HK1248340A1 - Application decryption method and device, terminal and computer readable storage medium - Google Patents
Application decryption method and device, terminal and computer readable storage medium Download PDFInfo
- Publication number
- HK1248340A1 HK1248340A1 HK18107573.0A HK18107573A HK1248340A1 HK 1248340 A1 HK1248340 A1 HK 1248340A1 HK 18107573 A HK18107573 A HK 18107573A HK 1248340 A1 HK1248340 A1 HK 1248340A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- application
- fingerprint information
- terminal
- touch operation
- encrypted
- Prior art date
Links
Landscapes
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses an application decryption methodDeviceTerminal and computer-readable storage medium,Involving the field of terminal technology,The method comprises: a fingerprint sensor is arranged under the display screen of the terminal,Receiving the touch operation at the icon of the target application through the display screen,The target application is an encrypted application: start the fingerprint sensor at the icon of the target application,And collect the fingerprint information of the touch operation through the activated fingerprint sensor: when the fingerprint information of the touch operation matches the encrypted fingerprint information of the target application,Start the target application.In this way, when the user opens the application, no matter where the application is currently located on the display screen, the terminal can directly collect the fingerprint information when the user touches the application to verify the user's identity. There is no need to display the verification interface to require the user to input the verification information at a specific position, which simplifies the operation process and makes the user's operation of decrypting the application more flexible.
Description
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to an application decryption method and apparatus, a terminal, and a computer-readable storage medium.
Background
Currently, terminals have become an indispensable part of people's lives. In use, a user may install a large number of applications in the terminal. The personal privacy information of the user, such as the basic account information of the user, the identity information, the bank card information or other sensitive information, may be stored in some applications. In order to ensure the security of the personal privacy information, the terminal may encrypt the application storing the personal privacy information of the user, so that the application needs to be decrypted before the user uses the application.
In the related art, when a terminal detects that a user clicks a target application, a verification interface is displayed to prompt the user to input verification information, then the user inputs the verification information in the currently displayed verification interface, the terminal compares the verification information input by the user with the stored verification information, and if the verification information is the same as the stored verification information, the terminal decrypts the verification information and enters the application.
Disclosure of Invention
The embodiment of the application decryption method and device, the terminal and the computer readable storage medium can be used for solving the problem that the process is complex when the application is decrypted in the related technology. The technical scheme is as follows:
in a first aspect, an application decryption method is provided, where the method is applied in a terminal, and a plurality of fingerprint sensors are disposed under a display screen of the terminal, and the method includes:
receiving a touch operation at an icon of a target application through the display screen, the target application being an encrypted application;
starting a fingerprint sensor at the icon of the target application, and acquiring fingerprint information of the touch operation through the started fingerprint sensor;
and when the fingerprint information of the touch operation is matched with the encrypted fingerprint information of the target application, starting the target application.
Optionally, the fingerprint sensor at the icon of the target application is started comprises:
acquiring receiving time for receiving the touch operation;
and when the receiving time is within a preset time range, starting a fingerprint sensor at the icon of the target application.
Optionally, before the fingerprint information of the touch operation is collected by the activated fingerprint sensor, the method further includes:
when an application encryption setting instruction is received, receiving at least one touch operation at an icon of at least one application through the display screen;
starting a fingerprint sensor at the icon of the at least one application, and collecting fingerprint information of the at least one touch operation through the started fingerprint sensor;
determining encrypted fingerprint information for the at least one application based on the collected fingerprint information;
and acquiring the application identification of the at least one application, and correspondingly storing the application identification of the at least one application and the encrypted fingerprint information of the at least one application.
Optionally, after the fingerprint information of the touch operation is collected by the activated fingerprint sensor, the method further includes:
when the fingerprint information of the touch operation is not matched with the encrypted fingerprint information of the target application, counting the times of acquiring the fingerprint information which is not matched with the encrypted fingerprint information of the target application within a preset time length;
and when the times of collecting the fingerprint information which is not matched with the encrypted fingerprint information of the target application is greater than the preset times, displaying prompt information, wherein the prompt information is used for prompting a user that the target application is encrypted.
In a second aspect, an application decryption apparatus is provided, where the apparatus is applied to a terminal, a plurality of fingerprint sensors are disposed below a display screen of the terminal, and the apparatus includes:
a first determination module for receiving a touch operation at a target application icon through the display screen, the target application being an encrypted application;
the first acquisition module is used for starting a fingerprint sensor at the icon of the target application and acquiring fingerprint information of the touch operation through the started fingerprint sensor;
and the starting module is used for starting the target application when the fingerprint information of the touch operation is matched with the encrypted fingerprint information of the target application.
Optionally, the first acquisition module includes:
the obtaining submodule is used for obtaining the receiving time of the touch operation;
and the determining sub-module is used for starting the fingerprint sensor at the icon of the target application when the receiving time is within a preset time range.
Optionally, the apparatus further comprises:
the second determining module is used for receiving at least one touch operation at the icon of at least one application through the display screen when receiving an application encryption setting instruction;
the second acquisition module is used for starting the fingerprint sensor at the icon of the at least one application and acquiring fingerprint information of the at least one touch operation through the started fingerprint sensor;
a third determining module, configured to determine encrypted fingerprint information of the at least one application based on the acquired fingerprint information;
and the storage module is used for acquiring the application identifier of the at least one application and correspondingly storing the application identifier of the at least one application and the encrypted fingerprint information of the at least one application.
Optionally, the apparatus further comprises:
the counting module is used for counting the times of collecting the fingerprint information which is not matched with the encrypted fingerprint information of the target application within a preset time length when the fingerprint information of the touch operation is not matched with the encrypted fingerprint information of the target application;
and the display module is used for displaying prompt information when the number of times of collecting the fingerprint information which is not matched with the encrypted fingerprint information of the target application is greater than the preset number of times, wherein the prompt information is used for prompting a user that the target application is encrypted.
In a third aspect, there is provided a terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements any of the steps provided in the first aspect when executing the program.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, wherein the program, when executed by a processor, performs any of the steps provided in the first aspect.
The technical scheme provided by the embodiment of the invention has the following beneficial effects: in the embodiment of the invention, a plurality of fingerprint sensors are arranged below a display screen of a terminal, the terminal can determine a region touched by a touch operation in the display screen when the terminal detects the touch operation aiming at a target application, the fingerprint sensors in the region are started, fingerprint information generated by the touch operation is collected through the started fingerprint sensors, and if the collected fingerprint information is the same as encrypted fingerprint information of the target application, the terminal directly starts the application. Therefore, when the user opens the application, no matter where the application is located on the display screen at present, the mobile terminal can directly collect fingerprint information of the user when the user opens the application to verify the identity of the user, and the user does not need to input verification information at a specific position by displaying a verification interface, so that the operation flow is simplified, and the operation of decrypting the application by the user is more flexible, more concise and smoother.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of an application decryption method according to an embodiment of the present invention;
fig. 2A is a flowchart of another application decryption method provided in an embodiment of the present invention;
FIG. 2B is a schematic diagram of a human-computer interaction for encrypting an application according to an embodiment of the present invention;
fig. 3A is a block diagram of an application decryption apparatus according to an embodiment of the present invention;
FIG. 3B is a block diagram of a first determining module according to an embodiment of the invention;
fig. 3C is a block diagram of another application decryption apparatus according to an embodiment of the present invention;
fig. 3D is a block diagram of another application decryption apparatus provided in the embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another terminal provided in an embodiment of the present invention;
FIG. 6A is a schematic structural diagram of a full-screen provided in an embodiment of the present invention;
fig. 6B is a schematic structural diagram of a curved screen according to an embodiment of the present invention;
fig. 6C is a schematic structural diagram of a special-shaped screen according to an embodiment of the present invention;
fig. 6D is a schematic structural diagram of a special-shaped screen according to an embodiment of the present invention;
fig. 6E is a schematic structural diagram of a special-shaped screen according to an embodiment of the present invention;
fig. 6F is a schematic structural diagram of a special-shaped screen according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Before explaining the embodiments of the present invention in detail, the application scenarios related to the embodiments of the present invention will be described.
Currently, terminals have become an indispensable part of people's lives. In use, a user may install a large number of applications in the terminal. Some applications relate to personal privacy information of a user, for example, friend information of the user and personal identity information of the user may be stored in a social application. Some financial applications or banking applications store the bank account information of the user. For another example, the shopping applications and some payment applications may also store the identity information and payment account information of the user, and even may be bound with a bank card account of the user. In this case, once the terminal is lost or used by other malicious users, the personal privacy information of the user stored in these applications will present a great safety hazard. Therefore, in order to secure personal privacy information of a user, the terminal may encrypt the application.
In addition, the user may also install applications such as videos, games and the like in the terminal, and a minor child in the user's home may use the applications to watch videos or play games without the user's knowledge, in which case the user may also encrypt the applications in order to prevent the minor child from being indulged in the videos or games.
After an application is encrypted in the above scenario, the application needs to be decrypted when it is used. Based on this, the application provides a method for decrypting the encrypted application, so that the operation flow of the decrypted application is more flexible, concise and smooth.
In the related art, when the terminal detects a click operation of a user on an encrypted application, a verification interface may be displayed to prompt the user to input verification information. Generally, the authentication information may be a password or fingerprint information. When the verification information is a password, a password input box is displayed on the verification interface, and at the moment, the user can input the password so that the terminal can verify the identity of the user according to the input password. When the verification information is fingerprint information, a fingerprint collection box is usually displayed on the verification interface, and a user needs to perform a touch operation in the fingerprint collection box. Or, if the terminal is provided with an entity physical key for fingerprint identification, prompt information is displayed in the verification interface, and the user is required to perform touch operation on the entity physical key, so that the terminal collects fingerprint information to verify the identity of the user.
As can be seen from the above description, on the one hand, no matter what kind of authentication information is used for authentication, the terminal displays the authentication interface, so that the processing process is complex for the terminal, and for the user, after clicking the application, the user has a clear and blocked feeling in sense, and cannot smoothly and consistently enter the application, but needs to stop to input additional authentication information to enter the application. On the other hand, when the user inputs the fingerprint information on the verification interface, the user needs to perform touch operation at a specified position to enable the terminal to acquire the fingerprint information of the user, and the operation is not flexible. Based on this, the embodiment of the present invention provides an application decryption method, which can solve the problems of complex operation, unsmooth operation, inflexibility, and the like in decryption application in the related art. Next, an application decryption method provided by an embodiment of the present invention will be explained in detail with reference to the drawings.
Fig. 1 is a flowchart illustrating an application decryption method according to an exemplary embodiment, and referring to fig. 1, the method may be applied to a terminal such as a smart phone, a tablet computer, and the like, and a fingerprint sensor is disposed below a display screen of the terminal, and the method specifically includes the following steps.
Step 101: and receiving a touch operation at an icon of a target application through the display screen, wherein the target application is an encrypted application.
Step 102: and starting the fingerprint sensor at the icon of the target application, and acquiring fingerprint information of the touch operation through the started fingerprint sensor.
The method comprises the steps that a plurality of fingerprint sensors are arranged below a display screen of the terminal, after the area touched by touch operation is determined, the terminal can start the fingerprint sensors in the area, and other fingerprint sensors can not be started, so that the power consumption of the terminal is reduced.
Step 103: and when the fingerprint information of the touch operation is matched with the encrypted fingerprint information of the target application, starting the target application.
In the embodiment of the invention, at least one fingerprint sensor is arranged below a display screen of the terminal, the terminal can receive touch operation at an icon of a target application through the display screen, then the fingerprint sensor at the icon of the target is started, fingerprint information of the touch operation is collected through the started fingerprint sensor, and if the collected fingerprint information of the touch operation is matched with encrypted fingerprint information of the target application, the terminal directly starts the application. Therefore, when the user opens the application, no matter where the application is located on the display screen at present, the terminal can directly collect fingerprint information of the user when the user opens the application to verify the identity of the user, a verification interface does not need to be displayed any more, the user is required to input verification information at a specific position, the operation flow is simplified, and the operation of decrypting the application by the user is more flexible, concise and smooth.
Optionally, the fingerprint sensor at the icon of the target application is launched, comprising:
acquiring receiving time of receiving touch operation;
and when the receiving time is within the preset time range, starting the fingerprint sensor at the icon of the target application.
Optionally, before collecting fingerprint information of a touch operation through the activated fingerprint sensor, the method further includes:
when an application encryption setting instruction is received, receiving at least one touch operation at an icon of at least one application through a display screen;
starting a fingerprint sensor at the icon of at least one application, and acquiring fingerprint information of at least one touch operation through the started fingerprint sensor;
determining the collected fingerprint information as encrypted fingerprint information of at least one application;
and acquiring an application identifier of at least one application, and correspondingly storing the application identifier of the at least one application and the encrypted fingerprint information of the at least one application.
Optionally, after fingerprint information of a touch operation is collected by the activated fingerprint sensor, the method further includes:
when the fingerprint information of the touch operation is not matched with the encrypted fingerprint information of the target application, counting the times of acquiring the fingerprint information which is not matched with the encrypted fingerprint information of the target application within a preset time length;
and when the times of collecting the fingerprint information which is not matched with the encrypted fingerprint information of the target application is more than the preset times, displaying prompt information, wherein the prompt information is used for prompting a user that the target application is encrypted.
All the above optional technical solutions can be combined arbitrarily to form optional embodiments of the present disclosure, and the embodiments of the present disclosure are not described in detail again.
Fig. 2A is a flowchart illustrating an application decryption method according to an exemplary embodiment, which may be used in a terminal such as a smart phone, a tablet computer, etc., and a fingerprint sensor is disposed below a display screen of the terminal, as shown in fig. 2A, the method includes the following steps:
step 201: when an application encryption setting instruction is received, at least one touch operation is received at an icon of at least one application through a display screen.
An application encryption setting option may be included in a setting menu of the terminal. When the user wants to encrypt the application installed in the terminal, the user can click the application encryption setting option. When the terminal receives the application encryption setting instruction, the terminal can return to a desktop of the terminal to display all the applications installed in the current terminal. Then, when the terminal receives at least one touch operation at the icon of the currently displayed at least one application through the display screen, the terminal may then determine an application acted on by the received touch operation as an application to be encrypted.
Fig. 2B is a schematic diagram of human-computer interaction during encryption setting according to an embodiment of the present invention. As shown in the left diagram of fig. 2B, after the user clicks the application encryption setting option, the terminal may display application icons of all applications currently installed in the terminal. Thereafter, as shown in the right diagram of fig. 2B, the user may select two applications, application a and application B, for encryption, so that the terminal will receive two touch operations of the user at the icon of application a and the icon of application B.
Step 202: and starting a fingerprint sensor at the icon of at least one application, and acquiring fingerprint information of at least one touch operation through the started fingerprint sensor.
In the embodiment of the invention, at least one fingerprint sensor is arranged below the display screen of the terminal. After the terminal receives at least one touch operation at the icon of at least one application through the display screen, the fingerprint sensor at the icon of the at least one application can be started, and fingerprint information of the at least one touch operation is collected through the started fingerprint sensor.
It should be noted that, if the user performs the touch operation on the icons of the plurality of applications in sequence at one time, the terminal may start the fingerprint sensor at the icon corresponding to the touch operation each time the terminal receives one touch operation, and acquire the fingerprint information of the touch operation through the fingerprint sensor. Or, the terminal may start all the fingerprint sensors at all the displayed application icons when receiving a first touch operation, and then acquire fingerprint information of the touch operation through the fingerprint sensor at the icon corresponding to the touch operation when receiving every touch operation. Or, the terminal may start only the fingerprint sensor at the icon acted by the first touch operation when receiving the first touch operation, and acquire the fingerprint information of the first touch operation through the started fingerprint sensor, and the subsequently received touch operation does not acquire the corresponding fingerprint information any more. In this case, the terminal will only collect fingerprint information for one touch operation. That is, when an application encryption setting instruction is triggered once, only one piece of encryption fingerprint information is collected for a plurality of applications to be encrypted.
Of course, if only one encrypted fingerprint information is collected for a plurality of applications to be encrypted when an application encryption setting instruction is triggered once, the fingerprint sensor started by the terminal may be the fingerprint sensor at the icon acted by the first touch operation or the fingerprint sensor at any icon of other icons receiving the touch operation.
Optionally, the terminal may start the corresponding sensor to collect fingerprint information according to at least one application icon acted by the touch operation in the above manners, and of course, the terminal may also directly start all fingerprint sensors arranged below the display screen, and then collect the fingerprint information of the user through the fingerprint sensor in the application icon acted by the touch operation in all the sensors.
Step 203: encrypted fingerprint information for at least one application is determined based on the captured fingerprint information.
After the terminal collects the fingerprint information of the user through the started fingerprint sensor, the terminal can set the encrypted fingerprint information of the at least one application according to the collected fingerprint information.
Specifically, based on the description in step 202, the method of setting the encrypted fingerprint information of the at least one application is different according to the method of collecting the fingerprint information.
When the user performs the selection operation on at least one application and the terminal collects only one piece of fingerprint information of the user, the terminal can determine the collected fingerprint information as the encrypted fingerprint information of the at least one application.
In an alternative mode, the user performs a touch operation at a plurality of application icons in sequence at one time, and activates a plurality of fingerprint sensors at the plurality of application icons to acquire fingerprint information of the touch operation, and the user performs a touch operation on different application icons through different fingers, in which case the terminal acquires a plurality of different fingerprint information. At this time, the terminal may determine the number of fingerprint information belonging to the same finger among the collected fingerprint information, and determine any one of the fingerprint information corresponding to the finger having the most fingerprint information as the encrypted fingerprint information of the plurality of applications. Of course, if the finger having the most fingerprint information cannot be determined from the collected fingerprint information, the terminal may determine the first collected fingerprint information as the encrypted fingerprint information of the plurality of applications. Alternatively, the terminal may display a fingerprint selection option to select which fingerprint information is determined as the encrypted fingerprint information of the plurality of applications by the user. That is, in such an implementation, the multiple applications would correspond to the same encrypted fingerprint information.
In another alternative, when the user performs a touch operation at the icons of the plurality of applications and the terminal correspondingly acquires a plurality of fingerprint information when the user performs the plurality of touch operations, for each of the plurality of fingerprint information, the terminal may determine the fingerprint information as encrypted fingerprint information of the application on which the touch operation that generated the fingerprint information acts.
For example, assuming that a user performs a touch operation on each of the application 1, the application 2, and the application 3, and the terminal acquires fingerprint information 1 when the user performs the touch operation on the application 1, fingerprint information 2 when the user performs the touch operation on the application 2, and fingerprint information 3 when the user performs the touch operation on the application 3, at this time, the terminal may determine the fingerprint information 1 as encrypted fingerprint information of the application 1, the fingerprint information 2 as encrypted fingerprint information of the application 2, and the fingerprint information 3 as encrypted fingerprint information of the application 3. Any two of the fingerprint information 1, the fingerprint information 2, and the fingerprint information 3 may be the same, or may be all different.
Step 204: and acquiring an application identifier of at least one application, and correspondingly storing the application identifier of the at least one application and the encrypted fingerprint information of the at least one application.
After the terminal determines the acquired fingerprint information of the at least one touch operation as the encrypted fingerprint information of the at least one application, the terminal may acquire an application identifier of the at least one application, and then store the acquired application identifier of the at least one application and the determined encrypted fingerprint information of the at least one application correspondingly. The application identifier may be an application icon, an application name, or other information that can uniquely identify the application.
It should be noted that, as described in step 203, when at least one application corresponds to the same encrypted fingerprint information, the terminal may store the encrypted fingerprint information and the application identifier of the at least one application correspondingly. When each application corresponds to one piece of encrypted fingerprint information, the terminal can correspondingly store the encrypted fingerprint information and the application.
Optionally, the user may only want to encrypt the at least one application for a certain period of time, in one possible scenario. For example, for some gaming applications, to prevent a minor child in the home from opening the gaming application, the user may encrypt the application for a time period set by the minor child according to the time period. For example, between 18:00 and 24:00, the user may be traveling home from work with a minor child, in which case the at least one application may be an encrypted application during the time period to prevent the minor child from launching the application, and at other times than that, the application may be an unencrypted application. Of course, the user may also set to encrypt at least one application within a certain time period in other scenarios, where the above scenario is only one possible application scenario shown in the embodiment of the present invention, and does not constitute a limitation on a usage scenario of the encryption manner.
Specifically, based on the above description, the terminal may further obtain a preset time range input or selected by the user after obtaining the at least one application identifier, where the preset time range is an encryption time period of the at least one application, that is, the at least one application is an encryption application in the preset time range, and is a non-encryption application at other times outside the preset time range.
In addition, this step may be executed after step 203, or after step 201 or simultaneously with step 203, which is not specifically limited in this embodiment of the present invention.
In the embodiment of the present invention, the terminal may encrypt the application through steps 201-204, and it should be noted that the above is only one possible encryption method shown in the embodiment of the present invention, and does not constitute a limitation on the encryption method. In practical applications, the terminal may also display the application list when detecting the application encryption setting instruction, and when detecting a selection operation of the user for at least one application in the application list, the terminal may prompt the user to input fingerprint information. At this time, the user may input fingerprint information at any position of the display screen of the terminal, and the terminal may determine the acquired fingerprint information as the encrypted fingerprint information of the at least one application. Of course, the terminal may also encrypt the application through the fingerprint information with reference to the related art, and the embodiment of the present invention is not described again.
It should be further noted that, based on the above description, in the embodiment of the present invention, encrypting the application installed in the terminal is a system-level encryption behavior, that is, the terminal itself encrypts the application, and the subsequent decryption is also performed by the terminal itself.
After the terminal encrypts the application, when the user uses the encrypted application, the terminal may decrypt the application by the method described in step 205-.
Step 205: and receiving a touch operation at an icon of a target application through the display screen, wherein the target application is an encrypted application.
When a user wants to open a certain encrypted application, the user may perform a touch operation on an icon of the target application. Wherein the target application is the encrypted application that the user currently wants to open. In this case, the terminal may detect in real time whether a touch operation for the encrypted application is received.
It should be noted that the terminal may display the encrypted application in a display manner of displaying the unencrypted application. That is, when the terminal displays the application icon, the encrypted application and the non-encrypted application may not be distinguished.
In another possible implementation manner, the user may not need to perform a touch operation on the target application, but may perform the touch operation at any position on the display screen of the terminal. In this case, the terminal only needs to receive the touch operation of the user through the display screen, that is, step 205 may also be to receive the touch operation through the display screen.
Step 206: and starting a fingerprint sensor at the icon of the target application, and acquiring fingerprint information of the touch operation through the started fingerprint sensor.
After the terminal receives a touch operation at an icon of a target application, the terminal may start a fingerprint sensor at the icon of the application and collect fingerprint information generated by the touch operation through the started fingerprint sensor.
Optionally, when the target application is an application encrypted within a preset time range, the terminal may further obtain a receiving time for receiving the touch operation. Then, the terminal may determine whether the receiving time is within a preset time range, and if the receiving time is within the preset time range, the target application is an encrypted application, that is, the terminal needs to decrypt the target application, and at this time, the terminal may start the fingerprint sensor at the icon where the touch operation is performed to collect the fingerprint information of the touch operation.
Of course, if the touch operation of the user at any position on the display screen is received through the display screen in step 205, the terminal may directly start the multiple fingerprint sensors disposed below the display screen of the terminal when receiving the touch operation, and collect the fingerprint information of the touch operation through the fingerprint sensor located at the position acted by the touch operation among the multiple fingerprint sensors.
Step 207: and when the acquired fingerprint information of the touch operation is matched with the encrypted fingerprint information of the target application, starting the target application.
