WO2018094567A1 - Procédé de saisie et dispositif terminal - Google Patents

Procédé de saisie et dispositif terminal Download PDF

Info

Publication number
WO2018094567A1
WO2018094567A1 PCT/CN2016/106783 CN2016106783W WO2018094567A1 WO 2018094567 A1 WO2018094567 A1 WO 2018094567A1 CN 2016106783 W CN2016106783 W CN 2016106783W WO 2018094567 A1 WO2018094567 A1 WO 2018094567A1
Authority
WO
WIPO (PCT)
Prior art keywords
input
terminal device
determining
fingerprint
information
Prior art date
Application number
PCT/CN2016/106783
Other languages
English (en)
Chinese (zh)
Inventor
卢虹宇
代理军
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to PCT/CN2016/106783 priority Critical patent/WO2018094567A1/fr
Priority to CN201680001827.1A priority patent/CN106687970A/zh
Publication of WO2018094567A1 publication Critical patent/WO2018094567A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the embodiments of the present application relate to the field of information technology, and more specifically, to an input method and a terminal device.
  • the user can pre-enter one or more fingerprint information through the fingerprint collection device.
  • the terminal device can generate a corresponding fingerprint template according to the fingerprint information that is pre-recorded.
  • the fingerprint may be used to verify the legal identity of the user.
  • anyone can operate the terminal device for example, view information such as pictures, video files, short messages, and call records saved by the terminal device. This may result in the leakage of privacy of the user.
  • anyone can perform normal operations on the app such as viewing content saved in the app. This will also cause leakage of the user's privacy.
  • the application that the user logs in and unlocks is an application related to financial property, the user's property may also be lost. For example, if the application is a bank client, anyone can view account balances, transaction records, etc. after the user logs in and unlocks the application. If you know the transaction password of the user, you can transfer the funds in the user account to other accounts without authorization.
  • the embodiment of the present application provides an input method and a terminal device to improve security of the terminal device.
  • an embodiment of the present application provides an input method, including: determining, in an unlocked state, a validity of an input acquired in a touch recognition area, including: collecting the input fingerprint information. Next, determine whether the matching fingerprint template is saved in the fingerprint database. If the matching fingerprint template is saved in the fingerprint database, it is determined that the input is a valid input. If the matching fingerprint template is not saved in the fingerprint database or the input fingerprint information is not collected, the input is determined to be an invalid input.
  • the matching fingerprint template is a fingerprint template matching the input fingerprint information; determining the input input information, wherein the input input information includes the duration of the input and the input position change information; according to the input
  • the input information determines an operation event; in the case where the input is a valid input, the operation event is executed, wherein the validity of the acquired input is determined each time the input is acquired in the touch recognition area.
  • the method further includes: determining, after determining the validity of the input obtained by the touch recognition area, that the terminal device is running the specified application, where
  • the specified application is a pre-set application.
  • the above technical solution may specify one or more applications, and each time the input is detected in the touch recognition area, it is required to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application.
  • the above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
  • the method further includes: determining, before determining the validity of the input obtained by the touch recognition area, determining that the terminal device is running the specified function of the application
  • the module wherein the designated function module is a function module preset by a user or a function module that needs to verify that the user is a legitimate user.
  • the determining the input information of the input includes: acquiring a start time of the input, and End time of the input; determining a duration of the input according to the start time of the input and the end time of the input; acquiring a start position of the input and an end position of the input; The input position change information is determined based on the input start position and the input end position.
  • the determining, according to the input input information, an operation event including: according to the input The duration and the input position change information determine whether the operation event is a click operation or a long press operation; or determine the operation event as a sliding operation according to the input position change information.
  • the embodiment of the present application provides a terminal device, where the terminal device includes a touch recognition unit, a fingerprint identification unit, and a processing unit: the processing unit is configured to determine that the touch recognition unit is touching when the terminal device is in an unlocked state. Identifying the validity of the input obtained by the area, wherein the processing unit determines whether the matching fingerprint template is saved in the fingerprint database, and saves the matching in the fingerprint database, in the case that the fingerprint identification unit collects the input fingerprint information.
  • the fingerprint template determines that the input is a valid input, and if the matching fingerprint template is not saved in the fingerprint database or the fingerprint identification unit does not collect the input fingerprint information, determining that the input is an invalid input, wherein the matching fingerprint template a fingerprint template matching the input fingerprint information;
  • the touch recognition unit is configured to determine input information of the input, wherein the input input information includes a duration of the input and position change information of the input;
  • the processing unit also used to determine the operation based on the input information of the input An event, and in the case where the input is a valid input, the operation event is performed; wherein the processing unit determines the input acquired by the touch recognition unit each time the touch recognition unit acquires an input in the touch recognition area Effectiveness.
  • the processing unit is further configured to: before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running the specified application , wherein the specified application is a pre-set application.
