当选择应用图标1的情况下,应用图标1对应的选择框71通过填充色与未选择的应用图标进行区分。其中,区分是否选择应用图标的方式不仅限于上述实施例中将该应用图标对应的选择框进行填充,上述区分方式仅为示例,在此不做具体限定。For example: as shown in Figure 11, in response to the second input, select application icon 1 from application icon 1 to application icon 5 as the target application identifier, each application icon corresponds to a selection box, when application icon 1 is selected, The selection box 71 corresponding to the application icon 1 is distinguished from unselected application icons by filling color. Wherein, the manner of distinguishing whether to select an application icon is not limited to filling the selection box corresponding to the application icon in the above-mentioned embodiment, and the above-mentioned distinguishing manner is only an example, and is not specifically limited here.
在选定应用图标1为目标应用图标的情况下,接收对该应用图标的移动输入,响应于该移动输入,控制应用图标1移动至对应的目标位置,如图12所示,该应用图标1对应的目标位置81为左上角的位置,当应用图标1移动至对应的目标位置81之后,即建立应用图标1与目标位置81之间的第一关联关系。In the case that the selected application icon 1 is the target application icon, a movement input to the application icon is received, and in response to the movement input, the application icon 1 is controlled to move to the corresponding target position, as shown in FIG. 12 , the application icon 1 The corresponding target position 81 is the position of the upper left corner. When the application icon 1 moves to the corresponding target position 81 , the first association relationship between the application icon 1 and the target position 81 is established.
作为一可选的实施例,上述从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系的步骤,具体可以包括:As an optional embodiment, the above step of selecting a target application identifier from multiple application identifiers, selecting a target location from multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location, Specifically can include:
从多个桌面位置中选择目标位置;Select a target location from multiple desktop locations;
接收对所述目标位置的第三输入;receiving a third input of the target location;
响应于所述第三输入,显示第一选择界面,所述第一选择界面中包含多个应用标识;In response to the third input, displaying a first selection interface, the first selection interface includes a plurality of application identifiers;
接收对所述第一选择界面的第一选择输入;receiving a first selection input on the first selection interface;
响应于所述第一选择输入,从所述第一选择界面的多个应用标识中选择目标应用标识,建立所述目标应用标识与所述目标位置的第一关联关系。In response to the first selection input, a target application identifier is selected from multiple application identifiers on the first selection interface, and a first association relationship between the target application identifier and the target location is established.
具体的,接收第二输入之后,响应于该第二输入,进入桌面位置的选择页面,从多个桌面位置中选择至少一个位置,选择的至少一个位置即为目标 位置。例如:桌面位置的选择页面如图13所示,每一个“+”号表示一个桌面位置,从多个桌面位置中选择左上角的位置,则该左上角的桌面位置即为目标位置91。Specifically, after receiving the second input, in response to the second input, enter the selection page of the desktop position, select at least one position from a plurality of desktop positions, and the selected at least one position is the target Location. For example: the selection page of the desktop position is as shown in Figure 13, each "+" sign represents a desktop position, select the position in the upper left corner from multiple desktop positions, then the desktop position in the upper left corner is the target position 91.
在选择目标位置之后,接收对目标位置的第三输入,响应于该第三输入,显示包含多个应用标识的第一选择界面,该第一选择界面中包含多个应用标识。接收对第一选择界面的第一选择输入,响应于该第一选择输入,从第一选择界面中的多个应用标识中选择至少一个应用标识作为目标应用标识,在确定目标应用标识之后,即可建立目标位置与目标应用标识之间的第一关联关系。其中,第一选择输入可以为对多个应用标识中的至少一个应用标识的点击输入、双击输入、长按输入、滑动输入等,在此不做具体限定。After the target location is selected, a third input on the target location is received, and in response to the third input, a first selection interface including a plurality of application identifiers is displayed, and the first selection interface includes a plurality of application identifiers. Receiving a first selection input to the first selection interface, in response to the first selection input, selecting at least one application identification from multiple application identifications in the first selection interface as a target application identification, after determining the target application identification, that is A first association relationship between the target location and the target application identifier may be established. Wherein, the first selection input may be click input, double click input, long press input, slide input, etc. of at least one application identifier among the multiple application identifiers, which is not specifically limited here.
例如:如图13所示,在选择目标位置之后,接收对目标位置91的第三输入,响应于该第三输入,进入第一选择界面。其中,第三输入可以为对目标位置91的单击输入、双击输入、长按输入、滑动操作等,在此不做具体限定。For example: as shown in FIG. 13 , after the target position is selected, a third input to the target position 91 is received, and the first selection interface is entered in response to the third input. Wherein, the third input may be single-click input, double-click input, long-press input, sliding operation, etc. of the target position 91 , which is not specifically limited here.
如图11所示,第一选择界面包含应用图标1、应用图标2、应用图标3、应用图标4以及应用图标5。接收对第一选择界面的第一选择输入,响应于该第一选择输入,从第一选择界面中的应用图标1、应用图标2、应用图标3、应用图标4以及应用图标5中选择应用图标1作为目标应用标识,在确定目标应用标识为应用图标1之后,即可建立目标位置91与应用图标1之间的第一关联关系。As shown in FIG. 11 , the first selection interface includes application icon 1 , application icon 2 , application icon 3 , application icon 4 and application icon 5 . Receiving a first selection input on the first selection interface, in response to the first selection input, selecting an application icon from application icon 1, application icon 2, application icon 3, application icon 4, and application icon 5 in the first selection interface 1 as the target application identifier, after determining that the target application identifier is the application icon 1, the first association relationship between the target location 91 and the application icon 1 can be established.
作为一可选的实施例,所述第二关联关系的建立方式可以包括:As an optional embodiment, the manner for establishing the second association relationship may include:
接收第三输入;receiving a third input;
响应于所述第三输入,从多个操作中选择目标操作;selecting a target operation from a plurality of operations in response to the third input;
将所述目标应用标识、所述目标位置以及所述目标操作建立第二关联关系。A second association relationship is established between the target application identifier, the target location, and the target operation.
具体的,接收对多个操作中的至少一个操作的第三输入,响应于该第三输入,从多个操作中选择至少一个操作,并确定该至少一个操作为目标操作; 通过第一关联关系的建立方式,建立目标应用标识与目标位置之间的第一关联关系,然后将目标操作与目标应用标识、目标位置之间建立第二关联关系,即只有在目标应用标识处于目标位置的情况下,才会触发对应的目标操作。Specifically, receiving a third input for at least one operation among the multiple operations, selecting at least one operation from the multiple operations in response to the third input, and determining the at least one operation as the target operation; Through the method of establishing the first association relationship, the first association relationship between the target application identifier and the target location is established, and then the second association relationship is established between the target operation, the target application identifier, and the target location, that is, only when the target application identifier is in the The corresponding target operation will only be triggered if the target position is reached.
