CN111382395B - Control method and device of application icons - Google Patents

Control method and device of application icons Download PDF

Info

Publication number
CN111382395B
CN111382395B CN201811639218.6A CN201811639218A CN111382395B CN 111382395 B CN111382395 B CN 111382395B CN 201811639218 A CN201811639218 A CN 201811639218A CN 111382395 B CN111382395 B CN 111382395B
Authority
CN
China
Prior art keywords
application icon
moving
application
detected
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811639218.6A
Other languages
Chinese (zh)
Other versions
CN111382395A (en
Inventor
胡现坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201811639218.6A priority Critical patent/CN111382395B/en
Publication of CN111382395A publication Critical patent/CN111382395A/en
Application granted granted Critical
Publication of CN111382395B publication Critical patent/CN111382395B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure relates to a control method and device of an application icon. The method comprises the following steps: detecting that a moving condition for moving a first application icon of an encrypted application is satisfied when a pressing operation for the first application icon is detected; when the moving condition is not detected, executing an unlocking instruction, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application; and when the moving condition is detected, executing a moving instruction, wherein the moving instruction is used for indicating the terminal to move the position of the first application icon. The technical scheme can distinguish whether the pressing operation is used for unlocking the encryption application or dragging the first application icon, and is simple to implement.

Description

Control method and device of application icons
Technical Field
The disclosure relates to the technical field of terminals, and in particular, to a method and an apparatus for controlling an application icon.
Background
Generally, a user installs a plurality of application programs in an intelligent terminal, and the use of the application programs can increase the experience effect of the user, but can also bring about the problem of access security; if the application on the intelligent terminal is easy to be checked or opened by others, the safety is poor; therefore, with the application of large-area screen fingerprint identification, a novel application encryption and unlocking scheme is developed, the application is encrypted by setting the application icon in a fingerprint acquisition area of the screen, the application icon can be pressed by one key when the application is opened, and the terminal can be unlocked to enter the application after the fingerprint identification for pressing the application icon passes.
Disclosure of Invention
The embodiment of the disclosure provides a control method and device of an application icon. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided a method for controlling an application icon, including:
detecting that a moving condition for moving a first application icon of an encrypted application is satisfied when a pressing operation for the first application icon is detected;
when the moving condition is not detected, executing an unlocking instruction, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application;
and when the moving condition is detected, executing a moving instruction, wherein the moving instruction is used for indicating the terminal to move the position of the first application icon.
In one embodiment, the method further comprises:
receiving a control instruction aiming at a mobile switch, wherein the control instruction is used for instructing to turn on or turn off the mobile switch;
responding to the control instruction, and opening or closing the mobile switch;
the detecting that a movement condition for moving the first application icon is satisfied includes:
detecting that a moving condition for moving the first application icon is satisfied when it is detected that a moving switch of the encryption application is turned on;
upon detecting that a movement switch of the encryption application is turned off, it is not detected that a movement condition for moving the first application icon is satisfied.
In one embodiment, the detecting that a movement condition for moving the first application icon is satisfied includes:
detecting a moving distance of the finger moving the first application icon within a preset time period;
when the moving distance is smaller than or equal to a first distance threshold value, the condition that the moving condition for moving the first application icon is met is not detected;
when the moving distance is larger than or equal to a second distance threshold value, the condition that the moving condition of the first application icon is moved is detected.
In one embodiment, the method further comprises:
collecting fingerprint information of a finger pressing the first application icon in the preset time period;
verifying the fingerprint information;
the executing the unlock instruction includes:
and when the fingerprint information passes the verification, the encryption application is opened, and when the fingerprint information does not pass the verification, the encryption application is kept closed.
In one embodiment, the method further comprises:
detecting a pressure value corresponding to the pressing operation;
detecting that the moving condition for moving the first application icon is met when the detected pressure values are all smaller than or equal to the preset pressure value within the preset time period;
the detecting a movement distance of the finger moving the first application icon within a preset time period includes:
and in the preset time period, when the detected pressure values are all larger than the preset pressure values, detecting the moving distance of the finger for moving the first application icon in the preset time period.
In one embodiment, the executing the move instruction comprises:
determining a first final position of the first application icon;
when the first final position is located in a fingerprint acquisition area, setting the first application icon at the first final position;
verifying fingerprint information of a finger pressing the first application icon when the first final position is not located in the fingerprint acquisition area;
when the verification is passed, setting the first application icon at the first final position and changing the encrypted application into an unencrypted application; and when the verification fails, setting the first application icon in the original position.
In one embodiment, the method further comprises:
determining a second final position of a second application icon of a non-encrypted application when a moving operation of the second application icon is detected;
verifying fingerprint information of a finger pressing the second application icon when the second final position is located in a fingerprint acquisition area; when the verification is passed, setting the second application icon at the second final position and changing the encrypted application into an unencrypted application; setting the second application icon in the original position when the verification is not passed;
when the second final position is not located in the fingerprint acquisition area, the second application icon is set at the second final position.
According to a second aspect of the embodiments of the present disclosure, there is provided a control apparatus for an application icon, including:
a first detection module configured to detect that a movement condition for moving a first application icon of an encrypted application is satisfied when a pressing operation for the first application icon is detected;
the first execution module is used for executing an unlocking instruction when the moving condition is not detected, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application;
and the second execution module is used for executing a moving instruction when the moving condition is detected, wherein the moving instruction is used for indicating the terminal to move the position of the first application icon.
In one embodiment, the apparatus further comprises:
the mobile switch comprises a receiving module, a judging module and a control module, wherein the receiving module is used for receiving a control instruction aiming at the mobile switch, and the control instruction is used for indicating to turn on or turn off the mobile switch;
the response module is used for responding to the control instruction and opening or closing the mobile switch;
the first detection module includes:
a first detection sub-module, configured to detect that a movement condition for moving the first application icon is satisfied when it is detected that a movement switch of the encrypted application is turned on; upon detecting that a movement switch of the encryption application is turned off, it is not detected that a movement condition for moving the first application icon is satisfied.
In one embodiment, the first detection module comprises:
the second detection submodule is used for detecting the moving distance of the finger for moving the first application icon in a preset time period; when the moving distance is smaller than or equal to a first distance threshold value, the condition that the moving condition for moving the first application icon is met is not detected; when the moving distance is larger than or equal to a second distance threshold value, the condition that the moving condition of the first application icon is moved is detected.
In one embodiment, the apparatus further comprises:
the acquisition module is used for acquiring fingerprint information of the finger pressing the first application icon in the preset time period;
the verification module is used for verifying the fingerprint information;
the first execution module includes:
and the execution sub-module is used for opening the encryption application when the fingerprint information passes verification and keeping closing the encryption application when the fingerprint information does not pass verification.
In one embodiment, the apparatus further comprises:
the second detection module is used for detecting a pressure value corresponding to the pressing operation;
the third detection module is used for detecting that the moving condition for moving the first application icon is met when the detected pressure values are all smaller than or equal to the preset pressure value in the preset time period;
and the second detection submodule is used for detecting the moving distance of the finger for moving the first application icon in the preset time period when the detected pressure values are all larger than the preset pressure values in the preset time period.
In one embodiment, the second execution module comprises:
a determining submodule for determining a first final position of the first application icon;
the first setting sub-module is used for setting the first application icon at the first final position when the first final position is located in a fingerprint acquisition area;
a verification sub-module for verifying fingerprint information of a finger pressing the first application icon when the first final position is not located in the fingerprint acquisition area;
the second setting sub-module is used for setting the first application icon at the first final position and changing the encrypted application into the non-encrypted application when the verification is passed; and when the verification fails, setting the first application icon in the original position.
In one embodiment, the apparatus further comprises:
a determining module, configured to determine a second final position of a second application icon of a non-encrypted application when a moving operation of the second application icon is detected;
the verification module is used for verifying the fingerprint information of the finger pressing the second application icon when the second final position is located in a fingerprint acquisition area;
the first setting module is used for setting the second application icon at the second final position and changing the encrypted application into the non-encrypted application when the verification is passed; setting the second application icon in the original position when the verification is not passed;
and the second setting module is used for setting the second application icon at the second final position when the second final position is not located in the fingerprint acquisition area.
According to a third aspect of the embodiments of the present disclosure, there is provided a control apparatus for an application icon, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the steps of the above method.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium storing computer instructions which, when executed by a processor, implement the steps in the above-mentioned method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: the present embodiment may set a movement condition for moving an application icon such that, when a pressing operation of a first application icon for an encrypted application is detected, it is detected that the movement condition for moving the first application icon is satisfied; when the moving condition that the first application icon is moved is not detected, executing an unlocking instruction, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application; when the condition that the movement condition for moving the first application icon is met is detected, executing a movement instruction, wherein the movement instruction is used for indicating a terminal to move the position of the first application icon; therefore, whether the pressing operation is used for unlocking the encryption application or dragging the first application icon can be distinguished, and the method is simple to implement.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart illustrating a control method of an application icon according to an exemplary embodiment.
Fig. 2 is a diagram illustrating displaying an application icon on a terminal screen according to an exemplary embodiment.
Fig. 3 is a flowchart illustrating a control method of an application icon according to an exemplary embodiment.
Fig. 4 is a flowchart illustrating a control method of an application icon according to an exemplary embodiment.
Fig. 5 is a block diagram illustrating a control apparatus for an application icon according to an exemplary embodiment.
Fig. 6 is a block diagram illustrating a control apparatus for an application icon according to an exemplary embodiment.
Fig. 7 is a block diagram illustrating a control apparatus for an application icon according to an exemplary embodiment.
Fig. 8 is a block diagram illustrating a control apparatus for an application icon according to an exemplary embodiment.
Fig. 9 is a block diagram illustrating a control apparatus for an application icon according to an exemplary embodiment.
Fig. 10 is a block diagram illustrating a second execution module 503 in the control apparatus for an application icon according to an exemplary embodiment.
Fig. 11 is a block diagram illustrating a control apparatus for an application icon according to an exemplary embodiment.
Fig. 12 is a block diagram illustrating a control apparatus for an application icon according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
At present, because the action of pressing the application icon by the user requires the terminal to execute two operations of fingerprint identification and application opening, and the fingerprint identification requires the terminal to acquire a fingerprint image, the retention time of the finger of the user is long, which conflicts with the operation of pressing the application icon for a long time to drag the application icon.
In order to solve the above problem, the present embodiment may set a movement condition for moving an application icon such that, when a pressing operation for a first application icon of an encrypted application is detected, it is detected that the movement condition for moving the first application icon is satisfied; when the moving condition that the first application icon is moved is not detected, executing an unlocking instruction, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application; when the condition that the movement condition for moving the first application icon is met is detected, executing a movement instruction, wherein the movement instruction is used for indicating a terminal to move the position of the first application icon; therefore, whether the pressing operation is used for unlocking the encryption application or dragging the first application icon can be distinguished, and the method is simple to implement.
Fig. 1 is a flowchart illustrating a control method of an application icon according to an exemplary embodiment, where the control method of an application icon is used in a terminal as illustrated in fig. 1, and includes the following steps 101 to 103:
in step 101, upon detecting a pressing operation for a first application icon of an encrypted application, it is detected that a movement condition for moving the first application icon is satisfied.
In step 102, when the condition that the movement condition for moving the first application icon is met is not detected, an unlocking instruction is executed, wherein the unlocking instruction is used for instructing a terminal fingerprint to unlock the encrypted application.
In step 103, when the condition of moving the first application icon is detected to be satisfied, a moving instruction is executed, where the moving instruction is used to instruct the terminal to move the position of the first application icon.
Here, a large-area screen fingerprint recognition module is disposed in the terminal, and the large-area screen fingerprint recognition module has a large-area fingerprint collection area on a screen of the terminal, and the terminal may set a first application icon of an encryption application that needs to be encrypted in the fingerprint collection area, for example, fig. 2 is a schematic diagram illustrating an application icon displayed on a screen of the terminal according to an exemplary embodiment. As shown in fig. 2, application icons A, B, C and D are displayed on the display interface 20 of the terminal, where application B and application D are encrypted applications, the application icons are located in the fingerprint collection area 201, application a and application C are unencrypted applications, the application icons may also be located in the fingerprint collection area 201 as shown in fig. 2, and certainly may not be located in the fingerprint collection area 201, which is not limited herein. Thus, when the user opens the encrypted application, such as application B, the user needs to press the first application icon, i.e. the application icon of application B, so that the terminal collects the user fingerprint in the fingerprint collection area 201 to unlock the encrypted application. When the user moves the first application icon of the encryption application, the user also needs to press the first application icon and drag the first application icon to move to the first final position.
Here, when the terminal detects a pressing operation of a first application icon for an encrypted application, in order to distinguish whether the user performs the pressing operation to unlock the encrypted application or move the first application icon, the terminal may set a movement condition that satisfies the movement of the first application icon, so that when the terminal detects the movement condition, it indicates that the first application icon needs to be moved, and at this time, the terminal executes a movement instruction to move the position of the first application icon. When the terminal does not detect the moving condition, the terminal indicates that the first application icon does not need to be moved, at the moment, the terminal executes an unlocking instruction, and the terminal can directly acquire the fingerprint information of the user and unlock the encryption application after the fingerprint information passes verification and enter the user interface of the encryption application because the encryption application is located in the fingerprint acquisition area on the terminal screen.
The present embodiment may set a movement condition for moving an application icon such that, when a pressing operation of a first application icon for an encrypted application is detected, it is detected that the movement condition for moving the first application icon is satisfied; when the moving condition that the first application icon is moved is not detected, executing an unlocking instruction, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application; when the condition that the movement condition for moving the first application icon is met is detected, executing a movement instruction, wherein the movement instruction is used for indicating a terminal to move the position of the first application icon; therefore, whether the pressing operation is used for unlocking the encryption application or dragging the first application icon can be distinguished, and the method is simple to implement.
In a possible embodiment, the control method may further include the following steps a1 and a2, and the step 101 may be implemented as the following steps A3 and a 4.
In step a1, a control command for a movement switch is received, the control command being used to instruct the movement switch to be turned on or off.
In step a2, the movement switch is turned on or off in response to the control command.
In step a3, upon detecting that the movement switch of the encryption application is turned on, it is detected that a movement condition for moving the first application icon is satisfied.
In step a4, upon detecting that the movement switch of the encryption application is turned off, it is not detected that the movement condition for moving the first application icon is satisfied.
Here, the terminal may be provided with a movement switch to distinguish a control region for unlocking the encrypted application from a first application icon for moving the encrypted application, the first application icon being movable when the movement switch is turned on, and at the same time, prohibiting unlocking of the encrypted application; when the move switch is turned off, the first application icon is prohibited from moving, but the encrypted application may be unlocked. Thus, the terminal meets the moving condition of moving the first application icon, namely that the moving switch is turned on.
Here, the mobile switch may be a control, the mobile switch may be hidden at the left or right boundary of the screen display area, for example, as shown in fig. 2, the hidden mobile switch is a black bar 202 at the boundary, when the user uses the mobile switch, the user may drag the black bar 202, so that the terminal displays the mobile switch, the mobile switch may be displayed as a switch key, the user may click the switch key to turn on or off the mobile switch, when the mobile switch is turned on, the switch key is turned on, and when the mobile switch is turned off, the switch key is turned dark; thus, the user can know whether the mobile switch is turned off or not by checking the brightness of the switch key. Or, the mobile switch may be a combined hard key, and the user presses the combined hard key to turn on or off the mobile switch at the same time, when the mobile switch is turned on, the terminal will display that the mobile switch is turned on the screen, and when the mobile switch is turned off, the terminal will display that the mobile switch is turned off on the screen; thus, the user can know whether the mobile switch is turned off or not by checking the brightness of the switch key.
Here, when the user wants to move the first application icon of the encrypted application, the user may click the switch key or press the combined hard key to turn on the mobile switch, so that the terminal receives a control instruction for the mobile switch, the control instruction is used to instruct to turn on the mobile switch, and then the terminal may turn on the mobile switch in response to the control instruction, so that when the terminal detects a pressing operation for the first application icon of the encrypted application, the terminal may detect that the mobile switch of the encrypted application is turned on, and at this time, the terminal detects that a moving condition for moving the first application icon is satisfied, and then the terminal may execute the mobile instruction.
Here, when a user wants to unlock the encrypted application, the user may click the switch key or press the combined hard key to turn off the mobile switch, so that the terminal receives a control instruction for the mobile switch, the control instruction is used to instruct to turn off the mobile switch, and then the terminal may turn off the mobile switch in response to the control instruction, so that when the terminal detects a pressing operation for a first application icon of the encrypted application, the terminal may detect that the mobile switch of the encrypted application is turned off, and at this time, the terminal does not detect that a moving condition for moving the first application icon is satisfied, and then executes an unlocking instruction.
In this embodiment, a mobile switch may be set, and the mobile switch is turned on as a mobile condition for satisfying the requirement of moving the first application icon, which is simple to implement.
In one possible embodiment, step 101 in the above control method may be implemented as the following steps B1 to B3.
In step B1, a movement distance of the finger moving the first application icon within a preset time period is detected.
In step B2, when the movement distance is equal to or less than a first distance threshold, the satisfaction of the movement condition for moving the first application icon is not detected.
In step B3, when the movement distance is greater than or equal to a second distance threshold, the satisfaction of the movement condition for moving the first application icon is detected.
Here, when the user unlocks the encryption application and presses the first application icon of the encryption application, the user drags the first application icon to move for a small distance in a short time; and when the first application icon is moved, the first application icon is dragged to move for a longer distance within the short time. Therefore, when the terminal detects a pressing operation on the first application icon of the encrypted application, the terminal can detect that the finger of the user who performs the pressing operation moves the moving distance of the first application icon within a preset time period, and the moving distance is used as a moving condition, when the moving distance is greater than or equal to a second distance threshold value, such as x pixel points, the moving condition for moving the first application icon is detected, and when the moving distance is less than or equal to a first distance threshold value, such as y pixel points, the moving condition for moving the first application icon is not detected.
Here, the preset time period is related to a drag time set in the terminal, and if the drag time set in the terminal is 500ms, that is, if an icon is dragged for 500ms, it is determined that the icon is moved, the preset time period may be 500 ms.
The embodiment can use the length of the moving distance of the finger for moving the first application icon in the preset time period when the pressing operation of the first application icon for the encrypted application is detected as the moving condition for moving the first application icon, and is simple to implement.
In a possible embodiment, the control method may further include the following steps B4 to B5, and the step 102 may be implemented as the following step B6.
In step B4, fingerprint information of the finger pressing the first application icon is collected during the preset time period.
In step B5, the fingerprint information is verified.
In step B6, the encryption application is opened when the fingerprint information is verified, and the encryption application is kept closed when the fingerprint information is not verified.
Here, in order to save the operation time of the terminal, the terminal may collect fingerprint information of a finger pressing the first application icon within the preset time period, verify the fingerprint information, compare the fingerprint information with fingerprint information for unlocking the encrypted application prestored in the terminal, if the similarity between the fingerprint information and the fingerprint information exceeds a preset threshold, for example, 90%, the fingerprint information is verified to pass, and if the similarity between the fingerprint information and the fingerprint information does not exceed the preset threshold, for example, 90%, the fingerprint information is not verified to pass.
Therefore, when the terminal detects that the moving distance of the finger moving the first application icon in the preset time period is smaller than or equal to the first distance threshold, when the unlocking instruction is executed, fingerprint information does not need to be collected and verified, the fingerprint information directly passes the verification result, when the fingerprint information passes the verification, the encryption application is opened, and when the fingerprint information does not pass the verification, the encryption application is kept closed, so that the time for unlocking the encryption application by the terminal is saved.
In this embodiment, fingerprint information of a finger pressing the first application icon may be collected within a preset time period, and the fingerprint information may be verified; therefore, when the terminal executes the unlocking instruction, fingerprint information does not need to be collected and verified, and the terminal can be unlocked directly through the verification result, so that the time for unlocking the encrypted application by the terminal is saved.
In a possible embodiment, the control method may further include the following steps B7 to B8, and the step B1 may be implemented as the following step B11.
In step B7, a pressure value corresponding to the pressing operation is detected.
In step B8, when the detected pressure values are all less than or equal to the preset pressure value within the preset time period, it is detected that the moving condition for moving the first application icon is satisfied.
In step B9, when the detected pressure values are all greater than the preset pressure value within the preset time period, detecting a movement distance of the finger moving the first application icon within the preset time period.
Here, the terminal may further use a pressure value corresponding to the pressing operation as a preset condition, and when the user unlocks the encrypted application, the pressure for pressing the first application icon of the encrypted application may gradually increase and tend to be stable; and when moving the first application icon, the pressure will be smaller. Therefore, when the terminal detects the pressing operation of the first application icon of the encrypted application, the terminal can detect the pressure value corresponding to the pressing operation, if the detected pressure values are all smaller than or equal to the preset pressure value, such as 150g, in the preset time period, it indicates that the user is dragging the first application icon, and at this time, the terminal detects that the moving condition for moving the first application icon is met, executes the moving instruction, and moves the first application icon.
Here, since the user is not facilitated by only pressure differentiation, if the pressure values detected by the terminal are all greater than the preset pressure value within the preset time period, the movement distance of the finger moving the first application icon within the preset time period may also be detected, and when the movement distance is less than or equal to a first distance threshold value, the movement condition for moving the first application icon is not detected; when the moving distance is larger than or equal to a second distance threshold value, the condition that the moving condition of the first application icon is moved is detected.
The embodiment can also increase the pressure value to judge whether the moving condition is met, and the distinguishing is more accurate.
In a possible implementation manner, the execution movement instruction of step 103 in the above control method can also be implemented as the following steps C1 to C4.
In step C1, a first final position of the first application icon is determined.
In step C2, the first application icon is set in the first final position when the first final position is located in the fingerprint acquisition area.
In step C3, fingerprint information of the finger pressing the first application icon is verified when the first final position is not located in the fingerprint acquisition area.
In step C4, upon passing of the verification, setting the first application icon at the first final position; and when the verification fails, setting the first application icon in the original position.
Here, as shown in fig. 2, if the application B is an encrypted application, and assuming that the user moves the application B icon of the application B, the terminal detects a pressing operation for the application B icon, and detects that a moving condition for moving the first application icon is satisfied, at this time, the terminal may execute a moving instruction to move the application B icon, at this time, the terminal needs to determine a first final position of the application B icon first, and if the final position of the application B icon is still located in the fingerprint collection area 201, it indicates that the application B is still an encrypted application, and at this time, the terminal directly moves the application B icon to the first final position.
Here, if the final position of the application B icon is not located in the fingerprint collection area, it indicates that the user does not want to set the application B as an encrypted application, at this time, in order to ensure the use safety of the application B, the terminal needs to verify the fingerprint information of the finger pressing the application B icon, and if the verification passes, it indicates that the user is a valid user, the terminal may set the application B icon at the first final position and change the application B into an unencrypted application; therefore, when the user subsequently opens the application B, the user can directly press the application B to open the application B without unlocking the application B. If the verification fails, the user is an illegal user, the terminal cannot move the icon of the application B in order to ensure the use safety of the application B, the icon of the application B needs to be set at the original position, and the user still needs to unlock the fingerprint when opening the application B subsequently.
According to the embodiment, whether the encrypted application is changed into the non-encrypted application can be determined by whether the encrypted application is arranged in the fingerprint acquisition area, so that a user can complete two tasks of moving and encryption setting through one moving operation, user operation is reduced, and the method is convenient and fast.
In a possible implementation manner, the execution movement instruction of step 103 in the above control method can also be implemented as the following steps D1 to D3.
In step D1, upon detecting a movement operation of a second application icon for a non-encrypted application, a second final position of the second application icon is determined.
In step D2, verifying fingerprint information of the finger pressing the second application icon when the second final position is located in the fingerprint acquisition area; when the verification is passed, setting the second application icon at the second final position and changing the encrypted application into an unencrypted application; and when the verification fails, setting the second application icon in the original position.
In step D3, the second application icon is set in the second final position when the second final position is not located in the fingerprint acquisition area.
Here, as shown in fig. 2, when the application a is an unencrypted application, and the terminal detects a moving operation of an application a icon, which is a second application icon of the application a, the terminal may execute a moving instruction to move the application a icon, at this time, the terminal needs to determine a second final position of the application a icon first, and if the second final position of the application a icon is not located in the fingerprint collection area 201, it indicates that the user still wants to set the application a to be an unencrypted application, and at this time, the terminal directly moves the application a icon to the second final position.
Here, if the second final position of the application a icon is located in the fingerprint collection area, it indicates that the user wants to set the application a as an encrypted application, at this time, in order to ensure the use safety of the application a, the terminal needs to verify the fingerprint information of the finger pressing the application a icon, if the verification passes, it indicates that the user is a legal user, the terminal may set the application a icon at the second final position and change the application a into an encrypted application, and the encrypted password is the fingerprint information of the legal user; thus, when the user subsequently opens the application a, the fingerprint unlocking is required; if the verification fails, the user is an illegal user, the terminal cannot move the icon of the application A in order to ensure the use safety of the application A, the icon of the application A needs to be set at the original position, and the user can directly press and open the application A when opening the application A subsequently without unlocking the application A.
According to the embodiment, whether the non-encryption application is changed into the encryption application can be determined by whether the non-encryption application is arranged in the fingerprint acquisition area, so that a user can complete two tasks of movement and encryption setting through one movement operation, the user operation is reduced, and the operation is convenient and fast.
The implementation is described in detail below by way of several embodiments.
Fig. 3 is a flowchart illustrating a control method of an application icon according to an exemplary embodiment, which may be implemented by a terminal or the like, as shown in fig. 3, and includes steps 301 to 311.
In step 301, a control instruction for a moving switch is received, where the control instruction is used to instruct the moving switch to be turned on or off.
In step 302, the movement switch is turned on or off in response to the control command.
In step 303, upon detecting a pressing operation of a first application icon for an encrypted application, upon detecting that a movement switch of the encrypted application is turned on, detecting that a movement condition for moving the first application icon is satisfied; upon detecting that a movement switch of the encryption application is turned off, it is not detected that a movement condition for moving the first application icon is satisfied.
In step 304, when the moving condition is not detected, an unlocking instruction is executed, wherein the unlocking instruction is used for instructing the terminal fingerprint to unlock the encryption application.
In step 305, upon detection of the movement condition, a first final position of the first application icon is determined.
In step 306, the first application icon is set at the first final position when the first final position is located in the fingerprint acquisition area.
In step 307, fingerprint information of the finger pressing the first application icon is verified when the first final position is not located in the fingerprint acquisition area.
In step 308, upon passing the verification, setting the first application icon in the first final position and changing the encrypted application to an unencrypted application; and when the verification fails, setting the first application icon in the original position.
In step 309, upon detecting a movement operation for a second application icon of the non-encrypted application, a second final position of the second application icon is determined.
In step 310, verifying fingerprint information of the finger pressing the second application icon when the second final position is located in a fingerprint acquisition area; when the verification is passed, setting the second application icon at the second final position and changing the encrypted application into an unencrypted application; and when the verification fails, setting the second application icon in the original position.
In step 311, the second application icon is set at the second final position when the second final position is not located in the fingerprint acquisition area.
Fig. 4 is a flowchart illustrating a control method of an application icon according to an exemplary embodiment, which may be implemented by a terminal or the like, as shown in fig. 4, and includes steps 401 to 408.
In step 401, when a pressing operation of a first application icon for an encrypted application is detected, a pressure value corresponding to the pressing operation is detected.
In step 402, when the detected pressure values are all less than or equal to the preset pressure value within the preset time period, it is detected that the moving condition for moving the first application icon is satisfied.
In step 403, when the detected pressure values are all greater than the preset pressure value within the preset time period, detecting a moving distance of the finger to move the first application icon within the preset time period.
In step 404, collecting fingerprint information of a finger pressing the first application icon within the preset time period; and verifying the fingerprint information.
In step 405, when the moving distance is less than or equal to a first distance threshold, the moving condition for moving the first application icon is not detected.
In step 406, when the moving distance is greater than or equal to a second distance threshold, the moving condition for moving the first application icon is detected to be satisfied.
In step 407, when the moving condition is not detected, the encryption application is opened when the fingerprint information is verified, and the encryption application is kept closed when the fingerprint information is not verified.
In step 408, when the moving condition is detected, a moving instruction is executed, where the moving instruction is used to instruct the terminal to move the position of the first application icon.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods.
Fig. 5 is a block diagram illustrating a control apparatus for an application icon, which may be implemented as part or all of an electronic device through software, hardware, or a combination of both, according to an exemplary embodiment. As shown in fig. 5, the control device of the application icon includes:
a first detection module 501, configured to detect that a moving condition for moving a first application icon of an encrypted application is satisfied when a pressing operation of the first application icon is detected;
a first executing module 502, configured to execute an unlocking instruction when the moving condition is not detected, where the unlocking instruction is used to instruct a terminal fingerprint to unlock the encrypted application;
a second executing module 503, configured to execute a moving instruction when the moving condition is detected, where the moving instruction is used to instruct the terminal to move the position of the first application icon.
As a possible embodiment, fig. 6 is a block diagram illustrating a control device of an application icon according to an exemplary embodiment, and as shown in fig. 6, the control device of the application icon disclosed above may be further configured to include a receiving module 504 and a responding module 505, and the first detecting module 501 may be further configured to include a first detecting submodule 5011, wherein:
a receiving module 504, configured to receive a control instruction for a mobile switch, where the control instruction is used to instruct to turn on or turn off the mobile switch;
a response module 505, configured to respond to the control instruction, and turn on or off the movement switch;
the first detection module 501 includes:
a first detection submodule 5011 configured to detect that a moving condition for moving the first application icon is satisfied when it is detected that a moving switch of the encryption application is turned on; upon detecting that a movement switch of the encryption application is turned off, it is not detected that a movement condition for moving the first application icon is satisfied.
As a possible embodiment, fig. 7 is a block diagram illustrating a control apparatus of an application icon according to an exemplary embodiment, and as shown in fig. 7, the control apparatus of an application icon disclosed above may further configure the first detection module 501 to include a second detection submodule 5012, wherein:
the second detection submodule 5012 is configured to detect a moving distance of the finger moving the first application icon within a preset time period; when the moving distance is smaller than or equal to a first distance threshold value, the condition that the moving condition for moving the first application icon is met is not detected; when the moving distance is larger than or equal to a second distance threshold value, the condition that the moving condition of the first application icon is moved is detected.
As a possible embodiment, fig. 8 is a block diagram illustrating a control apparatus for an application icon according to an exemplary embodiment, and as shown in fig. 8, the control apparatus for an application icon disclosed above may be further configured to include an acquisition module 506 and a verification module 507, and the first execution module 502 may be further configured to include an execution sub-module 5021, where:
an acquiring module 506, configured to acquire fingerprint information of a finger pressing the first application icon within the preset time period;
a verification module 507, configured to verify the fingerprint information;
the first execution module 502 includes:
the execution sub-module 5021 is configured to open the encrypted application when the fingerprint information passes verification, and keep closing the encrypted application when the fingerprint information does not pass verification.
As a possible embodiment, fig. 9 is a block diagram illustrating a control device of an application icon according to an exemplary embodiment, and as shown in fig. 9, the control device of the application icon disclosed above may be further configured to include a second detection module 508 and a third detection module 509, where:
a second detecting module 508, configured to detect a pressure value corresponding to the pressing operation;
a third detecting module 509, configured to detect that the moving condition for moving the first application icon is met when all detected pressure values are less than or equal to the preset pressure value within the preset time period;
the second detection submodule 5012 is configured to detect a movement distance of the finger in the preset time period when the detected pressure values are all greater than the preset pressure values in the preset time period.
As a possible embodiment, fig. 10 is a block diagram of the second execution module 503 in the control device of an application icon shown according to an exemplary embodiment, and as shown in fig. 10, the control device of an application icon disclosed above may further configure the second execution module 503 to include a determination sub-module 5031, a first setting sub-module 5032, a verification sub-module 5033 and a second setting sub-module 5034, where:
a determining submodule 5031 for determining a first final position of the first application icon;
a first setting sub-module 5032 configured to set the first application icon at the first final position when the first final position is located in a fingerprint collection area;
a verification sub-module 5033 configured to verify fingerprint information of the finger pressing the first application icon when the first final position is not located in the fingerprint collection area;
a second setting sub-module 5034 configured to set the first application icon in the first final position and change the encrypted application to an unencrypted application when the authentication is passed; and when the verification fails, setting the first application icon in the original position.
As a possible embodiment, fig. 11 is a block diagram illustrating a control apparatus of an application icon according to an exemplary embodiment, and as shown in fig. 11, the control apparatus of the application icon disclosed above may be further configured to include a determination module 510, a verification module 511, a first setting module 512, and a second setting module 513, wherein:
a determining module 510, configured to determine a second final position of a second application icon for a non-encrypted application when a moving operation of the second application icon is detected;
the verification module 511 is configured to verify fingerprint information of the finger pressing the second application icon when the second final position is located in the fingerprint acquisition area;
a first setting module 512, configured to set the second application icon in the second final position and change the encrypted application to an unencrypted application when the authentication passes; setting the second application icon in the original position when the verification is not passed;
a second setting module 513, configured to set the second application icon at the second final position when the second final position is not located in the fingerprint acquisition area.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 12 is a block diagram illustrating a control apparatus of an application icon, which is applicable to a terminal device, according to an exemplary embodiment. For example, the apparatus 1200 may be a mobile phone, a game console, a computer, a tablet device, a personal digital assistant, and the like.
The apparatus 1200 may include one or more of the following components: processing component 1201, memory 1202, power component 1203, multimedia component 1204, audio component 1205, input/output (I/O) interface 1206, sensor component 1207, and communications component 1208.
The processing component 1201 generally controls the overall operation of the apparatus 1200, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1201 may include one or more processors 1220 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 1201 can include one or more modules that facilitate interaction between the processing component 1201 and other components. For example, the processing component 1201 may include a multimedia module to facilitate interaction between the multimedia component 1204 and the processing component 1201.
The memory 1202 is configured to store various types of data to support operation at the apparatus 1200. Examples of such data include instructions for any application or method operating on the device 1200, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1202 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 1203 provides power to the various components of the device 1200. The power components 1203 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the apparatus 1200.
The multimedia component 1204 includes a screen providing an output interface between the device 1200 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1204 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the apparatus 1200 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 1205 is configured to output and/or input audio signals. For example, the audio components 1205 include a Microphone (MIC) configured to receive external audio signals when the apparatus 1200 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1202 or transmitted via the communication component 1208. In some embodiments, the audio component 1205 also includes a speaker for outputting audio signals.
The I/O interface 1206 provides an interface between the processing component 1201 and a peripheral interface module, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 1207 includes one or more sensors for providing various aspects of state assessment for the apparatus 1200. For example, sensor assembly 1207 may detect an open/closed state of apparatus 1200, a relative positioning of components, such as a display and keypad of apparatus 1200, a change in position of apparatus 1200 or a component of apparatus 1200, the presence or absence of user contact with apparatus 1200, an orientation or acceleration/deceleration of apparatus 1200, and a change in temperature of apparatus 1200. The sensor assembly 1207 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1207 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1207 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communications component 1208 is configured to facilitate communications between the apparatus 1200 and other devices in a wired or wireless manner. The apparatus 1200 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1208 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 1208 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 1200 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 1202 comprising instructions, executable by the processor 1220 of the apparatus 1200 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer-readable storage medium, in which instructions, when executed by a processor of an apparatus 1200, enable the apparatus 1200 to perform the above-described control method of an application icon, the method comprising:
detecting that a moving condition for moving a first application icon of an encrypted application is satisfied when a pressing operation for the first application icon is detected;
when the moving condition is not detected, executing an unlocking instruction, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application;
and when the moving condition is detected, executing a moving instruction, wherein the moving instruction is used for indicating the terminal to move the position of the first application icon.
In one embodiment, the method further comprises:
receiving a control instruction aiming at a mobile switch, wherein the control instruction is used for instructing to turn on or turn off the mobile switch;
responding to the control instruction, and opening or closing the mobile switch;
the detecting that a movement condition for moving the first application icon is satisfied includes:
detecting that a moving condition for moving the first application icon is satisfied when it is detected that a moving switch of the encryption application is turned on;
upon detecting that a movement switch of the encryption application is turned off, it is not detected that a movement condition for moving the first application icon is satisfied.
In one embodiment, the detecting that a movement condition for moving the first application icon is satisfied includes:
detecting a moving distance of the finger moving the first application icon within a preset time period;
when the moving distance is smaller than or equal to a first distance threshold value, the condition that the moving condition for moving the first application icon is met is not detected;
when the moving distance is larger than or equal to a second distance threshold value, the condition that the moving condition of the first application icon is moved is detected.
In one embodiment, the method further comprises:
collecting fingerprint information of a finger pressing the first application icon in the preset time period;
verifying the fingerprint information;
the executing the unlock instruction includes:
and when the fingerprint information passes the verification, the encryption application is opened, and when the fingerprint information does not pass the verification, the encryption application is kept closed.
In one embodiment, the method further comprises:
detecting a pressure value corresponding to the pressing operation;
detecting that the moving condition for moving the first application icon is met when the detected pressure values are all smaller than or equal to the preset pressure value within the preset time period;
the detecting a movement distance of the finger moving the first application icon within a preset time period includes:
and in the preset time period, when the detected pressure values are all larger than the preset pressure values, detecting the moving distance of the finger for moving the first application icon in the preset time period.
In one embodiment, the executing the move instruction comprises:
determining a first final position of the first application icon;
when the first final position is located in a fingerprint acquisition area, setting the first application icon at the first final position;
verifying fingerprint information of a finger pressing the first application icon when the first final position is not located in the fingerprint acquisition area;
when the verification is passed, setting the first application icon at the first final position and changing the encrypted application into an unencrypted application; and when the verification fails, setting the first application icon in the original position.
In one embodiment, the method further comprises:
determining a second final position of a second application icon of a non-encrypted application when a moving operation of the second application icon is detected;
verifying fingerprint information of a finger pressing the second application icon when the second final position is located in a fingerprint acquisition area; when the verification is passed, setting the second application icon at the second final position and changing the encrypted application into an unencrypted application; setting the second application icon in the original position when the verification is not passed;
when the second final position is not located in the fingerprint acquisition area, the second application icon is set at the second final position.
The present embodiment further provides a control device for an application icon, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
detecting that a moving condition for moving a first application icon of an encrypted application is satisfied when a pressing operation for the first application icon is detected;
when the moving condition is not detected, executing an unlocking instruction, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application;
and when the moving condition is detected, executing a moving instruction, wherein the moving instruction is used for indicating the terminal to move the position of the first application icon.
In one embodiment, the processor may be further configured to:
in one embodiment, the processor may be further configured to:
the method further comprises the following steps:
receiving a control instruction aiming at a mobile switch, wherein the control instruction is used for instructing to turn on or turn off the mobile switch;
responding to the control instruction, and opening or closing the mobile switch;
the detecting that a movement condition for moving the first application icon is satisfied includes:
detecting that a moving condition for moving the first application icon is satisfied when it is detected that a moving switch of the encryption application is turned on;
upon detecting that a movement switch of the encryption application is turned off, it is not detected that a movement condition for moving the first application icon is satisfied.
In one embodiment, the processor may be further configured to:
the detecting that a movement condition for moving the first application icon is satisfied includes:
detecting a moving distance of the finger moving the first application icon within a preset time period;
when the moving distance is smaller than or equal to a first distance threshold value, the condition that the moving condition for moving the first application icon is met is not detected;
when the moving distance is larger than or equal to a second distance threshold value, the condition that the moving condition of the first application icon is moved is detected.
In one embodiment, the processor may be further configured to:
the method further comprises the following steps:
collecting fingerprint information of a finger pressing the first application icon in the preset time period;
verifying the fingerprint information;
the executing the unlock instruction includes:
and when the fingerprint information passes the verification, the encryption application is opened, and when the fingerprint information does not pass the verification, the encryption application is kept closed.
In one embodiment, the processor may be further configured to:
the method further comprises the following steps:
detecting a pressure value corresponding to the pressing operation;
detecting that the moving condition for moving the first application icon is met when the detected pressure values are all smaller than or equal to the preset pressure value within the preset time period;
the detecting a movement distance of the finger moving the first application icon within a preset time period includes:
and in the preset time period, when the detected pressure values are all larger than the preset pressure values, detecting the moving distance of the finger for moving the first application icon in the preset time period.
In one embodiment, the processor may be further configured to:
the executing the move instruction comprises:
determining a first final position of the first application icon;
when the first final position is located in a fingerprint acquisition area, setting the first application icon at the first final position;
verifying fingerprint information of a finger pressing the first application icon when the first final position is not located in the fingerprint acquisition area;
when the verification is passed, setting the first application icon at the first final position and changing the encrypted application into an unencrypted application; and when the verification fails, setting the first application icon in the original position.
In one embodiment, the processor may be further configured to:
the method further comprises the following steps:
determining a second final position of a second application icon of a non-encrypted application when a moving operation of the second application icon is detected;
verifying fingerprint information of a finger pressing the second application icon when the second final position is located in a fingerprint acquisition area; when the verification is passed, setting the second application icon at the second final position and changing the encrypted application into an unencrypted application; setting the second application icon in the original position when the verification is not passed;
when the second final position is not located in the fingerprint acquisition area, the second application icon is set at the second final position.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (16)

1. A control method of an application icon is characterized by comprising the following steps:
detecting that a moving condition for moving a first application icon of an encrypted application is satisfied when a pressing operation for the first application icon is detected; wherein the movement condition includes: moving the moving distance of the first application icon within a preset time period or an on or off state of a moving switch of the encryption application;
when the moving condition is not detected, executing an unlocking instruction, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application;
and when the moving condition is detected, executing a moving instruction, wherein the moving instruction is used for indicating the terminal to move the position of the first application icon.
2. The control method according to claim 1, characterized in that the method further comprises:
receiving a control instruction aiming at a mobile switch, wherein the control instruction is used for instructing to turn on or turn off the mobile switch;
responding to the control instruction, and opening or closing the mobile switch;
the detecting that a movement condition for moving the first application icon is satisfied includes:
detecting that a moving condition for moving the first application icon is satisfied when it is detected that a moving switch of the encryption application is turned on;
upon detecting that a movement switch of the encryption application is turned off, it is not detected that a movement condition for moving the first application icon is satisfied.
3. The control method according to claim 1, wherein the detecting that a movement condition for moving the first application icon is satisfied includes:
detecting a moving distance of the finger moving the first application icon within a preset time period;
when the moving distance is smaller than or equal to a first distance threshold value, the condition that the moving condition for moving the first application icon is met is not detected;
when the moving distance is larger than or equal to a second distance threshold value, the condition that the moving condition of the first application icon is moved is detected.
4. The control method according to claim 3, characterized in that the method further comprises:
collecting fingerprint information of a finger pressing the first application icon in the preset time period;
verifying the fingerprint information;
the executing the unlock instruction includes:
and when the fingerprint information passes the verification, the encryption application is opened, and when the fingerprint information does not pass the verification, the encryption application is kept closed.
5. The control method according to claim 3, characterized in that the method further comprises:
detecting a pressure value corresponding to the pressing operation;
detecting that the moving condition for moving the first application icon is met when the detected pressure values are all smaller than or equal to the preset pressure value within the preset time period;
the detecting a movement distance of the finger moving the first application icon within a preset time period includes:
and in the preset time period, when the detected pressure values are all larger than the preset pressure values, detecting the moving distance of the finger for moving the first application icon in the preset time period.
6. The control method of claim 1, wherein the executing the movement instruction comprises:
determining a first final position of the first application icon;
when the first final position is located in a fingerprint acquisition area, setting the first application icon at the first final position;
verifying fingerprint information of a finger pressing the first application icon when the first final position is not located in the fingerprint acquisition area;
when the verification is passed, setting the first application icon at the first final position and changing the encrypted application into an unencrypted application; and when the verification fails, setting the first application icon in the original position.
7. The control method according to claim 1, characterized in that the method further comprises:
determining a second final position of a second application icon of a non-encrypted application when a moving operation of the second application icon is detected;
verifying fingerprint information of a finger pressing the second application icon when the second final position is located in a fingerprint acquisition area; when the verification is passed, setting the second application icon at the second final position and changing the encrypted application into an unencrypted application; setting the second application icon in the original position when the verification is not passed;
when the second final position is not located in the fingerprint acquisition area, the second application icon is set at the second final position.
8. An apparatus for controlling an application icon, comprising:
a first detection module configured to detect that a movement condition for moving a first application icon of an encrypted application is satisfied when a pressing operation for the first application icon is detected; wherein the movement condition includes: moving the moving distance of the first application icon within a preset time period or an on or off state of a moving switch of the encryption application;
the first execution module is used for executing an unlocking instruction when the moving condition is not detected, wherein the unlocking instruction is used for indicating a terminal fingerprint to unlock the encrypted application;
and the second execution module is used for executing a moving instruction when the moving condition is detected, wherein the moving instruction is used for indicating the terminal to move the position of the first application icon.
9. The control device of claim 8, wherein the device further comprises:
the mobile switch comprises a receiving module, a judging module and a control module, wherein the receiving module is used for receiving a control instruction aiming at the mobile switch, and the control instruction is used for indicating to turn on or turn off the mobile switch;
the response module is used for responding to the control instruction and opening or closing the mobile switch;
the first detection module includes:
a first detection sub-module, configured to detect that a movement condition for moving the first application icon is satisfied when it is detected that a movement switch of the encrypted application is turned on; upon detecting that a movement switch of the encryption application is turned off, it is not detected that a movement condition for moving the first application icon is satisfied.
10. The control device of claim 8, wherein the first detection module comprises:
the second detection submodule is used for detecting the moving distance of the finger for moving the first application icon in a preset time period; when the moving distance is smaller than or equal to a first distance threshold value, the condition that the moving condition for moving the first application icon is met is not detected; when the moving distance is larger than or equal to a second distance threshold value, the condition that the moving condition of the first application icon is moved is detected.
11. The control device of claim 10, further comprising:
the acquisition module is used for acquiring fingerprint information of the finger pressing the first application icon in the preset time period;
the verification module is used for verifying the fingerprint information;
the first execution module includes:
and the execution sub-module is used for opening the encryption application when the fingerprint information passes verification and keeping closing the encryption application when the fingerprint information does not pass verification.
12. The control device of claim 10, further comprising:
the second detection module is used for detecting a pressure value corresponding to the pressing operation;
the third detection module is used for detecting that the moving condition for moving the first application icon is met when the detected pressure values are all smaller than or equal to the preset pressure value in the preset time period;
and the second detection submodule is used for detecting the moving distance of the finger in the preset time period when the detected pressure values are all larger than the preset pressure values in the preset time period.
13. The control device of claim 8, wherein the second execution module comprises:
a determining submodule for determining a first final position of the first application icon;
the first setting sub-module is used for setting the first application icon at the first final position when the first final position is located in a fingerprint acquisition area;
a verification sub-module for verifying fingerprint information of a finger pressing the first application icon when the first final position is not located in the fingerprint acquisition area;
the second setting sub-module is used for setting the first application icon at the first final position and changing the encrypted application into the non-encrypted application when the verification is passed; and when the verification fails, setting the first application icon in the original position.
14. The control device of claim 8, wherein the device further comprises:
a determining module, configured to determine a second final position of a second application icon of a non-encrypted application when a moving operation of the second application icon is detected;
the verification module is used for verifying the fingerprint information of the finger pressing the second application icon when the second final position is located in a fingerprint acquisition area;
the first setting module is used for setting the second application icon at the second final position and changing the encrypted application into the non-encrypted application when the verification is passed; setting the second application icon in the original position when the verification is not passed;
and the second setting module is used for setting the second application icon at the second final position when the second final position is not located in the fingerprint acquisition area.
15. An apparatus for controlling an application icon, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the steps in the method of any one of claims 1 to 7.
16. A computer readable storage medium storing computer instructions, wherein the computer instructions, when executed by a processor, implement the steps of the method of any one of claims 1 to 7.
CN201811639218.6A 2018-12-29 2018-12-29 Control method and device of application icons Active CN111382395B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811639218.6A CN111382395B (en) 2018-12-29 2018-12-29 Control method and device of application icons

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811639218.6A CN111382395B (en) 2018-12-29 2018-12-29 Control method and device of application icons

Publications (2)

Publication Number Publication Date
CN111382395A CN111382395A (en) 2020-07-07
CN111382395B true CN111382395B (en) 2022-05-03

Family

ID=71218270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811639218.6A Active CN111382395B (en) 2018-12-29 2018-12-29 Control method and device of application icons

Country Status (1)

Country Link
CN (1) CN111382395B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102830921B (en) * 2012-08-06 2016-09-28 广东欧珀移动通信有限公司 A kind of touch screen unlocking method and mobile terminal
EP2960764A1 (en) * 2014-06-27 2015-12-30 Orange Method for selecting an entry for an application using a graphical user interface
CN105893854B (en) * 2016-03-30 2019-04-12 北京小米移动软件有限公司 Encryption and decryption method and device
CN106250754B (en) * 2016-07-27 2018-11-30 维沃移动通信有限公司 A kind of control method and mobile terminal of application program
CN108647505A (en) * 2018-04-19 2018-10-12 Oppo广东移动通信有限公司 Unlocked by fingerprint method and Related product

Also Published As

Publication number Publication date
CN111382395A (en) 2020-07-07

Similar Documents

Publication Publication Date Title
US10129044B2 (en) Method and apparatus for controlling smart device
US10075445B2 (en) Methods and devices for permission management
EP3331226B1 (en) Method and device for reading messages
EP3232299B1 (en) Physical key component, terminal, and touch response method and device
EP3041206B1 (en) Method and device for displaying notification information
US20170053149A1 (en) Method and apparatus for fingerprint identification
CN105807873A (en) Temperature control method and device
CN109324863B (en) Fingerprint identification method and device and computer readable storage medium
CN106156561B (en) Application locking method, application unlocking method and device
CN106357934B (en) Screen locking control method and device
US20180144176A1 (en) Fingerprint template acquisition method and device
CN108334799A (en) Fingerprint identification method and device
CN107622189A (en) Optimize the method and apparatus of unlocked by fingerprint
CN107145797A (en) Display control method, device and the terminal device of application icon
CN106570381B (en) Fingerprint unlocking method and device
CN105760796B (en) Application security processing method and device
EP3211564A1 (en) Method and device for verifying a fingerprint
WO2018049611A1 (en) Permission control method and device
CN106980454B (en) Unlocking method and device
CN105955635A (en) Interface display method and device
CN108470120B (en) Screen locking control method and device and readable storage medium
CN111382395B (en) Control method and device of application icons
CN106201738A (en) System broadcasts call method and device
CN110929550A (en) Fingerprint identification method and device, electronic equipment and storage medium
CN108763906B (en) Biological feature recognition method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant