CN107423598B - A kind of solution lock control method and mobile terminal - Google Patents

A kind of solution lock control method and mobile terminal Download PDF

Info

Publication number
CN107423598B
CN107423598B CN201710180499.2A CN201710180499A CN107423598B CN 107423598 B CN107423598 B CN 107423598B CN 201710180499 A CN201710180499 A CN 201710180499A CN 107423598 B CN107423598 B CN 107423598B
Authority
CN
China
Prior art keywords
fingerprint recognition
application scenarios
under
mobile terminal
lockout mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710180499.2A
Other languages
Chinese (zh)
Other versions
CN107423598A (en
Inventor
王健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710180499.2A priority Critical patent/CN107423598B/en
Publication of CN107423598A publication Critical patent/CN107423598A/en
Application granted granted Critical
Publication of CN107423598B publication Critical patent/CN107423598B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a kind of solution lock control method and mobile terminals, the described method includes: passing through the second fingerprint recognition errors number under the 2nd the second application scenarios of LockOut mode monitoring, the 2nd LockOut mode is independently of the first LockOut mode, wherein, the first LockOut mode is used to monitor the first fingerprint recognition errors number under the first application scenarios, and second application scenarios and first application scenarios are relatively independent;If the second fingerprint recognition errors number reaches preset threshold, forbid carrying out fingerprint recognition operation under second application scenarios.It can be used for optimization system Lockout mode through the embodiment of the present invention.

Description

A kind of solution lock control method and mobile terminal
Technical field
The present invention relates to field of electronic devices, and in particular to a kind of solution lock control method and mobile terminal.
Background technique
With the fast development of information technology, mobile terminal (such as mobile phone, tablet computer) use is more more and more universal, refers to Standard configuration technology of the line identification technology as mobile terminal, is widely used on mobile terminals, and fingerprint is known on the market Other mould group has become the standard configuration of intelligent terminal, and fingerprint also becomes the basic function of fingerprint terminal for unlocked by fingerprint, refers to Line identification can be used for unlocking screen, file/program encryption, mobile payment etc..
In the prior art, android operating system uses encryption technology, isolation of system technology to the safety of fingerprint, together When use system LockOut mode prevent quick-fried power from cracking.System LockOut mode, it may be assumed that carrying out fingerprint recognition operating process In, it may appear that continuously the case where fingerprint recognition operation failure, when accumulative fingerprint recognition errors number reaches specified fingerprint recognition Errors number (such as: 5 times) after, need user that certain time (for example, 30S) is waited just to continue to attempt to using fingerprint later Unlock, can achieve the purpose for preventing Brute Force.However, the LockOut mode of system be it is all application (Application, APP specified fingerprint recognition errors number) is shared, i.e., is applied when one of them and reaches specified fingerprint in fingerprint recognition operating process After identifying errors number, if all applications need to be operated using fingerprint recognition in system, it will wait 30S that could use later, though The path of Brute Force is so limited to the maximum extent, still, be will lead to user and is needed to wait the long period that could enable fingerprint Identification operation.
Summary of the invention
The embodiment of the invention provides a kind of solution lock control method and mobile terminals, can optimization system LockOut mode.
First aspect of the embodiment of the present invention provides a kind of solution lock control method, comprising:
By the second fingerprint recognition errors number under the 2nd the second application scenarios of LockOut mode monitoring, described second LockOut mode is independently of the first LockOut mode, wherein the first LockOut mode is for monitoring the first application scenarios Under the first fingerprint recognition errors number, second application scenarios be different from first application scenarios;
If the second fingerprint recognition errors number reaches preset threshold, forbid being referred under second application scenarios Line identification operation.
Second aspect of the embodiment of the present invention provides a kind of mobile terminal, comprising:
Monitoring unit, for passing through the second fingerprint recognition mistake under the 2nd the second application scenarios of LockOut mode monitoring Number, the 2nd LockOut mode is independently of the first LockOut mode, wherein the first LockOut mode is for supervising The first fingerprint recognition errors number under the first application scenarios is surveyed, second application scenarios are different from first applied field Scape;
Control unit forbids described second to answer if reach preset threshold for the second fingerprint recognition errors number With carrying out fingerprint recognition operation under scene.
The third aspect of the embodiment of the present invention provides a kind of mobile terminal, comprising:
Processor and memory;Wherein, the processor is by calling the code in the memory or instructing to execute The some or all of step of method described in first aspect.
The implementation of the embodiments of the present invention has the following beneficial effects:
As can be seen that through the embodiment of the present invention, passing through second under the 2nd the second application scenarios of LockOut mode monitoring Fingerprint recognition errors number, the 2nd LockOut mode is independently of the first LockOut mode, wherein the first LockOut mould Formula is used to monitor the first fingerprint recognition errors number under the first application scenarios, second application scenarios and first application scenarios It is relatively independent, if the second fingerprint recognition errors number reaches preset threshold, forbid carrying out fingerprint under second application scenarios Identification operation.To which a 2nd LockOut mode independently of system LockOut mode can be used and come to user's needs Scene carries out fingerprint recognition operation, can optimization system Lockout mode.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of first embodiment flow diagram for solving lock control method provided in an embodiment of the present invention;
Fig. 2 is a kind of second embodiment flow diagram for solving lock control method provided in an embodiment of the present invention;
Fig. 3 a is a kind of schematic structural diagram of the first embodiment of mobile terminal provided in an embodiment of the present invention;
Fig. 3 b is the another structural schematic diagram of mobile terminal described in Fig. 3 a provided in an embodiment of the present invention;
Fig. 3 c is the another structural schematic diagram of mobile terminal described in Fig. 3 b provided in an embodiment of the present invention;
Fig. 3 d is the another structural schematic diagram of mobile terminal described in Fig. 3 c provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic structural diagram of the second embodiment of mobile terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of example structure schematic diagram of mobile phone provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first ", " second ", " third " and " in the attached drawing Four " etc. are not use to describe a particular order for distinguishing different objects.In addition, term " includes " and " having " and it Any deformation, it is intended that cover and non-exclusive include.Such as it contains the process, method of a series of steps or units, be System, product or equipment are not limited to listed step or unit, but optionally further comprising the step of not listing or list Member, or optionally further comprising other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments Containing at least one embodiment of the present invention.It is identical that each position in the description shows that the phrase might not be each meant Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Mobile terminal described by the embodiment of the present invention may include smart phone (such as Android phone), tablet computer, the palm Upper computer, laptop, mobile internet device (MID, Mobile Internet Devices) or wearable device etc., Above-mentioned is only citing, and non exhaustive, including but not limited to above-mentioned mobile terminal.
It should be noted that in the embodiment of the present invention, what the first LockOut mode can carry for android operating system Lockout mode, and the 2nd LockOut mode can by mobile terminal manufacturer's self-setting, the 2nd LockOut mode independently of First LockOut mode.2nd LockOut mode can also be used as an APP, voluntarily be downloaded by user, be mounted on mobile whole In end.Above-mentioned first LockOut mode is used to monitor the first fingerprint recognition errors number under the first application scenarios, and second LockOut mode is used to monitor the second fingerprint recognition errors number under the second application scenarios, and the second application scenarios are answered with first Relatively independent with scene, the first application scenarios and the second application scenarios are the application scenarios that can carry out fingerprint recognition.No matter What one fingerprint recognition errors number or the second fingerprint recognition errors number all counted is in fingerprint recognition operating process, continuously Fingerprint recognition errors number, for example, in carrying out fingerprint recognition operating process, fingerprint recognition mistake 3 times, the 4th fingerprint recognition Correctly, then fingerprint recognition errors number can be reset, that is, after the 4th fingerprint recognition is correct, fingerprint recognition errors number is 0 time.
Further, under the first application scenarios, continuous fingerprint recognition errors number (i.e. the first fingerprint recognition mistake time Number) reach the first specified fingerprint recognition errors number, then it can forbid carrying out fingerprint recognition operation under first application scenarios, need It waits for a period of time, fingerprint recognition operation can be just carried out under first application scenarios, in this case it is also possible to Under two application scenarios, fingerprint recognition operation is carried out;Similarly, under the second application scenarios, continuous fingerprint recognition errors number is (i.e. Second fingerprint recognition errors number) reach the second specified fingerprint recognition errors number, then forbid under second application scenarios into The operation of row fingerprint recognition, needs to wait for a period of time, can just carry out fingerprint recognition operation under second application scenarios again, with This carries out fingerprint recognition operation at the same time it can also under the first application scenarios.
Optionally, each application under corresponding second application scenarios of above-mentioned 2nd LockOut mode can correspond to a finger Determine fingerprint recognition errors number.For example, the specified fingerprint recognition errors number using A may be configured as M, using the specified fingerprint of B It is different positive integers that identification errors number, which may be configured as N, M and N, i.e., using A in fingerprint recognition operating process, fingerprint recognition Errors number reaches n times, then forbids carrying out fingerprint recognition operation in the environment of application A, in this case, can be application B's Under environment, fingerprint recognition operation is carried out.
Optionally, the corresponding specified fingerprint of the certain applications under corresponding second application scenarios of above-mentioned 2nd LockOut mode It identifies errors number, under the second application scenarios using C, using D and application E, can be corresponded to using C and using D specified Fingerprint recognition errors number X can correspond to specified fingerprint recognition errors number Y using E, wherein X and Y is positive integer.If In the environment of C, fingerprint recognition errors number reaches X, then forbids carrying out fingerprint recognition in the environment of application C and application D Operation (needs to wait for a period of time, just can carry out fingerprint recognition operation in the environment of carrying out using C or application D again); Alternatively, if continuous fingerprint recognition mistake is a times (if a < X) in the environment of application C, it at this time, can also be application D's Fingerprint recognition operation is carried out under environment, if connection fingerprint recognition errors number is b times, and a+b is equal to X in the environment of application D When, then forbid application C and application D in the environment of carry out fingerprint recognition operation (need to wait for a period of time, just again can into Row is using progress fingerprint recognition operation in the environment of C or application D);Alternatively, if the fingerprint recognition errors number using E reaches To Y, then progress fingerprint recognition operation in the environment of application Y is forbidden (to need to wait for a period of time, just can apply the ring of Y at this Fingerprint recognition operation is carried out under border).
Optionally, it specifies for all applications under corresponding second application scenarios of above-mentioned 2nd LockOut mode corresponding one Fingerprint recognition errors number.That is, the fingerprint recognition errors number whichsoever applied reaches specified under the second application scenarios Fingerprint recognition errors number then forbids carrying out fingerprint recognition operation under the second application scenarios.
Optionally, above-mentioned first application scenarios can be not only different applications (for example, the first application from the second application scenarios Comprising applying A in scene, and the second application scenarios include to apply B), it can also be the different application scene of same application.For example, By taking wechat is applied as an example, the 2nd LockOut mode can be paid for wechat, and the first LockOut mode can be arrived for encryption wechat Enter this scene of homepage by unlocked by fingerprint, in turn, in the specified of the 2nd LockOut mode and the first LockOut mode Fingerprint recognition errors number is different, and the specified fingerprint recognition errors number of the 2nd LockOut mode is X, the first LockOut mould The specified fingerprint recognition errors number of formula is that Y, X and Y are positive integer, and X can be greater than Y.
Referring to Fig. 1, for a kind of first embodiment flow diagram for solving lock control method provided in an embodiment of the present invention. Solution lock control method as described in this embodiment, comprising the following steps:
101, described by the second fingerprint recognition errors number under the 2nd the second application scenarios of LockOut mode monitoring 2nd LockOut mode is independently of the first LockOut mode, wherein the first LockOut mode is for monitoring the first application The first fingerprint recognition errors number under scene, second application scenarios and first application scenarios are relatively independent.
Wherein, when user presses fingerprint recognition mould group each time, fingerprint image can be acquired, by the fingerprint image and is preset Fingerprint template is matched, successful match, then can carry out unlocked by fingerprint, and it fails to match, then can record fingerprint recognition errors number, Wherein, preset fingerprint template can be before executing step 101, by user's typing.For example, under the second application scenarios, if carrying out In fingerprint recognition operating process, there is continuous fingerprint recognition mistake, then when first time fingerprint recognition operation failure, the second fingerprint is known Other errors number is denoted as 1, and when second of fingerprint recognition operation failure, the second fingerprint recognition errors number is denoted as 2.Above-mentioned first refers to Line identification errors number can be reserved for from the second fingerprint recognition errors number in different storage regions.
If 102, the second fingerprint recognition errors number reaches preset threshold, forbid under second application scenarios into The operation of row fingerprint recognition.
Wherein, above-mentioned preset threshold can be set by the user himself or system default, preset threshold are above-mentioned second finger Determine fingerprint recognition errors number.
Optionally, in above-mentioned steps 102, forbid carrying out fingerprint recognition operation under second application scenarios, it may include such as Lower step:
Forbid carrying out fingerprint recognition operation under second application scenarios within a preset period of time.
