CN106951757A - A kind of method and apparatus for operating application program - Google Patents

A kind of method and apparatus for operating application program Download PDF

Info

Publication number
CN106951757A
CN106951757A CN201710112398.1A CN201710112398A CN106951757A CN 106951757 A CN106951757 A CN 106951757A CN 201710112398 A CN201710112398 A CN 201710112398A CN 106951757 A CN106951757 A CN 106951757A
Authority
CN
China
Prior art keywords
fingerprint
touch action
application program
operation object
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710112398.1A
Other languages
Chinese (zh)
Inventor
高志峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201710112398.1A priority Critical patent/CN106951757A/en
Publication of CN106951757A publication Critical patent/CN106951757A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of method and apparatus for operating application program, methods described includes:Judge whether touch action;If there is touch action, the corresponding operation object of the touch action is obtained;Extract the corresponding operation fingerprint of the touch action;Judge whether the match is successful for the operation fingerprint default decryption fingerprint corresponding with the operation object;When the operation fingerprint is with the default decryption fingerprint matching success, the corresponding operational order of the touch action is performed.The program is by the way that user's default decryption fingerprint corresponding with the operation object to the operation fingerprint of operation object is matched; corresponding operational order is performed if the match is successful; otherwise explanation operation fingerprint is not right; associative operation can not then be performed; so as to protect the privacy of user; avoid stranger's malicious operation, and it is possible to prevente effectively from the touch action of unlocking screen moment causes maloperation, improve the security and privacy of user profile in terminal.

Description

A kind of method and apparatus for operating application program
Technical field
The present invention relates to control technology field, and in particular to a kind of method and apparatus of operation application program.
Background technology
At present, developing rapidly with the communication technology, the mobile terminal such as mobile phone, panel computer becomes in people's life not The part that can lack.Because mobile terminal is related to the various aspects of user's life, therefore pacify for the privacy of mobile terminal Full property is increasingly paid close attention to by people, and the secure authentication technology of mobile terminal arises at the historic moment.
The safety certification scheme of existing mobile terminal is all based on greatly fingerprint recognition, i.e., increase by one inside mobile terminal Individual security system, is entered by fingerprint recognition, can be placed inside this independent system space the file of secret, photo and Some application programs.Fingerprint recognition is to refer to be differentiated by the details of relatively more different fingerprints.Fingerprint recognition skill Art is related to numerous subjects such as image procossing, pattern-recognition, computer vision, mathematical morphology, wavelet analysis.Due to everyone Fingerprint is different, be exactly the ten of same people refer between, fingerprint also has significant difference, therefore fingerprint can be used for identity security identification.
Existing safety certification scheme function is relatively simple, can only carry out safety to a private space with a fingerprint anti- Shield.And the switching of private space and the proper space is very inconvenient.If want single application program is encrypted, it is general necessary Will be while input gesture password, numerical ciphers and finger print information etc., be operated more complicated.Once moreover, some mobile terminal Or after application program is through safety certification decrypted, other users can just carry out related to the mobile terminal or application program Check and operate, this just brings potential safety hazard to the privacy information of user.Existing mobile terminal can have been realized full frame Fingerprint recognition, it is possible to display screen is divided into several fingerprint recognition regions, but can only be realized in particular fingerprint identification region In some self-defined cryptographic operations.
Therefore, the personal secrets of user in terminal how are improved, as a technical problem urgently to be resolved hurrily.
The content of the invention
In view of this, the embodiments of the invention provide a kind of method and apparatus for operating application program, to solve existing skill The problem of privacy information security of user is relatively low in mobile terminal in art.
First aspect present invention provide it is a kind of operate application program method, the terminal have can it is full frame identification refer to The touch-screen of line, including:Judge whether touch action;If there is touch action, the touch action is obtained corresponding Operation object;Extract the corresponding operation fingerprint of the touch action;Judge that the operation fingerprint is corresponding with the operation object Whether the match is successful for default decryption fingerprint;When the operation fingerprint is with the default decryption fingerprint matching success, perform described The corresponding operational order of touch action.
By implementing the method that first aspect is described, the touch action of user on the touchscreen can be detected in real time, is passed through User's default decryption fingerprint corresponding with the operation object to the operation fingerprint of operation object is matched, if the match is successful Corresponding operational order is then performed, otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, then can not perform Associative operation, so as to protect the privacy of user, even if thus, the terminal of unlocked screen, stranger take after be also nothing Method is operated to corresponding operation object (a certain item function of such as application program or application program), and can be had Effect avoids the touch action of unlocking screen moment from causing maloperation, improves the security and privacy of user profile in terminal.
It is described to extract the touch action in first aspect present invention first embodiment with reference to first aspect present invention Corresponding operation fingerprint includes:Whether judge the corresponding operational order of the touch action is predetermined registration operation instruction;As the behaviour When making instruction for predetermined registration operation instruction, the operation fingerprint is extracted.
By performing above-mentioned steps, decryption fingerprint can be set for a certain predetermined registration operation instruction of operation object, only use When the corresponding operational order of touch action at family is that predetermined registration operation is instructed, the corresponding operation fingerprint of the touch action can be just extracted, Thus, the autotelic extraction for carrying out operation fingerprint, not only reduces the power consumption of terminal, improves the processing speed of terminal, and And avoid the occurrence of influence of the useless finger print information to data processed result.
With reference to first aspect present invention, in first aspect present invention second embodiment, the predetermined registration operation instruction is beats Open the operation object.
By performing above-mentioned steps, it is ensured that the operation fingerprint that only the match is successful could open the operation object, this Place's predetermined registration operation instruction is changed including but not limited to the opening operation object or to the information of operation object, data The operational order such as read-write and deletion, i.e., can refer to for operation object all executable operational orders as predetermined registration operation The target to be selected of order, user can add or delete according to actual needs corresponding predetermined registration operation instruction, expand fingerprint recognition The scope of application, further increase the security of user profile.
With reference to first aspect present invention or first aspect first embodiment or first aspect second embodiment, the present invention In the embodiment of first aspect the 3rd, the operation object includes:Application program, file, private space and chat record.
By performing above-mentioned steps, operation object herein including but not limited to:Application program, file, private space And chat record, naturally, operation object can also be a certain item function of some application program, such as Orientation on map, Short message checks that user can carry out selection operation object according to actual needs, so greatly enrich the encryption side of user profile Formula, makes the privacy of user more become more meticulous, personalized, so as to improve Consumer's Experience.
With reference to first aspect present invention, in the 4th embodiment of first aspect present invention, judged whether described Also include before touch action:Obtain at least one described operation object in the terminal;Set for each operation object Put the corresponding default decryption fingerprint.
By performing above-mentioned steps, the operation object that can be selected in advance in terminal sets corresponding default decryption to refer to Line, selected operation object can be it is multiple, the corresponding default decryption fingerprint of each operation object can with it is identical can not also Together, it is actually needed and is configured with specific reference to user, thus, realizing the multiple protective to user profile, further increases The security of user profile.
