CN105117663B - The encrypted object display methods and device of a kind of application - Google Patents
The encrypted object display methods and device of a kind of application Download PDFInfo
- Publication number
- CN105117663B CN105117663B CN201510612958.0A CN201510612958A CN105117663B CN 105117663 B CN105117663 B CN 105117663B CN 201510612958 A CN201510612958 A CN 201510612958A CN 105117663 B CN105117663 B CN 105117663B
- Authority
- CN
- China
- Prior art keywords
- touch operation
- user
- touch
- encrypted object
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Collating Specific Patterns (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses the encrypted object display methods and device of a kind of application, wherein, this method includes:During terminal operating third-party application, the user fingerprints information that user carries out preset fingerprint recognition region touch operation input is obtained;Judge whether the user fingerprints information matches with preset verification finger print information;If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, the encrypted object in the third-party application is shown.Implement the embodiment of the present invention, the display of the encrypted object of application can be controlled according to user fingerprints information, avoid privacy of user leakage.
Description
Technical field
The present invention relates to communication technique field more particularly to the encrypted object display methods and device of a kind of application.
Background technology
As the function that can be used in the various terminals such as the development of terminal technology, mobile phone is also more and more, to user with
Great convenience is carried out.During terminal use, some pictures or video to being related to privacy of user are many times needed
It is encrypted, to prevent privacy leakage.
In current cipher mode, the picture generally can all be shown after either video is encrypted to picture or regarded
The prompt message that frequency has been encrypted so that other users can recognize the presence of the encrypted object, this allows for the encryption pair
As there is decrypted possibility, so as to cause privacy leakage.
Invention content
An embodiment of the present invention provides the encrypted object display methods and device of a kind of application, can be believed according to user fingerprints
The display of the encrypted object of breath control application, avoids privacy of user leakage.
The embodiment of the invention discloses a kind of encrypted object display methods of application, including:
During terminal operating third-party application, it is defeated to the progress touch operation of preset fingerprint recognition region to obtain user
The user fingerprints information entered;
Judge whether the user fingerprints information matches with preset verification finger print information;
If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, display
Encrypted object in the third-party application.
Optionally, the user fingerprints for carrying out touch operation input to preset fingerprint recognition region in the acquisition user are believed
Before breath, the method further includes:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, described in monitoring
The corresponding touch duration of touch operation;
Judge whether the touch duration is more than preset time threshold;
If more than the preset time threshold, perform the acquisition user and preset fingerprint recognition region is touched
The step of user fingerprints information of operation input.
Optionally, before the encrypted object in the display third-party application, the method further includes:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, described in acquisition
The corresponding touch pressure of touch operation;
Judge whether the touch pressure is more than preset pressure threshold value;
If more than the preset pressure threshold value, execution is described in the range of the corresponding display duration of the touch operation,
The step of showing the encrypted object in the third-party application.
Optionally, before the encrypted object in the display third-party application, the method further includes:
Preset message notifying is exported, the message notifying is used to that user to be reminded to input voiceprint;
Receive user response described in message notifying input voiceprint, and judge the voiceprint whether with default sound
Line information match;
If matching with the default voiceprint, perform described in the corresponding display duration range of the touch operation
It is interior, the step of showing the encrypted object in the third-party application.
Optionally, it is described in the range of the corresponding display duration of the touch operation, it shows in the third-party application
Encrypted object, including:
If matching with the verification finger print information, the encrypted object in the third-party application is shown;
Whether the user fingerprints information inputted according to preset interval detection matches with the verification finger print information;
When user fingerprints information is mismatched with the verification finger print information, the encryption pair in the third-party application is hidden
As.
Correspondingly, the embodiment of the invention also discloses a kind of display device, including:
Data obtaining module, for during terminal operating third-party application, obtaining user to preset fingerprint recognition
Region carries out the user fingerprints information of touch operation input;
Fingerprint matching module, for judge the user fingerprints information that described information acquisition module gets whether in advance
The verification finger print information put matches;
Display module, for being the user fingerprints information and the verification in the judging result of the fingerprint matching module
When finger print information matches, in the range of the corresponding display duration of the touch operation, adding in the third-party application is shown
Close object.
Optionally, described device further includes:
Time supervision module detects that user carries out touch operation triggering to preset fingerprint recognition region and touches for working as
When touching instruction, the corresponding touch duration of the touch operation is monitored;
First judgment module, for judging whether the touch duration that the time supervision module monitors arrive is more than default
Time threshold;
First notification module is more than described pre- for being the touch duration in the judging result of first judgment module
If during time threshold, notice described information acquisition module obtains user and carries out touch operation input to preset fingerprint recognition region
User fingerprints information.
Optionally, described device further includes:
Pressure acquisition module detects that user carries out touch operation triggering to preset fingerprint recognition region and touches for working as
When touching instruction, the corresponding touch pressure of the touch operation is obtained;
Second judgment module, for judging whether the touch pressure that the pressure acquisition module is got is more than default
Pressure threshold;
Second notification module, for the judging result of second judgment module for the touch pressure be more than it is described pre-
If during pressure threshold, the display module is notified in the range of the corresponding display duration of the touch operation, to show the third
Encrypted object in Fang Yingyong.