Wherein, above-mentioned preset time period can be set by the user himself or system default.Above-mentioned preset time period can be with Two application scenarios are corresponding, and further, each application in the second application scenarios can correspond to a preset time period.Certainly, A designated time period can also be corresponded under one application scenarios, reach the above-mentioned first specified fingerprint in the first fingerprint recognition errors number When identifying errors number, at the appointed time in section, forbid carrying out fingerprint recognition operation under the first application scenarios.Above-mentioned preset time Section is relatively independent with designated time period, and certainly, preset time period is smaller than designated time period.
Optionally, above-mentioned steps 102 are forbidden after carrying out fingerprint recognition operation under second application scenarios, can be with It comprises the following steps:
It applies in the current finger print to be specified in application, the display interface in mobile terminal shows default unlock interface.
Wherein, above-mentioned specified application can be set by the user himself or system default, for example, specified application can answer for payment With can be realized and apply in current finger print as payment in application, the display interface in mobile terminal shows default unlock interface.
Optionally, above-mentioned default unlock interface may include, but are not limited to: pattern unlock interface is (for example, in the prior art Nine grids), digital unlock interface (such as: the unlock interface of input numerical ciphers), iris unlock interface is (such as: can mention on interface Show that user inputs iris information), speech unlocking interface (such as: user's input voice information can be prompted in unlock interface).
It optionally, can be in display circle of mobile terminal in the specific implementation, when fingerprint recognition errors number reaches preset threshold Face shows above-mentioned default unlock interface.Certainly, different fingerprint applications can correspond to different default unlock interfaces, then, user Personalized unlock setting can be achieved.
Still optionally further, above-mentioned steps are after the display interface of mobile terminal shows default unlock interface, can be with It comprises the following steps:
The target unlocking information in the default unlock interface input is obtained, in the target unlocking information and default unlock It when information matches, is unlocked, and lifts a ban progress fingerprint recognition operation under second application scenarios.
Wherein, above-mentioned default unlocking information can be preset by user, the target solution of different default unlock interface inputs Lock information is different, for example, user can input the unlocking pattern, in the unlock when default unlock interface is pattern unlock interface It when pattern is matched with default unlocking information, is unlocked, unlock and current application environmental correclation herein, if fingerprint is paid, Fingerprint payment can be achieved, if opening some application, the homepage into the application can be achieved.After unlocking, can be lifted a ban Fingerprint recognition operation is carried out under two application scenarios, in this way, fingerprint recognition mould group can be allowed without waiting for that is, fingerprint recognition mould group can be stood Horse acquisition fingerprint image can carry out fingerprint recognition operation in turn.
Optionally, the preset threshold in step 102 can be related with the current electric quantity of mobile terminal, is greater than in current electric quantity pre- If when power threshold, preset threshold A, when current electric quantity is less than default power threshold, preset threshold is B, wherein A is greater than B, A and B and is all larger than 0, in this way, user can refer to when the electricity that may be implemented in mobile terminal is more in order to realize Line unlock, repeatedly carries out fingerprint recognition operation, when the electricity of mobile terminal is smaller, can reduce the number of fingerprint recognition operation, In this way, the power consumption of mobile terminal can be reduced.
Optionally, it may include following steps before above-mentioned steps 101: in target fingerprint finger image recognition failures, knowing The corresponding fingerprint image type of not described target fingerprint image obtains the preset threshold according to the fingerprint image type, executes The step of second fingerprint recognition errors number by under the 2nd the second application scenarios of LockOut mode monitoring.
Wherein, above-mentioned fingerprint image type can be (i.e. dry for wet finger type (fingerprint image of wet finger), dry finger type The fingerprint image of finger) and normal finger type (non-above two fingerprint pattern).Specifically, before step 101, can sentence Disconnected target fingerprint image whether be wet finger or dry finger fingerprint image.
Optionally, in the specific implementation, since the fingerprint lines in the fingerprint image of dry finger is intermittent, and wet finger Larger area fingerprint lines is blurred in fingerprint image, is almost hard to tell fingerprint lines, thus, it can be by being carried out to fingerprint image Whether analysis, judge fingerprint image from dry finger or wet finger.For example, can be special by the lines for the image that takes the fingerprint Sign, to judge fingerprint image whether from dry finger or wet finger.If the lines of fingerprint image is intermittent, the fingerprint Image belongs to dry finger, if occur the fingerprint lines blurring of larger area in fingerprint image, which belongs to wet Finger.
As can be seen that through the embodiment of the present invention, passing through second under the 2nd the second application scenarios of LockOut mode monitoring Fingerprint recognition errors number, the 2nd LockOut mode is independently of the first LockOut mode, wherein the first LockOut mould Formula is used to monitor the first fingerprint recognition errors number under the first application scenarios, second application scenarios and first application scenarios It is relatively independent, if the second fingerprint recognition errors number reaches preset threshold, forbid carrying out fingerprint under second application scenarios Identification operation.To which a 2nd LockOut mode independently of system LockOut mode can be used and come to user's needs Scene carries out fingerprint recognition operation, can optimization system Lockout mode.
Consistent with the abovely, referring to Fig. 2, for a kind of second implementation of solution lock control method provided in an embodiment of the present invention Example flow diagram.Solution lock control method as described in this embodiment, comprising the following steps:
201, current finger print application is obtained.
Wherein, the fingerprint application in the embodiment of the present invention is the application for needing to carry out unlocked by fingerprint.Mobile terminal can be to working as Preceding application environment is detected (for example, detecting by backstage to current application environment), then, it may be determined that current finger print is answered With.Certainly, fingerprint application can be there are many multiplicity, for example, wechat is paid, Alipay payment, different application environments corresponds to different Fingerprint application.
202, it obtains and applies corresponding preset threshold with the current finger print.
Wherein, each fingerprint application can correspond to a threshold value (that is: specified fingerprint recognition errors number), according to fingerprint application Current finger print can be obtained using corresponding preset threshold in corresponding relationship between threshold value.
203, described by the second fingerprint recognition errors number under the 2nd the second application scenarios of LockOut mode monitoring 2nd LockOut mode is independently of the first LockOut mode, wherein the first LockOut mode is for monitoring the first application The first fingerprint recognition errors number under scene, second application scenarios and first application scenarios are relatively independent.
If 204, the second fingerprint recognition errors number reaches the preset threshold, forbid second application scenarios Lower progress fingerprint recognition operation.
Wherein, the specific descriptions of above-mentioned steps 203- step 204 can refer to the correspondence of the described solution lock control method of Fig. 1 Step.
Optionally, above-mentioned steps 204 can be implemented as follows:
Applying in the current finger print is specified in application, showing in advance described in executing in the display interface of the mobile terminal If unlock interface.
Wherein, above-mentioned specified application can be specified by user, before implementing step 201 of the embodiment of the present invention, be preset, Certainly, the application except application is specified, can be monitored by the first LockOut mode.
As can be seen that through the embodiment of the present invention, passing through second under the 2nd the second application scenarios of LockOut mode monitoring Fingerprint recognition errors number, the 2nd LockOut mode is independently of the first LockOut mode, wherein the first LockOut mould Formula is used to monitor the first fingerprint recognition errors number under the first application scenarios, second application scenarios and first application scenarios It is relatively independent, if the second fingerprint recognition errors number reaches preset threshold, forbid carrying out fingerprint under second application scenarios Identification operation, wherein preset threshold is to apply corresponding preset threshold with current finger print.Thus not only can be using one solely The 2nd LockOut mode for standing on system LockOut mode to carry out fingerprint recognition operation to the scene that user needs, and can optimize System Lockout mode can also adjust specified fingerprint recognition errors number, in this way, can provide for user for specified application More unlocked by fingerprint chances, promote unlocked by fingerprint efficiency.
Consistent with the abovely, specific as follows the following are the device for implementing above-mentioned solution lock control method:
Fig. 3 a is please referred to, is a kind of schematic structural diagram of the first embodiment of mobile terminal provided in an embodiment of the present invention.This Mobile terminal described in embodiment, comprising: monitoring unit 301 and display unit 302, specific as follows:
Monitoring unit 301, for wrong by the second fingerprint recognition under the 2nd the second application scenarios of LockOut mode monitoring Accidentally number, the 2nd LockOut mode is independently of the first LockOut mode, wherein the first LockOut mode is used for Monitor the first fingerprint recognition errors number under the first application scenarios, second application scenarios and the first application scenarios phase To independence;
Control unit 302 forbids described second if reach preset threshold for the second fingerprint recognition errors number Fingerprint recognition operation is carried out under application scenarios.
Optionally, described control unit 302 is specifically used for:
Forbid carrying out fingerprint recognition operation under second application scenarios within a preset period of time.
Optionally, such as Fig. 3 b, Fig. 3 b is the another modification structures of mobile terminal described in Fig. 3 a, and Fig. 3 b is compared with Fig. 3 a Compared with, it may also include that first acquisition unit 303, specific as follows:
First acquisition unit 303, it is described by the 2nd LockOut mode monitoring for being executed in the monitoring unit 301 Before the second fingerprint recognition errors number under second application scenarios, current finger print application is obtained;
The first acquisition unit 303 also particularly useful for:
It obtains and applies the corresponding preset threshold with the current finger print.
Optionally, such as Fig. 3 c, Fig. 3 c is the another modification structures of mobile terminal described in Fig. 3 b, and Fig. 3 c is compared with Fig. 3 b Compared with, it may also include that display unit 304, specific as follows:
Display unit 304 described is forbidden being referred under second application scenarios for executing in described control unit 302 After line identification operation, apply in the current finger print to be specified in application, the display interface in mobile terminal shows default solution Lock interface.
Optionally, such as Fig. 3 d, Fig. 3 d is the another modification structures of mobile terminal described in Fig. 3 c, and Fig. 3 d is compared with Fig. 3 c Compared with, it may also include that second acquisition unit 305, specific as follows:
Second acquisition unit 305 is shown for executing the display interface in mobile terminal in the display unit 304 After default unlock interface, the target unlocking information in the default unlock interface input is obtained,
Described control unit 302, also particularly useful for:
It when the target unlocking information is matched with default unlocking information, is unlocked, and lifts a ban second applied field Fingerprint recognition operation is carried out under scape.
As can be seen that described mobile terminal through the embodiment of the present invention, the 2nd LockOut mode monitoring the can be passed through The second fingerprint recognition errors number under two application scenarios, the 2nd LockOut mode independently of the first LockOut mode, In, the first LockOut mode is used to monitor the first fingerprint recognition errors number under the first application scenarios, second applied field Scape and first application scenarios are relatively independent, if the second fingerprint recognition errors number reaches preset threshold, forbid this second Fingerprint recognition operation is carried out under application scenarios.To which the 2nd LockOut independently of system LockOut mode can be used Mode to carry out fingerprint recognition operation to the scene that user needs, can optimization system Lockout mode.
Consistent with the abovely, referring to Fig. 4, being a kind of second embodiment knot of mobile terminal provided in an embodiment of the present invention Structure schematic diagram.Mobile terminal as described in this embodiment, comprising: at least one input equipment 1000;At least one output is set Standby 2000;At least one processor 3000, such as CPU;With memory 4000, above-mentioned input equipment 1000, output equipment 2000, Processor 3000 and memory 4000 are connected by bus 5000.
Wherein, above-mentioned input equipment 1000 concretely touch panel, physical button or mouse.
Above-mentioned output equipment 2000 concretely display screen.
Above-mentioned memory 4000 can be high speed RAM memory, can also be nonvolatile storage (non-volatile ), such as magnetic disk storage memory.Above-mentioned memory 4000 is used to store a set of program code, above-mentioned input equipment 1000, defeated Equipment 2000 and processor 3000 are used to call the program code stored in memory 4000 out, perform the following operations:
Above-mentioned processor 3000, is used for:
By the second fingerprint recognition errors number under the 2nd the second application scenarios of LockOut mode monitoring, described second LockOut mode is independently of the first LockOut mode, wherein the first LockOut mode is for monitoring the first application scenarios Under the first fingerprint recognition errors number, second application scenarios and first application scenarios are relatively independent;
If the second fingerprint recognition errors number reaches preset threshold, forbid being referred under second application scenarios Line identification operation.
Optionally, above-mentioned processor 3000 is forbidden carrying out fingerprint recognition operation under second application scenarios, comprising:
Forbid carrying out fingerprint recognition operation under second application scenarios within a preset period of time.
Optionally, above-mentioned processor 3000, in passed through under the 2nd the second application scenarios of LockOut mode monitoring Before two fingerprint recognition errors numbers, comprising:
Obtain current finger print application;
It obtains and applies the corresponding preset threshold with the current finger print.
Still optionally further, above-mentioned processor 3000 is forbidden carrying out fingerprint recognition under second application scenarios described After operation, also particularly useful for: also particularly useful for:
Optionally, above-mentioned processor 3000, it is also specific after the display interface of mobile terminal shows default unlock interface For:
The target unlocking information in the default unlock interface input is obtained, in the target unlocking information and default unlock It when information matches, is unlocked, and lifts a ban progress fingerprint recognition operation under second application scenarios.
Fig. 5 shows the block diagram of the part-structure of mobile phone relevant to mobile terminal provided in an embodiment of the present invention.Ginseng Fig. 5 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 510, memory 520, input unit 530, display unit 540, sensor 550, voicefrequency circuit 560, Wireless Fidelity (Wireless Fidelity, Wi-Fi) module 570, processor 580, And the equal components of power supply 590.It will be understood by those skilled in the art that handset structure shown in Fig. 5 is not constituted to mobile phone It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 5 to mobile phone:
RF circuit 510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 580;In addition, the data for designing uplink are sent to base station.In general, RF circuit 510 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 510 can also be communicated with network and other equipment by wireless communication. Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 520 can be used for storing software program and module, and processor 580 is stored in memory 520 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 520 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 520 may include high-speed random access memory Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
Input unit 530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 530 may include that touch panel 531 and other inputs are set Standby 532.Touch panel 531, also referred to as touch screen, collect user on it or nearby touch operation (such as user use The operation of any suitable object or attachment such as finger, stylus on touch panel 531 or near touch panel 531), and root Corresponding attachment device is driven according to preset formula.Optionally, touch panel 531 may include touch detecting apparatus and touch Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinate, then gives processor 580, and can receive order that processor 580 is sent and be executed.Furthermore, it is possible to using electricity The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 531.In addition to touch panel 531, input Unit 530 can also include other input equipments 532.Specifically, other input equipments 532 can include but is not limited to secondary or physical bond One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 540 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 540 may include display panel 541, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 541.Further, touch panel 531 can cover display panel 541, when touch panel 531 detect it is on it or attached After close touch operation, processor 580 is sent to determine the type of touch event, is followed by subsequent processing device 580 according to touch event Type corresponding visual output is provided on display panel 541.Although in Fig. 5, touch panel 531 and display panel 541 It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control Panel 531 and display panel 541 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 541, proximity sensor can close display panel 541 when mobile phone is moved in one's ear And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 560, loudspeaker 561, microphone 562 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 561, be converted to sound by loudspeaker 561 by road 560 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 562, is turned after being received by voicefrequency circuit 560 It is changed to audio data, then by after the processing of audio data output processor 580, such as another mobile phone is sent to through RF circuit 510, Or audio data is exported to memory 520 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 570 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 5 is shown WiFi module 570, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 520, and call and be stored in memory 520 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 580 can wrap Include one or more processing units;Preferably, processor 580 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 580.
Mobile phone further includes the power supply 590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 580 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In previous embodiment, each step method process can be realized based on the structure of the terminal.Wherein sensor 550 can wrap Containing proximity sensor and humidity sensor, touch panel 531 can be used as the use of fingerprint recognition mould group.
The embodiment of the present invention also provides a kind of computer storage medium, wherein the computer storage medium can be stored with journey Sequence, the program include some or all of any solution lock control method recorded in above method embodiment step when executing Suddenly.
Although combining each embodiment herein, invention has been described, however, implementing the claimed invention In the process, those skilled in the art are by checking the attached drawing, disclosure and the appended claims, it will be appreciated that and it is real Other variations of the existing open embodiment.In the claims, " comprising " (comprising) word is not excluded for other compositions Part or step, "a" or "an" are not excluded for multiple situations.Claim may be implemented in single processor or other units In several functions enumerating.Mutually different has been recited in mutually different dependent certain measures, it is not intended that these are arranged It applies to combine and generates good effect.
It will be understood by those skilled in the art that the embodiment of the present invention can provide as method, apparatus (equipment) or computer journey Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the present invention The form of embodiment.Moreover, it wherein includes the calculating of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.Computer program is stored/distributed in suitable medium, is provided together with other hardware or as the one of hardware Part can also use other distribution forms, such as pass through the wired or wireless telecommunication system of Internet or other.
The present invention be referring to the embodiment of the present invention method, apparatus (equipment) and computer program product flow chart with/ Or block diagram describes.It should be understood that each process that can be realized by computer program instructions in flowchart and/or the block diagram and/ Or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer program instructions To general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor to generate one A machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although in conjunction with specific features and embodiment, invention has been described, it is clear that, do not departing from this hair In the case where bright spirit and scope, it can be carry out various modifications and is combined.Correspondingly, the specification and drawings are only institute The exemplary illustration of the invention that attached claim is defined, and be considered as covered in the scope of the invention any and all and repair Change, change, combining or equivalent.Obviously, those skilled in the art various changes and modifications can be made to the invention without It is detached from the spirit and scope of the present invention.If in this way, these modifications and changes of the present invention belong to the claims in the present invention and its Within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (11)

1. a kind of solution lock control method characterized by comprising
By the second fingerprint recognition errors number under the 2nd the second application scenarios of LockOut mode monitoring, described second LockOut mode is independently of the first LockOut mode, wherein the first LockOut mode is for monitoring the first application scenarios Under the first fingerprint recognition errors number, second application scenarios and first application scenarios are relatively independent;Described first LockOut mode is the Lockout mode that mobile terminal android operating system carries, and the 2nd LockOut mode is institute It states mobile terminal manufacturer self-setting or as an APP, is voluntarily downloaded by user, installation is on the mobile terminal; Under first application scenarios, when continuous fingerprint recognition errors number reaches the first specified fingerprint recognition errors number, then Forbid carrying out fingerprint recognition operation under first application scenarios, it could be in first application scenarios after needing to wait for a period of time Lower progress fingerprint recognition operation carries out fingerprint recognition operation at the same time under second application scenarios;Similarly, in institute It states under the second application scenarios, continuous fingerprint recognition errors number reaches the second specified fingerprint recognition errors number, then forbids Fingerprint recognition operation is carried out under second application scenarios, needs to wait for a period of time, it could be again under second application scenarios Fingerprint recognition operation is carried out, at the same time, additionally it is possible under the first application scenarios, carry out fingerprint recognition operation;Described first answers It is the different application scene of different applications or same application with scene and the second application scenarios;
If the second fingerprint recognition errors number reaches preset threshold, forbid carrying out fingerprint knowledge under second application scenarios It does not operate.
2. the method according to claim 1, wherein described forbid carrying out fingerprint knowledge under second application scenarios It does not operate, comprising:
Forbid carrying out fingerprint recognition operation under second application scenarios within a preset period of time.
3. the method according to any one of claims 1 and 2, which is characterized in that pass through the 2nd LockOut mode prison described It surveys before the second fingerprint recognition errors number under the second application scenarios, the method also includes:
Obtain current finger print application;
It obtains and applies the corresponding preset threshold with the current finger print.
4. according to the method described in claim 3, it is characterized in that, forbidding carrying out fingerprint under second application scenarios described After identification operation, the method also includes:
It applies in the current finger print to be specified in application, the display interface in mobile terminal shows default unlock interface.
5. according to the method described in claim 4, it is characterized in that, the display interface in mobile terminal shows default unlock After interface, the method also includes:
The target unlocking information in the default unlock interface input is obtained, in the target unlocking information and default unlocking information It when matching, is unlocked, and lifts a ban progress fingerprint recognition operation under second application scenarios.
6. a kind of mobile terminal characterized by comprising
Monitoring unit, for passing through the second fingerprint recognition errors number under the 2nd the second application scenarios of LockOut mode monitoring, The 2nd LockOut mode is independently of the first LockOut mode, wherein the first LockOut mode is for monitoring first The first fingerprint recognition errors number under application scenarios, second application scenarios and first application scenarios are relatively independent; The first LockOut mode is the Lockout mode that mobile terminal android operating system carries, the 2nd LockOut Mode is voluntarily downloaded by user for the mobile terminal manufacturer self-setting or as an APP, is mounted on the movement In terminal;Under first application scenarios, continuous fingerprint recognition errors number reaches the first specified fingerprint recognition mistake time Number when, then forbid under first application scenarios carry out fingerprint recognition operation, after needing to wait for a period of time could this first Fingerprint recognition operation is carried out under application scenarios, at the same time, fingerprint recognition operation is carried out under second application scenarios;Equally Ground, under second application scenarios, continuous fingerprint recognition errors number reaches the second specified fingerprint recognition errors number, then Forbid carrying out fingerprint recognition operation under second application scenarios, needs to wait for a period of time, it could be again in second application Fingerprint recognition operation is carried out under scene, at the same time, additionally it is possible under the first application scenarios, carry out fingerprint recognition operation;It is described First application scenarios are different applications or the different application scene of same application from the second application scenarios;
Control unit forbids second applied field if reach preset threshold for the second fingerprint recognition errors number Fingerprint recognition operation is carried out under scape.
7. mobile terminal according to claim 6, which is characterized in that described control unit is specifically used for:
Forbid carrying out fingerprint recognition operation under second application scenarios within a preset period of time.
8. the described in any item mobile terminals of according to claim 6 or 7, which is characterized in that the mobile terminal further include:
First acquisition unit, it is described by the 2nd the second applied field of LockOut mode monitoring for being executed in the monitoring unit Before the second fingerprint recognition errors number under scape, current finger print application is obtained;
The first acquisition unit also particularly useful for:
It obtains and applies the corresponding preset threshold with the current finger print.
9. mobile terminal according to claim 8, which is characterized in that the mobile terminal further include:
Display unit carries out fingerprint recognition operation for forbidding described in executing in described control unit under second application scenarios Later, it applies in the current finger print to be specified in application, the display interface in mobile terminal shows default unlock interface.
10. mobile terminal according to claim 9, which is characterized in that the mobile terminal further include:
Second acquisition unit shows default unlock circle for executing the display interface in mobile terminal in the display unit After face, the target unlocking information in the default unlock interface input is obtained,
Described control unit, also particularly useful for:
It when the target unlocking information is matched with default unlocking information, is unlocked, and lifts a ban under second application scenarios Carry out fingerprint recognition operation.
11. a kind of mobile terminal characterized by comprising
Processor and memory;Wherein, the processor is by calling the code in the memory or instructing to execute such as power Benefit requires method described in 1 to 5 any one.
CN201710180499.2A 2017-03-23 2017-03-23 A kind of solution lock control method and mobile terminal Active CN107423598B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710180499.2A CN107423598B (en) 2017-03-23 2017-03-23 A kind of solution lock control method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710180499.2A CN107423598B (en) 2017-03-23 2017-03-23 A kind of solution lock control method and mobile terminal

Publications (2)

Publication Number Publication Date
CN107423598A CN107423598A (en) 2017-12-01
CN107423598B true CN107423598B (en) 2019-10-11

Family

ID=60423520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710180499.2A Active CN107423598B (en) 2017-03-23 2017-03-23 A kind of solution lock control method and mobile terminal

Country Status (1)

Country Link
CN (1) CN107423598B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108302238A (en) * 2018-02-08 2018-07-20 新智数字科技有限公司 A kind of control method and device of gas meter valve
CN108616659A (en) * 2018-04-13 2018-10-02 深圳市沃特沃德股份有限公司 Using startup method and device
CN109343691A (en) * 2018-08-28 2019-02-15 维沃移动通信有限公司 A kind of control method and mobile terminal of mobile terminal
CN109829279B (en) * 2019-01-11 2021-05-07 Oppo广东移动通信有限公司 Unlocking event processing method and related equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203012A (en) * 2016-06-22 2016-12-07 中国联合网络通信集团有限公司 The processing method of screen locking, device and equipment
CN106354410A (en) * 2016-08-26 2017-01-25 广东欧珀移动通信有限公司 Method, device and terminal equipment for appliance control
CN106446786A (en) * 2016-08-30 2017-02-22 广东欧珀移动通信有限公司 Fingerprint identifying method, fingerprint identifying apparatus and terminal device
CN106446652A (en) * 2016-09-13 2017-02-22 青岛海信移动通信技术股份有限公司 Mobile terminal unlocking method and mobile terminal unlocking device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203012A (en) * 2016-06-22 2016-12-07 中国联合网络通信集团有限公司 The processing method of screen locking, device and equipment
CN106354410A (en) * 2016-08-26 2017-01-25 广东欧珀移动通信有限公司 Method, device and terminal equipment for appliance control
CN106446786A (en) * 2016-08-30 2017-02-22 广东欧珀移动通信有限公司 Fingerprint identifying method, fingerprint identifying apparatus and terminal device
CN106446652A (en) * 2016-09-13 2017-02-22 青岛海信移动通信技术股份有限公司 Mobile terminal unlocking method and mobile terminal unlocking device

Also Published As

Publication number Publication date
CN107423598A (en) 2017-12-01

Similar Documents

Publication Publication Date Title
CN106126015B (en) A kind of application program launching control method and terminal
CN105912918B (en) A kind of unlocked by fingerprint method and terminal
CN106778175B (en) Interface locking method and device and terminal equipment
CN105975833B (en) A kind of unlocked by fingerprint method and terminal
CN106453511B (en) A kind of data back up method and equipment
CN106203290B (en) A kind of fingerprint image acquisition method and terminal
CN107219976A (en) Application display method and related product
CN107423598B (en) A kind of solution lock control method and mobile terminal
CN106446841B (en) A kind of fingerprint template matching order update method and terminal
CN107016337B (en) A kind of fingerprint identification method and mobile terminal
CN105912919B (en) A kind of unlocked by fingerprint method and terminal
CN104077184B (en) A kind of course control method and computer system of application program
CN106951850A (en) The method and mobile terminal of a kind of control fingerprint recognition module
CN107025395A (en) A kind of fingerprint identification method and mobile terminal
CN106375582B (en) Vibration control method and device
CN106874725A (en) A kind of unlocked by fingerprint method and mobile terminal
CN107276602B (en) Radio frequency interference processing method, device, storage medium and terminal
CN104407804A (en) Screen capturing method and screen capturing device as well as electronic device
CN106445721B (en) The method and mobile terminal of house dog fault-tolerant processing
CN106022058A (en) Fingerprint unlocking method and terminal
CN108668328A (en) A kind of method for switching network and mobile terminal
CN110147186A (en) A kind of control method and terminal device of application
CN107066374B (en) Data processing method and mobile terminal
CN107066860B (en) A kind of fingerprint identification method and mobile terminal
CN106648460B (en) Step counting data filtering method and intelligent terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant