CN110554817A - desktop icon display control method and device, readable medium and computing equipment - Google Patents
desktop icon display control method and device, readable medium and computing equipment Download PDFInfo
- Publication number
- CN110554817A CN110554817A CN201910783172.3A CN201910783172A CN110554817A CN 110554817 A CN110554817 A CN 110554817A CN 201910783172 A CN201910783172 A CN 201910783172A CN 110554817 A CN110554817 A CN 110554817A
- Authority
- CN
- China
- Prior art keywords
- desktop
- display control
- extended
- icon
- area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000004048 modification Effects 0.000 claims description 25
- 238000012986 modification Methods 0.000 claims description 25
- 238000012795 verification Methods 0.000 claims description 20
- 230000001960 triggered effect Effects 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 9
- 230000009471 action Effects 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 19
- 238000003860 storage Methods 0.000 description 15
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000003825 pressing Methods 0.000 description 3
- 239000013307 optical fiber Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The application discloses a display control method and device of desktop icons, a readable medium and computing equipment. The method comprises the following steps: displaying an extended desktop, wherein the extended desktop comprises a display control area, and at least one desktop icon included in the extended desktop is in a hidden state when the display control area is displayed; receiving login information input via the display control area; performing identity authentication on the login information; and when the authentication is passed, switching the at least one desktop icon included in the extended desktop from a hidden state to a display state. Therefore, the problem that privacy information of a user is leaked due to the fact that all desktop icons are displayed is avoided.
Description
Technical Field
The application belongs to the technical field of computers, and particularly relates to a display control method and device of a desktop icon, a readable medium and computing equipment.
background
With the rapid development of information technology, more and more application programs, such as game application, instant messaging application, shopping application, office application and the like, emerge, and a user can install various applications according to the needs of the user, so that a great deal of convenience is provided for the life, work, study, entertainment and social contact of people.
The application icon is a starting inlet of the application, and when the user clicks the icon, the terminal starts an application program corresponding to the icon. Generally, icons of all applications installed on a terminal are displayed on a desktop for user convenience. However, there is no solution for some applications that do not want to be viewed by others.
Disclosure of Invention
the application provides a display control method and device of a desktop icon, a readable medium and a computing device, so as to solve at least one of the problems.
in a first aspect, an embodiment of the present application provides a method for controlling display of a desktop icon, where the method includes: displaying an extended desktop, wherein the extended desktop comprises a display control area, and at least one desktop icon included in the extended desktop is in a hidden state when the display control area is displayed; receiving login information input via the display control area; performing identity authentication on the login information; and when the authentication is passed, switching the at least one desktop icon included in the extended desktop from a hidden state to a display state.
Optionally, the display control area includes at least one of a password input area, a fingerprint input area, a gesture input area, a voice input area, and a face recognition area; if the display control area comprises the password input area, the login information comprises a password corresponding to the password input area; if the display control area comprises the fingerprint input area, the login information comprises a fingerprint corresponding to the fingerprint input area; if the display control area comprises the voice input area, the login information comprises a keyword and/or a voiceprint corresponding to the voice input area; and if the display control area comprises the face recognition area, the login information comprises a face corresponding to the face recognition area.
Optionally, before displaying the extended desktop including the display control area, the method further includes:
Displaying an extended desktop, the extended desktop including a setting area; and receiving authentication information input via the setting region; wherein, the identity authentication of the login information comprises: matching the input login information with the verification information; if the identity authentication is matched, the identity authentication is determined to be passed; and if the identity authentication is not matched, determining that the identity authentication fails.
Optionally, before displaying the extended desktop, the method further comprises: and receiving an instruction for viewing the extended desktop, wherein the instruction for viewing the extended desktop is triggered by the action that a user presses a preset contact point at the bottom of the touch screen with two fingers and slides to or beyond the middle position of the touch screen from the bottom of the touch screen to the top of the touch screen.
Optionally, the extended desktop further includes a modification entry for modifying the verification information, and the method further includes: receiving modification information input via the modification portal.
Optionally, the method further comprises: receiving an instruction of hiding the desktop icon; in response to the desktop icon hiding instruction, storing the desktop icons set to be hidden and the corresponding data information thereof in a cache database corresponding to the extended desktop; and deleting the desktop icons which are set to be hidden and the corresponding data information from the desktop database.
Optionally, the method further comprises: receiving an instruction for restoring the desktop icon; responding to the desktop icon restoring instruction, and storing the restored desktop icons and corresponding data information in a desktop database; and deleting the recovered desktop icon and the corresponding data information from the cache database corresponding to the extended desktop.
