CN105117663B - The encrypted object display methods and device of a kind of application - Google Patents

The encrypted object display methods and device of a kind of application Download PDF

Info

Publication number
CN105117663B
CN105117663B CN201510612958.0A CN201510612958A CN105117663B CN 105117663 B CN105117663 B CN 105117663B CN 201510612958 A CN201510612958 A CN 201510612958A CN 105117663 B CN105117663 B CN 105117663B
Authority
CN
China
Prior art keywords
touch operation
user
preset
touch
encrypted object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510612958.0A
Other languages
Chinese (zh)
Other versions
CN105117663A (en
Inventor
胡峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510612958.0A priority Critical patent/CN105117663B/en
Publication of CN105117663A publication Critical patent/CN105117663A/en
Application granted granted Critical
Publication of CN105117663B publication Critical patent/CN105117663B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Collating Specific Patterns (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses the encrypted object display methods and device of a kind of application, wherein, this method includes:During terminal operating third-party application, the user fingerprints information that user carries out preset fingerprint recognition region touch operation input is obtained;Judge whether the user fingerprints information matches with preset verification finger print information;If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, the encrypted object in the third-party application is shown.Implement the embodiment of the present invention, the display of the encrypted object of application can be controlled according to user fingerprints information, avoid privacy of user leakage.

