Detailed Description
The technical solutions in the embodiments of the present application will be described below clearly with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The method for displaying an application icon, the device for displaying an application icon, the electronic device, and the readable storage medium provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings.
An embodiment of the present application provides a display method of an application icon, and as shown in fig. 1, the display method includes:
102, receiving a first input of a user to the electronic equipment;
104, responding to a first input, displaying at least two first identifications, wherein the first identifications are used for indicating first information;
106, receiving a second input of the target identifier in the at least two first identifiers from the user;
and 108, responding to the second input, and switching the display state of the first application icon under the condition that the first information indicated by the target identification is the same as the second information.
The first application icon is an application icon hidden on a desktop of the electronic device or an application icon of an application program in a non-startable state, switching the display state of the first application icon includes displaying the first application icon on the desktop or controlling the application program corresponding to the first application icon to be in a startable state, and the second information is decryption information of the first application icon preset by a user.
The first input includes, but is not limited to, a click input, a key input, a fingerprint input, a swipe input, a press input, a gesture input, etc., and the second input includes, but is not limited to, a click input, a key input, a swipe input, a press input, etc. Specifically, the manner of the first input and the second input is not particularly limited in the embodiments of the present application, and may be any realizable manner.
In this embodiment, when the user needs to switch the display state of the first application icon, a first input is made to the electronic device. Illustratively, when a user needs to decrypt a first application icon in an encrypted state, a first input is made to the electronic device. The first application icon in the encrypted state is an application icon hidden on a desktop of the electronic device, namely, an undisplayed application icon; the first application icon in the encrypted state may also refer to an application icon of the corresponding application program in a non-bootable state, that is, the user cannot open the corresponding application program through an operation on the application icon.
After receiving the first input, the electronic device displays at least two first identifiers at random, the first identifiers are used for indicating first information, and all the first information indicated by the at least two first identifiers comprises decryption information used for switching display states of the first application icons.
And the electronic equipment determines first information indicated by the target identifier and compares the first information indicated by the target identifier with preset second information, wherein the second information can be decryption information of the first application icon preset by the user. If the two are different, namely the user selects wrong decryption information, the first application icon cannot switch the display state; if the two are the same, i.e. the user has selected the correct decryption information, the first application icon is switched to the display state (e.g. decrypted for the first application icon).
Specifically, in one case, if the first application icon is a hidden application icon, the decryption process is to display the first application icon on the desktop; in another case, if the application program corresponding to the first application icon is currently in the non-bootable state, the decryption process is to convert the application program corresponding to the first application icon into the bootable state.
It should be noted that, in the embodiment of the present application, receiving a first input of a user to an electronic device includes receiving a first input of a user to a desktop or a lock screen interface of the electronic device. That is to say, the embodiment of the application is suitable for desktop unlocking or screen locking unlocking, and a user may trigger decryption operation on the first application icon after unlocking the screen of the electronic device into the desktop, or may trigger decryption operation on the first application icon in the screen locking interface of the electronic device, and then unlock the screen to enter the desktop.
In addition, in this embodiment of the application, the target identifier selected by the user is at least one, that is, the decryption information of the first application icon may be one piece of first information, or may be a combination of a plurality of pieces of first information. The second information comprises words, or characters, or a mixture of words and characters, wherein the characters comprise numbers, letters, operation symbols, punctuation marks or other characters. The first information and the second information are the same, that is, the characters and the sequence of the characters are the same.
In the embodiment of the application, when the display state of the application icon needs to be switched, a user inputs preset decryption information of the application icon through the first identifier randomly displayed on the electronic device, and the display state of the encrypted application icon is switched. On one hand, compared with the scheme of inputting the password by using the fixed display information on the input method in the related technology, surrounding personnel cannot guess the password through the operation process of inputting the password by the user, and the unlocking is more complicated than the unlocking of fingerprints and faces in the related technology, so that the probability of being cracked is reduced, and the application safety is improved; on the other hand, the encrypted application icon is separately provided with an encrypted password different from the screen locking password, and if the encrypted application program needs to be operated, two passwords (the screen locking password and the password of the application icon) need to be unlocked, the unlocking difficulty is increased, and therefore the application safety is improved.
In one embodiment of the present application, the second information is a combination of numbers and letters, operators, punctuation marks or other characters, or the second information is any one of letters, operators, punctuation marks or other characters, that is, the second information cannot contain only numbers. Through the method, compared with the setting of a digital password in the related technology, the method is more complex, more difficult to crack and higher in safety.
Further, in an embodiment of the present application, the number of the at least two first identifiers when the display state of the first application icon is switched i times is not equal to the number of the at least two first identifiers when the display state of the first application icon is switched i + j times; or the display positions of the at least two first identifications when the display state of the first application icon is switched for the ith time are different from the display positions of the at least two first identifications when the display state of the first application icon is switched for the (i + j) th time; wherein i and j are positive integers.
In the embodiment, an unlocking page is called up through a first input in scenes such as a desktop and a lock screen, at least two first identifications are randomly displayed on the desktop or a lock screen interface after the unlocking scene is entered, and the number of the first identifications or the display positions of the first identifications displayed in the current unlocking scene is different from the number of the first identifications or the display positions of the first identifications displayed in the last or last unlocking scenes.
For example, 5 first marks are displayed when the application icon is unlocked for the first time, and 8 first marks are displayed when the application icon is unlocked for the second time. I.e. the number of first identifiers displayed each time it is unlocked is random. Or the display positions of the first identifiers are also random, when the application icon is unlocked for the first time, the display positions of the 6 first identifiers in theidentifier display window 202 are shown in fig. 2, and when the application icon is unlocked for the second time, the display positions of the 6 first identifiers in theidentifier display window 202 are shown in fig. 3.
By the method, the decryption information is more difficult to predict, and the cracking difficulty is improved.
Further, in one embodiment of the present application, displaying at least two first indicia in response to the first input includes: and responding to the first input, and displaying at least two second application icons on the desktop of the electronic equipment as at least two first identifiers, wherein the second application icons are application icons displayed on the desktop.
In this embodiment, after receiving the first input, at least two first identifiers are displayed, and the first identifiers are converted by application icons (i.e., second application icons) currently displayed on the desktop of the electronic device, that is, the display forms of at least two of the application icons currently displayed on the desktop of the electronic device are converted into the first identifiers.
Exemplarily, the electronic device displays a desktop as shown in fig. 4, the user calls out an unlocking page by using a preset gesture, and after entering an unlocking scene, as shown in fig. 5, 8 application icons on the desktop are automatically changed into different characters. As shown in fig. 6, when the user sequentially clicks "me", "love", "ancestor" country ", decryption of the application icon is realized, and as shown in fig. 7, a thirteenth application and a fourteenth application which were previously hidden are displayed on the desktop.
It should be noted that the number of application icon transformations is random and the positions of the transformed application icons are random at each decryption.
In the embodiment of the application, the application icon displayed on the desktop is converted into the first identifier to be displayed, so that the first identifier is mixed to be displayed in the application icon, the concealment performance of the first identifier is improved, the security of decryption information input is improved, and the difficulty of decryption is increased.
In addition, in another embodiment of the present application, instead of translating the application icon displayed on the desktop, as shown in fig. 2 or 3, after receiving the first input, thelogo display window 202 pops up, and at least two first logos are displayed in thelogo display window 202.
Further, in an embodiment of the present application, in response to a second input, in a case where the first information indicated by the target identifier is the same as the second information, switching the display state of the first application icon includes: responding to a second input, and displaying a preset folder under the condition that the first information indicated by the target identifier is the same as the second information, wherein the preset folder comprises at least one third application icon; receiving a third input of the first application icon in the at least one third application icon from the user; in response to a third input, switching a display state of the first application icon.
The third input includes, but is not limited to, a click input, a key input, a slide input, a press input, and the like, and specifically, the manner of the third input is not specifically limited in the embodiments of the present application, and may be any realizable manner.
In this embodiment, when the decryption information selected by the user is correct, a preset folder is displayed, where the preset folder includes at least one third application icon, and the third application icon is an application icon that needs to be hidden on the desktop or an application icon that needs the corresponding application program to be in a non-bootable state and is set by the user in advance. And the user further selects a first application icon from the preset folder for switching the display state through a third input.
Illustratively, as shown in fig. 6, when the user correctly clicks "me", "love", "ancestor", and "country", as shown in fig. 8, a folder of "encryption application" is displayed. When the user drags the icons of the thirteenth application and the fourteenth application in the folder to the outside of the folder, the interface shown in fig. 7 is displayed, and the icons of the thirteenth application and the fourteenth application are displayed on the desktop.
According to the embodiment of the application, the preset folder comprising the third application icon is displayed, so that a user can know all applications set to be encrypted, and the user can conveniently select the application needing to be switched to the display state.
Further, in an embodiment of the present application, before receiving the first input of the user to the electronic device, the method further includes: receiving a fifth input that a user inputs second information on an application hidden setting interface of the electronic equipment; in response to a fifth input, second information is stored.
In this embodiment, the user needs to preset the second information, that is, the encryption or decryption information of the first application icon. Specifically, the second information is input in the application hidden setting interface (that is, the password setting interface), so that the setting of the second information is realized.
Illustratively, as shown in fig. 9, the method of setting encryption information includes:
and step 902, entering a setting application of the electronic equipment, and opening a setting item hidden by the application.
As shown in fig. 10, the user clicks the setting item of "application hide" under the "security and privacy" interface in the setting application of the electronic device.
Step 904, enter an encryption or decryption password.
As shown in fig. 11, the user enters a four-digit password under the "application hide" interface.
It should be noted that the hidden setting interface of the application is not necessarily entered through the setting application of the electronic device, and may also be entered directly through triggering by gestures or the like on the desktop.
Through the mode, the encryption password different from the screen locking password is independently set for the application icon, and if the application program with secret needs to be operated, the two passwords (the screen locking password and the password of the application icon) need to be unlocked, the unlocking difficulty is increased, and therefore the application safety is improved.
Further, in an embodiment of the present application, before receiving the first input of the user to the electronic device, the method further includes: receiving a fourth input of a first application icon in application icons of the electronic equipment from a user on an application hidden setting interface of the electronic equipment; in response to the fourth input, hiding the first application icon on the desktop of the electronic device or controlling an application program corresponding to the first application icon to be in a non-bootable state.
The fourth input includes, but is not limited to, a click input, a key input, a slide input, a press input, and the like, and specifically, the fifth input mode in the embodiment of the present application is not particularly limited, and may be any realizable mode.
In this embodiment, the user needs to set an application for encryption in advance. Specifically, a fourth input is performed on the application hiding setting interface, so that an application which wants to be encrypted is selected, and encryption setting of the application is realized.
Illustratively, clicking a control of "setting a hidden application" on the interface shown in fig. 11, entering the interface shown in fig. 12, displaying the applications installed on the electronic device, and clicking a thirteenth application, a fourteenth application, a fifteenth application and a sixteenth application by a user to implement encryption settings for the above-mentioned 4 applications.
It should be noted that the number of applications of encryption is not limited, and may be one or more. The order of the encryption application and the encryption password is not limited.
By the method, the user can conveniently set the application needing encryption.
According to the application icon display method provided by the embodiment of the application icon, the execution main body can be a display device of the application icon. In the embodiment of the present application, a method for displaying an application icon by using a display device for an application icon is taken as an example, and the display device for an application icon provided in the embodiment of the present application is described.
An embodiment of the present application provides a display apparatus for application icons, as shown in fig. 13, thedisplay apparatus 1300 for application icons includes:
areceiving module 1302, configured to receive a first input of an electronic device from a user;
adisplay module 1304 for displaying at least two first identifiers in response to a first input, the first identifiers being indicative of first information;
thereceiving module 1302 is further configured to receive a second input of the target identifier in the at least two first identifiers from the user;
thedisplay module 1304 is further configured to switch a display state of the first application icon in response to the second input if the first information indicated by the target identifier is the same as the second information.
The first application icon is an application icon hidden on a desktop of the electronic device or an application icon of an application program in a non-startable state, switching the display state of the first application icon includes displaying the first application icon on the desktop or controlling the application program corresponding to the first application icon to be in a startable state, and the second information is decryption information of the first application icon preset by a user.
In this embodiment, when the user needs to switch the display state of the first application icon, a first input is made to the electronic device. Illustratively, when a user needs to decrypt a first application icon in an encrypted state, a first input is made to the electronic device. The first application icon in the encrypted state is an application icon hidden on a desktop of the electronic device, namely, an undisplayed application icon; the first application icon in the encrypted state may also refer to an application icon of the corresponding application program in a non-bootable state, that is, the user cannot open the corresponding application program through an operation on the application icon.
After receiving the first input, the electronic device displays at least two first identifiers at random, the first identifiers are used for indicating first information, and all the first information indicated by the at least two first identifiers comprises decryption information used for switching display states of the first application icons.
And the electronic equipment determines first information indicated by the target identifier and compares the first information indicated by the target identifier with preset second information, wherein the second information can be decryption information of the first application icon preset by the user. If the two are different, namely the user selects wrong decryption information, the first application icon cannot switch the display state; if the two are the same, i.e. the user selects the correct decryption information, the first application icon is switched to the display state (e.g. the first application icon is decrypted).
Specifically, in one case, if the first application icon is a hidden application icon, the decryption process is to display the first application icon on the desktop; in another case, if the application program corresponding to the first application icon is currently in the non-bootable state, the decryption process is to convert the application program corresponding to the first application icon into the bootable state.
In the embodiment of the application, when the display state of the application icon needs to be switched, a user inputs preset decryption information of the application icon through the first identifier randomly displayed on the electronic device, and the display state of the encrypted application icon is switched. On one hand, compared with the scheme of inputting the password by using the fixed display information on the input method in the related technology, surrounding personnel cannot guess the password through the operation process of inputting the password by the user, and the unlocking is more complicated than the unlocking of fingerprints and faces in the related technology, so that the probability of being cracked is reduced, and the application safety is improved; on the other hand, the encrypted application icon is separately provided with an encrypted password different from the screen locking password, and if the encrypted application program needs to be operated, two passwords (the screen locking password and the password of the application icon) need to be unlocked, the unlocking difficulty is increased, and therefore the application safety is improved.
Further, in an embodiment of the present application, the number of the at least two first identifiers when the display state of the first application icon is switched i times is not equal to the number of the at least two first identifiers when the display state of the first application icon is switched i + j times; or the display positions of the at least two first identifications when the display state of the first application icon is switched for the ith time are different from the display positions of the at least two first identifications when the display state of the first application icon is switched for the (i + j) th time; wherein i and j are positive integers.
Further, in an embodiment of the application, the display module is specifically configured to display at least two second application icons on the desktop of the electronic device as at least two first identifiers in response to the first input, where the second application icons are application icons displayed on the desktop.
Further, in an embodiment of the application, the display module is further configured to, in response to a second input, display a preset folder in the case that the first information indicated by the target identifier is the same as the second information, where the preset folder includes at least one third application icon; the receiving module is further used for receiving a third input of the user to the first application icon in the at least one third application icon; and the display module is specifically used for responding to the third input and switching the display state of the first application icon.
Further, in an embodiment of the application, the receiving module is further configured to receive a fourth input of the user to the first application icon in the application icons of the electronic device on the application hidden setting interface of the electronic device; the display module is further used for responding to a fourth input, and hiding the first application icon on the desktop of the electronic equipment or controlling an application program corresponding to the first application icon to be in a non-startable state.
The display device of the application icon in the embodiment of the present application may be an electronic device, or may be a component in the electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. The electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The display device of the application icon in the embodiment of the present application may be a device having an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, which is not specifically limited in the embodiment of the present application.
The display device for the application icon provided in the embodiment of the present application can implement each process implemented in the display method embodiment for the application icon in fig. 1, and is not described here again to avoid repetition.
Optionally, as shown in fig. 14, anelectronic device 1400 is further provided in the embodiment of the present application, and includes aprocessor 1402 and amemory 1404, where thememory 1404 stores a program or an instruction that can be executed on theprocessor 1402, and when the program or the instruction is executed by theprocessor 1402, the steps of the embodiment of the method for displaying an application icon are implemented, and the same technical effects can be achieved, and are not described again here to avoid repetition.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic device and the non-mobile electronic device described above.
Fig. 15 is a schematic hardware structure diagram of an electronic device implementing an embodiment of the present application.
Theelectronic device 1500 includes, but is not limited to: aradio frequency unit 1502, anetwork module 1504, anaudio output unit 1506, aninput unit 1508, asensor 1510, adisplay unit 1512, auser input unit 1514, aninterface unit 1516, amemory 1518, and aprocessor 1520.
Those skilled in the art will appreciate that theelectronic device 1500 may also include a power supply (e.g., a battery) for powering the various components, which may be logically coupled to theprocessor 1520 via a power management system to perform the functions of managing charging, discharging, and power consumption via the power management system. The electronic device structure shown in fig. 15 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
Auser input unit 1514, configured to receive a first input from a user to the electronic device; adisplay unit 1512 for displaying at least two first identifiers in response to a first input, the first identifiers being used to indicate first information; auser input unit 1514, further configured to receive a second input by the user to a target identifier of the at least two first identifiers; thedisplay unit 1512 is further configured to switch the display state of the first application icon in response to the second input if the first information indicated by the target identifier is the same as the second information.
The first application icon is an application icon hidden on a desktop of the electronic device or an application icon of an application program in a non-startable state, switching the display state of the first application icon includes displaying the first application icon on the desktop or controlling the application program corresponding to the first application icon to be in a startable state, and the second information is decryption information of the first application icon preset by a user.
In this embodiment, when the user needs to switch the display state of the first application icon, a first input is made to the electronic device. Illustratively, when a user needs to decrypt a first application icon in an encrypted state, a first input is made to the electronic device. The first application icon in the encrypted state is an application icon hidden on a desktop of the electronic device, namely, an undisplayed application icon; the first application icon in the encrypted state may also refer to an application icon of the corresponding application program in a non-bootable state, that is, the user cannot open the corresponding application program through an operation on the application icon.
After receiving the first input, the electronic device displays at least two first identifiers at random, the first identifiers are used for indicating first information, and all the first information indicated by the at least two first identifiers comprises decryption information used for switching display states of the first application icons.
And the electronic equipment determines first information indicated by the target identifier and compares the first information indicated by the target identifier with preset second information, wherein the second information can be decryption information of the first application icon preset by the user. If the two are different, namely the user selects wrong decryption information, the first application icon cannot switch the display state; if the two are the same, i.e. the user selects the correct decryption information, the first application icon is switched to the display state (e.g. the first application icon is decrypted).
Specifically, in one case, if the first application icon is a hidden application icon, the decryption process is to display the first application icon on the desktop; in another case, if the application program corresponding to the first application icon is currently in the non-bootable state, the decryption process is to convert the application program corresponding to the first application icon into the bootable state.
In the embodiment of the application, when the display state of the application icon needs to be switched, a user inputs preset decryption information of the application icon through the first identifier randomly displayed on the electronic device, and the display state of the encrypted application icon is switched. On one hand, compared with the scheme of inputting the password by using the fixed display information on the input method in the related technology, surrounding personnel cannot guess the password through the operation process of inputting the password by the user, and the unlocking is more complicated than the unlocking of fingerprints and faces in the related technology, so that the probability of being cracked is reduced, and the application safety is improved; on the other hand, the encrypted application icon is separately provided with an encrypted password different from the screen locking password, and if the encrypted application program needs to be operated, two passwords (the screen locking password and the password of the application icon) need to be unlocked, the unlocking difficulty is increased, and therefore the application safety is improved.
Further, in an embodiment of the present application, the number of the at least two first identifiers when the display state of the first application icon is switched i times is not equal to the number of the at least two first identifiers when the display state of the first application icon is switched i + j times; or the display positions of the at least two first identifications when the display state of the first application icon is switched for the ith time are different from the display positions of the at least two first identifications when the display state of the first application icon is switched for the (i + j) th time; wherein i and j are positive integers.
Further, in an embodiment of the present application, thedisplay unit 1512 is specifically configured to display, in response to the first input, at least two second application icons on the desktop as at least two first identifiers, where the second application icons are application icons displayed on the desktop.
Further, in an embodiment of the application, thedisplay unit 1512 is further configured to, in response to the second input, in a case that the first information indicated by the target identifier is the same as the second information, display a preset folder, where the preset folder includes at least one third application icon; auser input unit 1514 further configured to receive a third input by the user for a first application icon of the at least one third application icon; thedisplay unit 1512 is specifically configured to switch a display state of the first application icon in response to the third input.
Further, in an embodiment of the present application, theuser input unit 1514 is further configured to receive a fourth input, from the user, to the first application icon in the application icons of the electronic device in the application hiding setting interface of the electronic device; thedisplay unit 1512 is further configured to hide the first application icon on the desktop or control an application program corresponding to the first application icon to be in a non-bootable state in response to the fourth input.
It should be understood that in the embodiment of the present application, theinput Unit 1508 may include a Graphics Processing Unit (GPU) 15082 and amicrophone 15084, and theGraphics Processing Unit 15082 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. Thedisplay unit 1512 may include adisplay panel 15122, and thedisplay panel 15122 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. Theuser input unit 1514 includes at least one of atouch panel 15142 andother input devices 15144. Atouch panel 15142, also referred to as a touch screen. Thetouch panel 15142 may include two portions, a touch detection device and a touch controller.Other input devices 15144 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Thememory 1518 may be used to store software programs as well as various data. Thememory 1518 may mainly include a first storage area storing a program or an instruction and a second storage area storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, thememory 1518 may include volatile memory or nonvolatile memory, or thememory 1518 may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct Memory bus RAM (DRRAM). Thememory 1518 in the embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
Processor 1520 may include one or more processing units; optionally, theprocessor 1520 integrates an application processor, which primarily handles operations related to the operating system, user interface, and applications, and a modem processor, which primarily handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into theprocessor 1520.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the embodiment of the display method for an application icon, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device in the above embodiment. Readable storage media, including computer readable storage media such as computer read only memory ROM, random access memory RAM, magnetic or optical disks, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the embodiment of the display method for an application icon, and the same technical effect can be achieved.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
The present application provides a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the foregoing embodiment of the display method for application icons, and can achieve the same technical effects, and in order to avoid repetition, details are not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element identified by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.