在接收第三输入之前,可以从设置中进入第二关联关系的建立界面,在第二关联关系的建立界面中接收第三输入。Before receiving the third input, the interface for establishing the second association relationship may be entered from the settings, and the third input is received in the interface for establishing the second association relationship.
作为一可选的实施例,上述响应于所述第三输入,从多个操作中选择目标操作的步骤,包括:As an optional embodiment, the above step of selecting a target operation from multiple operations in response to the third input includes:
响应于所述第三输入,显示第二选择界面,所述第二选择界面中包含多个操作标识;In response to the third input, displaying a second selection interface, the second selection interface includes a plurality of operation identifiers;
接收对所述第二选择界面的第二选择输入;receiving a second selection input to the second selection interface;
响应于所述第二选择输入,从所述第二选择界面的多个操作标识中选择目标操作标识,其中,每一个操作标识对应一个操作。In response to the second selection input, a target operation identifier is selected from a plurality of operation identifiers on the second selection interface, wherein each operation identifier corresponds to an operation.
具体的,在接收第三输入之后,响应于所述第三输入,显示包含多个操作标识的第二选择界面。接收对第二选择界面中的多个操作标识中的其中一个操作标识的第二选择输入,响应于该第二选择输入,从第二选择界面的多个操作标识中选择其中一个操作标识作为目标操作标识。其中,每一个操作标识对应于一种操作,操作标识为显示于第二选择界面中的、表示可以进行对应操作的标识。第二选择输入可以为对多个操作标识中的其中一个操作标识的点击输入、双击输入、长按输入、滑动输入等,在此不做具体限定。Specifically, after the third input is received, in response to the third input, a second selection interface including a plurality of operation identifiers is displayed. receiving a second selection input on one of the multiple operation identifiers in the second selection interface, and selecting one of the multiple operation identifiers on the second selection interface as a target in response to the second selection input Action ID. Wherein, each operation identifier corresponds to an operation, and the operation identifier is an identifier displayed on the second selection interface, indicating that the corresponding operation can be performed. The second selection input may be a click input, a double-click input, a long-press input, a slide input, etc. on one of the multiple operation identifiers, which is not specifically limited herein.
例如:如图14所示,在接收第三输入之后,响应于该第三输入,显示包含应用隐藏141、应用显示142、应用锁定143、应用解锁144等四个操作标识的第二选择界面,即应用与权限界面,每一个操作标识分别对应一个操作。接收对第二选择界面中的应用隐藏141的操作标识的第二选择输入,响应于该第二选择输入,确定该应用隐藏141的操作标识对应的隐藏操作为目标操作。For example: as shown in FIG. 14 , after receiving the third input, in response to the third input, a second selection interface including four operation signs including application hiding 141, application display 142, application locking 143, and application unlocking 144 is displayed, That is, the application and permission interface, and each operation identifier corresponds to an operation. A second selection input for the operation identifier of the application hide 141 in the second selection interface is received, and in response to the second selection input, it is determined that the hidden operation corresponding to the operation identifier of the application hide 141 is a target operation.
作为一可选的实施例,所述步骤102响应于所述第一输入之前,所述方法还包括: As an optional embodiment, before the step 102 responds to the first input, the method further includes:
接收用户的身份认证信息;Receive the user's identity authentication information;
在所述身份认证信息与预设信息一致的情况下,确定所述用户为目标用户;If the identity authentication information is consistent with preset information, determine that the user is a target user;
其中,所述步骤102响应于所述第一输入,包括:Wherein, the step 102 responds to the first input, including:
在所述用户为目标用户的情况下,响应于所述第一输入。If the user is a target user, respond to the first input.
具体的,在接收到第一输入之后,获取用户的身份认证信息,对用户的身份进行验证,如果该用户的身份认证信息与预设信息一致,则可以确定用户为目标用户,可以对应用标识进行控制操作,包括第一关联关系的建立操作、第二关联关系的建立操作、对目标应用标识的移动等,在此不做具体限定,能够增加信息安全性,避免非目标用户对应用标识进行操作导致信息泄露等情况。Specifically, after receiving the first input, the user's identity authentication information is obtained, and the user's identity is verified. If the user's identity authentication information is consistent with the preset information, the user can be determined as the target user, and the application identification Performing control operations, including the establishment of the first association relationship, the establishment of the second association relationship, and the movement of the target application identification, etc., are not specifically limited here, which can increase information security and prevent non-target users from performing operations on the application identification. Operations that result in information disclosure, etc.
综上所述,本申请上述实施例中,可以根据需要建立目标应用标识与目标位置之间的第一关联关系,并建立目标应用标识、目标位置与目标操作之间的第二关联关系,并且建立者需要进行身份信息认证,在认证通过的情况下才能修改或建立第一关联关系以及第二关联关系,不易被破解目标操作的触发方式,提高了信息安全性。To sum up, in the above embodiments of the present application, the first association relationship between the target application identifier and the target location can be established as required, and the second association relationship between the target application identifier, the target location, and the target operation can be established, and The creator needs to authenticate the identity information. Only after the authentication is passed can the first association relationship and the second association relationship be modified or established. It is not easy to crack the trigger mode of the target operation, which improves the information security.
并且,通过将目标应用标识移动至对应的目标位置,就可以触发处于目标位置的目标应用标识对应的目标操作,能够在桌面完成对目标应用标识对应的目标操作,不需要输入密码进行认证,由此简化了用户的操作过程,降低了用户的操作成本。Moreover, by moving the target application identifier to the corresponding target position, the target operation corresponding to the target application identifier at the target position can be triggered, and the target operation corresponding to the target application identifier can be completed on the desktop without entering a password for authentication. This simplifies the user's operation process and reduces the user's operation cost.
本申请实施例提供的应用标识的控制方法,执行主体可以为应用标识的控制装置。本申请实施例中以应用标识的控制装置执行应用标识的控制方法为例,说明本申请实施例提供的应用标识的控制装置。In the application identification control method provided in the embodiment of the present application, the execution subject may be an application identification control device. In the embodiment of the present application, the device for controlling the application identifier provided by the embodiment of the present application is described by taking the method for controlling the application identifier executed by the device for controlling the application identifier as an example.
如图15所示,本申请实施例还提供了一种应用标识的控制装置,包括:As shown in Figure 15, the embodiment of the present application also provides a control device for application identification, including:
第一接收模块1501,用于接收对目标应用标识的第一输入;A first receiving module 1501, configured to receive a first input of a target application identifier;
控制模块1502,用于响应于所述第一输入,控制所述目标应用标识移动至对应的目标位置,并控制处于所述目标位置的所述目标应用标识执行对应 的目标操作;A control module 1502, configured to, in response to the first input, control the target application identifier to move to a corresponding target position, and control the target application identifier at the target position to perform a corresponding target operation;
