CN106778296A - A kind of access method for accessing object, device and terminal - Google Patents
A kind of access method for accessing object, device and terminal Download PDFInfo
- Publication number
- CN106778296A CN106778296A CN201611084999.8A CN201611084999A CN106778296A CN 106778296 A CN106778296 A CN 106778296A CN 201611084999 A CN201611084999 A CN 201611084999A CN 106778296 A CN106778296 A CN 106778296A
- Authority
- CN
- China
- Prior art keywords
- access
- default
- object set
- checking
- access object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Automation & Control Theory (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of access method for accessing object, device and terminal.The access method of the wherein access object includes:Access request is received, the access request carries checking information;The checking information is matched with default checking sample, wherein, the default checking sample is corresponded with hiding default access object set;When the checking information is with default checking sample matches, the default access object set corresponding with the checking information is obtained;To this, corresponding default access object set is shown and accesses.The embodiment of the present invention pre-sets access object set and merges hiding first, the hiding default access object set of each of which is corresponded with default checking sample, when it is determined that the checking information of input is with default checking sample matches, to can accordingly access object set and release and hide and show, thereby may be ensured that the privacy information in terminal is not easy leakage, improve the security of user privacy information.
Description
Technical field
The invention belongs to communication technical field, more particularly to a kind of access method for accessing object, device and terminal.
Background technology
As the development and popularization of mobile terminal, the function of mobile terminal are also stronger and stronger, such as, mobile phone has become
Indispensable means of communication in people's daily life.
At present, a large amount of privacy informations of user, such as short message, picture, address list information are generally saved in mobile phone.Such as
Fruit user forgotten screen locking and is used by others after using mobile phone, or in the hand-set from stolen used time, is easily caused hidden in mobile phone
Private information leakage, so as to influence the security of user privacy information.
The content of the invention
The embodiment of the present invention provides a kind of access method for accessing object, device and terminal, can lift privacy of user letter
The security of breath.
In a first aspect, the present invention provides a kind of access method for accessing object, including:
Access request is received, the access request carries checking information;
The checking information is matched with default checking sample, wherein, the default checking sample is pre- with hiding
If accessing object set to correspond;
When the checking information is with the default checking sample matches, corresponding with the checking information presetting is obtained
Access object set;
The corresponding default access object set is shown and accessed.
Second aspect, the present invention provides a kind of access mechanism for accessing object, including:
Receiving unit, for receiving access request, the access request carries checking information;
Matching unit, for the checking information to be matched with default checking sample, wherein, the default checking sample
This is corresponded with hiding default access object set;
Acquiring unit, for when the checking information is with the default checking sample matches, obtaining and the checking letter
The corresponding default access object set of manner of breathing;
Display unit, for the corresponding default access object set to be shown and accessed.
The third aspect, the present invention provides a kind of terminal, including:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs first aspect such as and provides
Access object access method.
The embodiment of the present invention, when the access request for carrying checking information is received, by the checking information and default checking
Sample is matched, and wherein the default checking sample is corresponded with hiding default access object set;Then, when checking is believed
When breath is with default checking sample matches, the default access object set corresponding with checking information is obtained, corresponding is preset
Object set is accessed to be shown and access.I.e. in the present embodiment, access object set is pre-set first and merges hiding, wherein often
One hiding default access object set is corresponded with default checking sample, when it is determined that checking information and the default checking of input
During sample matches, will can accordingly access object set and release and hide and show, thereby may be ensured that the privacy information in terminal
It is not easy leakage, improves the security of user privacy information.
Brief description of the drawings
Below in conjunction with the accompanying drawings, described in detail by specific embodiment of the invention, technical scheme will be made
And other beneficial effects are apparent.
Fig. 1 is the schematic flow sheet of the access method of access object provided in an embodiment of the present invention.
Fig. 2 is another schematic flow sheet of the access method of access object provided in an embodiment of the present invention.
Fig. 3 is the terminal interface schematic diagram of the access method of access object provided in an embodiment of the present invention.
Fig. 4 is the structural representation of the access mechanism of access object provided in an embodiment of the present invention.
Fig. 5 is another structural representation of the access mechanism of access object provided in an embodiment of the present invention.
Fig. 6 is the structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
Schema is refer to, wherein identical element numbers represent identical component, and principle of the invention is to implement one
Illustrated in appropriate computing environment.The following description is that, based on the illustrated specific embodiment of the invention, it should not be by
It is considered as the limitation present invention other specific embodiments not detailed herein.
In the following description, specific embodiment of the invention is by with reference to the step as performed by or multi-section computer
And symbol is illustrated, unless otherwise stating clearly.Therefore, these steps and operation will have to mention for several times and be performed by computer, this paper institutes
The computer of finger is performed and included by representing with the computer processing unit of the electronic signal of the data in a structuring pattern
Operation.At this operation conversion data or the position being maintained in the memory system of the computer, its is reconfigurable
Or change the running of the computer in the way of known to the tester of this area in addition.The data structure that the data are maintained
It is the provider location of the internal memory, it has as particular characteristics defined in the data form.But, the principle of the invention is with above-mentioned text
Word illustrates that it is not represented as a kind of limitation, this area tester will appreciate that plurality of step and behaviour as described below
Also may be implemented in the middle of hardware.
Principle of the invention is grasped using many other wide usages or specific purpose computing, communication environment or configuration
Make.The known example for being suitable for arithmetic system of the invention, environment and configuration may include the hand-held phone of (but not limited to),
System, body frame configuration computer and distributed arithmetic ring based on personal computer, server, multicomputer system, micro computer
Border, which includes any said system or device.
To be described in detail respectively below.
In the present embodiment, will be described from the angle of the access mechanism (can abbreviation access mechanism) for accessing object, should
Access mechanism can specifically be integrated in terminal, such as mobile phone, panel computer, palm PC (PDA, Personal Digital
Assistant), desktop computer etc..
Fig. 1 is referred to, Fig. 1 is the schematic flow sheet of the access method of access object provided in an embodiment of the present invention.It is described
Method includes:
In step S101, access request is received, the access request carries checking information.
In step s 102, by the checking information with it is default checking sample matched, wherein, this it is default checking sample with
Hiding default access object set is corresponded.
It is understood that in the present embodiment, can also include before " reception access request " (i.e. step S101)
Following steps:
(1) create at least one and access object set.
(2) attribute information for accessing object set is set as be hidden for access object set by instruction.
(3) by attribute information be indicate to access the access object set that is hidden of object set be defined as it is hiding pre-
If accessing object set.
Such as, terminal receives the establishment instruction of user, and multiple access object sets can be created in terminal interface, such as multiple
Accessing object set can be shown in the form of file.
Further, after multiple access object sets are created, the attribute information to accessing object set sets, such as
Access object set is hidden setting, i.e. user after unblock enters terminal interface, multiple access object sets are can not
See.
Finally, terminal by this multiple be set to it is hiding, it is invisible access object set be defined as hiding default visit
Ask object set.
In embodiments of the present invention, in order to improve security and be easy to multi-user to use, each hiding default access
Object set can be correspondingly arranged a checking sample, obtain default checking sample, wherein, preset checking sample and hiding default visit
Ask that object set is corresponded, each default checking sample accessed corresponding to object set may be configured as identical, may be alternatively provided as
Differ, be not especially limited herein.
It is understood that during checking information may particularly include fingerprint, voice and password etc. in the embodiment of the present invention
One or more combinations, are not especially limited herein.
Such as, when user wants to access any access object set, it is required for validation information, terminal to believe the checking
Breath is matched with default checking sample, when the checking information is with default checking sample matches, just allows user to access corresponding
Default access object set.
In some embodiments, " creating at least one and access object set " (step (1)) can include:
(11) multiple access objects are obtained.
(12) selection instruction of user input is received.
(13) according to the selection instruction, the corresponding object that accesses is polymerized, generation at least one accesses object set.
Such as, for creating one and accessing object set, terminal is obtained the need for user determines and is hidden first
It is multiple access objects, then, receive the selection instruction of user input, the selection instruction indicates to be hidden the need for determination
It is multiple access objects, the corresponding object that accesses of selection is polymerized, so as to complete an establishment for access object set.
In some embodiments, it can be file that object set is accessed in the present embodiment, access bag in object set
Object is accessed containing at least one, wherein accessing object can be specially photo, video, information, file and terminal applies etc.
Deng being not especially limited herein.
In step s 103, when the checking information is with default checking sample matches, obtain corresponding with the checking information
Default access object set.
In step S104, corresponding default access object set is shown and accessed.
In some embodiments, hiding default access object set can be hiding default file folder, based on this,
" obtaining the default access object set corresponding with the checking information " (i.e. step S103) can include:Obtain and believe with checking
The corresponding default file folder of manner of breathing.
" corresponding default access object set is shown and is accessed " (i.e. step S104) includes:To corresponding
Default file folder is opened up and accessed to be shown.
In some embodiments, " checking information is matched with default checking sample " after (i.e. step S102),
Can also include:When checking information is mismatched with default checking sample, the refusal respond access request.
It is understood that the checking information carried in access request in the embodiment of the present invention is different from terminal unlocking letter
Breath, terminal unlocking information is used for unlock terminal, and the checking information carried in access request is used to access object set into default
Displaying interface, to conduct interviews.
