Hidden application desktop icon method and device
An icon and user process technology, applied in the field of desktop icons, can solve problems such as applications not running normally
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] Please refer to figure 1 , figure 1 This is a flowchart of a method for hiding desktop icons of applications provided by an embodiment of the present invention, such as figure 1 As shown, the method includes:
[0052] 101: Obtain setting information of the application to be hidden through the user process;
[0053] Specifically, an application can be installed on the front end of the system, and the application can be started when the system is turned on. After the application is started, a user process is constructed. The purpose of the user process is to ensure that the service process can be started. The time-before launcher obtains the setting information of the application to be hidden, which is obtained and generated by the user process, especially refers to the setting information related to the application to be hidden and the corresponding package name and other data.
[0054] 102: According to the setting information, send a broadcast message to delete the applicatio...
Embodiment 2
[0061] The second embodiment is a refinement based on the first embodiment, and provides a detailed application scenario for the method provided in the first embodiment.
[0062] Please refer to figure 2 , figure 2 This is a flowchart of a method for hiding desktop icons of applications provided by an embodiment of the present invention, such as figure 2 As shown, the method includes:
[0063] 201: Obtain setting information of the application to be hidden through the user process;
[0064] This step is consistent with step 101 in the embodiment, and will not be repeated here.
[0065] It should be noted that, for a boot process, the setting information of the application to be hidden is data that has been collected and stored locally by the user process. During the boot process, before the launcher is successfully loaded, the front-end activity component (Activity) of the user process cannot be displayed, because the user process cannot collect data during this process, and the us...
Embodiment 3
[0086] In order to implement the method of hiding the desktop icon of an application provided by the embodiment of the present invention, please refer to image 3 , image 3 It is a schematic diagram of a device for hiding desktop icons of applications provided by an embodiment of the present invention, such as image 3 As shown, the device includes:
[0087] The obtaining unit 301 is configured to obtain setting information of the application to be hidden through the user process;
[0088] The sending unit 302 is configured to send a broadcast message to delete the application to be hidden through the user process according to the setting information;
[0089] The privilege escalation unit 303 performs privilege escalation processing on broadcast messages through a service process with super user privileges, and elevates the privilege of broadcast messages to super user privileges;
[0090] The deleting unit 304 deletes the desktop icon of the application to be hidden on the deskto...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


