CN111417921A - Virtual key operation method, terminal, storage medium, and computer program - Google Patents

Virtual key operation method, terminal, storage medium, and computer program Download PDF

Info

Publication number
CN111417921A
CN111417921A CN201780095479.3A CN201780095479A CN111417921A CN 111417921 A CN111417921 A CN 111417921A CN 201780095479 A CN201780095479 A CN 201780095479A CN 111417921 A CN111417921 A CN 111417921A
Authority
CN
China
Prior art keywords
terminal
user
preset
virtual key
biological characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780095479.3A
Other languages
Chinese (zh)
Inventor
汪洪
黄成钟
郑雪瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Communication Co Ltd
Original Assignee
Shenzhen Transsion Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Communication Co Ltd filed Critical Shenzhen Transsion Communication Co Ltd
Publication of CN111417921A publication Critical patent/CN111417921A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

A method, a terminal, a storage medium and a computer program for virtual key operation are provided, wherein the method comprises the following steps: the terminal starts a preset application program (S101); the terminal receives a first trigger operation of a user for a first virtual key in the preset application program (S102); the terminal detects whether the biological feature information of the first user is matched with preset biological feature information or not according to the first trigger operation (S103); and if the biological characteristic information of the first user is not matched with the preset biological characteristic information, the original function of the first virtual key is not executed (S104). The method can limit the authority of a specific user for operating the application program.

Description

Virtual key operation method, terminal, storage medium, and computer program Technical Field
The present invention relates to the field of intelligent terminals, and in particular, to a virtual key operation method, a terminal, a storage medium, and a computer program.
Background
At present, as the functions of the smart phone are very powerful, the smart phone can have very many functions such as internet surfing, chatting and games, and more children like playing parents' mobile phones. According to the development situation of the existing smart phones, although part of the smart phones can perform authority management, strict control is not performed on the use of the smart phones by children. The method has the advantages that children can operate any application on the mobile phone at will, and the problems of standard exceeding of mobile phone flow, fee deduction and the like are often caused, so that the technical problem to be solved at present is how to limit the operation of the mobile phone application by the children.
Disclosure of Invention
The embodiment of the invention provides a virtual key operation method, a terminal, a storage medium and a computer program, which can limit the authority of a specific user for operating an application program.
In a first aspect, an embodiment of the present invention provides a virtual key operation method, where the method includes:
the terminal starts a preset application program;
the terminal receives a first trigger operation of a user for a first virtual key in the preset application program;
the terminal detects whether the biological characteristic information of the first user is matched with preset biological characteristic information according to the first trigger operation;
and if the biological characteristic information of the first user is not matched with the preset biological characteristic information, the original function of the first virtual key is not executed.
According to the embodiment of the invention, the user can be identified by identifying the biological characteristic information of the user, the operation permission of other users except the user corresponding to the preset biological characteristic information on the virtual key is limited, and the permission of other users for operating the application program is further limited.
With reference to the first aspect, in a first implementation manner of the first aspect, after the detecting, by the terminal according to the first trigger operation, whether the biometric information of the first user matches preset biometric information, the method further includes:
and if the biological characteristic information of the first user is matched with the preset biological characteristic information, executing the original function of the first virtual key.
By the embodiment of the invention, when the terminal detects that the biological characteristic information aiming at the virtual operation is matched with the preset biological characteristic information, the operation of the preset application program can be realized by combining the original function of the virtual key.
With reference to the first aspect, in a second implementation manner of the first aspect, after the not executing the original function of the first virtual key if the biometric information of the first user does not match the preset biometric information, the method further includes:
and executing the replacement function of the first virtual key.
Through the embodiment of the invention, when the terminal detects that the biological characteristic information is not matched with the preset biological characteristic information, the usable range of a user can be limited by combining the replacement function of the virtual key.
With reference to the first aspect, in a third implementation manner of the first aspect, before the executing the replacement function of the first virtual key, the method further includes:
the method comprises the steps that a terminal establishes a first corresponding relation between original functions and replacement functions of virtual keys, wherein the virtual keys comprise first virtual keys;
after the terminal detects whether the biometric information of the first user is matched with preset biometric information according to the first trigger operation and before the terminal executes the replacement function of the first virtual key, the method further includes:
if the biological characteristic information of the first user is not matched with the preset biological characteristic information, the terminal acquires a replacement function corresponding to the original function of the first virtual key from the first corresponding relation;
the terminal executes the replacing function of the first virtual key, and the replacing function comprises the following steps:
and the terminal executes the replacement function corresponding to the original function of the first virtual key.
Through the embodiment of the invention, the terminal can realize the function of the virtual key by combining the established corresponding relation between the original function and the replacement function of the virtual key.
With reference to the first aspect or any one of the first to third implementation manners of the first aspect, in a fourth implementation manner of the first aspect, the method for operating the virtual key further includes:
judging whether the running time of the preset application program exceeds a preset time;
and if so, exiting the preset application program and displaying a screen locking interface.
By the embodiment of the invention, the terminal can limit the time for the user to operate the preset application program, and the user is prevented from indulging the preset application program.
With reference to the first aspect, in a fifth implementation manner of the first aspect, before the determining whether the running duration of the preset application exceeds a preset duration, the method further includes:
receiving a password input by a second user;
judging whether the biological characteristic information of the second user is matched with the preset biological characteristic information or not;
and if the biological characteristic information of the second user is matched with the preset biological characteristic information, setting the password input by the second user as the unlocking password of the screen locking interface.
According to the embodiment of the invention, the unlocking password of the screen locking interface can be set by the user corresponding to the preset biological characteristic information, so that other users are prevented from unlocking the screen locking interface correctly.
With reference to the first aspect or any one of the first to fifth implementation manners of the first aspect, in a sixth implementation manner of the first aspect, after the terminal starts a preset application, the method further includes:
receiving a second trigger operation input by the first user aiming at a preset exit button;
outputting prompt information according to the second trigger operation, wherein the prompt information is used for prompting the first user to input a password;
receiving a password input by the first user;
judging whether the password input by the first user is consistent with a preset password or not;
if so, exiting the preset application program.
By the embodiment of the invention, other users except the user corresponding to the preset biological characteristic information can be further prevented from quitting the preset application program by setting the password, and further the permission of other users for operating the preset application program is limited.
With reference to the first aspect, in a seventh implementation manner of the first aspect, before the receiving a second trigger operation of the first user on a preset exit button input, the method further includes:
receiving a password input by a second user;
judging whether the biological characteristic information of the second user is matched with the preset biological characteristic information or not;
and if the biological characteristic information of the second user is matched with the preset biological characteristic information, setting the password input by the second user as the preset password.
According to the embodiment of the invention, the password of the preset exit button can be set by the user corresponding to the preset biological characteristic information, so that other users are prevented from exiting the preset application program.
With reference to the first aspect, in an eighth implementation manner of the first aspect, the biometric information includes one or any combination of fingerprint information, iris information, face feature information, and voice information.
With reference to the first aspect or any one of the implementation manners of the first aspect, in a ninth implementation manner of the first aspect, the first virtual key includes a return key, a home key, a most recent task key, or a menu key.
In a second aspect, an embodiment of the present invention provides a terminal, where the terminal includes a module or a unit configured to execute the virtual key operation method described in the first aspect or any implementation manner of the first aspect.
In a third aspect, an embodiment of the present invention provides another terminal, including a processor and a memory, where the processor and the memory are connected to each other, where the memory is used to store an application program code that supports the terminal to execute the foregoing method, and the processor is configured to execute the foregoing method according to the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, in which a computer program is stored, the computer program comprising program instructions, which, when executed by a processor, cause the processor to perform the method of the first aspect.
In a fifth aspect, an embodiment of the present invention provides a computer program, which includes program instructions, which, when executed by a processor, cause the processor to perform the method of the first aspect.
Drawings
In order to more clearly illustrate the technical solution of the embodiment of the present invention, the drawings used in the description of the embodiment will be briefly introduced below.
Fig. 1 is a schematic flowchart of a virtual key operation method according to an embodiment of the present invention;
FIG. 1A is a schematic diagram of an operation interface of a game application according to an embodiment of the present invention;
FIG. 1B is a schematic diagram of an interface for operating another game application provided by an embodiment of the invention;
fig. 2 is a schematic flowchart of another virtual key operation method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.
Referring to fig. 1, which is a schematic flowchart of a virtual key operation method according to an embodiment of the present invention, as shown in fig. 1, the method includes, but is not limited to, the following steps S101 to S104:
s101, the terminal starts a preset application program.
The terminal may include various terminal devices that can be used by a user, such as a Mobile phone, a tablet computer, a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), and an intelligent wearable Device (e.g., a smart watch and a smart band), which is not limited in the embodiments of the present invention.
In some possible implementations, the terminal may install a plurality of applications, such as: video applications, interpersonal applications, gaming applications, photography applications, and the like.
In the embodiment of the present invention, the preset application may be set by a default of the terminal system or may be set by the terminal user, which is not specifically limited in the embodiment of the present invention. And after the terminal starts the preset application program, displaying an operation interface of the preset application program. For example, if the preset application is a game application, the terminal may display an operation interface of the game application in a full screen manner, so that the user can experience the game.
S102, the terminal receives a first trigger operation of a user for the first virtual key in the preset application program.
The terminal displays an operation interface of a preset application program, and a user can input first trigger operation aiming at the first virtual key through the operation interface. In the embodiment of the invention, the terminal is provided with a touch screen, and the first trigger operation of the user for the first virtual key can be completed on the touch screen. The virtual keys of the terminal include, but are not limited to: a return key, a home key, a most recent task key, and a menu key, and thus, the first virtual key may be a return key, a home key, a most recent task key, or a menu key.
For example, refer to fig. 1A, which is a schematic view of an operation interface of a game application according to an embodiment of the present invention. As shown in fig. 1A, an operation interface of the continuous-viewing application is displayed on the display interface 10 of the terminal. In one implementation manner, the virtual keys are always displayed in the operation interface of the preset application program, and a user can directly trigger the first trigger operation for a certain virtual key displayed in the operation interface. In another implementation manner, the virtual keys are hidden in the operation interface of the preset application program, a user may click the operation interface to trigger the terminal to display the virtual keys, and then the user triggers the first trigger operation with respect to a certain virtual key displayed in the operation interface. For example, refer to fig. 1B, which is a schematic view of an operation interface of another game application provided in the embodiment of the present invention. As shown in fig. 1B, an operation interface of the continuous-viewing application is displayed on the display interface 10 of the terminal, and 3 virtual keys, namely a return key 11, a home key 12 and a latest task key 13, are displayed at the bottom of the interface of the operation interface. In addition, the display position of the virtual key may also be other positions of the display interface 10 of the terminal, such as the left side of the interface, the right side of the interface, or the top of the interface.
In the embodiment of the present invention, the first trigger operation of the user for the first virtual key includes: any one or any combination of click operation, touch operation, and long press operation, but the present invention is not limited to these.
S103, the terminal detects whether the biological feature information of the first user is matched with preset biological feature information according to the first trigger operation, and if not, the step S104 is executed.
After receiving a first trigger operation of a user for a first virtual key, the terminal can acquire the biological characteristic information of the user and match the acquired biological characteristic information with the pre-stored biological characteristic information. The biological characteristic information comprises one or any combination of fingerprint information, iris information, face characteristic information and voice information. For example, if the biometric information is fingerprint information, after receiving a first trigger operation of a user for a first virtual key, the terminal may acquire the fingerprint information of the user through a fingerprint acquirer, and match the acquired fingerprint information with pre-stored fingerprint information. Or if the biometric information is iris information, the terminal acquires the iris information of the user through the camera after receiving a first trigger operation of the user for the first virtual key, and matches the acquired iris information with the iris information stored in advance. If the biological characteristic information is face characteristic information, the terminal acquires face image information of a user through the camera after receiving a first trigger operation of the user for the first virtual key, and the acquired face image information is matched with face characteristic information stored in advance. If the biological characteristic information is sound information, the terminal acquires the sound information of the user through the microphone after receiving a first trigger operation of the user for the first virtual key, and the acquired sound information is matched with the sound information stored in advance.
Specifically, the preset biometric information may be pre-entered by the end user. For example, the end user is a parent, and the preset biometric information is the biometric information of the parent. If the user who inputs the first trigger operation is child, the terminal can recognize that the child is not the same as the user corresponding to the preset biological characteristic information by detecting the biological characteristic information of the child.
In the embodiment of the present invention, the operation of detecting whether the biometric information of the first user matches the preset biometric information may be implemented by the same terminal or another terminal, and the present invention is not limited in particular.
S104, the terminal does not execute the original function of the first virtual key.
In the embodiment of the invention, the original function of the virtual key is specifically characterized in that the terminal endows the function of the virtual key under the common condition. For example, the original function of the return key is to return to a previous menu, and the original function of the home key is to display a home menu page. The terminal does not execute the original function of the first virtual key, namely, the terminal limits the operation authority of the user aiming at the virtual key.
For example, the preset application program is a game application, the terminal currently displays an operation interface of the game application, a child plays the game application, when the child wants to click a return key below the operation interface to quit the game application, the terminal acquires fingerprint information of the child, and when the fact that the fingerprint information of the child is not matched with the preset fingerprint information is detected, the terminal does not quit the game application and continues to display the operation interface of the game application, so that the situations that the flow exceeds the standard and the fee is deducted from the terminal caused by the fact that the child plays other application programs are avoided.
Optionally, if the terminal detects that the biometric information of the first user matches with preset biometric information, the terminal executes the original function of the first virtual key. By the embodiment of the invention, when the terminal detects that the biological characteristic information aiming at the virtual operation is matched with the preset biological characteristic information, the operation of the preset application program can be realized by combining the original function of the virtual key.
Optionally, the terminal determines whether the running time of the preset application exceeds a preset time. And if so, the terminal exits the preset application program and displays a screen locking interface. The preset duration may be set by default in the terminal system or set by the user.
For example, the preset time duration is 13 minutes, and if the terminal detects that the running time duration of the preset application program is greater than or equal to 13 minutes, the terminal exits the preset application program and displays a screen locking interface. By the embodiment of the invention, the terminal can limit the time for the user to operate the preset application program, and the user is prevented from indulging the preset application program.
Optionally, the unlocking password of the screen locking interface may be set by the terminal user himself, for example, the terminal user himself is an adult, and the unlocking password set by the adult may prevent a child from correctly unlocking the screen locking interface. Specifically, before the terminal determines whether the running time of the preset application program exceeds the preset time, the terminal may receive a password input by the second user. And the terminal judges whether the biological characteristic information of the second user is matched with the preset biological characteristic information. And if the biological characteristic information of the second user is matched with the preset biological characteristic information, setting the password input by the second user as the unlocking password of the screen locking interface. According to the embodiment of the invention, the unlocking password of the screen locking interface can be set by the user corresponding to the preset biological characteristic information, so that other users are prevented from unlocking the screen locking interface correctly.
Optionally, after the terminal starts the preset application, the terminal may receive a second trigger operation input by the first user with respect to the preset exit button. And outputting prompt information according to the second trigger operation, wherein the prompt information is used for prompting the first user to input a password. And receiving the password input by the first user. And judging whether the password input by the first user is consistent with a preset password. If so, exiting the preset application program.
In the embodiment of the present invention, the preset exit button may be set by a default of the terminal system or may be set by the terminal user, which is not specifically limited in the embodiment of the present invention. The display position of the preset exit button can be below an operation interface, the left side of the interface, the right side of the interface or the top of the interface of a preset application program displayed by the terminal. In one implementation, the preset exit button is always displayed in the operation interface of the preset application program, and the user may directly trigger the second trigger operation with respect to the preset exit button displayed in the operation interface. In another implementation manner, the preset exit button is hidden in the operation interface of the preset application program, the user may click the operation interface to trigger the terminal to display the preset exit button, and then the user triggers the second trigger operation with respect to the preset exit button displayed in the operation interface.
The first user inputs a second trigger operation for the preset exit button, and the second trigger operation may include: any one or any combination of click operation, touch operation, and long press operation, but the present invention is not limited to these. After the first user inputs a second trigger operation aiming at the preset exit button, a prompt information frame pops up on an operation page of the preset application program, and the information content in the prompt information frame comprises 'please input a password' or 'please determine a password', and the like. The user enters a password in the information box.
In the embodiment of the invention, the preset password is set by the user according to the preference, the use habit or the mandatory setting rule of the system, and the preset password can be one or any combination of letters, symbols and numbers. For example, system-enforced set rules include, but are not limited to: the set password must be composed of letters and numbers, and the first password must be letters, and at the same time, the letters must be capitalized.
For example, the preset application program is a game application, the terminal currently displays an operation interface of the game application, a child is playing the game application, when the child wants to click a preset exit button below the operation interface to exit the game application, the terminal pops up a prompt information box on an operation page of the game application, the prompt information box requires the child to input a password, and the terminal exits the game application only when the input password is consistent with the preset password.
By the embodiment of the invention, other users except the user corresponding to the preset biological characteristic information can be further prevented from quitting the preset application program by setting the password, and further the permission of other users for operating the preset application program is limited.
Optionally, the preset password may be set by the terminal user himself, for example, the terminal user himself is an adult, and the unlocking password set by the adult may prevent a child from correctly exiting the preset application program. Specifically, before the terminal receives a second trigger operation input by the first user for the preset exit button, the terminal may receive a password input by the second user. And the terminal judges whether the biological characteristic information of the second user is matched with the preset biological characteristic information. And if the biological characteristic information of the second user is matched with the preset biological characteristic information, setting the password input by the second user as the preset password. According to the embodiment of the invention, the password of the preset exit button can be set by the user corresponding to the preset biological characteristic information, so that other users are prevented from exiting the preset application program.
By implementing the virtual key operation method shown in fig. 1, after receiving a trigger operation of a user on a first virtual key in a preset application program, a terminal detects whether the biometric information of the user is matched with preset biometric information, so as to identify whether the user has the authority to operate the virtual key, and if the biometric information of the user is detected to be not matched with the preset biometric information, the terminal does not execute the original function of the first virtual key, so that the authority of other users except the user corresponding to the preset biometric information to operate the virtual key is limited. For example, other users are prevented from exiting the preset application program through the return key and starting other application programs, so that the situations that the flow exceeds the standard and the fee is deducted at the terminal are avoided.
Referring to fig. 2, which is a schematic flowchart of another virtual key operation method provided in the embodiment of the present invention, as shown in fig. 2, the method includes, but is not limited to, the following steps S201 to S204:
s201, the terminal starts a preset application program.
Specifically, the relevant implementation of step S201 may refer to the relevant description of step S101 in the embodiment shown in fig. 1, and is not described herein again.
S202, the terminal receives a first trigger operation of a user for the first virtual key in the preset application program.
Specifically, the relevant implementation of step S202 may refer to the relevant description of step S102 in the embodiment shown in fig. 1, and is not described herein again.
S203, the terminal detects whether the biological characteristic information of the first user is matched with preset biological characteristic information according to the first trigger operation, and if not, the step S204 is executed.
Specifically, the relevant implementation of step S203 may refer to the relevant description of step S103 in the embodiment shown in fig. 1, and is not described herein again.
S204, the terminal does not execute the original function of the first virtual key and executes the replacement function of the first virtual key.
In the embodiment of the invention, the original function of the virtual key is specifically characterized in that the terminal endows the function of the virtual key under the common condition. For example, the original function of the return key is to return to a previous menu, and the original function of the main menu key is to display a main menu page.
In the embodiment of the invention, the replacement function of the virtual key is set by the user according to the preference, the use habit or the characteristics of the preset application program. For example, the replacement function of the return key may be a voice broadcast function for broadcasting the time for the user to use the preset application program. Alternatively, the replacement function of the home menu key may be to adjust the display screen area of the application. Alternatively, the preset application may be a game application and the alternate function of the return key may be a pause key.
For example, the preset application program is a game application, the terminal currently displays an operation interface of the game application, a child is playing the game application, when the child wants to click a return key below the operation interface to exit the game application, the terminal acquires fingerprint information of the child, and when the fingerprint information of the child is detected to be not matched with the preset fingerprint information, the terminal does not exit the game application, continues to display the operation interface of the game application, and executes a voice broadcast function of a replacement function of the return key, wherein the specific content of the voice broadcast is that "the time you currently play a game is 8 minutes, please close eyes to rest for 30 seconds, and eye fatigue is avoided. "
Optionally, before the terminal starts the preset application program, a first corresponding relationship between the original function and the replacement function of the virtual key may be created.
The first corresponding relationship may be a default setting of the system when the terminal leaves the factory, or may be set by the terminal user, which is not limited in the embodiment of the present invention.
For example, the first correspondence created by the terminal includes: the original function of the return key is 'return to the previous menu' corresponding to the replacement function 'voice broadcast function', and the original function of the home page key is 'display of the home menu page' corresponding to the replacement function '100% display of the application program display interface'. The format and content of the first correspondence may be, for example, but not limited to, as shown in table 1 below.
TABLE 1
Figure PCTCN2017104245-APPB-000001
It should be noted that the first correspondence shown in table 1 is only an example, and does not limit the format and content of the first correspondence.
When the terminal detects that the biological characteristic information of the user triggering the first trigger operation is not matched with the preset biological characteristic information, the terminal can search the replacement function corresponding to the original function of the first virtual key according to the first corresponding relation. For example, the first virtual key is a return key, and the replacement function obtained from the first correspondence and corresponding to the original function of the return key is voice broadcast. Through the embodiment of the invention, the terminal can realize the function of the virtual key by combining the established corresponding relation between the original function and the replacement function of the virtual key.
By implementing the virtual key operation method shown in fig. 2, after receiving a trigger operation of a user on a first virtual key in a preset application program, if it is detected that the biometric information of the user is not matched with the preset biometric information, the terminal does not execute the original function of the first virtual key, but executes the replacement function of the first virtual key, so as to limit the permission of other users except the user corresponding to the preset biometric information to operate the virtual key. For example, other users are prevented from exiting the preset application program through the return key and starting other application programs, so that the situations that the flow exceeds the standard and the fee is deducted at the terminal are avoided.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in fig. 3, the terminal 30 may include: a starting unit 310, a receiving unit 320, a detecting unit 330, and a processing unit 340, wherein,
the starting unit 310 is configured to start a preset application program;
the receiving unit 320 is configured to receive a first trigger operation for a first virtual key in the preset application program started by the starting unit 310 by a user;
the detecting unit 330 is configured to detect whether the biometric information of the first user matches preset biometric information according to the first trigger operation received by the receiving unit 320;
the processing unit 340 is configured to not execute the original function of the first virtual key if the detecting unit 330 detects that the biometric information of the first user is not matched with the preset biometric information.
Optionally, the processing unit 340 is further configured to, after the detecting unit 330 detects whether the biometric information of the first user matches with preset biometric information according to the first trigger operation, execute an original function of the first virtual key if the biometric information of the first user matches with the preset biometric information.
Optionally, the processing unit 340 is further configured to execute a replacement function of the first virtual key after the original function of the first virtual key is not executed if the biometric information of the first user is not matched with the preset biometric information.
Optionally, the terminal 30 further includes a creating unit and an obtaining unit;
the creating unit is configured to create a first corresponding relationship between an original function and a replacement function of a virtual key before the processing unit 340 executes the replacement function of the first virtual key, where the virtual key includes the first virtual key;
the obtaining unit is configured to, after the detecting unit 330 detects whether the biometric information of the first user matches preset biometric information according to the first trigger operation, before the processing unit 340 executes the replacement function of the first virtual key, obtain, from the first corresponding relationship, a replacement function corresponding to an original function of the first virtual key if the biometric information of the first user does not match the preset biometric information;
the processing unit 340 is configured to execute a replacement function of the first virtual key, and specifically: and executing the replacement function corresponding to the original function of the first virtual key.
Optionally, the biometric information includes one or any combination of fingerprint information, iris information, face feature information, and voice information.
Optionally, the terminal 30 further includes a first determining unit, a first exiting unit, and a display unit;
the first judging unit is used for judging whether the running time of the preset application program exceeds a preset time;
the first quitting unit is used for judging that the running time of the preset application program exceeds the preset time by the first judging unit and quitting the preset application program;
and the display unit is used for displaying a screen locking interface.
Optionally, the terminal 30 further includes a second receiving unit, a second judging unit, and a first setting unit;
the second receiving unit is used for receiving a password input by a second user before the first judging unit judges whether the running time of the preset application program exceeds the preset time;
the second judging unit is configured to judge whether the biometric information of the second user matches the preset biometric information;
the first setting unit is used for setting the password input by the second user as the unlocking password of the screen locking interface if the biological characteristic information of the second user is matched with the preset biological characteristic information.
Optionally, the terminal 30 further includes a third receiving unit, an output unit, a third determining unit, and a second quitting unit;
the third receiving unit is configured to receive a second trigger operation input by the first user with respect to a preset exit button after the starting unit 310 starts a preset application;
the output unit is used for outputting prompt information according to the second trigger operation, wherein the prompt information is used for prompting the first user to input a password;
the third receiving unit is further used for receiving the password input by the first user;
the third judging unit is used for judging whether the password input by the first user is consistent with a preset password or not;
and the second quitting unit is used for judging that the password input by the first user is consistent with the preset password by the third judging unit and quitting the preset application program.
Optionally, the terminal 30 further includes a fourth receiving unit, a fourth judging unit and a second setting unit,
the fourth receiving unit is used for receiving a password input by a second user before the third receiving unit receives a second trigger operation input by the first user aiming at a preset exit button;
the fourth judging unit is configured to judge whether the biometric information of the second user matches the preset biometric information;
the second setting unit is configured to set the password input by the second user as the preset password if the biometric information of the second user matches the preset biometric information.
It can be understood that the functions of each functional unit of the terminal 30 in this embodiment may be specifically implemented according to the method in the method embodiment shown in fig. 1 to fig. 2, and the specific implementation process may refer to the related description of the method embodiment, which is not described herein again.
Fig. 4 is a schematic structural diagram of another terminal according to an embodiment of the present invention. The terminal 40 shown in fig. 4 includes: radio Frequency (RF) circuitry 401, memory 402 storing one or more computer programs, input devices 403, output devices 404, sensors 403, audio circuitry 404, Wireless Fidelity (WiFi) module 407, processor 408 including one or more processing cores, and power supply 409. Those skilled in the art will appreciate that the terminal configuration shown in fig. 4 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the RF circuit 401 may be used for receiving and transmitting signals during a message or call, and in particular, for receiving downlink information from a base station and processing the received downlink information by the one or more processors 408, and for transmitting data related to an uplink to the base station, generally, the RF circuit 401 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, a low noise amplifier (L Wis. Amplifier, &lttttransition &/T gtt NA), a duplexer, etc. the RF circuit 401 may also communicate with a network and other terminal devices through wireless communication, which may use any communication standard or protocol, including, but not limited to, a Global System for Mobile communications (GSM), a General Packet Radio Service (General Packet Radio Service, Service), a Service Multiple Access Service (SMS, Service, Wireless Access, Wireless Service, Wireless Access, Wireless communication, Wireless communication.
The memory 402 may be used to store computer programs and modules, and the processor 408 executes various functional applications and data processing by executing the computer programs and modules stored in the memory 402. The memory 402 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to the use of the terminal 40, such as a photographed photo, audio data, video data, etc., and the like. Further, the memory 402 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 402 may also include a memory controller to provide the processor 408 and the input device 403 with access to the memory 402.
The input device 403 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, the input apparatus 403 may include a touch-sensitive surface 4031 as well as other input devices 4032. Touch-sensitive surface 4031, also referred to as a touch-sensitive display panel or touchpad, can collect touch operations by a user on or near it (e.g., pressing operations by a user on touch-sensitive surface 4031 or near touch-sensitive surface 4031 using a finger, stylus, or any other suitable object or attachment) and drive the corresponding connected devices according to a predetermined program. Alternatively, touch-sensitive surface 4031 may include both touch detection devices and touch controllers. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, and sends the touch point coordinates to the processor 408, and can receive and execute commands from the processor 408. Additionally, the touch-sensitive surface 4031 may be implemented with various types of resistive, capacitive, infrared, and surface acoustic waves. The input apparatus 403 may comprise other input devices 4032 in addition to the touch-sensitive surface 4031. In particular, other input devices 4032 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
Output device 404 may be used to Display information input by or provided to a user, as well as various graphical user interfaces of terminal 40, which may be comprised of graphics, text, icons, video, and any combination thereof output device 404 may include a Display panel 4041, optionally Display panel 4041 may be configured in the form of a liquid Crystal Display (L acquired Crystal Display, L CD), Organic light Emitting Diode (O L ED), etc. further, touch sensitive surface 4031 may overlay Display panel 4041 and, upon detection of a touch operation on or near touch sensitive surface 4031, communicate to processor 408 to determine the type of touch event, and processor 408 then provides a corresponding visual output on Display panel 4041 based on the type of touch event 40341. although in fig. 4, touch sensitive surface 4031 and Display panel 4041 may implement input and input functions as two separate components, in some embodiments touch sensitive surface 4031 may be integrated with Display panel 40341 to implement input and output functions.
The terminal 40 may also include at least one sensor 403, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 4041 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 4041 and/or a backlight, etc. when the terminal 40 is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration) for recognizing the attitude of the terminal 40, and related functions (such as pedometer and tapping) for vibration recognition; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal 40, detailed description is omitted here.
The audio circuitry 404, speaker 4041, microphone 4042 may provide an audio interface between the user and the terminal 40. The audio circuit 404 may transmit the electrical signal converted from the received audio data to the speaker 4041, and convert the electrical signal into a sound signal by the speaker 4041 for output; on the other hand, the microphone 4042 converts the collected sound signal into an electric signal, which is received by the audio circuit 404 and converted into audio data, which is then processed by the audio data output processor 408 and then transmitted to, for example, another terminal via the RF circuit 401, or the audio data is output to the memory 402 for further processing. The audio circuit 404 may also include an ear-bud jack to provide communication of peripheral headphones with the terminal 40.
WiFi belongs to short-distance wireless transmission technology, and the terminal 40 can help the user send and receive e-mail, browse web pages, access streaming media, etc. through the WiFi module 407, and it provides the user with wireless broadband internet access. Although fig. 4 shows the WiFi module 407, it is understood that it does not belong to the essential constitution of the terminal 40, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 408 is a control center of the terminal 40, connects various parts of the entire terminal 40 using various interfaces and lines, performs various functions of the terminal 40 and processes data by operating or executing computer programs and/or modules stored in the memory 402 and calling data stored in the memory 402, thereby performing overall monitoring of the terminal 40. Optionally, processor 408 may include one or more processing cores; preferably, the processor 408 may integrate an application processor, which handles primarily the operating system, user interface, applications, etc., and a modem processor, which handles primarily the wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 408.
The terminal 40 also includes a power source 409 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 408 via a power management system to manage charging, discharging, and power consumption management functions via the power management system. The power supply 409 may also include any component or components of a dc or ac power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown, the terminal 40 may further include a camera, a bluetooth module, etc., which will not be described herein. Specifically, in the embodiment of the present invention, the output device 404 (or the input device 403) of the terminal is a touch screen display, the terminal 40 further includes a memory 402, a processor 408, and one or more computer programs, where the one or more computer programs are stored in the memory 402, and the processor 408 is configured to call program instructions stored in the memory 402 to execute the virtual key operation method shown in fig. 1-2.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware or may be embodied in a processor executing software program instructions. The software program instructions may be comprised of corresponding software modules that may be stored in Random Access Memory (RAM), flash Memory, Read Only Memory (ROM), Erasable Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), registers, a hard disk, a removable disk, a compact disc Read Only Memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Integrated Circuit (ASIC). In addition, the ASIC may reside in a terminal. Of course, the processor and the storage medium may reside as discrete components in a terminal device.
Those skilled in the art will recognize that, in one or more of the examples described above, the functions described in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more program instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above embodiments are only intended to be illustrative of the embodiments of the present invention, and should not be construed as limiting the scope of the embodiments of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the embodiments of the present invention should be included in the scope of the embodiments of the present invention.

Claims (10)

  1. A virtual key operation method is characterized by comprising the following steps:
    the terminal starts a preset application program;
    the terminal receives a first trigger operation of a user for a first virtual key in the preset application program;
    the terminal detects whether the biological characteristic information of the first user is matched with preset biological characteristic information according to the first trigger operation;
    and if the biological characteristic information of the first user is not matched with the preset biological characteristic information, the original function of the first virtual key is not executed.
  2. The method according to claim 1, wherein after the terminal detects whether the biometric information of the first user matches with preset biometric information according to the first trigger operation, the method further comprises:
    and if the biological characteristic information of the first user is matched with the preset biological characteristic information, executing the original function of the first virtual key.
  3. The method of claim 1, wherein if the biometric information of the first user does not match the preset biometric information, after not executing the original function of the first virtual key, further comprising:
    and executing the replacement function of the first virtual key.
  4. The method of claim 3, wherein prior to performing the replacement function for the first virtual key, further comprising:
    the method comprises the steps that a terminal establishes a first corresponding relation between original functions and replacement functions of virtual keys, wherein the virtual keys comprise first virtual keys;
    after the terminal detects whether the biometric information of the first user is matched with preset biometric information according to the first trigger operation and before the terminal executes the replacement function of the first virtual key, the method further includes:
    if the biological characteristic information of the first user is not matched with the preset biological characteristic information, the terminal acquires a replacement function corresponding to the original function of the first virtual key from the first corresponding relation;
    the terminal executes the replacing function of the first virtual key, and the replacing function comprises the following steps:
    and the terminal executes the replacement function corresponding to the original function of the first virtual key.
  5. The method of any of claims 1 to 4, further comprising: judging whether the running time of the preset application program exceeds a preset time;
    and if so, exiting the preset application program and displaying a screen locking interface.
  6. The method according to claim 5, wherein before determining whether the running time of the preset application program exceeds the preset time, further comprising:
    receiving a password input by a second user;
    judging whether the biological characteristic information of the second user is matched with the preset biological characteristic information or not;
    and if the biological characteristic information of the second user is matched with the preset biological characteristic information, setting the password input by the second user as the unlocking password of the screen locking interface.
  7. A terminal characterized in that the terminal comprises means for performing the virtual key operation method of any one of claims 1-6.
  8. A terminal, characterized in that the terminal comprises: a processor and a memory, the memory for storing program instructions and/or data, the processor for invoking the program instructions stored by the memory to perform the method of virtual key manipulation according to any one of claims 1-6.
  9. A computer storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method of virtual key operation according to any one of claims 1-6.
  10. A computer program comprising program instructions which, when executed by a processor, cause the processor to perform a method of virtual key operation according to any one of claims 1 to 6.
CN201780095479.3A 2017-09-29 2017-09-29 Virtual key operation method, terminal, storage medium, and computer program Pending CN111417921A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/104245 WO2019061248A1 (en) 2017-09-29 2017-09-29 Virtual key operation method, terminal, storage medium, and computer program

Publications (1)

Publication Number Publication Date
CN111417921A true CN111417921A (en) 2020-07-14

Family

ID=65902261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780095479.3A Pending CN111417921A (en) 2017-09-29 2017-09-29 Virtual key operation method, terminal, storage medium, and computer program

Country Status (2)

Country Link
CN (1) CN111417921A (en)
WO (1) WO2019061248A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210206B (en) * 2019-05-28 2021-04-06 维沃移动通信有限公司 Authority management method and terminal

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104238794A (en) * 2013-06-24 2014-12-24 腾讯科技(深圳)有限公司 Method and terminal for responding to touch screen operation, and mobile terminal
CN104572071A (en) * 2014-12-02 2015-04-29 深圳市金立通信设备有限公司 Terminal
CN104572322A (en) * 2014-12-02 2015-04-29 深圳市金立通信设备有限公司 Method for operating terminal screen
CN105554222A (en) * 2015-12-07 2016-05-04 联想(北京)有限公司 Control method and electronic equipment
CN105791529A (en) * 2014-12-24 2016-07-20 芯讯通无线科技(上海)有限公司 Mobile terminal and control method thereof
CN105912239A (en) * 2016-04-25 2016-08-31 乐视控股(北京)有限公司 Operation control method of mobile terminal, and mobile terminal
CN105938529A (en) * 2016-04-14 2016-09-14 北京小米移动软件有限公司 Page display method and apparatus
CN106156567A (en) * 2015-03-23 2016-11-23 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN106484279A (en) * 2016-09-12 2017-03-08 努比亚技术有限公司 A kind of identification and method and the terminal of processing terminal abnormal operation
US9613245B1 (en) * 2015-10-22 2017-04-04 Motorola Mobility Llc Device and method for authentication by a biometric sensor
CN106681717A (en) * 2016-12-16 2017-05-17 珠海格力电器股份有限公司 Terminal application program management method and device and electronic equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104238794A (en) * 2013-06-24 2014-12-24 腾讯科技(深圳)有限公司 Method and terminal for responding to touch screen operation, and mobile terminal
CN104572071A (en) * 2014-12-02 2015-04-29 深圳市金立通信设备有限公司 Terminal
CN104572322A (en) * 2014-12-02 2015-04-29 深圳市金立通信设备有限公司 Method for operating terminal screen
CN105791529A (en) * 2014-12-24 2016-07-20 芯讯通无线科技(上海)有限公司 Mobile terminal and control method thereof
CN106156567A (en) * 2015-03-23 2016-11-23 联想(北京)有限公司 A kind of information processing method and electronic equipment
US9613245B1 (en) * 2015-10-22 2017-04-04 Motorola Mobility Llc Device and method for authentication by a biometric sensor
CN105554222A (en) * 2015-12-07 2016-05-04 联想(北京)有限公司 Control method and electronic equipment
CN105938529A (en) * 2016-04-14 2016-09-14 北京小米移动软件有限公司 Page display method and apparatus
CN105912239A (en) * 2016-04-25 2016-08-31 乐视控股(北京)有限公司 Operation control method of mobile terminal, and mobile terminal
CN106484279A (en) * 2016-09-12 2017-03-08 努比亚技术有限公司 A kind of identification and method and the terminal of processing terminal abnormal operation
CN106681717A (en) * 2016-12-16 2017-05-17 珠海格力电器股份有限公司 Terminal application program management method and device and electronic equipment

Also Published As

Publication number Publication date
WO2019061248A1 (en) 2019-04-04

Similar Documents

Publication Publication Date Title
US20190320211A1 (en) Method, device and system for in-sequence live streaming
CN108055408B (en) Application program control method and mobile terminal
CN108279948B (en) Application program starting method and mobile terminal
CN108135033B (en) Bluetooth connection method and mobile terminal
CN108334272B (en) Control method and mobile terminal
CN107743178B (en) Message playing method and mobile terminal
CN107613146B (en) Volume adjustment method and device and mobile terminal
CN108174037B (en) Notification message prompting method and mobile terminal
CN107870674B (en) Program starting method and mobile terminal
CN106445596B (en) Method and device for managing setting items
CN108391008B (en) Message reminding method and mobile terminal
CN107633853B (en) Control method for playing audio and video files and user terminal
CN110308834B (en) Setting method of application icon display mode and terminal
CN108681413B (en) Control method of display module and mobile terminal
CN108196753B (en) Interface switching method and mobile terminal
CN110784915B (en) Power consumption control method of electronic equipment and electronic equipment
WO2020024770A1 (en) Method for determining communication object, and mobile terminal
CN108881778B (en) Video output method based on wearable device and wearable device
CN107832067B (en) Application updating method, mobile terminal and computer readable storage medium
CN108429855B (en) Message sending control method, terminal and computer readable storage medium
CN108008892B (en) Function starting method and terminal
CN111078186A (en) Playing method and electronic equipment
CN108304108B (en) Icon display method of application program and mobile terminal
CN109729431B (en) Video privacy protection method and terminal equipment
CN110784394A (en) Prompting method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination