CN102902907B - A kind of collocation method, inking device and electronic equipment - Google Patents

A kind of collocation method, inking device and electronic equipment Download PDF

Info

Publication number
CN102902907B
CN102902907B CN201210370355.0A CN201210370355A CN102902907B CN 102902907 B CN102902907 B CN 102902907B CN 201210370355 A CN201210370355 A CN 201210370355A CN 102902907 B CN102902907 B CN 102902907B
Authority
CN
China
Prior art keywords
input
function
authentication
partially
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210370355.0A
Other languages
Chinese (zh)
Other versions
CN102902907A (en
Inventor
范志锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201210370355.0A priority Critical patent/CN102902907B/en
Publication of CN102902907A publication Critical patent/CN102902907A/en
Priority to PCT/CN2013/079398 priority patent/WO2013182131A1/en
Application granted granted Critical
Publication of CN102902907B publication Critical patent/CN102902907B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the present invention provides a kind of collocation method, inking device and electronic equipment.Described collocation method comprises: obtain the authentication configuration information of user by the function at least partially in the application of the first input block input; Carry out authentication configuration according to described authentication configuration information to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be used.The embodiment of the present invention supports the setting of the rights of using to the function at least partially in application.

Description

A kind of collocation method, inking device and electronic equipment
Technical field
The embodiment of the present invention relates to electronic device field, particularly relates to a kind of collocation method, inking device and electronic equipment.
Background technology
At present, electronic equipment (as mobile phone, computer, digital camera etc.) is prefixed the function (such as, user needs to input the unblock that password could trigger screen) comprising rights of using usually.But in some cases, user may wish to need to arrange the function (such as, user may wish be set using authority to the note of some in short message inbox thus avoid other people to see these notes) comprising rights of using according to self.This demand do not supported by current electronic equipment.
Summary of the invention
In view of this, the object of the embodiment of the present invention is to provide a kind of collocation method, inking device and electronic equipment, to support the setting of the rights of using to the function at least partially in application.
For solving the problems of the technologies described above, the embodiment of the present invention provides scheme as follows:
The embodiment of the present invention provides a kind of collocation method, and described collocation method comprises:
Obtain the authentication configuration information of user by the function at least partially in the application of the first input block input;
Carry out authentication configuration according to described authentication configuration information to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be used.
Preferably, the authentication configuration information of the function at least partially in the application that inputted by the first input block of described acquisition user is specially:
Obtain user according to the authentication configuration information of the first input mode preset by the function at least partially in the application of the first input block input.
Preferably, described first input mode is according to the input operation of described user by the second input block, selects to obtain in the two or more input modes preset.
Preferably,
Described first input block comprises two or more input subelement;
Described first input mode comprises the input submode inputting the identical number of subelement with described two or more, inputs subelement one_to_one corresponding with described two or more,
Authentication configuration information comprises the authentication inputting the identical number of subelement with described two or more and configures sub-information, inputs subelement one_to_one corresponding with described two or more,
The authentication configuration information of the function at least partially in the application that described acquisition user is inputted by the first input block according to the first input mode preset is specially:
To each input subelement in described two or more input subelement, obtain the authentication corresponding with described each input subelement that described user inputted by described each input subelement according to the input submode corresponding with described each input subelement and configure sub-information.
Preferably,
At least one in described two or more input subelement is according to the input operation of described user by the 3rd input block, is not select to obtain in the input subelement set of 1 at the element preset; And/or,
At least one in whole described input submode is according to the input operation of described user by the 4th input block, is not select to obtain in the input submode set of 1 at the element preset.
Preferably, the authentication corresponding with described each input subelement that the described user of described acquisition is inputted by described each input subelement according to the input submode corresponding with described each input subelement configures sub-information and is specially:
According to the time relationship preset, obtain the authentication corresponding with described each input subelement that described user inputted by described each input subelement according to the input submode corresponding with described each input subelement and configure sub-information.
Preferably, described time relationship is according to the input operation of described user by the 5th input block, is not select to obtain in the time relationship set of 1 at the element preset.
Preferably, describedly carry out authentication configuration according to described authentication configuration information to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be specially by use:
The first authentication feature information is generated according to described authentication configuration information and fisrt feature information generating algorithm; Wherein, described fisrt feature information generating algorithm is corresponding with described first input mode and described first input block;
Carry out operation associated to described function at least partially and described first authentication feature information, make when the matching condition that described first authentication feature information is corresponding does not meet, described function at least partially cannot be used.
Preferably, described collocation method also comprises:
Obtain user according to the operation information of the second input mode by the 6th input block input;
