CN107025389A - A kind of method and terminal of fingerprint typing - Google Patents

A kind of method and terminal of fingerprint typing Download PDF

Info

Publication number
CN107025389A
CN107025389A CN201710152520.8A CN201710152520A CN107025389A CN 107025389 A CN107025389 A CN 107025389A CN 201710152520 A CN201710152520 A CN 201710152520A CN 107025389 A CN107025389 A CN 107025389A
Authority
CN
China
Prior art keywords
user
safe class
typing
fingerprint
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710152520.8A
Other languages
Chinese (zh)
Other versions
CN107025389B (en
Inventor
郭子青
周海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710152520.8A priority Critical patent/CN107025389B/en
Publication of CN107025389A publication Critical patent/CN107025389A/en
Application granted granted Critical
Publication of CN107025389B publication Critical patent/CN107025389B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a kind of method and terminal of fingerprint typing.Methods described includes:When detecting user's progress fingerprint typing, the login banner of user is obtained;Safe class according to belonging to the login banner of the user of the acquisition judges the user;When the safe class belonging to the user is less than predetermined level, closes and repeat typing fingerprint detection function.So as to understand, by implementing the technical scheme that the present invention is provided, safe class control that can be according to belonging to user repeats the closing of typing fingerprint detection function, thus safe class according to belonging to user come the security and convenience of balanced termination to meet different user the need for.

Description

A kind of method and terminal of fingerprint typing
Technical field
The present invention relates to field of terminal, and in particular to a kind of method and terminal of fingerprint typing.
Background technology
In recent years, terminal has become an indispensable part in people's daily life.Due to being stored in terminal Substantial amounts of user data, in order to ensure the storage safety of information, in the market major part mobile phone is all equipped with fingerprint authentication function.
But the mobile phone majority meeting positive opening for being equipped with fingerprint authentication function at present repeats fingerprint typing detection function, and this is just So that the time of user's typing fingerprint is elongated, user more may be significantly influenceed on the cell phone platform of some poor-performings The experience of typing fingerprint.
The content of the invention
, can be based on the safe class belonging to user the embodiments of the invention provide a kind of method and terminal of fingerprint typing Control repeats being turned on and off for typing fingerprint detection function, so that the safe class according to belonging to user is come the peace of balanced termination The need for full property and convenience are to meet different user.
First aspect of the embodiment of the present invention discloses a kind of method of fingerprint typing, and methods described includes:
When detecting user's progress fingerprint typing, the login banner of user is obtained;
Safe class according to belonging to the login banner of the user of the acquisition judges the user;
When the safe class belonging to the user is less than predetermined level, closes and repeat typing fingerprint detection function.
With reference in a first aspect, in the first possible implementation of first aspect, described close repeats typing fingerprint Detect after function, methods described also includes:
Obtain the corresponding permissions list of safe class belonging to the user;
The access right for presetting application program is configured according to the permissions list.
Second aspect of the present invention discloses a kind of terminal, and the terminal includes:
Acquiring unit, for when detecting user's progress fingerprint typing, obtaining the login banner of user;
Judging unit, the login banner for the user according to the acquisition judges the safe class belonging to the user;
Closing unit, for when the safe class belonging to the user is less than predetermined level, closing and repeating typing fingerprint Detect function.
Third aspect present invention discloses a kind of terminal, including:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs such as first party of the present invention Face is to the method described in any one of the 6th kind of feasible embodiment of first aspect present invention.
As can be seen that in the scheme of the embodiment of the present invention, when detecting user's progress fingerprint typing, obtaining stepping on for user Record mark;Safe class according to belonging to the login banner of the user of the acquisition judges the user;When belonging to the user Safe class be less than predetermined level when, close repeat typing fingerprint detection function.It is hereby understood that being provided by implementing the present invention Technical scheme, can be according to belonging to user safe class control repeat typing fingerprint detection function closing so that according to The need for safe class belonging to user comes the security and convenience of balanced termination to meet different user.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below by using required in embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 a are a kind of schematic flow sheet of the method for fingerprint typing provided in an embodiment of the present invention;
A kind of interface schematic diagrams of fingerprint typing provided in an embodiment of the present invention of Fig. 1 b;
Fig. 2 is the schematic flow sheet of the method for another fingerprint typing provided in an embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the method for another fingerprint typing provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 5 is the structural representation of another terminal provided in an embodiment of the present invention;
Fig. 6 is the structural representation of another terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of entity apparatus structural representation of terminal provided in an embodiment of the present invention;
Fig. 8 is a kind of entity apparatus structural representation of mobile phone provided in an embodiment of the present invention.
Embodiment
The embodiments of the invention provide a kind of method and terminal of fingerprint typing, while Terminal security being lifted, Consumer's Experience can also be lifted.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is explicitly described, it is clear that described embodiment is the present invention one The embodiment divided, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under the premise of creative work, should all belong to the scope of protection of the invention.
Term " first ", " second " and " the 3rd " occurred in description of the invention, claims and accompanying drawing etc. is to use In the different objects of difference, and it is not intended to describe specific order.In addition, term " comprising " and " having " and they are any Deformation, it is intended that covering is non-exclusive to be included.For example contain the process of series of steps or unit, method, system, product Or equipment is the step of be not limited to list or unit, but the step of alternatively also include not listing or unit, or can Selection of land is also included for the intrinsic other steps of these processes, method, product or equipment or unit.
A kind of method of fingerprint typing is disclosed in one embodiment of the invention, and methods described includes:When detecting When user carries out fingerprint typing, the login banner of user is obtained;Described use is judged according to the login banner of the user of the acquisition Safe class belonging to family;When the safe class belonging to the user is less than predetermined level, closes and repeat typing fingerprint detection Function.It is hereby understood that by implementing the technical scheme that the present invention is provided, safe class control that can be according to belonging to user is repeated The closing of typing fingerprint detection function, thus safe class according to belonging to user come the security and convenience of balanced termination with The need for meeting different user.
Fig. 1 a are referred to, Fig. 1 a are a kind of flow signals of the method for fingerprint typing that one embodiment of the invention is provided Figure.Wherein, as shown in Figure 1a, a kind of method for fingerprint typing that one embodiment of the present of invention is provided includes herein below:
S101, when detect user carry out fingerprint typing when, obtain user login banner;
It is pointed out that the executive agent of this method is terminal, for example can be smart mobile phone, tablet personal computer, intelligence Wearable, computer etc. carry fingerprint recognition module or can be with the electronic equipments of extrapolation fingerprint recognition module.
Wherein, user can input fingerprinting-instruction on screen.
Optionally, user can also at the touch controlled key of terminal or behind terminal or terminal other carry fingerprint recognition The position input fingerprinting-instruction of module.
Optionally, user can also input fingerprinting-instruction on the extrapolation fingerprint recognition module of terminal device.
Wherein, the user carries out the minutia that fingerprint typing refers to typing fingerprint, for example, refer in the finger pulp of end Lines.Wherein, the details of the starting point of streakline, terminal, binding site and bifurcation, referred to as fingerprint.
, wherein it is desired to which, it is noted that the scene that user carries out fingerprint typing can be:Open default by fingerprint typing Application program, or paid the bill etc. by fingerprint typing.
S102, the safe class according to belonging to the login banner of the user of the acquisition judges the user.
Wherein, safe class can be divided into two grades, such as two grades are highest ranking, are host user.So one-level For domestic consumer or visitor.
Wherein, safe class can be divided into Three Estate, such as three-level is highest ranking, is host user.So two grades For domestic consumer, one-level is visitor.
, wherein it is desired to, it is noted that the mode of safety status classification has a lot, it is numerous to list herein.
Optionally, such as user logs in the terminal by fingerprint, then terminal can determine user according to the fingerprint of unblock Login banner.
Specifically, terminal is matched the unblock fingerprint that user inputs to obtain the login mark of user with pre-stored fingerprint Know.
Optionally, user can set user to identify (i.e. login ID) in advance;Specifically, terminal receives user's input Login banner;And set up the login banner of the user and the mapping relations of safe class.Wherein, the safe class can be with It is that acquiescence or user select.
Such as, user inputs ID in the first predeterminated position, then the ID is the ID of highest safe class.Such as User inputs ID in the second predeterminated position, then the ID is not the ID of highest safe class, may be guest levels ID。
, wherein it is desired to be pointed out that Android system is multi-user, for each user, login ID is all unique , meanwhile, using different User logs ins, the storing path of fingerprint template is also different, moreover, we can assign difference The different safe class of user, such as host user can be highest safe class (predetermined level), and Guest User is common Safe class.
S103, when the safe class belonging to the user be less than predetermined level when, close repeat typing fingerprint detection function.
Wherein, the predetermined level is highest ranking.
, wherein it is desired to refer to, it is noted that repeating typing fingerprint detection function:Fingerprint sensor is carrying out fingerprint typing Meanwhile, can with just typing fingerprint image with before the image of typing do a contrast, when matching degree is higher, can recognize Fingerprint is crossed in once typing before this root finger currently to record fingerprint, now provides corresponding prompting.For example, such as Fig. 1 b institutes Show, when user inputs fingerprint on screen, find the fingerprint and the fingerprint image of typing before of this root finger of current typing Picture information matches degree is higher, then in onscreen cue user, the fingerprint has been present, and other finger typings please be used, to forbid User continues typing fingerprint until user has changed a finger typing using current finger.
Wherein it is possible to understand, the prompting can be for example one in text prompt, vibration prompting, tone prompting The combination of kind or several prompting modes.
Optionally, described to close after repetition typing fingerprint detection function, methods described also includes:Obtain the user institute The corresponding permissions list of safe class of category;The access right for presetting application program is configured according to the permissions list.
It is pointed out that the use of several different safety class can be distinguished according to safe class when fingerprint typing Family, for example, predetermined level user representative's safe class highest " owner " user, less than user representative's safety of predetermined level etc. Relatively low " visitor " user of level, when user is logged in using host user, gives highest safe class, positive opening is repeated Fingerprint typing detects function, the preferential security needs for ensureing host user.When user is logged in using Guest User, shield fingerprints Payment function, while repetition fingerprint typing detection function can also be closed, ensures user's typing when safe class is relatively low Consumer's Experience during fingerprint.
Optionally, methods described also includes:When the safe class belonging to the user is more than or equal to predetermined level, obtain Take the safety value of the current affairs to be verified in family;When the safety value of the current affairs to be verified of the user of the acquisition is less than default threshold During value, close and repeat typing fingerprint detection function.
Optionally, methods described also includes:When the safe class belonging to the user is more than or equal to predetermined level, obtain Take the safety value of the current affairs to be verified in family;When the safety value of the current affairs to be verified of the user of the acquisition is more than or equal to During predetermined threshold value, then open repetition typing fingerprint detection function and verified with the fingerprint to user's typing.
For example, current affairs to be verified can refer to some application program.Such as pay the application security of class Higher ranked, the safe class for entertaining the application program of class is relatively low.
The setting of the safety value of current affairs to be verified can be system default, can also be what user was set.
Wherein, predetermined threshold value can also be system default, can also be what user was set.
Such as predetermined threshold value can be divided into 1-3.Wherein, 3 be highest, and 1 is minimum.Predetermined threshold value could be arranged to 2. That is, when the safety value of current affairs to be verified is less than 2, it is unessential things to be considered as the current affairs to be verified, this When can not consider security, directly close repeat typing fingerprint detection function.
As can be seen that disclosing a kind of method of fingerprint typing in the scheme of the embodiment of the present invention, enter when detecting user During row fingerprint typing, the login banner of user is obtained;According to belonging to the login banner of the user of the acquisition judges the user Safe class;When the safe class belonging to the user is less than predetermined level, closes and repeat typing fingerprint detection function.From And understand, by implementing the technical scheme that the present invention is provided, safe class control repetition typing that can be according to belonging to user refers to Line detects the closing of function, thus the safe class according to belonging to user come the security and convenience of balanced termination to meet not The need for user.
Referring to Fig. 2, the flow that Fig. 2 is the method for another fingerprint typing that an alternative embodiment of the invention is provided is shown It is intended to.Wherein, as shown in Fig. 2 an alternative embodiment of the invention provide another fingerprint typing method can include with Lower content:
S201, the login banner for receiving user's input;
It is pointed out that the executive agent of this method is terminal, for example can be smart mobile phone, tablet personal computer, intelligence Wearable, computer etc. carry fingerprint recognition module or can be with the electronic equipments of extrapolation fingerprint recognition module.
S202, the login banner for setting up the user and safe class mapping relations;
Wherein, the safe class of the user includes a underlying security grade and at least one is higher than the underlying security The safe class of grade.
S203, when detect user carry out fingerprint typing when, obtain user login banner;
Wherein, user can input fingerprinting-instruction on screen.
Optionally, user can also at the touch-control case of terminal or behind terminal or terminal other carry fingerprint recognition The position input fingerprinting-instruction of module.
Optionally, user can also input fingerprinting-instruction on the extrapolation fingerprint recognition module of terminal device.
Wherein, the user carries out the minutia that fingerprint typing refers to typing fingerprint, for example, refer in the finger pulp of end Lines.Wherein, the details of the starting point of streakline, terminal, binding site and bifurcation, referred to as fingerprint.
S204, the safe class according to belonging to the login banner of the user of the acquisition judges the user;
S205, when the safe class belonging to the user be less than predetermined level when, close repeat typing fingerprint detection function;
The corresponding permissions list of safe class belonging to S206, the acquisition user;
S207, according to the permissions list to preset application program access right be configured.
As can be seen that expanded in the scheme of the embodiment of the present invention after closing repetition typing fingerprint detection function, according to The step of safe class belonging to user is configured to the access right for presetting application program.It is hereby understood that by implementing this The technical scheme provided is provided, the access right of default application program can be set for the safe class of user.
Referring to Fig. 3, the flow that Fig. 3 is the method for another fingerprint typing that an alternative embodiment of the invention is provided is shown It is intended to.Wherein, as shown in figure 3, an alternative embodiment of the invention provide another fingerprint typing method can include with Lower content:
S301, the login banner for receiving user's input;
It is pointed out that the executive agent of this method is terminal, for example can be smart mobile phone, tablet personal computer, intelligence Wearable, computer etc. carry fingerprint recognition module or can be with the electronic equipments of extrapolation fingerprint recognition module.
S302, the login banner for setting up the user and safe class mapping relations;
Wherein, the safe class of the user includes a underlying security grade and at least one is higher than the underlying security The safe class of grade.
S303, when detect user carry out fingerprint typing when, obtain user login banner;
Wherein, user can input fingerprinting-instruction on screen.
Optionally, user can also at the touch-control case of terminal or behind terminal or terminal other carry fingerprint recognition The position input fingerprinting-instruction of module.
Optionally, user can also input fingerprinting-instruction on the extrapolation fingerprint recognition module of terminal device.
Wherein, the user carries out the minutia that fingerprint typing refers to typing fingerprint, for example, refer in the finger pulp of end Lines.Wherein, the details of the starting point of streakline, terminal, binding site and bifurcation, referred to as fingerprint.
S304, the safe class according to belonging to the login banner of the user of the acquisition judges the user;
S305, when the safe class belonging to the user be less than predetermined level when, close repeat typing fingerprint detection function;
, wherein it is desired to, it is noted that close after repetition typing fingerprint detection function, methods described also includes:Obtain institute The corresponding permissions list of safe class belonging to user is stated, the access right for presetting application program is entered according to the permissions list Row is set.
S306, when the safe class belonging to the user be more than or equal to predetermined level when, obtain user it is currently to be verified The safety value of affairs.
S307, when the safety value of the current affairs to be verified of the user of the acquisition is less than predetermined threshold value, close and repeat to record Enter fingerprint detection function.
S308, when the safety value of the current affairs to be verified of the user of the acquisition is more than or equal to predetermined threshold value, then open Repetition typing fingerprint detection function is opened to verify with the fingerprint to user's typing.
As can be seen that having expanded the safety value control according to the current affairs to be verified of user in the scheme of the embodiment of the present invention Repeat the step of being turned on and off of typing fingerprint detection function.It is hereby understood that by implementing the technical scheme that the present invention is provided, It can close when the safety value of current affairs to be verified is less than predetermined level and repeat typing fingerprint detection function;Conversely, then opening Repetition typing fingerprint detection function is opened to verify with the fingerprint to user's typing.
Referring to Fig. 4, Fig. 4 is a kind of structural representation for terminal that one embodiment of the present of invention is provided.Wherein, as schemed Shown in 4, one embodiment of the present of invention provide a kind of terminal 400, wherein, the terminal can be smart mobile phone, tablet personal computer, The equipment such as Intelligent worn device.The terminal 400 includes acquiring unit 401, judging unit 402 and closing unit 403;
Acquiring unit 401, for when detecting user's progress fingerprint typing, obtaining the login banner of user;
Judging unit 402, the login banner for the user according to the acquisition judges safety belonging to the user etc. Level;
Closing unit 403, for when the safe class belonging to the user is less than predetermined level, closing repetition typing and referring to Line detects function.
Wherein, acquiring unit 401, judging unit 402 and closing unit 403 can be used for performing step in embodiment 1 Method described in S101 to S103, specifically describes description of the detailed in Example 1 to methods described, will not be repeated here.
Referring to Fig. 5, Fig. 5 is a kind of structural representation for terminal that one embodiment of the present of invention is provided.Wherein, as schemed Shown in 5, a kind of terminal 500 that one embodiment of the present of invention is provided, wherein, the terminal 500 can be smart mobile phone, flat board electricity The equipment such as brain, Intelligent worn device.The terminal 500 includes acquiring unit 501, judging unit 502, closing unit 503, reception list Member 504, map unit 505 and setting unit 506.
Receiving unit 504, the login banner for receiving user's input;
Map unit 505, for setting up the login banner of the user and the mapping relations of safe class;
Wherein, the safe class of the user includes a underlying security grade and at least one is higher than the underlying security The safe class of grade.
Acquiring unit 501, for when detecting user's progress fingerprint typing, obtaining the login banner of user;
Judging unit 502, the login banner for the user according to the acquisition judges safety belonging to the user etc. Level;
Closing unit 503, for when the safe class belonging to the user is less than predetermined level, closing repetition typing and referring to Line detects function.
Acquiring unit 501, for obtaining the corresponding permissions list of safe class belonging to the user;
Setting unit 506, for being configured according to the permissions list to the access right for presetting application program.
Wherein, acquiring unit 501, judging unit 502, closing unit 503, receiving unit 504, map unit 505 and Setting unit 506 can be used for performing the method in embodiment 2 described in step S201 to S207, specifically describe detailed in Example 2 Description to methods described, will not be repeated here.
Referring to Fig. 6, Fig. 6 is a kind of structural representation for terminal that one embodiment of the present of invention is provided.Wherein, as schemed Shown in 6, a kind of terminal 600 that one embodiment of the present of invention is provided, wherein, the terminal 600 can be smart mobile phone, flat board electricity The equipment such as brain, Intelligent worn device.The terminal 600 includes acquiring unit 601, judging unit 602, closing unit 603, reception list Member 604, map unit 605 and start unit 606.
Receiving unit 604, the login banner for receiving user's input;
Map unit 606, for setting up the login banner of the user and the mapping relations of safe class;
Wherein, the safe class of the user includes a underlying security grade and at least one is higher than the underlying security The safe class of grade.
Acquiring unit 601, for when detecting user's progress fingerprint typing, obtaining the login banner of user;
Judging unit 602, the login banner for the user according to the acquisition judges safety belonging to the user etc. Level;
Closing unit 603, for when the safe class belonging to the user is less than predetermined level, closing repetition typing and referring to Line detects function;
Acquiring unit 601, is additionally operable to, when the safe class belonging to the user is more than or equal to predetermined level, obtain and use The safety value of the current affairs to be verified in family;
Closing unit 603, is additionally operable to when the safety value of the current affairs to be verified of the user of the acquisition is less than predetermined threshold value When, close and repeat typing fingerprint detection function.
Acquiring unit 601, is additionally operable to, when the safe class belonging to the user is more than or equal to predetermined level, obtain and use The safety value of the current affairs to be verified in family;
Start unit 606, the safety value for the current affairs to be verified of user when the acquisition is more than or equal to default During threshold value, then open repetition typing fingerprint detection function and verified with the fingerprint to user's typing.
Wherein, acquiring unit 601, judging unit 602, closing unit 603, receiving unit 604, map unit 605 and Start unit 606 can be used for performing the method in embodiment 3 described in step S301 to S308, specifically describe detailed in Example 3 Description to methods described, will not be repeated here.
Referring to Fig. 7, there is provided a kind of terminal in another embodiment of the present invention.The terminal 700 includes CPU701, memory 702, bus 703, the grade hardware of display screen 704.Wherein, the terminal 700 can be smart mobile phone, flat board electricity The equipment such as brain, Intelligent worn device.
Wherein, CPU701 performs the program being stored in advance in memory 702, and the implementation procedure is specifically included:
When detecting user's progress fingerprint typing, the login banner of user is obtained;
Safe class according to belonging to the login banner of the user of the acquisition judges the user;
When the safe class belonging to the user is less than predetermined level, closes and repeat typing fingerprint detection function.
Optionally, described to close after repetition typing fingerprint detection function, the implementation procedure also includes:
Obtain the corresponding permissions list of safe class belonging to the user;
The access right for presetting application program is configured according to the permissions list.
Optionally, the implementation procedure also includes:
When the safe class belonging to the user is more than or equal to predetermined level, the current affairs to be verified of user are obtained Safety value;
When the safety value of the current affairs to be verified of the user of the acquisition is less than predetermined threshold value, closes and repeat typing fingerprint Detect function.
Optionally, the implementation procedure also includes:
When the safe class belonging to the user is more than or equal to predetermined level, the current affairs to be verified of user are obtained Safety value;
When the safety value of the current affairs to be verified of the user of the acquisition is more than or equal to predetermined threshold value, then opens and repeat Typing fingerprint detection function is verified with the fingerprint to user's typing.
Optionally, the login banner of the user according to the acquisition judge safe class belonging to the user it Before, the implementation procedure also includes:
Receive the login banner of user's input;
Set up the login banner of the user and the mapping relations of safe class;
Wherein, the safe class of the user includes a underlying security grade and at least one is higher than the underlying security The safe class of grade.
As can be seen that in the scheme of the embodiment of the present invention, when detecting user's progress fingerprint typing, obtaining stepping on for user Record mark;Safe class according to belonging to the login banner of the user of the acquisition judges the user;When belonging to the user Safe class be less than predetermined level when, close repeat typing fingerprint detection function.It is hereby understood that being provided by implementing the present invention Technical scheme, can be according to belonging to user safe class control repeat typing fingerprint detection function closing so that according to The need for safe class belonging to user comes the security and convenience of balanced termination to meet different user.
Referring to Fig. 8, the frame of the part-structure of the mobile phone for the terminal correlation that Fig. 8, which is one embodiment of the present of invention, to be provided Figure.With reference to Fig. 8, mobile phone includes:It is radio frequency (Radio Frequency, RF) circuit 810, memory 820, input block 830, aobvious Show unit 840, sensor 850, voicefrequency circuit 860, Wireless Fidelity (Wireless Fidelity, WiFi) module 870, processing The part such as device 880 and power supply 890.It will be understood by those skilled in the art that the handset structure shown in Fig. 8 is not constituted pair The restriction of mobile phone, can include than illustrating more or less parts, either combine some parts or different part cloth Put.
Each component parts of mobile phone is specifically introduced with reference to Fig. 8:
RF circuits 810 can be used for the reception and transmission of information.Generally, RF circuits 810 include but is not limited to antenna, at least one Individual amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 810 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to global system for mobile communications (Global Systemof Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storage software program and module, and processor 880 is stored in memory 820 by operation Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 820 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as finger print data obtains function, fingerprint recognition processing function, repeats typing detection function etc.) etc.;Storage data field can be deposited Store up and use created data (such as to know the finger print data that module is gathered, the fingerprint template prestored by fingerprint according to mobile phone Data etc.) etc..In addition, memory 820 can include high-speed random access memory, nonvolatile memory can also be included, For example, at least one disk memory, flush memory device or other volatile solid-state parts.
Input block 830 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 830 may include fingerprint recognition module 831 and other are defeated Enter equipment 832.Fingerprint recognition module 831, can gather user in finger print data thereon.Optionally, fingerprint recognition module 831 can Including optical fingerprint module, capacitance type fingerprint module and RF-type fingerprint module.It is condenser type with fingerprint recognition module 831 Exemplified by fingerprint recognition module, specifically include induction electrode (n1 abnormal induction electrode and n2 normal induction electrode) and with it is described The signal processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.) of induction electrode connection.Except referring to Line recognizes module 831, and input block 830 can also include other input equipments 832.Specifically, other input equipments 832 can be with Including but not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. In one or more.
Display unit 840 can be used for the various of the information that is inputted by user of display or the information for being supplied to user and mobile phone Menu.Display unit 840 may include display screen 841, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Display screen 841.Although in fig. 8, fingerprint recognition module 831 and display screen 841 are to realize mobile phone as two independent parts Input and input function, it is but in some embodiments it is possible to fingerprint recognition module 831 and display screen 841 is integrated and real The input of existing mobile phone and output function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display screen 841, proximity transducer can when mobile phone is moved in one's ear, close display screen 841 and/or Backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions the big of (generally three axles) acceleration It is small, size and the direction of gravity are can detect that when static, application (such as horizontal/vertical screen switching, phase available for identification mobile phone posture Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 860, loudspeaker 881, microphone 882 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data received conversion can be transferred to loudspeaker 881, sound is converted to by loudspeaker 881 by road 860 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 882, by voicefrequency circuit 860 receive after turn It is changed to voice data, then after voice data output processor 880 is handled, through RF circuits 810 to be sent to such as another mobile phone, Or export voice data to memory 820 so as to further processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 870 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 8 is shown WiFi module 870, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 880 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform and be stored in software program and/or module in memory 820, and call and be stored in memory 820 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 880 can be wrapped Include one or more processing units;It is preferred that, processor 880 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly handled with processor, modem processor mainly handles radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile phone also includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 880 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiment shown in earlier figures 1a, Fig. 2, Fig. 3, the structure reality that each step method flow can be based on the mobile phone It is existing.
In embodiment shown in earlier figures 4, Fig. 5, Fig. 6, the structure realization that each unit function can be based on the mobile phone.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
, can be by another way in several embodiments provided herein, it should be understood that disclosed device Realize.For example, device embodiment described above is only schematical, such as the division of described unit is only one kind Division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can combine or can To be integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or discussed each other Coupling direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit, Can be electrical or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, it can be stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially The part contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are to cause a computer Equipment (can for personal computer, server or network equipment etc.) perform each embodiment methods described of the invention whole or Part steps.And foregoing storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with store program codes Medium.
Described above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Embodiment is stated the present invention is described in detail, it will be understood by those within the art that:It still can be to preceding State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these Modification is replaced, and the essence of appropriate technical solution is departed from the scope of various embodiments of the present invention technical scheme.

Claims (11)

1. a kind of method of fingerprint typing, it is characterised in that methods described includes:
When detecting user's progress fingerprint typing, the login banner of user is obtained;
Safe class according to belonging to the login banner of the user of the acquisition judges the user;
When the safe class belonging to the user is less than predetermined level, closes and repeat typing fingerprint detection function.
2. according to the method described in claim 1, it is characterised in that described to close after repetition typing fingerprint detection function, institute Stating method also includes:
Obtain the corresponding permissions list of safe class belonging to the user;
The access right for presetting application program is configured according to the permissions list.
3. method according to claim 2, it is characterised in that methods described also includes:
When the safe class belonging to the user is more than or equal to predetermined level, the safety of the current affairs to be verified of user is obtained Value;
When the safety value of the current affairs to be verified of the user of the acquisition is less than predetermined threshold value, closes and repeat typing fingerprint detection Function.
4. method according to claim 3, it is characterised in that methods described also includes:
When the safe class belonging to the user is more than or equal to predetermined level, the safety of the current affairs to be verified of user is obtained Value;
When the safety value of the current affairs to be verified of the user of the acquisition is more than or equal to predetermined threshold value, then opens and repeat typing Fingerprint detection function is verified with the fingerprint to user's typing.
5. according to any described method of Claims 1-4, it is characterised in that the login of the user according to the acquisition Mark judges before the safe class belonging to the user that methods described also includes:
Receive the login banner of user's input;
Set up the login banner of the user and the mapping relations of safe class;
Wherein, the safe class of the user includes a underlying security grade and at least one is higher than the underlying security grade Safe class.
6. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, for when detecting user's progress fingerprint typing, obtaining the login banner of user;
Judging unit, the login banner for the user according to the acquisition judges the safe class belonging to the user;
Closing unit, for when the safe class belonging to the user is less than predetermined level, closing and repeating typing fingerprint detection Function.
7. terminal according to claim 6, it is characterised in that the terminal also includes setting unit;
The acquiring unit, for obtaining the corresponding permissions list of safe class belonging to the user;
The setting unit, for being configured according to the permissions list to the access right for presetting application program.
8. terminal according to claim 7, it is characterised in that
The acquiring unit, is additionally operable to, when the safe class belonging to the user is more than or equal to predetermined level, obtain user The safety value of current affairs to be verified;
The closing unit, is additionally operable to when the safety value of the current affairs to be verified of the user of the acquisition is less than predetermined threshold value, Close and repeat typing fingerprint detection function.
9. terminal according to claim 8, it is characterised in that methods described also includes start unit;
The acquiring unit, is additionally operable to, when the safe class belonging to the user is more than or equal to predetermined level, obtain user The safety value of current affairs to be verified;
The start unit, the safety value for the current affairs to be verified of user when the acquisition is more than or equal to predetermined threshold value When, then open repetition typing fingerprint detection function and verified with the fingerprint to user's typing.
10. according to any described terminal of claim 6 to 9, it is characterised in that the terminal also includes receiving unit and mapping Unit;
The receiving unit, the login banner for receiving user's input;
The map unit, for setting up the login banner of the user and the mapping relations of safe class;
Wherein, the safe class of the user includes a underlying security grade and at least one is higher than the underlying security grade Safe class.
11. a kind of terminal, it is characterised in that including:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs such as claim 1 to right It is required that the method described in 5 any one.
CN201710152520.8A 2017-03-14 2017-03-14 Fingerprint input method and terminal Expired - Fee Related CN107025389B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710152520.8A CN107025389B (en) 2017-03-14 2017-03-14 Fingerprint input method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710152520.8A CN107025389B (en) 2017-03-14 2017-03-14 Fingerprint input method and terminal

Publications (2)

Publication Number Publication Date
CN107025389A true CN107025389A (en) 2017-08-08
CN107025389B CN107025389B (en) 2020-08-07

Family

ID=59526004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710152520.8A Expired - Fee Related CN107025389B (en) 2017-03-14 2017-03-14 Fingerprint input method and terminal

Country Status (1)

Country Link
CN (1) CN107025389B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108010170A (en) * 2017-12-25 2018-05-08 维沃移动通信有限公司 A kind of control method and device of face recognition unlocking function
CN109886178A (en) * 2019-02-14 2019-06-14 Oppo广东移动通信有限公司 Fingerprint input method and Related product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075325A (en) * 2010-11-25 2011-05-25 杨莉 Key, method for manufacturing lock and key and safety system using method
CN103986749A (en) * 2014-04-24 2014-08-13 兴天通讯技术(天津)有限公司 Resource sharing system and resource sharing method
EP3035223A1 (en) * 2014-12-16 2016-06-22 SFNT Germany GmbH Method and control system for controlling an execution of a software application on an execution platform
CN105959287A (en) * 2016-05-20 2016-09-21 中国银联股份有限公司 Biological feature based safety certification method and device
CN106357413A (en) * 2016-11-02 2017-01-25 广东虹勤通讯技术有限公司 Method for encrypting numbers with fingerprint and mobile terminal
CN106407952A (en) * 2016-09-30 2017-02-15 北京小米移动软件有限公司 Fingerprint entry method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075325A (en) * 2010-11-25 2011-05-25 杨莉 Key, method for manufacturing lock and key and safety system using method
CN103986749A (en) * 2014-04-24 2014-08-13 兴天通讯技术(天津)有限公司 Resource sharing system and resource sharing method
EP3035223A1 (en) * 2014-12-16 2016-06-22 SFNT Germany GmbH Method and control system for controlling an execution of a software application on an execution platform
CN105959287A (en) * 2016-05-20 2016-09-21 中国银联股份有限公司 Biological feature based safety certification method and device
CN106407952A (en) * 2016-09-30 2017-02-15 北京小米移动软件有限公司 Fingerprint entry method and device
CN106357413A (en) * 2016-11-02 2017-01-25 广东虹勤通讯技术有限公司 Method for encrypting numbers with fingerprint and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108010170A (en) * 2017-12-25 2018-05-08 维沃移动通信有限公司 A kind of control method and device of face recognition unlocking function
CN109886178A (en) * 2019-02-14 2019-06-14 Oppo广东移动通信有限公司 Fingerprint input method and Related product

Also Published As

Publication number Publication date
CN107025389B (en) 2020-08-07

Similar Documents

Publication Publication Date Title
CN106055957A (en) Fingerprint unlocking method and terminal
CN106293751A (en) A kind of method showing information on the terminal device and terminal unit
CN106203035A (en) A kind of data access control method and mobile terminal
CN105430600B (en) A kind of data transmission method and the terminal of data transmission
CN107346397A (en) Information processing method and related product
CN106022071A (en) Fingerprint unlocking method and terminal
CN106920307A (en) Gate inhibition's open method, device and mobile terminal
CN107292235A (en) The acquisition method and Related product of fingerprint
CN107480489A (en) Solve lock control method and Related product
CN106850983A (en) One kind puts out screen control method, device and terminal
CN107369017A (en) Quick payment implementation method and Related product
CN106714333A (en) Data migration method and terminal
CN106790981A (en) A kind of terminal device method to set up and terminal device
CN106055954A (en) Terminal unlocking method and terminal
CN106407771A (en) Message management method and device
CN107272985A (en) Notification message processing method and related product
CN107256383A (en) The acquisition method and Related product of fingerprint
CN107122647A (en) Finger print data processing method, device and electronic equipment
CN106529256A (en) Terminal unlocking method and mobile terminal
CN107025389A (en) A kind of method and terminal of fingerprint typing
CN106022066A (en) Terminal unlocking method and terminal
CN107657164A (en) Unlocking method and related product
CN106814944A (en) A kind of progress adjustment method, device and mobile terminal
CN107657160A (en) Facial information acquisition method and Related product
CN107480997A (en) A kind of method of mobile payment, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200807