Optionally, the instruction to hide the desktop icon is triggered by at least one of the following user operations: moving the desktop icon from the original display desktop to the extended desktop; adding the desktop icon to a hidden setting list, wherein the instruction for recovering the desktop icon is triggered by at least one of the following user operations: moving the desktop icon from the extended desktop to a display desktop; and deleting the desktop icon from a hidden setting list.
optionally, the data information corresponding to the desktop icon includes at least one of the following: the name of the application corresponding to the desktop icon; the package name of the application corresponding to the desktop icon; and the starting class name of the application corresponding to the desktop icon.
Optionally, after switching the at least one desktop icon included in the extended desktop from the hidden state to the displayed state, the method further includes: receiving a screen locking instruction; and switching the at least one desktop icon from a display state to a hidden state based on the screen locking instruction, and hiding the extended desktop.
In a second aspect, an embodiment of the present application further provides a device for controlling display of a desktop icon, where the device includes: the extended desktop display unit is used for displaying an extended desktop, the extended desktop comprises a display control area, and at least one desktop icon included in the extended desktop is in a hidden state when the display control area is displayed; an information receiving unit for receiving login information input via the display control area; the identity authentication unit is used for performing identity authentication on the login information; and the display control unit is used for switching the at least one desktop icon included in the extended desktop from a hidden state to a display state when the authentication is passed.
in a third aspect, embodiments of the present application further provide a computer-readable medium storing computer-executable instructions for enabling a computer to perform the method as described above.
in a fourth aspect, an embodiment of the present application further provides a computing device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method as described above.
The display control method and device for the desktop icons, the readable medium and the computing equipment can avoid the problem that privacy information of a user is leaked due to the fact that all the desktop icons are displayed, so that privacy safety of the user is guaranteed, and user experience is improved.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for controlling display of desktop icons according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an extended desktop including a display control area according to one embodiment of the present application;
FIG. 3 is a schematic diagram of an extended desktop including displayed application icons according to one embodiment of the present application;
FIG. 4 is a diagram of an extended desktop including a setup area according to one embodiment of the present application;
FIGS. 5A-5B are schematic diagrams of a call-out extension desktop according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a desktop icon display control apparatus according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a computing device according to one embodiment of the present application.
Detailed Description
in order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Fig. 1 is a flowchart illustrating a method for controlling display of desktop icons according to an embodiment of the present application. The display control method can be realized by a user terminal, and in the implementation process, the display control scheme of the desktop icon can be realized through the interaction between the user and the terminal.
As shown in fig. 1, in step S110, an extended desktop may be displayed, where the extended desktop may include a display control area, and at least one desktop icon included in the extended desktop is in a hidden state when the display control area is displayed.
in the embodiment of the application, the extended desktop can be extended on the basis of the system desktop. The extension desktop can be an independent desktop at the same level as the system desktop, or an extension sub-desktop of the system desktop, and after the original desktop is extended, a part of desktop area which can be independently controlled is divided to be used as the extension desktop.
The display control area included on the extended desktop can be used for controlling the display state of the application icons included on the extended desktop. In the embodiment of the application, a plurality of display control modes are provided, and a user can determine one or at least one display control mode according to own needs to perform display control.
as an example, the display control area may include at least one of a password input area, a fingerprint input area, a gesture input area, a voice input area, a face recognition area, for example. The user may enter any desired login information, for example, in a display control area displayed on the extended desktop. If the user sets only one or two login methods, an area corresponding to the one or two login methods may be displayed in the display control area so that the user can input login information. If the user sets multiple login modes, an area corresponding to any one or at least one login mode may be displayed in the display control area, which is not limited in the present application.
By way of example, FIG. 2 is a diagram of an extended desktop including a display control area according to one embodiment of the present application.
As shown in fig. 2, an extended desktop 201 is currently displayed on the display screen of the user terminal 200, and the extended desktop 201 includes a display control area 220 (an area indicated by a dashed line box in fig. 2), for example, the display control area 220 includes a password input area 221 and a fingerprint input area 223. The user may input a password through the password input area 221 and may input a fingerprint through the fingerprint input area 223. It should be understood that the schematic diagrams shown here and in the following description are only illustrative and not limiting of the extended desktop of the present application and the relevant areas that it includes. In other embodiments, the display control area, the setting area, the modification entry, and the like included on the extended desktop may correspond to one or more implementations, which are not limited in this application.
When the user inputs login information in, for example, the display control area 220 shown in fig. 2, the terminal receives the login information input via the display control area in step S120.
The login information input by the user corresponds to the display control area. For example, if the display control area includes the password input area, the login information includes a password corresponding to the password input area; if the display control area comprises the fingerprint input area, the login information comprises a fingerprint corresponding to the fingerprint input area; if the display control area comprises the gesture input area, the login information comprises a gesture corresponding to the gesture input area; if the display control area comprises the voice input area, the login information comprises a keyword and/or a voiceprint corresponding to the voice input area; and if the display control area comprises the face recognition area, the login information comprises a face corresponding to the face recognition area. Therefore, the user can freely select and control according to the self requirement, a login information control mode based on different requirements is provided, the user operation is facilitated, more interestingness can be provided, and the user experience is improved. Moreover, the diversity of the login modes can also prevent login information from being quickly decoded, so that the data safety of the expansion desktop and the application icons on the expansion desktop is improved.
It should be understood that the above-mentioned embodiment is only an illustrative example and not a limitation to the display control manner, and in other embodiments, the above-mentioned display control may also be implemented in other manners, for example, guiding the user to input login information by voice.
in step S130, the login information may be authenticated.
Here, the identity authentication corresponds to the aforementioned login information.
For example, if the login information includes a password corresponding to the password input area, performing identity authentication on the password; if the login information comprises a fingerprint corresponding to the fingerprint input area, performing identity authentication on the fingerprint; if the login information comprises a gesture corresponding to the gesture input area, performing identity authentication on the gesture; if the login information comprises the voice corresponding to the voice input area, authenticating the keyword and/or the voiceprint and the like contained in the voice; and if the login information comprises the face corresponding to the face recognition area, authenticating the detected face. Of course, the login information is not limited to one embodiment, and may be a combination of two or more kinds of login information, for example, a combination of two kinds of login information, such as a password and a fingerprint, corresponding to the display control area shown in fig. 2, or a combination of three kinds of login information, such as a face, a gesture, and a voice, which are not described herein again.
in step S140, when the authentication is passed, the at least one desktop icon included in the extended desktop is switched from the hidden state to the displayed state. For example, as shown in fig. 3, after the password authentication is passed, application a, application B, and application C are displayed on the extension desktop 201. At this time, the user clicks any one of the applications to start the application and experience the service provided by the application.
and when the authentication is not passed, the user can be reminded to input the required login information again. Under the condition that the authentication fails for many times, the current expansion desktop can be locked, for example, the input error is prompted to exceed the specified times and can be retried only after waiting for a certain time, so that the purposes of protecting the expansion desktop and related applications thereon and protecting the privacy and safety of users are achieved.
Therefore, when the authentication is passed, the application icon which is in the hidden state before can be displayed, so that the user can click the icon and start the application program corresponding to the icon. And under the condition that the authentication is not passed, the application icons included in the extension desktop can be hidden, so that the applications are not seen by others, and the privacy and the safety of the user are protected.
In one embodiment, after switching the at least one desktop icon included in the extended desktop from the hidden state to the displayed state, if the user wishes to hide the application icon on the extended desktop again, the user may perform a screen locking operation, for example. The screen locking operation can trigger a screen locking instruction. The terminal can receive a screen locking instruction, switch the at least one desktop icon from a display state to a hidden state based on the screen locking instruction, and can also hide the extended desktop. Therefore, the extended desktop and the application icons included in the extended desktop are hidden, and the purpose of protecting the privacy of the user is achieved.
In other embodiments, the extended desktop and the application icons included therein can be hidden through other user operations. For example, sliding out the extended desktop up/down/left/right, touching a multitasking button and ending the extended desktop, etc., which is not limited in this application.
In this embodiment of the application, before displaying the extended desktop including the display control area to enable the user to perform the display control, the user may be allowed to perform setting to set the extended desktop and the display control area.
By way of example, an extended desktop can be displayed, for example, where a setup area can be included on the extended desktop. The user may input authentication information via the setting area, and the terminal may receive the authentication information input via the setting area. Wherein the verification information can be used for identity authentication of the login information as described above. Then authenticating the login information may be implemented as: matching the input login information with the verification information; if the identity authentication is matched, the identity authentication is determined to be passed; and if the identity authentication is not matched, determining that the identity authentication fails. Therefore, only the user or other users with known verification information are allowed to log in and view the application icons included on the extension desktop through identity authentication, and therefore privacy and safety of the user are protected.
The set authentication information corresponds to the set region currently displayed. For example, if the setting area includes the password input area, the authentication information includes a password corresponding to the password input area; if the setting area comprises the fingerprint input area, the verification information comprises a fingerprint corresponding to the fingerprint input area; if the setting area comprises the gesture input area, the verification information comprises a gesture corresponding to the gesture input area; if the setting area includes the voice input area, the verification information includes a keyword and/or a voiceprint corresponding to the voice input area. Therefore, the user can freely select and set according to the self needs, a control mode of the verification information based on different requirements is provided, more interestingness is improved, and user experience is improved.
By way of example, FIG. 4 is a diagram of an extended desktop including a setup region according to one embodiment of the present application.
As shown in fig. 4, an extended desktop 201 is currently displayed on the display screen of the user terminal 200, the extended desktop 201 includes a setting area 204 thereon, and the setting area 204 includes a password input area. The user may input a password via the password input area, and the password may be used as authentication information for authenticating login information input later.
in addition, in the embodiment of the application, the extended desktop itself may also have a display state and/or a hidden state, and the extended desktop may be displayed or hidden through user operation. The user operation may be a specific operation preset by a terminal device manufacturer, may also be one of multiple operations provided by the terminal device manufacturer, and may also be a specific operation set by a user in a personalized manner, which is not limited in the present application. Therefore, only the user with the identity authentication passing is allowed to call out or hide the extension desktop, and other people cannot see the extension desktop and some application icons included in the extension desktop at will, so that the problem that the icons are displayed to cause user information leakage is avoided.
As an example, the user operation of causing the extended desktop to be displayed may be, for example, an action of pressing a predetermined contact point at the bottom of the touch screen with a double finger and simultaneously sliding from the bottom of the touch screen to the top of the touch screen to reach or exceed a middle position of the touch screen. When the terminal device detects that the user performs the operation, an instruction for viewing the extended desktop can be triggered. After receiving the instruction of viewing the extended desktop, the terminal device can display the extended desktop. Thereby, the extended desktop is displayed.
Fig. 5A is a schematic diagram of a desktop calling extension according to an embodiment of the present application.
As shown in fig. 5A, a system desktop 205 is currently displayed on a display screen (touch screen) of the user terminal 200, and a plurality of applications (application E, application F, application H, application I, application J, etc.) are included on the system desktop 205. The user may, for example, press with two fingers a predetermined contact point 207 on the bottom of the touch screen and simultaneously slide from the bottom of the touch screen in a direction towards the top of the touch screen to or beyond the middle of the touch screen and release his hands. This user operation may trigger an instruction to view the extended desktop, in response to which the extended desktop 201, as described in fig. 2 or 4, may be presented to the user. As shown in FIG. 5B, the predetermined point of contact 207 that triggers the invocation of the extended desktop may be located, for example, in the two gaps between the three buttons, multitasking button 210, main menu button 211, and back button 212.
If the user has not set the verification information for the extended desktop at this time, a setting area (as shown in fig. 4) may be included on the currently displayed extended desktop. If the user has set the verification information for the extended desktop at this time, a display control area (as shown in fig. 2) may be included on the currently displayed extended desktop. Thus, the user can display the application icon on the extended desktop by inputting the login information through the display control area, or can set the display control of the icon on the extended desktop by inputting the authentication information through the setting area.
in view of the fact that the user may need to modify the verification information, in the embodiment of the present application, the displayed extended desktop may further include a modification entry for modifying the verification information, and the user may modify, for example, the set verification information through the modification entry. The modification entry may, for example, allow a user to make modifications to passwords, fingerprints, gestures, keywords, and/or voiceprints, faces, etc. of information. The terminal device may receive modification information input via the modification and use the modification information as new authentication information. On the basis of the new verification information, the login information input by the user later can be authenticated. In this way, the user can, for example, modify the authentication information periodically, thereby further improving the security of the extended desktop and the display of the application icons thereon.
It should be understood that the modification entrance provided in the extended desktop is only an example of the modification manner of the present application, and is not limited thereto. The verification information can also be modified in other ways, such as voice call-out modification entry, which is not described herein again.
In addition, for an application icon that the user desires to hide, it may also cause the application icon that the user desires to hide to be hidden through its user operation. The user operation may trigger an instruction to hide the desktop icon, and in response to the instruction to hide the desktop icon, the corresponding desktop icon may be hidden. In response to the instruction for hiding the desktop icon, the desktop icon set to be hidden and the data information corresponding to the desktop icon set to be hidden may be stored in the cache database corresponding to the extended desktop, and the desktop icon set to be hidden and the data information corresponding to the desktop icon set to be hidden may be deleted from the desktop database. The data information corresponding to the desktop icon includes but is not limited to at least one of the following: the name of the application corresponding to the desktop icon; the package name of the application corresponding to the desktop icon; and the starting class name of the application corresponding to the desktop icon. Therefore, the desktop is refreshed, the hidden application icons cannot be displayed on the desktop, and the application icons which are set to be hidden can be displayed on the extended desktop after the authentication is passed.
On this basis, if the user desires to restore the display of the application icon that has been set to be hidden, it can also be restored by user operation. The user operation can trigger an instruction of restoring the desktop icon, and the corresponding desktop icon can be restored to be displayed on the desktop in response to the instruction of restoring the desktop icon. And in response to the desktop icon restoring instruction, restoring the desktop icon and the data information corresponding to the desktop icon in the desktop database, and deleting the restored desktop icon and the data information corresponding to the desktop icon from the cache database corresponding to the extended desktop. The data information corresponding to the desktop icon includes but is not limited to at least one of the following: the name of the application corresponding to the desktop icon; the package name of the application corresponding to the desktop icon; and the starting class name of the application corresponding to the desktop icon. Thus, refreshing the desktop will display the restored desktop icons on the desktop, and will not display the restored desktop icons on the extended desktop even if authentication passes. Further, when the user clicks an application icon on the extension desktop, the application can be started and the user can experience the related service based on the stored information such as the package name and the start class name of the application.
Therefore, display setting of any application icon can be conveniently achieved through the user operation of the hidden desktop icon and the user operation of the recovered desktop icon, great convenience is brought to a user, and user experience is improved.
the user operation of the above-mentioned instruction for triggering the hidden desktop icon can have various implementation manners. As an example, the instruction to hide the desktop icon may be triggered by at least one of the following user actions: moving the desktop icon from the original display desktop to the extended desktop; adding the desktop icon to a hidden setting list; long-pressing the desktop icon and selecting hidden settings from the displayed list of settings, etc.
the user operation of the instruction for triggering the recovery of the desktop icon may also be implemented in various ways. As an example, the instruction to restore the desktop icon may be triggered by at least one of the following user actions: moving the desktop icon from the extended desktop to a display desktop; deleting the desktop icon from a hidden setting list; and long-pressing the desktop icon and selecting display settings from the displayed setting list, and the like.
In other words, the user operation of the instruction for triggering the hidden desktop icon and the user operation of the instruction for triggering the recovery desktop icon may have various implementation manners, and may be opposite operations, which is not limited in the present application.
So far, the display control method of the desktop icon of the present application has been described in detail with reference to fig. 1 to 5.
in another embodiment, the method for controlling the display of the desktop icon may be implemented by a display control apparatus.
Fig. 6 is a schematic diagram of a display control apparatus for desktop icons according to an embodiment of the present application.
As shown in fig. 6, the display control apparatus 600 may include an extended desktop display unit 610, an information receiving unit 620, an identity authentication unit 630, and a display control unit 640.
The extended desktop display unit 610 may be configured to display an extended desktop, where the extended desktop includes a display control area, and at least one desktop icon included in the extended desktop is in a hidden state when the display control area is displayed. The information receiving unit 620 may be used to receive login information input via the display control area. The identity authentication unit 630 may be configured to authenticate the login information. The display control unit 640 may be configured to switch the at least one desktop icon included in the extended desktop from a hidden state to a displayed state when the authentication is passed.
in one embodiment, the display control area includes at least one of a password input area, a fingerprint input area, a gesture input area, a voice input area, a face recognition area. If the display control area comprises the password input area, the login information comprises a password corresponding to the password input area; if the display control area comprises the fingerprint input area, the login information comprises a fingerprint corresponding to the fingerprint input area; if the display control area comprises the gesture input area, the login information comprises a gesture corresponding to the gesture input area; if the display control area comprises the voice input area, the login information comprises a keyword and/or a voiceprint corresponding to the voice input area; and if the display control area comprises the face recognition area, the login information comprises a face corresponding to the face recognition area.
In one embodiment, before displaying the extended desktop including the display control area, the extended desktop display unit 610 may be further configured to display an extended desktop including the setting area. The information receiving unit 620 may receive authentication information input via the setting region. The identity authentication unit 630 performing identity authentication on the login information may include: matching the input login information with the verification information; if the identity authentication is matched, the identity authentication is determined to be passed; and if the identity authentication is not matched, determining that the identity authentication fails.
In one embodiment, the display control apparatus may further include an instruction receiving unit. Before the extended desktop is displayed, the instruction receiving unit can also receive an instruction for viewing the extended desktop, wherein the instruction for viewing the extended desktop is triggered by an action that a user presses a preset contact point at the bottom of the touch screen with two fingers and slides to or beyond the middle position of the touch screen from the bottom of the touch screen to the top of the touch screen.
In one embodiment, the extended desktop further includes a modification entry for modifying the verification information, and the information receiving unit 620 may receive modification information input via the modification entry.
In one embodiment, the display control apparatus may further include an instruction receiving unit and a storage unit. The instruction receiving unit may receive an instruction to hide the desktop icon. The storage unit may store the desktop icon set as hidden and the corresponding data information thereof in a cache database corresponding to the extended desktop in response to the instruction to hide the desktop icon, and delete the desktop icon set as hidden and the corresponding data information thereof from the desktop database.
In one embodiment, the instruction receiving unit may receive an instruction to restore the desktop icon. The storage unit may store the restored desktop icon and the corresponding data information thereof in a desktop database in response to the instruction to restore the desktop icon, and delete the restored desktop icon and the corresponding data information thereof from the cache database corresponding to the extended desktop.
In one embodiment, the instruction to hide the desktop icon is triggered by at least one of the following user actions: moving the desktop icon from the original display desktop to the extended desktop; and adding the desktop icon to a hidden setting list. The command for restoring the desktop icon is triggered by at least one of the following user operations: moving the desktop icon from the extended desktop to a display desktop; and deleting the desktop icon from a hidden setting list.
In one embodiment, the data information corresponding to the desktop icon includes at least one of the following items: the name of the application corresponding to the desktop icon; the package name of the application corresponding to the desktop icon; and the starting class name of the application corresponding to the desktop icon.
In one embodiment, after the at least one desktop icon included in the extended desktop is switched from the hidden state to the display state, the instruction receiving unit may receive a screen locking instruction; the display control unit 640 may switch the at least one desktop icon from a display state to a hidden state based on the screen locking instruction, and hide the extended desktop.
The functions implemented by the display control device are the same as or similar to those of the display control method described above with reference to fig. 1 to 5, and specific implementation details can be referred to the above description, and are not repeated herein.
Having described a method and apparatus for controlling display of desktop icons according to an exemplary embodiment of the present application, a computing device according to another exemplary embodiment of the present application is described next.
As will be appreciated by one skilled in the art, aspects of the present application may be embodied as a system, method or program product. Accordingly, various aspects of the present application may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
In some possible implementations, a computing device according to the present application may include at least one processor, and at least one memory. The storage stores program codes, and when the program codes are executed by the processor, the processor executes the steps of the method for controlling the display of the desktop icon according to the various exemplary embodiments of the present application. For example, the processor may perform steps S110-S140 as shown in FIG. 1.
the computing device 130 according to this embodiment of the present application is described below with reference to fig. 7. The computing device 130 shown in fig. 7 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present application.
As shown in fig. 7, computing device 130 is embodied in the form of a general purpose computing device. Components of computing device 130 may include, but are not limited to: the at least one processor 131, the at least one memory 132, and a bus 133 that connects the various system components (including the memory 132 and the processor 131).
Bus 133 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.
the memory 132 may include readable media in the form of volatile memory, such as Random Access Memory (RAM)1321 and/or cache memory 1322, and may further include Read Only Memory (ROM) 1323.
Memory 132 may also include a program/utility 1325 having a set (at least one) of program modules 1324, such program modules 1324 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
computing device 130 may also communicate with one or more external devices 134 (e.g., keyboard, pointing device, etc.), with one or more devices that enable a user to interact with computing device 130, and/or with any devices (e.g., router, modem, etc.) that enable computing device 130 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 135. Also, computing device 130 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via network adapter 136. As shown, network adapter 136 communicates with other modules for computing device 130 over bus 133. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computing device 130, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
In some possible embodiments, aspects of a method for controlling display of a desktop icon provided by the present application may also be implemented in the form of a program product including program code for causing a computer device to perform the steps of a method for controlling display of a desktop icon according to various exemplary embodiments of the present application described above in this specification when the program product is run on the computer device, for example, the computer device may perform steps S110-S140 as shown in fig. 1.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product for display control of desktop icons of embodiments of the present application may employ a portable compact disk read only memory (CD-ROM) and include program code, and may be run on a computing device. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device over any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., over the internet using an internet service provider).
it should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
these computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
these computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
while the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (13)
1. A display control method of a desktop icon, the method comprising:
displaying an extended desktop, wherein the extended desktop comprises a display control area, and at least one desktop icon included in the extended desktop is in a hidden state when the display control area is displayed;
Receiving login information input via the display control area;
Performing identity authentication on the login information;
And when the authentication is passed, switching the at least one desktop icon included in the extended desktop from a hidden state to a display state.
2. The method of claim 1, wherein the display control area comprises at least one of a password input area, a fingerprint input area, a gesture input area, a voice input area, a face recognition area,
If the display control area comprises the password input area, the login information comprises a password corresponding to the password input area;
If the display control area comprises the fingerprint input area, the login information comprises a fingerprint corresponding to the fingerprint input area;
If the display control area comprises the gesture input area, the login information comprises a gesture corresponding to the gesture input area;
If the display control area comprises the voice input area, the login information comprises a keyword and/or a voiceprint corresponding to the voice input area;
and if the display control area comprises the face recognition area, the login information comprises a face corresponding to the face recognition area.
3. The method of claim 1, wherein prior to displaying the extended desktop including the display control area, the method further comprises:
Displaying an extended desktop, the extended desktop including a setting area; and
Receiving authentication information input via the setting area;
Wherein, the identity authentication of the login information comprises:
Matching the input login information with the verification information;
If the identity authentication is matched, the identity authentication is determined to be passed;
And if the identity authentication is not matched, determining that the identity authentication fails.
4. the method of any of claims 1-3, wherein prior to displaying the extended desktop, the method further comprises:
an instruction to view the extended desktop is received,
The command for viewing the extended desktop is triggered by the action that a user presses a preset contact point at the bottom of the touch screen by two fingers and slides to or beyond the middle position of the touch screen from the bottom of the touch screen to the top of the touch screen at the same time.
5. The method of claim 4, wherein the extended desktop further comprises a modification portal that modifies the verification information, the method further comprising:
Receiving modification information input via the modification portal.
6. the method of claim 1, further comprising:
Receiving an instruction of hiding the desktop icon;
in response to the desktop icon hiding instruction, storing the desktop icons set to be hidden and the corresponding data information thereof in a cache database corresponding to the extended desktop; and
And deleting the desktop icon which is set to be hidden and the corresponding data information from the desktop database.
7. The method of claim 6, further comprising:
Receiving an instruction for restoring the desktop icon;
Responding to the desktop icon restoring instruction, and storing the restored desktop icons and corresponding data information in a desktop database; and
And deleting the recovered desktop icon and the corresponding data information from the cache database corresponding to the extended desktop.
8. The method according to claim 6 or 7,
The instruction for hiding the desktop icon is triggered by at least one of the following user operations:
moving the desktop icon from the original display desktop to the extended desktop;
adding the desktop icon to a hidden setting list;
the command for restoring the desktop icon is triggered by at least one of the following user operations:
Moving the desktop icon from the extended desktop to a display desktop;
And deleting the desktop icon from a hidden setting list.
9. The method of claim 6 or 7, wherein the data information corresponding to the desktop icon comprises at least one of the following items:
the name of the application corresponding to the desktop icon;
The package name of the application corresponding to the desktop icon;
and the starting class name of the application corresponding to the desktop icon.
10. The method of claim 1, wherein after switching the at least one desktop icon comprised by the extended desktop from a hidden state to a displayed state, the method further comprises:
receiving a screen locking instruction;
And switching the at least one desktop icon from a display state to a hidden state based on the screen locking instruction, and hiding the extended desktop.
11. an apparatus for controlling display of a desktop icon, the apparatus comprising:
The extended desktop display unit is used for displaying an extended desktop, the extended desktop comprises a display control area, and at least one desktop icon included in the extended desktop is in a hidden state when the display control area is displayed;
An information receiving unit for receiving login information input via the display control area;
the identity authentication unit is used for performing identity authentication on the login information;
and the display control unit is used for switching the at least one desktop icon included in the extended desktop from a hidden state to a display state when the authentication is passed.
12. A computer-readable medium having stored thereon computer-executable instructions for causing a computer to perform the method of any one of claims 1-10.
13. A computing device, comprising:
At least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910783172.3A CN110554817A (en) | 2019-08-23 | 2019-08-23 | desktop icon display control method and device, readable medium and computing equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910783172.3A CN110554817A (en) | 2019-08-23 | 2019-08-23 | desktop icon display control method and device, readable medium and computing equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110554817A true CN110554817A (en) | 2019-12-10 |
Family
ID=68737991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910783172.3A Pending CN110554817A (en) | 2019-08-23 | 2019-08-23 | desktop icon display control method and device, readable medium and computing equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110554817A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111950012A (en) * | 2020-08-21 | 2020-11-17 | 深信服科技股份有限公司 | Application running method, device and equipment and computer readable storage medium |
CN112631478A (en) * | 2020-12-31 | 2021-04-09 | 深兰科技(上海)有限公司 | Hidden application display method and device, electronic equipment and storage medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223579A1 (en) * | 2009-03-02 | 2010-09-02 | Schwartz Gerry M | Iphone application disguiser |
CN103616981A (en) * | 2013-10-31 | 2014-03-05 | 小米科技有限责任公司 | Application process method, device and mobile terminal |
CN104793849A (en) * | 2015-04-30 | 2015-07-22 | 努比亚技术有限公司 | Application icon display method and device |
CN104834449A (en) * | 2015-05-28 | 2015-08-12 | 广东欧珀移动通信有限公司 | Mobile terminal icon managing method and device |
CN105335048A (en) * | 2015-10-09 | 2016-02-17 | 惠州Tcl移动通信有限公司 | Electron equipment with concealed application icon and application icon conceal method |
CN105955587A (en) * | 2016-06-15 | 2016-09-21 | 广东欧珀移动通信有限公司 | Hidden application icon display method and device |
CN106293729A (en) * | 2016-08-01 | 2017-01-04 | 珠海格力电器股份有限公司 | Method and device for controlling application program in mobile terminal and mobile equipment |
CN106502495A (en) * | 2016-10-19 | 2017-03-15 | 珠海格力电器股份有限公司 | Method and device for accessing desktop in visitor mode |
CN106548051A (en) * | 2016-10-31 | 2017-03-29 | 宇龙计算机通信科技(深圳)有限公司 | The management method of private visit pattern, managing device and terminal |
CN107066864A (en) * | 2017-03-31 | 2017-08-18 | 宇龙计算机通信科技(深圳)有限公司 | A kind of application icon display methods and its equipment |
CN108875394A (en) * | 2018-06-25 | 2018-11-23 | Oppo广东移动通信有限公司 | Electronic device and application control method |
CN109951598A (en) * | 2019-01-18 | 2019-06-28 | 深圳市沃特沃德股份有限公司 | Display methods, device, computer equipment and the storage medium of application interface |
-
2019
- 2019-08-23 CN CN201910783172.3A patent/CN110554817A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223579A1 (en) * | 2009-03-02 | 2010-09-02 | Schwartz Gerry M | Iphone application disguiser |
CN103616981A (en) * | 2013-10-31 | 2014-03-05 | 小米科技有限责任公司 | Application process method, device and mobile terminal |
CN104793849A (en) * | 2015-04-30 | 2015-07-22 | 努比亚技术有限公司 | Application icon display method and device |
CN104834449A (en) * | 2015-05-28 | 2015-08-12 | 广东欧珀移动通信有限公司 | Mobile terminal icon managing method and device |
CN105335048A (en) * | 2015-10-09 | 2016-02-17 | 惠州Tcl移动通信有限公司 | Electron equipment with concealed application icon and application icon conceal method |
CN105955587A (en) * | 2016-06-15 | 2016-09-21 | 广东欧珀移动通信有限公司 | Hidden application icon display method and device |
CN106293729A (en) * | 2016-08-01 | 2017-01-04 | 珠海格力电器股份有限公司 | Method and device for controlling application program in mobile terminal and mobile equipment |
CN106502495A (en) * | 2016-10-19 | 2017-03-15 | 珠海格力电器股份有限公司 | Method and device for accessing desktop in visitor mode |
CN106548051A (en) * | 2016-10-31 | 2017-03-29 | 宇龙计算机通信科技(深圳)有限公司 | The management method of private visit pattern, managing device and terminal |
CN107066864A (en) * | 2017-03-31 | 2017-08-18 | 宇龙计算机通信科技(深圳)有限公司 | A kind of application icon display methods and its equipment |
CN108875394A (en) * | 2018-06-25 | 2018-11-23 | Oppo广东移动通信有限公司 | Electronic device and application control method |
CN109951598A (en) * | 2019-01-18 | 2019-06-28 | 深圳市沃特沃德股份有限公司 | Display methods, device, computer equipment and the storage medium of application interface |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111950012A (en) * | 2020-08-21 | 2020-11-17 | 深信服科技股份有限公司 | Application running method, device and equipment and computer readable storage medium |
CN112631478A (en) * | 2020-12-31 | 2021-04-09 | 深兰科技(上海)有限公司 | Hidden application display method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11574041B2 (en) | User interface for managing access to credentials for use in an operation | |
US10320799B2 (en) | Dynamic multi-user computer configuration settings | |
CA2813172C (en) | Multiple-access-level lock screen | |
US11636192B2 (en) | Secure login with authentication based on a visual representation of data | |
US8875279B2 (en) | Passwords for touch-based platforms using time-based finger taps | |
KR102527291B1 (en) | User terminal apparatus, electronic apparatus, system and control method thereof | |
JP2014502398A (en) | Method for integrating account management functions in input software | |
CN107103224B (en) | Unlocking method and mobile terminal | |
CN110515519A (en) | Show method, equipment and the computer storage medium of reading content | |
CN107370874A (en) | Startup method, mobile terminal and the storage medium of application | |
CN110554817A (en) | desktop icon display control method and device, readable medium and computing equipment | |
US11222104B2 (en) | Verification method, mobile terminal, device, and system | |
CN107851140A (en) | Utilize the method and device of pressure touch generation password | |
WO2016131181A1 (en) | Fingerprint event processing method, apparatus, and terminal | |
US11163883B2 (en) | Enhancing security of a touch screen device | |
US10460094B2 (en) | Method, apparatus, and storage medium for data processing | |
US10433173B2 (en) | Touch movement activation for gaining access beyond a restricted access gateway | |
CN111859461A (en) | Data isolation method and device and electronic equipment | |
US9848331B2 (en) | Augmenting mobile device access control modes with hardware buttons | |
US11687630B2 (en) | Secured authentication techniques with dynamism and connected overlapping inputs from various sources | |
US10803288B2 (en) | Methods and systems for accessing computing systems with biometric identification | |
CN116301402A (en) | Password input method and device | |
CN113986030A (en) | Mouse-based character input method, device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191210 |