Judge whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtain the first judged result;
When described first judged result is for being, described in permission, function is used at least partially;
When described first judged result is no, described in not allowing, function is used at least partially.
Preferably, describedly judge whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtain the first judged result and be specially:
Judge whether that described second input mode is identical with described first input mode and described 6th input block is identical with described first input block, obtain the second judged result;
When described second judged result is for being, generate the second authentication feature information according to described operation information and described fisrt feature information generating algorithm;
Judge whether described second authentication feature information meets described matching condition, if so, then described first judged result is yes; Otherwise described first judged result is no.
Preferably, described function is at least partially according to the input operation of described user by the 7th input block, described application can be used for described authentication configuration function in select to obtain.
The embodiment of the present invention also provides a kind of inking device, and described inking device comprises:
First acquisition module, for obtaining the authentication configuration information of the function at least partially in application that user inputted by the first input block;
Configuration module, for carrying out authentication configuration according to described authentication configuration information to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be used.
Preferably, described first acquisition module comprises:
Acquiring unit, for obtaining the authentication configuration information of the function at least partially in application that user inputted by the first input block according to the first input mode preset.
Preferably, described configuration module comprises:
First generation unit, for generating the first authentication feature information according to described authentication configuration information and fisrt feature information generating algorithm; Wherein, described fisrt feature information generating algorithm is corresponding with described first input mode and described first input block;
Associative cell, for carrying out operation associated to described function at least partially and described first authentication feature information, make when the matching condition that described first authentication feature information is corresponding does not meet, described function at least partially cannot be used.
Preferably, described inking device also comprises:
Second acquisition module, for obtaining the operation information that user is inputted by the 6th input block according to the second input mode;
Judge module, for judging whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtains the first judged result;
First execution module, for when described first judged result is for being, described in permission, function is used at least partially;
Second execution module, for when described first judged result is no, described in not allowing, function is used at least partially.
Preferably, described judge module comprises:
Judging unit, for judging whether that described second input mode is identical with described first input mode and described 6th input block is identical with described first input block, obtains the second judged result;
Second generation unit, for when described second judged result is for being, generates the second authentication feature information according to described operation information and described fisrt feature information generating algorithm;
Processing unit, for judging whether described second authentication feature information meets described matching condition, if so, then described first judged result is yes; Otherwise described first judged result is no.
The embodiment of the present invention also provides a kind of electronic equipment comprising above-mentioned inking device.
As can be seen from the above, the embodiment of the present invention at least has following beneficial effect:
By the authentication configuration information of the function at least partially in the application that inputs according to user to this at least partially function carry out authentication configuration, make when the authentication success conditions that authentication configuration information is corresponding does not meet, this at least partially function cannot be used, thus support the setting of rights of using to the function at least partially in application.
Accompanying drawing explanation
The process flow diagram of a kind of collocation method that Fig. 1 provides for the embodiment of the present invention;
The pattern learning process flow diagram of the preferred implementation that Fig. 2 provides for the embodiment of the present invention;
The pattern-recognition process flow diagram of the preferred implementation that Fig. 3 provides for the embodiment of the present invention;
The address book function of the preferred implementation that Fig. 4 provides for the embodiment of the present invention and informational function pattern-recognition schematic diagram.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawings and the specific embodiments the embodiment of the present invention is described in detail.
The process flow diagram of a kind of collocation method that Fig. 1 provides for the embodiment of the present invention, with reference to Fig. 1, described collocation method comprises the steps:
Step 101, obtains the authentication configuration information of user by the function at least partially in the application of the first input block input;
Step 102, carries out authentication configuration according to described authentication configuration information to described function at least partially, and make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be used.
Visible, by the authentication configuration information of the function at least partially in the application that inputs according to user to this at least partially function carry out authentication configuration, make when the authentication success conditions that authentication configuration information is corresponding does not meet, this at least partially function cannot be used, thus support the setting of rights of using to the function at least partially in application.
Wherein, described first input block can be various input block, such as, touch screen unit, push-button unit, camera unit, peripheral sensors unit, private genus information (such as finger print information, the human eye information) recognition unit of user etc., or can be the combination of various input block.The sensing cell of present intelligent machine constantly increases, and any feasible sensing cell or its various combination can be described first input block.
Described authentication configuration information can be various forms of password, and such as, the forms such as character, numeral, figure, finger print information, human eye information, also can for the physical quantity collected by various input block.
Described function at least partially can be partial function or the repertoire of described application.Such as, so to the situation of partial function, the editing authority of a certain file, some mail in mailbox, the part business card in phone contact book, the partial information content in info menu, dials function, the sending function in informational function in telephony feature, etc.
Describedly carry out authentication configuration, such as, the rights of using of described authentication configuration information with described function are at least partially associated.
Described authentication success conditions, such as, after quantification after the information obtained by the input operation of user quantizes respectively by certain quantization algorithm with described authentication configuration information, information is identical, or the degree of association of the information obtained by the input operation of user and described authentication configuration information meets default Correlation Criteria.
The authentication configuration information of the function at least partially in the application that described acquisition user is inputted by the first input block is specifically as follows:
Obtain user according to the authentication configuration information of the first input mode preset by the function at least partially in the application of the first input block input.
Wherein, described first input mode is such as: the number of operations of described first input block, the input form that described first input block accepts is (if volume adjusting key is using pressing as once inputting, or using be transferred to certain higher volume be transferred to again certain comparatively amount of bass as once input), the allowed band (as 1 to 2 second) in the time interval of adjacent operator during multi-pass operations.
Further, in order to provide personalized service to user, described first input mode can be according to the input operation of described user by the second input block, selects to obtain in the two or more input modes preset.
Described first input block can comprise two or more input subelement, correspondingly, and Ke Yiyou:
Described first input mode comprises the input submode inputting the identical number of subelement with described two or more, inputs subelement one_to_one corresponding with described two or more,
Authentication configuration information comprises the authentication inputting the identical number of subelement with described two or more and configures sub-information, inputs subelement one_to_one corresponding with described two or more,
The authentication configuration information of the function at least partially in the application that described acquisition user is inputted by the first input block according to the first input mode preset is specially:
To each input subelement in described two or more input subelement, obtain the authentication corresponding with described each input subelement that described user inputted by described each input subelement according to the input submode corresponding with described each input subelement and configure sub-information.
Wherein, the example of described input subelement can be identical or similar for the example cited by described first input block with above-mentioned, the example of described input submode can be identical or similar for the example cited by described first input mode with above-mentioned, do not repeat them here.
Further, described two or more input subelement and whole described input submode can provide for system default.Or, in order to provide personalized service to user,
At least one in described two or more input subelement can be according to the input operation of described user by the 3rd input block, is not select to obtain in the input subelement set of 1 at the element preset; And/or,
At least one in whole described input submode can be according to the input operation of described user by the 4th input block, is not select to obtain in the input submode set of 1 at the element preset.
Wherein, if there is the input subelement or input submode that are not obtained by selection, then can be provided by system default.
The authentication corresponding with described each input subelement that the described user of described acquisition is inputted by described each input subelement according to the input submode corresponding with described each input subelement configures sub-information and is specifically as follows:
According to the time relationship preset, obtain the authentication corresponding with described each input subelement that described user inputted by described each input subelement according to the input submode corresponding with described each input subelement and configure sub-information.
Described time relationship can for obtain simultaneously within a certain period of time; Also can for obtain successively, the input subelement corresponding to each acquisition can be limited, also can not limit, namely according to the input order of user's reality for obtaining order; Also can be first obtain part input subelement within a certain period of time to obtain another part input subelement more successively simultaneously, such as first parallel authentication corresponding to input subelement X that obtain configures sub-information and authentication corresponding to input subelement Y configures sub-information, then obtains authentication corresponding to input subelement Z successively and configure sub-information and the sub-information of authentication corresponding to input subelement W; Also can be first obtain part input subelement successively to obtain another part input subelement within a certain period of time more simultaneously.
Further, in order to provide personalized service to user, described time relationship can be according to the input operation of described user by the 5th input block, is not select to obtain in the time relationship set of 1 at the element preset.
On the other hand, describedly carry out authentication configuration according to described authentication configuration information to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be specifically as follows by use:
The first authentication feature information is generated according to described authentication configuration information and fisrt feature information generating algorithm; Wherein, described fisrt feature information generating algorithm is corresponding with described first input mode and described first input block;
Carry out operation associated to described function at least partially and described first authentication feature information, make when the matching condition that described first authentication feature information is corresponding does not meet, described function at least partially cannot be used.
Wherein, carry out described in operation associated can for the entrance of described function at least partially to be stashed and make it cannot be accessed when the matching condition that described first authentication feature information is corresponding does not meet; Or, information (the part card information in such as address list) corresponding for described function is at least partially stored in a particular memory space, the data when the matching condition that described first authentication feature information is corresponding does not meet in this particular memory space cannot be extracted.Wherein, this particular memory space in this locality, also can be positioned at network side, such as, and Cloud Server.Described carrying out operation associatedly all can be realized by hardware or software mode, does not repeat them here.
Further, described collocation method can also comprise:
Obtain user according to the operation information of the second input mode by the 6th input block input;
Judge whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtain the first judged result;
When described first judged result is for being, described in permission, function is used at least partially;
When described first judged result is no, described in not allowing, function is used at least partially.
Describedly judge whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtain the first judged result and be specifically as follows:
Judge whether that described second input mode is identical with described first input mode and described 6th input block is identical with described first input block, obtain the second judged result;
When described second judged result is for being, generate the second authentication feature information according to described operation information and described fisrt feature information generating algorithm;
Judge whether described second authentication feature information meets described matching condition, if so, then described first judged result is yes; Otherwise described first judged result is no.
Wherein, described matching condition can simply comparing for described second authentication feature information and described first authentication feature information, such as, compares whether the two identical; Or, default Correlation Criteria can be met for the degree of association of described second authentication feature information and described first authentication feature information, such as, for each input subelement in described first input block, the degree of association between information corresponding with this each input subelement in the information corresponding with this each input subelement and described first authentication feature information in described second authentication feature information is less than the degree of association thresholding preset corresponding to each input subelement with this.
In order to provide personalized service to user, described function at least partially can be according to described user by the input operation of the 7th input block, described application can be used for select to obtain in the function of described authentication configuration.
For the above-mentioned various situations obtained according to the input selection of user mentioned, only can implement a kind of situation wherein, also can implement multiple situation wherein and even whole situation.Specifically be illustrated below in conjunction with the example 1 in table 1 and example 1:
Table 1
Thus, user just can from the element preset not for the input subelement set of 1, default element not for the input submode set of 1, default element not for 1 time relationship set and can be used for authentication configuration the various options that provide of function select according to the needs of oneself.Such as:
For example 1, user can select input subelement a and input subelement d, the number of operations 3 of input subelement a, the input form #1 that input subelement d accepts, to the allowed band 1 to 3 second in the time interval of the adjacent operator of input subelement a, time relationship is before this to being to a after d, and the function a2 in application a, applies the function b1 in b and b2.
For example 2, user can select input subelement a, input subelement b and input subelement c, to total number of operations 4 of input subelement a, b and c, obtains within a certain period of time, the repertoire of application b simultaneously.
Below for the described address list, the informational function module that are applied as mobile phone, provide the preferred implementation of described collocation method:
Described two or more input subelement is touch screen, range sensor and volume button;
Described when being applied as the address book function of mobile phone corresponding described function be at least partially the list at least partially that could use after the pattern-recognition success selected according to the needs of oneself in the address list list at address list interface of user, described first input mode is operate according to system default mode the mark of the address book function on touch screen, and adjust the distance sensor and volume button all carry out single job; Described when being applied as informational function corresponding described function be at least partially the information at least partially just can consulted after the pattern-recognition success selected according to the needs of oneself in all information of user, described first input mode is operate according to system default mode the mark of the informational function on touch screen, and adjust the distance sensor and volume button all carry out twice operation;
Described time relationship is first for touch screen, again for range sensor, then for volume button;
Described authentication of carrying out is configured to carry out pattern learning;
Described authentication configuration information is for completing user needed for pattern learning to the input information of described first input block, and this preferred implementation obtains described authentication configuration information in two stages to ensure the reliability of learning outcome.
The pattern learning process flow diagram of the preferred implementation that Fig. 2 provides for the embodiment of the present invention, with reference to Fig. 2, pattern learning specifically comprises the steps:
Step 201, mobile phone power-on;
Wherein, user can be the model machine using Default Value, also can be the terminal opened pattern-recognition and have mode identificating ability after study.Both differences are exactly that model machine power on mode learning functionality of dispatching from the factory does not need password, and the model machine opening pattern recognition function needs Old Password certification before Dietary behavior identification.
Step 202, user opens pattern learning by secret key;