Optionally, described device further includes:
Output module, for exporting preset message notifying, the message notifying is used to that user to be reminded to input voiceprint;
Third judgment module for receiving the voiceprint that message notifying described in user response inputs, judges the vocal print
Whether information matches with default voiceprint;
Third notice module, for being the voiceprint and default vocal print in the judging result of the third judgment module
During information match, the display module is notified in the range of the corresponding display duration of the touch operation, to show the third
Encrypted object in Fang Yingyong.
Optionally, the display module is additionally operable to the user fingerprints information got when described information acquisition module and institute
When stating verification finger print information mismatch, the encrypted object in the third-party application is hidden.
Implement the embodiment of the present invention, have the advantages that:
The embodiment of the present invention can detect the fingerprint that user is inputted by touch operation in third-party application operational process
During information, by the way that the user fingerprints information of the input match comparing with pre-set verification finger print information, thus
When the user fingerprints information matches with the verification finger print information, you can to the third party in the display duration of the touch operation
Encrypted object in is shown.The embodiment of the present invention can control the encrypted object of application according to user fingerprints information
Display so that other users can not perceive the presence of encrypted object, avoid privacy of user leakage.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present invention, general for this field
For logical technical staff, without creative efforts, other attached drawings are can also be obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of the encrypted object display methods of application provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of the encrypted object display methods of another application provided in an embodiment of the present invention;
Fig. 3 is a kind of structure diagram of display device provided in an embodiment of the present invention;
Fig. 4 is a kind of structure diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without making creative work
Example, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses the encrypted object display methods and device of a kind of application, can be believed according to user fingerprints
The display of the encrypted object of breath control application, avoids privacy of user leakage.It is described in detail individually below.
Referring to Fig. 1, Fig. 1 is a kind of flow signal of the encrypted object display methods of application provided in an embodiment of the present invention
Figure, specifically, as shown in Figure 1, the encrypted object display methods of the application may comprise steps of:
S101:During terminal operating third-party application, obtain user and preset fingerprint recognition region is touched
The user fingerprints information of operation input.
It should be noted that the method for the embodiment of the present invention can be applied particularly to terminal device (referred to as " terminal ")
In, the terminal device can include but is not limited to smart mobile phone (such as Android phone, iOS mobile phones), tablet computer, shifting
Dynamic internet device (Mobile Internet Devices, referred to as " MID "), personal digital assistant (Personal Digital
Assistant, referred to as " PDA ") etc. terminal devices.
Fingerprint recognition region is preset in specific embodiment, in terminal, for example the fingerprint recognition region can be set in eventually
The front or the back side at end, which is correspondingly arranged on fingerprint receiver, for receiving user fingerprints information.In addition,
Some encrypted objects are previously provided in the third-party application of terminal, and these encrypted objects are in hidden state and (do not show and appoint
What encryption prompting).When terminal third-party application is run, you can grasped by detecting touch of the user in the fingerprint recognition region
Make, acquire the finger print information that the touch operation corresponds to input, to determine whether that display should according to the finger print information of the input
The encrypted object hidden in third-party application.Wherein, the third-party application may include that picture application, Video Applications, music are answered
With etc., the embodiment of the present invention does not limit.
S102:Judge whether the user fingerprints information matches with preset verification finger print information.
Specifically, the verification finger print information can be pre-set to obtain by user, for example, user can be when terminal first powers on
Typing finger print information, and deposited the finger print information of the typing as the finger print information of verification finger print information, that is, validated user
Storage.
S103:If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation,
Show the encrypted object in the third-party application.
Wherein, the third-party application includes picture application, Video Applications, music application etc., correspondingly, the encryption pair
As including encrypting picture, encrypted video, encryption music etc..
In specific embodiment, as the user for detecting touch operation input of the active user in preset fingerprint recognition region
When finger print information matches with the preset verification finger print information, you can using active user as validated user, to the third party
Encrypted object successful decryption in then can show that the third party should in the range of the corresponding display duration of the touch operation
Encrypted object in.Further, it when detecting that user fingerprints information is mismatched with the verification finger print information, then can hide
The encrypted object, is no longer shown.Wherein, the corresponding display duration of the touch operation can refer to according to different application type
Preset duration, for example the display duration of encryption picture in picture application may be configured as 2 minutes, it encrypts and regards in Video Applications
The display duration of frequency may be configured as the video playing duration of the encrypted video, and the display duration of the encryption music is added in music application
It may be configured as music duration of the encryption music, etc.;Alternatively, the corresponding display duration of the touch operation can also refer to
The preset time interval corresponding period, you can obtain user fingerprints information according to prefixed time interval and carry out fingerprint
Match, and carry out the display of the encrypted object within the period in matching;Alternatively, the corresponding display duration of the touch operation is also
It can refer to the touch operation duration, i.e., carry out the display of the encrypted object before the touch operation terminates, such as can be
It detects that the corresponding touch pressure of the touch operation is less than a certain pressure threshold, is considered as the touch operation and terminates.It should in third party
During picture browsing with the application of such as picture, other than the corresponding display duration of the touch operation, then the encryption figure can be hidden
Piece is no longer shown, and does not give any encryption prompting so that other users can not perceive the presence of the encryption picture.
In embodiments of the present invention, it is inputted in third-party application operational process by detecting user by touch operation
User fingerprints information, and the user fingerprints information of the input match comparing with pre-set verification finger print information, from
And when the user fingerprints information and the verification finger print information match, to the third party in the display duration of the touch operation
Encrypted object in is shown that otherwise the encrypted object in the third-party application is in hidden state.The present invention is implemented
Example can control the display of the encrypted object of application according to user fingerprints information so that other users can not perceive encrypted object
Presence, avoid privacy of user leakage.
Further, referring to Fig. 2, Fig. 2 is the encrypted object display side of another application provided in an embodiment of the present invention
The flow diagram of method, specifically, as shown in Fig. 2, the encrypted object display methods of the application may comprise steps of:
S201:During terminal operating third-party application, receive user and preset fingerprint recognition region is touched
Operate the touching instruction of triggering.
Wherein, the third-party application may include picture application, Video Applications, music application etc., the embodiment of the present invention
It does not limit.
In specific embodiment, terminal can be according to user demand to certain applications in third-party application such as picture application
It is encrypted, that is, pre-sets one or more encrypted objects, then encrypted object picture, which is encrypted picture and is in, hides shape
State, and any encryption prompting is not shown.When needing to check the encryption picture, you can control application according to user fingerprints information
Encrypted object display, effectively to protect privacy of user.
S202:The touching instruction is responded, obtains the corresponding user fingerprints information of the touch operation.
Further, in an alternate embodiment of the invention, the user fingerprints information for obtaining touch operation input it
Before, when detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, can also monitor described
The corresponding touch duration of touch operation;Judge whether the touch duration is more than preset time threshold;If be more than described default
Between threshold value, then perform it is described obtain touch operation input user fingerprints information the step of.Specifically, when detecting user
In the touch operation in the fingerprint recognition region, it can trigger and monitor the corresponding touch duration of the touch operation, and this is monitored
Touch duration be compared with preset time threshold, if the touch duration detected is not up to the preset time threshold such as 2s
(second) then continues to monitor the touch duration of the touch operation, when the touch duration reaches 2s, you can triggering obtains the user's
Finger print information.The decryption flow for displaying of encrypted object is initiated during so as to avoid user to terminal maloperation, saves power consumption of terminal.
Further, when detect user to preset fingerprint recognition region carry out touch operation triggering touching instruction
When, terminal can also further detect the corresponding touch pressure of the touch operation, be more than preset pressure in the touch pressure detected
The corresponding user fingerprints information of the acquisition touch operation and its follow-up process are performed during threshold value;Otherwise, this is no longer obtained to touch
The corresponding finger print information of operation is touched, to save power consumption of terminal.
S203:Judge whether the user fingerprints information matches with preset verification finger print information.
Specifically, the verification finger print information can be pre-set to obtain by user, for example, user can be when terminal first powers on
Fingerprint typing, etc., the present invention are carried out after a certain fingerprint preset password is inputted during typing finger print information or terminal use
Embodiment does not limit.So as to be carried out the finger print information of the typing as the finger print information of verification finger print information, that is, validated user
Storage compares for the matching during the decryption display of the encrypted object of application.
S204:Show the encrypted object in the third-party application.
Wherein, the third-party application may include picture application, Video Applications, music application etc., correspondingly, the encryption
Object includes encryption picture, encrypted video, encryption music etc..
In specific embodiment, as the user for detecting touch operation input of the active user in preset fingerprint recognition region
When finger print information and the preset verification finger print information match, you can using active user as validated user, show to this
Tripartite applies the encrypted object in picture application such as to encrypt picture successful decryption, then can be in the corresponding display of the touch operation
In long range, the encryption picture of picture application is shown;Otherwise, continue to hide the encryption picture, user is to preset finger for monitoring
Line identification region carries out the touching instruction of touch operation triggering.Wherein, the corresponding display duration of the touch operation can refer to root
According to the preset duration of different application type;Alternatively, it can also refer to the preset time interval corresponding period;Alternatively, may be used also
To refer to the touch operation duration, i.e., the display of the encrypted object is carried out before the touch operation terminates.The embodiment of the present invention
The a length of preset time interval illustrates for the corresponding period when display.
S205:According to preset interval detection input user fingerprints information whether with it is described verification finger print information phase
Matching.
S206:When user fingerprints information is mismatched with the verification finger print information, hide in the third-party application
Encrypted object.
For example, preset time interval carried out a fingerprint detection for every 10 seconds (s), then the preset time interval corresponds to
Period then may be configured as 10s (or slightly larger than 10s).Specifically, after showing the hiding encrypted object such as encryption picture,
Every 10s, you can detect whether active user's finger print information matches with the verification finger print information again, continue to show if matching
Show the hiding encryption picture;Otherwise, the encryption picture is hidden.
Further, in an alternate embodiment of the invention, before the encrypted object in the display third-party application, when
When detecting that user carries out preset fingerprint recognition region the touching instruction of touch operation triggering, it can also obtain described touch and grasp
Make corresponding touch pressure;Judge whether the touch pressure is more than preset pressure threshold value;If more than the preset pressure threshold value,
It then performs described in the range of the corresponding display duration of the touch operation, shows encrypted object in the third-party application
Step.Optionally, in the touch operation for detecting user, can acquire the corresponding user fingerprints information of the touch operation and
Touch pressure etc. touches parameter, and matches, and the touch pressure is not in user fingerprints information and preset verification finger print information
The encrypted object successful decryption in being applied to current third party is determined during less than preset pressure threshold value, and is corresponded in the touch operation
Display duration in the range of show the encrypted object;Otherwise, when the user fingerprints information and the verification finger print information mismatch or
When the touch pressure is less than the preset pressure threshold value, it is considered as decryption failure, then continues to hide the encryption pair in the third-party application
As forbidding showing the encrypted object.
Further, in an alternate embodiment of the invention, detect user touch operation input user fingerprints information with
It, can also be defeated before encrypted object after the verification finger print information matches and in the display third-party application
Go out preset message notifying, the message notifying is used to that user to be reminded to input voiceprint;Message described in receiving user response carries
Show the voiceprint of input, and judge whether the voiceprint matches with default voiceprint;If with the default vocal print
Information match, then execution is described in the range of the corresponding display duration of the touch operation, shows in the third-party application
Encrypted object the step of.Wherein, similar with the fingerprint identifier, which can also be pre-set by user
It arrives.
In embodiments of the present invention, touching for user's touch operation triggering is detected in terminal third-party application operational process
When touching instruction, whether can be in the range of predeterminable area, and in the predeterminable area range by touch location point by detection
Triggering obtains the corresponding user fingerprints information of the touch operation when interior, by by the user fingerprints information and preset verification fingerprint
Information carries out matching comparison, thus when the user fingerprints information and the verification finger print information match, in the touch operation
Show the encrypted object shown in duration in the third-party application, otherwise the encrypted object in the third-party application, which is in, hides shape
State so that other users can not perceive the presence of encrypted object, avoid privacy of user leakage.
Referring to Fig. 3, Fig. 3 is a kind of structure diagram of display device provided in an embodiment of the present invention, specifically, as schemed
Shown in 3, the display device of the embodiment of the present invention can include data obtaining module 11, fingerprint matching module 12 and display
Module 13.Wherein,
Described information acquisition module 11, for during terminal operating third-party application, obtaining user to preset finger
Line identification region carries out the user fingerprints information of touch operation input.
It should be noted that the described device of the embodiment of the present invention can specifically be set to terminal device (or referred to as " eventually
End ") in, the terminal device can include but is not limited to smart mobile phone (such as Android phone, iOS mobile phones), tablet electricity
Brain, mobile internet device (Mobile Internet Devices, referred to as " MID "), personal digital assistant (Personal
Digital Assistant, referred to as " PDA ") etc. it is configured with the terminal device of touch screen.
Fingerprint recognition region is preset in specific embodiment, in terminal, for example the fingerprint recognition region can be set in eventually
The front or the back side at end, which is correspondingly arranged on fingerprint receiver, for receiving user fingerprints information.In addition,
Some encrypted objects are previously provided in the third-party application of terminal, and these encrypted objects are in hidden state and (do not show and appoint
What encryption prompting).When terminal third-party application is run, you can detect user in the fingerprint recognition by data obtaining module 11
The touch operation in region acquires the finger print information that the touch operation corresponds to input, true with the finger print information according to the input
It is fixed whether to show the encrypted object hidden in the third-party application.
The fingerprint matching module 12, for judging the user fingerprints information that described information acquisition module 11 is got
Whether match with preset verification finger print information.
Specifically, the verification finger print information can be pre-set to obtain by user, for example, user can be when terminal first powers on
Typing finger print information, and deposited the finger print information of the typing as the finger print information of verification finger print information, that is, validated user
Storage.
The display module 13, for the judging result of the fingerprint matching module 12 for the user fingerprints information with
When the verification finger print information matches, in the range of the corresponding display duration of the touch operation, show that the third party should
Encrypted object in.
Wherein, the third-party application includes picture application, Video Applications, music application etc., and the embodiment of the present invention is not
It limits.Correspondingly, which includes encryption picture, encrypted video, encryption music etc..
The display module 13 is additionally operable to the user fingerprints information got in described information acquisition module 11 and is tested with described
When demonstrate,proving finger print information mismatch, the encrypted object in the third-party application is hidden.
In specific embodiment, when fingerprint matching module 12 detects the user fingerprints information of active user's touch operation input
When the verification finger print information preset with this matches, you can using active user as validated user, in the third-party application
Encrypted object successful decryption, then display module 13 can the touch operation it is corresponding display duration in the range of show the third party should
Encrypted object in.Further, when display module 13 detects that user fingerprints information is mismatched with the verification finger print information
When, then the encrypted object is hidden, is no longer shown.Wherein, the corresponding display duration of the touch operation can refer to according to not
With the preset duration of application type;Alternatively, it can also refer to the preset time interval corresponding period;Alternatively, it can also be
Refer to the touch operation duration, i.e., the display of the encrypted object is carried out before the touch operation terminates, the embodiment of the present invention is not done
It limits.
In embodiments of the present invention, it is inputted in third-party application operational process by detecting user by touch operation
User fingerprints information, and the user fingerprints information of the input match comparing with pre-set verification finger print information, from
And when the user fingerprints information and the verification finger print information match, to the third party in the display duration of the touch operation
Encrypted object in is shown that otherwise the encrypted object in the third-party application is in hidden state.The present invention is implemented
Example can control the display of the encrypted object of application according to user fingerprints information so that other users can not perceive encrypted object
Presence, avoid privacy of user leakage.
Further, in an alternate embodiment of the invention, described device may also include (not shown):
Time supervision module 14 detects that user carries out touch operation triggering to preset fingerprint recognition region for working as
During touching instruction, the corresponding touch duration of the touch operation is monitored;
First judgment module 15, for judge the touch duration that the time supervision module 14 monitors whether be more than
Preset time threshold;
First notification module 16 is more than institute for being the duration that touches in the judging result of first judgment module 15
When stating preset time threshold, notice described information acquisition module obtains user and carries out touch operation to preset fingerprint recognition region
The user fingerprints information of input.
Specifically, when the touch operation for detecting user, can also the touch operation be monitored by time supervision module 14
The touch duration that this is monitored is compared by corresponding touch duration, the first judgment module 15 with preset time threshold, if inspection
The touch duration measured is not up to the preset time threshold such as 2s (second), then continues to monitor the touch duration of the touch operation, when
When the touch duration reaches 2s, you can the first notification module 16 of triggering obtains the finger print information of the user.So as to avoid user couple
The decryption flow for displaying of encrypted object is initiated during terminal maloperation, saves power consumption of terminal.
Further, in an alternate embodiment of the invention, described device may also include (not shown):
Pressure acquisition module 17 detects that user carries out touch operation triggering to preset fingerprint recognition region for working as
During touching instruction, the corresponding touch pressure of the touch operation is obtained;
Second judgment module 18, for judge the touch pressure that the pressure acquisition module 17 gets whether be more than
Preset pressure threshold value;
Second notification module 19, for the judging result of second judgment module 18 be the touch pressure be more than institute
When stating preset pressure threshold value, the display module 13 is notified in the range of the corresponding display duration of the touch operation, to show institute
State the encrypted object in third-party application.
Optionally, in the touch operation for detecting user, can this be acquired by data obtaining module 11 respectively and touched
It touches the corresponding user fingerprints information of operation and corresponding touch of the touch operation is acquired by pressure acquisition module 17 and press
Power etc. touches parameter, and detects that user fingerprints information matches with preset verification finger print information in fingerprint matching module 12,
And 18 judging result of the second judgment module is that the touch pressure is determined when being not less than preset pressure threshold value to current third party application
In encrypted object successful decryption, and the touch operation it is corresponding display duration in the range of show the encrypted object;Otherwise, when
Fingerprint matching module 12 detects that the user fingerprints information and the verification finger print information mismatch or second judgment module 18
When judging result is less than the preset pressure threshold value for the touch pressure, decryption failure can be considered, then display module 13 continues to hide
Encrypted object in the third-party application forbids showing the encrypted object.
Further, in an alternate embodiment of the invention, described device may also include (not shown):
Output module 20, for exporting preset message notifying, the message notifying is believed for user to be reminded to input vocal print
Breath;
Third judgment module 21 for receiving the voiceprint that message notifying described in user response inputs, judges the sound
Whether line information matches with default voiceprint;
Third notice module 22, for for the voiceprint and being preset in the judging result of the third judgment module 21
When voiceprint matches, the display module 13 is notified in the range of the corresponding display duration of the touch operation, to show institute
State the encrypted object in third-party application.
Wherein, similar with the fingerprint identifier, which can also be pre-set to obtain by user.
In embodiments of the present invention, touching for user's touch operation triggering is detected in terminal third-party application operational process
When touching instruction, whether can be in the range of predeterminable area, and in the predeterminable area range by touch location point by detection
Triggering obtains the corresponding user fingerprints information of the touch operation when interior, by by the user fingerprints information and preset verification fingerprint
Information carries out matching comparison, thus when the user fingerprints information and the verification finger print information match, in the touch operation
Show the encrypted object shown in duration in the third-party application, otherwise the encrypted object in the third-party application, which is in, hides shape
State so that other users can not perceive the presence of encrypted object, avoid privacy of user leakage.
Referring to Fig. 4, Fig. 4 is a kind of structure diagram of terminal device provided in an embodiment of the present invention.Specifically, as schemed
Shown in 4, the terminal device of the embodiment of the present invention can include:At least one processor 100, at least one input unit
200, at least one output device 300,500 grade components of memory.Wherein, these components by one or more bus 400 into
Row communication connection.It will be understood by those skilled in the art that the structure of the terminal device shown in Fig. 4 is not formed to of the invention real
The restriction of example is applied, it can also include more more or fewer than illustrating either busbar network or hub-and-spoke configuration
Component either combines certain components or different components arrangement.Wherein:
Processor 100 is the control centre of terminal device (or referred to as terminal), utilizes various interfaces and connection
The various pieces of entire terminal device, by running or performing the program being stored in memory 500 and/or module and adjust
With the data being stored in memory 500, to perform the various functions of terminal device and processing data.Processor 100 can be by
Integrated circuit (Integrated Circuit, abbreviation IC) forms, such as can be made of the IC of single encapsulation, can also be by
It connects the encapsulation IC of more identical functions or different function and forms.For example, processor 100 can only include central processing
Device (Central Processing Unit, abbreviation CPU) or CPU, digital signal processor (digital signal
Processor, abbreviation DSP), graphics processor (Graphic Processing Unit, abbreviation GPU) and various control chips
Combination.In embodiments of the present invention, CPU can be single operation core, can also include multioperation core.
Input unit 200 can include touch screen, keyboard, camera etc. of standard, can also include wireline interface, wireless
Interface etc..
Output device 300 can include display screen, loud speaker etc., can also include wireline interface, wireless interface etc..
Memory 500 can be used for storage software program and module, processor 100, input unit 200 and output device
300 by calling the software program and module that are stored in memory 500, so as to perform the various functions application of terminal device
And realize data processing.Memory 500 mainly includes program storage area and data storage area, wherein, program storage area can be deposited
Application program needed for storage operating system, at least one function etc.;Data storage area can be stored uses institute according to terminal device
Data of establishment etc..In embodiments of the present invention, operating system can be android system, iOS system or Windows operations
System etc..
Specifically, processor 100 calls the application program being stored in memory 500, for performing following steps:
During terminal operating third-party application, it is defeated to the progress touch operation of preset fingerprint recognition region to obtain user
The user fingerprints information entered;
Judge whether the user fingerprints information matches with preset verification finger print information;
If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, display
Encrypted object in the third-party application.
Optionally, processor 100 calls the application program being stored in memory 500 to perform the acquisition user to default
Fingerprint recognition region carry out touch operation input user fingerprints information before, be additionally operable to perform following steps:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, described in monitoring
The corresponding touch duration of touch operation;
Judge whether the touch duration is more than preset time threshold;
If more than the preset time threshold, perform the acquisition user and preset fingerprint recognition region is touched
The step of user fingerprints information of operation input.
Optionally, processor 100 calls the application program being stored in memory 500 to perform the display third party
Before encrypted object in, it is additionally operable to perform following steps:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, described in acquisition
The corresponding touch pressure of touch operation;
Judge whether the touch pressure is more than preset pressure threshold value;
If more than the preset pressure threshold value, execution is described in the range of the corresponding display duration of the touch operation,
The step of showing the encrypted object in the third-party application.
Optionally, processor 100 calls the application program being stored in memory 500 to perform the display third party
Before encrypted object in, it is additionally operable to perform following steps:
Preset message notifying is exported, the message notifying is used to that user to be reminded to input voiceprint;
Receive user response described in message notifying input voiceprint, and judge the voiceprint whether with default sound
Line information match;
If matching with the default voiceprint, perform described in the corresponding display duration range of the touch operation
It is interior, the step of showing the encrypted object in the third-party application.
Optionally, processor 100 calls the application program being stored in memory 500 to perform described in the touch operation
In the range of corresponding display duration, show the encrypted object in the third-party application, specifically perform following steps:
If matching with the verification finger print information, the encrypted object in the third-party application is shown;
Whether the user fingerprints information inputted according to preset interval detection matches with the verification finger print information;
When user fingerprints information is mismatched with the verification finger print information, the encryption pair in the third-party application is hidden
As.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of division of logic function can have other dividing mode in actual implementation, such as multiple units or component can be tied
It closes or is desirably integrated into another system or some features can be ignored or does not perform.Another point, it is shown or discussed
Mutual coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or logical by some interfaces, device or unit
Letter connection can be electrical, machinery or other forms.
Described this may or may not be as the unit that separating component illustrates it is physically separate, as unit
The component of display may or may not be physical unit, you can be located at a place or can also be distributed to more
In a network element.Some or all of unit therein can be selected according to the actual needs to realize this embodiment scheme
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
That each unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, is used including some instructions so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) perform the present invention
The part steps of embodiment the method.And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
The medium of program code can be stored.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each function module
Division progress for example, in practical application, can be complete by different function modules by above-mentioned function distribution as needed
Into the internal structure of device being divided into different function modules, to complete all or part of function described above.On
The specific work process of the device of description is stated, the corresponding process in preceding method embodiment can be referred to, details are not described herein.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe is described in detail the present invention with reference to foregoing embodiments, it will be understood by those of ordinary skill in the art that:Its according to
Can so modify to the technical solution recorded in foregoing embodiments either to which part or all technical features into
Row equivalent replacement;And these modifications or replacement, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (7)
1. a kind of encrypted object display methods of application, which is characterized in that including:
During terminal operating third-party application, detecting user's touch operation triggering touching instruction, and detect by
When touch location point is in the range of predeterminable area, obtains user and touch operation input is carried out to preset fingerprint recognition region
User fingerprints information;
Judge whether the user fingerprints information matches with preset verification finger print information;
If match with the verification finger print information and the corresponding touch pressure of the touch operation is not less than preset pressure threshold
Value determines the encrypted object successful decryption in being applied to current third party, then in the corresponding display duration model of the touch operation
In enclosing, the encrypted object in the third-party application is shown;
The corresponding operation duration for showing duration and referring to the touch operation of the touch operation, it is described to be corresponded in the touch operation
Display duration in the range of, show that the encrypted object in the third-party application refers to:It is carried out before the touch operation terminates
The display of the encrypted object, and be to detect the corresponding touch pressure of the touch operation less than a pressure threshold, it is determined that
Terminate for the touch operation;
Wherein, after the hiding encrypted object of display, detecting active user's finger print information again every preset time interval is
It is no to match with the verification finger print information, continue to show the encrypted object that this is hiding if matching;If mismatching, hiding should add
Close object.
2. according to the method described in claim 1, it is characterized in that, it is described acquisition user to preset fingerprint recognition region into
Before the user fingerprints information of row touch operation input, the method further includes:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, the touch is monitored
Operate corresponding touch duration;
Judge whether the touch duration is more than preset time threshold;
If more than the preset time threshold, perform the acquisition user and touch operation is carried out to preset fingerprint recognition region
The step of user fingerprints information of input.
3. according to the method described in claim 1, it is characterized in that, encrypted object in the display third-party application
Before, the method further includes:
Preset message notifying is exported, the message notifying is used to that user to be reminded to input voiceprint;
The voiceprint of message notifying input described in user response is received, and judges whether the voiceprint is believed with default vocal print
Manner of breathing matches;
If matching with the default voiceprint, execution is described in the range of the corresponding display duration of the touch operation,
The step of showing the encrypted object in the third-party application.
4. a kind of display device, which is characterized in that including:
Data obtaining module, for during terminal operating third-party application, detecting touching for user's touch operation triggering
Instruction is touched, and detects that user is to preset fingerprint recognition region for acquisition when being in the range of predeterminable area by touch location point
Carry out the user fingerprints information of touch operation input;
Fingerprint matching module, for judge the user fingerprints information that described information acquisition module gets whether with it is preset
Verification finger print information matches;
Display module, for being the user fingerprints information and the verification fingerprint in the judging result of the fingerprint matching module
When information match and the corresponding touch pressure of the touch operation are not less than preset pressure threshold value, determine to current third party
Encrypted object successful decryption in the range of the corresponding display duration of the touch operation, shows that the third party should
Encrypted object in;
The corresponding operation duration for showing duration and referring to the touch operation of the touch operation, it is described to be corresponded in the touch operation
Display duration in the range of, show that the encrypted object in the third-party application refers to:It is carried out before the touch operation terminates
The display of the encrypted object, and be detect the corresponding touch pressure of the touch operation be less than a certain pressure threshold, then really
It is set to the touch operation to terminate;
Wherein, after the hiding encrypted object of display, the fingerprint matching module detects again every preset time interval works as
Whether preceding user fingerprints information matches with the verification finger print information, and the display module continues to show that this is hiding if matching
Encrypted object;If mismatching, the display module hides the encrypted object.
5. device according to claim 4, which is characterized in that described device further includes:
Time supervision module detects that user refers to the touch of preset fingerprint recognition region progress touch operation triggering for working as
When enabling, the corresponding touch duration of the touch operation is monitored;
First judgment module, for judging whether the touch duration that the time supervision module monitors arrive is more than preset time
Threshold value;
First notification module, for when it is more than described default that the judging result of first judgment module, which is the touch duration,
Between threshold value when, notice described information acquisition module obtains the use that user carries out preset fingerprint recognition region touch operation input
Family finger print information.
6. device according to claim 4, which is characterized in that described device further includes:
Pressure acquisition module detects that user refers to the touch of preset fingerprint recognition region progress touch operation triggering for working as
When enabling, the corresponding touch pressure of the touch operation is obtained;
Second judgment module, for judging whether the touch pressure that the pressure acquisition module is got is more than preset pressure
Threshold value;
Second notification module is more than the default pressure for being the touch pressure in the judging result of second judgment module
During force threshold, the display module is notified in the range of the corresponding display duration of the touch operation, to show that the third party should
Encrypted object in.
7. device according to claim 4, which is characterized in that described device further includes:
Output module, for exporting preset message notifying, the message notifying is used to that user to be reminded to input voiceprint;
Third judgment module for receiving the voiceprint that message notifying described in user response inputs, judges the voiceprint
Whether match with default voiceprint;
Third notice module, for being the voiceprint and default voiceprint in the judging result of the third judgment module
When matching, the display module is notified in the range of the corresponding display duration of the touch operation, to show that the third party should
Encrypted object in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510612958.0A CN105117663B (en) | 2015-09-23 | 2015-09-23 | The encrypted object display methods and device of a kind of application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510612958.0A CN105117663B (en) | 2015-09-23 | 2015-09-23 | The encrypted object display methods and device of a kind of application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105117663A CN105117663A (en) | 2015-12-02 |
CN105117663B true CN105117663B (en) | 2018-07-06 |
Family
ID=54665647
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510612958.0A Expired - Fee Related CN105117663B (en) | 2015-09-23 | 2015-09-23 | The encrypted object display methods and device of a kind of application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105117663B (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105653924A (en) * | 2015-12-30 | 2016-06-08 | 魅族科技(中国)有限公司 | Touch screen operation method and device |
CN105678184A (en) * | 2015-12-30 | 2016-06-15 | 魅族科技(中国)有限公司 | Display method and device and terminal |
CN105740687B (en) * | 2016-01-29 | 2018-11-16 | 广东欧珀移动通信有限公司 | A kind of method and terminal for opening hidden file folder |
CN105812533B (en) * | 2016-03-08 | 2019-04-05 | 北京珠穆朗玛移动通信有限公司 | A kind of secret incoming display method and mobile terminal |
CN105844181A (en) * | 2016-03-23 | 2016-08-10 | 深圳市金立通信设备有限公司 | Key instruction processing method and terminal |
CN113434899A (en) * | 2016-03-30 | 2021-09-24 | 创新先进技术有限公司 | Method and terminal for displaying private information |
CN105893826B (en) * | 2016-04-25 | 2018-10-23 | 北京奇虎科技有限公司 | Message display method based on finger print information and intelligent terminal |
CN106056011A (en) * | 2016-05-30 | 2016-10-26 | 维沃移动通信有限公司 | Display method and mobile terminal |
CN106295368A (en) * | 2016-08-17 | 2017-01-04 | 四川长虹通信科技有限公司 | The data security protection method of a kind of mobile terminal and system |
CN106127013A (en) * | 2016-08-26 | 2016-11-16 | 广东欧珀移动通信有限公司 | Encryption and decryption method, device and mobile terminal |
CN106407773B (en) * | 2016-08-26 | 2019-03-19 | Oppo广东移动通信有限公司 | Decryption method, device and mobile terminal |
CN106650368A (en) * | 2016-10-12 | 2017-05-10 | 珠海格力电器股份有限公司 | Encrypted information display method and apparatus |
CN107967107A (en) * | 2016-10-20 | 2018-04-27 | 中兴通讯股份有限公司 | One kind browses object lock method and system |
CN107506634B (en) * | 2017-07-31 | 2020-02-14 | Oppo广东移动通信有限公司 | Data display method and device, storage medium and terminal |
CN107798230B (en) * | 2017-10-24 | 2020-04-17 | Oppo广东移动通信有限公司 | Terminal control method, device, terminal and computer readable storage medium |
CN109857470B (en) * | 2019-01-24 | 2022-05-13 | Oppo广东移动通信有限公司 | Fingerprint unlocking method and related equipment |
CN112073560A (en) * | 2019-06-10 | 2020-12-11 | Oppo广东移动通信有限公司 | Application control method, electronic device, and non-volatile computer-readable storage medium |
CN113282899B (en) * | 2021-04-01 | 2023-04-25 | 维沃移动通信有限公司 | Object management method, device, electronic equipment and readable storage medium |
CN113676781A (en) * | 2021-08-23 | 2021-11-19 | 深圳市唐为电子有限公司 | Audio-visual broadcast control system of smart mobile phone |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
CN103246389A (en) * | 2012-02-03 | 2013-08-14 | 三星电子株式会社 | Method of operating multi-touch panel and terminal supporting the same |
CN103425915A (en) * | 2012-05-25 | 2013-12-04 | 汉王科技股份有限公司 | Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device |
CN104700010A (en) * | 2013-12-05 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Personal information protection method and protection device |
CN104751068A (en) * | 2013-12-26 | 2015-07-01 | 珠海金山办公软件有限公司 | File protection method and device |
CN104898940A (en) * | 2015-04-30 | 2015-09-09 | 努比亚技术有限公司 | Picture processing method and device |
CN104915141A (en) * | 2015-05-28 | 2015-09-16 | 努比亚技术有限公司 | Method and device for previewing object information |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104765552B (en) * | 2015-04-28 | 2019-04-19 | 小米科技有限责任公司 | Right management method and device |
CN104899501A (en) * | 2015-06-24 | 2015-09-09 | 小米科技有限责任公司 | Dialog list display method and device and terminal |
-
2015
- 2015-09-23 CN CN201510612958.0A patent/CN105117663B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103246389A (en) * | 2012-02-03 | 2013-08-14 | 三星电子株式会社 | Method of operating multi-touch panel and terminal supporting the same |
CN103425915A (en) * | 2012-05-25 | 2013-12-04 | 汉王科技股份有限公司 | Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device |
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
CN104700010A (en) * | 2013-12-05 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Personal information protection method and protection device |
CN104751068A (en) * | 2013-12-26 | 2015-07-01 | 珠海金山办公软件有限公司 | File protection method and device |
CN104898940A (en) * | 2015-04-30 | 2015-09-09 | 努比亚技术有限公司 | Picture processing method and device |
CN104915141A (en) * | 2015-05-28 | 2015-09-16 | 努比亚技术有限公司 | Method and device for previewing object information |
Also Published As
Publication number | Publication date |
---|---|
CN105117663A (en) | 2015-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105117663B (en) | The encrypted object display methods and device of a kind of application | |
CN108769027B (en) | Secure communication method, device, mobile terminal and storage medium | |
CN105160227B (en) | Remote fingerprint verification method and user terminal and fingerprint verification system | |
CN107659632A (en) | A kind of file encryption-decryption method, device and computer-readable recording medium | |
CN104579668B (en) | The verification method and cipher protection apparatus and verifying system of a kind of user identity | |
WO2018223797A1 (en) | Data response method, terminal apparatus, and server | |
CN104700010A (en) | Personal information protection method and protection device | |
CN107086984A (en) | A kind of method, terminal and server for obtaining and generating identifying code | |
CN113225297B (en) | Data hybrid encryption method, device and equipment | |
CN106648583B (en) | Information processing method and terminal | |
CN107358114A (en) | A kind of method and terminal for preventing user data loss | |
CN106778295B (en) | File storage method, file display method, file storage device, file display device and terminal | |
CN112987942B (en) | Method, device and system for inputting information by keyboard, electronic equipment and storage medium | |
CN107609410A (en) | Android system data guard method, terminal device and storage medium based on HOOK | |
CN102880305A (en) | Keyboard input encryption method and mobile terminal thereof | |
CN104065648A (en) | Data processing method of voice communication | |
CN115473722A (en) | Data encryption method and device, electronic equipment and storage medium | |
CN105069360B (en) | A kind of file encryption, decryption method and terminal | |
CN106126298B (en) | Application freezing method and device and terminal | |
CN103795849A (en) | Device and method for executing operation on private contact person in portable terminal | |
CN108073820A (en) | Security processing, device and the mobile terminal of data | |
CN106127034B (en) | A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment | |
CN106130727A (en) | A kind of call cryptographic key negotiation method and system | |
CN103020509B (en) | A kind of terminal device encryption and decryption method, device and terminal device | |
CN105072094A (en) | Voice data encryption method and vehicle-mounted terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180706 |
|
CF01 | Termination of patent right due to non-payment of annual fee |