CN105138252A - Control method and electronic equipment - Google Patents

Control method and electronic equipment Download PDF

Info

Publication number
CN105138252A
CN105138252A CN201510523978.0A CN201510523978A CN105138252A CN 105138252 A CN105138252 A CN 105138252A CN 201510523978 A CN201510523978 A CN 201510523978A CN 105138252 A CN105138252 A CN 105138252A
Authority
CN
China
Prior art keywords
image data
fingerprint texture
intended application
electronic equipment
operational mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510523978.0A
Other languages
Chinese (zh)
Other versions
CN105138252B (en
Inventor
赵志扬
崔进轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510523978.0A priority Critical patent/CN105138252B/en
Publication of CN105138252A publication Critical patent/CN105138252A/en
Priority to US14/979,123 priority patent/US10212168B2/en
Priority to DE102016101289.0A priority patent/DE102016101289A1/en
Application granted granted Critical
Publication of CN105138252B publication Critical patent/CN105138252B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a control method and electronic equipment. The method comprises the steps that a call instruction is obtained, a target application is called and started, and the target application controls a collector of the electronic equipment to obtain and store collected data; from the process of calling and starting the target application to the process of operating the target application, input operation is obtained; based on parameter information generated by the input operation, it is determined that whether the target application operates in a first operation mode or a second operation mode, based on the determined result, the operation mode of the target application is controlled, when the target application operates in the first operation mode, the collected data obtained by the collector have security labels, and therefore the collected data with the security labels are in access states under the circumstance that a first access right is met; when the target application operates in the second operation mode, the collected data obtained by the collector do not have the security labels, and therefore the collected data without the security labels are in the access state under the circumstance that a second access right is met.

Description

A kind of control method and electronic equipment
Technical field
The present invention relates to equipment control technology field, particularly a kind of control method and electronic equipment.
Background technology
Along with the development of science and technology, terminal can realize diversified application function, as taken pictures, daily record, the function such as recording, therefore, more and more higher to the requirement of the safety of data various in terminal.
In prior art, generally for protected data safety, terminal arranges the security password unlocking or start shooting, as finger-print cipher or digital figure password etc., in the input operation of user, terminal and application thereof can be used during password coupling.
But in this scheme, the input operation that user carries out when forgetting Password all cannot unlock or open a terminal, making user cannot use the basic function of terminal, causing user's inconvenience, reducing Consumer's Experience effect.
Summary of the invention
The object of the invention is to, a kind of control method and electronic equipment are provided, all cannot unlock or open a terminal in order to solve the input operation that in prior art, user carries out when forgetting Password, make user cannot use the basic function of terminal, reduce the technical matters of Consumer's Experience effect.
The invention provides a kind of control method, described method comprises:
Obtain call instruction;
Respond described call instruction, adjust and open an intended application; Wherein, described intended application obtains and storage of collected data for the collector controlling electronic equipment;
Opening described intended application from tune is in the process of running status to described intended application, obtains an input operation;
Based on the parameter information that described input operation produces, determine that described intended application runs on the first operational mode and still runs on the second operational mode, produce determination result;
Based on described determination result, control the operational mode of described intended application;
Wherein, when described intended application is in described first operational mode operation, the image data that the described collector of described electronic equipment obtains has safety label, is in Access status to make the image data with described safety label when the first access rights meet;
When described intended application is in described second operational mode operation, the image data that the described collector of described electronic equipment obtains does not have described safety label, is in Access status to make the image data without described safety label when the second access rights meet.
Said method, preferred:
Described input operation is: be in send a notice described collector that described intended application starts to control described electronic equipment of described running status in described intended application and obtain the input operation of image data.
Said method, preferably, the described parameter information produced based on described input operation, determines that described intended application runs on the first operational mode and still runs on the second operational mode, produces determination result, comprising:
Determine, when obtaining described input operation, whether there is fingerprint texture parameter;
If there is fingerprint texture parameter when obtaining described input operation, determine that described intended application runs on described first operational mode;
If not there is fingerprint texture parameter when obtaining described input operation, determine that described intended application runs on described second operational mode;
Wherein, described intended application is in described first operational mode when running, and the described safety label that the image data that the described collector of described electronic equipment obtains has is described fingerprint texture parameter.
Said method, preferably, described method also comprises:
Determine whether the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter;
When the security parameter information of user logging in described electronic equipment meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status;
When the security parameter information of the user logging in described electronic equipment does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status;
Or
Determine whether the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter;
When the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status;
When the security parameter information of the operating body of current operation browse application does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status.
Said method, preferably, the parameter information that described input operation produces is security parameter information;
Accordingly, the described parameter information produced based on described input operation, determines that described intended application runs on the first operational mode and still runs on the second operational mode, produces determination result, comprising:
Judge whether the described security parameter information that described input operation produces matches with predetermined security template;
When described security parameter information and described predetermined security template match, determine that described intended application runs on the first operational mode;
When described security parameter information is not mated with described predetermined security template, determine that described intended application runs on the second operational mode.
Present invention also offers a kind of electronic equipment, described electronic equipment comprises:
Instruction obtains unit, for obtaining call instruction;
Application tune opens unit, for responding described call instruction, adjusting and opening an intended application; Wherein, described intended application obtains and storage of collected data for the collector controlling electronic equipment;
Operation obtains unit, being in the process of running status, obtaining an input operation for opening described intended application from tune to described intended application;
Pattern determining unit, for the parameter information produced based on described input operation, determines that described intended application runs on the first operational mode and still runs on the second operational mode, produces determination result;
Mode controlling unit, for based on described determination result, controls the operational mode of described intended application;
Wherein, when described intended application is in described first operational mode operation, the image data that the described collector of described electronic equipment obtains has safety label, is in Access status to make the image data with described safety label when the first access rights meet;
When described intended application is in described second operational mode operation, the image data that the described collector of described electronic equipment obtains does not have described safety label, is in Access status to make the image data without described safety label when the second access rights meet.
Above-mentioned electronic equipment, preferred:
Described input operation is: be in send a notice described collector that described intended application starts to control described electronic equipment of described running status in described intended application and obtain the input operation of image data.
Above-mentioned electronic equipment, preferably, described pattern determining unit comprises:
Fingerprint determination subelement, for determining, when obtaining described input operation, whether there is fingerprint texture parameter, if there is fingerprint texture parameter when obtaining described input operation, then trigger first and determine subelement, if not there is fingerprint texture parameter when obtaining described input operation, then trigger second and determine subelement;
First determines subelement, for determining that described intended application runs on described first operational mode;
Second determines subelement, for determining that described intended application runs on described second operational mode;
Wherein, described intended application is in described first operational mode when running, and the described safety label that the image data that the described collector of described electronic equipment obtains has is described fingerprint texture parameter.
Above-mentioned electronic equipment, preferably, also comprises:
First state set unit, for determining whether the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, when the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status, when the security parameter information of the user logging in described electronic equipment does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status,
Or
Second state set unit, for determining whether the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, when the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status, when the security parameter information of the operating body of current operation browse application does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status.
Above-mentioned electronic equipment, preferably, the parameter information that described input operation produces is security parameter information;
Accordingly, described pattern determining unit comprises:
Matching judgment subelement, for judging whether the described security parameter information that described input operation produces matches with predetermined security template, when described security parameter information and described predetermined security template match, trigger the 3rd and determine subelement, when described security parameter information is not mated with described predetermined security template, trigger the 4th and determine subelement;
3rd determines subelement, for determining that described intended application runs on the first operational mode;
4th determines subelement, for determining that described intended application runs on the second operational mode.
From such scheme, a kind of control method provided by the invention and electronic equipment, by opening in the process being in running status at tune the input operation can determining operational mode obtaining user and carry out to the intended application on electronic equipment, and then can when intended application is in different operational modes, safety label is set by the image data obtained the collector of electronic equipment or safety label is not set, make image data can be in Access status under corresponding access rights, realize the difference of the parameter information that input operation produces, the image data that collector obtains is carried out safeguard protection or do not protected, and then avoid user in the situation that cannot use terminal that forgets Password, thus, the present invention both can ensure do not have the input operation of safety that terminal applies also can be used to carry out image data, when ensuring again safe input operation, safeguard protection is carried out to image data, bring user more result of use, improve Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to the accompanying drawing provided.
Fig. 1 is the process flow diagram of a kind of control method embodiment one provided by the invention;
Fig. 2 is the partial process view of a kind of control method embodiment two provided by the invention;
Fig. 3 a is the partial process view of a kind of control method embodiment three provided by the invention;
Fig. 3 b is the partial process view of a kind of control method embodiment four provided by the invention;
Fig. 4 is the partial process view of a kind of control method embodiment five provided by the invention;
Fig. 5 is the structural representation of a kind of electronic equipment embodiment six provided by the invention;
Fig. 6 is the part-structure schematic diagram of a kind of electronic equipment embodiment seven provided by the invention;
Fig. 7 is the structural representation of a kind of electronic equipment embodiment eight provided by the invention;
Fig. 8 is the structural representation of a kind of electronic equipment embodiment nine provided by the invention;
Fig. 9 is the part-structure schematic diagram of a kind of electronic equipment embodiment ten provided by the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
With reference to figure 1, for the process flow diagram of a kind of control method embodiment one provided by the invention, wherein, described method is applicable to have in the electronic equipment of collector, as terminal devices such as mobile phone, pad, notebook, all-in-ones, described collector can image data, as data acquisition units such as touch screen, camera or microphones.
In the present embodiment, described method can comprise the following steps:
Step 101: obtain call instruction.
Wherein, described call instruction, can choose the icon of described intended application on described electronic equipment display screen for user, triggers described intended application and opens and the instruction entering running status.
Step 102: respond described call instruction, adjusts and opens an intended application.
Wherein, described intended application obtains and storage of collected data for the collector controlling electronic equipment.Described image data can be for: the character data that described touch screen obtains, and as daily record etc., the multi-medium data that also can obtain for described camera, as photo or video etc., the voice data that also can obtain for microphone, as recording etc.And described intended application can obtain and the application storing its corresponding image data for notepad, camera, voice memo etc. can control described collector.In the present embodiment after the described call instruction of acquisition, adjust and open a corresponding intended application, and then the collector that can control on described electronic equipment obtains and storage of collected data.
Step 103: open described intended application from tune and be in the process of running status to described intended application, obtain an input operation.
That is, opening in described intended application by being triggered and starting completely is in the process of running status, user operates described electronic equipment, in the present embodiment, input operation is now obtained, described input operation can the current protection wish to the image data that described collector obtains of characterizing consumer, as user need to this collector the image data that obtains carry out privacy setting or make other users also can conduct interviews (as checking the operations such as editor) without the need to carrying out protection, now, user carries out corresponding input operation according to demand.
Step 104: the parameter information produced based on described input operation, determines that described intended application runs on the first operational mode and still runs on the second operational mode, produces determination result.
Step 105: based on described determination result, controls the operational mode of described intended application.
Wherein, by analyzing the parameter information produced in described input operation in the present embodiment, and then determine that user wants the image data obtained described collector to carry out which kind of security setting, namely determine that described intended application runs on the first operational mode and still runs on the second operational mode, produce determination result, and then the operational mode controlling described intended application is described first operational mode or described second operational mode.
Concrete, when described intended application is in described first operational mode operation, the image data that the described collector of described electronic equipment obtains has safety label, Access status is in when the first access rights meet to make the image data with described safety label, described first access rights are specific access rights, as the access rights of the user that meets certain requirements or operating body, under authority outside described first access rights, the image data with described safety label is in inaccessible state, such as directly be hidden, or the Access status that cannot open or edit.
Such as, when described intended application is in described first operational mode operation, camera applications controls to have safety label in picture that described camera obtains or video data, these data with safety label just can be accessed when described first access rights meet, as accessing operations such as display or editors, can not be accessed these data with safety label are outside described first access rights, as shown or be edited.
And described intended application be in described second operational mode run time, the image data that the described collector of described electronic equipment obtains does not have described safety label, Access status is in when the second access rights meet to make the image data without described safety label, described second access rights, relative to described first access rights, can be understood as the access rights that any user or any operating body can be accessed.
Such as, when described intended application is in described second operational mode operation, notepad appli-cation controls not have safety label in the character data that described touch screen obtains, these data without safety label can be accessed when described second access rights meet, as accessing operations such as display or editors.
From such scheme, a kind of control method embodiment one provided by the invention, by opening in the process being in running status at tune the input operation can determining operational mode obtaining user and carry out to the intended application on electronic equipment, and then can when intended application is in different operational modes, safety label is set by the image data obtained the collector of electronic equipment or safety label is not set, make image data can be in Access status under corresponding access rights, realize the difference of the parameter information that input operation produces, the image data that collector obtains is carried out safeguard protection or do not protected, and then avoid user forgetting Password and cannot use terminal, the present embodiment both can ensure do not have the input operation of safety that terminal applies also can be used to carry out image data, when ensuring again safe input operation, safeguard protection is carried out to image data, bring user more result of use, improve Consumer's Experience.
It should be noted that, in the above-described embodiments, described input operation can be: be in send a notice described collector that described intended application starts to control described electronic equipment of described running status in described intended application and obtain the input operation of image data.
That is, described input operation be described intended application by start in the process entering running status by user to described electronic equipment carry out operation generate, and the described input operation now generated, be used to after described intended application is in its running status, notify that this intended application starts to control the triggering operation that described collector carries out image data acquisition.
Such as, user is when adjusting the voice memo application of opening on described electronic equipment, this voice memo by start to and enter in the process of running status, by user, described electronic equipment is operated, the present embodiment obtains input operation now, this input operation, after described voice memo is in running status, notifies that this intended application starts to control microphone and carries out voice recording.
Accordingly, with reference to figure 2, be the realization flow figure of step 104 described in a kind of control method embodiment two provided by the invention, wherein, described step 104 can be realized by following steps:
Step 141: determine whether have fingerprint texture parameter when obtaining described input operation, if having fingerprint texture parameter when obtaining described input operation, performs step 142, if do not have fingerprint texture parameter when obtaining described input operation, performs step 143.
Wherein, described fingerprint texture parameter can carry out for user the finger print information that inputs in the process of input operation, as the finger print information of the finger that slides when carrying out slide.
Step 142: determine that described intended application runs on described first operational mode.
Wherein, described intended application is in described first operational mode when running, and the described safety label that the image data that the described collector of described electronic equipment obtains has is described fingerprint texture parameter.
Step 143: determine that described intended application runs on described second operational mode.
That is, by after being in running status in described intended application in the present embodiment, to notifying that this intended application controls input operation that described collector carries out image data acquisition and whether has fingerprint texture parameter and judge, and then determine that described intended application runs on the first operational mode and still operates in the second operational mode, and then determine that the described image data obtained at described collector arranges safety label and still do not arrange safety label.
And it is corresponding, when described intended application runs on described first operational mode, the image data that the described collector of described electronic equipment obtains has described fingerprint texture parameter as its safety label, Access status is in as the image data of its safety label when the first access rights meet to make to have described fingerprint texture parameter, and when described intended application runs on described second operational mode, the image data that the described collector of described electronic equipment obtains does not have described fingerprint texture parameter, Access status is in when the second access rights meet to make the image data without described fingerprint texture parameter.
Based on previous embodiment, described image data after storing, its Access status in subsequent operation can be set according to its fingerprint texture parameter, with reference to figure 3a, for the partial process view of a kind of control method embodiment three provided by the invention, wherein, after described step 105, described method can also comprise the following steps:
Step 106: determine whether the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, when the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, perform step 107, when the security parameter information of the user logging in described electronic equipment does not meet described fingerprint texture parameter, perform step 108.
Step 107: the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status;
Step 108: the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status
Wherein, the security parameter information of the user of the described electronic equipment of described login can be understood as, and can characterize the information of the identity of the user logging in described electronic equipment.Thus, when described security parameter information meets described fingerprint texture parameter, the security characterizing the identity of the user of the described electronic equipment of current login meets preset rules, such as: be validated user for the image data corresponding to described fingerprint texture parameter, and then can by all image data, as as described in fingerprint texture parameter as described in having, image data and all data of fingerprint texture parameter as described in not having all are set to Access status, all data can be accessed to make the user of the described electronic equipment of current login, namely under described first access rights.
And when described security parameter information does not meet described fingerprint texture parameter, the security characterizing the identity of the user of the described electronic equipment of current login does not meet preset rules, such as: be non-legally user for the image data corresponding to described fingerprint texture parameter, the not all data of this user can conduct interviews, to access image data corresponding to described fingerprint texture parameter, now, only the described image data without described fingerprint texture parameter is set to Access status in the present embodiment, and the described image data with described fingerprint texture parameter is set to the inaccessible state hidden, that is, in the identity of the user of the described electronic equipment of current login and non-security identity time, the image data with fingerprint texture parameter can be hidden, it is allowed to be in sightless inaccessible state, and then comprise the security of these image data.
For camera applications, described camera applications is being opened in the process being in running status in the present embodiment, obtain the input operation of user, and then carry out this camera applications based on whether having fingerprint texture information in this input operation be in the first operational mode or the second operational mode and judge such as safe mode or general mode run, after determining the operational mode residing for this camera applications, under the triggering of described input operation, control described collector such as camera to this camera applications to obtain and store picture data, concrete, if described camera applications runs on safe mode, so in this image data, there is safety label, can using this fingerprint texture parameter as described safety label, if described camera applications runs on general mode, so not there is safety label in this image data.Afterwards, when there is user's image data corresponding to described camera applications and conducting interviews as viewed or edited, need whether meet described fingerprint texture information to the security parameter information of the user logging in described electronic equipment to judge, and then select whether to arrange the Access status of image data, concrete, when the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, all image datas are all set to the Access status that can carry out viewing or editing, and when described security parameter information does not meet described fingerprint texture parameter, the described image data with described fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status, the user making this its security parameter information meet described fingerprint texture parameter can only access the described image data without described fingerprint texture parameter, the image data with described fingerprint texture parameter can not be accessed.
From the above, the technical scheme in the present embodiment can realize multiple user and use the same application on same electronic equipment and image data such as the photo etc. corresponding separately to it carries out security protection.
Or with reference to figure 3b, be the partial process view of a kind of control method embodiment four provided by the invention, wherein, after described step 105, described method can also comprise the following steps:
Step 109: determine whether the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, when the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, perform step 110, when the security parameter information of the operating body of current operation browse application does not meet described fingerprint texture parameter, perform step 111.
Step 110: the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status;
Step 110: the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status.
Wherein, the security parameter information of the operating body of described current operation browse application can be understood as, and can characterize the information of the identity of the operating body owning user of current operation browse application.Thus, when described security parameter information meets described fingerprint texture parameter, the security characterizing the identity of the operating body owning user of current operation browse application meets preset rules, and then can by all image data, as as described in fingerprint texture parameter as described in having, image data and all data of fingerprint texture parameter as described in not having all are set to Access status, all data can be accessed, namely under described first access rights with what make the operating body owning user of current operation browse application.
And when described security parameter information does not meet described fingerprint texture parameter, the security characterizing the identity of the operating body owning user of current operation browse application does not meet preset rules, the not all data of this user can conduct interviews, now, only the described image data without described fingerprint texture parameter is set to Access status in the present embodiment, and the described image data with described fingerprint texture parameter is set to the inaccessible state hidden, that is, current not all data can conduct interviews and non-security identity time, the image data with fingerprint texture parameter can be hidden, it is allowed to be in sightless inaccessible state, and then comprise the security of these image data.
Example is applied as with notepad or daily record, being applied in the described daily record of unlatching in the present embodiment is in the process of running status, obtain the input operation of user, and then carry out this daily record application based on whether having fingerprint texture information in this input operation be in the first operational mode or the second operational mode such as safe mode or general mode operation and judge, after determining the operational mode residing for this daily record application, control described collector such as touch screen under this daily record being applied in the triggering of described input operation to obtain and store character data, concrete, if described daily record application runs on safe mode, so in this character data, there is safety label, can using this fingerprint texture parameter as described safety label, if described daily record application runs on general mode, so not there is safety label in this character data.Afterwards, exist operating body to described daily record application carry out browsing want to check daily record or editor's daily record time, need whether meet described fingerprint texture information to the security parameter information of the operating body of daily record application described in browsing to judge, and then select whether to arrange the Access status of character data and daily record, concrete, when the security parameter information of the operating body of browsing application meets described fingerprint texture parameter, all character datas are all set to the Access status that can carry out viewing or editing, and when described security parameter information does not meet described fingerprint texture parameter, the described character data with described fingerprint texture parameter is set to the inaccessible state hidden, and the described character data without fingerprint texture parameter is set to Access status, the user making this its security parameter information meet described fingerprint texture parameter can only access the described character data without described fingerprint texture parameter, the character data with described fingerprint texture parameter can not be accessed.
From the above, the technical scheme in the present embodiment can realize multiple user and use the same application on same electronic equipment and security protection is carried out in image data such as the daily record etc. corresponding separately to it.
In other specific implementation of the present embodiment, the parameter information that described input operation produces can be security parameter information, as finger print information, graphical information or character information etc., accordingly, with reference to figure 4, for the realization flow figure of step 104 described in a kind of control method embodiment five provided by the invention, wherein, described step 104 can be realized by following steps:
Step 144: judge whether the described security parameter information that described input operation produces matches with predetermined security template, when described security parameter information and described predetermined security template match, perform step 145, when described security parameter information is not mated with described predetermined security template, perform step 146.
Step 145: determine that described intended application runs on the first operational mode.
Step 146: determine that described intended application runs on the second operational mode.
Wherein, described predetermined security template can be understood as: the encrypted messages such as legal finger print information, graphical information or the character information that preset.In the present embodiment, mated by the encrypted message legal to the security parameter information in described input operation and these, and then determine that described intended application runs on described first operational mode or described second operational mode.
Such as, in voice memo application, after user clicks the icon of this voice memo application by its operating body, in the present embodiment, the input operation of user is gathered, and then extract the security parameter information produced in this input operation, as finger print information, and then this finger-print cipher is mated with the finger-print cipher preset, when mating, can judge that this voice memo current application is in the first safe operational mode and runs, this input operation triggers the speech data that this voice memo application controls microphone obtains and possesses safety label, only just Access status can be in when the first access rights meet, when security parameter information as the user logging in this electronic equipment meets the fingerprint texture information in input operation, the user of the described electronic equipment of this login can access this speech data, when the security parameter information logging in the user of this electronic equipment does not meet the fingerprint texture information in input operation, the user of the described electronic equipment of this login can not access this speech data, and when not mating, can judge that this voice memo current application is in the second common operational mode and runs, this input operation triggers the speech data that this voice memo application controls microphone obtains and does not possess safety label, Access status is in when the second access rights meet, no matter security parameter information as logged in the user of this electronic equipment accords with the fingerprint texture information do not met in input operation, and the use of the described electronic equipment of this login can access this speech data per family.
With reference to figure 5, for the structural representation of a kind of electronic equipment embodiment six provided by the invention, wherein, described electronic equipment can be as terminal devices such as mobile phone, pad, notebook, all-in-ones, this electronic equipment has collector, described collector can image data, as data acquisition units such as touch screen, camera or microphones.
In the present embodiment, described electronic equipment can comprise following structural unit:
Instruction obtains unit 501, for obtaining call instruction.
Wherein, described call instruction, can choose the icon of described intended application on described electronic equipment display screen for user, triggers described intended application and opens and the instruction entering running status.
Application tune opens unit 502, for responding described call instruction, adjusting and opening an intended application.
Wherein, described intended application obtains and storage of collected data for the collector controlling electronic equipment.Described image data can be for: the character data that described touch screen obtains, and as daily record etc., the multi-medium data that also can obtain for described camera, as photo or video etc., the voice data that also can obtain for microphone, as recording etc.And described intended application can obtain and the application storing its corresponding image data for notepad, camera, voice memo etc. can control described collector.In the present embodiment after the described call instruction of acquisition, adjust and open a corresponding intended application, and then the collector that can control on described electronic equipment obtains and storage of collected data.
Operation obtains unit 503, being in the process of running status, obtaining an input operation for opening described intended application from tune to described intended application.
That is, opening in described intended application by being triggered and starting completely is in the process of running status, user operates described electronic equipment, in the present embodiment, input operation is now obtained, described input operation can the current protection wish to the image data that described collector obtains of characterizing consumer, as user need to this collector the image data that obtains carry out privacy setting or make other users also can conduct interviews (as checking the operations such as editor) without the need to carrying out protection, now, user carries out corresponding input operation according to demand.
Pattern determining unit 504, for the parameter information produced based on described input operation, determines that described intended application runs on the first operational mode and still runs on the second operational mode, produces determination result.
Mode controlling unit 505, for based on described determination result, controls the operational mode of described intended application.
Wherein, by analyzing the parameter information produced in described input operation in the present embodiment, and then determine that user wants the image data obtained described collector to carry out which kind of security setting, namely determine that described intended application runs on the first operational mode and still runs on the second operational mode, produce determination result, and then the operational mode controlling described intended application is described first operational mode or described second operational mode.
Concrete, when described intended application is in described first operational mode operation, the image data that the described collector of described electronic equipment obtains has safety label, Access status is in when the first access rights meet to make the image data with described safety label, described first access rights are specific access rights, as the access rights of the user that meets certain requirements or operating body, under authority outside described first access rights, the image data with described safety label is in inaccessible state, such as directly be hidden, or the Access status that cannot open or edit.
Such as, when described intended application is in described first operational mode operation, camera applications controls to have safety label in picture that described camera obtains or video data, these data with safety label just can be accessed when described first access rights meet, as accessing operations such as display or editors, can not be accessed these data with safety label are outside described first access rights, as shown or be edited.
And described intended application be in described second operational mode run time, the image data that the described collector of described electronic equipment obtains does not have described safety label, Access status is in when the second access rights meet to make the image data without described safety label, described second access rights, relative to described first access rights, can be understood as the access rights that any user or any operating body can be accessed.
Such as, when described intended application is in described second operational mode operation, notepad appli-cation controls not have safety label in the character data that described touch screen obtains, these data without safety label can be accessed when described second access rights meet, as accessing operations such as display or editors.
From such scheme, a kind of electronic equipment embodiment six provided by the invention, by opening in the process being in running status at tune the input operation can determining operational mode obtaining user and carry out to the intended application on electronic equipment, and then can when intended application is in different operational modes, safety label is set by the image data obtained the collector of electronic equipment or safety label is not set, make image data can be in Access status under corresponding access rights, realize the difference of the parameter information that input operation produces, the image data that collector obtains is carried out safeguard protection or do not protected, and then avoid user forgetting Password and cannot use terminal, the present embodiment both can ensure do not have the input operation of safety that terminal applies also can be used to carry out image data, when ensuring again safe input operation, safeguard protection is carried out to image data, bring user more result of use, improve Consumer's Experience.
It should be noted that, in the above-described embodiments, described input operation can be: be in send a notice described collector that described intended application starts to control described electronic equipment of described running status in described intended application and obtain the input operation of image data.
That is, described input operation be described intended application by start in the process entering running status by user to described electronic equipment carry out operation generate, and the described input operation now generated, be used to after described intended application is in its running status, notify that this intended application starts to control the triggering operation that described collector carries out image data acquisition.
Such as, user is when adjusting the voice memo application of opening on described electronic equipment, this voice memo by start to and enter in the process of running status, by user, described electronic equipment is operated, the present embodiment obtains input operation now, this input operation, after described voice memo is in running status, notifies that this intended application starts to control microphone and carries out voice recording.
Accordingly, with reference to figure 6, be the structural representation of pattern determining unit 504 described in a kind of electronic equipment embodiment seven provided by the invention, wherein, described pattern determining unit 504 can comprise following structure:
Fingerprint determination subelement 541, for determining, when obtaining described input operation, whether there is fingerprint texture parameter, if there is fingerprint texture parameter when obtaining described input operation, then trigger first and determine subelement 542, if not there is fingerprint texture parameter when obtaining described input operation, then trigger second and determine subelement 543.
First determines subelement 542, for determining that described intended application runs on described first operational mode.
Wherein, described intended application is in described first operational mode when running, and the described safety label that the image data that the described collector of described electronic equipment obtains has is described fingerprint texture parameter.
Second determines subelement 543, for determining that described intended application runs on described second operational mode.
That is, by after being in running status in described intended application in the present embodiment, to notifying that this intended application controls input operation that described collector carries out image data acquisition and whether has fingerprint texture parameter and judge, and then determine that described intended application runs on the first operational mode and still operates in the second operational mode, and then determine that the described image data obtained at described collector arranges safety label and still do not arrange safety label.
And it is corresponding, when described intended application runs on described first operational mode, the image data that the described collector of described electronic equipment obtains has described fingerprint texture parameter as its safety label, Access status is in as the image data of its safety label when the first access rights meet to make to have described fingerprint texture parameter, and when described intended application runs on described second operational mode, the image data that the described collector of described electronic equipment obtains does not have described fingerprint texture parameter, Access status is in when the second access rights meet to make the image data without described fingerprint texture parameter.
Based on previous embodiment, described image data after storing, its Access status in subsequent operation can be set according to its fingerprint texture parameter, with reference to figure 7, for the structural representation of a kind of electronic equipment embodiment eight provided by the invention, wherein, described electronic equipment can also comprise following structural unit:
First state set unit 506, for determining whether the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, when the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status, when the security parameter information of the user logging in described electronic equipment does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status.
Wherein, the security parameter information of the user of the described electronic equipment of described login can be understood as, and can characterize the information of the identity of the user logging in described electronic equipment.Thus, when described security parameter information meets described fingerprint texture parameter, the security characterizing the identity of the user of the described electronic equipment of current login meets preset rules, such as: be validated user for the image data corresponding to described fingerprint texture parameter, and then can by all image data, as as described in fingerprint texture parameter as described in having, image data and all data of fingerprint texture parameter as described in not having all are set to Access status, all data can be accessed to make the user of the described electronic equipment of current login, namely under described first access rights.
And when described security parameter information does not meet described fingerprint texture parameter, the security characterizing the identity of the user of the described electronic equipment of current login does not meet preset rules, such as: be non-legally user for the image data corresponding to described fingerprint texture parameter, the not all data of this user can conduct interviews, to access image data corresponding to described fingerprint texture parameter, now, only the described image data without described fingerprint texture parameter is set to Access status in the present embodiment, and the described image data with described fingerprint texture parameter is set to the inaccessible state hidden, that is, in the identity of the user of the described electronic equipment of current login and non-security identity time, the image data with fingerprint texture parameter can be hidden, it is allowed to be in sightless inaccessible state, and then comprise the security of these image data.
For camera applications, described camera applications is being opened in the process being in running status in the present embodiment, obtain the input operation of user, and then carry out this camera applications based on whether having fingerprint texture information in this input operation be in the first operational mode or the second operational mode and judge such as safe mode or general mode run, after determining the operational mode residing for this camera applications, under the triggering of described input operation, control described collector such as camera to this camera applications to obtain and store picture data, concrete, if described camera applications runs on safe mode, so in this image data, there is safety label, can using this fingerprint texture parameter as described safety label, if described camera applications runs on general mode, so not there is safety label in this image data.Afterwards, when there is user's image data corresponding to described camera applications and conducting interviews as viewed or edited, need whether meet described fingerprint texture information to the security parameter information of the user logging in described electronic equipment to judge, and then select whether to arrange the Access status of image data, concrete, when the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, all image datas are all set to the Access status that can carry out viewing or editing, and when described security parameter information does not meet described fingerprint texture parameter, the described image data with described fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status, the user making this its security parameter information meet described fingerprint texture parameter can only access the described image data without described fingerprint texture parameter, the image data with described fingerprint texture parameter can not be accessed.
From the above, the technical scheme in the present embodiment can realize multiple user and use the same application on same electronic equipment and image data such as the photo etc. corresponding separately to it carries out security protection.
Or with reference to figure 8, be the structural representation of a kind of electronic equipment embodiment nine provided by the invention, wherein, described electronic equipment can comprise following structure:
Second state set unit 507, for determining whether the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, when the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status, when the security parameter information of the operating body of current operation browse application does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status.
Wherein, the security parameter information of the operating body of described current operation browse application can be understood as, and can characterize the information of the identity of the operating body owning user of current operation browse application.Thus, when described security parameter information meets described fingerprint texture parameter, the security characterizing the identity of the operating body owning user of current operation browse application meets preset rules, and then can by all image data, as as described in fingerprint texture parameter as described in having, image data and all data of fingerprint texture parameter as described in not having all are set to Access status, all data can be accessed, namely under described first access rights with what make the operating body owning user of current operation browse application.
And when described security parameter information does not meet described fingerprint texture parameter, the security characterizing the identity of the operating body owning user of current operation browse application does not meet preset rules, the not all data of this user can conduct interviews, now, only the described image data without described fingerprint texture parameter is set to Access status in the present embodiment, and the described image data with described fingerprint texture parameter is set to the inaccessible state hidden, that is, current not all data can conduct interviews and non-security identity time, the image data with fingerprint texture parameter can be hidden, it is allowed to be in sightless inaccessible state, and then comprise the security of these image data.
Example is applied as with notepad or daily record, being applied in the described daily record of unlatching in the present embodiment is in the process of running status, obtain the input operation of user, and then carry out this daily record application based on whether having fingerprint texture information in this input operation be in the first operational mode or the second operational mode such as safe mode or general mode operation and judge, after determining the operational mode residing for this daily record application, control described collector such as touch screen under this daily record being applied in the triggering of described input operation to obtain and store character data, concrete, if described daily record application runs on safe mode, so in this character data, there is safety label, can using this fingerprint texture parameter as described safety label, if described daily record application runs on general mode, so not there is safety label in this character data.Afterwards, exist operating body to described daily record application carry out browsing want to check daily record or editor's daily record time, need whether meet described fingerprint texture information to the security parameter information of the operating body of daily record application described in browsing to judge, and then select whether to arrange the Access status of character data and daily record, concrete, when the security parameter information of the operating body of browsing application meets described fingerprint texture parameter, all character datas are all set to the Access status that can carry out viewing or editing, and when described security parameter information does not meet described fingerprint texture parameter, the described character data with described fingerprint texture parameter is set to the inaccessible state hidden, and the described character data without fingerprint texture parameter is set to Access status, the user making this its security parameter information meet described fingerprint texture parameter can only access the described character data without described fingerprint texture parameter, the character data with described fingerprint texture parameter can not be accessed.
From the above, the technical scheme in the present embodiment can realize multiple user and use the same application on same electronic equipment and security protection is carried out in image data such as the daily record etc. corresponding separately to it.
In other specific implementation of the present embodiment, the parameter information that described input operation produces can be security parameter information, as finger print information, graphical information or character information etc., accordingly, with reference to figure 9, for the structural representation of pattern determining unit 504 described in a kind of electronic equipment embodiment ten provided by the invention, wherein, described pattern determining unit 504 can be realized by following structure:
Matching judgment subelement 544, for judging whether the described security parameter information that described input operation produces matches with predetermined security template, when described security parameter information and described predetermined security template match, trigger the 3rd and determine subelement 545, when described security parameter information is not mated with described predetermined security template, trigger the 4th and determine subelement 546.
3rd determines subelement 545, for determining that described intended application runs on the first operational mode.
4th determines subelement 546, for determining that described intended application runs on the second operational mode.
Wherein, described predetermined security template can be understood as: the encrypted messages such as legal finger print information, graphical information or the character information that preset.In the present embodiment, mated by the encrypted message legal to the security parameter information in described input operation and these, and then determine that described intended application runs on described first operational mode or described second operational mode.
Such as, in voice memo application, after user clicks the icon of this voice memo application by its operating body, in the present embodiment, the input operation of user is gathered, and then extract the security parameter information produced in this input operation, as finger print information, and then this finger-print cipher is mated with the finger-print cipher preset, when mating, can judge that this voice memo current application is in the first safe operational mode and runs, this input operation triggers the speech data that this voice memo application controls microphone obtains and possesses safety label, only just Access status can be in when the first access rights meet, when security parameter information as the user logging in this electronic equipment meets the fingerprint texture information in input operation, the user of the described electronic equipment of this login can access this speech data, when the security parameter information logging in the user of this electronic equipment does not meet the fingerprint texture information in input operation, the user of the described electronic equipment of this login can not access this speech data, and when not mating, can judge that this voice memo current application is in the second common operational mode and runs, this input operation triggers the speech data that this voice memo application controls microphone obtains and does not possess safety label, Access status is in when the second access rights meet, no matter security parameter information as logged in the user of this electronic equipment accords with the fingerprint texture information do not met in input operation, and the use of the described electronic equipment of this login can access this speech data per family.
It should be noted that, each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
Finally, also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
A kind of control method provided the application above and electronic equipment are described in detail, apply specific case herein to set forth the principle of the application and embodiment, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.

Claims (10)

1. a control method, described method comprises:
Obtain call instruction;
Respond described call instruction, adjust and open an intended application; Wherein, described intended application obtains and storage of collected data for the collector controlling electronic equipment;
Opening described intended application from tune is in the process of running status to described intended application, obtains an input operation;
Based on the parameter information that described input operation produces, determine that described intended application runs on the first operational mode and still runs on the second operational mode, produce determination result;
Based on described determination result, control the operational mode of described intended application;
Wherein, when described intended application is in described first operational mode operation, the image data that the described collector of described electronic equipment obtains has safety label, is in Access status to make the image data with described safety label when the first access rights meet;
When described intended application is in described second operational mode operation, the image data that the described collector of described electronic equipment obtains does not have described safety label, is in Access status to make the image data without described safety label when the second access rights meet.
2. method according to claim 1, is characterized in that:
Described input operation is: be in send a notice described collector that described intended application starts to control described electronic equipment of described running status in described intended application and obtain the input operation of image data.
3. method according to claim 2, is characterized in that, the described parameter information produced based on described input operation, determines that described intended application runs on the first operational mode and still runs on the second operational mode, produces determination result, comprising:
Determine, when obtaining described input operation, whether there is fingerprint texture parameter;
If there is fingerprint texture parameter when obtaining described input operation, determine that described intended application runs on described first operational mode;
If not there is fingerprint texture parameter when obtaining described input operation, determine that described intended application runs on described second operational mode;
Wherein, described intended application is in described first operational mode when running, and the described safety label that the image data that the described collector of described electronic equipment obtains has is described fingerprint texture parameter.
4. method according to claim 3, is characterized in that, described method also comprises:
Determine whether the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter;
When the security parameter information of user logging in described electronic equipment meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status;
When the security parameter information of the user logging in described electronic equipment does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status;
Or
Determine whether the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter;
When the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status;
When the security parameter information of the operating body of current operation browse application does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status.
5. method according to claim 1, is characterized in that, the parameter information that described input operation produces is security parameter information;
Accordingly, the described parameter information produced based on described input operation, determines that described intended application runs on the first operational mode and still runs on the second operational mode, produces determination result, comprising:
Judge whether the described security parameter information that described input operation produces matches with predetermined security template;
When described security parameter information and described predetermined security template match, determine that described intended application runs on the first operational mode;
When described security parameter information is not mated with described predetermined security template, determine that described intended application runs on the second operational mode.
6. an electronic equipment, described electronic equipment comprises:
Instruction obtains unit, for obtaining call instruction;
Application tune opens unit, for responding described call instruction, adjusting and opening an intended application; Wherein, described intended application obtains and storage of collected data for the collector controlling electronic equipment;
Operation obtains unit, being in the process of running status, obtaining an input operation for opening described intended application from tune to described intended application;
Pattern determining unit, for the parameter information produced based on described input operation, determines that described intended application runs on the first operational mode and still runs on the second operational mode, produces determination result;
Mode controlling unit, for based on described determination result, controls the operational mode of described intended application;
Wherein, when described intended application is in described first operational mode operation, the image data that the described collector of described electronic equipment obtains has safety label, is in Access status to make the image data with described safety label when the first access rights meet;
When described intended application is in described second operational mode operation, the image data that the described collector of described electronic equipment obtains does not have described safety label, is in Access status to make the image data without described safety label when the second access rights meet.
7. electronic equipment according to claim 6, is characterized in that:
Described input operation is: be in send a notice described collector that described intended application starts to control described electronic equipment of described running status in described intended application and obtain the input operation of image data.
8. electronic equipment according to claim 7, is characterized in that, described pattern determining unit comprises:
Fingerprint determination subelement, for determining, when obtaining described input operation, whether there is fingerprint texture parameter, if there is fingerprint texture parameter when obtaining described input operation, then trigger first and determine subelement, if not there is fingerprint texture parameter when obtaining described input operation, then trigger second and determine subelement;
First determines subelement, for determining that described intended application runs on described first operational mode;
Second determines subelement, for determining that described intended application runs on described second operational mode;
Wherein, described intended application is in described first operational mode when running, and the described safety label that the image data that the described collector of described electronic equipment obtains has is described fingerprint texture parameter.
9. electronic equipment according to claim 8, is characterized in that, also comprises:
First state set unit, for determining whether the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, when the security parameter information of the user logging in described electronic equipment meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status, when the security parameter information of the user logging in described electronic equipment does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status,
Or
Second state set unit, for determining whether the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, when the security parameter information of the operating body of current operation browse application meets described fingerprint texture parameter, the described image data with fingerprint texture parameter and the described image data without fingerprint texture parameter are all set to Access status, when the security parameter information of the operating body of current operation browse application does not meet described fingerprint texture parameter, the described image data with fingerprint texture parameter is set to the inaccessible state hidden, and the described image data without fingerprint texture parameter is set to Access status.
10. electronic equipment according to claim 6, is characterized in that, the parameter information that described input operation produces is security parameter information;
Accordingly, described pattern determining unit comprises:
Matching judgment subelement, for judging whether the described security parameter information that described input operation produces matches with predetermined security template, when described security parameter information and described predetermined security template match, trigger the 3rd and determine subelement, when described security parameter information is not mated with described predetermined security template, trigger the 4th and determine subelement;
3rd determines subelement, for determining that described intended application runs on the first operational mode;
4th determines subelement, for determining that described intended application runs on the second operational mode.
CN201510523978.0A 2015-08-24 2015-08-24 Control method and electronic equipment Active CN105138252B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201510523978.0A CN105138252B (en) 2015-08-24 2015-08-24 Control method and electronic equipment
US14/979,123 US10212168B2 (en) 2015-08-24 2015-12-22 Electronic device and control method thereof
DE102016101289.0A DE102016101289A1 (en) 2015-08-24 2016-01-26 Electronic device and control method therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510523978.0A CN105138252B (en) 2015-08-24 2015-08-24 Control method and electronic equipment

Publications (2)

Publication Number Publication Date
CN105138252A true CN105138252A (en) 2015-12-09
CN105138252B CN105138252B (en) 2020-08-25

Family

ID=54723615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510523978.0A Active CN105138252B (en) 2015-08-24 2015-08-24 Control method and electronic equipment

Country Status (1)

Country Link
CN (1) CN105138252B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956439A (en) * 2016-04-27 2016-09-21 乐视控股(北京)有限公司 Method and device for controlling fingerprint sensor and electronic equipment
CN105956440A (en) * 2016-04-27 2016-09-21 乐视控股(北京)有限公司 Fingerprint sensor control method and apparatus, and electronic device
CN106055947A (en) * 2016-05-23 2016-10-26 广东欧珀移动通信有限公司 Method and apparatus for unlocking mobile terminal through fingerprint, and mobile terminal
CN106909355A (en) * 2015-12-22 2017-06-30 北京奇虎科技有限公司 A kind of method and device for inquiring about hiden application
WO2017185672A1 (en) * 2016-04-27 2017-11-02 乐视控股(北京)有限公司 Method and device for controlling fingerprint sensor, and electronic device
CN107678330A (en) * 2017-09-18 2018-02-09 广东美的制冷设备有限公司 Terminal control method, device and computer-readable recording medium
CN108090361A (en) * 2016-11-22 2018-05-29 腾讯科技(深圳)有限公司 Security strategy update method and device
CN109409105A (en) * 2018-09-30 2019-03-01 联想(北京)有限公司 A kind of switching method, processor and electronic equipment
CN115206006A (en) * 2022-06-23 2022-10-18 浙江骑客机器人科技有限公司 Electric vehicle and unlocking method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080175443A1 (en) * 2007-01-23 2008-07-24 Fullpower, Inc. System control via characteristic gait signature
CN102902935A (en) * 2012-09-26 2013-01-30 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and device
CN103699847A (en) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 Fingerprint encryption method and device, and encrypted shooting method and device
CN104135605A (en) * 2013-06-21 2014-11-05 腾讯科技(深圳)有限公司 Method and device for taking a picture
CN104253933A (en) * 2013-06-26 2014-12-31 华为技术有限公司 Shooting method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080175443A1 (en) * 2007-01-23 2008-07-24 Fullpower, Inc. System control via characteristic gait signature
CN102902935A (en) * 2012-09-26 2013-01-30 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and device
CN104135605A (en) * 2013-06-21 2014-11-05 腾讯科技(深圳)有限公司 Method and device for taking a picture
CN104253933A (en) * 2013-06-26 2014-12-31 华为技术有限公司 Shooting method and device
CN103699847A (en) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 Fingerprint encryption method and device, and encrypted shooting method and device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106909355A (en) * 2015-12-22 2017-06-30 北京奇虎科技有限公司 A kind of method and device for inquiring about hiden application
CN105956439A (en) * 2016-04-27 2016-09-21 乐视控股(北京)有限公司 Method and device for controlling fingerprint sensor and electronic equipment
CN105956440A (en) * 2016-04-27 2016-09-21 乐视控股(北京)有限公司 Fingerprint sensor control method and apparatus, and electronic device
WO2017185667A1 (en) * 2016-04-27 2017-11-02 乐视控股(北京)有限公司 Method and apparatus for controlling fingerprint sensor, and electronic device
WO2017185672A1 (en) * 2016-04-27 2017-11-02 乐视控股(北京)有限公司 Method and device for controlling fingerprint sensor, and electronic device
CN106055947A (en) * 2016-05-23 2016-10-26 广东欧珀移动通信有限公司 Method and apparatus for unlocking mobile terminal through fingerprint, and mobile terminal
CN108090361A (en) * 2016-11-22 2018-05-29 腾讯科技(深圳)有限公司 Security strategy update method and device
CN108090361B (en) * 2016-11-22 2020-06-30 腾讯科技(深圳)有限公司 Security policy updating method and device
CN107678330A (en) * 2017-09-18 2018-02-09 广东美的制冷设备有限公司 Terminal control method, device and computer-readable recording medium
CN109409105A (en) * 2018-09-30 2019-03-01 联想(北京)有限公司 A kind of switching method, processor and electronic equipment
CN109409105B (en) * 2018-09-30 2022-09-23 联想(北京)有限公司 Switching method, processor and electronic equipment
CN115206006A (en) * 2022-06-23 2022-10-18 浙江骑客机器人科技有限公司 Electric vehicle and unlocking method thereof

Also Published As

Publication number Publication date
CN105138252B (en) 2020-08-25

Similar Documents

Publication Publication Date Title
CN105138252A (en) Control method and electronic equipment
CN104765552B (en) Right management method and device
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN104036196B (en) For configuring password and means for unlocking and method
CN103902862A (en) Mobile device management method and device and mobile device
CN104077512B (en) Personal information security management method and managing device
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
CN106815509B (en) A kind of multimedia file guard method, device and electronic equipment
CN110663041B (en) System and method for providing a user account through which a user can operate a computing device
CN105320871A (en) Screen unlocking method and screen unlocking apparatus
CN106959754A (en) Control the method and mobile terminal of mobile terminal
CN102891749A (en) Method and communication terminal for data encryption
CN105701420A (en) Method for managing user data and terminal
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN103324874A (en) Verification method and electronic device
CN104184874A (en) Method for switching mobile phone modes based on multiple unlocking conditions, and mobile phone thereof
CN105678144A (en) Screen unlocking method and device and electronic equipment
CN103780756B (en) The method of client identification card data secrecy and mobile terminal thereof
CN106909812A (en) Terminal unlocking processing method and terminal
CN105930717A (en) Picture unlocking method and mobile terminal
CN106529252A (en) Unlocking method and device for terminal
CN109284628A (en) A kind of file encryption storage reading system, method and mobile terminal based on fingerprint
CN105791529A (en) Mobile terminal and control method thereof
CN106980454A (en) Unlocking method and device
CN106778134A (en) terminal control method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant