CN108763905A - A kind of object processing method and terminal device - Google Patents

A kind of object processing method and terminal device Download PDF

Info

Publication number
CN108763905A
CN108763905A CN201810541151.6A CN201810541151A CN108763905A CN 108763905 A CN108763905 A CN 108763905A CN 201810541151 A CN201810541151 A CN 201810541151A CN 108763905 A CN108763905 A CN 108763905A
Authority
CN
China
Prior art keywords
fingerprint
touch
target object
input
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810541151.6A
Other languages
Chinese (zh)
Other versions
CN108763905B (en
Inventor
谢锦洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810541151.6A priority Critical patent/CN108763905B/en
Publication of CN108763905A publication Critical patent/CN108763905A/en
Application granted granted Critical
Publication of CN108763905B publication Critical patent/CN108763905B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Image Input (AREA)

Abstract

The embodiment of the invention discloses a kind of object processing method and terminal devices, are related to field of communication technology, and the method to solve the problems, such as encryption or decryption in the prior art be easy to cause password leakage.This method includes:Receive first touch-control input of the user on encrypted target object;It is inputted in response to first touch-control, the target object after display decryption;Wherein, the N number of fingerprint subregion and the first fingerprint input sequence which is inputted are for this, encrypted target object decryption, N to be the integer more than 1.The program is applied particularly to that target object is encrypted in the scene of decryption processing.

