CN105117663B - The encrypted object display methods and device of a kind of application - Google Patents

The encrypted object display methods and device of a kind of application Download PDF

Info

Publication number
CN105117663B
CN105117663B CN201510612958.0A CN201510612958A CN105117663B CN 105117663 B CN105117663 B CN 105117663B CN 201510612958 A CN201510612958 A CN 201510612958A CN 105117663 B CN105117663 B CN 105117663B
Authority
CN
China
Prior art keywords
touch operation
user
touch
encrypted object
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510612958.0A
Other languages
Chinese (zh)
Other versions
CN105117663A (en
Inventor
胡峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510612958.0A priority Critical patent/CN105117663B/en
Publication of CN105117663A publication Critical patent/CN105117663A/en
Application granted granted Critical
Publication of CN105117663B publication Critical patent/CN105117663B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Collating Specific Patterns (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses the encrypted object display methods and device of a kind of application, wherein, this method includes:During terminal operating third-party application, the user fingerprints information that user carries out preset fingerprint recognition region touch operation input is obtained;Judge whether the user fingerprints information matches with preset verification finger print information;If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, the encrypted object in the third-party application is shown.Implement the embodiment of the present invention, the display of the encrypted object of application can be controlled according to user fingerprints information, avoid privacy of user leakage.

Description

The encrypted object display methods and device of a kind of application
Technical field
The present invention relates to communication technique field more particularly to the encrypted object display methods and device of a kind of application.
Background technology
As the function that can be used in the various terminals such as the development of terminal technology, mobile phone is also more and more, to user with Great convenience is carried out.During terminal use, some pictures or video to being related to privacy of user are many times needed It is encrypted, to prevent privacy leakage.
In current cipher mode, the picture generally can all be shown after either video is encrypted to picture or regarded The prompt message that frequency has been encrypted so that other users can recognize the presence of the encrypted object, this allows for the encryption pair As there is decrypted possibility, so as to cause privacy leakage.
Invention content
An embodiment of the present invention provides the encrypted object display methods and device of a kind of application, can be believed according to user fingerprints The display of the encrypted object of breath control application, avoids privacy of user leakage.
The embodiment of the invention discloses a kind of encrypted object display methods of application, including:
During terminal operating third-party application, it is defeated to the progress touch operation of preset fingerprint recognition region to obtain user The user fingerprints information entered;
Judge whether the user fingerprints information matches with preset verification finger print information;
If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, display Encrypted object in the third-party application.
Optionally, the user fingerprints for carrying out touch operation input to preset fingerprint recognition region in the acquisition user are believed Before breath, the method further includes:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, described in monitoring The corresponding touch duration of touch operation;
Judge whether the touch duration is more than preset time threshold;
If more than the preset time threshold, perform the acquisition user and preset fingerprint recognition region is touched The step of user fingerprints information of operation input.
Optionally, before the encrypted object in the display third-party application, the method further includes:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, described in acquisition The corresponding touch pressure of touch operation;
Judge whether the touch pressure is more than preset pressure threshold value;
If more than the preset pressure threshold value, execution is described in the range of the corresponding display duration of the touch operation, The step of showing the encrypted object in the third-party application.
Optionally, before the encrypted object in the display third-party application, the method further includes:
Preset message notifying is exported, the message notifying is used to that user to be reminded to input voiceprint;
Receive user response described in message notifying input voiceprint, and judge the voiceprint whether with default sound Line information match;
If matching with the default voiceprint, perform described in the corresponding display duration range of the touch operation It is interior, the step of showing the encrypted object in the third-party application.
Optionally, it is described in the range of the corresponding display duration of the touch operation, it shows in the third-party application Encrypted object, including:
If matching with the verification finger print information, the encrypted object in the third-party application is shown;
Whether the user fingerprints information inputted according to preset interval detection matches with the verification finger print information;
When user fingerprints information is mismatched with the verification finger print information, the encryption pair in the third-party application is hidden As.
Correspondingly, the embodiment of the invention also discloses a kind of display device, including:
Data obtaining module, for during terminal operating third-party application, obtaining user to preset fingerprint recognition Region carries out the user fingerprints information of touch operation input;
Fingerprint matching module, for judge the user fingerprints information that described information acquisition module gets whether in advance The verification finger print information put matches;
Display module, for being the user fingerprints information and the verification in the judging result of the fingerprint matching module When finger print information matches, in the range of the corresponding display duration of the touch operation, adding in the third-party application is shown Close object.
Optionally, described device further includes:
Time supervision module detects that user carries out touch operation triggering to preset fingerprint recognition region and touches for working as When touching instruction, the corresponding touch duration of the touch operation is monitored;
First judgment module, for judging whether the touch duration that the time supervision module monitors arrive is more than default Time threshold;
First notification module is more than described pre- for being the touch duration in the judging result of first judgment module If during time threshold, notice described information acquisition module obtains user and carries out touch operation input to preset fingerprint recognition region User fingerprints information.
Optionally, described device further includes:
Pressure acquisition module detects that user carries out touch operation triggering to preset fingerprint recognition region and touches for working as When touching instruction, the corresponding touch pressure of the touch operation is obtained;
Second judgment module, for judging whether the touch pressure that the pressure acquisition module is got is more than default Pressure threshold;
Second notification module, for the judging result of second judgment module for the touch pressure be more than it is described pre- If during pressure threshold, the display module is notified in the range of the corresponding display duration of the touch operation, to show the third Encrypted object in Fang Yingyong.
Optionally, described device further includes:
Output module, for exporting preset message notifying, the message notifying is used to that user to be reminded to input voiceprint;
Third judgment module for receiving the voiceprint that message notifying described in user response inputs, judges the vocal print Whether information matches with default voiceprint;
Third notice module, for being the voiceprint and default vocal print in the judging result of the third judgment module During information match, the display module is notified in the range of the corresponding display duration of the touch operation, to show the third Encrypted object in Fang Yingyong.
Optionally, the display module is additionally operable to the user fingerprints information got when described information acquisition module and institute When stating verification finger print information mismatch, the encrypted object in the third-party application is hidden.
Implement the embodiment of the present invention, have the advantages that:
The embodiment of the present invention can detect the fingerprint that user is inputted by touch operation in third-party application operational process During information, by the way that the user fingerprints information of the input match comparing with pre-set verification finger print information, thus When the user fingerprints information matches with the verification finger print information, you can to the third party in the display duration of the touch operation Encrypted object in is shown.The embodiment of the present invention can control the encrypted object of application according to user fingerprints information Display so that other users can not perceive the presence of encrypted object, avoid privacy of user leakage.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present invention, general for this field For logical technical staff, without creative efforts, other attached drawings are can also be obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of the encrypted object display methods of application provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of the encrypted object display methods of another application provided in an embodiment of the present invention;
Fig. 3 is a kind of structure diagram of display device provided in an embodiment of the present invention;
Fig. 4 is a kind of structure diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without making creative work Example, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses the encrypted object display methods and device of a kind of application, can be believed according to user fingerprints The display of the encrypted object of breath control application, avoids privacy of user leakage.It is described in detail individually below.
Referring to Fig. 1, Fig. 1 is a kind of flow signal of the encrypted object display methods of application provided in an embodiment of the present invention Figure, specifically, as shown in Figure 1, the encrypted object display methods of the application may comprise steps of:
S101:During terminal operating third-party application, obtain user and preset fingerprint recognition region is touched The user fingerprints information of operation input.
It should be noted that the method for the embodiment of the present invention can be applied particularly to terminal device (referred to as " terminal ") In, the terminal device can include but is not limited to smart mobile phone (such as Android phone, iOS mobile phones), tablet computer, shifting Dynamic internet device (Mobile Internet Devices, referred to as " MID "), personal digital assistant (Personal Digital Assistant, referred to as " PDA ") etc. terminal devices.
Fingerprint recognition region is preset in specific embodiment, in terminal, for example the fingerprint recognition region can be set in eventually The front or the back side at end, which is correspondingly arranged on fingerprint receiver, for receiving user fingerprints information.In addition, Some encrypted objects are previously provided in the third-party application of terminal, and these encrypted objects are in hidden state and (do not show and appoint What encryption prompting).When terminal third-party application is run, you can grasped by detecting touch of the user in the fingerprint recognition region Make, acquire the finger print information that the touch operation corresponds to input, to determine whether that display should according to the finger print information of the input The encrypted object hidden in third-party application.Wherein, the third-party application may include that picture application, Video Applications, music are answered With etc., the embodiment of the present invention does not limit.
S102:Judge whether the user fingerprints information matches with preset verification finger print information.
Specifically, the verification finger print information can be pre-set to obtain by user, for example, user can be when terminal first powers on Typing finger print information, and deposited the finger print information of the typing as the finger print information of verification finger print information, that is, validated user Storage.
S103:If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, Show the encrypted object in the third-party application.
Wherein, the third-party application includes picture application, Video Applications, music application etc., correspondingly, the encryption pair As including encrypting picture, encrypted video, encryption music etc..
In specific embodiment, as the user for detecting touch operation input of the active user in preset fingerprint recognition region When finger print information matches with the preset verification finger print information, you can using active user as validated user, to the third party Encrypted object successful decryption in then can show that the third party should in the range of the corresponding display duration of the touch operation Encrypted object in.Further, it when detecting that user fingerprints information is mismatched with the verification finger print information, then can hide The encrypted object, is no longer shown.Wherein, the corresponding display duration of the touch operation can refer to according to different application type Preset duration, for example the display duration of encryption picture in picture application may be configured as 2 minutes, it encrypts and regards in Video Applications The display duration of frequency may be configured as the video playing duration of the encrypted video, and the display duration of the encryption music is added in music application It may be configured as music duration of the encryption music, etc.;Alternatively, the corresponding display duration of the touch operation can also refer to The preset time interval corresponding period, you can obtain user fingerprints information according to prefixed time interval and carry out fingerprint Match, and carry out the display of the encrypted object within the period in matching;Alternatively, the corresponding display duration of the touch operation is also It can refer to the touch operation duration, i.e., carry out the display of the encrypted object before the touch operation terminates, such as can be It detects that the corresponding touch pressure of the touch operation is less than a certain pressure threshold, is considered as the touch operation and terminates.It should in third party During picture browsing with the application of such as picture, other than the corresponding display duration of the touch operation, then the encryption figure can be hidden Piece is no longer shown, and does not give any encryption prompting so that other users can not perceive the presence of the encryption picture.
In embodiments of the present invention, it is inputted in third-party application operational process by detecting user by touch operation User fingerprints information, and the user fingerprints information of the input match comparing with pre-set verification finger print information, from And when the user fingerprints information and the verification finger print information match, to the third party in the display duration of the touch operation Encrypted object in is shown that otherwise the encrypted object in the third-party application is in hidden state.The present invention is implemented Example can control the display of the encrypted object of application according to user fingerprints information so that other users can not perceive encrypted object Presence, avoid privacy of user leakage.
Further, referring to Fig. 2, Fig. 2 is the encrypted object display side of another application provided in an embodiment of the present invention The flow diagram of method, specifically, as shown in Fig. 2, the encrypted object display methods of the application may comprise steps of:
S201:During terminal operating third-party application, receive user and preset fingerprint recognition region is touched Operate the touching instruction of triggering.
Wherein, the third-party application may include picture application, Video Applications, music application etc., the embodiment of the present invention It does not limit.
In specific embodiment, terminal can be according to user demand to certain applications in third-party application such as picture application It is encrypted, that is, pre-sets one or more encrypted objects, then encrypted object picture, which is encrypted picture and is in, hides shape State, and any encryption prompting is not shown.When needing to check the encryption picture, you can control application according to user fingerprints information Encrypted object display, effectively to protect privacy of user.
S202:The touching instruction is responded, obtains the corresponding user fingerprints information of the touch operation.
Further, in an alternate embodiment of the invention, the user fingerprints information for obtaining touch operation input it Before, when detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, can also monitor described The corresponding touch duration of touch operation;Judge whether the touch duration is more than preset time threshold;If be more than described default Between threshold value, then perform it is described obtain touch operation input user fingerprints information the step of.Specifically, when detecting user In the touch operation in the fingerprint recognition region, it can trigger and monitor the corresponding touch duration of the touch operation, and this is monitored Touch duration be compared with preset time threshold, if the touch duration detected is not up to the preset time threshold such as 2s (second) then continues to monitor the touch duration of the touch operation, when the touch duration reaches 2s, you can triggering obtains the user's Finger print information.The decryption flow for displaying of encrypted object is initiated during so as to avoid user to terminal maloperation, saves power consumption of terminal.
Further, when detect user to preset fingerprint recognition region carry out touch operation triggering touching instruction When, terminal can also further detect the corresponding touch pressure of the touch operation, be more than preset pressure in the touch pressure detected The corresponding user fingerprints information of the acquisition touch operation and its follow-up process are performed during threshold value;Otherwise, this is no longer obtained to touch The corresponding finger print information of operation is touched, to save power consumption of terminal.
S203:Judge whether the user fingerprints information matches with preset verification finger print information.
Specifically, the verification finger print information can be pre-set to obtain by user, for example, user can be when terminal first powers on Fingerprint typing, etc., the present invention are carried out after a certain fingerprint preset password is inputted during typing finger print information or terminal use Embodiment does not limit.So as to be carried out the finger print information of the typing as the finger print information of verification finger print information, that is, validated user Storage compares for the matching during the decryption display of the encrypted object of application.
S204:Show the encrypted object in the third-party application.
Wherein, the third-party application may include picture application, Video Applications, music application etc., correspondingly, the encryption Object includes encryption picture, encrypted video, encryption music etc..
In specific embodiment, as the user for detecting touch operation input of the active user in preset fingerprint recognition region When finger print information and the preset verification finger print information match, you can using active user as validated user, show to this Tripartite applies the encrypted object in picture application such as to encrypt picture successful decryption, then can be in the corresponding display of the touch operation In long range, the encryption picture of picture application is shown;Otherwise, continue to hide the encryption picture, user is to preset finger for monitoring Line identification region carries out the touching instruction of touch operation triggering.Wherein, the corresponding display duration of the touch operation can refer to root According to the preset duration of different application type;Alternatively, it can also refer to the preset time interval corresponding period;Alternatively, may be used also To refer to the touch operation duration, i.e., the display of the encrypted object is carried out before the touch operation terminates.The embodiment of the present invention The a length of preset time interval illustrates for the corresponding period when display.
S205:According to preset interval detection input user fingerprints information whether with it is described verification finger print information phase Matching.
S206:When user fingerprints information is mismatched with the verification finger print information, hide in the third-party application Encrypted object.
For example, preset time interval carried out a fingerprint detection for every 10 seconds (s), then the preset time interval corresponds to Period then may be configured as 10s (or slightly larger than 10s).Specifically, after showing the hiding encrypted object such as encryption picture, Every 10s, you can detect whether active user's finger print information matches with the verification finger print information again, continue to show if matching Show the hiding encryption picture;Otherwise, the encryption picture is hidden.
Further, in an alternate embodiment of the invention, before the encrypted object in the display third-party application, when When detecting that user carries out preset fingerprint recognition region the touching instruction of touch operation triggering, it can also obtain described touch and grasp Make corresponding touch pressure;Judge whether the touch pressure is more than preset pressure threshold value;If more than the preset pressure threshold value, It then performs described in the range of the corresponding display duration of the touch operation, shows encrypted object in the third-party application Step.Optionally, in the touch operation for detecting user, can acquire the corresponding user fingerprints information of the touch operation and Touch pressure etc. touches parameter, and matches, and the touch pressure is not in user fingerprints information and preset verification finger print information The encrypted object successful decryption in being applied to current third party is determined during less than preset pressure threshold value, and is corresponded in the touch operation Display duration in the range of show the encrypted object;Otherwise, when the user fingerprints information and the verification finger print information mismatch or When the touch pressure is less than the preset pressure threshold value, it is considered as decryption failure, then continues to hide the encryption pair in the third-party application As forbidding showing the encrypted object.
Further, in an alternate embodiment of the invention, detect user touch operation input user fingerprints information with It, can also be defeated before encrypted object after the verification finger print information matches and in the display third-party application Go out preset message notifying, the message notifying is used to that user to be reminded to input voiceprint;Message described in receiving user response carries Show the voiceprint of input, and judge whether the voiceprint matches with default voiceprint;If with the default vocal print Information match, then execution is described in the range of the corresponding display duration of the touch operation, shows in the third-party application Encrypted object the step of.Wherein, similar with the fingerprint identifier, which can also be pre-set by user It arrives.
In embodiments of the present invention, touching for user's touch operation triggering is detected in terminal third-party application operational process When touching instruction, whether can be in the range of predeterminable area, and in the predeterminable area range by touch location point by detection Triggering obtains the corresponding user fingerprints information of the touch operation when interior, by by the user fingerprints information and preset verification fingerprint Information carries out matching comparison, thus when the user fingerprints information and the verification finger print information match, in the touch operation Show the encrypted object shown in duration in the third-party application, otherwise the encrypted object in the third-party application, which is in, hides shape State so that other users can not perceive the presence of encrypted object, avoid privacy of user leakage.
Referring to Fig. 3, Fig. 3 is a kind of structure diagram of display device provided in an embodiment of the present invention, specifically, as schemed Shown in 3, the display device of the embodiment of the present invention can include data obtaining module 11, fingerprint matching module 12 and display Module 13.Wherein,
Described information acquisition module 11, for during terminal operating third-party application, obtaining user to preset finger Line identification region carries out the user fingerprints information of touch operation input.
It should be noted that the described device of the embodiment of the present invention can specifically be set to terminal device (or referred to as " eventually End ") in, the terminal device can include but is not limited to smart mobile phone (such as Android phone, iOS mobile phones), tablet electricity Brain, mobile internet device (Mobile Internet Devices, referred to as " MID "), personal digital assistant (Personal Digital Assistant, referred to as " PDA ") etc. it is configured with the terminal device of touch screen.
Fingerprint recognition region is preset in specific embodiment, in terminal, for example the fingerprint recognition region can be set in eventually The front or the back side at end, which is correspondingly arranged on fingerprint receiver, for receiving user fingerprints information.In addition, Some encrypted objects are previously provided in the third-party application of terminal, and these encrypted objects are in hidden state and (do not show and appoint What encryption prompting).When terminal third-party application is run, you can detect user in the fingerprint recognition by data obtaining module 11 The touch operation in region acquires the finger print information that the touch operation corresponds to input, true with the finger print information according to the input It is fixed whether to show the encrypted object hidden in the third-party application.
The fingerprint matching module 12, for judging the user fingerprints information that described information acquisition module 11 is got Whether match with preset verification finger print information.
Specifically, the verification finger print information can be pre-set to obtain by user, for example, user can be when terminal first powers on Typing finger print information, and deposited the finger print information of the typing as the finger print information of verification finger print information, that is, validated user Storage.
The display module 13, for the judging result of the fingerprint matching module 12 for the user fingerprints information with When the verification finger print information matches, in the range of the corresponding display duration of the touch operation, show that the third party should Encrypted object in.
Wherein, the third-party application includes picture application, Video Applications, music application etc., and the embodiment of the present invention is not It limits.Correspondingly, which includes encryption picture, encrypted video, encryption music etc..
The display module 13 is additionally operable to the user fingerprints information got in described information acquisition module 11 and is tested with described When demonstrate,proving finger print information mismatch, the encrypted object in the third-party application is hidden.
In specific embodiment, when fingerprint matching module 12 detects the user fingerprints information of active user's touch operation input When the verification finger print information preset with this matches, you can using active user as validated user, in the third-party application Encrypted object successful decryption, then display module 13 can the touch operation it is corresponding display duration in the range of show the third party should Encrypted object in.Further, when display module 13 detects that user fingerprints information is mismatched with the verification finger print information When, then the encrypted object is hidden, is no longer shown.Wherein, the corresponding display duration of the touch operation can refer to according to not With the preset duration of application type;Alternatively, it can also refer to the preset time interval corresponding period;Alternatively, it can also be Refer to the touch operation duration, i.e., the display of the encrypted object is carried out before the touch operation terminates, the embodiment of the present invention is not done It limits.
In embodiments of the present invention, it is inputted in third-party application operational process by detecting user by touch operation User fingerprints information, and the user fingerprints information of the input match comparing with pre-set verification finger print information, from And when the user fingerprints information and the verification finger print information match, to the third party in the display duration of the touch operation Encrypted object in is shown that otherwise the encrypted object in the third-party application is in hidden state.The present invention is implemented Example can control the display of the encrypted object of application according to user fingerprints information so that other users can not perceive encrypted object Presence, avoid privacy of user leakage.
Further, in an alternate embodiment of the invention, described device may also include (not shown):
Time supervision module 14 detects that user carries out touch operation triggering to preset fingerprint recognition region for working as During touching instruction, the corresponding touch duration of the touch operation is monitored;
First judgment module 15, for judge the touch duration that the time supervision module 14 monitors whether be more than Preset time threshold;
First notification module 16 is more than institute for being the duration that touches in the judging result of first judgment module 15 When stating preset time threshold, notice described information acquisition module obtains user and carries out touch operation to preset fingerprint recognition region The user fingerprints information of input.
Specifically, when the touch operation for detecting user, can also the touch operation be monitored by time supervision module 14 The touch duration that this is monitored is compared by corresponding touch duration, the first judgment module 15 with preset time threshold, if inspection The touch duration measured is not up to the preset time threshold such as 2s (second), then continues to monitor the touch duration of the touch operation, when When the touch duration reaches 2s, you can the first notification module 16 of triggering obtains the finger print information of the user.So as to avoid user couple The decryption flow for displaying of encrypted object is initiated during terminal maloperation, saves power consumption of terminal.
Further, in an alternate embodiment of the invention, described device may also include (not shown):
Pressure acquisition module 17 detects that user carries out touch operation triggering to preset fingerprint recognition region for working as During touching instruction, the corresponding touch pressure of the touch operation is obtained;
Second judgment module 18, for judge the touch pressure that the pressure acquisition module 17 gets whether be more than Preset pressure threshold value;
Second notification module 19, for the judging result of second judgment module 18 be the touch pressure be more than institute When stating preset pressure threshold value, the display module 13 is notified in the range of the corresponding display duration of the touch operation, to show institute State the encrypted object in third-party application.
Optionally, in the touch operation for detecting user, can this be acquired by data obtaining module 11 respectively and touched It touches the corresponding user fingerprints information of operation and corresponding touch of the touch operation is acquired by pressure acquisition module 17 and press Power etc. touches parameter, and detects that user fingerprints information matches with preset verification finger print information in fingerprint matching module 12, And 18 judging result of the second judgment module is that the touch pressure is determined when being not less than preset pressure threshold value to current third party application In encrypted object successful decryption, and the touch operation it is corresponding display duration in the range of show the encrypted object;Otherwise, when Fingerprint matching module 12 detects that the user fingerprints information and the verification finger print information mismatch or second judgment module 18 When judging result is less than the preset pressure threshold value for the touch pressure, decryption failure can be considered, then display module 13 continues to hide Encrypted object in the third-party application forbids showing the encrypted object.
Further, in an alternate embodiment of the invention, described device may also include (not shown):
Output module 20, for exporting preset message notifying, the message notifying is believed for user to be reminded to input vocal print Breath;
Third judgment module 21 for receiving the voiceprint that message notifying described in user response inputs, judges the sound Whether line information matches with default voiceprint;
Third notice module 22, for for the voiceprint and being preset in the judging result of the third judgment module 21 When voiceprint matches, the display module 13 is notified in the range of the corresponding display duration of the touch operation, to show institute State the encrypted object in third-party application.
Wherein, similar with the fingerprint identifier, which can also be pre-set to obtain by user.
In embodiments of the present invention, touching for user's touch operation triggering is detected in terminal third-party application operational process When touching instruction, whether can be in the range of predeterminable area, and in the predeterminable area range by touch location point by detection Triggering obtains the corresponding user fingerprints information of the touch operation when interior, by by the user fingerprints information and preset verification fingerprint Information carries out matching comparison, thus when the user fingerprints information and the verification finger print information match, in the touch operation Show the encrypted object shown in duration in the third-party application, otherwise the encrypted object in the third-party application, which is in, hides shape State so that other users can not perceive the presence of encrypted object, avoid privacy of user leakage.
Referring to Fig. 4, Fig. 4 is a kind of structure diagram of terminal device provided in an embodiment of the present invention.Specifically, as schemed Shown in 4, the terminal device of the embodiment of the present invention can include:At least one processor 100, at least one input unit 200, at least one output device 300,500 grade components of memory.Wherein, these components by one or more bus 400 into Row communication connection.It will be understood by those skilled in the art that the structure of the terminal device shown in Fig. 4 is not formed to of the invention real The restriction of example is applied, it can also include more more or fewer than illustrating either busbar network or hub-and-spoke configuration Component either combines certain components or different components arrangement.Wherein:
Processor 100 is the control centre of terminal device (or referred to as terminal), utilizes various interfaces and connection The various pieces of entire terminal device, by running or performing the program being stored in memory 500 and/or module and adjust With the data being stored in memory 500, to perform the various functions of terminal device and processing data.Processor 100 can be by Integrated circuit (Integrated Circuit, abbreviation IC) forms, such as can be made of the IC of single encapsulation, can also be by It connects the encapsulation IC of more identical functions or different function and forms.For example, processor 100 can only include central processing Device (Central Processing Unit, abbreviation CPU) or CPU, digital signal processor (digital signal Processor, abbreviation DSP), graphics processor (Graphic Processing Unit, abbreviation GPU) and various control chips Combination.In embodiments of the present invention, CPU can be single operation core, can also include multioperation core.
Input unit 200 can include touch screen, keyboard, camera etc. of standard, can also include wireline interface, wireless Interface etc..
Output device 300 can include display screen, loud speaker etc., can also include wireline interface, wireless interface etc..
Memory 500 can be used for storage software program and module, processor 100, input unit 200 and output device 300 by calling the software program and module that are stored in memory 500, so as to perform the various functions application of terminal device And realize data processing.Memory 500 mainly includes program storage area and data storage area, wherein, program storage area can be deposited Application program needed for storage operating system, at least one function etc.;Data storage area can be stored uses institute according to terminal device Data of establishment etc..In embodiments of the present invention, operating system can be android system, iOS system or Windows operations System etc..
Specifically, processor 100 calls the application program being stored in memory 500, for performing following steps:
During terminal operating third-party application, it is defeated to the progress touch operation of preset fingerprint recognition region to obtain user The user fingerprints information entered;
Judge whether the user fingerprints information matches with preset verification finger print information;
If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, display Encrypted object in the third-party application.
Optionally, processor 100 calls the application program being stored in memory 500 to perform the acquisition user to default Fingerprint recognition region carry out touch operation input user fingerprints information before, be additionally operable to perform following steps:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, described in monitoring The corresponding touch duration of touch operation;
Judge whether the touch duration is more than preset time threshold;
If more than the preset time threshold, perform the acquisition user and preset fingerprint recognition region is touched The step of user fingerprints information of operation input.
Optionally, processor 100 calls the application program being stored in memory 500 to perform the display third party Before encrypted object in, it is additionally operable to perform following steps:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, described in acquisition The corresponding touch pressure of touch operation;
Judge whether the touch pressure is more than preset pressure threshold value;
If more than the preset pressure threshold value, execution is described in the range of the corresponding display duration of the touch operation, The step of showing the encrypted object in the third-party application.
Optionally, processor 100 calls the application program being stored in memory 500 to perform the display third party Before encrypted object in, it is additionally operable to perform following steps:
Preset message notifying is exported, the message notifying is used to that user to be reminded to input voiceprint;
Receive user response described in message notifying input voiceprint, and judge the voiceprint whether with default sound Line information match;
If matching with the default voiceprint, perform described in the corresponding display duration range of the touch operation It is interior, the step of showing the encrypted object in the third-party application.
Optionally, processor 100 calls the application program being stored in memory 500 to perform described in the touch operation In the range of corresponding display duration, show the encrypted object in the third-party application, specifically perform following steps:
If matching with the verification finger print information, the encrypted object in the third-party application is shown;
Whether the user fingerprints information inputted according to preset interval detection matches with the verification finger print information;
When user fingerprints information is mismatched with the verification finger print information, the encryption pair in the third-party application is hidden As.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only Only a kind of division of logic function can have other dividing mode in actual implementation, such as multiple units or component can be tied It closes or is desirably integrated into another system or some features can be ignored or does not perform.Another point, it is shown or discussed Mutual coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or logical by some interfaces, device or unit Letter connection can be electrical, machinery or other forms.
Described this may or may not be as the unit that separating component illustrates it is physically separate, as unit The component of display may or may not be physical unit, you can be located at a place or can also be distributed to more In a network element.Some or all of unit therein can be selected according to the actual needs to realize this embodiment scheme Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also That each unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, is used including some instructions so that a computer It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) perform the present invention The part steps of embodiment the method.And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various The medium of program code can be stored.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each function module Division progress for example, in practical application, can be complete by different function modules by above-mentioned function distribution as needed Into the internal structure of device being divided into different function modules, to complete all or part of function described above.On The specific work process of the device of description is stated, the corresponding process in preceding method embodiment can be referred to, details are not described herein.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe is described in detail the present invention with reference to foregoing embodiments, it will be understood by those of ordinary skill in the art that:Its according to Can so modify to the technical solution recorded in foregoing embodiments either to which part or all technical features into Row equivalent replacement;And these modifications or replacement, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (7)

1. a kind of encrypted object display methods of application, which is characterized in that including:
During terminal operating third-party application, detecting user's touch operation triggering touching instruction, and detect by When touch location point is in the range of predeterminable area, obtains user and touch operation input is carried out to preset fingerprint recognition region User fingerprints information;
Judge whether the user fingerprints information matches with preset verification finger print information;
If match with the verification finger print information and the corresponding touch pressure of the touch operation is not less than preset pressure threshold Value determines the encrypted object successful decryption in being applied to current third party, then in the corresponding display duration model of the touch operation In enclosing, the encrypted object in the third-party application is shown;
The corresponding operation duration for showing duration and referring to the touch operation of the touch operation, it is described to be corresponded in the touch operation Display duration in the range of, show that the encrypted object in the third-party application refers to:It is carried out before the touch operation terminates The display of the encrypted object, and be to detect the corresponding touch pressure of the touch operation less than a pressure threshold, it is determined that Terminate for the touch operation;
Wherein, after the hiding encrypted object of display, detecting active user's finger print information again every preset time interval is It is no to match with the verification finger print information, continue to show the encrypted object that this is hiding if matching;If mismatching, hiding should add Close object.
2. according to the method described in claim 1, it is characterized in that, it is described acquisition user to preset fingerprint recognition region into Before the user fingerprints information of row touch operation input, the method further includes:
When detecting touching instruction of the user to the progress touch operation triggering of preset fingerprint recognition region, the touch is monitored Operate corresponding touch duration;
Judge whether the touch duration is more than preset time threshold;
If more than the preset time threshold, perform the acquisition user and touch operation is carried out to preset fingerprint recognition region The step of user fingerprints information of input.
3. according to the method described in claim 1, it is characterized in that, encrypted object in the display third-party application Before, the method further includes:
Preset message notifying is exported, the message notifying is used to that user to be reminded to input voiceprint;
The voiceprint of message notifying input described in user response is received, and judges whether the voiceprint is believed with default vocal print Manner of breathing matches;
If matching with the default voiceprint, execution is described in the range of the corresponding display duration of the touch operation, The step of showing the encrypted object in the third-party application.
4. a kind of display device, which is characterized in that including:
Data obtaining module, for during terminal operating third-party application, detecting touching for user's touch operation triggering Instruction is touched, and detects that user is to preset fingerprint recognition region for acquisition when being in the range of predeterminable area by touch location point Carry out the user fingerprints information of touch operation input;
Fingerprint matching module, for judge the user fingerprints information that described information acquisition module gets whether with it is preset Verification finger print information matches;
Display module, for being the user fingerprints information and the verification fingerprint in the judging result of the fingerprint matching module When information match and the corresponding touch pressure of the touch operation are not less than preset pressure threshold value, determine to current third party Encrypted object successful decryption in the range of the corresponding display duration of the touch operation, shows that the third party should Encrypted object in;
The corresponding operation duration for showing duration and referring to the touch operation of the touch operation, it is described to be corresponded in the touch operation Display duration in the range of, show that the encrypted object in the third-party application refers to:It is carried out before the touch operation terminates The display of the encrypted object, and be detect the corresponding touch pressure of the touch operation be less than a certain pressure threshold, then really It is set to the touch operation to terminate;
Wherein, after the hiding encrypted object of display, the fingerprint matching module detects again every preset time interval works as Whether preceding user fingerprints information matches with the verification finger print information, and the display module continues to show that this is hiding if matching Encrypted object;If mismatching, the display module hides the encrypted object.
5. device according to claim 4, which is characterized in that described device further includes:
Time supervision module detects that user refers to the touch of preset fingerprint recognition region progress touch operation triggering for working as When enabling, the corresponding touch duration of the touch operation is monitored;
First judgment module, for judging whether the touch duration that the time supervision module monitors arrive is more than preset time Threshold value;
First notification module, for when it is more than described default that the judging result of first judgment module, which is the touch duration, Between threshold value when, notice described information acquisition module obtains the use that user carries out preset fingerprint recognition region touch operation input Family finger print information.
6. device according to claim 4, which is characterized in that described device further includes:
Pressure acquisition module detects that user refers to the touch of preset fingerprint recognition region progress touch operation triggering for working as When enabling, the corresponding touch pressure of the touch operation is obtained;
Second judgment module, for judging whether the touch pressure that the pressure acquisition module is got is more than preset pressure Threshold value;
Second notification module is more than the default pressure for being the touch pressure in the judging result of second judgment module During force threshold, the display module is notified in the range of the corresponding display duration of the touch operation, to show that the third party should Encrypted object in.
7. device according to claim 4, which is characterized in that described device further includes:
Output module, for exporting preset message notifying, the message notifying is used to that user to be reminded to input voiceprint;
Third judgment module for receiving the voiceprint that message notifying described in user response inputs, judges the voiceprint Whether match with default voiceprint;
Third notice module, for being the voiceprint and default voiceprint in the judging result of the third judgment module When matching, the display module is notified in the range of the corresponding display duration of the touch operation, to show that the third party should Encrypted object in.
CN201510612958.0A 2015-09-23 2015-09-23 The encrypted object display methods and device of a kind of application Expired - Fee Related CN105117663B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510612958.0A CN105117663B (en) 2015-09-23 2015-09-23 The encrypted object display methods and device of a kind of application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510612958.0A CN105117663B (en) 2015-09-23 2015-09-23 The encrypted object display methods and device of a kind of application

Publications (2)

Publication Number Publication Date
CN105117663A CN105117663A (en) 2015-12-02
CN105117663B true CN105117663B (en) 2018-07-06

Family

ID=54665647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510612958.0A Expired - Fee Related CN105117663B (en) 2015-09-23 2015-09-23 The encrypted object display methods and device of a kind of application

Country Status (1)

Country Link
CN (1) CN105117663B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653924A (en) * 2015-12-30 2016-06-08 魅族科技(中国)有限公司 Touch screen operation method and device
CN105678184A (en) * 2015-12-30 2016-06-15 魅族科技(中国)有限公司 Display method and device and terminal
CN105740687B (en) * 2016-01-29 2018-11-16 广东欧珀移动通信有限公司 A kind of method and terminal for opening hidden file folder
CN105812533B (en) * 2016-03-08 2019-04-05 北京珠穆朗玛移动通信有限公司 A kind of secret incoming display method and mobile terminal
CN105844181A (en) * 2016-03-23 2016-08-10 深圳市金立通信设备有限公司 Key instruction processing method and terminal
CN113434899A (en) * 2016-03-30 2021-09-24 创新先进技术有限公司 Method and terminal for displaying private information
CN105893826B (en) * 2016-04-25 2018-10-23 北京奇虎科技有限公司 Message display method based on finger print information and intelligent terminal
CN106056011A (en) * 2016-05-30 2016-10-26 维沃移动通信有限公司 Display method and mobile terminal
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN106127013A (en) * 2016-08-26 2016-11-16 广东欧珀移动通信有限公司 Encryption and decryption method, device and mobile terminal
CN106407773B (en) * 2016-08-26 2019-03-19 Oppo广东移动通信有限公司 Decryption method, device and mobile terminal
CN106650368A (en) * 2016-10-12 2017-05-10 珠海格力电器股份有限公司 Encrypted information display method and apparatus
CN107967107A (en) * 2016-10-20 2018-04-27 中兴通讯股份有限公司 One kind browses object lock method and system
CN107506634B (en) * 2017-07-31 2020-02-14 Oppo广东移动通信有限公司 Data display method and device, storage medium and terminal
CN107798230B (en) * 2017-10-24 2020-04-17 Oppo广东移动通信有限公司 Terminal control method, device, terminal and computer readable storage medium
CN109857470B (en) * 2019-01-24 2022-05-13 Oppo广东移动通信有限公司 Fingerprint unlocking method and related equipment
CN112073560A (en) * 2019-06-10 2020-12-11 Oppo广东移动通信有限公司 Application control method, electronic device, and non-volatile computer-readable storage medium
CN113282899B (en) * 2021-04-01 2023-04-25 维沃移动通信有限公司 Object management method, device, electronic equipment and readable storage medium
CN113676781A (en) * 2021-08-23 2021-11-19 深圳市唐为电子有限公司 Audio-visual broadcast control system of smart mobile phone

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103246389A (en) * 2012-02-03 2013-08-14 三星电子株式会社 Method of operating multi-touch panel and terminal supporting the same
CN103425915A (en) * 2012-05-25 2013-12-04 汉王科技股份有限公司 Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device
CN104700010A (en) * 2013-12-05 2015-06-10 腾讯科技(深圳)有限公司 Personal information protection method and protection device
CN104751068A (en) * 2013-12-26 2015-07-01 珠海金山办公软件有限公司 File protection method and device
CN104898940A (en) * 2015-04-30 2015-09-09 努比亚技术有限公司 Picture processing method and device
CN104915141A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Method and device for previewing object information

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765552B (en) * 2015-04-28 2019-04-19 小米科技有限责任公司 Right management method and device
CN104899501A (en) * 2015-06-24 2015-09-09 小米科技有限责任公司 Dialog list display method and device and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246389A (en) * 2012-02-03 2013-08-14 三星电子株式会社 Method of operating multi-touch panel and terminal supporting the same
CN103425915A (en) * 2012-05-25 2013-12-04 汉王科技股份有限公司 Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN104700010A (en) * 2013-12-05 2015-06-10 腾讯科技(深圳)有限公司 Personal information protection method and protection device
CN104751068A (en) * 2013-12-26 2015-07-01 珠海金山办公软件有限公司 File protection method and device
CN104898940A (en) * 2015-04-30 2015-09-09 努比亚技术有限公司 Picture processing method and device
CN104915141A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Method and device for previewing object information

Also Published As

Publication number Publication date
CN105117663A (en) 2015-12-02

Similar Documents

Publication Publication Date Title
CN105117663B (en) The encrypted object display methods and device of a kind of application
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
CN105160227B (en) Remote fingerprint verification method and user terminal and fingerprint verification system
CN107659632A (en) A kind of file encryption-decryption method, device and computer-readable recording medium
CN104579668B (en) The verification method and cipher protection apparatus and verifying system of a kind of user identity
WO2018223797A1 (en) Data response method, terminal apparatus, and server
CN104700010A (en) Personal information protection method and protection device
CN107086984A (en) A kind of method, terminal and server for obtaining and generating identifying code
CN113225297B (en) Data hybrid encryption method, device and equipment
CN106648583B (en) Information processing method and terminal
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
CN102880305A (en) Keyboard input encryption method and mobile terminal thereof
CN104065648A (en) Data processing method of voice communication
CN115473722A (en) Data encryption method and device, electronic equipment and storage medium
CN105069360B (en) A kind of file encryption, decryption method and terminal
CN106126298B (en) Application freezing method and device and terminal
CN103795849A (en) Device and method for executing operation on private contact person in portable terminal
CN108073820A (en) Security processing, device and the mobile terminal of data
CN106127034B (en) A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment
CN106130727A (en) A kind of call cryptographic key negotiation method and system
CN103020509B (en) A kind of terminal device encryption and decryption method, device and terminal device
CN105072094A (en) Voice data encryption method and vehicle-mounted terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180706

CF01 Termination of patent right due to non-payment of annual fee