  • the above technical solution may specify one or more applications, and each time the input is detected in the touch recognition area, it is required to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application.
  • the above technical solution not only satisfies the convenience of using the terminal device, but also In order to protect the privacy of users and the purpose of property security.
  • the processing unit is further configured to: before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running the application
  • the function module is specified, wherein the specified function module is a function module preset by the user or a function module that needs to be verified that the user is a legitimate user.
  • the touch recognition unit is configured to acquire a start time of the input and the input End time, determining a duration of the input according to the start time of the input and the end time of the input; acquiring a start position of the input and an end position of the input, according to the start position of the input and the input The end position determines the position change information of the input.
  • the processing unit is specifically configured to use the duration of the input and the input location
  • the change information determines whether the operation event is a click operation or a long press operation; or determines the operation event as a sliding operation according to the input position change information.
  • the above technical solution can greatly improve the security of the terminal device, thereby protecting the privacy of the user and the security of the property.
  • FIG. 1 is a schematic flowchart of an input method according to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a terminal device in an unlocked state.
  • FIG. 3 is a schematic diagram of another terminal device in an unlocked state.
  • FIG. 4 is a structural block diagram of a terminal device according to an embodiment of the present application.
  • the touch recognition area of the terminal device in the present application includes a fingerprint collection area used by the terminal device to collect fingerprints.
  • the terminal device may be a mobile phone, a tablet computer, a computer, etc., and the application is implemented. This example is not limited to this.
  • the manner in which the terminal device implements touch recognition in the touch recognition area in the embodiment of the present application includes, but is not limited to, a capacitive touch sensor and an inductive touch sensor.
  • the manner in which the terminal device implements fingerprint collection in the fingerprint collection area in the embodiment of the present application includes, but is not limited to, a push type fingerprint recognition device and an optical fingerprint recognition device.
  • the location of the fingerprint collection area in the embodiment of the present application may be located on the front, the back, or the side of the terminal device, or may be located in the display area of the terminal device.
  • FIG. 1 is a schematic flowchart of an input method according to an embodiment of the present application. The method shown in Figure 1 can be performed by a terminal device.
  • an operation event is determined according to the input input information.
  • the operation event is performed, wherein the validity of the acquired input is determined each time an input is acquired in the touch recognition area of the terminal device.
  • the method may further include: determining that the terminal device is running the specified application, wherein the specified application It is a pre-set application.
  • the preset may be preset by the user or may be preset by the operating system of the terminal device.
  • the above technical solution can specify one One or more applications, each time the input is detected in the touch recognition area, it is necessary to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application.
  • the above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
  • the specified one or more applications may be applications that involve personal privacy, such as photos, text messages, applications related to financial assets (eg, bank clients), and the like.
  • the other application may be an application that does not involve personal privacy, such as games, information applications, and the like.
  • a non-designated application such as a game or an information application.
  • only legitimate users can use photos, text messages, etc. to specify applications.
  • the method may further include: determining that the terminal device is running a specified function module of the application, wherein the designated function module A function module preset for the user or a function module that needs to verify that the user is a legitimate user.
  • the terminal device is running a specified function module of the application, wherein the designated function module A function module preset for the user or a function module that needs to verify that the user is a legitimate user.
  • An application may include different functional modules.
  • the phone application can include a call recording function module, a contact function module, and a dial keypad function module.
  • the user of the terminal device may preset the call record module and the contact function module as the designated function module. In this way, anyone can make a call using the dial pad function module of the phone application of the terminal device, but the call record and the contact information cannot be viewed.
  • the user sets the specified function module, the user needs to verify that the user is a legitimate user.
  • Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification.
  • the camera application can include a camera function module, a camera function module, and an album function module.
  • the user of the terminal device can preset the album function module as the designated function module. In this way, anyone can take photos with the camera function module or use the camera function module to take pictures, but cannot view photos saved in the album. Similarly, when setting the specified function module, the user needs to verify that the user is a legitimate user. Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification.
  • bank client applications typically include functional modules related to financial assets, such as transfers, transaction record inquiries, and purchase of wealth management products.
  • Bank client applications usually include some information function modules, such as financial product recommendation, financial information, and so on. Users need to authenticate when using functional modules related to financial assets.
  • the functional module related to the financial property can only be run if the user is a legitimate user. Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification.
  • the functional module related to the financial property is the designated functional module.
  • the determining the input information of the input comprises: acquiring a start time of the input and an end time of the input; determining, according to the start time of the input and the end time of the input, The duration of the input; the start position of the input and the end position of the input; and the position change information of the input is determined according to the start position of the input and the end position of the input.
  • the input is sequentially started, and the touch object is separated from the touch recognition area to indicate that the input ends.
  • a double-click operation is an operational event that results from two inputs. This is because when the user completes a click, they need to raise their finger and then click on the same location again.
  • the touch state is moved back to the touch recognition area after moving from the touch recognition area to the non-touch recognition area (for example, the border of the terminal device) during the continuous movement of the finger, the input is also two times.
  • determining the operation event according to the input information of the input includes: determining, according to the duration of the input and the position change information of the input, the operation event as a click operation or a long press operation Or determining the operation event as a sliding operation according to the input position change information.
  • the operation event is a click operation.
  • the first operation time is determined to be a slide operation. Further, according to the input position change information and the input The duration determines the sliding speed of the sliding operation.
  • FIG. 2 is a schematic diagram of a terminal device in an unlocked state.
  • the terminal device 200 shown in FIG. 2 includes a display screen 201 and a button 202.
  • the touch recognition area of the terminal device 200 includes an area where the display screen 201 is located and an area where the button 202 is located.
  • the fingerprint identification area of the terminal device 200 is located in the area where the button 202 is located.
  • FIG. 2 is a schematic diagram of the terminal device 200 in an unlocked state. As shown in FIG. 2, when the terminal device 200 is in the unlocked state, the display interface of the display screen 201 presents a total of 16 icons in 4 rows and 4 columns.
  • the icon indicated by the first dotted line of the first line of the display interface 201 of the terminal device 200 shown in FIG. 2 is the default candidate icon.
  • the registered finger referred to in the following embodiment means that the terminal device 200 holds a fingerprint template corresponding to the registered finger. In other words, the terminal device 200 can confirm that the input generated by the registered finger is a valid input.
  • the unregistered finger referred to in the following embodiment means that the terminal device 200 does not store a fingerprint template corresponding to the unregistered finger. In other words, the terminal device 200 can determine that the input generated by the unregistered finger is an invalid input.
  • the terminal device 200 When the terminal device 200 is in the unlocked state, it is necessary to judge the validity of the acquired input each time the input is acquired in the touch recognition area. Taking FIG. 2 as an example, whether the user is a legitimate user or not, the input of the icon selected by the user directly on the display screen 201 using the finger is an invalid input. This is because the input fingerprint is not acquired in the area where the display 201 is located, and thus the input fingerprint information generated by the finger cannot be detected. Inputs that cannot detect fingerprint information are invalid inputs.
  • the user can operate the terminal 200 in the fingerprint identification area. For example, the user can click on the fingerprint identification area using the registered finger (ie, touch an area within the range of the fingerprint identification area (ie, the area where the button 202 is located) and quickly lift up, the input is not in the fingerprint identification area. Move and the duration of this input is very short). In this case, the input can be considered a click operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In this case, the terminal device 200 can perform a one-click operation. The result of the operation of the terminal device 200 performing the click operation may be to start an application corresponding to the candidate icon. If the user clicks on the fingerprint identification area using an unregistered finger, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a click operation.
  • the terminal device 200 can determine that the operation event generated by the input is a rightward sliding operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In this case, the terminal device 200 can perform a rightward sliding operation. As a result of the terminal device 200 performing the rightward sliding operation, the candidate icon can be changed from the icon of the first line of the first line as shown in FIG. 2 to the other icon. Similarly, if the user is using an unregistered finger to make a right swipe input on the fingerprint recognition area, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a sliding operation to the right.
  • the terminal device 200 may determine the changed candidate icon according to the sliding distance of the sliding operation. For example, if the sliding distance is less than the first distance threshold, the changed candidate icon is the second icon of the first line. For another example, if the sliding distance is greater than the first distance threshold and less than the second distance threshold, the changed candidate icon is the third icon of the first line.
  • the terminal device 200 may determine the changed candidate icon according to the sliding speed of the sliding operation.
  • the terminal device 200 may determine a better candidate icon according to the sliding speed and the sliding distance of the sliding operation.
  • the user can also use the registered finger to slide the selection candidate icon in other directions.
  • the specific implementation is similar to the manner of sliding the selection candidate icon by swiping to the right, and need not be described here.
  • the user can use the registered finger to long press the fingerprint identification area (ie, an area of the fingerprint identification area is known and stays for a period of time, and the input does not move within the fingerprint identification area).
  • the input can be considered to be a long press operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In this case, the terminal device 200 can perform a long press operation. The result of the terminal device 200 performing the long press operation may be that the preset content is presented on the display screen 201 of the terminal device 200. Similarly, if the user uses an unregistered finger to press the fingerprint recognition area, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a long press operation.
  • the terminal device 200 can determine a corresponding operation according to an operation event that the user continuously inputs a plurality of times. For example, the terminal device 200 detects that the user clicks the fingerprint recognition area using the registered finger for two consecutive times within a certain time range, and the terminal device 200 can perform a double-click operation. However, if the user clicks the fingerprint recognition area once each time using the registered finger and the unregistered finger in the time range, the terminal device 200 cannot perform the double-click operation.
  • the user can select an application that is desired to run in the terminal device 200 through the fingerprint identification area.
  • the terminal device 200 is running the specified application or the designation of the application Function module
  • the user can also select the content in the application that he wants to open through the fingerprint identification area. For example, the user can use the registered finger to perform a sliding input in the fingerprint recognition area to select a candidate content that is desired to be opened, and then use the registered finger to click the fingerprint identification area to open the selected candidate content.
  • FIG. 3 is a schematic diagram of another terminal device in an unlocked state.
  • the terminal device 300 shown in FIG. 3 includes a display screen 301.
  • the touch recognition area of the terminal device 300 includes an area where the display screen 301 is located.
  • the fingerprint identification area of the terminal device 300 also includes the area where the display screen 301 is located. That is to say, the area where the display screen 301 is located can acquire input input information as well as input fingerprint information.
  • the terminal device 300 performs only an operation event generated by the user using the input of the registered finger in the area where the display screen 301 is located. If the input is made by the unregistered finger on the display screen 301, the terminal device 300 does not perform the operation event corresponding to the input. That is, the user can normally operate the terminal device 300 using the registered finger, such as clicking an icon presented on the display screen 301, dragging the icon, and switching the displayed icon by sliding. However, even if the terminal device 300 is already in the unlocked state, the unregistered finger cannot operate the terminal device 300, or can only operate the limited application or the function module in the application set by the legitimate user or the terminal device.
  • FIG. 4 is a structural block diagram of a terminal device according to an embodiment of the present application.
  • the terminal device 400 shown in FIG. 4 includes a processing unit 401, a touch recognition unit 402, and a fingerprint recognition unit 403.
  • the processing unit 401 is configured to determine, when the terminal device 400 is in the unlocked state, the validity of the input acquired by the touch recognition unit 402 in the touch recognition area, where the processing unit 401 collects the input fingerprint information in the fingerprint identification unit 403. And determining whether the matching fingerprint template is saved in the fingerprint database, and determining that the input is a valid input when the matching fingerprint template is saved in the fingerprint database, and the matching fingerprint template is not saved in the fingerprint database or the fingerprint identification unit 403 is not collected.
  • the input is determined to be an invalid input in the case of the input fingerprint information, wherein the matching fingerprint template is a fingerprint template that matches the input fingerprint information.
  • the touch recognition unit 402 is configured to determine input information of the input, wherein the input input information includes a duration of the input and position change information of the input.
  • the processing unit 401 is further configured to determine an operation event according to the input input information, and execute the operation event if the input is a valid input, where the processing unit 401 is in the touch recognition area each time the touch recognition unit 402 is located In the case where the input is obtained, the validity of the input acquired by the touch recognition unit 402 is judged.
  • the terminal device 400 In the case where the terminal device 400 is in the unlocked state, each time the user inputs the touch recognition area, it is necessary to determine whether the user who performed the input is a legitimate user. Thus, even if the terminal device 400 is in the unlocked state, the non-legitimate user cannot operate the end device by a touch operation. In this way, the security of the terminal device 400 can be greatly improved.
  • the processing unit 401 is further configured to determine that the terminal device is running a specified application, where the specified application is a preset application.
  • the processing unit 401 is further configured to determine that the terminal device is running a specified function module of the application, where the designated function module is a function module preset by the user or needs to verify that the user is a legitimate user. Access to the function module.
  • the touch recognition unit 402 is configured to acquire a start time of the input and an end time of the input, and determine a duration of the input according to the start time of the input and the end time of the input; and acquiring the input
  • the start position and the end position of the input determine the position change information of the input based on the start position of the input and the end position of the input.
  • the processing unit 401 is specifically configured to determine, according to the duration of the input and the position change information of the input, that the operation event is a click operation or a long press operation; or the processing unit 401, specifically for the location according to the input
  • the change information determines that the operation event is a sliding operation.
  • Processing unit 401 can be implemented by a processor.
  • Touch recognition unit 402 can be implemented by a touch sensor including, but not limited to, a capacitive touch sensor, an inductive touch sensor.
  • the fingerprint identification unit 403 can be implemented by a fingerprint recognition device including, but not limited to, a push type fingerprint recognition device and an optical fingerprint recognition device.
  • the terminal device 400 may also include some other units, such as a power source, a communication unit, an imaging unit, and the like.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods described in the various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)
  • Collating Specific Patterns (AREA)

Abstract

La présente invention concerne un procédé de saisie et un dispositif terminal. Le procédé consiste à : déterminer la validité d'une saisie acquise dans une zone de reconnaissance tactile lorsqu'un dispositif terminal est dans un état déverrouillé (101), qui consiste à : déterminer si un modèle d'empreinte digitale apparié est stocké dans une base de données d'empreintes digitales dans un cas où des informations d'empreintes digitales d'entrée sont collectées, déterminer que la saisie est une saisie valide si le modèle d'empreinte digitale apparié est stocké dans la base de données d'empreintes digitales, et déterminer que la saisie est une saisie invalide où le modèle d'empreinte digitale apparié n'est pas stocké dans la base de données d'empreintes digitales ou que les informations d'empreintes digitales d'entrée ne sont pas collectées; à déterminer des informations d'entrée concernant la saisie (102); déterminer un événement d'opération en fonction des informations de saisie concernant la saisie (103); et où la saisie est une saisie valide, exécuter l'événement d'opération (104), chaque fois qu'une saisie est acquise dans la zone de reconnaissance tactile, la validité de la saisie acquise est déterminée. La solution technique peut améliorer la sécurité du dispositif terminal.
PCT/CN2016/106783 2016-11-22 2016-11-22 Procédé de saisie et dispositif terminal WO2018094567A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2016/106783 WO2018094567A1 (fr) 2016-11-22 2016-11-22 Procédé de saisie et dispositif terminal
CN201680001827.1A CN106687970A (zh) 2016-11-22 2016-11-22 输入方法和终端设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/106783 WO2018094567A1 (fr) 2016-11-22 2016-11-22 Procédé de saisie et dispositif terminal

Publications (1)

Publication Number Publication Date
WO2018094567A1 true WO2018094567A1 (fr) 2018-05-31

Family

ID=58850524

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/106783 WO2018094567A1 (fr) 2016-11-22 2016-11-22 Procédé de saisie et dispositif terminal

Country Status (2)

Country Link
CN (1) CN106687970A (fr)
WO (1) WO2018094567A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325334B (zh) * 2018-09-26 2020-11-13 维沃移动通信有限公司 一种触控终端控制方法和触控终端

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090235068A1 (en) * 2008-03-13 2009-09-17 Fujitsu Limited Method and Apparatus for Identity Verification
CN102467462A (zh) * 2010-11-17 2012-05-23 中国移动通信集团公司 保护设备中存储的数据的方法和相应的设备
CN103366107A (zh) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 一种保护应用程序访问权限的方法、装置及手机
CN103886239A (zh) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 一种移动终端应用程序的用户鉴权方法和装置
CN104008321A (zh) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 移动终端的基于指纹识别用户权限的判别方法和判断系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105022570A (zh) * 2015-06-30 2015-11-04 广东欧珀移动通信有限公司 一种通过指纹识别控制应用的方法及终端设备
CN105678147B (zh) * 2016-01-05 2020-03-20 网易(杭州)网络有限公司 触控操作的方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090235068A1 (en) * 2008-03-13 2009-09-17 Fujitsu Limited Method and Apparatus for Identity Verification
CN102467462A (zh) * 2010-11-17 2012-05-23 中国移动通信集团公司 保护设备中存储的数据的方法和相应的设备
CN103366107A (zh) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 一种保护应用程序访问权限的方法、装置及手机
CN103886239A (zh) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 一种移动终端应用程序的用户鉴权方法和装置
CN104008321A (zh) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 移动终端的基于指纹识别用户权限的判别方法和判断系统

Also Published As

Publication number Publication date
CN106687970A (zh) 2017-05-17

Similar Documents

Publication Publication Date Title
US10824707B2 (en) Method and device for providing security content
US10248776B2 (en) Background enrollment and authentication of a user
KR102223416B1 (ko) 사용자 인증 제스쳐 기법
CN106055996B (zh) 一种多媒体信息分享方法及移动终端
US10002244B2 (en) Utilization of biometric data
EP3482331B1 (fr) Obscurcissement de données lors de la collecte de données comportementales
CN107223254B (zh) 用于隐藏设置处理的方法、用户装置和存储介质
WO2017020427A1 (fr) Procédé d'accès à un programme d'application, et terminal
JP2014502763A (ja) バイオキネマティック入力を用いるユーザ識別
CN106355141B (zh) 可携式电子装置及其操作方法
CN105678147B (zh) 触控操作的方法和装置
WO2011049711A2 (fr) Accès aux ressources basé sur plusieurs preuves d'identité
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
WO2018107727A1 (fr) Procédé et dispositif de traitement d'informations, et terminal
CN104598792A (zh) 一种终端
CN105335088A (zh) 一种文件分享方法及装置
WO2018094567A1 (fr) Procédé de saisie et dispositif terminal
Schaffer Expanding continuous authentication with mobile devices
JPWO2021131060A1 (ja) 認証システム、認証装置、認証方法、及びプログラム
US20180239884A1 (en) Detection System, Fingerprint Sensor, and Method of Finger Touch Authentication Thereof
TWM556877U (zh) 登入驗證裝置及登入驗證系統
KR20150029251A (ko) 전자 장치 내의 객체를 보안하기 위한 방법 및 이를 위한 전자 장치
Yıldırım et al. Mobile biometric security systems for today and future
JP2023012582A (ja) 出力制御プログラム、出力制御方法および端末装置
WO2018132970A1 (fr) Procédé et terminal de manipulation d'informations privées

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16922118

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16922118

Country of ref document: EP

Kind code of ref document: A1