其中,所述目标应用标识与所述目标位置之间具有第一关联关系,所述目标应用标识、所述目标位置以及所述目标操作之间具有第二关联关系。Wherein, the target application identifier and the target location have a first association relationship, and the target application identifier, the target location, and the target operation have a second association relationship.
可选的,所述控制模块1502在控制处于所述目标位置的所述目标应用标识执行对应的目标操作时,具体用于:Optionally, when the control module 1502 controls the target application identifier at the target location to perform a corresponding target operation, it is specifically configured to:
在所述目标应用标识包括至少两个应用标识、且所述至少两个应用标识均位于对应的目标位置的情况下,控制所述至少两个应用标识执行目标操作。In a case where the target application identifiers include at least two application identifiers, and the at least two application identifiers are located at corresponding target positions, the at least two application identifiers are controlled to perform the target operation.
可选的,所述第一关联关系的建立方式包括:Optionally, the method for establishing the first association relationship includes:
接收第二输入;receiving a second input;
响应于所述第二输入,从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系。In response to the second input, a target application identifier is selected from multiple application identifiers, a target location is selected from multiple desktop locations, and a first association relationship is established between the target application identifier and the target location.
可选的,所述从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系,包括:Optionally, the selecting a target application identifier from multiple application identifiers, selecting a target location from multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location includes:
从多个桌面位置中选择目标位置;Select a target location from multiple desktop locations;
接收对所述目标位置的第三输入;receiving a third input of the target location;
响应于所述第三输入,显示第一选择界面,所述第一选择界面中包含多个应用标识;In response to the third input, displaying a first selection interface, the first selection interface includes a plurality of application identifiers;
接收对所述第一选择界面的第一选择输入;receiving a first selection input on the first selection interface;
响应于所述第一选择输入,从所述第一选择界面的多个应用标识中选择目标应用标识,建立所述目标应用标识与所述目标位置的第一关联关系。In response to the first selection input, a target application identifier is selected from multiple application identifiers on the first selection interface, and a first association relationship between the target application identifier and the target location is established.
可选的,所述第二关联关系的建立方式包括:Optionally, the method for establishing the second association relationship includes:
接收第三输入;receiving a third input;
响应于所述第三输入,从多个操作中选择目标操作;selecting a target operation from a plurality of operations in response to the third input;
将所述目标应用标识、所述目标位置以及所述目标操作建立第二关联关 系。Establishing a second association relationship between the target application identifier, the target location and the target operation Tie.
可选的,所述响应于所述第三输入,从多个操作中选择目标操作,包括:Optionally, the selecting a target operation from multiple operations in response to the third input includes:
响应于所述第三输入,显示第二选择界面,所述第二选择界面中包含多个操作标识;In response to the third input, displaying a second selection interface, the second selection interface includes a plurality of operation identifiers;
接收对所述第二选择界面的第二选择输入;receiving a second selection input to the second selection interface;
响应于所述第二选择输入,从所述第二选择界面的多个操作标识中选择目标操作标识,其中,每一个操作标识对应一个操作。In response to the second selection input, a target operation identifier is selected from a plurality of operation identifiers on the second selection interface, wherein each operation identifier corresponds to an operation.
综上所述,本申请上述实施例中,可以根据需要建立目标应用标识与目标位置之间的第一关联关系,并建立目标应用标识、目标位置与目标操作之间的第二关联关系,不易被破解目标操作的触发方式,提高了信息安全性。To sum up, in the above embodiments of the present application, the first association relationship between the target application ID and the target location can be established as required, and the second association relationship between the target application ID, the target location, and the target operation can be established, which is not easy The trigger mode of the cracked target operation improves the information security.
并且,通过将目标应用标识移动至对应的目标位置,就可以触发处于目标位置的目标应用标识对应的目标操作,能够在桌面完成对目标应用标识对应的目标操作,不需要输入密码进行认证,由此简化了用户的操作过程,降低了用户的操作成本。Moreover, by moving the target application identifier to the corresponding target position, the target operation corresponding to the target application identifier at the target position can be triggered, and the target operation corresponding to the target application identifier can be completed on the desktop without entering a password for authentication. This simplifies the user's operation process and reduces the user's operation cost.
本申请实施例中的应用标识的控制装置可以是电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,本申请实施例不作具体限定。The device for controlling the application identification in the embodiment of the present application may be an electronic device, or may be a component in the electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or other devices other than the terminal. Exemplarily, the electronic device can be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle electronic device, a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) ) equipment, robot, wearable device, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook or personal digital assistant (personal digital assistant, PDA), etc., the embodiment of the present application does not specifically limit it.
本申请实施例中的应用标识的控制装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为ios操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。The device for controlling the application identifier in the embodiment of the present application may be a device with an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, which are not specifically limited in this embodiment of the present application.
本申请实施例提供的应用标识的控制装置能够实现图1至图14的方法实施例实现的各个过程,为避免重复,这里不再赘述。 The device for controlling the application identification provided by the embodiment of the present application can realize various processes realized by the method embodiments in FIG. 1 to FIG. 14 , and details are not repeated here to avoid repetition.
可选地,如图16所示,本申请实施例还提供一种电子设备1600,包括处理器1601和存储器1602,存储器1602上存储有可在所述处理器1601上运行的程序或指令,该程序或指令被处理器1601执行时实现上述应用标识的控制方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。Optionally, as shown in FIG. 16 , the embodiment of the present application also provides an electronic device 1600, including a processor 1601 and a memory 1602, and the memory 1602 stores programs or instructions that can run on the processor 1601. The When the programs or instructions are executed by the processor 1601, the various steps of the above-mentioned application identification control method embodiments can be achieved, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
需要说明的是,本申请实施例中的电子设备包括上述所述的移动电子设备和非移动电子设备。It should be noted that the electronic devices in the embodiments of the present application include the above-mentioned mobile electronic devices and non-mobile electronic devices.
图17为实现本申请实施例的一种电子设备的硬件结构示意图。FIG. 17 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
该电子设备1000包括但不限于:射频单元1001、网络模块1002、音频输出单元1003、输入单元1004、传感器1005、显示单元1006、用户输入单元1007、接口单元1008、存储器1009、以及处理器1010等部件。The electronic device 1000 includes, but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, and a processor 1010, etc. part.
本领域技术人员可以理解,电子设备1000还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1010逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图17中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。Those skilled in the art can understand that the electronic device 1000 can also include a power supply (such as a battery) for supplying power to various components, and the power supply can be logically connected to the processor 1010 through the power management system, so that the management of charging, discharging, and function can be realized through the power management system. Consumption management and other functions. The structure of the electronic device shown in FIG. 17 does not constitute a limitation on the electronic device. The electronic device may include more or fewer components than shown in the figure, or combine certain components, or arrange different components, and details will not be repeated here. .
其中,输入单元1004,用于接收对目标应用标识的第一输入;Wherein, the input unit 1004 is configured to receive a first input of the target application identifier;
处理器1010,用于响应于所述第一输入,控制所述目标应用标识移动至对应的目标位置,并控制处于所述目标位置的所述目标应用标识执行对应的目标操作;A processor 1010, configured to, in response to the first input, control the target application identifier to move to a corresponding target position, and control the target application identifier at the target position to perform a corresponding target operation;
其中,所述目标应用标识与所述目标位置之间具有第一关联关系,所述目标应用标识、所述目标位置以及所述目标操作之间具有第二关联关系。Wherein, the target application identifier and the target location have a first association relationship, and the target application identifier, the target location, and the target operation have a second association relationship.
本申请上述实施例中,通过获取对目标应用标识的第一输入,响应于该第一输入,根据目标应用标识与目标位置之间的第一关系联系,控制目标应用标识移动至对应的目标位置,并根据目标应用标识、目标位置以及目标操作之间的第二关联关系,控制处于目标位置的目标应用标识执行对应的目标 操作,即通过将目标应用标识移动至对应的目标位置,就可以触发处于目标位置的目标应用标识对应的目标操作,能够在桌面完成对目标应用标识对应的目标操作,不需要输入密码进行认证,由此简化了用户的操作过程,降低了用户的操作成本。In the above embodiments of the present application, by acquiring the first input to the target application identifier, in response to the first input, the target application identifier is controlled to move to the corresponding target location according to the first relationship between the target application identifier and the target location , and according to the second association relationship between the target application ID, the target location, and the target operation, control the target application ID at the target location to execute the corresponding target Operation, that is, by moving the target application ID to the corresponding target position, the target operation corresponding to the target application ID at the target position can be triggered, and the target operation corresponding to the target application ID can be completed on the desktop without entering a password for authentication. Thus, the user's operation process is simplified, and the user's operation cost is reduced.
可选地,所述处理器1010在控制处于所述目标位置的所述目标应用标识执行对应的目标操作时,具体用于:Optionally, when the processor 1010 controls the target application identifier at the target location to perform a corresponding target operation, it is specifically configured to:
在所述目标应用标识包括至少两个应用标识、且所述至少两个应用标识均位于对应的目标位置的情况下,控制所述至少两个应用标识执行目标操作。In a case where the target application identifiers include at least two application identifiers, and the at least two application identifiers are located at corresponding target positions, the at least two application identifiers are controlled to perform the target operation.
可选地,所述第一关联关系的建立方式包括:Optionally, the manner for establishing the first association relationship includes:
接收第二输入;receiving a second input;
响应于所述第二输入,从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系。In response to the second input, a target application identifier is selected from multiple application identifiers, a target location is selected from multiple desktop locations, and a first association relationship is established between the target application identifier and the target location.
可选地,所述从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系,包括:Optionally, the selecting a target application identifier from multiple application identifiers, selecting a target location from multiple desktop locations, and establishing a first association relationship between the target application identifier and the target location includes:
从多个桌面位置中选择目标位置;Select a target location from multiple desktop locations;
接收对所述目标位置的第三输入;receiving a third input of the target location;
响应于所述第三输入,显示第一选择界面,所述第一选择界面中包含多个应用标识;In response to the third input, displaying a first selection interface, the first selection interface includes a plurality of application identifiers;
接收对所述第一选择界面的第一选择输入;receiving a first selection input on the first selection interface;
响应于所述第一选择输入,从所述第一选择界面的多个应用标识中选择目标应用标识,建立所述目标应用标识与所述目标位置的第一关联关系。In response to the first selection input, a target application identifier is selected from multiple application identifiers on the first selection interface, and a first association relationship between the target application identifier and the target location is established.
可选地,所述第二关联关系的建立方式包括:Optionally, the method for establishing the second association relationship includes:
接收第三输入;receiving a third input;
响应于所述第三输入,从多个操作中选择目标操作; selecting a target operation from a plurality of operations in response to the third input;
将所述目标应用标识、所述目标位置以及所述目标操作建立第二关联关系。A second association relationship is established between the target application identifier, the target location, and the target operation.
可选地,所述响应于所述第三输入,从多个操作中选择目标操作,包括:Optionally, the selecting a target operation from multiple operations in response to the third input includes:
响应于所述第三输入,显示第二选择界面,所述第二选择界面中包含多个操作标识;In response to the third input, displaying a second selection interface, the second selection interface includes a plurality of operation identifiers;
接收对所述第二选择界面的第二选择输入;receiving a second selection input to the second selection interface;
响应于所述第二选择输入,从所述第二选择界面的多个操作标识中选择目标操作标识,其中,每一个操作标识对应一个操作。In response to the second selection input, a target operation identifier is selected from a plurality of operation identifiers on the second selection interface, wherein each operation identifier corresponds to an operation.
综上所述,本申请上述实施例中,可以根据需要建立目标应用标识与目标位置之间的第一关联关系,并建立目标应用标识、目标位置与目标操作之间的第二关联关系,不易被破解目标操作的触发方式,提高了信息安全性。To sum up, in the above embodiments of the present application, the first association relationship between the target application ID and the target location can be established as required, and the second association relationship between the target application ID, the target location, and the target operation can be established, which is not easy The trigger mode of the cracked target operation improves the information security.
并且,通过将目标应用标识移动至对应的目标位置,就可以触发处于目标位置的目标应用标识对应的目标操作,能够在桌面完成对目标应用标识对应的目标操作,不需要输入密码进行认证,由此简化了用户的操作过程,降低了用户的操作成本。Moreover, by moving the target application identifier to the corresponding target position, the target operation corresponding to the target application identifier at the target position can be triggered, and the target operation corresponding to the target application identifier can be completed on the desktop without entering a password for authentication. This simplifies the user's operation process and reduces the user's operation cost.
应理解的是,本申请实施例中,输入单元1004可以包括图形处理器(Graphics Processing Unit,GPU)10041和麦克风10042,图形处理器10041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1006可包括显示面板10061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板10061。用户输入单元1007包括触控面板10071以及其他输入设备10072中的至少一种。触控面板10071,也称为触摸屏。触控面板10071可包括触摸检测装置和触摸控制器两个部分。其他输入设备10072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。It should be understood that, in the embodiment of the present application, the input unit 1004 may include a graphics processor (Graphics Processing Unit, GPU) 10041 and a microphone 10042, and the graphics processor 10041 is used for the image capture device ( Such as the image data of the still picture or video obtained by the camera) for processing. The display unit 1006 may include a display panel 10061, and the display panel 10061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1007 includes at least one of a touch panel 10071 and other input devices 10072 . The touch panel 10071 is also called a touch screen. The touch panel 10071 may include two parts, a touch detection device and a touch controller. Other input devices 10072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be repeated here.
存储器1009可用于存储软件程序以及各种数据。存储器1009可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储 区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1009可以包括易失性存储器或非易失性存储器,或者,存储器1009可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器1009包括但不限于这些和任意其它适合类型的存储器。The memory 1009 can be used to store software programs as well as various data. The memory 1009 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area The area can store an operating system, an application program or an instruction required for at least one function (such as a sound playing function, an image playing function, etc.), and the like. Furthermore, memory 1009 may include volatile memory or nonvolatile memory, or, memory 1009 may include both volatile and nonvolatile memory. Wherein, the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electronically programmable Erase Programmable Read-Only Memory (Electrically EPROM, EEPROM) or Flash. Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (Synch link DRAM , SLDRAM) and Direct Memory Bus Random Access Memory (Direct Rambus RAM, DRRAM). The memory 1009 in the embodiment of the present application includes but is not limited to these and any other suitable types of memory.
处理器1010可包括一个或多个处理单元;可选的,处理器1010集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1010中。The processor 1010 may include one or more processing units; optionally, the processor 1010 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to the operating system, user interface, and application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the foregoing modem processor may not be integrated into the processor 1010 .
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述应用标识的控制方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。The embodiment of the present application also provides a readable storage medium, the readable storage medium stores a program or an instruction, and when the program or instruction is executed by the processor, each process of the above-mentioned control method embodiment of the application identification is realized, and can To achieve the same technical effect, in order to avoid repetition, no more details are given here.
其中,所述处理器为上述实施例中所述的电子设备中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。Wherein, the processor is the processor in the electronic device described in the above embodiments. The readable storage medium includes a computer-readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk, and the like.
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所 述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述应用标识的控制方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。The embodiment of the present application further provides a chip, the chip includes a processor and a communication interface, the The communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned application identification control method embodiment, and can achieve the same technical effect. To avoid repetition, details are not repeated here.
应理解,本申请实施例提到的芯片还可以称为系统级芯片、系统芯片、芯片系统或片上系统芯片等。It should be understood that the chips mentioned in the embodiments of the present application may also be called system-on-chip, system-on-chip, system-on-a-chip, or system-on-a-chip.
本申请实施例提供一种计算机程序产品,该程序产品被存储在非瞬态存储介质中,该程序产品被至少一个处理器执行以实现如上述应用标识的控制方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application provides a computer program product, the program product is stored in a non-transitory storage medium, and the program product is executed by at least one processor to implement the various processes in the control method embodiment of the above application identification, and can To achieve the same technical effect, in order to avoid repetition, no more details are given here.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。It should be noted that, in this document, the term "comprising", "comprising" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or device. Without further limitations, an element defined by the phrase "comprising a ..." does not preclude the presence of additional identical elements in the process, method, article, or apparatus comprising that element. In addition, it should be pointed out that the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, and may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions are performed, for example, the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。 Through the description of the above embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is better implementation. Based on such an understanding, the technical solution of the present application can be embodied in the form of computer software products, which are stored in a storage medium (such as ROM/RAM, magnetic disk, etc.) , optical disc), including several instructions to enable a terminal (which may be a mobile phone, computer, server, or network device, etc.) to execute the methods described in various embodiments of the present application.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。 The embodiments of the present application have been described above in conjunction with the accompanying drawings, but the present application is not limited to the above-mentioned specific implementations. The above-mentioned specific implementations are only illustrative and not restrictive. Those of ordinary skill in the art will Under the inspiration of this application, without departing from the purpose of this application and the scope of protection of the claims, many forms can also be made, all of which belong to the protection of this application.

Claims (17)

  1. 一种应用标识的控制方法,其中,包括:A control method for application identification, including:
    接收对目标应用标识的第一输入;receiving a first input of a target application identification;
    响应于所述第一输入,控制所述目标应用标识移动至对应的目标位置,并控制处于所述目标位置的所述目标应用标识执行对应的目标操作;In response to the first input, controlling the target application identifier to move to a corresponding target position, and controlling the target application identifier at the target position to perform a corresponding target operation;
    其中,所述目标应用标识与所述目标位置之间具有第一关联关系,所述目标应用标识、所述目标位置以及所述目标操作之间具有第二关联关系。Wherein, the target application identifier and the target location have a first association relationship, and the target application identifier, the target location, and the target operation have a second association relationship.
  2. 根据权利要求1所述的方法,其中,所述控制处于所述目标位置的所述目标应用标识执行对应的目标操作,包括:The method according to claim 1, wherein the controlling the target application identifier at the target position to perform a corresponding target operation comprises:
    在所述目标应用标识包括至少两个应用标识、且所述至少两个应用标识均位于对应的目标位置的情况下,控制所述至少两个应用标识执行目标操作。In a case where the target application identifiers include at least two application identifiers, and the at least two application identifiers are located at corresponding target positions, the at least two application identifiers are controlled to perform the target operation.
  3. 根据权利要求1所述的方法,其中,所述第一关联关系的建立方式包括:The method according to claim 1, wherein the method for establishing the first association relationship comprises:
    接收第二输入;receiving a second input;
    响应于所述第二输入,从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系。In response to the second input, a target application identifier is selected from multiple application identifiers, a target location is selected from multiple desktop locations, and a first association relationship is established between the target application identifier and the target location.
  4. 根据权利要求3所述的方法,其中,所述从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系,包括:The method according to claim 3, wherein said selecting a target application identifier from a plurality of application identifiers, selecting a target location from a plurality of desktop locations, and establishing a first association between the target application identifier and the target location relationships, including:
    从多个桌面位置中选择目标位置;Select a target location from multiple desktop locations;
    接收对所述目标位置的第三输入;receiving a third input of the target location;
    响应于所述第三输入,显示第一选择界面,所述第一选择界面中包含多个应用标识;In response to the third input, displaying a first selection interface, the first selection interface includes a plurality of application identifiers;
    接收对所述第一选择界面的第一选择输入; receiving a first selection input on the first selection interface;
    响应于所述第一选择输入,从所述第一选择界面的多个应用标识中选择目标应用标识,建立所述目标应用标识与所述目标位置的第一关联关系。In response to the first selection input, a target application identifier is selected from multiple application identifiers on the first selection interface, and a first association relationship between the target application identifier and the target location is established.
  5. 根据权利要求3所述的方法,其中,所述第二关联关系的建立方式包括:The method according to claim 3, wherein the method of establishing the second association relationship comprises:
    接收第三输入;receiving a third input;
    响应于所述第三输入,从多个操作中选择目标操作;selecting a target operation from a plurality of operations in response to the third input;
    将所述目标应用标识、所述目标位置以及所述目标操作建立第二关联关系。A second association relationship is established between the target application identifier, the target location, and the target operation.
  6. 根据权利要求5所述的方法,其中,所述响应于所述第三输入,从多个操作中选择目标操作,包括:The method of claim 5, wherein said selecting a target operation from a plurality of operations in response to said third input comprises:
    响应于所述第三输入,显示第二选择界面,所述第二选择界面中包含多个操作标识;In response to the third input, displaying a second selection interface, the second selection interface includes a plurality of operation identifiers;
    接收对所述第二选择界面的第二选择输入;receiving a second selection input to the second selection interface;
    响应于所述第二选择输入,从所述第二选择界面的多个操作标识中选择目标操作标识,其中,每一个操作标识对应一个操作。In response to the second selection input, a target operation identifier is selected from a plurality of operation identifiers on the second selection interface, wherein each operation identifier corresponds to an operation.
  7. 一种应用标识的控制装置,其中,包括:A control device for application identification, including:
    第一接收模块,用于接收对目标应用标识的第一输入;A first receiving module, configured to receive a first input of a target application identifier;
    控制模块,用于响应于所述第一输入,控制所述目标应用标识移动至对应的目标位置,并控制处于所述目标位置的所述目标应用标识执行对应的目标操作;A control module, configured to, in response to the first input, control the target application identifier to move to a corresponding target position, and control the target application identifier at the target position to perform a corresponding target operation;
    其中,所述目标应用标识与所述目标位置之间具有第一关联关系,所述目标应用标识、所述目标位置以及所述目标操作之间具有第二关联关系。Wherein, the target application identifier and the target location have a first association relationship, and the target application identifier, the target location, and the target operation have a second association relationship.
  8. 根据权利要求7所述的装置,其中,所述控制模块在控制处于所述目标位置的所述目标应用标识执行对应的目标操作时,具体用于:The device according to claim 7, wherein, when the control module controls the target application identifier at the target position to perform a corresponding target operation, it is specifically configured to:
    在所述目标应用标识包括至少两个应用标识、且所述至少两个应用标识均位于对应的目标位置的情况下,控制所述至少两个应用标识执行目标操作。 In a case where the target application identifiers include at least two application identifiers, and the at least two application identifiers are located at corresponding target positions, the at least two application identifiers are controlled to perform the target operation.
  9. 根据权利要求7所述的装置,其中,所述第一关联关系的建立方式包括:The device according to claim 7, wherein the method for establishing the first association relationship comprises:
    接收第二输入;receiving a second input;
    响应于所述第二输入,从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系。In response to the second input, a target application identifier is selected from multiple application identifiers, a target location is selected from multiple desktop locations, and a first association relationship is established between the target application identifier and the target location.
  10. 根据权利要求9所述的装置,其中,所述从多个应用标识中选择目标应用标识,并从多个桌面位置中选择目标位置,将所述目标应用标识与所述目标位置建立第一关联关系,包括:The device according to claim 9, wherein said selecting a target application identifier from a plurality of application identifiers, selecting a target location from a plurality of desktop locations, and establishing a first association between the target application identifier and the target location relationships, including:
    从多个桌面位置中选择目标位置;Select a target location from multiple desktop locations;
    接收对所述目标位置的第三输入;receiving a third input of the target location;
    响应于所述第三输入,显示第一选择界面,所述第一选择界面中包含多个应用标识;In response to the third input, displaying a first selection interface, the first selection interface includes a plurality of application identifiers;
    接收对所述第一选择界面的第一选择输入;receiving a first selection input on the first selection interface;
    响应于所述第一选择输入,从所述第一选择界面的多个应用标识中选择目标应用标识,建立所述目标应用标识与所述目标位置的第一关联关系。In response to the first selection input, a target application identifier is selected from multiple application identifiers on the first selection interface, and a first association relationship between the target application identifier and the target location is established.
  11. 根据权利要求9所述的装置,其中,所述第二关联关系的建立方式包括:The device according to claim 9, wherein the method for establishing the second association relationship comprises:
    接收第三输入;receiving a third input;
    响应于所述第三输入,从多个操作中选择目标操作;selecting a target operation from a plurality of operations in response to the third input;
    将所述目标应用标识、所述目标位置以及所述目标操作建立第二关联关系。A second association relationship is established between the target application identifier, the target location, and the target operation.
  12. 根据权利要求11所述的装置,其中,所述响应于所述第三输入,从多个操作中选择目标操作,包括:The apparatus of claim 11, wherein said selecting a target operation from a plurality of operations in response to said third input comprises:
    响应于所述第三输入,显示第二选择界面,所述第二选择界面中包含多个操作标识;In response to the third input, displaying a second selection interface, the second selection interface includes a plurality of operation identifiers;
    接收对所述第二选择界面的第二选择输入; receiving a second selection input to the second selection interface;
    响应于所述第二选择输入,从所述第二选择界面的多个操作标识中选择目标操作标识,其中,每一个操作标识对应一个操作。In response to the second selection input, a target operation identifier is selected from a plurality of operation identifiers on the second selection interface, wherein each operation identifier corresponds to an operation.
  13. 一种电子设备,其中,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1-6任一项所述的应用标识的控制方法的步骤。An electronic device, including a processor, a memory, and a program or instruction stored in the memory and operable on the processor, when the program or instruction is executed by the processor, the invention according to claim 1 is realized - the steps of the control method for application identification described in any one of 6.
  14. 一种可读存储介质,其中,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-6任一项所述的应用标识的控制方法的步骤。A readable storage medium, wherein a program or an instruction is stored on the readable storage medium, and when the program or instruction is executed by a processor, the method for controlling the application identification according to any one of claims 1-6 is implemented step.
  15. 一种芯片,其中,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1-6任一项所述的方法。A chip, wherein the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used to run a program or an instruction to implement the method described in any one of claims 1-6. method.
  16. 一种计算机程序产品,其中,所述程序产品被存储在非瞬态存储介质中,所述程序产品被至少一个处理器执行以实现如权利要求1-6任一项所述的方法。A computer program product, wherein the program product is stored in a non-transitory storage medium, and the program product is executed by at least one processor to implement the method according to any one of claims 1-6.
  17. 一种应用标识的控制装置,其中,所述装置被配置成用于执行如权利要求1至6任一项所述的应用标识的控制方法。 An application identification control device, wherein the device is configured to execute the application identification control method according to any one of claims 1 to 6.
PCT/CN2023/078046 2022-02-28 2023-02-24 Application identifier control method and apparatus WO2023160640A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210192688.2 2022-02-28
CN202210192688.2A CN114546217A (en) 2022-02-28 2022-02-28 Application identifier control method and device

Publications (1)

Publication Number Publication Date
WO2023160640A1 true WO2023160640A1 (en) 2023-08-31

Family

ID=81661143

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/078046 WO2023160640A1 (en) 2022-02-28 2023-02-24 Application identifier control method and apparatus

Country Status (2)

Country Link
CN (1) CN114546217A (en)
WO (1) WO2023160640A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114546217A (en) * 2022-02-28 2022-05-27 维沃移动通信有限公司 Application identifier control method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016022634A1 (en) * 2014-08-05 2016-02-11 Alibaba Group Holding Limited Display and management of application icons
CN106775217A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 A kind of application identities processing method, device and terminal
CN110007822A (en) * 2019-03-29 2019-07-12 维沃移动通信有限公司 A kind of interface display method and terminal device
CN110515508A (en) * 2019-08-16 2019-11-29 维沃移动通信有限公司 A kind of icon control method, terminal device and computer readable storage medium
CN111562961A (en) * 2020-04-29 2020-08-21 维沃移动通信有限公司 Icon management method and device and electronic equipment
CN114546217A (en) * 2022-02-28 2022-05-27 维沃移动通信有限公司 Application identifier control method and device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903B (en) * 2013-04-12 2015-12-23 广东欧珀移动通信有限公司 A kind of mobile terminal concealing program disposal route and device
CN105335048B (en) * 2015-10-09 2020-12-18 惠州Tcl移动通信有限公司 Electronic equipment with hidden application icon and method for hiding application icon
CN105549810A (en) * 2015-10-28 2016-05-04 东莞酷派软件技术有限公司 Application icon processing method and device, and terminal
CN106126026B (en) * 2016-06-24 2020-08-14 宇龙计算机通信科技(深圳)有限公司 Application management method and device and terminal
CN106155489B (en) * 2016-07-29 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of locking means and device of desktop application
CN107765948A (en) * 2017-10-20 2018-03-06 珠海市魅族科技有限公司 Application control method, terminal, computer installation and storage medium
CN109284040B (en) * 2018-08-28 2020-08-11 珠海格力电器股份有限公司 Application management method, device and terminal and computer storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016022634A1 (en) * 2014-08-05 2016-02-11 Alibaba Group Holding Limited Display and management of application icons
CN106775217A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 A kind of application identities processing method, device and terminal
CN110007822A (en) * 2019-03-29 2019-07-12 维沃移动通信有限公司 A kind of interface display method and terminal device
CN110515508A (en) * 2019-08-16 2019-11-29 维沃移动通信有限公司 A kind of icon control method, terminal device and computer readable storage medium
CN111562961A (en) * 2020-04-29 2020-08-21 维沃移动通信有限公司 Icon management method and device and electronic equipment
CN114546217A (en) * 2022-02-28 2022-05-27 维沃移动通信有限公司 Application identifier control method and device

Also Published As

Publication number Publication date
CN114546217A (en) 2022-05-27

Similar Documents

Publication Publication Date Title
US9038166B2 (en) Method and apparatus for authenticating password of user terminal
US9064104B2 (en) Graphical authentication
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN106203061B (en) Encryption method of application program and mobile terminal
US9443072B2 (en) Methods and devices for granting access to and enabling passcode protection for a file
CN107180203B (en) Image encryption and decryption method, mobile terminal and computer readable storage medium
CN105868617B (en) Application program encryption method and mobile terminal
CN107959789B (en) Image processing method and mobile terminal
WO2023198064A1 (en) Application program starting method and apparatus, and electronic device and storage medium
WO2023160640A1 (en) Application identifier control method and apparatus
US20230385426A1 (en) Encryption Method and Apparatus, Electronic Device, and Medium
WO2024104157A1 (en) Application interface management method and apparatus, and electronic device and readable storage medium
WO2024083018A1 (en) Information processing method and apparatus, and electronic device
WO2023103901A1 (en) Application management method and apparatus, and electronic device
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
US9613201B1 (en) Access control by a mobile device using an image
US10678895B2 (en) Data input method, and electronic device and system for implementing the data input method
JP5910654B2 (en) Information processing apparatus, information processing apparatus control method, and program
CN106997261A (en) Using hidden method and device
CN107545164B (en) Password protection method and device
CN112579236A (en) Function button display method and device, computer equipment and storage medium
CN111090868A (en) Terminal screen display control method, terminal and computer readable storage medium
CN115390712A (en) Icon hiding method and device, electronic equipment and storage medium
CN114528530A (en) Application icon display method and device
CN115408676A (en) Unlocking method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23759262

Country of ref document: EP

Kind code of ref document: A1