When the checking information of input is mismatched with default checking sample, it is believed that current authentication information accesses right with default
As set is mismatched, without the authority for entering the default displaying interface for accessing object set, therefore the terminal refusal respond access
Request, such as prompting input error, or do not enter this it is default access object set displaying interface do not make any prompting, etc.
Deng.
From the foregoing, the access method of the access object that the present embodiment is provided, is receiving the visit of carrying checking information
When asking request, the checking information is matched with default checking sample, wherein default checking sample and the hiding default visit
Ask that object set is corresponded;Then, when checking information is with default checking sample matches, obtain corresponding with checking information
It is default to access object set, corresponding default access object set is shown and accessed.I.e. in the present embodiment, first in advance
First setting accesses object set and merges hiding, and the hiding default access object set of each of which verifies sample 1 a pair with default
Should, when it is determined that the checking information of input is with default checking sample matches, will can accordingly access object set and release and hide simultaneously
Displaying, thereby may be ensured that the privacy information in terminal is not easy leakage, improve the security of user privacy information.
, be described in further detail for citing below by the method according to described by above-described embodiment.
In the embodiment, it is introduced by taking most commonly used mobile terminal as an example, due to mobile terminal (such as mobile phone)
In generally save a large amount of privacy informations of user, such as short message, picture, address list information.If user is using movement
Screen locking is forgotten after terminal and is used by others, or when mobile terminal is stolen, easily cause the privacy letter in mobile terminal
Breath leakage.
Based on this, the present invention provides the scheme that a kind of file classification of mobile terminal is hidden.Fig. 2 is referred to, Fig. 2 is this hair
Another schematic flow sheet of the access method of the access object that bright embodiment is provided.
It is understood that in the present embodiment, accessing the file that object refers to mobile terminal, photo can be included, regarded
Frequently, information, document and terminal applies etc., these access objects can be deposited in desktop folder respectively, also referred to as privacy
File, forms and accesses object set.
Wherein, the method includes:
In step s 201, at least one private file of mobile terminal establishment folder, and setting carries out private file folder hidden
Hide.
Such as, multiple is created first is set as hiding private file folder, the privacy information for depositing user.Then it is right
In each private file folder, corresponding checking sample is set.
In the present embodiment, for creating a private file folder, the need for acquisition for mobile terminal user determines first
The multiple files being hidden, then, receive the selection instruction of user input, and the selection instruction indicates to be carried out the need for determination
In hiding multiple files, corresponding file is selected to be polymerized, so as to complete an establishment for private file folder.
Such as, mobile terminal receives the establishment instruction of user, and multiple is created in terminal interface according to above-mentioned establishment mode
Private file is pressed from both sides.
Further, after multiple private file folders are created, the attribute information to " the hiding/display " of private file folder enters
Row setting, in the embodiment, is hidden setting, i.e. user in unblock into after terminal interface, Duo Geyin by private file folder
Private file is invisible.
In step S202, mobile terminal is correspondingly arranged a checking sample for each hiding private file folder.
In embodiments of the present invention, in order to improve security and be easy to multi-user to use, each hiding private file
Folder can be correspondingly arranged a checking sample, and the corresponding checking sample of each hiding private file folder may be configured as identical, can also set
It is set to and differs, is not especially limited herein.
It is understood that in verifying that sample may particularly include fingerprint, voice and password etc. in the embodiment of the present invention
One or more combinations, are not especially limited herein.
In step S203, mobile terminal receives the access request of hiding private file folder, and the access request is carried and tested
Card information.
In step S204, mobile terminal is matched the checking information with checking sample.
Such as, when user wants that accessing any hiding private file presss from both sides, it is required for validation information, terminal to test this
The checking sample that card information is set with step S202 is matched one by one, when the checking information is with checking sample matches, is just permitted
Family allowable accesses hiding private file folder corresponding with the checking sample.
In step S205, when the checking information is with checking sample matches, acquisition for mobile terminal and the checking information phase
Corresponding hiding private file folder.
In step S206, the mobile terminal hiding private file folder corresponding to this is shown, with to the displaying
Private file folder conduct interviews.
Such as, when the checking information of input is with checking sample matches, it is believed that get the exhibition into private file folder
Show the authority at interface, so as to checking sample or checking information according to matching, obtain corresponding hiding private file folder,
And be shown private file folder, press from both sides and conduct interviews into the private file in order to user.
Such as, below by taking mobile phone as an example, mobile phone private file is pressed from both sides by a concrete scene be classified to hide and access is carried out
Introduce:
First, mobile phone desktop sets private file folder, can set up multiple, is temporarily set to here " A1, A2, B, C " four
Private file is pressed from both sides, and this four private file underedges can deposit different types of content, it is also possible to be carried out according to the need for user
Selection storage.
Then, this four access considerations of private file folder are respectively provided with, that is, are set and is accessed checking sample, such as can set
Put the assigned operations such as password, fingerprint, gesture.In this scene, mobile terminal sets this four access considerations pair of private file folder
Should be related to as follows:
“A1→P1、A2→P1、B→P2、C→P3”。
Wherein, the former is private file folder title, and correspondence the latter is access consideration, such as checking password.
It is understood that each private file folder correspondence one verifies sample, corresponding checking sample could be arranged to
It is different, it is also possible to be set to identical, illustrate herein and do not constitute limitation of the invention.
Then, user is to mobile phone validation information, can by the password authentication module of mobile phone, fingerprint identification module or
Person's gesture recognition module etc., verifies whether the checking information of user input meets access consideration as above.
Finally, if the checking information of user input meets the access consideration for setting, mobile phone is except showing general hand
Outside machine desktop, corresponding private file folder can also be shown.
For example, as shown in figure 3, four private files folders of mobile phone desktop setting " A1, A2, B, C ", use dotted line frame table herein
Show, user is by being input into P1, then the content that mobile phone desktop shows includes two private files of non-privacy content and A1, A2
Folder, wherein, mobile phone application or document with privacy information etc. can be included in private file folder.That is, user
Mobile phone can be entered by different verification conditions, reach the different purpose of display content, protect the privacy information of user.
That is, this programme is directed to the private file folder for setting in advance, different checking samples are set, with basis with test
The checking information of sample matches is demonstrate,proved, is pressed from both sides into different private files, show and access different content.
In some embodiments, it is also possible in the case where user's use is not influenceed, it is hidden for different user identity
Hide different private files folders and private files, the privacy of the user for not only ensureing, it is ensured that mobile terminal desktop
Succinctly.Further, by different verification modes, different private file folder protection contents are shown, many people can be facilitated to make
Show that the mobile phone private content of oneself is different under different occasions with a mobile terminal or same person, usage scenario is more
Extensively.
In addition, by hidden folders different to desktop settings in advance, each (or per class) hiding private file
The different identification access consideration of folder correspondence, can be different fingerprints, voice or password, and the access consideration is to be applied to
Whole mobile terminal.Mobile terminal can be unlocked by different access considerations, and show different hidden folders simultaneously.
From the foregoing, the access method of the access object that the present embodiment is provided, is receiving the visit of carrying checking information
When asking request, the checking information is matched with checking sample, wherein the checking sample presss from both sides set with hiding private file
Correspond;Then, when checking information is with checking sample matches, the private file folder corresponding with checking information is obtained, it is right
Corresponding private file folder is shown and accesses.I.e. in the present embodiment, private file is pre-set first and is pressed from both sides and is hidden, its
In each hiding private file folder corresponded with checking sample, when it is determined that the checking information and checking sample matches of input
When, corresponding private file folder can be released and hide and show, thereby may be ensured that the privacy information in terminal is not easy leakage,
Improve the security of user privacy information;Meanwhile, the clean and tidy of terminal desktop had both been ensure that, also protect the individual privacy of user.
For ease of preferably implementing the access method of access object provided in an embodiment of the present invention, the embodiment of the present invention is also carried
For a kind of device and mobile terminal of the access method based on above-mentioned access object.The wherein implication of noun is right with above-mentioned access
It is identical in the method for the access of elephant, implement the explanation during details may be referred to embodiment of the method.
Fig. 4 is referred to, Fig. 4 is the structural representation of the access mechanism of access object provided in an embodiment of the present invention, wherein
The access mechanism 300 of the access object can include:Receiving unit 301, matching unit 302, acquiring unit 303 and displaying are single
Unit 304.
Wherein receiving unit 301, for receiving access request, the access request carries checking information.
Matching unit 302, English is matched the checking information with default checking sample, wherein, described presetting is tested
Card sample is corresponded with hiding default access object set.
Acquiring unit 303, for when the checking information is with default checking sample matches, obtaining and the checking information
Corresponding default access object set.
Display unit 304, for the corresponding default access object set to be shown and accessed.
Also referring to Fig. 5, Fig. 5 is the structural representation of the access mechanism of access object provided in an embodiment of the present invention,
The access mechanism 400 can also include:
Unit 305 is set up, object set is accessed for creating at least one.
Setup unit 306, for set access object set attribute information for indicate will access object set carry out it is hidden
Hide.
Determining unit 307, for being to indicate that the access object set that object set is hidden will be accessed by attribute information
It is defined as hiding default access object set.
Such as, terminal receives the establishment instruction of user, and multiple access object sets can be created in terminal interface, such as multiple
Accessing object set can be shown in the form of file.
Further, after multiple access object sets are created, the attribute information to accessing object set sets, such as
Access object set is hidden setting, i.e. user after unblock enters terminal interface, multiple access object sets are can not
See.
Finally, terminal by this multiple be set to it is hiding, it is invisible access object set be defined as hiding default visit
Ask object set.
In embodiments of the present invention, in order to improve security and be easy to multi-user to use, each hiding default access
Object set can be correspondingly arranged a checking sample, obtain default checking sample, wherein, preset checking sample and hiding default visit
Ask that object set is corresponded, each default checking sample accessed corresponding to object set may be configured as identical, may be alternatively provided as
Differ, be not especially limited herein.
It is understood that during checking information may particularly include fingerprint, voice and password etc. in the embodiment of the present invention
One or more combinations, are not especially limited herein.
Such as, when user wants to access any access object set, it is required for validation information, terminal to believe the checking
Breath is matched with default checking sample, when the checking information is with default checking sample matches, just allows user to access corresponding
Default access object set.
In some embodiments, this is set up unit 305 and can include:
Subelement 3051 is obtained, for obtaining multiple access objects.
Receiving subelement 3052, the selection instruction for receiving user input.
Polymerization subelement 3053, for according to the selection instruction, the corresponding object that accesses being polymerized, generation is at least
One access object set.
Such as, for creating one and accessing object set, terminal is obtained the need for user determines and is hidden first
It is multiple access objects, then, receive the selection instruction of user input, the selection instruction indicates to be hidden the need for determination
It is multiple access objects, the corresponding object that accesses of selection is polymerized, so as to complete an establishment for access object set.
In some embodiments, it can be file that object set is accessed in the present embodiment, access bag in object set
Object is accessed containing at least one, wherein accessing object can be specially photo, video, information, file and terminal applies etc.
Deng being not especially limited herein.
In some embodiments, hiding default access object set can be hiding default file folder, based on this,
Acquiring unit 303, for when the checking information is with default checking sample matches, obtaining corresponding with the checking information
Default file is pressed from both sides.Display unit 304, for the corresponding default file folder to be shown and accessed.
In some embodiments, the access mechanism 400 can also include:Refusal unit 308, for working as checking information
When being mismatched with default checking sample, access request described in refusal respond.
It is understood that the checking information carried in access request in the embodiment of the present invention is different from terminal unlocking letter
Breath, terminal unlocking information is used for unlock terminal, and the checking information carried in access request is used to access object set into default
Displaying interface, to conduct interviews.
When the checking information of input is mismatched with default checking sample, it is believed that current authentication information accesses right with default
As set is mismatched, without the authority for entering the default displaying interface for accessing object set, therefore the terminal refusal respond access
Request, such as prompting input error, or do not enter this it is default access object set displaying interface do not make any prompting, etc.
Deng.
During specific implementation, above unit can be realized as independent entity, it is also possible to be combined, and be made
Realized for same or several entities, the specific implementation of above unit can be found in embodiment of the method above, herein not
Repeat again.
The access mechanism can specifically be integrated in terminal, such as mobile phone, panel computer, palm PC PDA, desktop computer
Deng.
From the foregoing, the access mechanism of the access object that the present embodiment is provided, is receiving the visit of carrying checking information
When asking request, the checking information is matched with default checking sample, wherein default checking sample and the hiding default visit
Ask that object set is corresponded;Then, when checking information is with default checking sample matches, obtain corresponding with checking information
It is default to access object set, corresponding default access object set is shown and accessed.I.e. in the present embodiment, first in advance
First setting accesses object set and merges hiding, and the hiding default access object set of each of which verifies sample 1 a pair with default
Should, when it is determined that the checking information of input is with default checking sample matches, will can accordingly access object set and release and hide simultaneously
Displaying, thereby may be ensured that the privacy information in terminal is not easy leakage, improve the security of user privacy information.
The present invention also provides a kind of terminal, such as panel computer, mobile phone mobile terminal, refers to Fig. 6, and Fig. 6 is the present invention
The mobile terminal structure schematic diagram that embodiment is provided.The mobile terminal 500 can include:Input block 501, include one or
The memory 502 of more than one computer-readable recording medium, display unit 503, fingerprint sensor 504, voicefrequency circuit 505,
Include one or the grade part of processor 506 of more than one processing core.It will be understood by those skilled in the art that in Fig. 6
The mobile terminal structure for showing does not constitute the restriction to mobile terminal, can include part more more or less than diagram, or
Person combines some parts, or different part arrangements.
Input block 501 can be used to receive numeral, character information or the user's characteristic information (such as fingerprint) of input, and
Produce the keyboard relevant with user's setting and function control, mouse, action bars, optics or trace ball signal input.Specifically
Ground, in a specific embodiment, input block 501 may include Touch sensitive surface and other input equipments.Touch sensitive surface,
Referred to as touch display screen or Trackpad, user can be collected thereon or neighbouring touch operation (such as user uses finger, touches
The operations of any suitable object or annex on Touch sensitive surface or near Touch sensitive surface such as pen), and according to set in advance
Formula drives corresponding attachment means.Optionally, Touch sensitive surface may include two parts of touch detecting apparatus and touch controller.
Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, and transmit a signal to touch
Controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives treatment
Device 506, and the order sent of receiving processor 506 and can be performed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray
And the polytype such as surface acoustic wave realizes Touch sensitive surface.Except Touch sensitive surface, input block 501 can also be including other inputs
Equipment.Specifically, other input equipments can include but is not limited to physical keyboard, function key (such as volume control button, switch
Button etc.), fingerprint recognition module, trace ball, mouse, one or more in action bars etc..
Memory 502 can be used to store application program and data.Include and can hold in the application program of the storage of memory 502
Line code.Application program can constitute various functions module.Processor 506 is by running application journey of the storage in memory 502
Sequence, so as to perform various function application and data processing.Memory 502 can mainly include storing program area and data storage
Area, wherein, application program that storing program area can be needed for storage program area, at least one function (such as sound-playing function,
Image player function etc.) etc.;Storage data field can be stored and use created data (such as audio number according to mobile terminal
According to, phone directory etc.) etc..Additionally, memory 502 can include high-speed random access memory, non-volatile depositing can also be included
Reservoir, for example, at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory
502 can also include Memory Controller, to provide the access of processor 506 and input block 501 to memory 502.
Display unit 503 can be used to showing by user input information or be supplied to the information and mobile terminal of user
Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Display unit 503 may include display panel.Optionally, liquid crystal display (LCD, Liquid Crystal can be used
Display), the form such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configures display surface
Plate.Further, Touch sensitive surface can cover display panel, when Touch sensitive surface is detected thereon or after neighbouring touch operation,
Processor 506 is sent to determine the type of touch event, with preprocessor 506 according to the type of touch event in display panel
It is upper that corresponding visual output is provided.Although in figure 6, Touch sensitive surface with display panel is realized as two independent parts
Input and input function, but in some embodiments it is possible to by Touch sensitive surface and display panel it is integrated and realize be input into and it is defeated
Go out function.
Fingerprint sensor 504 is the device for realizing user fingerprints automatic data collection.Fingerprint sensor 504 can be arranged in movement
The positive screen lower section of terminal, it is also possible to be arranged in back side of mobile terminal etc..Fingerprint sensor 504 will can be collected
User fingerprints information be sent to processor 506 in be analyzed comparison, it is also possible to be sent in memory 502 and store.For example,
After the finger print information for collecting mobile terminal owner, the finger print information can be sent to memory by fingerprint sensor 504
Stored in 502.
Voicefrequency circuit 505 can provide the COBBAIF between user and mobile terminal by loudspeaker, microphone.Audio-frequency electric
The voice data that road 506 will can receive is converted into electric signal, is transferred to loudspeaker, and it is defeated to be converted to voice signal by loudspeaker
Go out;On the other hand, the voice signal of collection is converted to electric signal by microphone, and audio is converted to after being received by voicefrequency circuit 506
Data, then after voice data output processor 508 is processed, voice data is exported to memory 502 so as to further treatment.
Voicefrequency circuit 506 is also possible that earphone jack, to provide the communication of peripheral hardware earphone and mobile terminal.
Processor 506 is the control centre of mobile terminal, using each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing application program of the storage in memory 502, and calls storage in memory 502
Data, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Optionally, process
Device 506 may include one or more processing cores;Preferably, processor 506 can integrated application processor and modulation /demodulation treatment
Device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is mainly located
Reason radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 506.
Although not shown in Fig. 6, mobile terminal can also will not be repeated here including camera, bluetooth module etc..
It is specific in the present embodiment, processor 506 in mobile terminal can according to following instruction, by one or one with
On the corresponding executable code of process of application program be loaded into memory 502, and storage run by processor 506 exist
Application program in memory 502, so as to realize various functions:
Access request is received, the access request carries checking information;The checking information and default checking sample are carried out
Match somebody with somebody, wherein, preset checking sample and corresponded with hiding default access object set;When checking information and default checking sample
During matching, the default access object set corresponding with checking information is obtained;Corresponding default access object set is carried out
Show and access.
In some embodiments, processor 506 can also run application program of the storage in memory 502, such as receive
Before access request, create at least one and access object set;The attribute information for accessing object set is set to indicate access
Object set is hidden;By attribute information be indicate to access the access object set that is hidden of object set be defined as it is hidden
The default access object set hidden.
Further, processor 506 creates at least one and accesses object set, may particularly include:Obtain multiple access right
As;Receive the selection instruction of user input;According to selection instruction, the corresponding object that accesses is polymerized, generation at least one
Access object set.
In some embodiments, hiding default access object set is hiding default file folder.
Based on this, processor 506 can also run application program of the storage in memory 502, such as obtain and checking information
Corresponding default file folder, is shown and accesses to corresponding default file folder.
In some embodiments, after processor 506 is matched checking information with default checking sample, can be with
Including:When checking information is mismatched with default checking sample, refusal respond access request.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment
Point, the detailed description above with respect to the access method for accessing object is may refer to, here is omitted.
It is provided in an embodiment of the present invention it is described access object access mechanism, be for example computer, panel computer, with touch
Touch mobile phone of function etc., the access method of the access object in the access mechanism for accessing object and foregoing embodiments belongs to
Same design, provides in the access method embodiment that the access object can be run in the access mechanism of the access object
Either method, its implement process refer to it is described access object access method embodiment, here is omitted.
It should be noted that for the access method of access object of the present invention, this area common test personnel can
To understand all or part of flow of the access method for realizing that object is accessed described in the embodiment of the present invention, computer is can be by
Program is completed to control the hardware of correlation, and the computer program can be stored in a computer read/write memory medium, such as
Storage in a memory in the mobile terminal, and by least one computing device in the mobile terminal, in the process of implementation may be used
Flow including accessing the embodiment of the access method of object as described.Wherein, described storage medium can for magnetic disc, CD,
Read-only storage (ROM, Read Only Memory), random access memory (RAM, Random Access Memory) etc..
For the access mechanism of the access object of the embodiment of the present invention, its each functional module can be integrated in one
In process chip, or modules are individually physically present, it is also possible to which two or more modules are integrated in a mould
In block.Above-mentioned integrated module can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.
If the integrated module is to realize in the form of software function module and as independent production marketing or when using, it is also possible to
In a computer read/write memory medium, the storage medium is for example read-only storage, disk or CD etc. for storage.
A kind of access method of the access object for being provided the embodiment of the present invention above, device and terminal have been carried out in detail
Introduce, specific case used herein is set forth to principle of the invention and implementation method, the explanation of above example
It is only intended to help and understands the method for the present invention and its core concept;Simultaneously for those skilled in the art, according to the present invention
Thought, will change in specific embodiments and applications, in sum, this specification content should not be understood
It is limitation of the present invention.
Claims (10)
1. it is a kind of access object access method, it is characterised in that including:
Access request is received, the access request carries checking information;
The checking information is matched with default checking sample, wherein, default checking sample and the hiding default visit
Ask that object set is corresponded;
When the checking information is with the default checking sample matches, the default access corresponding with the checking information is obtained
Object set;
The corresponding default access object set is shown and accessed.
2. it is according to claim 1 access object access method, it is characterised in that before the reception access request,
Also include:
Create at least one and access object set;
Be hidden for the access object set to indicate by the attribute information for setting the access object set;
It is to indicate for the access object set that the access object set is hidden to be defined as hiding presetting by attribute information
Access object set.
3. it is according to claim 2 access object access method, it is characterised in that the establishment at least one accesses right
As set, including:
Obtain multiple access objects;
Receive the selection instruction of user input;
According to the selection instruction, the corresponding object that accesses is polymerized, generation at least one accesses object set.
4. the access method of the access object according to any one of claims 1 to 3, it is characterised in that described hiding pre-
If it is hiding default file folder to access object set;
The acquisition default access object set corresponding with the checking information includes:Obtain relative with the checking information
The default file answered is pressed from both sides;
It is described the corresponding default access object set is shown and access including:To the corresponding default text
Part folder is shown and accesses.
5. according to any one of claims 1 to 3 access object access method, it is characterised in that it is described to be tested described
After card information is matched with the default checking sample, also include:
When the checking information is mismatched with the default checking sample, access request described in refusal respond.
6. it is a kind of access object access mechanism, it is characterised in that including:
Receiving unit, for receiving access request, the access request carries checking information;
Matching unit, for by the checking information with it is default checking sample matched, wherein, it is described it is default checking sample with
Hiding default access object set is corresponded;
Acquiring unit, for when the checking information is with the default checking sample matches, obtaining and the checking information phase
Corresponding default access object set;
Display unit, for the corresponding default access object set to be shown and accessed.
7. it is according to claim 6 access object access mechanism, it is characterised in that described device also includes:
Unit is set up, object set is accessed for creating at least one;
Setup unit, for set it is described access object set attribute information for indicate by it is described access object set carry out it is hidden
Hide;
Determining unit, for being to indicate to determine the access object set that the access object set is hidden by attribute information
It is the default access object set hidden.
8. it is according to claim 7 access object access mechanism, it is characterised in that the unit of setting up includes:
Subelement is obtained, for obtaining multiple access objects;
Receiving subelement, the selection instruction for receiving user input;
Polymerization subelement, for according to the selection instruction, the corresponding object that accesses being polymerized, generation at least one is accessed
Object set.
9. the access mechanism of the access object according to any one of claim 6 to 8, it is characterised in that described hiding pre-
If it is hiding default file folder to access object set;
The acquiring unit, for when the checking information is with the default checking sample matches, obtaining and the checking letter
The corresponding default file folder of manner of breathing;
The display unit, for the corresponding default file folder to be shown and accessed;
The access mechanism also includes:Refusal unit, for when the checking information is mismatched with default checking sample, refusal to ring
Answer the access request.
10. a kind of terminal, it is characterised in that including:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs such as claim 1 to right
It is required that the method described in 5 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611084999.8A CN106778296B (en) | 2016-11-30 | 2016-11-30 | Access method, device and terminal for access object |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611084999.8A CN106778296B (en) | 2016-11-30 | 2016-11-30 | Access method, device and terminal for access object |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106778296A true CN106778296A (en) | 2017-05-31 |
CN106778296B CN106778296B (en) | 2020-05-12 |
Family
ID=58914762
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611084999.8A Active CN106778296B (en) | 2016-11-30 | 2016-11-30 | Access method, device and terminal for access object |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778296B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815729A (en) * | 2018-12-28 | 2019-05-28 | 北京奇安信科技有限公司 | A kind of storage processing method and device of source file of auditing |
CN111290746A (en) * | 2020-02-13 | 2020-06-16 | 腾讯科技(深圳)有限公司 | Object access method, device, equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104184900A (en) * | 2014-08-28 | 2014-12-03 | 深圳市中兴移动通信有限公司 | Data processing method, system and mobile terminal |
CN104182675A (en) * | 2014-08-26 | 2014-12-03 | 上海斐讯数据通信技术有限公司 | Mobile equipment terminal and application hiding system and application hiding and starting method thereof |
CN105095790A (en) * | 2015-07-28 | 2015-11-25 | 努比亚技术有限公司 | Hidden object view method and device |
-
2016
- 2016-11-30 CN CN201611084999.8A patent/CN106778296B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182675A (en) * | 2014-08-26 | 2014-12-03 | 上海斐讯数据通信技术有限公司 | Mobile equipment terminal and application hiding system and application hiding and starting method thereof |
CN104184900A (en) * | 2014-08-28 | 2014-12-03 | 深圳市中兴移动通信有限公司 | Data processing method, system and mobile terminal |
CN105095790A (en) * | 2015-07-28 | 2015-11-25 | 努比亚技术有限公司 | Hidden object view method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815729A (en) * | 2018-12-28 | 2019-05-28 | 北京奇安信科技有限公司 | A kind of storage processing method and device of source file of auditing |
CN111290746A (en) * | 2020-02-13 | 2020-06-16 | 腾讯科技(深圳)有限公司 | Object access method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106778296B (en) | 2020-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104036177B (en) | Intelligent terminal unlocked by fingerprint device and method | |
CN104335561B (en) | The communication that bio-identification is initiated | |
US20100009658A1 (en) | Method for identity authentication by mobile terminal | |
CN104335216B (en) | Expedited biometric validation | |
CN109815671A (en) | It is authorized using biological characteristic validation to by the access right of content of edit | |
CN107017996A (en) | Auth method, device, equipment and storage medium | |
MXPA05011799A (en) | User authentication by combining speaker verification and reverse turing test. | |
US20150169858A1 (en) | Pluggable authentication mechanism for mobile device applications | |
DE112014004134T5 (en) | Apparatus, method and graphical user interface for operating user interfaces based on inputs from fingerprint sensors | |
CN103699825A (en) | Display apparatus and method for operating the same | |
CN108171037A (en) | Using startup method, terminal and computer storage media | |
CN102752113A (en) | Authentication device and authentication method for portable information terminal | |
CN106228054A (en) | Auth method and device | |
CN107223254A (en) | The biological characteristic run in the background is set | |
CN107506634A (en) | Display methods, device, storage medium and the terminal of data | |
CN106682561B (en) | Scanning function using method and device | |
WO2018107727A1 (en) | Method and device for information processing, and terminal | |
CN107491677A (en) | Fingerprint recognition processing method, device, equipment and storage medium | |
CN106650490B (en) | The login method and device of cloud account | |
CN105426717A (en) | Interface display method and apparatus | |
KR102655231B1 (en) | Register and use mobile keys | |
CN109117619A (en) | Unlocked by fingerprint method and Related product | |
EP2499807A1 (en) | An apparatus, method, computer program and user interface | |
CN105117101A (en) | Application display method and apparatus | |
CN107734178A (en) | Presentation of information processing method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |