CN107145797A - Display control method, device and the terminal device of application icon - Google Patents

Display control method, device and the terminal device of application icon Download PDF

Info

Publication number
CN107145797A
CN107145797A CN201710305166.8A CN201710305166A CN107145797A CN 107145797 A CN107145797 A CN 107145797A CN 201710305166 A CN201710305166 A CN 201710305166A CN 107145797 A CN107145797 A CN 107145797A
Authority
CN
China
Prior art keywords
application icon
secret
marked
display screen
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710305166.8A
Other languages
Chinese (zh)
Inventor
谷务成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710305166.8A priority Critical patent/CN107145797A/en
Publication of CN107145797A publication Critical patent/CN107145797A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure is directed to a kind of display control method of application icon, device and terminal device.The display control method of the application icon provided using the disclosure, the application icon for being marked as secret is managed by the first predetermined registration operation, when user's needs management is marked as the application icon of secret, the touch control operation matched with the first predetermined registration operation can be made, to realize that hiding or display is marked as the application icon of secret.Both the personal information of user had been protected, and has not influenceed user to use the application icon for being marked as secret.Improve Consumer's Experience.

Description

Display control method, device and the terminal device of application icon
Technical field
This disclosure relates to electronic technology field, more particularly to a kind of display control method of application icon, device and terminal Equipment.
Background technology
With the development of electronic technology, increasing terminal device is appeared in the work and life of people.Generally eventually Be stored with substantial amounts of personal information in end equipment, to prevent the personal information of people from revealing or being stolen, it is necessary to being stored in end Personal information in end equipment is maintained secrecy.
Therefore, the technical scheme that correlation technique is provided is:The secret photograph album in terminal device, to store private photos.So And, secret photograph album is only capable of to part personal information (for example:Private photos) protection is provided, the personal information of people can not be entered Row protection comprehensively.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of display control method of application icon, device And terminal device.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of display control method of application icon, applied to The terminal device of display screen, methods described includes:
Detect that user is directed to the first touch control operation of the display screen;
Determine that first touch control operation is matched with the first predetermined registration operation, first predetermined registration operation is labeled for switching For the desktop state of the application icon of secret;
It is determined that when the desktop state of the application icon for being marked as secret is dispaly state, hiding described be marked as The application icon of secret;
It is determined that when the desktop state of the application icon for being marked as secret is hidden state, institute is shown on a display screen State the application icon for being marked as secret.
Alternatively, methods described also includes:
Detection user is for the second touch control operation of the application icon shown on the display screen, the second touch-control behaviour Act on the secret application file folder that the application icon shown is moved on display screen;
The application icon that will be moved into the secret application file folder is labeled as the application icon of secret.
Alternatively, methods described also includes:
It is determined that when the desktop state for being marked as the application icon of secret is dispaly state, the private is shown on a display screen Close application file folder;
It is determined that when the desktop state for being marked as the application icon of secret is hidden state, the private is hidden on a display screen Close application file folder.
Alternatively, methods described also includes:
Detect that user is directed to the 3rd touch control operation of default menu, the 3rd touch control operation is shown for triggering display screen Each application icon that the default menu includes;
When determining that the specified application icon that user is directed in the default menu opens function of keeping secret, described open is maintained secrecy The specified application icon of function is labeled as the application icon of secret.
Alternatively, the application drawing of the mounted all applications of the terminal device is included during the default menu initialization Mark, methods described also includes:
It is determined that when the desktop state of the application icon for being marked as secret is dispaly state, institute is shown on a display screen The application icon that secret is marked as described in when stating default menu is shown;
It is determined that when the desktop state of the application icon for being marked as secret is hidden state, institute is shown on a display screen The application icon that secret is marked as described in when stating default menu is hidden.
Alternatively, methods described also includes:
When being turned back on after terminal device shutdown, or when the display screen is switched to bright screen by putting out screen, acquiescence The desktop state that the application icon of secret is marked as described in setting is hidden state.
Alternatively, first touch control operation is default gesture touch action.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of display control unit of application icon, applied to The terminal device of display screen, including:
First detection module, is configured as detecting the first touch control operation that user is directed to the display screen;
First determining module, is configured to determine that first touch control operation is matched with the first predetermined registration operation, described first Predetermined registration operation is used for the desktop state for switching the application icon for being marked as secret;
First hidden module, it is display shape to be configured to determine that the desktop state of the application icon for being marked as secret During state, the application icon for being marked as secret is hidden;
First display module, the desktop state for being configured to determine that the application icon for being marked as secret is to hide shape During state, the application icon of secret is marked as described in display on a display screen.
Alternatively, described device also includes:
Second detection module, is configured as detecting that user is directed to the second of the application icon shown on the display screen and touched Control operation, second touch control operation is used for the secret application file that the application icon shown is moved on display screen Folder;
First mark module, the application icon for being configured as will be moved into the secret application file folder is labeled as secret Application icon.