Description

Encrypted object display method and device for application
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an encrypted object display method and apparatus for an application.
Background
With the development of terminal technology, more and more functions can be used on various terminals such as mobile phones, and great convenience is brought to users. In the use process of the terminal, some pictures or videos related to the privacy of the user need to be encrypted many times to prevent the privacy from being leaked.
In the current encryption mode, after an image or a video is encrypted, a prompt message that the image or the video is encrypted is generally displayed, so that other users can know the existence of the encrypted object, and the encrypted object has the possibility of being decrypted, thereby causing privacy disclosure.
Disclosure of Invention
The embodiment of the invention provides an application encrypted object display method and device, which can control the display of an application encrypted object according to user fingerprint information and avoid the privacy disclosure of a user.
The embodiment of the invention discloses an applied encrypted object display method, which comprises the following steps:
acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area in the process of running a third-party application by a terminal;
judging whether the user fingerprint information is matched with preset verification fingerprint information or not;
and if the fingerprint information is matched with the verification fingerprint information, displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Optionally, before the obtaining of the user fingerprint information input by the user through touch operation on the preset fingerprint identification area, the method further includes:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, monitoring the touch duration corresponding to the touch operation;
judging whether the touch duration exceeds a preset time threshold or not;
and if the preset time threshold is exceeded, executing the step of acquiring the user fingerprint information input by the user through touch operation on a preset fingerprint identification area.
Optionally, before the displaying the encrypted object in the third-party application, the method further includes:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, acquiring touch pressure corresponding to the touch operation;
judging whether the touch pressure exceeds a preset pressure threshold value;
and if the preset pressure threshold is exceeded, executing the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Optionally, before the displaying the encrypted object in the third-party application, the method further includes:
outputting a preset message prompt, wherein the message prompt is used for reminding a user of inputting voiceprint information;
receiving voiceprint information input by a user in response to the message prompt, and judging whether the voiceprint information is matched with preset voiceprint information;
and if the encrypted object is matched with the preset voiceprint information, the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation is executed.
Optionally, the displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation includes:
if the verification fingerprint information is matched with the verification fingerprint information, displaying an encrypted object in the third-party application;
detecting whether the input user fingerprint information is matched with the verification fingerprint information or not according to a preset time interval;
hiding an encrypted object in the third party application when the user fingerprint information does not match the verification fingerprint information.
Correspondingly, the embodiment of the invention also discloses a display device, which comprises:
the information acquisition module is used for acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area in the process that the terminal runs the third-party application;
the fingerprint matching module is used for judging whether the user fingerprint information acquired by the information acquisition module is matched with preset verification fingerprint information or not;
and the display module is used for displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the fingerprint matching module is that the user fingerprint information is matched with the verification fingerprint information.
Optionally, the apparatus further comprises:
the time monitoring module is used for monitoring the touch duration corresponding to the touch operation when a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area is detected;
the first judgment module is used for judging whether the touch duration monitored by the time monitoring module exceeds a preset time threshold value or not;
and the first notification module is used for notifying the information acquisition module to acquire user fingerprint information input by a user through touch operation on a preset fingerprint identification area when the judgment result of the first judgment module is that the touch duration exceeds the preset time threshold.
Optionally, the apparatus further comprises:
the pressure acquisition module is used for acquiring touch pressure corresponding to touch operation when a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area is detected;
the second judging module is used for judging whether the touch pressure acquired by the pressure acquiring module exceeds a preset pressure threshold value or not;
and the second notification module is used for notifying the display module to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the second judgment module is that the touch pressure exceeds the preset pressure threshold.
Optionally, the apparatus further comprises:
the output module is used for outputting a preset message prompt, and the message prompt is used for reminding a user of inputting voiceprint information;
the third judging module is used for receiving voiceprint information input by a user in response to the message prompt and judging whether the voiceprint information is matched with preset voiceprint information;
and the third informing module is used for informing the display module to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the third judging module is that the voiceprint information is matched with the preset voiceprint information.
Optionally, the display module is further configured to hide an encrypted object in the third-party application when the user fingerprint information acquired by the information acquisition module is not matched with the verification fingerprint information.
The embodiment of the invention has the following beneficial effects:
according to the embodiment of the invention, when fingerprint information input by a user through touch operation is detected in the running process of the third-party application, the input user fingerprint information is matched and compared with the preset verification fingerprint information, so that the encrypted object in the third-party application can be displayed within the display duration of the touch operation when the user fingerprint information is matched with the verification fingerprint information. According to the embodiment of the invention, the display of the applied encrypted object can be controlled according to the fingerprint information of the user, so that other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the user is avoided.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of an encrypted object display method applied in an embodiment of the present invention;
fig. 2 is a schematic flowchart of an encrypted object display method for another application according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a display device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses an application encrypted object display method and device, which can control the display of an application encrypted object according to user fingerprint information and avoid the privacy disclosure of a user. The details are described below.
Referring to fig. 1, fig. 1 is a schematic flow chart of an applied encrypted object display method according to an embodiment of the present invention, and specifically, as shown in fig. 1, the applied encrypted object display method may include the following steps:
s101: and acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area in the process of running the third-party application by the terminal.
It should be noted that the method of the embodiment of the present invention may be specifically applied to a terminal device (referred to as a "terminal"), where the terminal device may include, but is not limited to, a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a Mobile Internet device (Mobile Internet Devices, referred to as "MID"), a Personal digital assistant (Personal digital assistant, referred to as "PDA"), and other terminal Devices.
In a specific embodiment, a fingerprint identification area is preset on the terminal, for example, the fingerprint identification area can be arranged on the front or the back of the terminal, and the fingerprint identification area is correspondingly provided with a fingerprint receiver for receiving user fingerprint information. In addition, some encrypted objects are preset in the third-party application of the terminal, and the encrypted objects are in a hidden state (no encryption prompt is displayed). When the third-party application of the terminal runs, the touch operation of the user in the fingerprint identification area is detected, the fingerprint information input corresponding to the touch operation is obtained, and whether the encrypted object hidden in the third-party application is displayed or not is determined according to the input fingerprint information. The third-party application may include a picture application, a video application, a music application, and the like, which is not limited in the embodiment of the present invention.
S102: and judging whether the user fingerprint information is matched with preset verification fingerprint information.
Specifically, the verification fingerprint information may be preset by the user, for example, the user may enter the fingerprint information when the terminal is turned on for the first time, and store the entered fingerprint information as the verification fingerprint information, that is, the fingerprint information of the legitimate user.
S103: and if the fingerprint information is matched with the verification fingerprint information, displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Wherein the third party application comprises a picture application, a video application, a music application, and the like, and accordingly, the encrypted object comprises an encrypted picture, an encrypted video, an encrypted music, and the like.
In a specific embodiment, when it is detected that user fingerprint information input by a touch operation of a current user in a preset fingerprint identification area matches with preset verification fingerprint information, the current user can be used as a legal user to successfully decrypt an encrypted object in the third-party application, and the encrypted object in the third-party application can be displayed within a display duration range corresponding to the touch operation. Further, when it is detected that the user fingerprint information does not match the verification fingerprint information, the encrypted object can be hidden and not displayed any more. The display duration corresponding to the touch operation may refer to a duration preset according to different application types, for example, the display duration of an encrypted picture in a picture application may be set to 2 minutes, the display duration of an encrypted video in a video application may be set to a video playing duration of the encrypted video, the display duration of the encrypted music in a music application may be set to a music playing duration of the encrypted music, and the like; or, the display duration corresponding to the touch operation may also refer to a time period corresponding to a preset time interval, that is, user fingerprint information may be acquired according to the preset time interval and fingerprint matching may be performed, and the encrypted object may be displayed in the time period during matching; or, the display duration corresponding to the touch operation may also refer to the touch operation duration, that is, the encrypted object is displayed before the touch operation is ended, for example, when it is detected that the touch pressure corresponding to the touch operation is smaller than a certain pressure threshold, it is considered that the touch operation is ended. In the process of browsing pictures by a third-party application such as a picture application, the encrypted picture can be hidden beyond the display duration corresponding to the touch operation, the encrypted picture is not displayed any more, and no encryption prompt is given, so that other users cannot perceive the existence of the encrypted picture.
In the embodiment of the invention, in the running process of the third-party application, the user fingerprint information input by a user through touch operation is detected, and the input user fingerprint information is matched and compared with the preset verification fingerprint information, so that when the user fingerprint information is matched with the verification fingerprint information, the encrypted object in the third-party application is displayed within the display duration of the touch operation, otherwise, the encrypted object in the third-party application is in a hidden state. According to the embodiment of the invention, the display of the applied encrypted object can be controlled according to the fingerprint information of the user, so that other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the user is avoided.
Further, referring to fig. 2, fig. 2 is a schematic flow chart of another method for displaying an encrypted object of an application according to an embodiment of the present invention, and specifically, as shown in fig. 2, the method for displaying an encrypted object of an application may include the following steps:
s201: and receiving a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area in the process of running the third-party application by the terminal.
The third-party application may include a picture application, a video application, a music application, and the like, which is not limited in the embodiment of the present invention.
In a specific embodiment, the terminal may encrypt some application objects in the third-party application, such as the picture application, according to the user requirement, that is, one or more encrypted objects are preset, so that the encrypted picture object, that is, the encrypted picture, is in a hidden state, and no encryption prompt is displayed. When the encrypted picture needs to be viewed, the display of the encrypted object of the application can be controlled according to the user fingerprint information, so that the privacy of the user is effectively protected.
S202: and responding to the touch instruction, and acquiring user fingerprint information corresponding to the touch operation.
