Unlock instant, AI-driven research and patent intelligence for your innovation.

Hidden application desktop icon method and device

An icon and user process technology, applied in the field of desktop icons, can solve problems such as applications not running normally

Active Publication Date: 2017-06-30
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Embodiments of the present invention provide a method and device for hiding application desktop icons to solve the technical problem in the prior art that the application cannot run normally when the application desktop icon is hidden

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden application desktop icon method and device
  • Hidden application desktop icon method and device
  • Hidden application desktop icon method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Please refer to figure 1 , figure 1 This is a flowchart of a method for hiding desktop icons of applications provided by an embodiment of the present invention, such as figure 1 As shown, the method includes:

[0052] 101: Obtain setting information of the application to be hidden through the user process;

[0053] Specifically, an application can be installed on the front end of the system, and the application can be started when the system is turned on. After the application is started, a user process is constructed. The purpose of the user process is to ensure that the service process can be started. The time-before launcher obtains the setting information of the application to be hidden, which is obtained and generated by the user process, especially refers to the setting information related to the application to be hidden and the corresponding package name and other data.

[0054] 102: According to the setting information, send a broadcast message to delete the applicatio...

Embodiment 2

[0061] The second embodiment is a refinement based on the first embodiment, and provides a detailed application scenario for the method provided in the first embodiment.

[0062] Please refer to figure 2 , figure 2 This is a flowchart of a method for hiding desktop icons of applications provided by an embodiment of the present invention, such as figure 2 As shown, the method includes:

[0063] 201: Obtain setting information of the application to be hidden through the user process;

[0064] This step is consistent with step 101 in the embodiment, and will not be repeated here.

[0065] It should be noted that, for a boot process, the setting information of the application to be hidden is data that has been collected and stored locally by the user process. During the boot process, before the launcher is successfully loaded, the front-end activity component (Activity) of the user process cannot be displayed, because the user process cannot collect data during this process, and the us...

Embodiment 3

[0086] In order to implement the method of hiding the desktop icon of an application provided by the embodiment of the present invention, please refer to image 3 , image 3 It is a schematic diagram of a device for hiding desktop icons of applications provided by an embodiment of the present invention, such as image 3 As shown, the device includes:

[0087] The obtaining unit 301 is configured to obtain setting information of the application to be hidden through the user process;

[0088] The sending unit 302 is configured to send a broadcast message to delete the application to be hidden through the user process according to the setting information;

[0089] The privilege escalation unit 303 performs privilege escalation processing on broadcast messages through a service process with super user privileges, and elevates the privilege of broadcast messages to super user privileges;

[0090] The deleting unit 304 deletes the desktop icon of the application to be hidden on the deskto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a hidden application desktop icon method and device. The method includes the steps that setting information of application to be hidden is obtained through the user process; according to the setting information, the broadcast message of deleting the application to be hidden is sent to the desktop through the user process; permission elevation processing is carried out on the broadcast message through the service process with the superuser permission, the permission of the broadcast message is elevated to the superuser permission; the desktop icon of the application to be hidden is deleted on the desktop according to the broadcast message with the permission elevated. As the broadcast information has the superuser permission, the desktop icon of the application to be hidden can be deleted on the desktop, and the technical effect of hiding the desktop icon of the application is achieved; as only the desktop icon of the hidden application is deleted in the method provided by the embodiment, and normal operation, such as normal start of the application or start of a background program, of the application is not affected.

Description

Technical field [0001] The present invention relates to the field of electronic technology, in particular to a method and device for hiding desktop icons of applications. Background technique [0002] Taking the Android platform as an example, a mobile terminal device provides a user interface through a launcher to realize human-computer interaction with a user. The launcher provides a desktop on which icons of installed applications can be displayed. By clicking on these icons, you can start the corresponding application. For the need of privacy protection, users sometimes do not want certain applications to be discovered or run by unauthorized persons to protect their personal privacy. In the prior art, the following two methods are generally used for protection: [0003] The first method is to add a program lock to the program. When the user clicks on the relevant icon, a verification program will be run first, and only after the password verification is passed, the real appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/121G06F2221/2141
Inventor 杨威曹阳窦文科符传坚藏春晖
Owner BEIJING QIHOO TECH CO LTD