CN106611113A - Security environment construction method and apparatus - Google Patents
Security environment construction method and apparatus Download PDFInfo
- Publication number
- CN106611113A CN106611113A CN201510686318.4A CN201510686318A CN106611113A CN 106611113 A CN106611113 A CN 106611113A CN 201510686318 A CN201510686318 A CN 201510686318A CN 106611113 A CN106611113 A CN 106611113A
- Authority
- CN
- China
- Prior art keywords
- user
- terminal screen
- print information
- finger print
- touch event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
- Image Input (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a security environment construction method and apparatus. The method comprises the steps of detecting a touch event of a user for a terminal screen when the terminal screen is in an unlocking state; when the user performs touch operation, acquiring fingerprint information of the user through the terminal screen; and when the acquired fingerprint information is matched with pre-stored fingerprint information, making a response to the touch event. According to the scheme, a fingerprint of the user is obtained in the touch operation of the user, and check is finished in a background; when the check is correct, a system can correctly make a response to the user operation; and therefore, a full-time lock of a terminal application environment is constructed without knowledge of the user, a terminal security vacuum period is removed, and the terminal information security is ensured to the maximum extent.
Description
Technical field
The present invention relates to moving communicating field, more particularly to a kind of security context construction method and device.
Background technology
Most intelligent mobile phone terminal users ensure at present mobile phone system using character password or pattern password
The safety of system, but there is the risk revealed in mobile phone pattern password or numerical ciphers.
User can reach the purpose for preventing password from revealing by setting finger-print cipher, however, it is desirable to mobile phone
Upper integrated special fingerprint collecting equipment is acquired to fingerprint, operates comparatively laborious.
Also, all these cryptosecurity is serviced (including pattern password, character password and finger-print cipher),
All it is the security service that " disposable " is provided in unblock, as the use user after unblock, it is impossible to ensure
It is forever validated user, and we can be potentially encountered such situation:Mobile phone unblock after, be in a hurry suddenly and
Put down mobile phone, place to go director's feelings, at this moment, before mobile phone is reached and locks screen automatically the time, mobile phone can be in one
The safe vacuum phase is planted, is very likely usufructuary by disabled user's acquirement mobile phone.
A kind of method of guarantee mobile phone safe is so accomplished by, this method can provide mobile phone screen locking service,
Mobile phone safe cycle in time can be removed again and then ensures being perfectly safe for mobile phone applied environment.In order to reach the purpose,
Current existing scheme is, when user uses mobile phone, using pattern password, numerical ciphers or particular fingerprint
Equipment carries out not timing verification to user, but this verification mode can allow user to feel extremely to dislike.
It can be seen that, existing applied environment safety shield is built upon pattern password, character password and specific
" disposable " safety verification of device-fingerprint password, i.e. one-time authentication passes through, it is just no longer secondary or when distinguish
The security strategy of other user;Even if there is secondary authentication policy, be also using pattern password, character password and
The mode that particular device finger-print cipher is carried out with user mutual, this mode can not in time discover one-time authentication
Whether the use user by after changes, so as to it cannot be guaranteed that mobile phone applied environment and individual privacy it is exhausted
To safety.
The content of the invention
The present invention provides a kind of security context construction method and device, to solve secure side of the prior art
Case has security breaches, and then there is a problem of potential safety hazard.
According to one aspect of the present invention, there is provided a kind of security context construction method, including:
When terminal screen is in released state, touch event of the user to terminal screen is detected;
In user's touch-control, the finger print information of user is constantly gathered by terminal screen;
When the finger print information of collection is matched with the finger print information for prestoring, the touch event is responded.
Alternatively, in the method for the invention, when terminal operating in the secure mode when, if at terminal screen
In released state, then when user is detected to the touch event of terminal screen, in user's touch-control, pass through
Terminal screen constantly gathers the finger print information of user, when the finger print information and the finger print information for prestoring of collection have
Timing, responds to the touch event.
Alternatively, in the method for the invention, the touch event for detecting user to terminal screen,
During user's touch-control, the finger print information of user is constantly gathered by terminal screen, specifically included:
Detect touch event of the user to terminal screen;
Detect whether the touch event is aimed at the touch event of the previously selected protection item of user, be
In the case of, in user's touch-control, the finger print information of user is constantly gathered by terminal screen.
Alternatively, in the method for the invention, the type of the protection item includes:Systems soft ware, Yong Huan
The third party software and user file of dress.
Alternatively, in the method for the invention, when collection finger print information and the finger print information for prestoring not
Timing, not responds to the touch event, and carries out screen locking process.
According to another aspect of the present invention, there is provided a kind of security context construction device, including:
Detection module, for when terminal screen is in released state, detecting user and touching to terminal screen
Control event, triggering fingerprint collecting and correction verification module;
Fingerprint collecting and correction verification module, in user's touch-control, constantly gathering user's by terminal screen
Finger print information, when the finger print information of collection is matched with the finger print information for prestoring, triggers performing module;
Performing module, for responding to the touch event.
Alternatively, in device of the present invention, the detection module, specifically for when terminal operating is in safety
When under pattern, if terminal screen is in released state, touch event of the user to terminal screen is being detected
When, trigger the fingerprint collecting and correction verification module.
Alternatively, in device of the present invention, the detection module, specifically for being in solution in terminal screen
During lock status, touch event of the user to terminal screen is detected, detect whether the touch event is directed to
In the touch event of the previously selected protection item of user, where it has, triggering the fingerprint collecting and school
Test module.
Alternatively, in device of the present invention, the type of the protection item includes:Systems soft ware, Yong Huan
The third party software and user file of dress.
Alternatively, in device of the present invention, the performing module, be additionally operable to when collection finger print information with
When the finger print information for prestoring is mismatched, the touch event is not responded, and carry out screen locking process.
The present invention has the beneficial effect that:
Scheme of the present invention, in user's touch control operation, obtains user fingerprints, and completes verification on backstage,
Verification is correct, and system can correctly respond user operation, realizes in the case of user's unaware, builds
The full-time lock of terminal applied environment is played, terminal security cycle in time is eliminated, terminal letter has farthest been ensured
The safety of breath.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to implementing
Example or the accompanying drawing to be used needed for description of the prior art are briefly described, it should be apparent that, retouch below
Accompanying drawing in stating is only some embodiments of the present invention, for those of ordinary skill in the art, not
On the premise of paying creative labor, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is a kind of flow chart of security context construction method that the embodiment of the present invention one is provided;
Fig. 2 is a kind of flow chart of security context construction method that the present invention is provided using example one;
Fig. 3 is a kind of flow chart of security context construction method that the present invention is provided using example two;
Fig. 4 is a kind of structured flowchart of security context construction device that the embodiment of the present invention two is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly
Chu, it is fully described by, it is clear that described embodiment is only a part of embodiment of the invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creation
Property work under the premise of the every other embodiment that obtained, belong to the scope of protection of the invention.
Embodiment one
The embodiment of the present invention provides a kind of security context construction method, terminal is applied to, as shown in figure 1, described
Method is specifically included:
Step S101, when terminal screen is in released state, detects touch-control thing of the user to terminal screen
Part;
Step S102, in user's touch-control, by terminal screen the finger print information of user is constantly gathered;
Step S103, when the finger print information of collection is matched with the finger print information for prestoring, to the touch-control thing
Part is responded.
In summary, the present invention, by the touch control operation of user, is obtained and used during user's using terminal
The fingerprint at family, and verification is completed on backstage, verification is correct, and system can correctly respond user operation, realizes
In the case of user's unaware, the full-time lock of terminal applies environment is built, farthest ensure
The safety of end message.
In order that the object, technical solutions and advantages of the present invention are clearer, it is given below several concrete and excellent
Embodiment is selected, to the function of refining and optimize the method for the invention.It should be noted that not rushing
In the case of prominent, following feature can be combined mutually.
In order that the solution of the present invention implements more controllable, being exemplified below two can trigger execution this reality
The triggering mode of a methods described is applied, certainly, following triggering mode is simply enumerated, not exhaustive, this area
Technical staff can flexibly be set according to the demand of oneself.
Mode one:Using the present embodiment methods described as a kind of function items that can be closed and open, Yong Hutong
Self-demand is crossed, the corresponding function of the present embodiment methods described is flexibly turned on and off.
Mode two:The present embodiment methods described is implemented under a kind of secure system environment;For example, in user
During start, can select into conventional system environment or secure system environment, it is safe when entering
During system environments (terminal operating is in the secure mode), then just enable the present embodiment methods described automatically.
In a preferred embodiment of the invention, user can be according to the demand of oneself, being directed to some
Application to be protected or content is needed to implement the present embodiment methods described.Now, step S101 is as follows
Implement:When terminal screen is in released state, touch event of the user to terminal screen is detected, detected
Whether the touch event is aimed at the touch event of the previously selected protection item of user, where it has,
Execution step S102 and S103.
Wherein, be directed to user it is previously selected protection item touch event comprising click on open the protection item with
And the protection item open after run duration all touch events.Full-time lock is carried out to the protection item.Wherein,
The type of protection item includes:Systems soft ware, the third party software of user installation and user file etc..
In embodiments of the present invention, in user's touch-control, by screen collection user fingerprints constantly be in order to
Increase fingerprint matching success rate, as long as there is a finger print information to match with the finger print information for prestoring, it is determined that
The match is successful, and touch control operation is responded.
Further, in the embodiment of the present invention, when collection finger print information and the finger print information for prestoring not
Timing, not responds to the touch event, and carries out screen locking process.
The present invention is illustrated in order to clearer, with reference to the flow chart and concrete application example of method to this
It is bright to be described in detail.
Using example one:
This application example describes to carry out constantly school to the touch control operation of user using the method for constantly finger-mark check
The process tested.
Before the method for the invention is implemented, the finger print information of collection validated user in advance is needed, due to user
Custom is different, indefinite with which finger touching screen, preferably gathers the fingerprint letter of all fingers of user
Breath, to increase the match is successful rate.
As shown in Fig. 2 the security context construction method that this application example is provided, specifically includes:
S201:Mobile phone enters opened up secure system environment.
S202:Start fingerprint collecting with correction verification module and in running background;Wherein, fingerprint collecting and calibration mode
Block initiates the concurrent thread of two synchronizations, a collection fingerprint, a matching fingerprint.
S203:Monitoring users touch control operation.
S204:When user's Touch screen, when having touch control operation, collection user fingerprints information is simultaneously carried out simultaneously
Match somebody with somebody, when user's finger frames out, stop the collection of fingerprint and match.
S205:When in S204 finger print information have match at least one times when, execution step S206;Otherwise, hold
Row step S207.
Step S206, system normal response user's touch control operation then proceedes to circulate S203, S204, S205.
Step S207, when information is all mismatched, not responds user operation and screen locking.
Using example two:
This application example is described using the method for constantly finger-mark check to needing every single application to be protected to touch
The control process that verified of operation, this process is different from the constantly verification to whole system, this process only with
Application icon is clicked in family with finger, when starting the single app applications to carry out security protection or content, just enters
Row collection and verification.
As shown in figure 3, the security context construction method that this application example is provided, specifically includes:
S301:Mobile phone enters opened up secure system environment.
S302:Start fingerprint constantly to gather with correction verification module and in running background;Wherein, fingerprint collecting and school
Test the concurrent thread that module initiates two synchronizations, a collection fingerprint, a matching fingerprint.
S303:Monitoring users touch control operation.
S304:When user clicks on application icon, collection user fingerprints information is simultaneously matched simultaneously, and
User's finger frames out, and stops the collection of fingerprint and matches.
S305:When in S304 finger print information have match at least one times when, execution step S306;Otherwise, hold
Row step S307.
Step S306, system normal response user operation starts application.Preferably, after application starts,
S303, S304, S305 are continued cycling through, is protected with the scene after starting to application.
Step S307, when information is all mismatched, not responds the operation and screen locking of user starts application.
In sum, it is known that (do not set after the mobile phone wake-up of conventional cipher or setting is passed after mobile phone normally runs
After the mobile phone unblock of system password), when user is under secure system environment pattern, fingerprint is constantly gathered and verified
The realization of module be by the check system in running background, not with user mutual in the case of (namely
In the case where user is detectable), using handset touch panel when user is operated, touch in finger
Touch screen to start to frameing out, go constantly to gather user fingerprints, and by collection result with prestore
Normal data is contrasted, such as both matchings, then user is validated user, can normally use cell phone system;
If both mismatch, judge that user has occurred and that change, be disabled user, cell phone system will not ring
Answer user's request and screen locking.
Embodiment two
The embodiment of the present invention provides a kind of security context construction device, is applied to terminal, as shown in figure 4, tool
Body includes:
Detection module 410, for when terminal screen is in released state, detecting user to terminal screen
Touch event, triggering fingerprint collecting and correction verification module;
Fingerprint collecting and correction verification module 420, in user's touch-control, by terminal screen user constantly being gathered
Finger print information, when collection finger print information match with the finger print information for prestoring when, trigger performing module;
Performing module 430, for responding to the touch event.
Based on said structure framework and implementation principle, under the above constitution several concrete and preferably is given below
Embodiment, to the function of refining and optimize device of the present invention, so that the enforcement of the present invention program is more
It is convenient, accurately.Specifically related to following content:
In one embodiment of the invention, detection module 410, specifically for when terminal operating is in safe mode
When lower, if terminal screen is in released state, when user is detected to the touch event of terminal screen,
Triggering fingerprint collecting and correction verification module 420.
In another embodiment of the present invention, detection module 410, specifically for being in unblock in terminal screen
During state, touch event of the user to terminal screen is detected, detect whether the touch event is aimed at
The touch event of the previously selected protection item of user, where it has, triggering fingerprint collecting and correction verification module
420。
Wherein, the type of item is protected to include:Systems soft ware, the third party software of user installation and user file
Deng.
Further, in the embodiment of the present invention, performing module 430, be additionally operable to when collection finger print information with it is pre-
When the finger print information deposited is mismatched, the touch event is not responded, and carry out screen locking process.
In summary, the present invention, based on the touch control operation of user, is constantly adopted during user's using terminal
The fingerprint of collection active user, and fingerprint is verified, verification is correct, correctly responds user operation, realizes
In the case of user's unaware, the full-time lock of terminal applies environment is built, farthest ensure
The safety of end message.
Each embodiment in this specification is described by the way of progressive, phase homophase between each embodiment
As part mutually referring to, what each embodiment was stressed be its it is different from other embodiment it
Place.For particularly with device embodiment, due to its basic simlarity and embodiment of the method, so, description
Fairly simple, related part is illustrated referring to the part of embodiment of the method.
Although describing the application by embodiment, it will be apparent to one skilled in the art that the application has many changes
Shape and change are without departing from the spirit and scope of the present invention.So, if these modifications of the present invention and modification
Belong within the scope of the claims in the present invention and its equivalent technologies, then the present invention is also intended to be changed comprising these
Including modification.
Claims (10)
1. a kind of security context construction method, is applied to terminal, it is characterised in that include:
When terminal screen is in released state, touch event of the user to terminal screen is detected;
In user's touch-control, the finger print information of user is constantly gathered by terminal screen;
When the finger print information of collection is matched with the finger print information for prestoring, the touch event is responded.
2. the method for claim 1, it is characterised in that methods described is specifically included:
When terminal operating in the secure mode when, if terminal screen be in released state, detecting user
During to the touch event of terminal screen, in user's touch-control, the fingerprint of user is constantly gathered by terminal screen
Information, when the finger print information of collection is matched with the finger print information for prestoring, rings to the touch event
Should.
3. method as claimed in claim 1 or 2, it is characterised in that described to detect user to end panel
The touch event of curtain, in user's touch-control, constantly gathers the finger print information of user, specifically by terminal screen
Including:
Detect touch event of the user to terminal screen;
Detect whether the touch event is aimed at the touch event of the previously selected protection item of user, be
In the case of, in user's touch-control, the finger print information of user is constantly gathered by terminal screen.
4. method as claimed in claim 3, it is characterised in that the type of the protection item includes:System
Software, the third party software of user installation and user file.
5. the method as described in claim 1 or 2 or 4, it is characterised in that when collection finger print information with
When the finger print information for prestoring is mismatched, the touch event is not responded, and carry out screen locking process.
6. a kind of security context construction device, is applied to terminal, it is characterised in that include:
Detection module, for when terminal screen is in released state, detecting user and touching to terminal screen
Control event, triggering fingerprint collecting and correction verification module;
Fingerprint collecting and correction verification module, in user's touch-control, constantly gathering user's by terminal screen
Finger print information, when the finger print information of collection is matched with the finger print information for prestoring, triggers performing module;
Performing module, for responding to the touch event.
7. device as claimed in claim 6, it is characterised in that the detection module, specifically for when eventually
When end is run in the secure mode, if terminal screen is in released state, user is being detected to end panel
During the touch event of curtain, the fingerprint collecting and correction verification module are triggered.
8. device as claimed in claims 6 or 7, it is characterised in that the detection module, specifically for
When terminal screen is in released state, touch event of the user to terminal screen is detected, detect described touching
Whether control event is aimed at the touch event of the previously selected protection item of user, where it has, triggering
The fingerprint collecting and correction verification module.
9. device as claimed in claim 8, it is characterised in that the type of the protection item includes:System
Software, the third party software of user installation and user file.
10. the device as described in claim 6 or 7 or 9, it is characterised in that the performing module, also
For when the finger print information of collection is mismatched with the finger print information for prestoring, not ringing to the touch event
Should, and carry out screen locking process.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510686318.4A CN106611113A (en) | 2015-10-21 | 2015-10-21 | Security environment construction method and apparatus |
PCT/CN2016/080355 WO2016180234A1 (en) | 2015-10-21 | 2016-04-27 | Method and apparatus for building secure environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510686318.4A CN106611113A (en) | 2015-10-21 | 2015-10-21 | Security environment construction method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106611113A true CN106611113A (en) | 2017-05-03 |
Family
ID=57247702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510686318.4A Pending CN106611113A (en) | 2015-10-21 | 2015-10-21 | Security environment construction method and apparatus |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106611113A (en) |
WO (1) | WO2016180234A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108762835A (en) * | 2018-05-17 | 2018-11-06 | Oppo广东移动通信有限公司 | Application running method and device, storage medium and electronic device |
CN111259360A (en) * | 2020-02-14 | 2020-06-09 | 珠海格力电器股份有限公司 | Touch screen state control method and device of terminal equipment and terminal equipment |
CN113468490A (en) * | 2020-03-30 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Screen locking method, device and equipment of terminal equipment |
CN115019351A (en) * | 2022-06-29 | 2022-09-06 | 深圳创维-Rgb电子有限公司 | Fingerprint unlocking method, device, electronic device and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104049901A (en) * | 2014-07-03 | 2014-09-17 | 南昌欧菲生物识别技术有限公司 | Mobile terminal and touch button operating method of mobile terminal |
CN101809581B (en) * | 2007-09-24 | 2014-12-10 | 苹果公司 | Embedded Authentication Systems in Electronic Devices |
CN104618577A (en) * | 2014-12-30 | 2015-05-13 | 广东欧珀移动通信有限公司 | Key requirement response method and device |
CN104765552A (en) * | 2015-04-28 | 2015-07-08 | 小米科技有限责任公司 | Authority management method and device |
-
2015
- 2015-10-21 CN CN201510686318.4A patent/CN106611113A/en active Pending
-
2016
- 2016-04-27 WO PCT/CN2016/080355 patent/WO2016180234A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101809581B (en) * | 2007-09-24 | 2014-12-10 | 苹果公司 | Embedded Authentication Systems in Electronic Devices |
CN104049901A (en) * | 2014-07-03 | 2014-09-17 | 南昌欧菲生物识别技术有限公司 | Mobile terminal and touch button operating method of mobile terminal |
CN104618577A (en) * | 2014-12-30 | 2015-05-13 | 广东欧珀移动通信有限公司 | Key requirement response method and device |
CN104765552A (en) * | 2015-04-28 | 2015-07-08 | 小米科技有限责任公司 | Authority management method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108762835A (en) * | 2018-05-17 | 2018-11-06 | Oppo广东移动通信有限公司 | Application running method and device, storage medium and electronic device |
CN111259360A (en) * | 2020-02-14 | 2020-06-09 | 珠海格力电器股份有限公司 | Touch screen state control method and device of terminal equipment and terminal equipment |
CN111259360B (en) * | 2020-02-14 | 2022-03-18 | 珠海格力电器股份有限公司 | Touch screen state control method and device of terminal equipment and terminal equipment |
CN113468490A (en) * | 2020-03-30 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Screen locking method, device and equipment of terminal equipment |
CN113468490B (en) * | 2020-03-30 | 2024-05-03 | 阿里巴巴集团控股有限公司 | Screen locking method, device and equipment of terminal equipment |
CN115019351A (en) * | 2022-06-29 | 2022-09-06 | 深圳创维-Rgb电子有限公司 | Fingerprint unlocking method, device, electronic device and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2016180234A1 (en) | 2016-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104598783B (en) | The unlocking method and device of a kind of intelligent terminal | |
CN104184875B (en) | Open method, device and the terminal of terminal debugging port | |
CN103543936B (en) | A kind of touch screen terminal quick release enters the method and touch screen terminal of application | |
CN104182668B (en) | Personal identification method based on unlocking screen | |
CN103336924A (en) | Starting lock for mobile terminal application program | |
CN104813326B (en) | Function based on security model restricted software program | |
CN103870181A (en) | Handheld device control method, handheld device control device and handheld device | |
CN106611113A (en) | Security environment construction method and apparatus | |
WO2016177000A1 (en) | Method for entering operating system desktop and mobile intelligent terminal | |
CN103440445A (en) | Electronic equipment unlocking control method and system | |
CN105956441B (en) | A kind of intelligent terminal operating method and system | |
WO2014131308A1 (en) | Method and device for initiating privacy mode of data processing apparatus | |
CN106951159B (en) | Method for unlocking terminal and rapidly entering application program and terminal | |
CN107466031A (en) | A kind of method and terminal for protecting data | |
CN103426215B (en) | For door lock management-control method and the system of unexpected relief | |
WO2018107727A1 (en) | Method and device for information processing, and terminal | |
CN106815504A (en) | The method and terminal of a kind of unlock terminal | |
CN104951677B (en) | Information processing method and device | |
CN106529235A (en) | Unlocking method and terminal | |
CN105786370B (en) | The method and device of user interface unlock | |
CN106815505A (en) | A kind of identification and the method and terminal of unlock terminal | |
CN105892819A (en) | Method and device for locking application program | |
CN106503504A (en) | An unlocking method and device | |
CN104392158A (en) | Mobile terminal unlocking method and mobile terminal | |
CN106407760B (en) | User terminal and application program hiding method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170503 |
|
RJ01 | Rejection of invention patent application after publication |