CN106778296A - A kind of access method for accessing object, device and terminal - Google Patents

A kind of access method for accessing object, device and terminal Download PDF

Info

Publication number
CN106778296A
CN106778296A CN201611084999.8A CN201611084999A CN106778296A CN 106778296 A CN106778296 A CN 106778296A CN 201611084999 A CN201611084999 A CN 201611084999A CN 106778296 A CN106778296 A CN 106778296A
Authority
CN
China
Prior art keywords
access
default
object set
checking
access object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611084999.8A
Other languages
Chinese (zh)
Other versions
CN106778296B (en
Inventor
任利宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611084999.8A priority Critical patent/CN106778296B/en
Publication of CN106778296A publication Critical patent/CN106778296A/en
Application granted granted Critical
Publication of CN106778296B publication Critical patent/CN106778296B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Automation & Control Theory (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of access method for accessing object, device and terminal.The access method of the wherein access object includes:Access request is received, the access request carries checking information;The checking information is matched with default checking sample, wherein, the default checking sample is corresponded with hiding default access object set;When the checking information is with default checking sample matches, the default access object set corresponding with the checking information is obtained;To this, corresponding default access object set is shown and accesses.The embodiment of the present invention pre-sets access object set and merges hiding first, the hiding default access object set of each of which is corresponded with default checking sample, when it is determined that the checking information of input is with default checking sample matches, to can accordingly access object set and release and hide and show, thereby may be ensured that the privacy information in terminal is not easy leakage, improve the security of user privacy information.

Description

A kind of access method for accessing object, device and terminal
Technical field
The invention belongs to communication technical field, more particularly to a kind of access method for accessing object, device and terminal.
Background technology
As the development and popularization of mobile terminal, the function of mobile terminal are also stronger and stronger, such as, mobile phone has become Indispensable means of communication in people's daily life.
At present, a large amount of privacy informations of user, such as short message, picture, address list information are generally saved in mobile phone.Such as Fruit user forgotten screen locking and is used by others after using mobile phone, or in the hand-set from stolen used time, is easily caused hidden in mobile phone Private information leakage, so as to influence the security of user privacy information.
The content of the invention
The embodiment of the present invention provides a kind of access method for accessing object, device and terminal, can lift privacy of user letter The security of breath.
In a first aspect, the present invention provides a kind of access method for accessing object, including:
Access request is received, the access request carries checking information;
The checking information is matched with default checking sample, wherein, the default checking sample is pre- with hiding If accessing object set to correspond;
When the checking information is with the default checking sample matches, corresponding with the checking information presetting is obtained Access object set;
The corresponding default access object set is shown and accessed.
Second aspect, the present invention provides a kind of access mechanism for accessing object, including:
Receiving unit, for receiving access request, the access request carries checking information;
Matching unit, for the checking information to be matched with default checking sample, wherein, the default checking sample This is corresponded with hiding default access object set;
Acquiring unit, for when the checking information is with the default checking sample matches, obtaining and the checking letter The corresponding default access object set of manner of breathing;
Display unit, for the corresponding default access object set to be shown and accessed.
The third aspect, the present invention provides a kind of terminal, including:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs first aspect such as and provides Access object access method.
The embodiment of the present invention, when the access request for carrying checking information is received, by the checking information and default checking Sample is matched, and wherein the default checking sample is corresponded with hiding default access object set;Then, when checking is believed When breath is with default checking sample matches, the default access object set corresponding with checking information is obtained, corresponding is preset Object set is accessed to be shown and access.I.e. in the present embodiment, access object set is pre-set first and merges hiding, wherein often One hiding default access object set is corresponded with default checking sample, when it is determined that checking information and the default checking of input During sample matches, will can accordingly access object set and release and hide and show, thereby may be ensured that the privacy information in terminal It is not easy leakage, improves the security of user privacy information.
Brief description of the drawings
Below in conjunction with the accompanying drawings, described in detail by specific embodiment of the invention, technical scheme will be made And other beneficial effects are apparent.
Fig. 1 is the schematic flow sheet of the access method of access object provided in an embodiment of the present invention.
Fig. 2 is another schematic flow sheet of the access method of access object provided in an embodiment of the present invention.
Fig. 3 is the terminal interface schematic diagram of the access method of access object provided in an embodiment of the present invention.
Fig. 4 is the structural representation of the access mechanism of access object provided in an embodiment of the present invention.
Fig. 5 is another structural representation of the access mechanism of access object provided in an embodiment of the present invention.
Fig. 6 is the structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
Schema is refer to, wherein identical element numbers represent identical component, and principle of the invention is to implement one Illustrated in appropriate computing environment.The following description is that, based on the illustrated specific embodiment of the invention, it should not be by It is considered as the limitation present invention other specific embodiments not detailed herein.
In the following description, specific embodiment of the invention is by with reference to the step as performed by or multi-section computer And symbol is illustrated, unless otherwise stating clearly.Therefore, these steps and operation will have to mention for several times and be performed by computer, this paper institutes The computer of finger is performed and included by representing with the computer processing unit of the electronic signal of the data in a structuring pattern Operation.At this operation conversion data or the position being maintained in the memory system of the computer, its is reconfigurable Or change the running of the computer in the way of known to the tester of this area in addition.The data structure that the data are maintained It is the provider location of the internal memory, it has as particular characteristics defined in the data form.But, the principle of the invention is with above-mentioned text Word illustrates that it is not represented as a kind of limitation, this area tester will appreciate that plurality of step and behaviour as described below Also may be implemented in the middle of hardware.
Principle of the invention is grasped using many other wide usages or specific purpose computing, communication environment or configuration Make.The known example for being suitable for arithmetic system of the invention, environment and configuration may include the hand-held phone of (but not limited to), System, body frame configuration computer and distributed arithmetic ring based on personal computer, server, multicomputer system, micro computer Border, which includes any said system or device.
To be described in detail respectively below.
In the present embodiment, will be described from the angle of the access mechanism (can abbreviation access mechanism) for accessing object, should Access mechanism can specifically be integrated in terminal, such as mobile phone, panel computer, palm PC (PDA, Personal Digital Assistant), desktop computer etc..
Fig. 1 is referred to, Fig. 1 is the schematic flow sheet of the access method of access object provided in an embodiment of the present invention.It is described Method includes:
In step S101, access request is received, the access request carries checking information.
In step s 102, by the checking information with it is default checking sample matched, wherein, this it is default checking sample with Hiding default access object set is corresponded.
It is understood that in the present embodiment, can also include before " reception access request " (i.e. step S101) Following steps:
(1) create at least one and access object set.
(2) attribute information for accessing object set is set as be hidden for access object set by instruction.
(3) by attribute information be indicate to access the access object set that is hidden of object set be defined as it is hiding pre- If accessing object set.
Such as, terminal receives the establishment instruction of user, and multiple access object sets can be created in terminal interface, such as multiple Accessing object set can be shown in the form of file.
Further, after multiple access object sets are created, the attribute information to accessing object set sets, such as Access object set is hidden setting, i.e. user after unblock enters terminal interface, multiple access object sets are can not See.
Finally, terminal by this multiple be set to it is hiding, it is invisible access object set be defined as hiding default visit Ask object set.
In embodiments of the present invention, in order to improve security and be easy to multi-user to use, each hiding default access Object set can be correspondingly arranged a checking sample, obtain default checking sample, wherein, preset checking sample and hiding default visit Ask that object set is corresponded, each default checking sample accessed corresponding to object set may be configured as identical, may be alternatively provided as Differ, be not especially limited herein.
It is understood that during checking information may particularly include fingerprint, voice and password etc. in the embodiment of the present invention One or more combinations, are not especially limited herein.
Such as, when user wants to access any access object set, it is required for validation information, terminal to believe the checking Breath is matched with default checking sample, when the checking information is with default checking sample matches, just allows user to access corresponding Default access object set.
In some embodiments, " creating at least one and access object set " (step (1)) can include:
(11) multiple access objects are obtained.
(12) selection instruction of user input is received.
(13) according to the selection instruction, the corresponding object that accesses is polymerized, generation at least one accesses object set.
Such as, for creating one and accessing object set, terminal is obtained the need for user determines and is hidden first It is multiple access objects, then, receive the selection instruction of user input, the selection instruction indicates to be hidden the need for determination It is multiple access objects, the corresponding object that accesses of selection is polymerized, so as to complete an establishment for access object set.
In some embodiments, it can be file that object set is accessed in the present embodiment, access bag in object set Object is accessed containing at least one, wherein accessing object can be specially photo, video, information, file and terminal applies etc. Deng being not especially limited herein.
In step s 103, when the checking information is with default checking sample matches, obtain corresponding with the checking information Default access object set.
In step S104, corresponding default access object set is shown and accessed.
In some embodiments, hiding default access object set can be hiding default file folder, based on this, " obtaining the default access object set corresponding with the checking information " (i.e. step S103) can include:Obtain and believe with checking The corresponding default file folder of manner of breathing.
" corresponding default access object set is shown and is accessed " (i.e. step S104) includes:To corresponding Default file folder is opened up and accessed to be shown.
In some embodiments, " checking information is matched with default checking sample " after (i.e. step S102), Can also include:When checking information is mismatched with default checking sample, the refusal respond access request.
It is understood that the checking information carried in access request in the embodiment of the present invention is different from terminal unlocking letter Breath, terminal unlocking information is used for unlock terminal, and the checking information carried in access request is used to access object set into default Displaying interface, to conduct interviews.
When the checking information of input is mismatched with default checking sample, it is believed that current authentication information accesses right with default As set is mismatched, without the authority for entering the default displaying interface for accessing object set, therefore the terminal refusal respond access Request, such as prompting input error, or do not enter this it is default access object set displaying interface do not make any prompting, etc. Deng.
From the foregoing, the access method of the access object that the present embodiment is provided, is receiving the visit of carrying checking information When asking request, the checking information is matched with default checking sample, wherein default checking sample and the hiding default visit Ask that object set is corresponded;Then, when checking information is with default checking sample matches, obtain corresponding with checking information It is default to access object set, corresponding default access object set is shown and accessed.I.e. in the present embodiment, first in advance First setting accesses object set and merges hiding, and the hiding default access object set of each of which verifies sample 1 a pair with default Should, when it is determined that the checking information of input is with default checking sample matches, will can accordingly access object set and release and hide simultaneously Displaying, thereby may be ensured that the privacy information in terminal is not easy leakage, improve the security of user privacy information.
, be described in further detail for citing below by the method according to described by above-described embodiment.
In the embodiment, it is introduced by taking most commonly used mobile terminal as an example, due to mobile terminal (such as mobile phone) In generally save a large amount of privacy informations of user, such as short message, picture, address list information.If user is using movement Screen locking is forgotten after terminal and is used by others, or when mobile terminal is stolen, easily cause the privacy letter in mobile terminal Breath leakage.
Based on this, the present invention provides the scheme that a kind of file classification of mobile terminal is hidden.Fig. 2 is referred to, Fig. 2 is this hair Another schematic flow sheet of the access method of the access object that bright embodiment is provided.
It is understood that in the present embodiment, accessing the file that object refers to mobile terminal, photo can be included, regarded Frequently, information, document and terminal applies etc., these access objects can be deposited in desktop folder respectively, also referred to as privacy File, forms and accesses object set.
Wherein, the method includes:
In step s 201, at least one private file of mobile terminal establishment folder, and setting carries out private file folder hidden Hide.
Such as, multiple is created first is set as hiding private file folder, the privacy information for depositing user.Then it is right In each private file folder, corresponding checking sample is set.
In the present embodiment, for creating a private file folder, the need for acquisition for mobile terminal user determines first The multiple files being hidden, then, receive the selection instruction of user input, and the selection instruction indicates to be carried out the need for determination In hiding multiple files, corresponding file is selected to be polymerized, so as to complete an establishment for private file folder.
Such as, mobile terminal receives the establishment instruction of user, and multiple is created in terminal interface according to above-mentioned establishment mode Private file is pressed from both sides.
Further, after multiple private file folders are created, the attribute information to " the hiding/display " of private file folder enters Row setting, in the embodiment, is hidden setting, i.e. user in unblock into after terminal interface, Duo Geyin by private file folder Private file is invisible.
In step S202, mobile terminal is correspondingly arranged a checking sample for each hiding private file folder.
In embodiments of the present invention, in order to improve security and be easy to multi-user to use, each hiding private file Folder can be correspondingly arranged a checking sample, and the corresponding checking sample of each hiding private file folder may be configured as identical, can also set It is set to and differs, is not especially limited herein.
It is understood that in verifying that sample may particularly include fingerprint, voice and password etc. in the embodiment of the present invention One or more combinations, are not especially limited herein.
In step S203, mobile terminal receives the access request of hiding private file folder, and the access request is carried and tested Card information.
In step S204, mobile terminal is matched the checking information with checking sample.