Alternatively, described device also includes:
Second display module, the desktop state for being configured to determine that the application icon for being marked as secret is dispaly state When, the secret application file folder is shown on a display screen;
Second hidden module, the desktop state for being configured to determine that the application icon for being marked as secret is hidden state When, the secret application file folder is hidden on a display screen.
Alternatively, described device also includes:
3rd detection module, is configured as detecting the 3rd touch control operation that user is directed to default menu, the 3rd touch-control Operate and show each application icon that the default menu includes for triggering display screen;
Second mark module, is configured to determine that the specified application icon that user is directed in the default menu opens secrecy During function, the specified application icon of the unlatching function of keeping secret is labeled as to the application icon of secret.
Alternatively, the application drawing of the mounted all applications of the terminal device is included during the default menu initialization Mark, described device also includes:
3rd display module, it is display shape to be configured to determine that the desktop state of the application icon for being marked as secret During state, show that the application icon that secret is marked as described in during the default menu is shown on a display screen;
3rd hidden module, the desktop state for being configured to determine that the application icon for being marked as secret is to hide shape During state, show that the application icon that secret is marked as described in during the default menu is hidden on a display screen.
Alternatively, described device also includes:
Setup module, is configured as when being turned back on after the terminal device shuts down, or in the display screen by putting out screen The desktop state that the application icon of secret is marked as when being switched to bright screen, described in default setting is hidden state.
Alternatively, first touch control operation is default gesture touch action.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of non-transitorycomputer readable storage medium, when described Instruction in storage medium by the computing device of the terminal device with display screen when so that mobile terminal is able to carry out one kind The display control method of application icon, methods described includes:
Detect that user is directed to the first touch control operation of the display screen;
Determine that first touch control operation is matched with the first predetermined registration operation, first predetermined registration operation is labeled for switching For the desktop state of the application icon of secret;
It is determined that when the desktop state of the application icon for being marked as secret is dispaly state, hiding described be marked as The application icon of secret;
It is determined that when the desktop state of the application icon for being marked as secret is hidden state, institute is shown on a display screen State the application icon for being marked as secret.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The disclosure provides a kind of display control method of application icon, proposes to be marked as by the management of the first predetermined registration operation The application icon of secret, when user's needs management is marked as the application icon of secret, can make and the first predetermined registration operation The touch control operation matched somebody with somebody, to realize that hiding or display is marked as the application icon of secret.Both the personal information of user had been protected, again User is not influenceed to use the application icon for being marked as secret.Improve Consumer's Experience.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of flow chart of the display control method of application icon according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of method that application icon is marked according to an exemplary embodiment.
Fig. 3 is a kind of schematic diagram that application icon is marked according to an exemplary embodiment.
Fig. 4 is a kind of flow of another method that application icon is marked according to an exemplary embodiment Figure.
Fig. 5 is a kind of another schematic diagram that application icon is marked according to an exemplary embodiment.
Fig. 6 is a kind of another flow chart of the display control method of application icon according to an exemplary embodiment.
Fig. 7 is a kind of block diagram of the display control unit of application icon according to an exemplary embodiment.
Fig. 8 is a kind of another block diagram of the display control unit of application icon according to an exemplary embodiment.
Fig. 9 is a kind of another block diagram of the display control unit of application icon according to an exemplary embodiment.
Figure 10 is a kind of another block diagram of the display control unit of application icon according to an exemplary embodiment.
Figure 11 is a kind of another block diagram of the display control unit of application icon according to an exemplary embodiment.
Figure 12 is a kind of another block diagram of the display control unit of application icon according to an exemplary embodiment.
Figure 13 is a kind of block diagram of terminal device according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
In the introduction it is stated that by secret photograph album, can enter to the private photos being stored in terminal device Row protection.However, stronger and stronger with the function of terminal device, terminal device can run various applications.For just In user using each application installed on the terminal device, the display screen of terminal device will each apply corresponding application icon On a user interface, user can quickly start corresponding application by the operation to one of application icon for display.
The present disclosure contemplates that each application icon in user interface embodies people which installs and used apply, People may not want that allowing other people to see on the terminal device of oneself is mounted with some applications for being related to privacy, or, borrowed at other people Under scene with the terminal device of oneself, do not want to allow other people to use some applications for being related to privacy on the terminal device of oneself. Therefore, each application icon in user interface falls within the personal information of people, it is necessary to maintain secrecy.
Therefore, the disclosure provides a kind of display control method of application icon, the display application provided correlation technique Figure calibration method is improved, and proposes to manage the application icon for being marked as secret by the first predetermined registration operation, user needs pipe Reason can make touch control operation match with the first predetermined registration operation when being marked as the application icon of secret, with realize it is hiding or Display is marked as the application icon of secret.Both the personal information of user had been protected, and has not influenceed user using being marked as private Close application icon.The display control method of the application icon provided below the disclosure is illustrated.
The display control method for the application icon that the disclosure is provided, is not limited to use in the application institute installed in terminal device The display control of corresponding application icon, can be used for the display control to other icons, for example:Corresponding to prompt operation Shortcut icon.The display control method for the application icon that the disclosure is provided is applied to the terminal device with display screen.Wherein, show Display screen can be touching display screen, and terminal device can be smart mobile phone, tablet personal computer, intelligent watch etc..
Fig. 1 is a kind of flow chart of the display control method of application icon according to an exemplary embodiment, such as Fig. 1 Shown, the display control method for the application icon that the disclosure is provided comprises the following steps.
In step s 11, detection user is directed to the first touch control operation of the display screen.
In step s 12, determine that first touch control operation is matched with the first predetermined registration operation, first predetermined registration operation is used The desktop state of the application icon of secret is marked as in switching.
In step s 13, it is determined that when the desktop state of the application icon for being marked as secret is dispaly state, hiding The application icon for being marked as secret.
In step S14, it is determined that when the desktop state of the application icon for being marked as secret is hidden state, aobvious Show the application icon that secret is marked as described in screen display.
The disclosure proposes application icon being divided into two classes:It is marked as the application icon of secret and is not labeled as secret Application icon.A certain or some application icons can be labeled as secret by user according to privacy requirements.Alternatively, in acquiescence In the case of, display screen shows the application icon for being not labeled as secret, and hides the application icon for being marked as secret.
The disclosure proposes the desktop state of application icon, to characterize whether application icon is shown in use shown by display screen On the interface of family.Under normal circumstances, the desktop state for being not labeled as the application icon of secret is:Dispaly state, i.e., be not labeled It is shown in for the application icon of secret in the user interface shown by display screen.It is marked as the desktop shape of the application icon of secret State includes:Dispaly state and hidden state.One be marked as secret application icon desktop state be dispaly state when, should It is marked as the application icon of secret to be shown in the user interface shown by display screen, user can click on this and be marked as private Close application icon, corresponding application is started with quick;One desktop state of application icon for being marked as secret is hiding During state, this is marked as the application icon of secret and is not shown in the user interface shown by display screen, user and he per capita The application icon for being marked as secret can not be found from the user interface shown by display screen, to protect the private of user to believe Breath.
The disclosure proposes that passing through the first predetermined registration operation manages the application icon for being marked as secret, and the first predetermined registration operation is used for Switching is marked as the desktop state of the application icon of secret.First predetermined registration operation is the operation pre-set, can be user It is voluntarily setting in advance or terminal device Default Value.Illustratively, sliding trace is grasped for touch-control away from each other It is set to the first predetermined registration operation.
In view of when it is hidden state to be marked as the desktop state of application icon of secret, user may still need to make With the application icon for being marked as secret, secret is marked as quickly to start corresponding application, thus need display screen to show Application icon.Similarly, it is private for protection when it is dispaly state to be marked as the desktop state of application icon of secret The consideration of information, user needs display screen to hide the application icon for being marked as secret.Therefore, user can be detected for display The touch control operation (being hereafter designated as the first touch control operation) of screen, and it is compared with predetermined registration operation (being hereafter designated as the first predetermined registration operation) Compared with to determine a need for the desktop state for switching the application icon for being marked as secret.Alternatively, the first touch control operation is pre- If gesture touch action.For example:Sliding trace is touch control operation away from each other.
If both the first touch control operation and first predetermined registration operation are matched, illustrate that user wants switching and is marked as secret Application icon desktop state, in the case, if it is determined that the desktop state for going out to be marked as the application icon of secret is Dispaly state, then switch to hidden state;If it is determined that the desktop state for being marked as the application icon of secret is to hide shape State, then switch to dispaly state.
Illustratively, it is mounted with to apply A on the smart mobile phone of user, user will apply the corresponding icons of A to protect privacy A is labeled as secret, and sliding trace is set into above-mentioned first predetermined registration operation for touch control operation away from each other.
Display screen the hidden icons A, icon A of smart mobile phone desktop state are hidden state under default situations, i.e., will not Icon A is shown on a user interface, to prevent other people from starting the application A on the smart mobile phone of user by icon A.
If user, which needs to use, applies A, it is touch-control behaviour away from each other that sliding trace can be made on a display screen Make, to switch icon A desktop state, icon A is switched to display by triggering display screen by hiding, display screen display icon A it Afterwards, user can be started by icon A applies A.
After user starts application A, icon A desktop state remains dispaly state, if user needs display screen hidden Icon A is hidden, then it is touch control operation away from each other to make sliding trace again on a display screen, to switch icon A desktop shape State, triggering display screen icon A is switched into hiding, display screen hidden icons A by showing, hereafter, user and other people all can't see Icon A.
The display control method of the application icon provided using the disclosure, user can be controlled by performing predetermined registration operation Display screen is hidden or shows specific application icon, has both protected the personal information of user, and it is specific not influence user to use Application icon.Improve Consumer's Experience.
Alternatively, the disclosure also proposes two kinds of methods that application icon is marked.In specific implementation process, correspondence The method being marked with icon includes but is not limited to two kinds of disclosure proposition.Two kinds proposed below to the disclosure are to application The method that icon is marked is illustrated.
Fig. 2 is a kind of flow chart of method that application icon is marked according to an exemplary embodiment, such as Shown in Fig. 2, what the disclosure was provided comprises the following steps to the method that application icon is marked.
In the step s 21, detection user is for the second touch control operation of the application icon shown on the display screen, institute The secret application file that stating the second touch control operation is used to the application icon shown being moved on display screen is pressed from both sides.
In step S22, the application icon that will be moved into the secret application file folder is labeled as the application drawing of secret Mark.
In the case where being not detected by the touch control operation matched with the first predetermined registration operation, the application drawing shown on display screen Mark is not labeled (as it was noted above, the application icon for being marked as secret has been hidden).For not labeled application Icon, user may be marked.Accordingly, it would be desirable to detect user for the touch-control of the application icon shown on display screen Operation, if detecting touch control operation of the user for a certain application icon shown on display screen, illustrates that user may The application icon can be handled, for example:Unload, share.The disclosure propose detect user on display screen certain The touch control operation of one application icon shown, if the touch control operation is for by a certain application drawing shown on display screen Mark is dragged in the confidential folder, i.e., the touch control operation is the second touch control operation, then can be by the application icon labeled as private It is close.
Illustratively, as shown in figure 3, the application icon shown on display screen includes:Application icon 1, application icon 2 and should With icon 3.User's long-press application icon 1 is detected, then display screen shows confidential folder 4, while showing the He of dustbin icon 5 Share icon 6, to adapt to the demand that user may be marked, unload and share to friendship application icon 1 respectively.Should in user After being dragged to icon 1 in confidential folder 4, application icon 1 is marked as secret.
Alternatively, in order to further improve the disguise of the application icon for being marked as secret, the application that the disclosure is provided The display control method of icon is further comprising the steps of:
It is determined that when the desktop state for being marked as the application icon of secret is dispaly state, the private is shown on a display screen Close application file folder;
It is determined that when the desktop state for being marked as the application icon of secret is hidden state, the private is hidden on a display screen Close application file folder.
Specifically, for being marked as the application icon of secret, if its desktop state is dispaly state, secret application File is displayed that on a display screen, is marked as in this case, it is possible to realize and be converted to not labeled application icon The application icon of secret, because now secret application file folder displays that on a display screen user can will show screen display Not labeled application icon drag in secret application file folder so that labeled application icon is not marked as private It is close.
Application icon for being marked as secret, if its desktop state is hidden state, secret application file folder It is not shown on display screen, in the case, can not find in the user interface shown by display screen and be marked as answering for secret With icon, it is also not possible to find the application icon for being marked as secret from secret application file folder.That is, now being marked The application icon for being designated as secret is in completely hiding state, improves the disguise for the application icon for being marked as secret.
Fig. 4 is a kind of flow of another method that application icon is marked according to an exemplary embodiment Figure, as shown in figure 4, the disclosure provide the another method that application icon is marked is comprised the following steps.
In step S41, detection user is directed to the 3rd touch control operation of default menu, and the 3rd touch control operation is used to touch Hair display screen shows each application icon that the default menu includes.
, will when determining that the specified application icon that user is directed in the default menu opens function of keeping secret in step S42 The specified application icon for opening function of keeping secret is labeled as the application icon of secret.
During user's using terminal equipment, personal settings can be carried out to terminal device by default menu, With convenient use, default menu can be the installation list of application of terminal device.Therefore, the disclosure proposes detecting user During touch control operation for presetting menu, display screen, which show, presets each application icon for including of menu, for example:Terminal device Each application icon that list of application includes is installed, the list of application of installation of terminal device is listed to be set installed in terminal Standby each upper application icon.Each application icon user can choose whether to open secrecy, the application drawing of secrecy will be opened Mark is labeled as secret.
Illustratively, as shown in figure 5, detecting user clicks on the installation for setting icon, then display screen display terminal List of application, including 3 application icons:Application icon a, application icon b and application icon c.Having after each application icon is The no option for opening secrecy, detects user and opens secrecy for application icon a selections, then application icon a is labeled as into secret.
Alternatively, in order to further improve the disguise of the application icon for being marked as secret, the application that the disclosure is provided In the display control method of icon, answering including the terminal device mounted all applications during the default menu initialization With icon, methods described also includes:
It is determined that when the desktop state of the application icon for being marked as secret is dispaly state, institute is shown on a display screen The application icon that secret is marked as described in when stating default menu is shown;
It is determined that when the desktop state of the application icon for being marked as secret is hidden state, institute is shown on a display screen The application icon that secret is marked as described in when stating default menu is hidden.
Specifically, include the application icon of the mounted all applications of terminal device when presetting menu initialization, initialize Before referring to that any application icon not included to presetting menu is marked, according to all applications installed on terminal device, The set of the application icon of generation., can be by wherein a certain or some applications after the initialization procedure of default menu is completed Iconic marker is the application icon of secret.Application icon for being marked as secret, if its desktop state is dispaly state, The application icon for being marked as secret is displayed that on a display screen when then display screen shows default menu, in the case, used Family is known which application icon is marked as the application icon of secret, while can also realize not labeled application drawing Mark is converted to the application icon for being marked as secret, because now presetting menu also includes not labeled application icon, user Function of keeping secret can be opened so that labeled application icon is not marked as secret.
Application icon for being marked as secret, if its desktop state is hidden state, display screen shows default The application icon for being marked as secret is hidden during menu, that is, the default menu that display screen is shown only includes being not labeled as private Close application icon, in the case, can not find the application drawing for being marked as secret in the user interface shown by display screen Mark, it is also not possible to the application icon for being marked as secret is found from the default menu shown by display screen.That is, now The application icon for being marked as secret is in completely hiding state, improves the hidden of the application icon that is marked as secret Property.
Using both the above method, user can be according to the privacy requirements of oneself, to some or the progress of some application icons Mark, so that display screen hides the application icon for being marked as secret in default situations.Improve Consumer's Experience.
Alternatively, Fig. 6 is a kind of the another of the display control method of application icon according to an exemplary embodiment Flow chart, as shown in fig. 6, the display control method for the application icon that the disclosure is provided, which is removed, includes above-mentioned steps S11 to step S13 Outside, it is further comprising the steps of.
In step slo, when being turned back on after terminal device shutdown, or it is switched to by putting out screen in the display screen The desktop state that the application icon of secret is marked as during bright screen, described in default setting is hidden state.
As it was noted above, under default situations, display screen hides the application icon for being marked as secret.A kind of possible implementation Mode is:When being turned back on after terminal device shutdown, display screen hides the application icon for being marked as secret.It is alternatively possible Embodiment be:After display screen puts out screen, display screen hides the application icon for being marked as secret, no matter in display screen bright screen That the application icon that period is marked as secret is shown or hiding.Also a kind of possible embodiment is:In display When screen is switched to bright screen by putting out screen, display screen hides the application icon for being marked as secret.
Using the display control method of use above icon, the application icon that secret can be remained marked as far as possible is hidden Hide, and then protect the personal information of user to the full extent, prevent other people from knowing which application of user installation, be also prevented from other people Use some applications installed on the terminal device of user.
Fig. 7 is a kind of block diagram of the display control unit of application icon according to an exemplary embodiment.Reference picture 7, the device 100 includes first detection module 121, the first determining module 122, the first hidden module 123 and the first display module 124。
First detection module 121 is configured as:Detect that user is directed to the first touch control operation of the display screen;
First determining module 122 is configured as:Determine that first touch control operation is matched with the first predetermined registration operation, described One predetermined registration operation is used for the desktop state for switching the application icon for being marked as secret;
First hidden module 123, the desktop state for being configured to determine that the application icon for being marked as secret is aobvious When showing state, the application icon for being marked as secret is hidden;
First display module 124, the desktop state for being configured to determine that the application icon for being marked as secret is hidden During the state of Tibetan, the application icon of secret is marked as described in display on a display screen.
Alternatively, Fig. 8 is a kind of the another of the display control unit of application icon according to an exemplary embodiment Block diagram.Reference picture 8, the device 100, which is removed, includes first detection module 121, the first determining module 122, the He of the first hidden module 123 Outside first display module 124, in addition to:Second detection module 125 and the first mark module 126.
Second detection module 125 is configured as:Detection user for the application icon that has shown on the display screen the Two touch control operations, second touch control operation is used for the secret application that the application icon shown is moved on display screen File;
First mark module 126 is configured as:The application icon that will be moved into the secret application file folder is labeled as The application icon of secret.
Alternatively, Fig. 9 is a kind of the another of the display control unit of application icon according to an exemplary embodiment Block diagram.Reference picture 9, the device 100, which is removed, includes first detection module 121, the first determining module 122, the He of the first hidden module 123 Outside first display module 124, in addition to:Second hidden module 1232 and the second display module 1242.
Second display module 1242 is configured as:It is determined that it is display shape to be marked as the desktop state of the application icon of secret During state, the secret application file folder is shown on a display screen;
Second hidden module 1232 is configured as:It is determined that the desktop state for being marked as the application icon of secret is to hide shape During state, the secret application file folder is hidden on a display screen.Alternatively, Figure 10 is one according to an exemplary embodiment Plant another block diagram of the display control unit of application icon.Reference picture 10, the device 100, which is removed, includes first detection module 121, the Outside one determining module 122, the first hidden module 123 and the first display module 124, in addition to:3rd detection module 127 and Two mark modules 1262.