Particularly, pattern learning function opened by the password using password default or user to arrange.Here, the function of handset mode study can be opened by various mode, such as adopt the mode of making hook or the mode that clicks, more or the mode of user's respective operations triggering.
Step 203, selection function and learning content;
The particular content selecting this to learn in the learning content provided.The learning content provided can for function (address book function to be learned, informational function etc.), and to carry out N1(N1 to input subelement #1 be successively natural number) secondary operation, carrying out N2(N2 to input subelement #2 is natural number) secondary operation, ..., carrying out NM(NM to input subelement #M is natural number) secondary operation, user can select according to self-demand or preference, such as, when function to be learned is address book function, user selects first to operate (such as to the mark of address book function according to system default mode, click or double-click the address list mark on touch screen), then a volume button is operated, last operation range sensor, when function to be learned is informational function, user selects first to operate (such as to the mark of informational function according to system default mode, click or double-click the info menu mark on touch screen), last operation twice volume button, then operate twice range sensor.
Step 204, confirms that study starts;
Each functional module is opened for learning state for user's input information by the learning content that mobile phone requires according to user.
Step 205 ~ 207, user's learning content as requested carries out corresponding operating, data acquisition unit (touch screen, range sensor and volume button) image data, and confirms that user operation completes;
Particularly, after the study of mobile phone Dietary behavior, after information user operation at every turn being detected, whether prompting user has operated, if confirm not complete, terminal just continues to wait for next operation information; If confirmation complete operation, with regard to Dietary behavior identification, pattern learning result is verified.
For address book function pattern learning, first, user uses system default mode to click the mark of address list on touch screen, press volume adjusting key again, secondly, user's sensor of adjusting the distance operates, and simultaneously, these information are all collected according to the process of practical operation and give arbitration unit according to mode type stored in the local ROM space of mobile phone or upload to Cloud Server; Finally, the study of user's affirmation mode terminates;
For informational function pattern learning, first, user uses system default mode to click the mark of information on touch screen, press volume adjusting key again twice, secondly, user's sensor of adjusting the distance carries out twice operation, and simultaneously, these information are all collected according to the process of practical operation and give arbitration unit according to mode type stored in the local ROM space of mobile phone or upload to Cloud Server; Finally, the study of user's affirmation mode terminates.
Step 208, arbitration unit classified and stored data also enter pattern-recognition;
Particularly, after arbitration unit carries out according to the input information of mode type to user learning content that user mainly requires by classified and stored, input information and system provide the entrance of address book function or informational function to associate, managed by arbitration unit and store, when pattern-recognition, arbitration unit can correct identification data, its implementation is without constraint, and kind is a lot.
Step 209 ~ 213, verify pattern learning result and process.
Particularly, mobile phone controls corresponding data acquisition module and opens, here mainly volume key, range sensor module, also has touch-screen.User carry out step 205 equally ~ 207 in similar or consistent operation, arbitration unit controls the information that respective modules detects input and also quantizes; After user confirms end of input, this data are mated with the data stored in step 205 ~ 207 by arbitration unit.
Step 214 ~ 216, if the Data Matching success of two phase acquisition, then arbitration unit prompting user learning completes, in the data validation of study being stored into the ROM associated with mode type or uploading to the Cloud Server that associates with mode type,
For address book function, enter into address list interface and selected for user by address list list, user marks according to the carrying out to using after needing to carry out pattern-recognition in address list list that need of oneself; For informational function, enter into the interfaces such as information inbox, outbox, wastepaper basket respectively and all information selected for user, user marks according to the carrying out to just consulting after needing to carry out pattern-recognition in information that need of oneself.Enter step 219.
Step 217 ~ 218, if the Data Matching of two phase acquisition is unsuccessful, prompting learns unsuccessfully, and the data of study are deleted from the local ROM space of mobile phone or Cloud Server.Enter step 219.
Step 219, end mode study or user go " shut " mode" learning functionality by configuration.
The pattern-recognition process flow diagram of the preferred implementation that Fig. 3 provides for the embodiment of the present invention, with reference to Fig. 3, pattern-recognition specifically comprises the steps:
Step 301, starting up of terminal, enters open state;
Step 302, user opens pattern recognition function by the secret key of address list pattern-recognition;
Particularly, user is with the record of system default mode entry communication or info menu, whether system prompts user carries out pattern-recognition, if do not carry out pattern-recognition, the record of system entry communication or info menu, and to show in address list not protected information in not protected address list information or info menu; If carry out pattern-recognition, then enter step 303.Or,
The mode entry communication record of the secret key that user directly identifies in mode or system default or info menu, in subsequent step, system identifies the information that user inputs automatically.
Step 303, prompting user current business enables pattern-recognition;
Step 304 ~ 306, user operation 1, operation 2, operation 3 ... operation n, data acquisition unit acquires data, arbitration unit judges whether data acquisition terminates;
User carries out n operation successively, and it is all collected according to the process of practical operation and give arbitration unit that these operate the information that produces, and arbitration unit judges whether data acquisition terminates, and if so, then enters step 307; Otherwise, return step 303.
For the situation of address book function, meet arbitration unit and judge that the user operation of the condition that data acquisition terminates is: user uses system default mode to click the mark of address list on touch screen, press volume adjusting key again, finally, user's sensor of adjusting the distance operates.
For the situation of informational function, meet arbitration unit and judge that the user operation of the condition that data acquisition terminates is: user uses system default mode to click the mark of info menu on touch screen, press volume adjusting key twice again, finally, user's sensor of adjusting the distance carries out twice operation.
Step 307 ~ 308, arbitration unit calls corresponding storage data and mates, and the match is successful then enters step 309, and it fails to match then enters step 310;
Particularly, the data under mode type corresponding in the information collected and ROM are carried out coupling and are associated by arbitration unit.
Step 309, arbitration unit produces control command and controls the operation that performance element performs user;
Particularly, arbitration unit produces control command and controls cell phone system permission user entry communication record or info menu, and shows all card informations or all information of authorizing.
Step 310, arbitration unit produces control command prompt modes recognition failures, forbids business operation or can only use partial information;
Particularly, arbitration unit generation control command control system prompting user operation is not allowed to or only shows unprotected card information or the information content.
Step 311, pattern-recognition terminates.
Corresponding to the above-mentioned description with reference to Fig. 2 and Fig. 3, the address book function of the preferred implementation that Fig. 4 provides for the embodiment of the present invention and informational function pattern-recognition schematic diagram, with reference to Fig. 4, storage unit, the ROM such as associated with mode type or Cloud Server, in save modules learn success after confirm the data of study that store, arbitration unit is receiving the touch screen of data acquisition unit acquires, volume button, after range sensor associative operation information, carry out coupling with the data of the study got from storage unit to associate, if the match is successful, then produce control command control performance element open described in the rights of using of function at least partially, such as, all card informations that the display of communication control record module is authorized, all information that the display of control information module is authorized.
The algorithm of the pattern-recognition of foregoing description can be that simple data compare, and also can be carry out the identification after calculation of relationship degree by some algorithm.When adopting certain algorithm to carry out degree of association identification user's input information, need the processing power by DSP; If when user's input information more complicated (such as, the information such as video, picture, voice), the ability calculated by cloud service also may be needed to complete mode identification procedure, so, the application mode of these algorithms in this pattern-recognition all belongs to a part for embodiment content, does not repeat them here.
The embodiment of the present invention also provides a kind of inking device, and described inking device comprises:
First acquisition module, for obtaining the authentication configuration information of the function at least partially in application that user inputted by the first input block;
Configuration module, for carrying out authentication configuration according to described authentication configuration information to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be used.
Visible, obtain authentication configuration information by the first acquisition module and according to authentication configuration information, authentication configuration carried out to function at least partially by configuration module, make when the authentication success conditions that authentication configuration information is corresponding does not meet, this at least partially function cannot be used, thus support the setting of rights of using to the function at least partially in application.
Further, described first acquisition module can comprise:
Acquiring unit, for obtaining the authentication configuration information of the function at least partially in application that user inputted by the first input block according to the first input mode preset.
Described configuration module can comprise:
First generation unit, for generating the first authentication feature information according to described authentication configuration information and fisrt feature information generating algorithm; Wherein, described fisrt feature information generating algorithm is corresponding with described first input mode and described first input block;
Associative cell, for carrying out operation associated to described function at least partially and described first authentication feature information, make when the matching condition that described first authentication feature information is corresponding does not meet, described function at least partially cannot be used.
Described inking device can also comprise:
Second acquisition module, for obtaining the operation information that user is inputted by the 6th input block according to the second input mode;
Judge module, for judging whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtains the first judged result;
First execution module, for when described first judged result is for being, described in permission, function is used at least partially;
Second execution module, for when described first judged result is no, described in not allowing, function is used at least partially.
Described judge module can comprise:
Judging unit, for judging whether that described second input mode is identical with described first input mode and described 6th input block is identical with described first input block, obtains the second judged result;
Second generation unit, for when described second judged result is for being, generates the second authentication feature information according to described operation information and described fisrt feature information generating algorithm;
Processing unit, for judging whether described second authentication feature information meets described matching condition, if so, then described first judged result is yes; Otherwise described first judged result is no.
The embodiment of the present invention also provides a kind of electronic equipment, and described electronic equipment comprises above-described inking device.
The above is only the embodiment of the embodiment of the present invention; should be understood that; for those skilled in the art; under the prerequisite not departing from embodiment of the present invention principle; can also make some improvements and modifications, these improvements and modifications also should be considered as the protection domain of the embodiment of the present invention.