Description

A kind of object processing method and terminal device
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of object processing methods and terminal device.
Background technology
With the continuous development of terminal technology, the application of terminal device is more and more extensive.User can be on the terminal device Some applications with financial function, such as mobile payment, stored value card etc. are installed;User can also store one on the terminal device A little important informations or individual privacy.
At present, it is generally the case that user can use the methods of numerical password the data in terminal device are encrypted or Decryption, but the method for this encryption or decryption is easy to be guessed or plagiarized by other people to arrive, thus this encryption or decryption Method be easy to cause password leakage.
Invention content
A kind of object processing method of offer of the embodiment of the present invention and terminal device, to solve encryption in the prior art or solution Close method be easy to cause the problem of password leakage.
In order to solve the above-mentioned technical problem, the invention is realized in this way:
In a first aspect, an embodiment of the present invention provides a kind of object processing method, this method includes:
Receive first touch-control input of the user on encrypted target object;
It is inputted in response to first touch-control, the target object after display decryption;
Wherein, the N number of fingerprint subregion and the first fingerprint input sequence which is inputted are for having added this Close target object decryption, N are the integer more than 1.
Second aspect, an embodiment of the present invention provides a kind of terminal device, which includes:Receiving module and display Module;
The receiving module, for receiving first touch-control input of the user on encrypted target object;
The display module, first touch-control for being received in response to the receiving module input, the mesh after display decryption Mark object;
Wherein, the N number of fingerprint subregion and the first fingerprint input sequence which is inputted are used for the target Object is decrypted, and N is the integer more than 1.
The third aspect an embodiment of the present invention provides a kind of terminal device, including processor, memory and is stored in this and deposits On reservoir and the computer program that can run on the processor, such as first is realized when which is executed by the processor The step of object processing method in aspect.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, is realized such as the object processing method in first aspect when which is executed by processor Step.
In embodiments of the present invention, it can be inputted by receiving first touch-control of the user on encrypted target object; It is inputted in response to first touch-control, the target object after display decryption;Wherein, N number of finger which is inputted Line subregion and the first fingerprint input sequence are used to decrypt the target object, and N is the integer more than 1.In the program, in fingerprint Under the premise of uniqueness, then by using multiple fingerprint subregions, and combine the first fingerprint input for inputting multiple fingerprint subregion Target object is decrypted in sequence, due to other people it is difficult to know user uses which fingerprint subregion and the first fingerprint Input sequence, therefore the program cannot be easily caused the leakage of clear crytpographic key, even if other people can be successfully, reproduced the fingerprint of user also very Target object is decrypted in difficulty, so as to improve the safety of user data.
Description of the drawings
Fig. 1 is the configuration diagram of Android operation system provided in an embodiment of the present invention;
Fig. 2 is one of the flow chart of object processing method provided in an embodiment of the present invention;
Fig. 3 is one of the schematic diagram at interface of object processing method provided in an embodiment of the present invention;
Fig. 4 is the two of the schematic diagram at the interface of object processing method provided in an embodiment of the present invention;
Fig. 5 is the three of the schematic diagram at the interface of object processing method provided in an embodiment of the present invention;
Fig. 6 is the four of the schematic diagram at the interface of object processing method provided in an embodiment of the present invention;
Fig. 7 is the five of the schematic diagram at the interface of object processing method provided in an embodiment of the present invention;
Fig. 8 is the two of the flow chart of object processing method provided in an embodiment of the present invention;
Fig. 9 is the three of the flow chart of object processing method provided in an embodiment of the present invention;
Figure 10 is the four of the flow chart of object processing method provided in an embodiment of the present invention;
Figure 11 is the five of the flow chart of object processing method provided in an embodiment of the present invention;
Figure 12 is the six of the flow chart of object processing method provided in an embodiment of the present invention;
Figure 13 is the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Figure 14 is the hardware schematic of terminal device provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Term " first ", " second ", " third " and " the 4th " in description and claims of this specification etc. is to use In the different object of difference, rather than for the particular order of description object.For example, the first touch-control inputs, the second touch-control inputs, Third inputs and the 4th input etc. is particular order for distinguishing different inputs, rather than for describe to input.
In embodiments of the present invention, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This Be described as in inventive embodiments " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " plurality " is refer to two or more, For example, multiple processing units refer to two or more processing unit;Multiple element refers to two or more Element etc..
Clockwise direction, counter clockwise direction in the embodiment of the present invention, it is upper and lower, left and it is right etc. be with user at end Illustrated for inputting on the display screen of end equipment, i.e., clockwise, counterclockwise, it is upper and lower, left and It is right it is equal be the input phase with user on the display screen of terminal device for the display screen of terminal device or terminal device and Speech.
A kind of object processing method of offer of the embodiment of the present invention and terminal device, can be encrypted by receiving user The first touch-control input on target object;It is inputted in response to first touch-control, the target object after display decryption;Wherein, should The N number of fingerprint subregion and the first fingerprint input sequence that first touch-control is inputted be used for the target object decrypt, N be more than 1 integer.In the program, under the premise of the uniqueness of fingerprint, then by using multiple fingerprint subregions, and it is more in conjunction with this is inputted Target object is decrypted in first fingerprint input sequence of a fingerprint subregion, due to other people it is difficult to know which user uses Several fingerprint subregions and the first fingerprint input sequence, therefore the program cannot be easily caused the leakage of clear crytpographic key, even if other people The fingerprint that user can be successfully, reproduced also is difficult to that target object is decrypted, so as to improve the safety of user data.
Terminal device in the embodiment of the present invention can be the terminal device with operating system.The operating system can be Android (Android) operating system can be ios operating systems, can also be other possible operating systems, and the present invention is implemented Example is not especially limited.
Below by taking Android operation system as an example, introduce what object processing method provided in an embodiment of the present invention was applied Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system operation library layer and Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation of the frame in accordance with application program In the case of principle, some application programs are developed based on application framework layer.
System operation library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour All kinds of resources needed for it are provided as system.Android operation system running environment is used to provide software loop for Android operation system Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The software program of object processing method provided in an embodiment of the present invention is realized in the system architecture of operating system, exploitation, so that The object processing method can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal can by The software program is run in Android operation system realizes object processing method provided in an embodiment of the present invention.
Terminal device in the embodiment of the present invention can be mobile terminal device, or immobile terminal equipment.It moves Dynamic terminal device can be mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device, super shifting Dynamic personal computer (ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal digital assistant, PDA) etc.;Immobile terminal equipment can be personal computer (personal Computer, PC), television set (television, TV), automatic teller machine or self-service machine etc.;The embodiment of the present invention does not limit specifically It is fixed.
The executive agent of object processing method provided in an embodiment of the present invention can be (including the movement of above-mentioned terminal device Terminal device and immobile terminal equipment), or the function mould of the object processing method can be realized in the terminal device Block and/or functional entity can specifically determine that the embodiment of the present invention is not construed as limiting according to actual use demand.Below with end For end equipment, object processing method provided in an embodiment of the present invention is illustratively illustrated.
It should be noted that:In embodiments of the present invention, terminal device can be to file, picture, character string, screen, short Letter, message registration, game, on-line payment, video etc. are encrypted or decrypt.Object processing method provided in an embodiment of the present invention It is mainly used in comprehensive screen terminal device using the lower fingerprint of screen.
Refering to what is shown in Fig. 2, an embodiment of the present invention provides a kind of object processing method, this method may include following step Rapid 101- steps 102.
Step 101, terminal device receive first touch-control input of the user on encrypted target object.
Specifically, terminal device receives first touch-control input of the user on the encrypted target object of target interface.
Target object is file, picture, character string (sensitive vocabulary or private information in document etc.), screen, short message, leads to Record, game, on-line payment, video etc. are talked about, the embodiment of the present invention is not construed as limiting.
In embodiments of the present invention, the input of the first touch-control can be specifically the first finger having added in target interface of user Touch-control input on close target object.Wherein, above-mentioned target interface can be that any interface in terminal device is (e.g., whole The main interface of end equipment, the interface in a certain application program of terminal device).
Wherein, first touch-control input to terminal device for inputting N number of fingerprint subregion and the first fingerprint input sequence, N For the integer more than 1.Each first fingerprint subregion is partial fingerprints region or whole finger-print regions in a fingerprint, this first Fingerprint input sequence is the sequence for inputting N number of fingerprint subregion.
In embodiments of the present invention, the first touch-control input can once be inputted;Can also be multiple son input, such as often Second son input can be optional touch input;Inventive embodiments are not construed as limiting.Optionally, which, which inputs, includes:User The first finger first area on encrypted target object pressing input, the first area be first finger portion Point or all fingers region;It wherein, should in the first area of first finger during being pressed on encrypted target object Touch-control input further includes the rotation input that user rotates first finger.During pressing, the corresponding fingerprint in the first area Subregion can change, then terminal device can collect at least two fingerprint subregions.And in order to avoid user is in terminal device On erroneous input (such as in the first touch-control input process, cause to hit input by overdue because user's finger leaves display screen Open APP etc.), during above-mentioned first touch-control inputs, finger is remained with display screen and is contacted, without departing from display screen, The region that only finger is contacted with display screen changes.Above-mentioned the first touch-control input, once can just input multiple fingerprints Subregion inputs multiple fingerprint subregions relative to the multiple son input of multiple fingers, easy to operate, and user is not easy to forget.
Illustratively, the fingerprint of the first finger can be divided into left, center, right three parts or upper, middle and lower three parts, then it is first-hand The fingerprint subregion of finger can be that the first fingerprint subregion 01, the second fingerprint subregion 02, the third fingerprint subregion the 03, the 4th in Fig. 3 refer to Line subregion 04 or the 5th fingerprint subregion 05 can also divide the fingerprint of the first finger according to other methods, then fingerprint subregion Fingerprint subregion as shown in figure 3 is different, and the embodiment of the present invention is not construed as limiting.Fingerprint subregion in the embodiment of the present invention can be used Some or all of family finger finger-print region.
Illustratively, the touch-control that the input of the first touch-control can be inputted, be rotated down for the touch-control that user's finger is rotated up The touch-control input input, to turn left or the touch-control input etc. to turn right.If the first touch-control inputs as user's finger to the left The touch-control of rotation inputs, and originates the right area that first area is the first fingerprint, then the fingerprint subregion of terminal device acquisition according to Secondary is the 5th fingerprint subregion 05, the second fingerprint subregion 02 and the 4th fingerprint subregion 04.If the first touch-control input be user's finger to The touch-control of upper rotation inputs, and originates the intermediate region that first area is the first fingerprint, then the fingerprint subregion of terminal device acquisition It is followed successively by the second fingerprint subregion 02 and the first fingerprint subregion 01.
Optionally, which, which inputs, to include:Click pressing of the user on encrypted target object is defeated Enter.For example, click pressing input of the right area of the fingerprint of the first finger of user on encrypted target object, then eventually The fingerprint subregion of end equipment acquisition is the 5th fingerprint subregion 05.
If N number of fingerprint subregion belongs to the fingerprint of the same finger, and N is smaller, such as N is equal to 2-4 etc., then the first fingerprint is defeated Enter sequence can be left, center, right, it is right in it is left, it is middle left etc..If N number of fingerprint subregion belongs to the fingerprint of different fingers, and N is larger, then may be used To be numbered to collected fingerprint according to the acquisition order of fingerprint subregion, such as number is 1,2,3...... or a, b, C...... etc., then the first fingerprint input sequence is 1,2,3...... or a, b, c...... etc..
The N number of fingerprint subregion and the first fingerprint input sequence that first touch-control is inputted are used for the target object solution It is close, if to the target object successful decryption, execute following steps 102;Otherwise display reminding information on the terminal device, should Prompt message please be re-entered for prompting fingerprint input error.
Step 102 is inputted in response to first touch-control, the target object after terminal device display decryption.
Illustratively, refering to what is shown in Fig. 4, the first of encrypted APP5 of the terminal device reception user in main interface touches Control input, the input of the first touch-control is the touch-control input that user's finger turns right, and originates the left side that first area is the first fingerprint Side region.Then terminal device collects the 4th fingerprint subregion 04 as shown in the figure, the second fingerprint subregion 02 and the 5th fingerprint successively Subregion 05, the first fingerprint input sequence are from left to right.It is inputted in response to first touch-control, terminal device is shown as shown in Figure 5 Decryption after APP5.
Optionally, first touch-control input includes the input of n times, which is the K, and encrypted characters string, K are Integer more than or equal to 1, and K is less than or equal to N.Step 101 can specifically pass through following step 101a realizations, step 102 can specifically be realized by following step 102a.
Step 101a, terminal device receives n times input of the user on K encrypted characters string.
The K character string is determined as the target object of unencryption by terminal device, i.e., terminal device according to user's input come Determine target object.
Each character string can be that a character or multiple characters, the embodiment of the present invention are not construed as limiting.
If K is 1, n times input of the user on 1 encrypted characters string is received;If K is the integer more than 1, and K Equal to N, then second son input of the user in each character string in K encrypted characters string is received;If K is whole more than 1 Number, and K is less than N, then receives at least once son input of the user in each character string in K encrypted characters string.
A encrypted characters strings of K can be continuous, and can also be discontinuous, the embodiment of the present invention is not construed as limiting.
Step 102a, K character string after terminal device display decryption.
K character string after decryption is K character string of unencryption.
In the above method, user can simultaneously decrypt multiple encrypted character strings, compared to one character string, one The method of the decryption of character string, it is easy to operate.
Refering to what is shown in Fig. 6, terminal device receives the of encrypted character string of the user on the interface that e-book is applied One touch-control inputs, and the input of the first touch-control is the touch-control input that user's finger turns right, and it is the first fingerprint to originate first area Intermediate region.Then terminal device collects the second fingerprint subregion 02 and the 5th fingerprint subregion 05 as shown in the figure successively, and first Fingerprint input sequence is from left to right.Character string (i.e. the character string of unencryption) after terminal device display decryption, as added in Fig. 7 Thick word.
Illustratively, in conjunction with Fig. 2, as shown in figure 8, before step 102, object handles side provided in an embodiment of the present invention Method can also include following step 103- steps 105.
Step 103, terminal device obtain N number of fingerprint subregion and the first fingerprint input sequence.
In the embodiment of the present invention, terminal device can pass through the technical limit spacings fingerprint subregion such as fingerprint identification technology.
Illustratively, the process of fingerprint identification technology is usually:Fingerprint is acquired by special fingerprint acquisition device first Secondly image carries out a series of image procossing to the fingerprint image after acquisition, to treated, fingerprint image refers to again Line feature extraction, you can to obtain target fingerprint subregion.Specific fingerprint image acquisition, fingerprint image treatment technology, fingerprint are special Existing the relevant technologies can be referred to by levying extractive technique etc., and it will not go into details for the embodiment of the present invention.
Optionally, if terminal device is the terminal device shielded comprehensively, terminal device can pass through the lower fingerprint identification area of screen Domain determines the first fingerprint input sequence to acquire N number of fingerprint subregion according to the sequence for acquiring N number of fingerprint subregion.
Step 104 (optional), terminal device verify N number of fingerprint subregion and preset decryption fingerprint subregion whether phase Match, whether which is preset input sequence.
Preset decryption fingerprint subregion is N number of preset decryption fingerprint subregion, and preset input sequence is preset decryption Sequentially.
Preset decryption sequence and N number of preset decryption fingerprint subregion be respectively the decryption sequence preserved in terminal device and Decrypt fingerprint subregion.The preset decryption sequence and N number of preset decryption fingerprint subregion are that terminal device is acquired and protected in advance It deposits.
Illustratively, user can advance typing complete finger print on the terminal device.As shown in figure 8, user's typing index finger Fingerprint, system can detect left and right, the upper and lower edge fingerprint subregion and intermediate region fingerprint of user's right hand index fingerprint respectively The whether effective typing of subregion, if which subregion fingerprint typing not yet in effect, terminal device can prompt user to re-type.Such as it is left The not successful typing of edge fingerprint subregion, then the standby display reminding information in current interface of terminal, prompt message are " please to record again Enter left hand edge fingerprint subregion ".
Preset decryption sequence can be that user sets in " decryption setting " according to self-demand.
Optionally, which can be matched with preset decryption sequence.If first fingerprint Input sequence is identical as preset decryption sequence, then the first fingerprint input sequence meets preset decryption sequence;If this first Fingerprint input sequence is differed with preset decryption sequence, then the first fingerprint input sequence does not meet preset decryption sequence.
Optionally, which can be matched with N number of preset decryption fingerprint subregion.If N number of fingerprint point Area is identical with N number of preset decryption fingerprint subregion, alternatively, the similarity of N number of fingerprint subregion and N number of preset decryption fingerprint subregion More than or equal to preset threshold value, for example, the preset threshold value can be 95%, i.e., if N number of fingerprint subregion and N number of default Decryption fingerprint subregion similarity be more than or equal to 95%, then illustrate that N number of fingerprint subregion meets N number of preset decryption Fingerprint subregion;Otherwise illustrate that N number of fingerprint subregion does not meet N number of preset decryption fingerprint subregion.
Match with preset decryption fingerprint subregion in N number of fingerprint subregion and the first fingerprint input sequence is preset In the case of input sequence, following steps 105 is executed;Otherwise display reminding information, the prompt message are used on the terminal device In prompt fingerprint input error, please re-enter.
It should be noted that:During specific implementation, the number of verification can be set, if after multiple authentication failure, eventually End equipment can unlock the decryption to the target object again by the decryption function locking of target object after preset duration Function, and can notify user by showing notification message on the terminal device.
Encrypted target object has been decrypted to this for step 105, terminal device.
Match with preset decryption fingerprint subregion in N number of fingerprint subregion and the first fingerprint input sequence is preset In the case of input sequence, to this, encrypted target object has been decrypted terminal device.
Illustratively, which can specifically be realized by following step 105a or step 105b.
Step 105a, terminal device is decrypted the target object using preset clear crytpographic key.
Preset clear crytpographic key is set when can be terminal device manufacture, can also be terminal device " decryption is set Set " in set according to self-demand.The embodiment of the present invention is not construed as limiting.Specifically use preset clear crytpographic key to the target The process that object is decrypted can refer to existing the relevant technologies, and it will not go into details herein.
Step 105b, terminal device using the first fingerprint input sequence and N number of fingerprint subregion as clear crytpographic key to this Target object is decrypted.
The preset decryption sequence and N number of preset decryption fingerprint subregion are to add when the target object is encrypted Password.I.e. the preset decryption sequence is the second fingerprint input sequence (fingerprint input sequence when encryption), this is N number of preset Decryption fingerprint subregion is a fingerprint subregions of M (N=M) (fingerprint subregion when encryption).
In this scenario, N number of fingerprint subregion is identical as M fingerprint subregion (N=M), and the first fingerprint input sequence and Two fingerprint input sequences are identical.
In the program, terminal device can be using the first fingerprint input sequence and N number of fingerprint subregion as clear crytpographic key The target object is decrypted.Specific decryption technology etc. can refer to existing the relevant technologies, and it will not go into details herein.
The method of above-mentioned steps 103- steps 105 can effectively improve the safety of user data.
Illustratively, in conjunction with Fig. 8, as shown in figure 9, before step 101, object handles side provided in an embodiment of the present invention Method can also include following step 106- steps 107.
Step 106, terminal device receive second touch-control input of the user on the target object of unencryption.
Wherein, which, which inputs, includes:Target object of the second area of the second finger of user in the unencryption On pressing input, which is some or all of second finger finger areas;Wherein, the of the second finger During being pressed on the target object of the unencryption, touch-control input further includes that user rotates turning for the second finger in two regions Dynamic input.
Description to the input of the second touch-control can specifically refer to the associated description inputted to the first touch-control in step 101, this Place repeats no more.
Step 107, terminal device are inputted in response to second touch-control, show the encrypted target object.
Illustratively, above-mentioned steps 106- steps 107 can specifically be realized by following step 106a and step 107a.
Step 106a, M second son touch-control input of the user in K character string is received.
The K character string is determined as to the target object of the unencryption.
The associated description of above-mentioned steps 101a can be referred to by specifically describing, and details are not described herein again.
Step 107a, the encrypted K character string is shown.
Wherein, second touch-control input includes M second son touch-controls input, and K is integer more than or equal to 1, and K be less than or Equal to M.
The associated description of above-mentioned steps 102a can be referred to by specifically describing, and details are not described herein again.
The method of above-mentioned steps 106- steps 107 can effectively improve the safety of user data.
Illustratively, in conjunction with Fig. 9, as shown in Figure 10, before step 107, object handles provided in an embodiment of the present invention Method can also include following step 108- steps 109.
Step 108, terminal device obtain M inputted fingerprint subregion of second touch-control input and the input of the second fingerprint is suitable Sequence.
In this scenario, the M fingerprint subregion that the N number of fingerprint subregion obtained in above-mentioned steps 103 is obtained with this step can It, can not also be identical with identical;The second fingerprint that the first fingerprint input sequence obtained in above-mentioned steps 103 is obtained with this step Input sequence can be identical, can not also be identical, specifically, being set according to actual demand, the embodiment of the present invention is not construed as limiting.
The target object of the unencryption is encrypted in step 109, terminal device.
Based on the M fingerprint subregion and the second fingerprint input sequence, terminal device to the target object of the unencryption into Row encryption, M are the integer more than 1.
Illustratively, this step can be realized by following step 109a- steps 109b or step 109c.
Step 109a (optional), terminal device verify the second fingerprint input sequence whether meet it is preset encryption it is suitable Sequence, and whether the M fingerprint subregion meets M preset cryptographic fingerprint subregions.
Preset encryption order and the M preset cryptographic fingerprint subregions are respectively that the encryption that is preserved in terminal device is suitable Sequence and cryptographic fingerprint subregion.The preset encryption order and the M preset cryptographic fingerprint subregions are that terminal device is advance It acquires and preserves.Gatherer process can refer to the associated description of above-mentioned steps 104, and details are not described herein again.Preset encryption is suitable Sequence can be that user sets in " encryption setting " according to self-demand.At this moment M preset cryptographic fingerprint subregions and N number of pre- If decryption fingerprint subregion may be the same or different;Preset encryption order and preset decryption sequence can be identical, It can be different.
Optionally, which can be matched with preset encryption order.If first fingerprint Input sequence is identical as preset encryption order, then the first fingerprint input sequence meets preset encryption order;If this first Fingerprint input sequence is differed with preset encryption order, then the first fingerprint input sequence does not meet preset encryption order.
Optionally, which can be matched with M preset cryptographic fingerprint subregions.If M fingerprint point Area is identical with M preset cryptographic fingerprint subregions, alternatively, the similarity of M fingerprint subregion and M preset cryptographic fingerprint subregions More than or equal to preset threshold value, for example, the preset threshold value can be 95%, i.e., if M fingerprint subregion and M are a default The similarity of cryptographic fingerprint subregion be more than or equal to 95%, then illustrate that the M fingerprint subregion meets a preset encryptions of the M Fingerprint subregion;Otherwise illustrate that the M fingerprint subregion does not meet the M preset cryptographic fingerprint subregions.
If verification result, which is the first fingerprint input sequence, meets preset encryption order, and N number of fingerprint subregion meets M Preset cryptographic fingerprint subregion then executes following step 109b;Otherwise it returns and executes above-mentioned step 106, resurvey M Fingerprint subregion, and determine the first fingerprint input sequence.
It should be noted that:During specific implementation, the number of verification can be set, if after multiple authentication failure, eventually End equipment can will lock the encryption function of target object, unlock the encryption to the target object again after preset duration Function, and can notify user by showing notification message on the terminal device.
Step 109b, terminal device is encrypted the target object using preset Crypted password.
Meet preset encryption order in the first fingerprint input sequence, and the M fingerprint subregion meet M it is preset plus In the case of close fingerprint subregion, terminal device is encrypted the target object using preset Crypted password.Preset encryption Password is set when can be terminal device manufacture, can also be that terminal device is set in " encryption setting " according to self-demand Fixed.The embodiment of the present invention is not construed as limiting.The process that specifically target object is encrypted using preset Crypted password Existing the relevant technologies can be referred to, it will not go into details herein.
The ciphering process of above-mentioned steps 109a- steps 109b is corresponding with the decrypting process of above-mentioned steps 105a.
Step 109c, terminal device using the second fingerprint input sequence and the M fingerprint subregion as Crypted password to this Target object is encrypted.
In the program, terminal device can be using the second fingerprint input sequence and the M fingerprint subregion as Crypted password The target object is encrypted.At this moment the second fingerprint input sequence is identical as the first fingerprint input sequence, the M fingerprint point Area is identical as N number of fingerprint subregion.The decrypting process of the ciphering process of step 109c and above-mentioned step 105b inverse process each other.Tool Encryption technology of body etc. can refer to existing the relevant technologies, and it will not go into details herein.
After the target object is encrypted, object processing method provided in an embodiment of the present invention can also include: Encryption identification is shown on target object, which is used to indicate the target object and has encrypted.Encryption identification can be one The symbol of a small lock, for indicating to have encrypted;Encryption identification can also be others, can specifically be set according to actual demand Fixed, the embodiment of the present invention is not construed as limiting.
Illustratively, after the APP5 in Fig. 5 being encrypted, after showing encryption as shown in Figure 4 on the terminal device APP5;After character string in Fig. 7 is encrypted, encrypted character string as shown in FIG. 6 is shown on the terminal device.
Optionally, if terminal device is the non-terminal device shielded, as in the front of terminal device, the back side or side comprehensively Terminal device provided with fingerprint identification module, then terminal device can acquire M fingerprint subregion by fingerprint identification module, And the first fingerprint input sequence is determined according to the sequence for acquiring the M fingerprint subregion.
It should be noted that:In embodiments of the present invention, fingerprint identification module refers to being arranged on non-comprehensive screen terminal device Fixed position fingerprint collecting region.
The method of above-mentioned steps 108- steps 109 can effectively improve the safety of user data.
Illustratively, above-mentioned ciphering process terminal device acquires M fingerprint partition information, and determines that the input of the second fingerprint is suitable The process of sequence is described in detail below.
In response to the first input of the user that receives on the region for showing the target object, terminal device shows first Interface.
First interface is for prompting user to input the M fingerprint subregion.
The program is primarily directed to non-comprehensive screen terminal device setting.The M fingerprint subregion can be a fingerprint In M partial fingerprints information, or the information of M partial fingerprints in multiple fingerprints, specifically can be according to reality Situation is set, and the embodiment of the present invention is not construed as limiting.
First input can be clicking operation of the user on the region for showing the target object, or user is aobvious Show the rotation operation on the region of the target object, or other feasibilities operation of the user on first interface, tool Body can determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
Illustratively, above-mentioned clicking operation can be the clicking operation of long-press, that is, click the time more than or equal to preset The operation of time;Above-mentioned rotation operation, for example, can be to be rotated up, rotate down, turn left or turn right, Can be specifically the of the finger of user on from the first position on the display screen of terminal device to the display screen of terminal device The rotation of two positions operates.
First input can be once to input, such as an input terminal equipment directly displays the first interface;First input Can also be to input twice, a such as input terminal equipment popup menu has the options such as encryption, decryption in menu, again The Encryption Options in user's selection menu are inputted, terminal device shows the first interface;First input can also input more times, Depending on actual conditions, the embodiment of the present invention is not construed as limiting.
First interface is for prompting user to input the M fingerprint subregion.Optionally, the first interface can display reminding Information;First interface can be with display reminding information and display fingerprint image etc., and the embodiment of the present invention is not construed as limiting.Prompt message It can be " M fingerprint subregion please be input ", " encryption information please be input " etc., can specifically set according to actual needs, the present invention Embodiment is not construed as limiting.
In response to the second input of the user that receives on fingerprint identification module, terminal device acquires the M fingerprint and divides Area, and determine the first fingerprint input sequence.
Second input can be clicking operation of the user on fingerprint identification module, or user is in fingerprint recognition mould Slide on block, or other feasibilities operation of the user on fingerprint identification module, it specifically can be according to reality Border use demand determines that the embodiment of the present invention is not construed as limiting.
Illustratively, above-mentioned clicking operation can be single-click operation etc..Above-mentioned slide can be to any direction Slide, such as upward sliding, slide downward, slide or slide to the right to the left.
Illustratively, above-mentioned decrypting process terminal device acquires N number of fingerprint partition information, and determines that the input of the first fingerprint is suitable The process of sequence is described in detail below.
In response to the third input of the user that receives on the region for showing the target object, terminal device shows first Interface.
First interface is for prompting user to input N number of fingerprint subregion.
Above-mentioned associated description can be referred to by specifically describing, and details are not described herein again.
In response to the 4th input of the user that receives on fingerprint identification module, terminal device acquires N number of fingerprint point Area, and determine the second fingerprint input sequence.
The embodiment of the present invention provides a kind of object processing method, can be by receiving user on encrypted target object The first touch-control input;It is inputted in response to first touch-control, the target object after display decryption;Wherein, first touch-control is defeated Enter the N number of fingerprint subregion inputted and the first fingerprint input sequence is used to decrypt the target object, N is the integer more than 1.It should In scheme, under the premise of the uniqueness of fingerprint, then by using multiple fingerprint subregions, and combines and input multiple fingerprint subregion The first fingerprint input sequence target object is decrypted, due to other people it is difficult to know that user uses which fingerprint point Area and the first fingerprint input sequence, therefore the program cannot be easily caused the leakage of clear crytpographic key, even if other people can be successfully, reproduced The fingerprint of user also is difficult to that target object is decrypted, so as to improve the safety of user data.
With reference to shown in figure 11, an embodiment of the present invention provides a kind of object processing method, this method may include following Step 201- steps 202.
Step 201, terminal device receive second touch-control input of the user on the target object of unencryption.
Step 202 inputs, encrypted target object described in display in response to second touch-control.
Wherein, second touch-control, which inputs, includes:Target of the second area of the second finger of user in the unencryption Pressing input on object, the second area are some or all of second finger finger areas;Wherein, described For the second area of two fingers during being pressed on the target object of the unencryption, the touch-control input further includes user's rotation The rotation of the second finger inputs.
M second son touch-control input of the user in K character string is received, the K character string is determined as the unencryption Target object.
The encrypted K character string of display.
Wherein, the second touch-control input includes the M second sons touch-control input, and K is the integer more than or equal to 1, and K is small In or equal to M.
The associated description that can be referred in above-mentioned steps 106 and step 107 is specifically described, details are not described herein again.
Illustratively, in conjunction with Figure 11, as shown in figure 12, before above-mentioned steps 202, object provided in an embodiment of the present invention Processing method can also include following step 203- steps 204.
Step 203 obtains the second touch-control input inputted M fingerprint subregion and the second fingerprint input sequence.
Step 204 is based on the M fingerprint subregion and the second fingerprint input sequence, to the target of the unencryption Object is encrypted, and M is the integer more than 1.
The associated description that can be referred in above-mentioned steps 108 and step 109 is specifically described, details are not described herein again.
The embodiment of the present invention also provides a kind of object processing method, can be by receiving user in encrypted target object On the first touch-control input;It is inputted in response to first touch-control, the target object after display decryption;Wherein, first touch-control The N number of fingerprint subregion and the first fingerprint input sequence inputted is used to decrypt the target object, and N is the integer more than 1. In the program, under the premise of the uniqueness of fingerprint, then by using multiple fingerprint subregions, and combines and input multiple fingerprint point Target object is decrypted in the first fingerprint input sequence in area, due to other people it is difficult to know which fingerprint user uses Subregion and the first fingerprint input sequence, therefore the program cannot be easily caused the leakage of clear crytpographic key, even if other people can successfully answer The fingerprint of user processed also is difficult to that target object is decrypted, so as to improve the safety of user data.
As shown in figure 13, the embodiment of the present invention provides a kind of terminal device 120, which includes:Receiving module 121 and display module 122;
The receiving module 121, for receiving first touch-control input of the user on encrypted target object;
The display module 122, first touch-control for being received in response to the receiving module 121 input, after display decryption The target object;
Wherein, the N number of fingerprint subregion and the first fingerprint input sequence which is inputted are used for the target Object is decrypted, and N is the integer more than 1.
Optionally, which further includes:Acquisition module 123 and deciphering module 124;The acquisition module 123 is used Before the target object after display decryption, first touch-control for obtaining the receiving module 121 reception is inputted N number of fingerprint subregion and the first fingerprint input sequence;The deciphering module 124 is somebody's turn to do for what is obtained in the acquisition module 123 The first fingerprint input sequence that N number of fingerprint subregion matches with preset decryption fingerprint subregion and the acquisition module 123 obtains In the case of for preset input sequence, to this, encrypted target object has been decrypted.
Optionally, which, which inputs, includes:The first area of the first finger of user is in the encrypted target pair As upper pressing input, which is some or all of first finger finger areas;Wherein, in first finger During being pressed on this encrypted target object, touch-control input further includes that user rotates first finger for first area Rotation input.
Optionally, the receiving module 121 is additionally operable to the first touch-control on encrypted target object in reception user Before input, second touch-control input of the user on the target object of unencryption is received;The display module 122, is additionally operable to ring The encrypted target object should be shown in second touch-control input that the receiving module 121 receives;Wherein, second touch-control Input includes:Pressing input of the second area of the second finger of user on the target object of the unencryption, the second area For some or all of second finger finger areas;Wherein, the second area of the second finger the unencryption target During being pressed on object, touch-control input further includes the rotation input that user rotates the second finger.
Optionally, which further includes:Encrypting module 125;The acquisition module 123, be additionally operable to the display this Before encrypted target object, the M fingerprint subregion that second touch-control of the receiving module 121 reception is inputted is obtained With the second fingerprint input sequence;The encrypting module 125, the M fingerprint subregion for being obtained based on the acquisition module 123 with The second fingerprint input sequence, is encrypted the target object of the unencryption, and M is the integer more than 1.
Optionally, the receiving module 121 is specifically used for receiving M second son touch-control input of the user in K character string, will The K character string is determined as the target object of the unencryption;The display module 122 is specifically used for showing the encrypted K word Symbol string;Wherein, second touch-control input includes M second son touch-controls input, and K is the integer more than or equal to 1, and K is less than or waits In M.
Terminal device provided in an embodiment of the present invention can realize in above method embodiment one of the arbitrary institutes of Fig. 2 to Figure 10 The each process shown, to avoid repeating, details are not described herein again.
Terminal device provided in an embodiment of the present invention, can be by receiving user first on encrypted target object Touch-control inputs;It is inputted in response to first touch-control, the target object after display decryption;Wherein, first touch-control input institute is defeated The N number of fingerprint subregion and the first fingerprint input sequence entered is used to decrypt the target object, and N is the integer more than 1.The program In, under the premise of the uniqueness of fingerprint, then by using multiple fingerprint subregions, and combines and input the of multiple fingerprint subregion Target object is decrypted in one fingerprint input sequence, due to other people it is difficult to know user use which fingerprint subregion with And the first fingerprint input sequence, therefore the program cannot be easily caused the leakage of clear crytpographic key, even if other people can be successfully, reproduced user Fingerprint also be difficult to that target object is decrypted, so as to improve the safety of user data.
A kind of hardware architecture diagram of Figure 14 terminal devices of each embodiment to realize the present invention.As shown in figure 14, The terminal device 100 includes but not limited to:Radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, with And the equal components of power supply 111.It will be understood by those skilled in the art that the not structure paired terminal of terminal device structure shown in Figure 14 The restriction of equipment, terminal device may include either combining certain components or different than illustrating more or fewer components Component is arranged.In embodiments of the present invention, terminal device includes but not limited to mobile phone, tablet computer, laptop, palm electricity Brain, vehicle-mounted terminal equipment, wearable device and pedometer etc..
Wherein, user input unit 107, for receiving first touch-control input of the user on encrypted target object; Display unit 106, for being inputted in response to first touch-control, the target object after display decryption;Wherein, first touch-control is defeated Enter the N number of fingerprint subregion inputted and the first fingerprint input sequence is used for the encrypted target object decryption, N is more than 1 Integer.
Terminal device provided in an embodiment of the present invention, can be by receiving user first on encrypted target object Touch-control inputs;It is inputted in response to first touch-control, the target object after display decryption;Wherein, first touch-control input institute is defeated The N number of fingerprint subregion and the first fingerprint input sequence entered is used to decrypt the target object, and N is the integer more than 1.The program In, under the premise of the uniqueness of fingerprint, then by using multiple fingerprint subregions, and combines and input the of multiple fingerprint subregion Target object is decrypted in one fingerprint input sequence, due to other people it is difficult to know user use which fingerprint subregion with And the first fingerprint input sequence, therefore the program cannot be easily caused the leakage of clear crytpographic key, even if other people can be successfully, reproduced user Fingerprint also be difficult to that target object is decrypted, so as to improve the safety of user data.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 101 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication system and network and other set Standby communication.
Terminal device has provided wireless broadband internet to the user by network module 102 and has accessed, and such as user is helped to receive Send e-mails, browse webpage and access streaming video etc..
It is that audio output unit 103 can receive radio frequency unit 101 or network module 102 or in memory 109 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end The relevant audio output of specific function that end equipment 100 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 103 includes loud speaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output of mobile communication base station can be sent to via radio frequency unit 101 by being converted in the case of telephone calling model.
Terminal device 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when terminal device 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify terminal device posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 105 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with terminal device Family is arranged and the related key signals input of function control.Specifically, user input unit 107 include touch panel 1071 and Other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receiving area It manages the order that device 110 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touch The type for touching event provides corresponding visual output on display panel 1061.Although in fig. 14, touch panel 1071 with it is aobvious Show that panel 1061 is to realize the function that outputs and inputs of terminal device as two independent components, but in some embodiments In, can be integrated by touch panel 1071 and display panel 1061 and realize the function that outputs and inputs of terminal device, it is specific this Place does not limit.
Interface unit 108 is the interface that external device (ED) is connect with terminal device 100.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal device 100 or can be used in 100 He of terminal device Transmission data between external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place Reason device 110 may include one or more processing units;Optionally, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Terminal device 100 can also include the power supply 111 (such as battery) powered to all parts, optionally, power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal device 100 includes some unshowned function modules, details are not described herein.
The embodiment of the present invention also provides a kind of terminal device, may include above-mentioned processor 110 as shown in figure 14, storage Device 109, and it is stored in the computer program that can be run on memory 109 and on the processor 110, the computer program quilt Realized when processor 110 executes Fig. 2 to Figure 12 in above method embodiment it is one of arbitrary shown in object processing method it is each Process, or realize each process of object processing method shown in Figure 12 in above method embodiment, and can reach identical Technique effect, to avoid repeating, details are not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, realized when which is executed by processor in above method embodiment Fig. 2 to Figure 12 it is one of arbitrary shown in Object processing method each process, or realize each of object processing method shown in Figure 12 in above method embodiment Process, and identical technique effect can be reached, to avoid repeating, details are not described herein again.Wherein, the computer-readable storage Medium, as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within the protection of the present invention.

Claims (14)

1. a kind of object processing method, which is characterized in that including:
Receive first touch-control input of the user on encrypted target object;
It is inputted in response to first touch-control, the target object after display decryption;
Wherein, the N number of fingerprint subregion and the first fingerprint input sequence that first touch-control is inputted to described for having added Close target object decryption, N are the integer more than 1.
2. according to the method described in claim 1, it is characterized in that, before the target object shown after decrypting, go back Including:
Obtain N number of fingerprint subregion and the first fingerprint input sequence;
Match with preset decryption fingerprint subregion in N number of fingerprint subregion and the first fingerprint input sequence is preset In the case of input sequence, the encrypted target object is decrypted.
3. method according to claim 1 or 2, which is characterized in that first touch-control, which inputs, includes:User's is first-hand Pressing input of the first area of finger on the encrypted target object, the first area is the portion of first finger Point or all fingers region;Wherein, in the first area of first finger on the encrypted target object by pressing through Cheng Zhong, the touch-control input further include the rotation input that user rotates first finger.
4. according to the method described in claim 1, it is characterized in that, receive user on encrypted target object the Before the input of one touch-control, further include:
Receive second touch-control input of the user on the target object of unencryption;
It is inputted in response to second touch-control, encrypted target object described in display;
Wherein, second touch-control, which inputs, includes:Target object of the second area of the second finger of user in the unencryption On pressing input, the second area is some or all of second finger finger areas;Wherein, in the second-hand For the second area of finger during being pressed on the target object of the unencryption, the touch-control input further includes described in user's rotation The rotation of second finger inputs.
5. according to the method described in claim 4, it is characterized in that, described in the display before encrypted target object, also Including:
It obtains second touch-control and inputs inputted M fingerprint subregion and the second fingerprint input sequence;
Based on the M fingerprint subregion and the second fingerprint input sequence, the target object of the unencryption is encrypted, M is the integer more than 1.
6. method according to claim 4 or 5, which is characterized in that the target pair of the reception user in unencryption As upper the second touch-control input, including:
M second son touch-control input of the user in K character string is received, the K character string is determined as to the mesh of the unencryption Mark object;
Encrypted target object includes described in the display:
The encrypted K character string of display;
Wherein, second touch-control input includes the M second sons touch-control input, and K is the integer more than or equal to 1, and K be less than or Equal to M.
7. a kind of terminal device, which is characterized in that including:Receiving module and display module;
The receiving module, for receiving first touch-control input of the user on encrypted target object;
The display module, first touch-control for being received in response to the receiving module input, the institute after display decryption State target object;
Wherein, the N number of fingerprint subregion and the first fingerprint input sequence that first touch-control is inputted are used for the target Object is decrypted, and N is the integer more than 1.
8. terminal device according to claim 7, which is characterized in that the terminal device further includes:Acquisition module is conciliate Close module;
The acquisition module obtains the receiving module and receives before the target object after the display decryption N number of fingerprint subregion for being inputted of first touch-control and the first fingerprint input sequence;
The deciphering module, N number of fingerprint subregion for being obtained in the acquisition module and preset decryption fingerprint subregion Match and the acquisition module obtain the first fingerprint input sequence be preset input sequence in the case of, to described Encrypted target object is decrypted.
9. terminal device according to claim 7 or 8, which is characterized in that first touch-control, which inputs, includes:The of user Pressing input of the first area of one finger on the encrypted target object, the first area is first finger Some or all of finger areas;Wherein, it is pressed on the encrypted target object in the first area of first finger During pressure, the touch-control input further includes the rotation input that user rotates first finger.
10. terminal device according to claim 7, which is characterized in that
The receiving module is additionally operable to before the first touch-control input in the reception user on encrypted target object, Receive second touch-control input of the user on the target object of unencryption;
The display module is additionally operable to second touch-control input received in response to the receiving module, has added described in display Close target object;
Wherein, second touch-control, which inputs, includes:Target object of the second area of the second finger of user in the unencryption On pressing input, the second area is some or all of second finger finger areas;Wherein, in the second-hand For the second area of finger during being pressed on the target object of the unencryption, the touch-control input further includes described in user's rotation The rotation of second finger inputs.
11. terminal device according to claim 10, which is characterized in that the terminal device further includes:Encrypting module;
The acquisition module is additionally operable to described in the display before encrypted target object, is obtained the receiving module and is received The M fingerprint subregion that is inputted of second touch-control and the second fingerprint input sequence;
The encrypting module, the M fingerprint subregion for being obtained based on the acquisition module and second fingerprint input Sequentially, the target object of the unencryption is encrypted, M is the integer more than 1.
12. the terminal device according to claim 10 or 11, which is characterized in that the receiving module is specifically used for receiving The K character string, is determined as the target object of the unencryption by M second son touch-control input of the user in K character string;
The display module is specifically used for showing the encrypted K character string;
Wherein, second touch-control input includes the M second sons touch-control input, and K is the integer more than or equal to 1, and K be less than or Equal to M.
13. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is executed by the processor Any one of described in object processing method the step of.
14. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence is realized when the computer program is executed by processor such as object processing method according to any one of claims 1 to 6 Step.
CN201810541151.6A 2018-05-30 2018-05-30 Object processing method and terminal equipment Active CN108763905B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810541151.6A CN108763905B (en) 2018-05-30 2018-05-30 Object processing method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810541151.6A CN108763905B (en) 2018-05-30 2018-05-30 Object processing method and terminal equipment

Publications (2)

Publication Number Publication Date
CN108763905A true CN108763905A (en) 2018-11-06
CN108763905B CN108763905B (en) 2020-05-26

Family

ID=64004559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810541151.6A Active CN108763905B (en) 2018-05-30 2018-05-30 Object processing method and terminal equipment

Country Status (1)

Country Link
CN (1) CN108763905B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918882A (en) * 2019-02-01 2019-06-21 维沃移动通信有限公司 A kind of image encryption method and mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5848176A (en) * 1995-04-04 1998-12-08 Nec Corporation Fingerprint fingertip orientation detection method and device
CN101136749A (en) * 2006-08-31 2008-03-05 株式会社日立制作所 Encryption key generation and restoration method and individual authentication system
CN104063698A (en) * 2014-07-03 2014-09-24 南昌欧菲生物识别技术有限公司 Fingerprint registration method, fingerprint identification method, fingerprint identification device, and terminal equipment
CN106127004A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 A kind of document handling method and terminal unit
CN106203151A (en) * 2016-06-21 2016-12-07 广东欧珀移动通信有限公司 A kind of method opening file and terminal unit
CN106855939A (en) * 2016-11-15 2017-06-16 上海摩软通讯技术有限公司 A kind of fingerprint verification method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5848176A (en) * 1995-04-04 1998-12-08 Nec Corporation Fingerprint fingertip orientation detection method and device
CN101136749A (en) * 2006-08-31 2008-03-05 株式会社日立制作所 Encryption key generation and restoration method and individual authentication system
CN104063698A (en) * 2014-07-03 2014-09-24 南昌欧菲生物识别技术有限公司 Fingerprint registration method, fingerprint identification method, fingerprint identification device, and terminal equipment
CN106127004A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 A kind of document handling method and terminal unit
CN106203151A (en) * 2016-06-21 2016-12-07 广东欧珀移动通信有限公司 A kind of method opening file and terminal unit
CN106855939A (en) * 2016-11-15 2017-06-16 上海摩软通讯技术有限公司 A kind of fingerprint verification method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918882A (en) * 2019-02-01 2019-06-21 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN109918882B (en) * 2019-02-01 2023-11-21 维沃移动通信有限公司 Image encryption method and mobile terminal

Also Published As

Publication number Publication date
CN108763905B (en) 2020-05-26

Similar Documents

Publication Publication Date Title
CN108038393B (en) Application privacy protection method and mobile terminal
CN108171037A (en) Using startup method, terminal and computer storage media
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN108595946A (en) A kind of method and terminal of protection privacy
CN108449481A (en) A kind of associated person information recommends method and terminal
CN110457935A (en) A kind of authority configuring method and terminal device
CN108171034A (en) A kind of method and terminal for protecting privacy
CN109409044A (en) A kind of verifying interface display method and terminal
CN108985034A (en) A kind of unlocking method and terminal device
CN109993010A (en) A kind of information display method and mobile terminal
CN110457879A (en) Object displaying method and terminal device
CN108174012A (en) A kind of authority control method and mobile terminal
CN108416203A (en) A kind of unlocking screen method and mobile terminal
CN108011887A (en) A kind of account management method and equipment
CN109901761A (en) A kind of content display method and mobile terminal
CN108153460A (en) A kind of icon hiding method and terminal
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN107832603A (en) The startup method and mobile terminal of a kind of application program
CN110210206A (en) A kind of right management method and terminal
CN109063462A (en) A kind of right management method and terminal device
CN109918944A (en) A kind of information protecting method, device, mobile terminal and storage medium
CN109740312A (en) A kind of application control method and terminal device
CN108763905A (en) A kind of object processing method and terminal device
CN109753786A (en) A kind of unlocking method and mobile terminal
CN109992939A (en) A kind of login method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant