CN106951757A - A kind of method and apparatus for operating application program - Google Patents
A kind of method and apparatus for operating application program Download PDFInfo
- Publication number
- CN106951757A CN106951757A CN201710112398.1A CN201710112398A CN106951757A CN 106951757 A CN106951757 A CN 106951757A CN 201710112398 A CN201710112398 A CN 201710112398A CN 106951757 A CN106951757 A CN 106951757A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- touch action
- application program
- operation object
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- User Interface Of Digital Computer (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of method and apparatus for operating application program, methods described includes:Judge whether touch action;If there is touch action, the corresponding operation object of the touch action is obtained;Extract the corresponding operation fingerprint of the touch action;Judge whether the match is successful for the operation fingerprint default decryption fingerprint corresponding with the operation object;When the operation fingerprint is with the default decryption fingerprint matching success, the corresponding operational order of the touch action is performed.The program is by the way that user's default decryption fingerprint corresponding with the operation object to the operation fingerprint of operation object is matched; corresponding operational order is performed if the match is successful; otherwise explanation operation fingerprint is not right; associative operation can not then be performed; so as to protect the privacy of user; avoid stranger's malicious operation, and it is possible to prevente effectively from the touch action of unlocking screen moment causes maloperation, improve the security and privacy of user profile in terminal.
Description
Technical field
The present invention relates to control technology field, and in particular to a kind of method and apparatus of operation application program.
Background technology
At present, developing rapidly with the communication technology, the mobile terminal such as mobile phone, panel computer becomes in people's life not
The part that can lack.Because mobile terminal is related to the various aspects of user's life, therefore pacify for the privacy of mobile terminal
Full property is increasingly paid close attention to by people, and the secure authentication technology of mobile terminal arises at the historic moment.
The safety certification scheme of existing mobile terminal is all based on greatly fingerprint recognition, i.e., increase by one inside mobile terminal
Individual security system, is entered by fingerprint recognition, can be placed inside this independent system space the file of secret, photo and
Some application programs.Fingerprint recognition is to refer to be differentiated by the details of relatively more different fingerprints.Fingerprint recognition skill
Art is related to numerous subjects such as image procossing, pattern-recognition, computer vision, mathematical morphology, wavelet analysis.Due to everyone
Fingerprint is different, be exactly the ten of same people refer between, fingerprint also has significant difference, therefore fingerprint can be used for identity security identification.
Existing safety certification scheme function is relatively simple, can only carry out safety to a private space with a fingerprint anti-
Shield.And the switching of private space and the proper space is very inconvenient.If want single application program is encrypted, it is general necessary
Will be while input gesture password, numerical ciphers and finger print information etc., be operated more complicated.Once moreover, some mobile terminal
Or after application program is through safety certification decrypted, other users can just carry out related to the mobile terminal or application program
Check and operate, this just brings potential safety hazard to the privacy information of user.Existing mobile terminal can have been realized full frame
Fingerprint recognition, it is possible to display screen is divided into several fingerprint recognition regions, but can only be realized in particular fingerprint identification region
In some self-defined cryptographic operations.
Therefore, the personal secrets of user in terminal how are improved, as a technical problem urgently to be resolved hurrily.
The content of the invention
In view of this, the embodiments of the invention provide a kind of method and apparatus for operating application program, to solve existing skill
The problem of privacy information security of user is relatively low in mobile terminal in art.
First aspect present invention provide it is a kind of operate application program method, the terminal have can it is full frame identification refer to
The touch-screen of line, including:Judge whether touch action;If there is touch action, the touch action is obtained corresponding
Operation object;Extract the corresponding operation fingerprint of the touch action;Judge that the operation fingerprint is corresponding with the operation object
Whether the match is successful for default decryption fingerprint;When the operation fingerprint is with the default decryption fingerprint matching success, perform described
The corresponding operational order of touch action.
By implementing the method that first aspect is described, the touch action of user on the touchscreen can be detected in real time, is passed through
User's default decryption fingerprint corresponding with the operation object to the operation fingerprint of operation object is matched, if the match is successful
Corresponding operational order is then performed, otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, then can not perform
Associative operation, so as to protect the privacy of user, even if thus, the terminal of unlocked screen, stranger take after be also nothing
Method is operated to corresponding operation object (a certain item function of such as application program or application program), and can be had
Effect avoids the touch action of unlocking screen moment from causing maloperation, improves the security and privacy of user profile in terminal.
It is described to extract the touch action in first aspect present invention first embodiment with reference to first aspect present invention
Corresponding operation fingerprint includes:Whether judge the corresponding operational order of the touch action is predetermined registration operation instruction;As the behaviour
When making instruction for predetermined registration operation instruction, the operation fingerprint is extracted.
By performing above-mentioned steps, decryption fingerprint can be set for a certain predetermined registration operation instruction of operation object, only use
When the corresponding operational order of touch action at family is that predetermined registration operation is instructed, the corresponding operation fingerprint of the touch action can be just extracted,
Thus, the autotelic extraction for carrying out operation fingerprint, not only reduces the power consumption of terminal, improves the processing speed of terminal, and
And avoid the occurrence of influence of the useless finger print information to data processed result.
With reference to first aspect present invention, in first aspect present invention second embodiment, the predetermined registration operation instruction is beats
Open the operation object.
By performing above-mentioned steps, it is ensured that the operation fingerprint that only the match is successful could open the operation object, this
Place's predetermined registration operation instruction is changed including but not limited to the opening operation object or to the information of operation object, data
The operational order such as read-write and deletion, i.e., can refer to for operation object all executable operational orders as predetermined registration operation
The target to be selected of order, user can add or delete according to actual needs corresponding predetermined registration operation instruction, expand fingerprint recognition
The scope of application, further increase the security of user profile.
With reference to first aspect present invention or first aspect first embodiment or first aspect second embodiment, the present invention
In the embodiment of first aspect the 3rd, the operation object includes:Application program, file, private space and chat record.
By performing above-mentioned steps, operation object herein including but not limited to:Application program, file, private space
And chat record, naturally, operation object can also be a certain item function of some application program, such as Orientation on map,
Short message checks that user can carry out selection operation object according to actual needs, so greatly enrich the encryption side of user profile
Formula, makes the privacy of user more become more meticulous, personalized, so as to improve Consumer's Experience.
With reference to first aspect present invention, in the 4th embodiment of first aspect present invention, judged whether described
Also include before touch action:Obtain at least one described operation object in the terminal;Set for each operation object
Put the corresponding default decryption fingerprint.
By performing above-mentioned steps, the operation object that can be selected in advance in terminal sets corresponding default decryption to refer to
Line, selected operation object can be it is multiple, the corresponding default decryption fingerprint of each operation object can with it is identical can not also
Together, it is actually needed and is configured with specific reference to user, thus, realizing the multiple protective to user profile, further increases
The security of user profile.
In addition, second aspect present invention provides a kind of device of operation application program, the device of the operation application program
Module or unit including the method for performing above-mentioned first aspect or first aspect any one operation application program.
For example, the device of the operation application program includes:First judge module, is moved for judging whether to touch
Make;First acquisition module, if for there is touch action, obtaining the corresponding operation object of the touch action;Extraction module,
For extracting the corresponding operation fingerprint of the touch action;Second judge module, for judging the operation fingerprint and the behaviour
Making the corresponding default decryption fingerprint of object, whether the match is successful;Performing module, for when the operation fingerprint and the default solution
During close fingerprint matching success, the corresponding operational order of the touch action is performed.
By the device for the operation application program for implementing second aspect, the touch of user on the touchscreen can be detected in real time
Action, by the way that user's default decryption fingerprint corresponding with the operation object to the operation fingerprint of operation object is matched, such as
Really the match is successful then performs corresponding operational order, and otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger,
Associative operation can not be then performed, so as to protect the privacy of user, even if thus, the terminal of unlocked screen, stranger takes
It is also that corresponding operation object (a certain item function of such as application program or application program) can not be operated afterwards,
And it is possible to prevente effectively from the touch action of unlocking screen moment causes maloperation, improve the security of user profile in terminal
And privacy.
With reference to second aspect present invention, in second aspect present invention first embodiment, the extraction module includes:Judge
Unit, for judging whether the corresponding operational order of the touch action is predetermined registration operation instruction;Extraction unit, for when described
When operational order is that the predetermined registration operation is instructed, the operation fingerprint is extracted.
By implementing the device of aforesaid operations application program, solution can be set for a certain predetermined registration operation instruction of operation object
When the corresponding operational order of touch action of close fingerprint, only user is that predetermined registration operation is instructed, the touch action pair can be just extracted
The operation fingerprint answered, thus, the autotelic extraction for carrying out operation fingerprint, not only reduces the power consumption of terminal, improve terminal
Processing speed, and avoid the occurrence of influence of the useless finger print information to data processed result.
With reference to second aspect present invention, in second aspect present invention second embodiment, the predetermined registration operation instruction is beats
Open the operation object.
By the device for implementing aforesaid operations application program, it is ensured that the operation fingerprint that only the match is successful could be opened
The operation object, predetermined registration operation instruction herein is including but not limited to the opening operation object or to operation object
The operational order such as information change, reading and writing data and deletion, i.e., can be with for operation object all executable operational orders
The target to be selected instructed as predetermined registration operation, user can add or delete according to actual needs corresponding predetermined registration operation instruction,
The scope of application of fingerprint recognition is expanded, the security of user profile is further increased.
With reference to second aspect present invention or second aspect first embodiment or second aspect second embodiment, the present invention
In the embodiment of second aspect the 3rd, the operation object includes:Application program, file, private space and chat record.
By implementing the device of aforesaid operations application program, operation object herein including but not limited to:Application program, text
Part folder, private space and chat record, naturally, operation object can also be a certain item functions of some application program,
Such as Orientation on map, short message checks that user can carry out selection operation object according to actual needs, so greatly enrich user
The cipher mode of information, makes the privacy of user more become more meticulous, personalized, so as to improve Consumer's Experience.
With reference to second aspect present invention, in the 4th embodiment of second aspect present invention, also include:Second obtains mould
Block, for it is described judge whether touch action before, obtain at least one described operation object in the terminal;If
Module is put, for setting the corresponding default decryption fingerprint for each operation object.
By implementing the device of aforesaid operations application program, the operation object setting pair that can be selected in advance in terminal
The default decryption fingerprint answered, selected operation object can be multiple, and the corresponding default decryption fingerprint of each operation object can
With it is identical can also be different, be actually needed and be configured with specific reference to user, thus, realizing the multiple guarantor to user profile
Shield, further increases the security of user profile.
Module or unit included by the device of the operation application program are not limited to above-mentioned naming method.
These aspects of the application can more straightforward in the following description.
Third aspect present invention provides a kind of terminal, including is capable of the touch-screen and the present invention of full frame identification fingerprint
The device of operation application program described in any embodiment of second aspect or second aspect.
Fourth aspect present invention provides another terminal, including:Including:At least one processor;And with it is described extremely
The memory of few processor communication connection;Wherein, have can be by least one described computing device for the memory storage
Instruction, the instruction is by least one described computing device, so that the following method of at least one computing device:Sentence
It is disconnected to whether there is touch action;If there is touch action, the corresponding operation object of the touch action is obtained;Extract described touch
Touch the corresponding operation fingerprint of action;Judge whether the operation fingerprint default decryption fingerprint corresponding with the operation object matches
Success;When the operation fingerprint is with the default decryption fingerprint matching success, performs the corresponding operation of the touch action and refer to
Order.
Above-mentioned terminal can detect the touch action of user on the touchscreen in real time, by by behaviour of the user to operation object
Make fingerprint default decryption fingerprint corresponding with the operation object to be matched, corresponding operation is performed if the match is successful and is referred to
Order, otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, then associative operation can not be performed, so as to protect
The privacy of user, though thus, the terminal of unlocked screen, stranger take after be also can not be to corresponding operation object
(a certain item function of such as application program or application program) is operated, and it is possible to prevente effectively from unlocking screen moment
Touch action cause maloperation, improve the security and privacy of user profile in terminal.
Brief description of the drawings
The features and advantages of the present invention can be more clearly understood from by reference to accompanying drawing, accompanying drawing is schematical without that should manage
Solve to carry out any limitation to the present invention, in the accompanying drawings:
Fig. 1 shows the structure chart of mobile phone in the embodiment of the present invention;
Fig. 2 shows the flow chart of the method for operation application program according to embodiments of the present invention;
Fig. 3 shows the operating process schematic diagram of start-up operation object according to embodiments of the present invention;
Fig. 4 shows that the operation behind the position of change operation object according to embodiments of the present invention on the touchscreen is illustrated
Figure;
Fig. 5 shows the operation chart according to embodiments of the present invention that encrypting fingerprint is added for operation object;
Fig. 6 shows the structural representation of the device of operation application program according to embodiments of the present invention;
Fig. 7 shows another structural representation of the device of operation application program according to embodiments of the present invention;
Fig. 8 shows the structural representation of terminal according to embodiments of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not having
There is the every other embodiment made and obtained under the premise of creative work, belong to the scope of protection of the invention.
As shown in figure 1, being the application scenarios schematic diagram of embodiments of the invention.Mobile terminal is mobile phone or panel computer etc.
Mobile device, mobile terminal by taking mobile phone as an example, the part-structure block diagram of mobile phone as shown in figure 1, mobile phone include radio circuit 210,
Memory 220, input block 230, display unit 240, sensor 250, voicefrequency circuit 260, wireless module 270, processor 280
And the grade of power supply 290 part.It will be understood by those skilled in the art that the handset structure shown in Fig. 1 is not constituted to mobile phone
Limit, can include than illustrating more or less parts, either combine some parts or different parts arrangement.
Wherein RF circuits 210 be used for receive and send messages or communication process in, the reception and transmission of signal.Memory 220 is used for
Software program and module are stored, processor 280 is stored in the software program and module of memory 220 by operation, so that
Perform various function application and the data processing of mobile phone.Input block 230 is used for the numeral or character information for receiving input, with
And the key signals that generation is set with the user of mobile phone and function control is relevant are inputted.Input block 230 may include contact panel
231 and other input equipments 232.Other input equipments 232 can include but is not limited to physical keyboard, function key, mouse, behaviour
Make the one or more in bar.Display unit 240 be used for show by user input information or be supplied to user information and
The various menus of mobile phone.Display unit 240 can include display panel 241.Contact panel 231 can cover display panel 241, when
Contact panel 231 is detected after the touch operation on or near it, sends processor 280 to determine the class of touch event
Type, corresponding visual output is provided with preprocessor 280 according to the type of touch event on display panel 241.
Mobile phone may also include at least one sensor 250, such as optical sensor, motion sensor and other sensors.Light
Sensor may include ambient light sensor and proximity transducer, and environmental sensor can adjust display according to the light and shade of ambient light
The brightness of panel 241, proximity transducer can close display panel 241 and/or backlight when mobile phone is moved in one's ear.This implementation
Optical sensor can be arranged on the housing of the front and back of mobile phone in example, blocked area during for detecting that user holds mobile phone
Domain.Pressure sensor can also be included herein, be arranged in the front of mobile phone or back housing, for the side by detecting pressure
Formula obtains occlusion area during user's grip mobile phone.In addition, mobile phone can also configure gyroscope, barometer, hygrometer, temperature
The other sensors such as meter, infrared ray sensor, are repeated no more.
Voicefrequency circuit 260, loudspeaker 261, microphone 262 can provide the COBBAIF between user and mobile phone.Wireless mould
Block 270 can be WIFI module, provide the user wireless the Internet access service.
Processor 280 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform and be stored in software program and/or module in memory 220, and call and be stored in memory 220
Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 280 can be with
Including one or more processing units.In addition, mobile phone also includes the power supply 290 powered of each part, by power-supply management system with
Processor 280 is logically contiguous, so as to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
Referring to Fig. 2, a kind of method for operating application program provided in an embodiment of the present invention, applied to can be full frame
In the terminal of touch-screen for recognizing fingerprint, including:
S21:Judge whether touch action.The touch-screen of terminal in the present embodiment has full frame fingerprint recognition work(
Can, the touch action of user on the touchscreen can be detected in real time, and then fingerprinting operation is determined whether there is, if it is judged that
To be to enter step S22, otherwise only need to detect whether there is touch action.
S22:If there is touch action, the corresponding operation object of touch action is obtained.If touch action is present, can
With corresponding to obtain the icon according to the icon at touch action touch location on the touchscreen and the touch location
Operation object, herein operation object including but not limited to:Application program, file, private space and chat record.Such as use
When family is wanted to operate the music application in mobile phone, as shown in figure 3, user touches the icon of music application on touch-screen
(shown in small square frame in such as Fig. 3), then music application is the operation object of this operation, according to the touch location and sound of user
The icon of happy application can get music application and its relevant information.Naturally, operation object can also be some application
The a certain item function of program, such as Orientation on map, short message checks that user can carry out selection operation object according to actual needs,
The cipher mode of user profile has so been greatly enriched, the privacy of user is more become more meticulous, personalized, so as to improve user
Experience.
S23:Extract the corresponding operation fingerprint of touch action.Terminal in the present embodiment, which has, is capable of full frame identification fingerprint
Touch-screen, can be extracted in the optional position of touch-screen to the operation fingerprint of touch action, as shown in Figures 3 and 4, if with
Family is resequenced to desktop icons, such as the picture mark position of music application changes, but to the fingerprint recognition mistake of the application
Journey is unaffected.
As a kind of preferred scheme, step S23 can include:Whether judge the corresponding operational order of touch action is default
Operational order, when operational order is that predetermined registration operation is instructed, extracts operation fingerprint.The a certain default behaviour of operation object can be thought
Make instruction and decryption fingerprint is set, when the corresponding operational order of touch action of only user instructs for predetermined registration operation, can just extract
The corresponding operation fingerprint of the touch action;In the present embodiment, can be fingerprint extraction and the identification of specific region position, identification
The size in region is that the relative size shown with operation object icon on screen is adapted, namely exercisable with touch-screen
Area size is adaptable, thus, the autotelic extraction and identification for carrying out operation fingerprint, not only reduces the work(of terminal
Consumption, improves the processing speed of terminal, and avoid the occurrence of influence of the useless finger print information to data processed result.It is pre- herein
If operational order is to open music application or right including but not limited to opening operation object, such as predetermined registration operation instruction
The operational order such as the information change of operation object, reading and writing data and deletion, i.e., for operation object all executable operations
The target to be selected that can be instructed as predetermined registration operation is instructed, user can add or delete according to actual needs corresponding default
Operational order, expands the scope of application of fingerprint recognition, further increases the security of user profile.
S24:Judge whether the match is successful for operation fingerprint default decryption fingerprint corresponding with operation object;By by user couple
The operation fingerprint default decryption fingerprint corresponding with the operation object of operation object is matched, if the match is successful, explanation is to use
The normal operating at family, then into step S25, otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, such as schemes
Shown in 3, prompting frame can be ejected, points out user to reaffirm finger print information, or sends alarm after a number of retries, so as to
User notes abnormalities in time, so as to protect the privacy of user, even if thus, the terminal of unlocked screen, stranger takes it
It is also that corresponding operation object (a certain item function of such as application program or application program) can not be operated afterwards, and
And it is possible to prevente effectively from the touch action of unlocking screen moment causes maloperation, improve in terminal the security of user profile and
Privacy.
S25:When operating fingerprint with default decryption fingerprint matching success, the corresponding operational order of touch action is performed.
During with success, explanation is the normal operating of user, then performs this corresponding operational order of user's touch action, such as operation refers to
Make to open music application, then can open music application after fingerprint matching success, operated in order to the next step of user.
It should be noted that in conventional operating process, because the speed of fingerprint recognition is very fast, what is correctly matched
In the case of, user is perceived less than identification process, prompting response is just given only when fingerprint matching is unsuccessful, therefore improve use
Experience at family..
As a kind of preferred scheme, it can also include before step S21:Obtain at least one operation pair in terminal
As;For each operation object, corresponding default decryption fingerprint is set.The operation object that can be selected in advance in terminal is set
Put corresponding default decryption fingerprint, selected operation object can be multiple, and the corresponding default decryption of each operation object refers to
Line can be the same or different, and is actually needed and is configured with specific reference to user.Naturally, the operation object being selected herein
Can be that all exercisable object, i.e. users can add encrypting fingerprint, Ke Yi on different operating levels in terminal
When starting some private space, when some secure financial of startup be applied, in some file of opening or can also also may be used
To be added when being and opening the chat record with someone.Such as mobile phone screen unblock can be set to a kind of fingerprint by user, be opened
Using when reuse another fingerprint, the application of ad-hoc location can only be opened by particular fingerprint so that mobile phone is more
One layer of protection, adds the security of mobile phone.
Specifically, screen can be pressed by the icon director in selected operation object, to recall addition encrypting fingerprint
Option.Long-press screen herein can be that definition to the time can also be definition to pressure.As shown in figure 5, such as right
The address list of wechat in mobile phone is encrypted, and long-press address list icon is that may bring up【Addition and cancellation encrypting fingerprint option】,
Add after encrypting fingerprint, whenever user opens wechat, full frame fingerprint identification module begins to detect that the touch of address list position is moved
Make and then carry out fingerprint recognition.Thus, realizing the multiple protective to user profile, the safety of user profile is further increased
Property., can be at end for the ease of management encrypting fingerprint information including the operation object of encryption, the icon relative position of encryption etc.
Increase in the setting options at end【Encryption information is managed】Option, so as to realize that encrypting fingerprint information is closed or removed to a key.
The method of the operation application program provided in the present embodiment, can in terminal (such as mobile phone, panel computer etc.)
To detect the touch action of user on the touchscreen in real time, by by user to the operation fingerprint of operation object and the operation object
Corresponding default decryption fingerprint is matched, and corresponding operational order is performed if the match is successful, otherwise explanation operation fingerprint
It is not right, it may be possible to the malicious operation of stranger, then associative operation can not be performed, so that the privacy of user is protected, even if thus,
The terminal of unlocked screen, stranger take after be also can not be to corresponding operation object (such as application program or should
With a certain item function of program) operated, and it is possible to prevente effectively from the touch action of unlocking screen moment causes behaviour by mistake
Make, improve the security and privacy of user profile in terminal.
It is a kind of structural representation of the device of operation application program provided in an embodiment of the present invention, for end referring to Fig. 6
Hold in (such as mobile phone, panel computer etc.), it includes:
First judge module 61, for judging whether touch action;Detailed content is referring to the step in above-described embodiment
Rapid S21.
First acquisition module 62, if for there is touch action, obtaining the corresponding operation object of touch action;In in detail
Hold referring to the step S22 in above-described embodiment.
Extraction module 63, for extracting the corresponding operation fingerprint of touch action;Detailed content is referring in above-described embodiment
Step S23.
Second judge module 64, for judging whether operation fingerprint default decryption fingerprint corresponding with operation object matches into
Work(;Detailed content is referring to the step S24 in above-described embodiment.
Performing module 65, for when operating fingerprint with default decryption fingerprint matching success, performing touch action corresponding
Operational order.Detailed content is referring to the step S26 in above-described embodiment.
The device of the operation application program provided in the present embodiment, it is ensured that the operation fingerprint ability that only the match is successful
The operation object is opened, predetermined registration operation instruction herein is including but not limited to opening operation object or to operation object
The operational order such as information change, reading and writing data and deletion, i.e., can be with for operation object all executable operational orders
The target to be selected instructed as predetermined registration operation, user can add or delete according to actual needs corresponding predetermined registration operation instruction,
The scope of application of fingerprint recognition is expanded, the security of user profile is further increased.
Alternatively, in some embodiments of the invention, as shown in fig. 7, extraction module 63 includes:Judging unit 631, for sentencing
Whether the corresponding operational order of disconnected touch action is predetermined registration operation instruction;Extraction unit 632, for being default behaviour when operational order
When instructing, operation fingerprint is extracted.Detailed content referring to the step S23 in above-described embodiment preferred scheme.
The device of aforesaid operations application program, can set decryption fingerprint for a certain predetermined registration operation instruction of operation object,
When the corresponding operational order of touch action of only user is that predetermined registration operation is instructed, the corresponding operation of the touch action can be just extracted
Fingerprint, thus, the autotelic extraction for carrying out operation fingerprint, not only reduces the power consumption of terminal, improves the processing speed of terminal
Degree, and avoid the occurrence of influence of the useless finger print information to data processed result.
Alternatively, predetermined registration operation instruction is opening operation object.
The device of aforesaid operations application program, it is ensured that the operation fingerprint that only the match is successful could open the operation pair
As predetermined registration operation instruction herein is including but not limited to opening operation object or to the change of the information of operation object, data
The operational order such as read-write and deletion, i.e., can refer to for operation object all executable operational orders as predetermined registration operation
The target to be selected of order, user can add or delete according to actual needs corresponding predetermined registration operation instruction, expand fingerprint recognition
The scope of application, further increase the security of user profile.
Alternatively, operation object includes:Application program, file, private space and chat record.
The device of aforesaid operations application program, operation object herein including but not limited to:Application program, file, private
Close space and chat record, naturally, operation object can also be a certain item function of some application program, such as map
Positioning, short message check that user can carry out selection operation object according to actual needs, have so greatly enriched adding for user profile
Close mode, makes the privacy of user more become more meticulous, personalized, so as to improve Consumer's Experience.
Alternatively, the device of the operation application program also includes:Second acquisition module 66, for judging whether to touch
Touch before action, obtain at least one operation object in terminal;Setup module 67, for setting correspondence for each operation object
Default decryption fingerprint.
The device of aforesaid operations application program, the operation object that can be selected in advance in terminal sets corresponding default
Fingerprint is decrypted, selected operation object can be multiple, and the corresponding default decryption fingerprint of each operation object can be with identical
Can be different, it is actually needed and is configured with specific reference to user, thus, realizes the multiple protective to user profile, further
Improve the security of user profile.
The embodiment of the present invention additionally provides a kind of terminal, including is capable of the full frame touch-screen for recognizing fingerprint and any of the above-described kind
Operate the device of application program.
Illustrate a kind of terminal of the present invention by taking a kind of mobile phone as an example below.
As shown in figure 8, correspondingly, a kind of terminal is also provided in the embodiment of the present invention, including:At least one processor 81,
In memory 82, touch-screen 83 and full frame fingerprint identification module 84, Fig. 8 by taking a processor as an example, processor 81, memory
82nd, touch-screen 83 and full frame fingerprint identification module 84 are connected by bus 80, and memory 82 is stored with can be by least one
The instruction that device 81 is performed is managed, instruction is performed by least one processor 81, so that the following method of at least one computing device:
Judge whether touch action;
If there is touch action, the corresponding operation object of the touch action is obtained;
Extract the corresponding operation fingerprint of the touch action;
Judge whether the match is successful for the operation fingerprint default decryption fingerprint corresponding with the operation object;
When the operation fingerprint is with the default decryption fingerprint matching success, the corresponding operation of the touch action is performed
Instruction.
Optionally, the corresponding operation fingerprint of the touch action that extracts includes:Judge that the touch action is corresponding
Whether operational order is predetermined registration operation instruction;When the operational order is that the predetermined registration operation is instructed, extracts the operation and refer to
Line.
Optionally, the predetermined registration operation instruction is the opening operation object.
Optionally, the operation object includes:Application program, file, private space and chat record.
Optionally, in some embodiments of the invention, processor 81 is in the judgement by computer instructions
It is no there is touch action before can also realize:
Obtain at least one described operation object in the terminal;
For each operation object, the corresponding default decryption fingerprint is set.
Related description can correspond to associated description corresponding the step of referring to Fig. 2 to 5 and effect is understood, herein not
Do and excessively repeat.
The terminal that above-described embodiment is provided, the touch action of user on the touchscreen can be detected in real time, by by user
The operation fingerprint default decryption fingerprint corresponding with the operation object of operation object is matched, performed if the match is successful
Corresponding operational order, otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, then can not perform related behaviour
Make, so as to protect the privacy of user, even if thus, the terminal of unlocked screen, stranger take after be also can not be to phase
What the operation object (a certain item function of such as application program or application program) answered was operated, and it is possible to prevente effectively from
The touch action of unlocking screen moment causes maloperation, improves the security and privacy of user profile in terminal.
It is to lead to it will be understood by those skilled in the art that realizing all or part of flow in above-described embodiment method
Cross computer program to instruct the hardware of correlation to complete, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory (ROM) or random access memory (RAM) etc..
Although being described in conjunction with the accompanying embodiments of the invention, those skilled in the art can not depart from the present invention
Spirit and scope in the case of various modification can be adapted and modification, such modification and modification are each fallen within by appended claims institute
Within the scope of restriction.
Claims (10)
1. a kind of method for operating application program, in terminal, the terminal has the touch-screen for being capable of full frame identification fingerprint,
It is characterised in that it includes:
Judge whether touch action;
If there is touch action, the corresponding operation object of the touch action is obtained;
Extract the corresponding operation fingerprint of the touch action;
Judge whether the match is successful for the operation fingerprint default decryption fingerprint corresponding with the operation object;
When the operation fingerprint is with the default decryption fingerprint matching success, performs the corresponding operation of the touch action and refer to
Order.
2. the method for operation application program according to claim 1, it is characterised in that the extraction touch action pair
The operation fingerprint answered includes:
Whether judge the corresponding operational order of the touch action is predetermined registration operation instruction;
When the operational order is that the predetermined registration operation is instructed, the operation fingerprint is extracted.
3. the method for operation application program according to claim 2, it is characterised in that the predetermined registration operation instruction is opening
The operation object.
4. the method for operation application program according to any one of claim 1 to 3, it is characterised in that the operation pair
As including:Application program, file, private space and chat record.
5. the method for operation application program according to claim 1, it is characterised in that judge whether to touch described
Also include before action:
Obtain at least one described operation object in the terminal;
For each operation object, the corresponding default decryption fingerprint is set.
6. a kind of device for operating application program, in terminal, the terminal has the touch-screen for being capable of full frame identification fingerprint,
It is characterised in that it includes:
First judge module, for judging whether touch action;
First acquisition module, if for there is touch action, obtaining the corresponding operation object of the touch action;
Extraction module, for extracting the corresponding operation fingerprint of the touch action;
Second judge module, for judging whether the operation fingerprint default decryption fingerprint corresponding with the operation object matches
Success;
Performing module, for when the operation fingerprint is with the default decryption fingerprint matching success, performing the touch action
Corresponding operational order.
7. the device of operation application program according to claim 6, it is characterised in that the extraction module includes:
Judging unit, for judging whether the corresponding operational order of the touch action is predetermined registration operation instruction;
Extraction unit, for when the operational order is that the predetermined registration operation is instructed, extracting the operation fingerprint.
8. the device of operation application program according to claim 7, it is characterised in that the predetermined registration operation instruction is opening
The operation object.
9. the device of the operation application program according to any one of claim 6 to 8, it is characterised in that the operation pair
As including:Application program, file, private space and chat record.
10. the device of operation application program according to claim 6, it is characterised in that also include:
Second acquisition module, for it is described judge whether touch action before, obtain at least one in the terminal
The operation object;
Setup module, for setting the corresponding default decryption fingerprint for each operation object.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710112398.1A CN106951757A (en) | 2017-02-28 | 2017-02-28 | A kind of method and apparatus for operating application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710112398.1A CN106951757A (en) | 2017-02-28 | 2017-02-28 | A kind of method and apparatus for operating application program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106951757A true CN106951757A (en) | 2017-07-14 |
Family
ID=59467549
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710112398.1A Pending CN106951757A (en) | 2017-02-28 | 2017-02-28 | A kind of method and apparatus for operating application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106951757A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107846517A (en) * | 2017-11-13 | 2018-03-27 | 维沃移动通信有限公司 | Message method and mobile terminal |
CN109002702A (en) * | 2018-08-01 | 2018-12-14 | Oppo广东移动通信有限公司 | Solve lock control method and electronic device |
WO2019024006A1 (en) * | 2017-08-02 | 2019-02-07 | 深圳传音通讯有限公司 | Activation method and activation device for use in application of smart device |
CN109460649A (en) * | 2018-11-08 | 2019-03-12 | 维沃移动通信有限公司 | A kind of document handling method and terminal device |
CN112468643A (en) * | 2020-11-23 | 2021-03-09 | 深圳传音控股股份有限公司 | Control method of mobile terminal, mobile terminal and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104346550A (en) * | 2013-08-08 | 2015-02-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105574393A (en) * | 2015-07-31 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | App access method and terminal |
-
2017
- 2017-02-28 CN CN201710112398.1A patent/CN106951757A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104346550A (en) * | 2013-08-08 | 2015-02-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105574393A (en) * | 2015-07-31 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | App access method and terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019024006A1 (en) * | 2017-08-02 | 2019-02-07 | 深圳传音通讯有限公司 | Activation method and activation device for use in application of smart device |
CN107846517A (en) * | 2017-11-13 | 2018-03-27 | 维沃移动通信有限公司 | Message method and mobile terminal |
CN109002702A (en) * | 2018-08-01 | 2018-12-14 | Oppo广东移动通信有限公司 | Solve lock control method and electronic device |
CN109460649A (en) * | 2018-11-08 | 2019-03-12 | 维沃移动通信有限公司 | A kind of document handling method and terminal device |
CN112468643A (en) * | 2020-11-23 | 2021-03-09 | 深圳传音控股股份有限公司 | Control method of mobile terminal, mobile terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9852279B2 (en) | Device and method of setting or removing security on content | |
CN105848134B (en) | Virtual SIM card management device, communication terminal, access control method and management method | |
KR102158211B1 (en) | The mobile terminal and the control method thereof | |
KR102001913B1 (en) | Mobile Terminal and Operating Method for the Same | |
CN108038393B (en) | Application privacy protection method and mobile terminal | |
CN106951757A (en) | A kind of method and apparatus for operating application program | |
CN106355141B (en) | Portable electronic device and operation method thereof | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN109145552B (en) | Information encryption method and terminal equipment | |
EP3401822A1 (en) | Information image display method and apparatus | |
US20150332038A1 (en) | Secure entry of secrets | |
CN105574418A (en) | Data encryption method and apparatus | |
CN110188524A (en) | Information ciphering method, information decryption method and terminal | |
CN108491713B (en) | Safety reminding method and electronic equipment | |
WO2019114712A1 (en) | Method and apparatus for encrypting or decrypting data, and terminal device | |
CN106447325B (en) | NFC communication-based processing method and device and mobile terminal | |
WO2017193645A1 (en) | Method and apparatus for displaying data, and terminal | |
CN106170794A (en) | A kind of information processing method and mobile terminal | |
CN107358083B (en) | Information processing method, terminal and computer readable storage medium | |
CN106845199A (en) | Object authentication method and device | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN110633045B (en) | Data processing method and electronic equipment | |
CN106874795B (en) | Mobile terminal and machine disassembly prevention method and device thereof | |
CN109800583B (en) | Electronic device comprising a display and method of encrypting information | |
CN106529319A (en) | File protection method and device, and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170714 |