Further, in an optional embodiment, before the user fingerprint information input by the touch operation is acquired, when a touch instruction triggered by a touch operation performed on a preset fingerprint identification area by a user is detected, a touch duration corresponding to the touch operation may be monitored; judging whether the touch duration exceeds a preset time threshold or not; and if the preset time threshold is exceeded, executing the step of acquiring the user fingerprint information input by the touch operation. Specifically, when the touch operation of the user in the fingerprint identification area is detected, the touch duration corresponding to the touch operation can be triggered and monitored, the monitored touch duration is compared with a preset time threshold, if the detected touch duration does not reach the preset time threshold, for example, 2s (seconds), the touch duration of the touch operation is continuously monitored, and when the touch duration reaches 2s, the fingerprint information of the user can be triggered and obtained. Therefore, the situation that a user initiates a decryption display flow of the encrypted object when the user operates the terminal by mistake is avoided, and the power consumption of the terminal is saved.
Further, when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, the terminal can further detect touch pressure corresponding to the touch operation, and when the detected touch pressure exceeds a preset pressure threshold, the terminal executes the acquisition of user fingerprint information corresponding to the touch operation and subsequent processes thereof; otherwise, the fingerprint information corresponding to the touch operation is not acquired, so that the power consumption of the terminal is saved.
S203: and judging whether the user fingerprint information is matched with preset verification fingerprint information.
Specifically, the verification fingerprint information may be preset by a user, for example, the user may enter the fingerprint information when the terminal is powered on for the first time, or enter the fingerprint after inputting a certain preset fingerprint password in the using process of the terminal, and the like. The input fingerprint information is stored as verification fingerprint information, namely fingerprint information of a legal user, and is used for matching comparison in the decryption display process of an applied encrypted object.
S204: and displaying the encrypted object in the third-party application.
Wherein, the third party application can comprise a picture application, a video application, a music application, and the like, and accordingly, the encrypted object comprises an encrypted picture, an encrypted video, an encrypted music, and the like.
In a specific embodiment, when it is detected that user fingerprint information input by a touch operation of a current user in a preset fingerprint identification area is matched with preset verification fingerprint information, the current user can be used as a legal user to indicate that decryption of an encrypted object, namely an encrypted picture, in a third-party application, such as a picture application is successful, and the encrypted picture of the picture application can be displayed within a display duration range corresponding to the touch operation; and if not, continuously hiding the encrypted picture, and monitoring a touch instruction triggered by the touch operation of the user on a preset fingerprint identification area. The display duration corresponding to the touch operation can be duration preset according to different application types; or, the time period may also be a time period corresponding to a preset time interval; or, the time length of the touch operation may be referred to, that is, the display of the encrypted object is performed before the touch operation is ended. The embodiment of the present invention takes the display duration as the time period corresponding to the preset time interval as an example for explanation.
S205: and detecting whether the input user fingerprint information is matched with the verification fingerprint information or not according to a preset time interval.
S206: hiding an encrypted object in the third party application when the user fingerprint information does not match the verification fingerprint information.
For example, if the preset time interval is that fingerprint detection is performed every 10 seconds(s), the time period corresponding to the preset time interval may be set to 10s (or slightly greater than 10 s). Specifically, after the hidden encrypted object such as the encrypted picture is displayed, whether the fingerprint information of the current user is matched with the verification fingerprint information can be detected again every 10s, and if the fingerprint information of the current user is matched with the verification fingerprint information, the hidden encrypted picture is continuously displayed; otherwise, the encrypted picture is hidden.
Further, in an optional embodiment, before the encrypted object in the third-party application is displayed, when a touch instruction triggered by a touch operation performed on a preset fingerprint identification area by a user is detected, a touch pressure corresponding to the touch operation may also be acquired; judging whether the touch pressure exceeds a preset pressure threshold value; and if the preset pressure threshold is exceeded, executing the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation. Optionally, when a touch operation of a user is detected, touch parameters such as user fingerprint information and touch pressure corresponding to the touch operation may be obtained, and when the user fingerprint information matches with preset verification fingerprint information and the touch pressure is not lower than a preset pressure threshold, it is determined that decryption of an encrypted object in a current third-party application is successful, and the encrypted object is displayed within a display duration range corresponding to the touch operation; otherwise, when the user fingerprint information is not matched with the verification fingerprint information or the touch pressure is lower than the preset pressure threshold value, the decryption is regarded as failed, the encrypted object in the third-party application is continuously hidden, and the encrypted object is forbidden to be displayed.
Further, in an optional embodiment, after detecting that user fingerprint information input by a touch operation of a user matches with the verification fingerprint information and before displaying the encrypted object in the third-party application, a preset message prompt may be further output, where the message prompt is used to prompt the user to input voiceprint information; receiving voiceprint information input by a user in response to the message prompt, and judging whether the voiceprint information is matched with preset voiceprint information; and if the encrypted object is matched with the preset voiceprint information, the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation is executed. Similar to the fingerprint verification information, the preset voiceprint information can also be preset by the user.
In the embodiment of the invention, when a touch instruction triggered by a user touch operation is detected in the running process of a third-party application of a terminal, whether a touched position point is in a preset area range or not can be detected, user fingerprint information corresponding to the touch operation is triggered and acquired when the touched position point is in the preset area range, and the user fingerprint information is matched and compared with preset verification fingerprint information, so that an encrypted object in the third-party application is displayed within the display time of the touch operation when the user fingerprint information is matched with the verification fingerprint information, otherwise, the encrypted object in the third-party application is in a hidden state, other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the users is avoided.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a display device according to an embodiment of the present invention, and specifically, as shown in fig. 3, the display device according to an embodiment of the present invention may include an information obtaining module 11, a fingerprint matching module 12, and a display module 13. Wherein,
the information obtaining module 11 is configured to obtain user fingerprint information input by a user through touch operation on a preset fingerprint identification area in a process that the terminal runs a third-party application.
It should be noted that the apparatus according to the embodiment of the present invention may be specifically disposed in a terminal device (or simply referred to as a "terminal"), where the terminal device may include, but is not limited to, a terminal device configured with a touch screen, such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a Mobile Internet Device (MID), a Personal Digital Assistant (PDA), and the like.
In a specific embodiment, a fingerprint identification area is preset on the terminal, for example, the fingerprint identification area can be arranged on the front or the back of the terminal, and the fingerprint identification area is correspondingly provided with a fingerprint receiver for receiving user fingerprint information. In addition, some encrypted objects are preset in the third-party application of the terminal, and the encrypted objects are in a hidden state (no encryption prompt is displayed). When the third-party application of the terminal runs, the information acquisition module 11 can detect the touch operation of the user in the fingerprint identification area, and acquire the fingerprint information input corresponding to the touch operation, so as to determine whether to display the encrypted object hidden in the third-party application according to the input fingerprint information.
The fingerprint matching module 12 is configured to determine whether the user fingerprint information acquired by the information acquiring module 11 matches preset verification fingerprint information.
Specifically, the verification fingerprint information may be preset by the user, for example, the user may enter the fingerprint information when the terminal is turned on for the first time, and store the entered fingerprint information as the verification fingerprint information, that is, the fingerprint information of the legitimate user.
The display module 13 is configured to display the encrypted object in the third-party application within a display duration range corresponding to the touch operation when the determination result of the fingerprint matching module 12 is that the user fingerprint information matches the verification fingerprint information.
The third-party application includes a picture application, a video application, a music application, and the like, which is not limited in the embodiment of the present invention. Accordingly, the encrypted object includes an encrypted picture, an encrypted video, an encrypted music, and the like.
The display module 13 is further configured to hide an encrypted object in the third-party application when the user fingerprint information acquired by the information acquisition module 11 is not matched with the verification fingerprint information.
In a specific embodiment, when the fingerprint matching module 12 detects that the user fingerprint information input by the touch operation of the current user matches the preset verification fingerprint information, the current user may be regarded as a valid user, and the encrypted object in the third-party application is successfully decrypted, and then the display module 13 may display the encrypted object in the third-party application within the display duration range corresponding to the touch operation. Further, when the display module 13 detects that the user fingerprint information does not match the verification fingerprint information, the encrypted object is hidden and is not displayed any more. The display duration corresponding to the touch operation can be duration preset according to different application types; or, the time period may also be a time period corresponding to a preset time interval; or, the time length of the touch operation may also be referred to, that is, the encrypted object is displayed before the touch operation is ended, which is not limited in the embodiment of the present invention.
In the embodiment of the invention, in the running process of the third-party application, the user fingerprint information input by a user through touch operation is detected, and the input user fingerprint information is matched and compared with the preset verification fingerprint information, so that when the user fingerprint information is matched with the verification fingerprint information, the encrypted object in the third-party application is displayed within the display duration of the touch operation, otherwise, the encrypted object in the third-party application is in a hidden state. According to the embodiment of the invention, the display of the applied encrypted object can be controlled according to the fingerprint information of the user, so that other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the user is avoided.
Further, in an alternative embodiment, the apparatus may further comprise (not shown in the figures):
the time monitoring module 14 is configured to monitor a touch duration corresponding to a touch operation when a touch instruction triggered by the touch operation performed on a preset fingerprint identification area by a user is detected;
a first judging module 15, configured to judge whether the touch duration monitored by the time monitoring module 14 exceeds a preset time threshold;
a first notifying module 16, configured to notify the information obtaining module to obtain user fingerprint information that a user performs a touch operation input on a preset fingerprint identification area when the determination result of the first determining module 15 is that the touch duration exceeds the preset time threshold.
Specifically, when the touch operation of the user is detected, the touch duration corresponding to the touch operation may be monitored by the time monitoring module 14, the first determining module 15 compares the monitored touch duration with a preset time threshold, if the detected touch duration does not reach the preset time threshold, for example, 2s (seconds), the touch duration of the touch operation is continuously monitored, and when the touch duration reaches 2s, the first notifying module 16 may be triggered to obtain the fingerprint information of the user. Therefore, the situation that a user initiates a decryption display flow of the encrypted object when the user operates the terminal by mistake is avoided, and the power consumption of the terminal is saved.
Further, in an alternative embodiment, the apparatus may further comprise (not shown in the figures):
the pressure acquisition module 17 is configured to acquire a touch pressure corresponding to a touch operation when a touch instruction triggered by the touch operation performed on a preset fingerprint identification area by a user is detected;
a second determining module 18, configured to determine whether the touch pressure acquired by the pressure acquiring module 17 exceeds a preset pressure threshold;
and a second notifying module 19, configured to notify the display module 13 to display the encrypted object in the third-party application within a display duration range corresponding to the touch operation when the determination result of the second determining module 18 is that the touch pressure exceeds the preset pressure threshold.