In addition, second aspect present invention provides a kind of device of operation application program, the device of the operation application program Module or unit including the method for performing above-mentioned first aspect or first aspect any one operation application program.
For example, the device of the operation application program includes:First judge module, is moved for judging whether to touch Make;First acquisition module, if for there is touch action, obtaining the corresponding operation object of the touch action;Extraction module, For extracting the corresponding operation fingerprint of the touch action;Second judge module, for judging the operation fingerprint and the behaviour Making the corresponding default decryption fingerprint of object, whether the match is successful;Performing module, for when the operation fingerprint and the default solution During close fingerprint matching success, the corresponding operational order of the touch action is performed.
By the device for the operation application program for implementing second aspect, the touch of user on the touchscreen can be detected in real time Action, by the way that user's default decryption fingerprint corresponding with the operation object to the operation fingerprint of operation object is matched, such as Really the match is successful then performs corresponding operational order, and otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, Associative operation can not be then performed, so as to protect the privacy of user, even if thus, the terminal of unlocked screen, stranger takes It is also that corresponding operation object (a certain item function of such as application program or application program) can not be operated afterwards, And it is possible to prevente effectively from the touch action of unlocking screen moment causes maloperation, improve the security of user profile in terminal And privacy.
With reference to second aspect present invention, in second aspect present invention first embodiment, the extraction module includes:Judge Unit, for judging whether the corresponding operational order of the touch action is predetermined registration operation instruction;Extraction unit, for when described When operational order is that the predetermined registration operation is instructed, the operation fingerprint is extracted.
By implementing the device of aforesaid operations application program, solution can be set for a certain predetermined registration operation instruction of operation object When the corresponding operational order of touch action of close fingerprint, only user is that predetermined registration operation is instructed, the touch action pair can be just extracted The operation fingerprint answered, thus, the autotelic extraction for carrying out operation fingerprint, not only reduces the power consumption of terminal, improve terminal Processing speed, and avoid the occurrence of influence of the useless finger print information to data processed result.
With reference to second aspect present invention, in second aspect present invention second embodiment, the predetermined registration operation instruction is beats Open the operation object.
By the device for implementing aforesaid operations application program, it is ensured that the operation fingerprint that only the match is successful could be opened The operation object, predetermined registration operation instruction herein is including but not limited to the opening operation object or to operation object The operational order such as information change, reading and writing data and deletion, i.e., can be with for operation object all executable operational orders The target to be selected instructed as predetermined registration operation, user can add or delete according to actual needs corresponding predetermined registration operation instruction, The scope of application of fingerprint recognition is expanded, the security of user profile is further increased.
With reference to second aspect present invention or second aspect first embodiment or second aspect second embodiment, the present invention In the embodiment of second aspect the 3rd, the operation object includes:Application program, file, private space and chat record.
By implementing the device of aforesaid operations application program, operation object herein including but not limited to:Application program, text Part folder, private space and chat record, naturally, operation object can also be a certain item functions of some application program, Such as Orientation on map, short message checks that user can carry out selection operation object according to actual needs, so greatly enrich user The cipher mode of information, makes the privacy of user more become more meticulous, personalized, so as to improve Consumer's Experience.
With reference to second aspect present invention, in the 4th embodiment of second aspect present invention, also include:Second obtains mould Block, for it is described judge whether touch action before, obtain at least one described operation object in the terminal;If Module is put, for setting the corresponding default decryption fingerprint for each operation object.
By implementing the device of aforesaid operations application program, the operation object setting pair that can be selected in advance in terminal The default decryption fingerprint answered, selected operation object can be multiple, and the corresponding default decryption fingerprint of each operation object can With it is identical can also be different, be actually needed and be configured with specific reference to user, thus, realizing the multiple guarantor to user profile Shield, further increases the security of user profile.
Module or unit included by the device of the operation application program are not limited to above-mentioned naming method.
These aspects of the application can more straightforward in the following description.
Third aspect present invention provides a kind of terminal, including is capable of the touch-screen and the present invention of full frame identification fingerprint The device of operation application program described in any embodiment of second aspect or second aspect.
Fourth aspect present invention provides another terminal, including:Including:At least one processor;And with it is described extremely The memory of few processor communication connection;Wherein, have can be by least one described computing device for the memory storage Instruction, the instruction is by least one described computing device, so that the following method of at least one computing device:Sentence It is disconnected to whether there is touch action;If there is touch action, the corresponding operation object of the touch action is obtained;Extract described touch Touch the corresponding operation fingerprint of action;Judge whether the operation fingerprint default decryption fingerprint corresponding with the operation object matches Success;When the operation fingerprint is with the default decryption fingerprint matching success, performs the corresponding operation of the touch action and refer to Order.
Above-mentioned terminal can detect the touch action of user on the touchscreen in real time, by by behaviour of the user to operation object Make fingerprint default decryption fingerprint corresponding with the operation object to be matched, corresponding operation is performed if the match is successful and is referred to Order, otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, then associative operation can not be performed, so as to protect The privacy of user, though thus, the terminal of unlocked screen, stranger take after be also can not be to corresponding operation object (a certain item function of such as application program or application program) is operated, and it is possible to prevente effectively from unlocking screen moment Touch action cause maloperation, improve the security and privacy of user profile in terminal.
Brief description of the drawings
The features and advantages of the present invention can be more clearly understood from by reference to accompanying drawing, accompanying drawing is schematical without that should manage Solve to carry out any limitation to the present invention, in the accompanying drawings:
Fig. 1 shows the structure chart of mobile phone in the embodiment of the present invention;
Fig. 2 shows the flow chart of the method for operation application program according to embodiments of the present invention;
Fig. 3 shows the operating process schematic diagram of start-up operation object according to embodiments of the present invention;
Fig. 4 shows that the operation behind the position of change operation object according to embodiments of the present invention on the touchscreen is illustrated Figure;
Fig. 5 shows the operation chart according to embodiments of the present invention that encrypting fingerprint is added for operation object;
Fig. 6 shows the structural representation of the device of operation application program according to embodiments of the present invention;
Fig. 7 shows another structural representation of the device of operation application program according to embodiments of the present invention;
Fig. 8 shows the structural representation of terminal according to embodiments of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not having There is the every other embodiment made and obtained under the premise of creative work, belong to the scope of protection of the invention.
As shown in figure 1, being the application scenarios schematic diagram of embodiments of the invention.Mobile terminal is mobile phone or panel computer etc. Mobile device, mobile terminal by taking mobile phone as an example, the part-structure block diagram of mobile phone as shown in figure 1, mobile phone include radio circuit 210, Memory 220, input block 230, display unit 240, sensor 250, voicefrequency circuit 260, wireless module 270, processor 280 And the grade of power supply 290 part.It will be understood by those skilled in the art that the handset structure shown in Fig. 1 is not constituted to mobile phone Limit, can include than illustrating more or less parts, either combine some parts or different parts arrangement.
Wherein RF circuits 210 be used for receive and send messages or communication process in, the reception and transmission of signal.Memory 220 is used for Software program and module are stored, processor 280 is stored in the software program and module of memory 220 by operation, so that Perform various function application and the data processing of mobile phone.Input block 230 is used for the numeral or character information for receiving input, with And the key signals that generation is set with the user of mobile phone and function control is relevant are inputted.Input block 230 may include contact panel 231 and other input equipments 232.Other input equipments 232 can include but is not limited to physical keyboard, function key, mouse, behaviour Make the one or more in bar.Display unit 240 be used for show by user input information or be supplied to user information and The various menus of mobile phone.Display unit 240 can include display panel 241.Contact panel 231 can cover display panel 241, when Contact panel 231 is detected after the touch operation on or near it, sends processor 280 to determine the class of touch event Type, corresponding visual output is provided with preprocessor 280 according to the type of touch event on display panel 241.
Mobile phone may also include at least one sensor 250, such as optical sensor, motion sensor and other sensors.Light Sensor may include ambient light sensor and proximity transducer, and environmental sensor can adjust display according to the light and shade of ambient light The brightness of panel 241, proximity transducer can close display panel 241 and/or backlight when mobile phone is moved in one's ear.This implementation Optical sensor can be arranged on the housing of the front and back of mobile phone in example, blocked area during for detecting that user holds mobile phone Domain.Pressure sensor can also be included herein, be arranged in the front of mobile phone or back housing, for the side by detecting pressure Formula obtains occlusion area during user's grip mobile phone.In addition, mobile phone can also configure gyroscope, barometer, hygrometer, temperature The other sensors such as meter, infrared ray sensor, are repeated no more.
Voicefrequency circuit 260, loudspeaker 261, microphone 262 can provide the COBBAIF between user and mobile phone.Wireless mould Block 270 can be WIFI module, provide the user wireless the Internet access service.
Processor 280 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform and be stored in software program and/or module in memory 220, and call and be stored in memory 220 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 280 can be with Including one or more processing units.In addition, mobile phone also includes the power supply 290 powered of each part, by power-supply management system with Processor 280 is logically contiguous, so as to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
Referring to Fig. 2, a kind of method for operating application program provided in an embodiment of the present invention, applied to can be full frame In the terminal of touch-screen for recognizing fingerprint, including:
S21:Judge whether touch action.The touch-screen of terminal in the present embodiment has full frame fingerprint recognition work( Can, the touch action of user on the touchscreen can be detected in real time, and then fingerprinting operation is determined whether there is, if it is judged that To be to enter step S22, otherwise only need to detect whether there is touch action.
S22:If there is touch action, the corresponding operation object of touch action is obtained.If touch action is present, can With corresponding to obtain the icon according to the icon at touch action touch location on the touchscreen and the touch location Operation object, herein operation object including but not limited to:Application program, file, private space and chat record.Such as use When family is wanted to operate the music application in mobile phone, as shown in figure 3, user touches the icon of music application on touch-screen (shown in small square frame in such as Fig. 3), then music application is the operation object of this operation, according to the touch location and sound of user The icon of happy application can get music application and its relevant information.Naturally, operation object can also be some application The a certain item function of program, such as Orientation on map, short message checks that user can carry out selection operation object according to actual needs, The cipher mode of user profile has so been greatly enriched, the privacy of user is more become more meticulous, personalized, so as to improve user Experience.
S23:Extract the corresponding operation fingerprint of touch action.Terminal in the present embodiment, which has, is capable of full frame identification fingerprint Touch-screen, can be extracted in the optional position of touch-screen to the operation fingerprint of touch action, as shown in Figures 3 and 4, if with Family is resequenced to desktop icons, such as the picture mark position of music application changes, but to the fingerprint recognition mistake of the application Journey is unaffected.
As a kind of preferred scheme, step S23 can include:Whether judge the corresponding operational order of touch action is default Operational order, when operational order is that predetermined registration operation is instructed, extracts operation fingerprint.The a certain default behaviour of operation object can be thought Make instruction and decryption fingerprint is set, when the corresponding operational order of touch action of only user instructs for predetermined registration operation, can just extract The corresponding operation fingerprint of the touch action;In the present embodiment, can be fingerprint extraction and the identification of specific region position, identification The size in region is that the relative size shown with operation object icon on screen is adapted, namely exercisable with touch-screen Area size is adaptable, thus, the autotelic extraction and identification for carrying out operation fingerprint, not only reduces the work(of terminal Consumption, improves the processing speed of terminal, and avoid the occurrence of influence of the useless finger print information to data processed result.It is pre- herein If operational order is to open music application or right including but not limited to opening operation object, such as predetermined registration operation instruction The operational order such as the information change of operation object, reading and writing data and deletion, i.e., for operation object all executable operations The target to be selected that can be instructed as predetermined registration operation is instructed, user can add or delete according to actual needs corresponding default Operational order, expands the scope of application of fingerprint recognition, further increases the security of user profile.
S24:Judge whether the match is successful for operation fingerprint default decryption fingerprint corresponding with operation object;By by user couple The operation fingerprint default decryption fingerprint corresponding with the operation object of operation object is matched, if the match is successful, explanation is to use The normal operating at family, then into step S25, otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, such as schemes Shown in 3, prompting frame can be ejected, points out user to reaffirm finger print information, or sends alarm after a number of retries, so as to User notes abnormalities in time, so as to protect the privacy of user, even if thus, the terminal of unlocked screen, stranger takes it It is also that corresponding operation object (a certain item function of such as application program or application program) can not be operated afterwards, and And it is possible to prevente effectively from the touch action of unlocking screen moment causes maloperation, improve in terminal the security of user profile and Privacy.
S25:When operating fingerprint with default decryption fingerprint matching success, the corresponding operational order of touch action is performed. During with success, explanation is the normal operating of user, then performs this corresponding operational order of user's touch action, such as operation refers to Make to open music application, then can open music application after fingerprint matching success, operated in order to the next step of user.
It should be noted that in conventional operating process, because the speed of fingerprint recognition is very fast, what is correctly matched In the case of, user is perceived less than identification process, prompting response is just given only when fingerprint matching is unsuccessful, therefore improve use Experience at family..
As a kind of preferred scheme, it can also include before step S21:Obtain at least one operation pair in terminal As;For each operation object, corresponding default decryption fingerprint is set.The operation object that can be selected in advance in terminal is set Put corresponding default decryption fingerprint, selected operation object can be multiple, and the corresponding default decryption of each operation object refers to Line can be the same or different, and is actually needed and is configured with specific reference to user.Naturally, the operation object being selected herein Can be that all exercisable object, i.e. users can add encrypting fingerprint, Ke Yi on different operating levels in terminal When starting some private space, when some secure financial of startup be applied, in some file of opening or can also also may be used To be added when being and opening the chat record with someone.Such as mobile phone screen unblock can be set to a kind of fingerprint by user, be opened Using when reuse another fingerprint, the application of ad-hoc location can only be opened by particular fingerprint so that mobile phone is more One layer of protection, adds the security of mobile phone.
Specifically, screen can be pressed by the icon director in selected operation object, to recall addition encrypting fingerprint Option.Long-press screen herein can be that definition to the time can also be definition to pressure.As shown in figure 5, such as right The address list of wechat in mobile phone is encrypted, and long-press address list icon is that may bring up【Addition and cancellation encrypting fingerprint option】, Add after encrypting fingerprint, whenever user opens wechat, full frame fingerprint identification module begins to detect that the touch of address list position is moved Make and then carry out fingerprint recognition.Thus, realizing the multiple protective to user profile, the safety of user profile is further increased Property., can be at end for the ease of management encrypting fingerprint information including the operation object of encryption, the icon relative position of encryption etc. Increase in the setting options at end【Encryption information is managed】Option, so as to realize that encrypting fingerprint information is closed or removed to a key.
The method of the operation application program provided in the present embodiment, can in terminal (such as mobile phone, panel computer etc.) To detect the touch action of user on the touchscreen in real time, by by user to the operation fingerprint of operation object and the operation object Corresponding default decryption fingerprint is matched, and corresponding operational order is performed if the match is successful, otherwise explanation operation fingerprint It is not right, it may be possible to the malicious operation of stranger, then associative operation can not be performed, so that the privacy of user is protected, even if thus, The terminal of unlocked screen, stranger take after be also can not be to corresponding operation object (such as application program or should With a certain item function of program) operated, and it is possible to prevente effectively from the touch action of unlocking screen moment causes behaviour by mistake Make, improve the security and privacy of user profile in terminal.
It is a kind of structural representation of the device of operation application program provided in an embodiment of the present invention, for end referring to Fig. 6 Hold in (such as mobile phone, panel computer etc.), it includes:
First judge module 61, for judging whether touch action;Detailed content is referring to the step in above-described embodiment Rapid S21.
First acquisition module 62, if for there is touch action, obtaining the corresponding operation object of touch action;In in detail Hold referring to the step S22 in above-described embodiment.
Extraction module 63, for extracting the corresponding operation fingerprint of touch action;Detailed content is referring in above-described embodiment Step S23.
Second judge module 64, for judging whether operation fingerprint default decryption fingerprint corresponding with operation object matches into Work(;Detailed content is referring to the step S24 in above-described embodiment.
Performing module 65, for when operating fingerprint with default decryption fingerprint matching success, performing touch action corresponding Operational order.Detailed content is referring to the step S26 in above-described embodiment.
The device of the operation application program provided in the present embodiment, it is ensured that the operation fingerprint ability that only the match is successful The operation object is opened, predetermined registration operation instruction herein is including but not limited to opening operation object or to operation object The operational order such as information change, reading and writing data and deletion, i.e., can be with for operation object all executable operational orders The target to be selected instructed as predetermined registration operation, user can add or delete according to actual needs corresponding predetermined registration operation instruction, The scope of application of fingerprint recognition is expanded, the security of user profile is further increased.
Alternatively, in some embodiments of the invention, as shown in fig. 7, extraction module 63 includes:Judging unit 631, for sentencing Whether the corresponding operational order of disconnected touch action is predetermined registration operation instruction;Extraction unit 632, for being default behaviour when operational order When instructing, operation fingerprint is extracted.Detailed content referring to the step S23 in above-described embodiment preferred scheme.
The device of aforesaid operations application program, can set decryption fingerprint for a certain predetermined registration operation instruction of operation object, When the corresponding operational order of touch action of only user is that predetermined registration operation is instructed, the corresponding operation of the touch action can be just extracted Fingerprint, thus, the autotelic extraction for carrying out operation fingerprint, not only reduces the power consumption of terminal, improves the processing speed of terminal Degree, and avoid the occurrence of influence of the useless finger print information to data processed result.
Alternatively, predetermined registration operation instruction is opening operation object.
The device of aforesaid operations application program, it is ensured that the operation fingerprint that only the match is successful could open the operation pair As predetermined registration operation instruction herein is including but not limited to opening operation object or to the change of the information of operation object, data The operational order such as read-write and deletion, i.e., can refer to for operation object all executable operational orders as predetermined registration operation The target to be selected of order, user can add or delete according to actual needs corresponding predetermined registration operation instruction, expand fingerprint recognition The scope of application, further increase the security of user profile.
Alternatively, operation object includes:Application program, file, private space and chat record.
The device of aforesaid operations application program, operation object herein including but not limited to:Application program, file, private Close space and chat record, naturally, operation object can also be a certain item function of some application program, such as map Positioning, short message check that user can carry out selection operation object according to actual needs, have so greatly enriched adding for user profile Close mode, makes the privacy of user more become more meticulous, personalized, so as to improve Consumer's Experience.
Alternatively, the device of the operation application program also includes:Second acquisition module 66, for judging whether to touch Touch before action, obtain at least one operation object in terminal;Setup module 67, for setting correspondence for each operation object Default decryption fingerprint.
The device of aforesaid operations application program, the operation object that can be selected in advance in terminal sets corresponding default Fingerprint is decrypted, selected operation object can be multiple, and the corresponding default decryption fingerprint of each operation object can be with identical Can be different, it is actually needed and is configured with specific reference to user, thus, realizes the multiple protective to user profile, further Improve the security of user profile.
The embodiment of the present invention additionally provides a kind of terminal, including is capable of the full frame touch-screen for recognizing fingerprint and any of the above-described kind Operate the device of application program.
Illustrate a kind of terminal of the present invention by taking a kind of mobile phone as an example below.
As shown in figure 8, correspondingly, a kind of terminal is also provided in the embodiment of the present invention, including:At least one processor 81, In memory 82, touch-screen 83 and full frame fingerprint identification module 84, Fig. 8 by taking a processor as an example, processor 81, memory 82nd, touch-screen 83 and full frame fingerprint identification module 84 are connected by bus 80, and memory 82 is stored with can be by least one The instruction that device 81 is performed is managed, instruction is performed by least one processor 81, so that the following method of at least one computing device:
Judge whether touch action;
If there is touch action, the corresponding operation object of the touch action is obtained;
Extract the corresponding operation fingerprint of the touch action;
Judge whether the match is successful for the operation fingerprint default decryption fingerprint corresponding with the operation object;
When the operation fingerprint is with the default decryption fingerprint matching success, the corresponding operation of the touch action is performed Instruction.
Optionally, the corresponding operation fingerprint of the touch action that extracts includes:Judge that the touch action is corresponding Whether operational order is predetermined registration operation instruction;When the operational order is that the predetermined registration operation is instructed, extracts the operation and refer to Line.
Optionally, the predetermined registration operation instruction is the opening operation object.
Optionally, the operation object includes:Application program, file, private space and chat record.
Optionally, in some embodiments of the invention, processor 81 is in the judgement by computer instructions It is no there is touch action before can also realize:
Obtain at least one described operation object in the terminal;
For each operation object, the corresponding default decryption fingerprint is set.
Related description can correspond to associated description corresponding the step of referring to Fig. 2 to 5 and effect is understood, herein not Do and excessively repeat.
The terminal that above-described embodiment is provided, the touch action of user on the touchscreen can be detected in real time, by by user The operation fingerprint default decryption fingerprint corresponding with the operation object of operation object is matched, performed if the match is successful Corresponding operational order, otherwise explanation operation fingerprint is not right, it may be possible to the malicious operation of stranger, then can not perform related behaviour Make, so as to protect the privacy of user, even if thus, the terminal of unlocked screen, stranger take after be also can not be to phase What the operation object (a certain item function of such as application program or application program) answered was operated, and it is possible to prevente effectively from The touch action of unlocking screen moment causes maloperation, improves the security and privacy of user profile in terminal.
It is to lead to it will be understood by those skilled in the art that realizing all or part of flow in above-described embodiment method Cross computer program to instruct the hardware of correlation to complete, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (ROM) or random access memory (RAM) etc..
Although being described in conjunction with the accompanying embodiments of the invention, those skilled in the art can not depart from the present invention Spirit and scope in the case of various modification can be adapted and modification, such modification and modification are each fallen within by appended claims institute Within the scope of restriction.

Claims (10)

1. a kind of method for operating application program, in terminal, the terminal has the touch-screen for being capable of full frame identification fingerprint, It is characterised in that it includes:
Judge whether touch action;
If there is touch action, the corresponding operation object of the touch action is obtained;
Extract the corresponding operation fingerprint of the touch action;
Judge whether the match is successful for the operation fingerprint default decryption fingerprint corresponding with the operation object;
When the operation fingerprint is with the default decryption fingerprint matching success, performs the corresponding operation of the touch action and refer to Order.
2. the method for operation application program according to claim 1, it is characterised in that the extraction touch action pair The operation fingerprint answered includes:
Whether judge the corresponding operational order of the touch action is predetermined registration operation instruction;
When the operational order is that the predetermined registration operation is instructed, the operation fingerprint is extracted.
3. the method for operation application program according to claim 2, it is characterised in that the predetermined registration operation instruction is opening The operation object.
4. the method for operation application program according to any one of claim 1 to 3, it is characterised in that the operation pair As including:Application program, file, private space and chat record.
5. the method for operation application program according to claim 1, it is characterised in that judge whether to touch described Also include before action:
Obtain at least one described operation object in the terminal;
For each operation object, the corresponding default decryption fingerprint is set.
6. a kind of device for operating application program, in terminal, the terminal has the touch-screen for being capable of full frame identification fingerprint, It is characterised in that it includes:
First judge module, for judging whether touch action;
First acquisition module, if for there is touch action, obtaining the corresponding operation object of the touch action;
Extraction module, for extracting the corresponding operation fingerprint of the touch action;
Second judge module, for judging whether the operation fingerprint default decryption fingerprint corresponding with the operation object matches Success;
Performing module, for when the operation fingerprint is with the default decryption fingerprint matching success, performing the touch action Corresponding operational order.
7. the device of operation application program according to claim 6, it is characterised in that the extraction module includes:
Judging unit, for judging whether the corresponding operational order of the touch action is predetermined registration operation instruction;
Extraction unit, for when the operational order is that the predetermined registration operation is instructed, extracting the operation fingerprint.
8. the device of operation application program according to claim 7, it is characterised in that the predetermined registration operation instruction is opening The operation object.
9. the device of the operation application program according to any one of claim 6 to 8, it is characterised in that the operation pair As including:Application program, file, private space and chat record.
10. the device of operation application program according to claim 6, it is characterised in that also include:
Second acquisition module, for it is described judge whether touch action before, obtain at least one in the terminal The operation object;
Setup module, for setting the corresponding default decryption fingerprint for each operation object.
CN201710112398.1A 2017-02-28 2017-02-28 A kind of method and apparatus for operating application program Pending CN106951757A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710112398.1A CN106951757A (en) 2017-02-28 2017-02-28 A kind of method and apparatus for operating application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710112398.1A CN106951757A (en) 2017-02-28 2017-02-28 A kind of method and apparatus for operating application program

Publications (1)

Publication Number Publication Date
CN106951757A true CN106951757A (en) 2017-07-14

Family

ID=59467549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710112398.1A Pending CN106951757A (en) 2017-02-28 2017-02-28 A kind of method and apparatus for operating application program

Country Status (1)

Country Link
CN (1) CN106951757A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107846517A (en) * 2017-11-13 2018-03-27 维沃移动通信有限公司 Message method and mobile terminal
CN109002702A (en) * 2018-08-01 2018-12-14 Oppo广东移动通信有限公司 Solve lock control method and electronic device
WO2019024006A1 (en) * 2017-08-02 2019-02-07 深圳传音通讯有限公司 Activation method and activation device for use in application of smart device
CN109460649A (en) * 2018-11-08 2019-03-12 维沃移动通信有限公司 A kind of document handling method and terminal device
CN112468643A (en) * 2020-11-23 2021-03-09 深圳传音控股股份有限公司 Control method of mobile terminal, mobile terminal and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346550A (en) * 2013-08-08 2015-02-11 联想(北京)有限公司 Information processing method and electronic equipment
CN105574393A (en) * 2015-07-31 2016-05-11 宇龙计算机通信科技(深圳)有限公司 App access method and terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346550A (en) * 2013-08-08 2015-02-11 联想(北京)有限公司 Information processing method and electronic equipment
CN105574393A (en) * 2015-07-31 2016-05-11 宇龙计算机通信科技(深圳)有限公司 App access method and terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019024006A1 (en) * 2017-08-02 2019-02-07 深圳传音通讯有限公司 Activation method and activation device for use in application of smart device
CN107846517A (en) * 2017-11-13 2018-03-27 维沃移动通信有限公司 Message method and mobile terminal
CN109002702A (en) * 2018-08-01 2018-12-14 Oppo广东移动通信有限公司 Solve lock control method and electronic device
CN109460649A (en) * 2018-11-08 2019-03-12 维沃移动通信有限公司 A kind of document handling method and terminal device
CN112468643A (en) * 2020-11-23 2021-03-09 深圳传音控股股份有限公司 Control method of mobile terminal, mobile terminal and storage medium

Similar Documents

Publication Publication Date Title
US9852279B2 (en) Device and method of setting or removing security on content
CN105848134B (en) Virtual SIM card management device, communication terminal, access control method and management method
KR102158211B1 (en) The mobile terminal and the control method thereof
KR102001913B1 (en) Mobile Terminal and Operating Method for the Same
CN108038393B (en) Application privacy protection method and mobile terminal
CN106951757A (en) A kind of method and apparatus for operating application program
CN106355141B (en) Portable electronic device and operation method thereof
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN109145552B (en) Information encryption method and terminal equipment
EP3401822A1 (en) Information image display method and apparatus
US20150332038A1 (en) Secure entry of secrets
CN105574418A (en) Data encryption method and apparatus
CN110188524A (en) Information ciphering method, information decryption method and terminal
CN108491713B (en) Safety reminding method and electronic equipment
WO2019114712A1 (en) Method and apparatus for encrypting or decrypting data, and terminal device
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
WO2017193645A1 (en) Method and apparatus for displaying data, and terminal
CN106170794A (en) A kind of information processing method and mobile terminal
CN107358083B (en) Information processing method, terminal and computer readable storage medium
CN106845199A (en) Object authentication method and device
CN106789070A (en) The decryption method of data, device and terminal
CN110633045B (en) Data processing method and electronic equipment
CN106874795B (en) Mobile terminal and machine disassembly prevention method and device thereof
CN109800583B (en) Electronic device comprising a display and method of encrypting information
CN106529319A (en) File protection method and device, and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170714