Such as, when user wants that accessing any hiding private file presss from both sides, it is required for validation information, terminal to test this The checking sample that card information is set with step S202 is matched one by one, when the checking information is with checking sample matches, is just permitted Family allowable accesses hiding private file folder corresponding with the checking sample.
In step S205, when the checking information is with checking sample matches, acquisition for mobile terminal and the checking information phase Corresponding hiding private file folder.
In step S206, the mobile terminal hiding private file folder corresponding to this is shown, with to the displaying Private file folder conduct interviews.
Such as, when the checking information of input is with checking sample matches, it is believed that get the exhibition into private file folder Show the authority at interface, so as to checking sample or checking information according to matching, obtain corresponding hiding private file folder, And be shown private file folder, press from both sides and conduct interviews into the private file in order to user.
Such as, below by taking mobile phone as an example, mobile phone private file is pressed from both sides by a concrete scene be classified to hide and access is carried out Introduce:
First, mobile phone desktop sets private file folder, can set up multiple, is temporarily set to here " A1, A2, B, C " four Private file is pressed from both sides, and this four private file underedges can deposit different types of content, it is also possible to be carried out according to the need for user Selection storage.
Then, this four access considerations of private file folder are respectively provided with, that is, are set and is accessed checking sample, such as can set Put the assigned operations such as password, fingerprint, gesture.In this scene, mobile terminal sets this four access considerations pair of private file folder Should be related to as follows:
“A1→P1、A2→P1、B→P2、C→P3”。
Wherein, the former is private file folder title, and correspondence the latter is access consideration, such as checking password.
It is understood that each private file folder correspondence one verifies sample, corresponding checking sample could be arranged to It is different, it is also possible to be set to identical, illustrate herein and do not constitute limitation of the invention.
Then, user is to mobile phone validation information, can by the password authentication module of mobile phone, fingerprint identification module or Person's gesture recognition module etc., verifies whether the checking information of user input meets access consideration as above.
Finally, if the checking information of user input meets the access consideration for setting, mobile phone is except showing general hand Outside machine desktop, corresponding private file folder can also be shown.
For example, as shown in figure 3, four private files folders of mobile phone desktop setting " A1, A2, B, C ", use dotted line frame table herein Show, user is by being input into P1, then the content that mobile phone desktop shows includes two private files of non-privacy content and A1, A2 Folder, wherein, mobile phone application or document with privacy information etc. can be included in private file folder.That is, user Mobile phone can be entered by different verification conditions, reach the different purpose of display content, protect the privacy information of user.
That is, this programme is directed to the private file folder for setting in advance, different checking samples are set, with basis with test The checking information of sample matches is demonstrate,proved, is pressed from both sides into different private files, show and access different content.
In some embodiments, it is also possible in the case where user's use is not influenceed, it is hidden for different user identity Hide different private files folders and private files, the privacy of the user for not only ensureing, it is ensured that mobile terminal desktop Succinctly.Further, by different verification modes, different private file folder protection contents are shown, many people can be facilitated to make Show that the mobile phone private content of oneself is different under different occasions with a mobile terminal or same person, usage scenario is more Extensively.
In addition, by hidden folders different to desktop settings in advance, each (or per class) hiding private file The different identification access consideration of folder correspondence, can be different fingerprints, voice or password, and the access consideration is to be applied to Whole mobile terminal.Mobile terminal can be unlocked by different access considerations, and show different hidden folders simultaneously.
From the foregoing, the access method of the access object that the present embodiment is provided, is receiving the visit of carrying checking information When asking request, the checking information is matched with checking sample, wherein the checking sample presss from both sides set with hiding private file Correspond;Then, when checking information is with checking sample matches, the private file folder corresponding with checking information is obtained, it is right Corresponding private file folder is shown and accesses.I.e. in the present embodiment, private file is pre-set first and is pressed from both sides and is hidden, its In each hiding private file folder corresponded with checking sample, when it is determined that the checking information and checking sample matches of input When, corresponding private file folder can be released and hide and show, thereby may be ensured that the privacy information in terminal is not easy leakage, Improve the security of user privacy information;Meanwhile, the clean and tidy of terminal desktop had both been ensure that, also protect the individual privacy of user.
For ease of preferably implementing the access method of access object provided in an embodiment of the present invention, the embodiment of the present invention is also carried For a kind of device and mobile terminal of the access method based on above-mentioned access object.The wherein implication of noun is right with above-mentioned access It is identical in the method for the access of elephant, implement the explanation during details may be referred to embodiment of the method.
Fig. 4 is referred to, Fig. 4 is the structural representation of the access mechanism of access object provided in an embodiment of the present invention, wherein The access mechanism 300 of the access object can include:Receiving unit 301, matching unit 302, acquiring unit 303 and displaying are single Unit 304.
Wherein receiving unit 301, for receiving access request, the access request carries checking information.
Matching unit 302, English is matched the checking information with default checking sample, wherein, described presetting is tested Card sample is corresponded with hiding default access object set.
Acquiring unit 303, for when the checking information is with default checking sample matches, obtaining and the checking information Corresponding default access object set.
Display unit 304, for the corresponding default access object set to be shown and accessed.
Also referring to Fig. 5, Fig. 5 is the structural representation of the access mechanism of access object provided in an embodiment of the present invention, The access mechanism 400 can also include:
Unit 305 is set up, object set is accessed for creating at least one.
Setup unit 306, for set access object set attribute information for indicate will access object set carry out it is hidden Hide.
Determining unit 307, for being to indicate that the access object set that object set is hidden will be accessed by attribute information It is defined as hiding default access object set.
Such as, terminal receives the establishment instruction of user, and multiple access object sets can be created in terminal interface, such as multiple Accessing object set can be shown in the form of file.
Further, after multiple access object sets are created, the attribute information to accessing object set sets, such as Access object set is hidden setting, i.e. user after unblock enters terminal interface, multiple access object sets are can not See.
Finally, terminal by this multiple be set to it is hiding, it is invisible access object set be defined as hiding default visit Ask object set.
In embodiments of the present invention, in order to improve security and be easy to multi-user to use, each hiding default access Object set can be correspondingly arranged a checking sample, obtain default checking sample, wherein, preset checking sample and hiding default visit Ask that object set is corresponded, each default checking sample accessed corresponding to object set may be configured as identical, may be alternatively provided as Differ, be not especially limited herein.
It is understood that during checking information may particularly include fingerprint, voice and password etc. in the embodiment of the present invention One or more combinations, are not especially limited herein.
Such as, when user wants to access any access object set, it is required for validation information, terminal to believe the checking Breath is matched with default checking sample, when the checking information is with default checking sample matches, just allows user to access corresponding Default access object set.
In some embodiments, this is set up unit 305 and can include:
Subelement 3051 is obtained, for obtaining multiple access objects.
Receiving subelement 3052, the selection instruction for receiving user input.
Polymerization subelement 3053, for according to the selection instruction, the corresponding object that accesses being polymerized, generation is at least One access object set.
Such as, for creating one and accessing object set, terminal is obtained the need for user determines and is hidden first It is multiple access objects, then, receive the selection instruction of user input, the selection instruction indicates to be hidden the need for determination It is multiple access objects, the corresponding object that accesses of selection is polymerized, so as to complete an establishment for access object set.
In some embodiments, it can be file that object set is accessed in the present embodiment, access bag in object set Object is accessed containing at least one, wherein accessing object can be specially photo, video, information, file and terminal applies etc. Deng being not especially limited herein.
In some embodiments, hiding default access object set can be hiding default file folder, based on this, Acquiring unit 303, for when the checking information is with default checking sample matches, obtaining corresponding with the checking information Default file is pressed from both sides.Display unit 304, for the corresponding default file folder to be shown and accessed.
In some embodiments, the access mechanism 400 can also include:Refusal unit 308, for working as checking information When being mismatched with default checking sample, access request described in refusal respond.
It is understood that the checking information carried in access request in the embodiment of the present invention is different from terminal unlocking letter Breath, terminal unlocking information is used for unlock terminal, and the checking information carried in access request is used to access object set into default Displaying interface, to conduct interviews.
When the checking information of input is mismatched with default checking sample, it is believed that current authentication information accesses right with default As set is mismatched, without the authority for entering the default displaying interface for accessing object set, therefore the terminal refusal respond access Request, such as prompting input error, or do not enter this it is default access object set displaying interface do not make any prompting, etc. Deng.
During specific implementation, above unit can be realized as independent entity, it is also possible to be combined, and be made Realized for same or several entities, the specific implementation of above unit can be found in embodiment of the method above, herein not Repeat again.
The access mechanism can specifically be integrated in terminal, such as mobile phone, panel computer, palm PC PDA, desktop computer Deng.
From the foregoing, the access mechanism of the access object that the present embodiment is provided, is receiving the visit of carrying checking information When asking request, the checking information is matched with default checking sample, wherein default checking sample and the hiding default visit Ask that object set is corresponded;Then, when checking information is with default checking sample matches, obtain corresponding with checking information It is default to access object set, corresponding default access object set is shown and accessed.I.e. in the present embodiment, first in advance First setting accesses object set and merges hiding, and the hiding default access object set of each of which verifies sample 1 a pair with default Should, when it is determined that the checking information of input is with default checking sample matches, will can accordingly access object set and release and hide simultaneously Displaying, thereby may be ensured that the privacy information in terminal is not easy leakage, improve the security of user privacy information.
The present invention also provides a kind of terminal, such as panel computer, mobile phone mobile terminal, refers to Fig. 6, and Fig. 6 is the present invention The mobile terminal structure schematic diagram that embodiment is provided.The mobile terminal 500 can include:Input block 501, include one or The memory 502 of more than one computer-readable recording medium, display unit 503, fingerprint sensor 504, voicefrequency circuit 505, Include one or the grade part of processor 506 of more than one processing core.It will be understood by those skilled in the art that in Fig. 6 The mobile terminal structure for showing does not constitute the restriction to mobile terminal, can include part more more or less than diagram, or Person combines some parts, or different part arrangements.
Input block 501 can be used to receive numeral, character information or the user's characteristic information (such as fingerprint) of input, and Produce the keyboard relevant with user's setting and function control, mouse, action bars, optics or trace ball signal input.Specifically Ground, in a specific embodiment, input block 501 may include Touch sensitive surface and other input equipments.Touch sensitive surface, Referred to as touch display screen or Trackpad, user can be collected thereon or neighbouring touch operation (such as user uses finger, touches The operations of any suitable object or annex on Touch sensitive surface or near Touch sensitive surface such as pen), and according to set in advance Formula drives corresponding attachment means.Optionally, Touch sensitive surface may include two parts of touch detecting apparatus and touch controller. Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, and transmit a signal to touch Controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives treatment Device 506, and the order sent of receiving processor 506 and can be performed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray And the polytype such as surface acoustic wave realizes Touch sensitive surface.Except Touch sensitive surface, input block 501 can also be including other inputs Equipment.Specifically, other input equipments can include but is not limited to physical keyboard, function key (such as volume control button, switch Button etc.), fingerprint recognition module, trace ball, mouse, one or more in action bars etc..
Memory 502 can be used to store application program and data.Include and can hold in the application program of the storage of memory 502 Line code.Application program can constitute various functions module.Processor 506 is by running application journey of the storage in memory 502 Sequence, so as to perform various function application and data processing.Memory 502 can mainly include storing program area and data storage Area, wherein, application program that storing program area can be needed for storage program area, at least one function (such as sound-playing function, Image player function etc.) etc.;Storage data field can be stored and use created data (such as audio number according to mobile terminal According to, phone directory etc.) etc..Additionally, memory 502 can include high-speed random access memory, non-volatile depositing can also be included Reservoir, for example, at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 502 can also include Memory Controller, to provide the access of processor 506 and input block 501 to memory 502.
Display unit 503 can be used to showing by user input information or be supplied to the information and mobile terminal of user Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination. Display unit 503 may include display panel.Optionally, liquid crystal display (LCD, Liquid Crystal can be used Display), the form such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configures display surface Plate.Further, Touch sensitive surface can cover display panel, when Touch sensitive surface is detected thereon or after neighbouring touch operation, Processor 506 is sent to determine the type of touch event, with preprocessor 506 according to the type of touch event in display panel It is upper that corresponding visual output is provided.Although in figure 6, Touch sensitive surface with display panel is realized as two independent parts Input and input function, but in some embodiments it is possible to by Touch sensitive surface and display panel it is integrated and realize be input into and it is defeated Go out function.
Fingerprint sensor 504 is the device for realizing user fingerprints automatic data collection.Fingerprint sensor 504 can be arranged in movement The positive screen lower section of terminal, it is also possible to be arranged in back side of mobile terminal etc..Fingerprint sensor 504 will can be collected User fingerprints information be sent to processor 506 in be analyzed comparison, it is also possible to be sent in memory 502 and store.For example, After the finger print information for collecting mobile terminal owner, the finger print information can be sent to memory by fingerprint sensor 504 Stored in 502.
Voicefrequency circuit 505 can provide the COBBAIF between user and mobile terminal by loudspeaker, microphone.Audio-frequency electric The voice data that road 506 will can receive is converted into electric signal, is transferred to loudspeaker, and it is defeated to be converted to voice signal by loudspeaker Go out;On the other hand, the voice signal of collection is converted to electric signal by microphone, and audio is converted to after being received by voicefrequency circuit 506 Data, then after voice data output processor 508 is processed, voice data is exported to memory 502 so as to further treatment. Voicefrequency circuit 506 is also possible that earphone jack, to provide the communication of peripheral hardware earphone and mobile terminal.
Processor 506 is the control centre of mobile terminal, using each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing application program of the storage in memory 502, and calls storage in memory 502 Data, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Optionally, process Device 506 may include one or more processing cores;Preferably, processor 506 can integrated application processor and modulation /demodulation treatment Device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is mainly located Reason radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 506.
Although not shown in Fig. 6, mobile terminal can also will not be repeated here including camera, bluetooth module etc..
It is specific in the present embodiment, processor 506 in mobile terminal can according to following instruction, by one or one with On the corresponding executable code of process of application program be loaded into memory 502, and storage run by processor 506 exist Application program in memory 502, so as to realize various functions:
Access request is received, the access request carries checking information;The checking information and default checking sample are carried out Match somebody with somebody, wherein, preset checking sample and corresponded with hiding default access object set;When checking information and default checking sample During matching, the default access object set corresponding with checking information is obtained;Corresponding default access object set is carried out Show and access.
In some embodiments, processor 506 can also run application program of the storage in memory 502, such as receive Before access request, create at least one and access object set;The attribute information for accessing object set is set to indicate access Object set is hidden;By attribute information be indicate to access the access object set that is hidden of object set be defined as it is hidden The default access object set hidden.
Further, processor 506 creates at least one and accesses object set, may particularly include:Obtain multiple access right As;Receive the selection instruction of user input;According to selection instruction, the corresponding object that accesses is polymerized, generation at least one Access object set.
In some embodiments, hiding default access object set is hiding default file folder.
Based on this, processor 506 can also run application program of the storage in memory 502, such as obtain and checking information Corresponding default file folder, is shown and accesses to corresponding default file folder.
In some embodiments, after processor 506 is matched checking information with default checking sample, can be with Including:When checking information is mismatched with default checking sample, refusal respond access request.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment Point, the detailed description above with respect to the access method for accessing object is may refer to, here is omitted.
It is provided in an embodiment of the present invention it is described access object access mechanism, be for example computer, panel computer, with touch Touch mobile phone of function etc., the access method of the access object in the access mechanism for accessing object and foregoing embodiments belongs to Same design, provides in the access method embodiment that the access object can be run in the access mechanism of the access object Either method, its implement process refer to it is described access object access method embodiment, here is omitted.
It should be noted that for the access method of access object of the present invention, this area common test personnel can To understand all or part of flow of the access method for realizing that object is accessed described in the embodiment of the present invention, computer is can be by Program is completed to control the hardware of correlation, and the computer program can be stored in a computer read/write memory medium, such as Storage in a memory in the mobile terminal, and by least one computing device in the mobile terminal, in the process of implementation may be used Flow including accessing the embodiment of the access method of object as described.Wherein, described storage medium can for magnetic disc, CD, Read-only storage (ROM, Read Only Memory), random access memory (RAM, Random Access Memory) etc..
For the access mechanism of the access object of the embodiment of the present invention, its each functional module can be integrated in one In process chip, or modules are individually physically present, it is also possible to which two or more modules are integrated in a mould In block.Above-mentioned integrated module can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized. If the integrated module is to realize in the form of software function module and as independent production marketing or when using, it is also possible to In a computer read/write memory medium, the storage medium is for example read-only storage, disk or CD etc. for storage.
A kind of access method of the access object for being provided the embodiment of the present invention above, device and terminal have been carried out in detail Introduce, specific case used herein is set forth to principle of the invention and implementation method, the explanation of above example It is only intended to help and understands the method for the present invention and its core concept;Simultaneously for those skilled in the art, according to the present invention Thought, will change in specific embodiments and applications, in sum, this specification content should not be understood It is limitation of the present invention.

Claims (10)

1. it is a kind of access object access method, it is characterised in that including:
Access request is received, the access request carries checking information;
The checking information is matched with default checking sample, wherein, default checking sample and the hiding default visit Ask that object set is corresponded;
When the checking information is with the default checking sample matches, the default access corresponding with the checking information is obtained Object set;
The corresponding default access object set is shown and accessed.
2. it is according to claim 1 access object access method, it is characterised in that before the reception access request, Also include:
Create at least one and access object set;
Be hidden for the access object set to indicate by the attribute information for setting the access object set;
It is to indicate for the access object set that the access object set is hidden to be defined as hiding presetting by attribute information Access object set.
3. it is according to claim 2 access object access method, it is characterised in that the establishment at least one accesses right As set, including:
Obtain multiple access objects;
Receive the selection instruction of user input;
According to the selection instruction, the corresponding object that accesses is polymerized, generation at least one accesses object set.
4. the access method of the access object according to any one of claims 1 to 3, it is characterised in that described hiding pre- If it is hiding default file folder to access object set;
The acquisition default access object set corresponding with the checking information includes:Obtain relative with the checking information The default file answered is pressed from both sides;
It is described the corresponding default access object set is shown and access including:To the corresponding default text Part folder is shown and accesses.
5. according to any one of claims 1 to 3 access object access method, it is characterised in that it is described to be tested described After card information is matched with the default checking sample, also include:
When the checking information is mismatched with the default checking sample, access request described in refusal respond.
6. it is a kind of access object access mechanism, it is characterised in that including:
Receiving unit, for receiving access request, the access request carries checking information;
Matching unit, for by the checking information with it is default checking sample matched, wherein, it is described it is default checking sample with Hiding default access object set is corresponded;
Acquiring unit, for when the checking information is with the default checking sample matches, obtaining and the checking information phase Corresponding default access object set;
Display unit, for the corresponding default access object set to be shown and accessed.
7. it is according to claim 6 access object access mechanism, it is characterised in that described device also includes:
Unit is set up, object set is accessed for creating at least one;
Setup unit, for set it is described access object set attribute information for indicate by it is described access object set carry out it is hidden Hide;
Determining unit, for being to indicate to determine the access object set that the access object set is hidden by attribute information It is the default access object set hidden.
8. it is according to claim 7 access object access mechanism, it is characterised in that the unit of setting up includes:
Subelement is obtained, for obtaining multiple access objects;
Receiving subelement, the selection instruction for receiving user input;
Polymerization subelement, for according to the selection instruction, the corresponding object that accesses being polymerized, generation at least one is accessed Object set.
9. the access mechanism of the access object according to any one of claim 6 to 8, it is characterised in that described hiding pre- If it is hiding default file folder to access object set;
The acquiring unit, for when the checking information is with the default checking sample matches, obtaining and the checking letter The corresponding default file folder of manner of breathing;
The display unit, for the corresponding default file folder to be shown and accessed;
The access mechanism also includes:Refusal unit, for when the checking information is mismatched with default checking sample, refusal to ring Answer the access request.
10. a kind of terminal, it is characterised in that including:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs such as claim 1 to right It is required that the method described in 5 any one.
CN201611084999.8A 2016-11-30 2016-11-30 Access method, device and terminal for access object Active CN106778296B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611084999.8A CN106778296B (en) 2016-11-30 2016-11-30 Access method, device and terminal for access object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611084999.8A CN106778296B (en) 2016-11-30 2016-11-30 Access method, device and terminal for access object

Publications (2)

Publication Number Publication Date
CN106778296A true CN106778296A (en) 2017-05-31
CN106778296B CN106778296B (en) 2020-05-12

Family

ID=58914762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611084999.8A Active CN106778296B (en) 2016-11-30 2016-11-30 Access method, device and terminal for access object

Country Status (1)

Country Link
CN (1) CN106778296B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815729A (en) * 2018-12-28 2019-05-28 北京奇安信科技有限公司 A kind of storage processing method and device of source file of auditing
CN111290746A (en) * 2020-02-13 2020-06-16 腾讯科技(深圳)有限公司 Object access method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184900A (en) * 2014-08-28 2014-12-03 深圳市中兴移动通信有限公司 Data processing method, system and mobile terminal
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof
CN105095790A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Hidden object view method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof
CN104184900A (en) * 2014-08-28 2014-12-03 深圳市中兴移动通信有限公司 Data processing method, system and mobile terminal
CN105095790A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Hidden object view method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815729A (en) * 2018-12-28 2019-05-28 北京奇安信科技有限公司 A kind of storage processing method and device of source file of auditing
CN111290746A (en) * 2020-02-13 2020-06-16 腾讯科技(深圳)有限公司 Object access method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN106778296B (en) 2020-05-12

Similar Documents

Publication Publication Date Title
CN104036177B (en) Intelligent terminal unlocked by fingerprint device and method
CN104335561B (en) The communication that bio-identification is initiated
US20100009658A1 (en) Method for identity authentication by mobile terminal
CN104335216B (en) Expedited biometric validation
CN109815671A (en) It is authorized using biological characteristic validation to by the access right of content of edit
CN107017996A (en) Auth method, device, equipment and storage medium
MXPA05011799A (en) User authentication by combining speaker verification and reverse turing test.
US20150169858A1 (en) Pluggable authentication mechanism for mobile device applications
DE112014004134T5 (en) Apparatus, method and graphical user interface for operating user interfaces based on inputs from fingerprint sensors
CN103699825A (en) Display apparatus and method for operating the same
CN108171037A (en) Using startup method, terminal and computer storage media
CN102752113A (en) Authentication device and authentication method for portable information terminal
CN106228054A (en) Auth method and device
CN107223254A (en) The biological characteristic run in the background is set
CN107506634A (en) Display methods, device, storage medium and the terminal of data
CN106682561B (en) Scanning function using method and device
WO2018107727A1 (en) Method and device for information processing, and terminal
CN107491677A (en) Fingerprint recognition processing method, device, equipment and storage medium
CN106650490B (en) The login method and device of cloud account
CN105426717A (en) Interface display method and apparatus
KR102655231B1 (en) Register and use mobile keys
CN109117619A (en) Unlocked by fingerprint method and Related product
EP2499807A1 (en) An apparatus, method, computer program and user interface
CN105117101A (en) Application display method and apparatus
CN107734178A (en) Presentation of information processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

GR01 Patent grant
GR01 Patent grant