3rd detection module 127 is configured as:Detect that user is directed to the 3rd touch control operation of default menu, the described 3rd touches Control operation shows each application icon that the default menu includes for triggering display screen;
Second mark module 1262 is configured as:Determine that the specified application icon that user is directed in the default menu is opened During function of keeping secret, the specified application icon of the unlatching function of keeping secret is labeled as to the application icon of secret.
Alternatively, the application drawing of the mounted all applications of the terminal device is included during the default menu initialization Mark.Figure 11 is a kind of another block diagram of the display control unit of application icon according to an exemplary embodiment.Reference picture 11, the device 100, which is removed, includes first detection module 121, the first determining module 122, the first hidden module 123 and the first display mould Outside block 124, in addition to:3rd hidden module 1233 and the 3rd display module 1243.
3rd display module 1243 is configured as:It is determined that the desktop state of the application icon for being marked as secret is aobvious When showing state, show that the application icon that secret is marked as described in during the default menu is shown on a display screen;
3rd hidden module 1233 is configured as:It is determined that the desktop state of the application icon for being marked as secret is hidden During the state of Tibetan, show that the application icon that secret is marked as described in during the default menu is hidden on a display screen.
Alternatively, Figure 12 is a kind of the another of the display control unit of application icon according to an exemplary embodiment Block diagram.Reference picture 12, the device 100, which is removed, includes first detection module 121, the first determining module 122, the first hidden module 123 Outside the first display module 124, in addition to:Setup module 128.
Setup module 128 is configured as:When being turned back on after terminal device shutdown, or in the display screen by putting out When screen is switched to bright screen, the desktop state that the application icon of secret is marked as described in default setting is hidden state.
Alternatively, first touch control operation is default gesture touch action.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Figure 13 is a kind of block diagram of terminal device 800 according to an exemplary embodiment.For example, terminal device 800 Can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, Body-building equipment, personal digital assistant etc..
Reference picture 13, terminal device 800 can include following one or more assemblies:Processing assembly 802, memory 804, Electric power assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, And communication component 816.
The integrated operation of the usual control terminal equipment 800 of processing assembly 802, such as with display, call, data are led to Letter, the camera operation operation associated with record operation.Processing assembly 802 can include one or more processors 820 to hold Row instruction, with all or part of step for the display control method for completing above-mentioned application icon.In addition, processing assembly 802 can be with Including one or more modules, it is easy to the interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can be wrapped Multi-media module is included, to facilitate the interaction between multimedia groupware 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in terminal device 800.These data Example include the instruction of any application program or method for being used to operate on terminal device 800, contact data, telephone directory Data, message, picture, video etc..Memory 804 can by any kind of volatibility or non-volatile memory device or it Combination realize that such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable Except programmable read only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, soon Flash memory, disk or CD.
Electric power assembly 806 provides electric power for the various assemblies of terminal device 800.Electric power assembly 806 can include power supply pipe Reason system, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between the terminal device 800 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip The border of action, but also the detection duration related to the touch or slide and pressure.In certain embodiments, Multimedia groupware 808 includes a front camera and/or rear camera.When terminal device 800 is in operator scheme, such as clap When taking the photograph pattern or video mode, front camera and/or rear camera can receive the multi-medium data of outside.It is each preposition Camera and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when terminal device 800 is in operator scheme, when such as call model, logging mode and speech recognition mode, microphone It is configured as receiving external audio signal.The audio signal received can be further stored in memory 804 or via logical Letter component 816 is sent.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 is provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, the state for providing various aspects for terminal device 800 Assess.For example, sensor cluster 814 can detect opening/closed mode of terminal device 800, the relative positioning of component, example As described component be terminal device 800 display and keypad, sensor cluster 814 can also detect terminal device 800 or The position of 800 1 components of terminal device changes, the existence or non-existence that user contacts with terminal device 800, terminal device 800 The temperature change of orientation or acceleration/deceleration and terminal device 800.Sensor cluster 814 can include proximity transducer, be configured For the presence of object near being detected in not any physical contact.Sensor cluster 814 can also include optical sensor, Such as CMOS or ccd image sensor, for being used in imaging applications.In certain embodiments, the sensor cluster 814 may be used also With including acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal device 800 and other equipment. Terminal device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.Show at one In example property embodiment, communication component 816 receives broadcast singal or broadcast from external broadcasting management system via broadcast channel Relevant information.In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, short to promote Cheng Tongxin.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal device 800 can be by one or more application specific integrated circuits (ASIC), number Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, the display for performing above-mentioned application icon Control method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete above-mentioned application drawing by the processor 820 of terminal device 800 Target display control method.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Those skilled in the art will readily occur to other embodiment party of the disclosure after considering specification and putting into practice the disclosure Case.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or adaptability Change follows the general principle of the disclosure and including the undocumented common knowledge or usual skill in the art of the disclosure Art means.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following claim Point out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (16)

1. a kind of display control method of application icon, it is characterised in that applied to the terminal device with display screen, the side Method includes:
Detect that user is directed to the first touch control operation of the display screen;
Determine that first touch control operation is matched with the first predetermined registration operation, first predetermined registration operation is marked as private for switching The desktop state of close application icon;
It is determined that when the desktop state of the application icon for being marked as secret is dispaly state, hides and described be marked as secret Application icon;
It is determined that when the desktop state of the application icon for being marked as secret is hidden state, the quilt is shown on a display screen Labeled as the application icon of secret.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
Detection user uses for the second touch control operation of the application icon shown on the display screen, second touch control operation In the secret application file folder being moved to the application icon shown on display screen;
The application icon that will be moved into the secret application file folder is labeled as the application icon of secret.
3. method according to claim 2, it is characterised in that methods described also includes:
It is determined that when the desktop state for being marked as the application icon of secret is dispaly state, showing that the secret should on a display screen Use file;
It is determined that when the desktop state for being marked as the application icon of secret is hidden state, the secret is hidden on a display screen should Use file.
4. according to the method described in claim 1, it is characterised in that methods described also includes:
Detect that user is directed to the 3rd touch control operation of default menu, the 3rd touch control operation shows described for triggering display screen Each application icon that default menu includes;
When determining that the specified application icon that user is directed in the default menu opens function of keeping secret, by the unlatching function of keeping secret Specified application icon be labeled as secret application icon.
5. method according to claim 4, it is characterised in that include the terminal device during the default menu initialization The application icon of mounted all applications, methods described also includes:
It is determined that when the desktop state of the application icon for being marked as secret is dispaly state, showing described pre- on a display screen If the application icon that secret is marked as described in during menu is shown;
It is determined that when the desktop state of the application icon for being marked as secret is hidden state, showing described pre- on a display screen If the application icon that secret is marked as described in during menu is hidden.
6. according to the method described in claim 1, it is characterised in that methods described also includes:
When being turned back on after terminal device shutdown, or when the display screen is switched to bright screen by putting out screen, default setting The desktop state of the application icon for being marked as secret is hidden state.
7. according to the method described in claim 1, it is characterised in that first touch control operation is that the touch of default gesture is dynamic Make.
8. a kind of display control unit of application icon, it is characterised in that applied to the terminal device with display screen, including:
First detection module, is configured as detecting the first touch control operation that user is directed to the display screen;
First determining module, is configured to determine that first touch control operation is matched with the first predetermined registration operation, and described first presets Operate the desktop state for switching the application icon for being marked as secret;
First hidden module, the desktop state for being configured to determine that the application icon for being marked as secret is dispaly state When, hide the application icon for being marked as secret;
First display module, the desktop state for being configured to determine that the application icon for being marked as secret is hidden state When, the application icon of secret is marked as described in display on a display screen.
9. device according to claim 8, it is characterised in that described device also includes:
Second detection module, is configured as detecting user for the second touch-control behaviour of the application icon shown on the display screen Make, the secret application file that second touch control operation is used to the application icon shown being moved on display screen is pressed from both sides;
First mark module, is configured as will be moved into application icon the answering labeled as secret in the secret application file folder Use icon.
10. device according to claim 9, it is characterised in that described device also includes:
Second display module, when the desktop state for being configured to determine that the application icon for being marked as secret is dispaly state, Show secret application file folder described in screen display;
Second hidden module, when the desktop state for being configured to determine that the application icon for being marked as secret is hidden state, The secret application file folder is hidden on display screen.
11. device according to claim 8, it is characterised in that described device also includes:
3rd detection module, is configured as detecting the 3rd touch control operation that user is directed to default menu, the 3rd touch control operation Each application icon that the default menu includes is shown for triggering display screen;
Second mark module, is configured to determine that the specified application icon that user is directed in the default menu opens function of keeping secret When, the specified application icon of the unlatching function of keeping secret is labeled as to the application icon of secret.
12. device according to claim 11, it is characterised in that set during the default menu initialization including the terminal The application icon of standby mounted all applications, described device also includes:
3rd display module, the desktop state for being configured to determine that the application icon for being marked as secret is dispaly state When, show that the application icon that secret is marked as described in during the default menu is shown on a display screen;
3rd hidden module, the desktop state for being configured to determine that the application icon for being marked as secret is hidden state When, show that the application icon that secret is marked as described in during the default menu is hidden on a display screen.
13. device according to claim 8, it is characterised in that described device also includes:
Setup module, is configured as when being turned back on after the terminal device shuts down, or in the display screen by putting out screen switching During to bright screen, the desktop state that the application icon of secret is marked as described in default setting is hidden state.
14. device according to claim 8, it is characterised in that first touch control operation is that the touch of default gesture is dynamic Make.
15. a kind of terminal device, it is characterised in that including:
Display screen;
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Detect that user is directed to the first touch control operation of the display screen;
Determine that first touch control operation is matched with the first predetermined registration operation, first predetermined registration operation is marked as private for switching The desktop state of close application icon;
It is determined that when the desktop state of the application icon for being marked as secret is dispaly state, hides and described be marked as secret Application icon;
It is determined that when the desktop state of the application icon for being marked as secret is hidden state, the quilt is shown on a display screen Labeled as the application icon of secret.
16. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor The step of any one of claim 1-7 methods described is realized during execution.
CN201710305166.8A 2017-05-03 2017-05-03 Display control method, device and the terminal device of application icon Pending CN107145797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710305166.8A CN107145797A (en) 2017-05-03 2017-05-03 Display control method, device and the terminal device of application icon

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710305166.8A CN107145797A (en) 2017-05-03 2017-05-03 Display control method, device and the terminal device of application icon

Publications (1)

Publication Number Publication Date
CN107145797A true CN107145797A (en) 2017-09-08

Family

ID=59774447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710305166.8A Pending CN107145797A (en) 2017-05-03 2017-05-03 Display control method, device and the terminal device of application icon

Country Status (1)

Country Link
CN (1) CN107145797A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509247A (en) * 2018-04-08 2018-09-07 深圳先搜科技有限公司 A kind of extremely simple mode implementation method, system and terminal device
CN108595091A (en) * 2018-04-25 2018-09-28 Oppo广东移动通信有限公司 Screen control display methods, device and computer readable storage medium
CN110858155A (en) * 2018-08-24 2020-03-03 山东华软金盾软件股份有限公司 Automatic icon hiding system and method based on mobile device application
CN112631478A (en) * 2020-12-31 2021-04-09 深兰科技(上海)有限公司 Hidden application display method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN103401999A (en) * 2013-07-17 2013-11-20 上海斐讯数据通信技术有限公司 Rapid mode switching system of mobile terminal
CN104092821A (en) * 2014-07-01 2014-10-08 惠州Tcl移动通信有限公司 Icon hiding method and system of mobile terminal
CN105700884A (en) * 2016-01-14 2016-06-22 成都中科创达软件有限公司 Application icon hiding method and system, and intelligent terminal
CN106126044A (en) * 2016-07-04 2016-11-16 百度在线网络技术(北京)有限公司 Display/the hidden method of application icon and device for terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN103401999A (en) * 2013-07-17 2013-11-20 上海斐讯数据通信技术有限公司 Rapid mode switching system of mobile terminal
CN104092821A (en) * 2014-07-01 2014-10-08 惠州Tcl移动通信有限公司 Icon hiding method and system of mobile terminal
CN105700884A (en) * 2016-01-14 2016-06-22 成都中科创达软件有限公司 Application icon hiding method and system, and intelligent terminal
CN106126044A (en) * 2016-07-04 2016-11-16 百度在线网络技术(北京)有限公司 Display/the hidden method of application icon and device for terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509247A (en) * 2018-04-08 2018-09-07 深圳先搜科技有限公司 A kind of extremely simple mode implementation method, system and terminal device
CN108595091A (en) * 2018-04-25 2018-09-28 Oppo广东移动通信有限公司 Screen control display methods, device and computer readable storage medium
CN108595091B (en) * 2018-04-25 2021-02-02 Oppo广东移动通信有限公司 Screen control display method and device and computer readable storage medium
CN110858155A (en) * 2018-08-24 2020-03-03 山东华软金盾软件股份有限公司 Automatic icon hiding system and method based on mobile device application
CN110858155B (en) * 2018-08-24 2023-09-15 山东华软金盾软件股份有限公司 Automatic icon hiding system and method based on mobile device application
CN112631478A (en) * 2020-12-31 2021-04-09 深兰科技(上海)有限公司 Hidden application display method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
JP2017518598A (en) Authority management method, apparatus, program, and recording medium
CN105117101B (en) The display methods and device of application program
CN104991789A (en) Method and apparatus for starting application
CN105472303A (en) Privacy protection method and apparatus for video chatting
JP2017535895A (en) Mobile terminal control method and mobile terminal
CN104376273A (en) Data access control method and device
CN103914337B (en) Service calling method, device and terminal
CN107145797A (en) Display control method, device and the terminal device of application icon
CN106547663A (en) Button management method and device
CN107102772A (en) Touch control method and device
CN105487805A (en) Object operating method and device
CN105487857A (en) Method and apparatus for prompting image shooting part to be started
EP3447666A1 (en) Processing fingerprint information
CN107045604A (en) Information processing method and device
CN109154967A (en) The method and device of hiden application icon
CN106462835A (en) Calendar event creation method and device
CN105893854A (en) Encryption and decryption method and device
CN110263515B (en) Opening method of encrypted application and terminal equipment
CN107423378A (en) Image display method and device
CN106912090A (en) New information reminding method and equipment
CN105260221A (en) Application installation method and device
CN107197107A (en) Enabled instruction processing method and processing device
CN105677215A (en) Application control method and apparatus
CN105204712A (en) Method and device for displaying icons of folder
CN105760796B (en) Application security processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908