Based on the relevant description in step 205, if the terminal receives a touch operation at the icon of the target application through the display screen, after the fingerprint information of the touch operation is collected by the fingerprint sensor at the icon of the target application, the terminal may compare the fingerprint information with the encrypted fingerprint information of the target application, and if the collected fingerprint information of the touch operation matches the encrypted fingerprint information of the target application, the target application may be started. If the acquired fingerprint information is not matched with the encrypted fingerprint information of the target application, the terminal does not respond to the touch operation of the user, namely, the target application cannot be started.
Further, the terminal can also count the times of fingerprint information which is acquired within a preset time length and is not matched with the encrypted fingerprint information of the target application, and when the times are greater than the preset times, prompt information is displayed to prompt a user that the target application is encrypted.
Specifically, in the embodiment of the present invention, the terminal may not distinguish between displaying the encrypted application and the non-encrypted application, so that when other users than the user of the terminal start the target application, the terminal will not start the target application and will not display other information because the input fingerprint information does not match the encrypted fingerprint information of the target application, and for the other users of the terminal, the other users may not know that the reason why the target application is not started is that the target application is the encrypted application. In this case, when the terminal receives the wrong fingerprint information continuously and repeatedly, the terminal may display a prompt message to prompt the user that the target application is encrypted, so that the user stops touch operation, thereby reducing the processing procedure of the terminal that is wasted for many times.
Optionally, in another possible implementation manner, if in step 205, as long as the terminal detects a touch operation of a user, fingerprint information of the touch operation may be collected, then, after the terminal collects the fingerprint information of the touch operation through a started fingerprint sensor, the terminal may search, from stored fingerprint information, whether there is encrypted fingerprint information matching the fingerprint information, and if the encrypted fingerprint information matching the collected fingerprint information is found, the terminal may directly decrypt at least one application corresponding to the encrypted fingerprint information. That is, the terminal may decrypt the application corresponding to the fingerprint information through the fingerprint information generated by any touch operation performed by the user, and then, when the user wants to start the corresponding application, the application may be directly started, and other applications that do not match with the fingerprint information are still in the encrypted state, and the user cannot start the applications in the encrypted state. Further, the terminal may set a timer while decrypting the corresponding at least one application by the fingerprint information generated by the arbitrary touch operation. The terminal may maintain the at least one application in a decrypted state when the timer is not counted up to a predetermined time length, and may convert the at least one application into an encrypted application again when the timer is counted up to the predetermined time length. That is, after the terminal decrypts at least one application, the user may directly start the application without verifying the identity for a predetermined time period after decryption, and if the user starts the application after the predetermined time period, the user needs to perform authentication again.
In the embodiment of the invention, a plurality of fingerprint sensors can be arranged below a display screen of the terminal, the terminal can receive touch operation at an icon of a target application through the display screen, start the fingerprint sensor at the icon of the target application, acquire fingerprint information of the touch operation through the started fingerprint sensor, and directly start the application if the acquired fingerprint information of the touch operation is matched with the encrypted fingerprint information of the target application. Therefore, when the user opens the application, no matter where the application is located on the display screen, the terminal can directly collect the fingerprint information of the user when the user opens the application to verify the identity of the user, and the user does not need to input verification information at a specific position by specially displaying a verification interface, so that the operation flow is simplified, and the operation of decrypting the application by the user is more flexible. Because the terminal does not need to display a verification interface, for a legal user, when the finger of the application clicked by the user is the same as the finger used when the application is set, the user can directly start and enter the application, the use experience is not blocked, and the whole decryption process is smoother.
In addition, in the embodiment of the invention, the terminal can also be arranged to encrypt at least one application within a preset time range, so that the encryption of the application becomes more flexible, and the situation that the immature children in the family are indulged in entertainment applications such as games and the like can be effectively prevented.
After explaining the application decryption method provided by the embodiment of the present invention, an application decryption apparatus provided by the present invention will be described next.
Fig. 3A is a block diagram of an application decryption device 300 according to an embodiment of the present invention, where the application decryption device is applied to a terminal, and a fingerprint sensor is disposed below a display screen of the terminal. Referring to fig. 3A, the screen capturing means may be implemented by software, hardware, or a combination of both. The device includes: a first determination module 301, a first acquisition module 302, and a start module 303.
A first determining module 301, configured to receive a touch operation at an icon of a target application through a display screen, where the target application is an encrypted application;
a first collecting module 302, configured to start a fingerprint sensor at an icon of a target application, and collect fingerprint information of a touch operation through the started fingerprint sensor;
and the starting module 303 is configured to start the target application when the fingerprint information of the touch operation matches the encrypted fingerprint information of the target application.
Optionally, referring to fig. 3B, the first determining module 301 includes:
an obtaining sub-module 3011, configured to obtain a receiving time when the touch operation is received;
the determining sub-module 3012 is configured to start the fingerprint sensor at the icon of the target application when the receiving time is within a preset time range.
Optionally, referring to fig. 3C, the apparatus further comprises:
a second determining module 304, configured to receive at least one touch operation at an icon of at least one application through the display screen when the application encryption setting instruction is received;
a second collecting module 305, configured to start a fingerprint sensor at an icon of at least one application, and collect fingerprint information of at least one touch operation through the started fingerprint sensor;
a third determining module 306, configured to determine encrypted fingerprint information of at least one application based on the acquired fingerprint information;
the storage module 307 is configured to obtain an application identifier of at least one application, and correspondingly store the application identifier of the at least one application and the encrypted fingerprint information of the at least one application.
Optionally, referring to fig. 3D, the apparatus further comprises:
the counting module 308 is configured to count, when the fingerprint information of the touch operation is not matched with the encrypted fingerprint information of the target application, the number of times that the fingerprint information that is not matched with the encrypted fingerprint information of the target application is acquired within a preset time period;
the display module 309 is configured to display a prompt message when the number of times that fingerprint information that does not match the encrypted fingerprint information of the target application is collected is greater than a preset number of times, where the prompt message is used to prompt a user that the target application is encrypted.
In summary, in the embodiment of the present invention, a plurality of fingerprint sensors may be disposed below a display screen of a terminal, the terminal may receive a touch operation at an icon of a target application through the display screen, start the fingerprint sensor at the icon of the target application, and collect fingerprint information of the touch operation through the started fingerprint sensor, and if the collected fingerprint information of the touch operation matches with encrypted fingerprint information of the target application, the terminal directly starts the application. Therefore, when the user opens the application, no matter where the application is located on the display screen, the terminal can directly collect the fingerprint information of the user when the user opens the application to verify the identity of the user, and the user does not need to input verification information at a specific position by specially displaying a verification interface, so that the operation flow is simplified, and the operation of decrypting the application by the user is more flexible. .
It should be noted that: in the application decryption device provided in the foregoing embodiment, when performing screen capturing, only the division of the functional modules is illustrated, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the application decryption device and the application decryption method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Referring to fig. 4 and 5, a block diagram of a terminal 400 according to an exemplary embodiment of the present application is shown. The terminal 400 includes the application decryption means shown in fig. 3A-3D. The terminal can be a mobile phone, a tablet computer, a notebook computer, an electronic book and the like. A plurality of fingerprint sensors are provided under the display screen of the terminal 400 in the present application, and the terminal 400 may include one or more of the following components: a processor 410, a memory 420, and a touch display 430.
Processor 410 may include one or more processing cores. The processor 410 connects various parts within the overall terminal 400 using various interfaces and lines, performs various functions of the terminal 400 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 420, and calling data stored in the memory 420. Alternatively, the processor 410 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 410 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is responsible for rendering and drawing the content to be displayed by the touch display 430; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 410, but may be implemented by a single chip.
The Memory 420 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 420 includes a non-transitory computer-readable medium. The memory 420 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 420 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described above, and the like; the storage data area may store data (such as audio data, a phonebook) created according to the use of the terminal 400, and the like.
Taking an operating system as an Android (Android) system as an example, programs and data stored in the memory 420 are as shown in fig. 6, and a Linux kernel layer 520, a system runtime layer 540, an application framework layer 560, and an application layer 580 are stored in the memory 420. The Linux kernel layer 520 provides underlying drivers for various hardware of the terminal 400, such as a display driver, an audio driver, a camera driver, a bluetooth driver, a Wi-Fi driver, power management, and the like. The system runtime library layer 540 provides main feature support for the Android system through some C/C + + libraries. For example, the SQLite library provides support for a database, the OpenGL/ES library provides support for 3D drawing, the Webkit library provides support for a browser kernel, and the like. Also provided in the system Runtime layer 540 is an Android Runtime library (Android Runtime), which mainly provides some core libraries and can allow developers to write Android applications using the Java language. The application framework layer 560 provides various APIs that may be used in building applications, and developers may build their own applications by using these APIs, such as activity management, window management, view management, notification management, content provider, package management, session management, resource management, and location management. At least one application program runs in the application layer 580, and the application programs may be a contact program, a short message program, a clock program, a camera application, and the like of the operating system; or an application program developed by a third-party developer, such as an instant messaging program, a photo beautification program, and the like.
Taking an operating system as an IOS system as an example, programs and data stored in the memory 420 are shown in fig. 5, and the IOS system includes: a Core operating system Layer 620(Core OS Layer), a Core Services Layer 640(Core Services Layer), a Media Layer 660(Media Layer), and a touchable Layer 680(Cocoa Touch Layer). The kernel operating system layer 620 includes an operating system kernel, drivers, and underlying program frameworks that provide functionality closer to hardware for use by program frameworks located in the core services layer 640. The core services layer 640 provides system services and/or program frameworks, such as a Foundation framework, an account framework, an advertisement framework, a data storage framework, a network connection framework, a geographic location framework, a motion framework, etc., that are needed by the application. The media layer 660 provides audiovisual interfaces for applications, such as graphics-related interfaces, audio-related interfaces, video-related interfaces, and audio/video transmission technology wireless playback (AirPlay) interfaces. The touchable layer 680 provides various commonly used interface-related frameworks for application development, and the touchable layer 680 is responsible for user touch interaction operations on the terminal 400. Such as a local notification service, a remote push service, an advertising framework, a game tool framework, a messaging User Interface (UI) framework, a User Interface UIKit framework, a map framework, and so forth.
In the framework illustrated in FIG. 5, the framework associated with most applications includes, but is not limited to: a base framework in the core services layer 640 and a UIKit framework in the touchable layer 680. The base framework provides many basic object classes and data types, provides the most basic system services for all applications, and is UI independent. While the class provided by the UIKit framework is a basic library of UI classes for creating touch-based user interfaces, iOS applications can provide UIs based on the UIKit framework, so it provides an infrastructure for applications for building user interfaces, drawing, processing and user interaction events, responding to gestures, and the like.
The touch display screen 430 is used for receiving a touch operation of a user on or near the touch screen using any suitable object such as a finger, a touch pen, or the like, and displaying a user interface of each application. The touch display 430 is generally provided at a front panel of the terminal 400. The touch display screen 430 may be designed as a full-face screen, a curved screen, or a profiled screen. The touch display 430 can also be designed as a combination of a full-screen and a curved-surface screen, and a combination of a special-shaped screen and a curved-surface screen, which is not limited in this embodiment. Wherein:
full screen
A full screen may refer to a screen design where the touch display 430 occupies more than a threshold (e.g., 80% or 90% or 95%) of the screen of the front panel of the terminal 400. One way of calculating the screen occupation ratio is as follows: (area of touch display 430/area of front panel of terminal 400) × 100%; another way to calculate the screen ratio is: (area of actual display area in touch display 430/area of front panel of terminal 400) × 100%; another calculation method of the screen occupation ratio is as follows: (diagonal of touch display 430/diagonal on front panel of terminal 400) × 100%. In the illustrative example shown in fig. 6A, nearly all areas on the front panel of the terminal 400 are the touch display 430, and all areas on the front panel 70 of the terminal 400 except for the edge created by the bezel 71 are the touch display 430. The four corners of the touch display screen 430 may be right angles or rounded.
A full-screen may also be a screen design that integrates at least one front panel component within or underneath the touch display screen 430. Optionally, the at least one front panel component comprises: cameras, fingerprint sensors, proximity light sensors, distance sensors, etc. In some embodiments, other components on the front panel of the conventional terminal are integrated in all or a part of the touch display screen 430, for example, after the light sensing element in the camera is split into a plurality of light sensing pixels, each light sensing pixel is integrated in a black area in each display pixel in the touch display screen 430. The full-screen has a higher screen-to-screen ratio due to the integration of at least one front panel component inside the touch display screen 430.
Of course, in other embodiments, the front panel component of the front panel of the conventional terminal may be disposed at the side or back of the terminal 400, such as disposing the ultrasonic fingerprint sensor below the touch screen 430, disposing the bone conduction handset inside the terminal 400, and disposing the camera head in a pluggable structure at the side of the terminal.
In some optional embodiments, when the terminal 400 employs a full-screen, a single side, or two sides (e.g., two left and right sides), or four sides (e.g., four upper, lower, left and right sides) of the middle frame of the terminal 400 is provided with an edge touch sensor, and the edge touch sensor is configured to detect at least one of a touch operation, a click operation, a press operation, a slide operation, and the like of a user on the middle frame. The edge touch sensor may be any one of a touch sensor, a thermal sensor, a pressure sensor, and the like. The user may apply operations on the edge touch sensor to control applications in the terminal 400.
Curved surface screen
A curved screen refers to a screen design where the screen area of the touch display screen 430 does not lie in one plane. Generally, curved screens present at least one such section: the section is in a curved shape, and the projection of the curved screen in any plane direction perpendicular to the section is a planar screen design, wherein the curved shape can be U-shaped. Alternatively, a curved screen refers to a screen design where at least one side is curved. Alternatively, the curved screen means that at least one side edge of the touch display screen 430 extends to cover the middle frame of the terminal 400. Since the side of the touch display screen 430 extends to cover the middle frame of the terminal 400, that is, the middle frame which does not have the display function and the touch function originally is covered as the displayable area and/or the operable area, the curved screen has a higher screen occupation ratio. Alternatively, as in the example shown in fig. 6B, the curved screen refers to a screen design in which the left and right side edges 72 are curved; or, the curved screen refers to a screen design in which the upper and lower sides are curved; or, the curved screen refers to a screen design in which the upper side, the lower side, the left side and the right side are all in a curved shape. In an alternative embodiment, the curved screen is made of a touch screen material with certain flexibility.
Special-shaped screen
The special-shaped screen is a touch display screen with an irregular shape, and the irregular shape is not a rectangle or a rounded rectangle. Optionally, the irregular screen refers to a screen design in which a protrusion, a notch, and/or a cutout is provided on the rectangular or rounded rectangular touch display screen 430. Alternatively, the protrusions, indentations, and/or cutouts may be located at the edges of the touch screen 430, at the center of the screen, or both. When the protrusion, the notch and/or the dug hole are arranged on one edge, the protrusion, the notch and/or the dug hole can be arranged in the middle or at two ends of the edge; when the projection, notch and/or cutout is provided in the center of the screen, it may be provided in one or more of an upper region, an upper left region, a left side region, a lower left region, a lower right region, a right side region, and an upper right region of the screen. When the projections, the notches and the dug holes are arranged in a plurality of areas, the projections, the notches and the dug holes can be distributed in a concentrated mode or in a dispersed mode; the distribution may be symmetrical or asymmetrical. Optionally, the number of projections, indentations and/or cutouts is also not limited.
The special-shaped screen covers the upper forehead area and/or the lower forehead area of the touch display screen as the displayable area and/or the operable area, so that the touch display screen occupies more space on the front panel of the terminal, and the special-shaped screen also has a larger screen occupation ratio. In some embodiments, the indentation and/or cutout is configured to receive at least one front panel component therein, the front panel component including at least one of a camera, a fingerprint sensor, a proximity light sensor, a distance sensor, an earpiece, an ambient light level sensor, and a physical key.
For example, the notch may be provided on one or more edges, and the notch may be a semicircular notch, a right-angled rectangular notch, a rounded rectangular notch, or an irregularly shaped notch. In the example shown in fig. 6C, the special-shaped screen may be a screen design with a semicircular notch 73 at the center of the upper edge of the touch display screen 430, and the semicircular notch 73 is used to accommodate at least one of a front panel component of a camera, a distance sensor (also called a proximity sensor), an earphone, and an ambient light sensor; as schematically shown in fig. 6D, the shaped screen may be a screen design having a semicircular notch 74 at a central position of the lower edge of the touch display screen 430, where the semicircular notch 74 is free for accommodating at least one of a physical key, a fingerprint sensor, and a microphone; in an exemplary example shown in fig. 6E, the special-shaped screen may be a screen design in which a semi-elliptical notch 75 is formed in the center of the lower edge of the touch display screen 430, and a semi-elliptical notch is also formed on the front panel of the terminal 400, and the two semi-elliptical notches form an elliptical area for accommodating a physical key or a fingerprint identification module; in the illustrative example shown in fig. 6F, the contoured screen may be a screen design having at least one aperture 76 in the upper half of the touch screen display 430, the aperture 76 being free to receive at least one of a camera, a distance sensor, an earpiece, and an ambient light level sensor.
In addition, those skilled in the art will appreciate that the configuration of the terminal 400 illustrated in the above-described figures does not constitute a limitation of the terminal 400, and that the terminal 400 may include more or less components than those illustrated, or some components may be combined, or a different arrangement of components. For example, the terminal 400 further includes a radio frequency circuit, an input unit, a sensor, an audio circuit, a Wireless Fidelity (WiFi) module, a power supply, a bluetooth module, and other components, which are not described herein again.
In the above embodiments, the implementation may be wholly or partly realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with embodiments of the invention, to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., Digital Versatile Disk (DVD)), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (10)
1. An application decryption method is applied to a terminal, and is characterized in that a fingerprint sensor is arranged below a display screen of the terminal, and the method comprises the following steps:
receiving a touch operation at an icon of a target application through the display screen, the target application being an encrypted application;
starting a fingerprint sensor at the icon of the target application, and acquiring fingerprint information of the touch operation through the started fingerprint sensor;
and when the fingerprint information of the touch operation is matched with the encrypted fingerprint information of the target application, starting the target application.
2. The method of claim 1, wherein the launching the fingerprint sensor at the icon of the target application comprises:
acquiring receiving time for receiving the touch operation;
and when the receiving time is within a preset time range, starting a fingerprint sensor at the icon of the target application.
3. The method of claim 1, wherein prior to collecting fingerprint information for the touch operation by the enabled fingerprint sensor, further comprising:
when an application encryption setting instruction is received, receiving at least one touch operation at an icon of at least one application through the display screen;
starting a fingerprint sensor at the icon of the at least one application, and collecting fingerprint information of the at least one touch operation through the started fingerprint sensor;
determining encrypted fingerprint information for the at least one application based on the collected fingerprint information;
and acquiring the application identification of the at least one application, and correspondingly storing the application identification of the at least one application and the encrypted fingerprint information of the at least one application.
4. The method of any of claims 1-3, wherein after collecting the fingerprint information of the touch operation by the enabled fingerprint sensor, further comprising:
when the fingerprint information of the touch operation is not matched with the encrypted fingerprint information of the target application, counting the times of acquiring the fingerprint information which is not matched with the encrypted fingerprint information of the target application within a preset time length;
and when the times of collecting the fingerprint information which is not matched with the encrypted fingerprint information of the target application is greater than the preset times, displaying prompt information, wherein the prompt information is used for prompting a user that the target application is encrypted.
5. The utility model provides an use decryption device, is applied to in the terminal, its characterized in that, the display screen below of terminal is provided with fingerprint sensor, the device includes:
a first determination module, configured to receive, through the display screen, a touch operation at an icon of a target application, where the target application is an encrypted application;
the first acquisition module is used for starting a fingerprint sensor at the icon of the target application and acquiring fingerprint information of the touch operation through the started fingerprint sensor;
and the starting module is used for starting the target application when the fingerprint information of the touch operation is matched with the encrypted fingerprint information of the target application.
6. The apparatus of claim 5, wherein the first acquisition module comprises:
the obtaining submodule is used for obtaining the receiving time of the touch operation;
and the determining sub-module is used for starting the fingerprint sensor at the icon of the target application when the receiving time is within a preset time range.
7. The apparatus of claim 5, wherein the apparatus further comprises:
the second determining module is used for receiving at least one touch operation at the icon of at least one application through the display screen when receiving an application encryption setting instruction;
the second acquisition module is used for starting the fingerprint sensor at the icon of the at least one application and acquiring fingerprint information of the at least one touch operation through the started fingerprint sensor;
a third determining module, configured to determine the acquired fingerprint information as encrypted fingerprint information of the at least one application;
and the storage module is used for acquiring the application identifier of the at least one application and correspondingly storing the application identifier of the at least one application and the encrypted fingerprint information of the at least one application.
8. The apparatus of any of claims 5-7, wherein the apparatus further comprises:
the counting module is used for counting the times of collecting the fingerprint information which is not matched with the encrypted fingerprint information of the target application within a preset time length when the fingerprint information is not matched with the encrypted fingerprint information of the target application;
and the display module is used for displaying prompt information when the number of times of collecting the fingerprint information which is not matched with the encrypted fingerprint information of the target application is greater than the preset number of times, wherein the prompt information is used for prompting a user that the target application is encrypted.
9. A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the method of any of claims 1-4 are performed when the program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
HK18107573.0A HK1248340B (en) | 2018-06-11 | Application decryption method and device, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
HK18107573.0A HK1248340B (en) | 2018-06-11 | Application decryption method and device, terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
HK1248340A1 true HK1248340A1 (en) | 2018-10-12 |
HK1248340B HK1248340B (en) | 2021-03-19 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107491683B (en) | Application decryption method and device, terminal and computer readable storage medium | |
WO2019047908A1 (en) | Fingerprint recognition method and device, mobile terminal, and storage medium | |
US11449591B2 (en) | Method and device for triggering function of function widget based on fingerprint recognition, terminal, and storage medium | |
CN108595970B (en) | Configuration method, device, terminal and storage medium of processing component | |
CN107704744B (en) | Identity verification method and device and mobile terminal | |
CN107562361B (en) | Message processing method and device and terminal | |
CN107547750B (en) | Terminal control method, device and storage medium | |
WO2020088167A1 (en) | Application activation method, device, terminal and storage medium | |
WO2020156308A1 (en) | Message processing method, device, terminal, and storage medium | |
CN107563168A (en) | Unlocking method and device for mobile terminal and mobile terminal | |
CN109726539B (en) | Application starting method, device, terminal and storage medium | |
CN107613118A (en) | Method, device, mobile terminal and storage medium for enabling shortcut function | |
CN107526477B (en) | Screen unlocking method, device and terminal | |
WO2020156199A1 (en) | Application login method and device, terminal and storage medium | |
CN107798230B (en) | Terminal control method, device, terminal and computer readable storage medium | |
CN107578013A (en) | Encrypted multimedia message playing method, device, terminal and storage medium | |
CN107644072B (en) | Data deleting method and device | |
HK1248340A1 (en) | Application decryption method and device, terminal and computer readable storage medium | |
CN107506743A (en) | Method, device, terminal and storage medium for collecting fingerprint information | |
CN111538997A (en) | Image processing method, image processing device, storage medium and terminal | |
HK1248340B (en) | Application decryption method and device, terminal and computer readable storage medium | |
CN112187879A (en) | Notification message control method and device, storage medium and terminal | |
HK1249308A1 (en) | Terminal control method and device, and storage medium | |
HK1249308B (en) | Terminal control method and device, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PC | Patent ceased (i.e. patent has lapsed due to the failure to pay the renewal fee) |
Effective date: 20240909 |