Optionally, when the touch operation of the user is detected, the information obtaining module 11 may obtain user fingerprint information corresponding to the touch operation and the pressure obtaining module 17 may obtain touch parameters such as touch pressure corresponding to the touch operation, and when the fingerprint matching module 12 detects that the user fingerprint information matches with preset verification fingerprint information, and the second determining module 18 determines that the decryption of the encrypted object in the current third-party application is successful when the touch pressure is not lower than the preset pressure threshold, and displays the encrypted object in the display duration range corresponding to the touch operation; otherwise, when the fingerprint matching module 12 detects that the user fingerprint information is not matched with the verification fingerprint information or the determination result of the second determining module 18 is that the touch pressure is lower than the preset pressure threshold, it may be determined that decryption has failed, and the display module 13 continues to hide the encrypted object in the third-party application and forbids display of the encrypted object.
Further, in an alternative embodiment, the apparatus may further comprise (not shown in the figures):
the output module 20 is configured to output a preset message prompt, where the message prompt is used to prompt a user to input voiceprint information;
a third judging module 21, configured to receive voiceprint information input by a user in response to the message prompt, and judge whether the voiceprint information matches preset voiceprint information;
a third notifying module 22, configured to notify the display module 13 to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the determination result of the third determining module 21 is that the voiceprint information matches preset voiceprint information.
Similar to the fingerprint verification information, the preset voiceprint information can also be preset by the user.
In the embodiment of the invention, when a touch instruction triggered by a user touch operation is detected in the running process of a third-party application of a terminal, whether a touched position point is in a preset area range or not can be detected, user fingerprint information corresponding to the touch operation is triggered and acquired when the touched position point is in the preset area range, and the user fingerprint information is matched and compared with preset verification fingerprint information, so that an encrypted object in the third-party application is displayed within the display time of the touch operation when the user fingerprint information is matched with the verification fingerprint information, otherwise, the encrypted object in the third-party application is in a hidden state, other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the users is avoided.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. Specifically, as shown in fig. 4, the terminal device according to the embodiment of the present invention may include: at least one processor 100, at least one input device 200, at least one output device 300, memory 500, etc. Wherein the components are communicatively coupled via one or more buses 400. Those skilled in the art will appreciate that the configuration of the terminal device shown in fig. 4 is not intended to limit the embodiments of the present invention, and may be a bus structure, a star structure, a combination of more or less components than those shown, or a different arrangement of components. Wherein:
the processor 100 is a control center of the terminal device (or simply referred to as a terminal), connects various parts of the entire terminal device using various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing programs and/or modules stored in the memory 500 and calling data stored in the memory 500. The processor 100 may be composed of an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs connected with the same or different functions. For example, the processor 100 may include only a Central Processing Unit (CPU), or may be a combination of a CPU, a Digital Signal Processor (DSP), a Graphics Processing Unit (GPU), and various control chips. In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
The input device 200 may include a standard touch screen, keyboard, camera, etc., and may also include a wired interface, wireless interface, etc.
The output device 300 may include a display screen, a speaker, etc., and may also include a wired interface, a wireless interface, etc.
The memory 500 may be used to store software programs and modules, and the processor 100, the input device 200 and the output device 300 execute various functional applications of the terminal device and implement data processing by calling the software programs and modules stored in the memory 500. The memory 500 mainly includes a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the data storage area may store data created according to the use of the terminal device, and the like. In the embodiment of the present invention, the operating system may be an Android system, an iOS system, a Windows operating system, or the like.
Specifically, the processor 100 calls an application program stored in the memory 500 for executing the following steps:
acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area in the process of running a third-party application by a terminal;
judging whether the user fingerprint information is matched with preset verification fingerprint information or not;
and if the fingerprint information is matched with the verification fingerprint information, displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Optionally, before the processor 100 invokes the application program stored in the memory 500 to execute the step of acquiring the user fingerprint information input by the user through touch operation on the preset fingerprint identification area, the processor is further configured to execute the following steps:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, monitoring the touch duration corresponding to the touch operation;
judging whether the touch duration exceeds a preset time threshold or not;
and if the preset time threshold is exceeded, executing the step of acquiring the user fingerprint information input by the user through touch operation on a preset fingerprint identification area.
Optionally, before the processor 100 calls the application program stored in the memory 500 to execute the display of the encrypted object in the third-party application, the following steps are further performed:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, acquiring touch pressure corresponding to the touch operation;
judging whether the touch pressure exceeds a preset pressure threshold value;
and if the preset pressure threshold is exceeded, executing the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Optionally, before the processor 100 calls the application program stored in the memory 500 to execute the display of the encrypted object in the third-party application, the following steps are further performed:
outputting a preset message prompt, wherein the message prompt is used for reminding a user of inputting voiceprint information;
receiving voiceprint information input by a user in response to the message prompt, and judging whether the voiceprint information is matched with preset voiceprint information;
and if the encrypted object is matched with the preset voiceprint information, the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation is executed.
Optionally, the processor 100 calls an application program stored in the memory 500 to execute the display of the encrypted object in the third party application within the display duration range corresponding to the touch operation, and specifically executes the following steps:
if the verification fingerprint information is matched with the verification fingerprint information, displaying an encrypted object in the third-party application;
detecting whether the input user fingerprint information is matched with the verification fingerprint information or not according to a preset time interval;
hiding an encrypted object in the third party application when the user fingerprint information does not match the verification fingerprint information.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (7)

1. An encrypted object display method for an application, comprising:
in the process that the terminal runs a third-party application, when a touch instruction triggered by a user touch operation is detected and a touched position point is detected to be within a preset area range, user fingerprint information input by the user through the touch operation on a preset fingerprint identification area is acquired;
judging whether the user fingerprint information is matched with preset verification fingerprint information or not;
if the fingerprint verification information is matched with the verification fingerprint information and the touch pressure corresponding to the touch operation is not lower than a preset pressure threshold value, determining that the encryption object in the current third-party application is successfully decrypted, and displaying the encryption object in the third-party application within the display duration range corresponding to the touch operation;
the display duration corresponding to the touch operation refers to the operation duration of the touch operation, and the displaying of the encrypted object in the third-party application in the display duration range corresponding to the touch operation refers to: displaying the encrypted object before the touch operation is finished, and determining that the touch operation is finished when detecting that the touch pressure corresponding to the touch operation is smaller than a pressure threshold;
after the hidden encrypted object is displayed, whether the current user fingerprint information is matched with the verification fingerprint information is detected again at preset time intervals, and if the current user fingerprint information is matched with the verification fingerprint information, the hidden encrypted object is continuously displayed; and if not, hiding the encrypted object.
2. The method according to claim 1, wherein before the acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area, the method further comprises:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, monitoring the touch duration corresponding to the touch operation;
judging whether the touch duration exceeds a preset time threshold or not;
and if the preset time threshold is exceeded, executing the step of acquiring the user fingerprint information input by the user through touch operation on a preset fingerprint identification area.
3. The method of claim 1, wherein prior to said displaying the encrypted object in the third-party application, the method further comprises:
outputting a preset message prompt, wherein the message prompt is used for reminding a user of inputting voiceprint information;
receiving voiceprint information input by a user in response to the message prompt, and judging whether the voiceprint information is matched with preset voiceprint information;
and if the encrypted object is matched with the preset voiceprint information, the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation is executed.
4. A display device, comprising:
the information acquisition module is used for acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area when a touch instruction triggered by the touch operation of the user is detected and a touched position point is detected to be in a preset area range in the process that the terminal runs the third-party application;
the fingerprint matching module is used for judging whether the user fingerprint information acquired by the information acquisition module is matched with preset verification fingerprint information or not;
the display module is used for determining that the decryption of the encrypted object in the current third-party application is successful when the judgment result of the fingerprint matching module is that the user fingerprint information is matched with the verification fingerprint information and the touch pressure corresponding to the touch operation is not lower than a preset pressure threshold value, and displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation;
the display duration corresponding to the touch operation refers to the operation duration of the touch operation, and the displaying of the encrypted object in the third-party application in the display duration range corresponding to the touch operation refers to: displaying the encrypted object before the touch operation is finished, and determining that the touch operation is finished when detecting that the touch pressure corresponding to the touch operation is smaller than a certain pressure threshold;
after the hidden encrypted object is displayed, the fingerprint matching module detects whether the current user fingerprint information is matched with the verification fingerprint information again at preset time intervals, and if so, the display module continues to display the hidden encrypted object; and if not, hiding the encrypted object by the display module.
5. The apparatus of claim 4, further comprising:
the time monitoring module is used for monitoring the touch duration corresponding to the touch operation when a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area is detected;
the first judgment module is used for judging whether the touch duration monitored by the time monitoring module exceeds a preset time threshold value or not;
and the first notification module is used for notifying the information acquisition module to acquire user fingerprint information input by a user through touch operation on a preset fingerprint identification area when the judgment result of the first judgment module is that the touch duration exceeds the preset time threshold.
6. The apparatus of claim 4, further comprising:
the pressure acquisition module is used for acquiring touch pressure corresponding to touch operation when a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area is detected;
the second judging module is used for judging whether the touch pressure acquired by the pressure acquiring module exceeds a preset pressure threshold value or not;
and the second notification module is used for notifying the display module to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the second judgment module is that the touch pressure exceeds the preset pressure threshold.
7. The apparatus of claim 4, further comprising:
the output module is used for outputting a preset message prompt, and the message prompt is used for reminding a user of inputting voiceprint information;
the third judging module is used for receiving voiceprint information input by a user in response to the message prompt and judging whether the voiceprint information is matched with preset voiceprint information;
and the third informing module is used for informing the display module to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the third judging module is that the voiceprint information is matched with the preset voiceprint information.
CN201510612958.0A 2015-09-23 2015-09-23 The encrypted object display methods and device of a kind of application Expired - Fee Related CN105117663B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510612958.0A CN105117663B (en) 2015-09-23 2015-09-23 The encrypted object display methods and device of a kind of application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510612958.0A CN105117663B (en) 2015-09-23 2015-09-23 The encrypted object display methods and device of a kind of application

Publications (2)

Publication Number Publication Date
CN105117663A CN105117663A (en) 2015-12-02
CN105117663B true CN105117663B (en) 2018-07-06

Family

ID=54665647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510612958.0A Expired - Fee Related CN105117663B (en) 2015-09-23 2015-09-23 The encrypted object display methods and device of a kind of application

Country Status (1)

Country Link
CN (1) CN105117663B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653924A (en) * 2015-12-30 2016-06-08 魅族科技(中国)有限公司 Touch screen operation method and device
CN105678184A (en) * 2015-12-30 2016-06-15 魅族科技(中国)有限公司 Display method and device and terminal
CN105740687B (en) * 2016-01-29 2018-11-16 广东欧珀移动通信有限公司 A kind of method and terminal for opening hidden file folder
CN105812533B (en) * 2016-03-08 2019-04-05 北京珠穆朗玛移动通信有限公司 A kind of secret incoming display method and mobile terminal
CN105844181A (en) * 2016-03-23 2016-08-10 深圳市金立通信设备有限公司 Key instruction processing method and terminal
CN107292185B (en) * 2016-03-30 2021-05-28 创新先进技术有限公司 Method and terminal for displaying private information
CN105893826B (en) * 2016-04-25 2018-10-23 北京奇虎科技有限公司 Message display method based on finger print information and intelligent terminal
CN106056011A (en) * 2016-05-30 2016-10-26 维沃移动通信有限公司 Display method and mobile terminal
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN106127013A (en) * 2016-08-26 2016-11-16 广东欧珀移动通信有限公司 Encryption and decryption method, device and mobile terminal
CN106407773B (en) * 2016-08-26 2019-03-19 Oppo广东移动通信有限公司 Decryption method, device and mobile terminal
CN106650368A (en) * 2016-10-12 2017-05-10 珠海格力电器股份有限公司 Encrypted information display method and device
CN107967107A (en) * 2016-10-20 2018-04-27 中兴通讯股份有限公司 One kind browses object lock method and system
CN107506634B (en) * 2017-07-31 2020-02-14 Oppo广东移动通信有限公司 Data display method and device, storage medium and terminal
CN107798230B (en) * 2017-10-24 2020-04-17 Oppo广东移动通信有限公司 Terminal control method, device, terminal and computer readable storage medium
CN109857470B (en) * 2019-01-24 2022-05-13 Oppo广东移动通信有限公司 Fingerprint unlocking method and related equipment
CN112073560A (en) * 2019-06-10 2020-12-11 Oppo广东移动通信有限公司 Application control method, electronic device, and non-volatile computer-readable storage medium
CN113282899B (en) * 2021-04-01 2023-04-25 维沃移动通信有限公司 Object management method, device, electronic equipment and readable storage medium
CN113676781A (en) * 2021-08-23 2021-11-19 深圳市唐为电子有限公司 Audio-visual broadcast control system of smart mobile phone

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103246389A (en) * 2012-02-03 2013-08-14 三星电子株式会社 Method of operating multi-touch panel and terminal supporting the same
CN103425915A (en) * 2012-05-25 2013-12-04 汉王科技股份有限公司 Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device
CN104700010A (en) * 2013-12-05 2015-06-10 腾讯科技(深圳)有限公司 Personal information protection method and protection device
CN104751068A (en) * 2013-12-26 2015-07-01 珠海金山办公软件有限公司 File protection method and device
CN104898940A (en) * 2015-04-30 2015-09-09 努比亚技术有限公司 Picture processing method and device
CN104915141A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Method and device for previewing object information

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765552B (en) * 2015-04-28 2019-04-19 小米科技有限责任公司 Right management method and device
CN104899501A (en) * 2015-06-24 2015-09-09 小米科技有限责任公司 Dialog list display method and device and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246389A (en) * 2012-02-03 2013-08-14 三星电子株式会社 Method of operating multi-touch panel and terminal supporting the same
CN103425915A (en) * 2012-05-25 2013-12-04 汉王科技股份有限公司 Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN104700010A (en) * 2013-12-05 2015-06-10 腾讯科技(深圳)有限公司 Personal information protection method and protection device
CN104751068A (en) * 2013-12-26 2015-07-01 珠海金山办公软件有限公司 File protection method and device
CN104898940A (en) * 2015-04-30 2015-09-09 努比亚技术有限公司 Picture processing method and device
CN104915141A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Method and device for previewing object information

Also Published As

Publication number Publication date
CN105117663A (en) 2015-12-02

Similar Documents

Publication Publication Date Title
CN105117663B (en) The encrypted object display methods and device of a kind of application
CN105159530B (en) A kind of the display object switching method and device of application
CN107643977B (en) Anti-addiction method and related product
US20170140137A1 (en) Multi-System Entering Method, Apparatus and Terminal
CN104751066A (en) Information processing method and device
CN107832595B (en) Locking method and related equipment
TWI516972B (en) Method for applying safety verification, applying server, applying client and system
CN105281907B (en) Encrypted data processing method and device
CN105050061A (en) Method and device for sending messages on the basis of user voiceprint information
CN104951684A (en) Fingerprint encryption and decryption method and terminal
CN106648583B (en) Information processing method and terminal
KR101634531B1 (en) Device and method for preventing information from being leakage by screen capture in video output apparatus
WO2016145624A1 (en) Information processing method and mobile terminal
CN109271228A (en) Interface function recognition methods, device and the electronic equipment of application
CN107085694B (en) Information display processing method and device
WO2018165341A1 (en) Contact information display method and device, and information display method and device
CN107742073A (en) Information displaying method, device, computer installation and computer-readable recording medium
CN105577378A (en) Identity authentication method, apparatus, and system
CN111177770B (en) Sensitive information protection method, mobile equipment and storage device
WO2021092769A1 (en) Security protection method and device, mobile terminal, and storage medium
CN105224885A (en) A kind of data processing method and terminal
CN106102011A (en) Method, device and the terminal that a kind of terminal positioning processes
CN104378202B (en) Information processing method, electronic terminal and server
CN106779717B (en) Payment authentication method and device
CN107247900B (en) Method and device for acquiring login password of operating system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180706

CF01 Termination of patent right due to non-payment of annual fee