Claims (14)

1. a collocation method, is characterized in that, described collocation method comprises:
Obtain the authentication configuration information of user by the function at least partially in the application of the first input block input, described function is at least partially the partial function of described application;
Carry out authentication configuration according to described authentication configuration information to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be used;
The authentication configuration information of the function at least partially in the application that described acquisition user input by the first input block is specially: the authentication configuration information obtaining the function at least partially in the application that user inputted by the first input block according to the first input mode preset;
Wherein, described first input mode is according to the input operation of described user by the second input block, selects to obtain in the two or more input modes preset.
2. collocation method as claimed in claim 1, is characterized in that,
Described first input block comprises two or more input subelement;
Described first input mode comprises the input submode inputting the identical number of subelement with described two or more, inputs subelement one_to_one corresponding with described two or more,
Authentication configuration information comprises the authentication inputting the identical number of subelement with described two or more and configures sub-information, inputs subelement one_to_one corresponding with described two or more,
The authentication configuration information of the function at least partially in the application that described acquisition user is inputted by the first input block according to the first input mode preset is specially:
To each input subelement in described two or more input subelement, obtain the authentication corresponding with described each input subelement that described user inputted by described each input subelement according to the input submode corresponding with described each input subelement and configure sub-information.
3. collocation method as claimed in claim 2, is characterized in that,
At least one in described two or more input subelement is according to the input operation of described user by the 3rd input block, is not select to obtain in the input subelement set of 1 at the element preset; And/or,
At least one in whole described input submode is according to the input operation of described user by the 4th input block, is not select to obtain in the input submode set of 1 at the element preset.
4. collocation method as claimed in claim 2, it is characterized in that, the authentication corresponding with described each input subelement that the described user of described acquisition is inputted by described each input subelement according to the input submode corresponding with described each input subelement configures sub-information and is specially:
According to the time relationship preset, obtain the authentication corresponding with described each input subelement that described user inputted by described each input subelement according to the input submode corresponding with described each input subelement and configure sub-information.
5. collocation method as claimed in claim 4, it is characterized in that, described time relationship is according to the input operation of described user by the 5th input block, is not select to obtain in the time relationship set of 1 at the element preset.
6. collocation method as claimed in claim 1, it is characterized in that, describedly according to described authentication configuration information, authentication configuration is carried out to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be specially by use:
The first authentication feature information is generated according to described authentication configuration information and fisrt feature information generating algorithm; Wherein, described fisrt feature information generating algorithm is corresponding with described first input mode and described first input block;
Carry out operation associated to described function at least partially and described first authentication feature information, make when the matching condition that described first authentication feature information is corresponding does not meet, described function at least partially cannot be used.
7. collocation method as claimed in claim 6, it is characterized in that, described collocation method also comprises:
Obtain user according to the operation information of the second input mode by the 6th input block input;
Judge whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtain the first judged result;
When described first judged result is for being, described in permission, function is used at least partially;
When described first judged result is no, described in not allowing, function is used at least partially.
8. collocation method as claimed in claim 7, is characterized in that, describedly judges whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtains the first judged result and is specially:
Judge whether that described second input mode is identical with described first input mode and described 6th input block is identical with described first input block, obtain the second judged result;
When described second judged result is for being, generate the second authentication feature information according to described operation information and described fisrt feature information generating algorithm;
Judge whether described second authentication feature information meets described matching condition, if so, then described first judged result is yes; Otherwise described first judged result is no.
9. the collocation method according to any one of claim 1 to 8, is characterized in that, described function is at least partially according to the input operation of described user by the 7th input block, described application can be used for described authentication configuration function in select to obtain.
10. an inking device, is characterized in that, described inking device comprises:
First acquisition module, for obtaining the authentication configuration information of the function at least partially in application that user inputted by the first input block, described function is at least partially the partial function of described application;
Configuration module, for carrying out authentication configuration according to described authentication configuration information to described function at least partially, make when the authentication success conditions that described authentication configuration information is corresponding does not meet, described function at least partially cannot be used;
Described first acquisition module comprises: acquiring unit, for obtaining the authentication configuration information of the function at least partially in application that user inputted by the first input block according to the first input mode preset;
Wherein, described first input mode is according to the input operation of described user by the second input block, selects to obtain in the two or more input modes preset.
11. inking devices as claimed in claim 10, it is characterized in that, described configuration module comprises:
First generation unit, for generating the first authentication feature information according to described authentication configuration information and fisrt feature information generating algorithm; Wherein, described fisrt feature information generating algorithm is corresponding with described first input mode and described first input block;
Associative cell, for carrying out operation associated to described function at least partially and described first authentication feature information, make when the matching condition that described first authentication feature information is corresponding does not meet, described function at least partially cannot be used.
12. inking devices as claimed in claim 11, it is characterized in that, described inking device also comprises:
Second acquisition module, for obtaining the operation information that user is inputted by the 6th input block according to the second input mode;
Judge module, for judging whether described matching condition meets according to described second input mode, described 6th input block and described operation information, obtains the first judged result;
First execution module, for when described first judged result is for being, described in permission, function is used at least partially;
Second execution module, for when described first judged result is no, described in not allowing, function is used at least partially.
13. inking devices as claimed in claim 12, it is characterized in that, described judge module comprises:
Judging unit, for judging whether that described second input mode is identical with described first input mode and described 6th input block is identical with described first input block, obtains the second judged result;
Second generation unit, for when described second judged result is for being, generates the second authentication feature information according to described operation information and described fisrt feature information generating algorithm;
Processing unit, for judging whether described second authentication feature information meets described matching condition, if so, then described first judged result is yes; Otherwise described first judged result is no.
14. 1 kinds of electronic equipments, is characterized in that, comprise the inking device according to any one of claim 10 to 13.
CN201210370355.0A 2012-09-28 2012-09-28 A kind of collocation method, inking device and electronic equipment Active CN102902907B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210370355.0A CN102902907B (en) 2012-09-28 2012-09-28 A kind of collocation method, inking device and electronic equipment
PCT/CN2013/079398 WO2013182131A1 (en) 2012-09-28 2013-07-15 Configuration method, configuration apparatus and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210370355.0A CN102902907B (en) 2012-09-28 2012-09-28 A kind of collocation method, inking device and electronic equipment

Publications (2)

Publication Number Publication Date
CN102902907A CN102902907A (en) 2013-01-30
CN102902907B true CN102902907B (en) 2016-02-10

Family

ID=47575134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210370355.0A Active CN102902907B (en) 2012-09-28 2012-09-28 A kind of collocation method, inking device and electronic equipment

Country Status (2)

Country Link
CN (1) CN102902907B (en)
WO (1) WO2013182131A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902907B (en) * 2012-09-28 2016-02-10 中兴通讯股份有限公司 A kind of collocation method, inking device and electronic equipment
CN104184945B (en) * 2014-08-18 2018-07-13 厦门美图之家科技有限公司 A kind of setting method of shooting permission
CN105590042B (en) * 2014-11-07 2019-02-05 株式会社东芝 Semiconductor apparatus mould, permission settings method
CN106445525A (en) * 2016-09-26 2017-02-22 北京小米移动软件有限公司 Folder operation method and device
CN108471409B (en) * 2018-03-15 2019-09-03 苏州思必驰信息科技有限公司 The application programming interfaces authentication configuration method and system of voice dialogue platform

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350026A (en) * 2007-07-12 2009-01-21 株式会社日立制作所 Method for user interface, display device, and user interface system
CN102609165A (en) * 2011-01-24 2012-07-25 广州三星通信技术研究有限公司 Mobile terminal having touch screen and mobile terminal mode control method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8249556B2 (en) * 2010-07-13 2012-08-21 Google Inc. Securing a mobile computing device
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN102902907B (en) * 2012-09-28 2016-02-10 中兴通讯股份有限公司 A kind of collocation method, inking device and electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350026A (en) * 2007-07-12 2009-01-21 株式会社日立制作所 Method for user interface, display device, and user interface system
CN102609165A (en) * 2011-01-24 2012-07-25 广州三星通信技术研究有限公司 Mobile terminal having touch screen and mobile terminal mode control method

Also Published As

Publication number Publication date
WO2013182131A1 (en) 2013-12-12
CN102902907A (en) 2013-01-30

Similar Documents

Publication Publication Date Title
US7965873B2 (en) Portable electronic apparatus and recording medium
CN104933342B (en) A kind of picture inspection method and mobile terminal
US20160378961A1 (en) Security system, apparatus and method using additional code
CN102902907B (en) A kind of collocation method, inking device and electronic equipment
CN105045085B (en) The control method and intelligent watch of a kind of intelligent watch
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN103064606A (en) Screen unlocking method for mobile terminal
CN104008326B (en) Device and method for management terminal safety
CN110399713A (en) A kind of method and relevant apparatus of authentification of message
CN112200949B (en) Entrance guard starting method and device and identity verification system
CN106650490B (en) The login method and device of cloud account
CN109446775A (en) A kind of acoustic-controlled method and electronic equipment
CN106127900A (en) A kind of user identity comprehensive verification method for unlocking and device
CN101794365A (en) Method for safely inputting information on mobile terminal and mobile terminal
CN107102891A (en) The management method and mobile terminal of a kind of application based on dual system
CN106372479A (en) Mobile terminal and method of controlling the same
CN105100461A (en) Mobile terminal and method for realizing automatic answering thereof
CN106951754A (en) A kind of frame display methods and device
CN104010094A (en) Information sending method and device in voice services
CN109981891A (en) A kind of terminal control method, device and terminal device
CN107230060A (en) The method and apparatus that a kind of account is reported the loss
CN108229139A (en) A kind of cipher-code input method and mobile terminal
WO2016131181A1 (en) Fingerprint event processing method, apparatus, and terminal
CN104891283A (en) Elevator control system combined with card password
CN208766775U (en) Mobile power source leased machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant